Open Access   Article Go Back

Hybrid DES-RSA Model for the Security of Data over Cloud Storage

Rajan Kumar Yadav1 , Munish Saran2 , Pranjal Maurya3 , Sangeeta Devi4 , Upendra Nath Tripathi5

  1. Dept. of Computer Science, Deen Dayal Upadhyaya Gorakhpur University, Gorakhpur, Uttar Pradesh, India - 273009.
  2. Dept. of Computer Science, Deen Dayal Upadhyaya Gorakhpur University, Gorakhpur, Uttar Pradesh, India - 273009.
  3. Dept. of Computer Science, Deen Dayal Upadhyaya Gorakhpur University, Gorakhpur, Uttar Pradesh, India - 273009.
  4. Dept. of Computer Science, Deen Dayal Upadhyaya Gorakhpur University, Gorakhpur, Uttar Pradesh, India - 273009.
  5. Dept. of Computer Science, Deen Dayal Upadhyaya Gorakhpur University, Gorakhpur, Uttar Pradesh, India - 273009.

Section:Research Paper, Product Type: Journal Paper
Volume-11 , Issue-10 , Page no. 1-7, Oct-2023

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v11i10.17

Online published on Oct 31, 2023

Copyright © Rajan Kumar Yadav, Munish Saran, Pranjal Maurya, Sangeeta Devi, Upendra Nath Tripathi . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Rajan Kumar Yadav, Munish Saran, Pranjal Maurya, Sangeeta Devi, Upendra Nath Tripathi, “Hybrid DES-RSA Model for the Security of Data over Cloud Storage,” International Journal of Computer Sciences and Engineering, Vol.11, Issue.10, pp.1-7, 2023.

MLA Style Citation: Rajan Kumar Yadav, Munish Saran, Pranjal Maurya, Sangeeta Devi, Upendra Nath Tripathi "Hybrid DES-RSA Model for the Security of Data over Cloud Storage." International Journal of Computer Sciences and Engineering 11.10 (2023): 1-7.

APA Style Citation: Rajan Kumar Yadav, Munish Saran, Pranjal Maurya, Sangeeta Devi, Upendra Nath Tripathi, (2023). Hybrid DES-RSA Model for the Security of Data over Cloud Storage. International Journal of Computer Sciences and Engineering, 11(10), 1-7.

BibTex Style Citation:
@article{Yadav_2023,
author = {Rajan Kumar Yadav, Munish Saran, Pranjal Maurya, Sangeeta Devi, Upendra Nath Tripathi},
title = {Hybrid DES-RSA Model for the Security of Data over Cloud Storage},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {10 2023},
volume = {11},
Issue = {10},
month = {10},
year = {2023},
issn = {2347-2693},
pages = {1-7},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=5625},
doi = {https://doi.org/10.26438/ijcse/v11i10.17}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v11i10.17}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=5625
TI - Hybrid DES-RSA Model for the Security of Data over Cloud Storage
T2 - International Journal of Computer Sciences and Engineering
AU - Rajan Kumar Yadav, Munish Saran, Pranjal Maurya, Sangeeta Devi, Upendra Nath Tripathi
PY - 2023
DA - 2023/10/31
PB - IJCSE, Indore, INDIA
SP - 1-7
IS - 10
VL - 11
SN - 2347-2693
ER -

VIEWS PDF XML
106 204 downloads 68 downloads
  
  
           

Abstract

Cloud computing is a novel business strategy. Over the past several years, the idea of cloud computing has matured, becoming one of the most rapidly expanding business concepts in the IT sector. The capacity of cloud computing to supply consumers with elastic, dependable, and reasonably priced services on demand has contributed to its meteoric rise in popularity in recent years. Since cloud computing provides users with scalable, on-demand services while requiring less investment in infrastructure. Client data and computations must be protected from both internal and external threats in order to allay fears that cloud computing is inherently insecure. This is due to the fact that cloud users get the required information from distant cloud servers that are not under the direct management of the data owners and that the data owners store their sensitive information on remote hosts. The client has the option of implementing security measures such as firewalls, VPNs, and other perimeter-based controls to safeguard their information. Data stored in the cloud raises privacy and security concerns since it is not located on the client`s premises. Therefore, data security is a major focus area in the cloud computing industry. To address these issues with cloud data security, we have developed solutions and strategies. Collectively, the models we`ve offered to ensure data security, privacy, and integrity constitute comprehensive principles for bolstering cloud data security. Cloud security risks and privacy issues, as well as the types of assaults and threats to which clouds are susceptible, are all addressed in the models. We`ve also solved the problem of how to store data on the cloud effectively. Additionally, we propose a general security model for cloud computing that might assist in satisfying its security requirements and safe guarding clouds from different hazardous behaviors.

Key-Words / Index Term

Cloud Computing, Cryptography, DES, RSA, Cloud Security, Authentication

References

[1] P. Yang, N. Xiong and J. Ren, "Data Security and Privacy Protection for Cloud Storage: A Survey," in IEEE Access, Vol.8, pp.131723-131740, 2020.
[2] P.K. & Aremu, Prof Sir Bashiru. (2020), Cloud Service Providers: An Analysis of Some Emerging Organizations and Industries, Srinivas & Paul Publication, India, pp.172-183, 2020.
[3] Kaja, Durga & Fatima, Yasmin & Mailewa, Akalanka. Data Integrity Attacks in Cloud Computing: A Review of Identifying and Protecting Techniques. International Journal of Research Publication and Reviews. pp.713-720, 2022.
[4] A. Bhargav, & Manhar, Advin. A Review on Cryptography in Cloud Computing. International Journal of Scientific Research in Computer Science, Engineering and Information Technology. pp.225-230, 2020.
[5] S. A. Nooh, "Cloud Cryptography: User End Encryption," 2020 International Conference on Computing and Information Technology (ICCIT-1441), Tabuk, Saudi Arabia, 2020, pp.1-4, 2020.
[6] S. Kumar, G. Karnani, M. S. Gaur and A. Mishra, "Cloud Security using Hybrid Cryptography Algorithms," 2021 2nd International Conference on Intelligent Engineering and Management (ICIEM), London, United Kingdom, pp.599-604, 2021.
[7] Duan, Qiang & Wang, Shangguang & Ansari, Nirwan. (2020). Convergence of Networking and Cloud/Edge Computing: Status, Challenges, and Opportunities. IEEE Network. pp.1-8, 2020.
[8] Bruno Guazzelli Batista, Carlos Henrique Gomes Ferreira, Danilo Costa Marim Segura, Dionisio Machado Leite Filho & Maycon Leone Maciel Peixoto, ‘A QoS-driven approach for cloud computing addressing attributes of performance and security’, Future Generation Computer Systems, Vol.68, pp.260-274, 2017.
[9] M Subha & Banu Uthaya, M 2014, ‘A survey on QoS ranking in cloud computing’, International Journal of Emerging Technology and Advanced Engineering, Vol.4, No.2, pp.293-300, 2014.
[10] Faheem Zafar, Abid Khan, Saif Ur Rehman Malik, Mansoor Ahmed, Adeel Anjum, Majid Iqbal Khan, Nadeem Javed, Masoom Alam, Fuzel Jamil,A survey of cloud computing data integrity schemes: Design challenges, taxonomy and future trends, Computers & Security, Vol.65, pp.29-49, 2017.
[11] P Natesan, RR Rajalaxmi, Gowrison & P Balasubramanie, 2017, ‘Hadoop Based Parallel Binary Bat Algorithm for Network Intrusion Detection’, International Journal of Pattern Programming, Vol.45, No.5, pp.1194-1213, 2017.
[12] Salman Iqbal, Laiha, Mat Kiah, Babak Dhaghighi, Muzammil Hussain, Suleman khan, Muhammad Khurram Khan & Kim-Kwang Raymond Choo 2016, ‘On Cloud Security Attacks: A Taxonomy and Intrusion Detection and Prevention as a Service’, International Journal of Network and Computer Applications, Vol.74, pp.98-120, 2016.
[13] Syed Asad Hussain, Mehwish Fatima, Atif Saeed, Imran Raza, Raja & Khurram Shahzad 2017, ‘Multilevel classification of security concerns in cloud computing’, Applied Computing and Informatics, Vol.13, No.1, pp.57-65, 2017.
[14] Dinh-Mao Bui, YongIk, Yoon, Eui-Nam, Huh, SungIk Jun & Sungyoung Lee 2017, ‘Energy efficiency for cloud computing system based on predictive optimization’, Journal of Parallel and Distributed Computing, Vol.102, pp.103-114, 2017.
[15] Durfi Ashraf & Sayiema Amin 2016, ‘Information hiding based on optimization technique for Encrypted Images’, International Research Journal of Engineering and Technology (IRJET), Vol.3, No.1, pp.1-6, 2016.
[16] A. Prabhu, & M Usha, ‘A Secured best data centre selection in cloud computing using encryption techniques’, International Journal of Business Intelligence and Data Mining, Vol.14, No.1/2, 2019.