Affiliation:
1. Vellore Institute of Technology, Bhopal, India
Abstract
The Evolving Landscape of Cloud Storage Security: A Focus on Hybrid Cryptography Techniques
Data security and privacy have become paramount concerns for small and medium-sized businesses (SMBs) contemplating the migration of their data from on-premises storage to cloud-based solutions. This apprehension stems from the perceived lack of control over data stored with cloud service providers (CSPs). The concern lies in the potential for unfettered access by CSPs to a client's sensitive information. Additionally, there is a prevailing sentiment that current safeguards are inadequate in preventing unauthorized access and data modification within cloud infrastructures. While some CSPs have implemented symmetric and asymmetric cryptographic techniques to bolster security, this paper delves deeper into the realm of emerging hybrid cryptography techniques, specifically in the context of cloud storage security.
Case Study: Secure Storage Web Application
This section details the "Secure Storage" web application, designed to provide users with a secure platform for file management and storage. Developed using Python and the Flask framework, the application prioritizes user privacy by encrypting uploaded files with the Advanced Encryption Standard (AES) algorithm before persisting them on the server. User authentication is meticulously handled, with passwords stored as irreversible hashes within a SQLite database, mitigating the risk of password exposure in the event of a security breach.
Upon registering, users are granted the ability to upload files, which are subsequently encrypted using AES with a pre-defined key. These encrypted files are then stored within a designated directory on the server. Users can download their encrypted files at any time, with on-the-fly decryption occurring during the download process. The application demonstrably prioritizes user privacy and data security by leveraging industry-standard encryption practices and robust user authentication mechanisms. Additionally, it offers an intuitive interface that facilitates the secure storage and retrieval of files
Reference16 articles.
1. Mazrekaj, A., Shabani, I. and Sejdiu, B., 2016. Pricing schemes in cloud computing: an overview. International Journal of Advanced Computer Science and Applications, 7(2), pp.80-86.
2. S. Carlin and K. Curran, “Cloud Computing Security”, Pervasive and Ubiquitous Technology Innovations for Ambient Intelligence Environments, vol. 1, no. 2, pp. 12-17, 2013.
3. Jyoti, T. and Pandi, G., 2017. Achieving Cloud Security Using Hybrid Cryptography Algorithm. International Journal of Advance Research and Innovative Ideas in Education, 3(5).
4. D. P. Timothy and A. K. Santra, “A hybrid cryptography algorithm for cloud computing security,” 2017 International conference on Microelectronic Devices, Circuits and Systems (ICMDCS), Vellore, 2017, pp. 1-5, doi: 10.1109/ICMDCS.2017.8211728.
5. Odun-Ayo, I., Ajayi, O., Akanle, B. and Ahuja, R., 2017, December. An overview of data storage in cloud computing. In 2017 International Conference on Next Generation Computing and Information Systems (ICNGCIS) (pp. 29-34). IEEE.