Open Access Open Access  Restricted Access Subscription Access

An Efficient Data Protection for Cloud Storage Through Encryption


Affiliations
1 Department of Mathematical Sciences, Achievers University Owo, Nigeria., Nigeria
 

Encryption of data pose data confidentiality, availability and integrity by eliminating all data leakage possibilities which is done by converting data into a cipher text that cannot be understood by unauthorized users through the use of a mathematical function called key. This research developed a secure system used for encryption and decryption process on the data supplied before such data is stored on the cloud storage system. The model used in developing the secure system is 256-bit key encryption and adopts the Base64 character encoding scheme rather than the widely used ASCII standard. Variations of data supplied to the proposed secure system were from several multimedia data (such as video, audio, text, and image) and other types. The model performance was tested and evaluated by brute-force attack and program execution time. The implementation was done using Python programming language and Google Drive as the cloud storage and the encrypted data is supported by the cloud storage system. The adopted model creates a better and efficient mechanism for data supplied by encoding the key to be used for encryption in base64. It gives a better security technique with lesser computational time.

Keywords

AES-256, Base64, Cloud storage, Cryptography, Google cloud.
User
Notifications
Font Size

  • Subramanian, N. & Jeyaraj, A. (2018). Recent Security challenges in Cloud Computing. Computers & Electrical Engineering. Volume 71, October 2018, pp. 28-42. https://doi.org/10.1016/j.compeleceng.2018 .06.006.
  • Miller, G. (2020). The intelligence coup of the century. National Security. The Washington Post. https://www.washingtonpost.com/graphics/ 2020/world/national-security/cia-crypto encryption-machines-espionage/
  • Morrison, S. (2021). Here’s how police can get your data, even if you aren’t suspected of a crime. And you may never know they did it. Recode by Vox, VoxMedia. https://www.vox.com/platform/amp/recode/ 22565926/police-law-enforcement-data warrant
  • Prajapati, P. & Shah, P. (2020). A Review on Secure Data Deduplication: Cloud Storage Security Issue. Journal of King Saud University – Computer and Information Sciences. https://doi.org/10.1016/j.jksuci.2020.10.021
  • Han, S., Han, K., & Zhang, S. (2019). A Data Sharing Protocol to Minimize Security and Privacy Risks of Cloud Storage in Big Data Era. IEEE (Institute of Electrical and Electronics Engineers) Access. Volume 7, May 21, 2019. 10.1109/ACCESS.2019.2914862.
  • Zhang, L., Xiong, H., Huang, Q., Li, J., Choo, K.R. & Li, J. (2019). Cryptographic Solutions for Cloud Storage: Challenges and Research Opportunities. DOI 10.1109/TSC.2019.2937764, IEEE Transactions on Services Computing.
  • Wu, Y., Lyu, Y., & Shi, Y. (2019). Cloud Storage Security Assessment through Equilibrium Analysis. Tsinghua Science and Technology. ISSNll1007-0214 09/10 Number 6, Volume 24, December 2019. pp. 738–749 DOI: 10.26599/TST.2018.9010127
  • Kumar, R.P., Raj, H.P. & Jelciana P. (2018). Exploring Data Security Issues and Solutions in Cloud Computing. 6th International Conference on Smart Computing and Communications, ICSCC 2017, 7-8 December 2017, Kurukshetra, India. Procedia Computer Science 125 (2018), pp. 691–697. http://www.elsevier.com/locate/procedia
  • Vengadapurvaja, A.M., Nisha, G., Aarthy, R. & Sasikaladevi, N. (2017). An Efficient Homomorphic Medical Image Encryption Algorithm for Cloud Storage Security. 7th International Conference on Advances in Computing & Communications, ICACC-2017, 22- 24 August 2017, Cochin, India. Procedia Computer Science 115 (2017), pp 643–650.
  • Bokefode, J.D., Bhise, A.S., Satarkar, P.A. & Modanic D.G. (2016). Developing A Secure Cloud Storage System for Storing IoT Data by Applying Role Based Encryption. Twelfth International Multi-Conference on Information Processing-2016 (IMCIP-2016). Procedia Computer Science 89 (2016), pp. 43 – 50.
  • Bommala, H., Kiran, S; Pujitha, M; Reddy, R.P.K. Performance of Evaluation for AES with ECC in Cloud Environment. International Journal of Advanced Networking and Applications, Vol. 10, Iss. 5, (Mar/Apr 2019): 4019-4025. DOI:10.35444/IJANA.2019.10056
  • Suresh, S R. An Electronic Digital Library Using Integrated Security Methods and Cloud Storages International Journal of Advanced Networking and Applications Vol. 13, Iss. 1, (Jul/Aug 2021): 4839-4844.

Abstract Views: 102

PDF Views: 0




  • An Efficient Data Protection for Cloud Storage Through Encryption

Abstract Views: 102  |  PDF Views: 0

Authors

Adepoju E. Sunday
Department of Mathematical Sciences, Achievers University Owo, Nigeria., Nigeria
Oyekanmi E. Olufunminiyi
Department of Mathematical Sciences, Achievers University Owo, Nigeria., Nigeria

Abstract


Encryption of data pose data confidentiality, availability and integrity by eliminating all data leakage possibilities which is done by converting data into a cipher text that cannot be understood by unauthorized users through the use of a mathematical function called key. This research developed a secure system used for encryption and decryption process on the data supplied before such data is stored on the cloud storage system. The model used in developing the secure system is 256-bit key encryption and adopts the Base64 character encoding scheme rather than the widely used ASCII standard. Variations of data supplied to the proposed secure system were from several multimedia data (such as video, audio, text, and image) and other types. The model performance was tested and evaluated by brute-force attack and program execution time. The implementation was done using Python programming language and Google Drive as the cloud storage and the encrypted data is supported by the cloud storage system. The adopted model creates a better and efficient mechanism for data supplied by encoding the key to be used for encryption in base64. It gives a better security technique with lesser computational time.

Keywords


AES-256, Base64, Cloud storage, Cryptography, Google cloud.

References