Download PDFOpen PDF in browserSecure Data Storage on Cloud Using Hybrid Cryptography MethodsEasyChair Preprint 101268 pages•Date: May 12, 2023AbstractThe protection of information stored in cloud-based databases is a multifaceted and intricate matter that demands attention, given the existence of malevolent attacks, data violations, and unguarded entryways. Historically, numerous scholars have posited security mechanisms, such as access control, detection and avoidance of intrusion methods, storage methods like cryptography, and some schemes for key management. Security of data kept in cloud databases is compromised by attackers who exploit the privileges obtained from multiple roles, thereby undermining the role-based control mechanisms for access that were designed to safeguard sensitive information. Hence, The examination of the correlation among various attributes is crucial in proposing more efficient mechanisms for protecting sensitive information through attribute-based encryption. In order to address security concerns associated with the management of vast quantities of cloud-based data, we have suggested the utilisation of Elliptic Curve Cryptography (ECC) for the encryption of data, as well as for secure connection establishment we implement the Diffie-Hellman Key Exchange (DHKE) method. The proposed encryption system utilises a hybrid methodology that integrates parametric and elliptical cryptography techniques. The system is composed of three discrete security checkpoints, specifically authorization, generating keys, and data encryption. The utilisation of Elliptic Curve cryptography is known to reduce computational power requirements due to its small key size, thereby resulting in lower energy consumption. The present study demonstrates that the implementation of elliptic curve cryptography in a cloud computing setting results in expedited data protection and heightened efficiency, as it mitigates computational demands. Keyphrases: Decryption, Diffie-Hellman key exchange, Elliptic Curve Cryptography, Encryption, key generation
|