Enhancing security for end users in cloud computing environment using hybrid encryption technique


  • Nadesh R.K VIT University
  • Srinivasa Perumal R VIT University
  • Shynu P.G VIT University
  • Gaurav Sharma VIT University






Authentication, Cipher Block Chaining, Cloud Security, Cloud Storage, Encryption


In the era of cloud, anything and everything as a service facilitates number of remote user connected from anywhere, anytime and any form of access to the storage services. Today, Cloud storage has become an essential aspect of cloud computing, stores information and support any kind of applications. Applications like Internet of Things, Big Data analytics, Data warehousing, Databases, Backups and archive applications all rely on some form or the other on cloud storage architecture. Users may have a different variants of smart devices such as tablet, PCs, notebook and smart phones. Cloud storage provides an interlink between these smart devices. Enterprises prefer to use cloud storage because they provide cost-friendly and flexible alternatives on locally implemented hardware. However, business process in the cloud needs secured transaction, confidential files are sometimes exposed to risk of leakage, as cloud- stored data resides outside of the local infrastructure, thus vulnerable to security risks. Cloud storage providers provides enough security at their end, but there is no system that provides client level security while using public clouds. The proposed system will provide client level security using hybrid encryption techniques. Using AES (Advance Encryption Standard) in CBC Mode (Cipher Block Chaining) and HMAC-SHA-1 (Hash-based Message Authentication Code) with light weight methods enhances the strong encryption at client level security. Fusion of these algorithms adds extra layers of security to the cloud storage data. The proposed method enhances the security measures for any client users, using storage as a service offered by several cloud service providers.


[1] Maurich Ingo, Heberle Lukas, Guneysu Tim, â€IND-CCA Secure Hy- ¨ brid Encryption from QC-MDPC Niederreiterâ€, 7th International Workshop on Post-Quantum Cryptography, Vol.9606, (2016), pp.1–17.

[2] Usman Muhammad, Ahmed Irfan, Aslam M Imran , Khan Shujaat , Shah Usman Ali, â€SIT: A Lightweight Encryption Algorithm for Secure Internet of Thingsâ€, arXiv preprint arXiv:1704.08688, (2017).

[3] MDawahdeh Ziad E , Yaakob Shahrul N ,bin Othman, Rozmie Razif, â€A New Image Encryption Technique Combining Elliptic Curve Cryptosystem with Hill Cipherâ€, Journal of King Saud University-Computer and Information Sciences, (2017).

[4] Maurich Ingo, Heberle Lukas, Guneysu Tim, â€Efficient cloud storage ¨ confidentiality to ensure data securityâ€, International Conference on Computer Communication and Informatics, (2014), pp.1–5.

[5] Zhao Gansen, Rong Chunming, Li Jin, Zhang Feng, Tang, Yong, â€Trusted data sharing over untrusted cloud storage providersâ€, International Conference on Cloud Computing Technology and Science, (2010), pp.97–103.

[6] Chen Deyan, Zhao Hong, â€Data security and privacy protection issues in cloud computingâ€, International Conference on Computer Science and Electronics Engineering, (2012), pp.647–651.

[7] Stanek Jan, Sorniotti Alessandro, Androulaki Elli, Kencl, Lukas, â€A secure data deduplication scheme for cloud storageâ€, International Conference on Financial Cryptography and Data Security, (2014), pp.99–118.

[8] Slamanig Daniel, Hanser Christian, â€On cloud storage and the cloud of clouds approachâ€, International Conference on Internet Technology And Secured Transactions, (2012), pp.649–655.

[9] Fathy Ahmed, Tarrad Ibrahim F, Hamed Hesham FA, Awad Ali Ismail, â€Advanced Encryption Standard Algorithm: Issues and Implementation Aspectsâ€, AMLTA, (2012), pp.516–523.

[10] Al-Shawabkeh Mahmoud, Saudi Madihah Mohd, Alwi Najwa Hayaati Mohd, â€Computer security self-efficacy effect: An extention of Technology-to-Performance chain modelâ€, Control and System Graduate Research Colloquium, (2012), pp.64–69.

[11] Karuppusamy Sasikumar , Muthaiyan Madiajagan, â€An Efficient Placement Algorithm for Data Replication and To Improve System Availability in Cloud Environmentâ€, International Journal of Intelligent Engineering and Systems, Vol.9, No.4,(2016), pp.88–97.

[12] Jing Zhang , Jinsu Wang , Zhuangfeng Zheng , Chongan Zhao, â€Cloud storage encryption security analysisâ€, International Conference on Cloud Computing and Big Data Analysis, (2016), pp.62–65.

[13] Yahya Fara, Walters Robert J , Wills Gary B, â€Goal-based security components for cloud storage security framework: a preliminary studyâ€, International Conference On Cyber Security And Protection Of Digital Services, (2016), pp.1–5.

[14] Nadesh RK, Jagadeesh Meduri , Aramudhan M, â€A Quantitative Study on the Performance of Cloud Data Centre: Dynamic Maintenance Schedules with Effective Resource Provisioning Schemaâ€, Indian Journal of Science and Technology, Vol.8, No.23,(2015).

[15] Black John, Halevi Shai, Krawczyk Hugo , Krovetz Ted , Rogaway Phillip, â€UMAC: Fast and secure message authenticationâ€, Annual International Cryptology Conference, (1999), pp.216–233.

[16] Patil Amit, Marimuthu K , Niranchana R, â€Comparative study of cloud platforms to develop a Chatbotâ€, International Journal of Engineering & Technology, Vol.6, No.3, (2017), pp. 57–61.

[17] Bellare Mihir, Kilian Joe, Rogaway Phillip, â€The security of the cipher block chaining message authentication codeâ€, Journal of Computer and System Sciences, Vol.61, No.3, (2000), pp. 362–399

[18] Black John, Rogaway Phillip, â€A block-cipher mode of operation for parallelizable message authenticationâ€, Advances in CryptologyEUROCRYPT, (2002), pp. 384–397.

[19] Sekar K , Padmavathamma M, â€Comparative study of encryption algorithm over big data in cloud systemsâ€, International Conference on Computing for Sustainable Global Development, (2016), pp. 1571–1574.

[20] Dhingra Mridula, Gupta Neha, â€Comparative analysis of fault tolerance models and their challenges in cloud computingâ€, International Journal of Engineering & Technology, Vol.6, No.2, (2017), pp. 36–40.

[21] Li Jin , Li Yan Kit , Chen Xiaofeng , Lee Patrick PC , Lou Wenjing, â€Comparative analysis of fault tolerance models and their challenges in cloud computingâ€, IEEE Transactions on Parallel and Distributed Systems, Vol.26, No.5, (2015), pp. 1206–1216.

View Full Article: