Hybrid Approach to Cloud Storage Security Using ECC-AES Encryption and Key Management Techniques

Hybrid Approach to Cloud Storage Security Using ECC-AES Encryption and Key Management Techniques

  IJETT-book-cover           
  
© 2024 by IJETT Journal
Volume-72 Issue-4
Year of Publication : 2024
Author : Yaser M.A. Abualkas, D. Lalitha Bhaskari
DOI : 10.14445/22315381/IJETT-V72I4P110

How to Cite?

Yaser M.A. Abualkas, D. Lalitha Bhaskari, "Hybrid Approach to Cloud Storage Security Using ECC-AES Encryption and Key Management Techniques," International Journal of Engineering Trends and Technology, vol. 72, no. 4, pp. 92-100, 2024. Crossref, https://doi.org/10.14445/22315381/IJETT-V72I4P110

Abstract
The rising popularity of cloud storage offers convenient and scalable data storage, yet its security remains a pressing concern, given the remote storage of sensitive information. While Advanced Encryption Standard (AES) ensures secure storage, challenges arise in key distribution and management. In contrast, elliptic curve cryptography (ECC) excels in efficient key management but has data size limitations. To overcome these hurdles, a hybrid ECC-AES approach has emerged. However, optimizing and evaluating its integration into cloud storage systems is essential. This study addresses the need to develop, assess, and enhance a hybrid ECC-AES approach for secure cloud storage. By focusing on implementation and performance optimization, this research strives to bolster the security and efficiency of cloud storage systems, contributing to the advancement of secure and scalable solutions in cloud storage technology; the proposed algorithm employs a hybrid technique involving ECC-AES encryption and sophisticated key management for heightened security. It encompasses steps to generate a random AES key, encrypt it using the ECC public key, and then split and store the encrypted AES key securely. The data is encrypted with the AES key and stored in cloud storage. For decryption, the encrypted data and AES key parts are retrieved. The ECC private key decrypts the AES key parts, which are then combined to form the complete AES key for decrypting the data. The algorithm ensures secure access control and authentication mechanisms, including role-based access control and two-factor authentication, and implements key rotation for periodic AES key changes to enhance security. By combining ECC-AES encryption and advanced key management techniques, this approach aims to enhance cloud data security effectively and comprehensively.

Keywords
Cloud storage, security, Hybrid approach, ECC-AES, Data encryption, Key distribution, Key management, Advanced Encryption Standard, Elliptic curve cryptography, Implementation, Performance optimization, Secure storage, Scalable solutions.

References
[1] Saba Rehman et al., “Hybrid AES-ECC Model for the Security of Data Over Cloud Storage,” Electronics, vol. 10, no. 21, pp. 1-20, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Turki Aljrees et al., “Enhancing IoT Security through a Green and Sustainable Federated Learning Platform: Leveraging Efficient Encryption and the Quondam Signature Algorithm,” Sensors, vol. 23, no. 19, pp. 1-28, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Joppe W. Bos et al., “Elliptic Curve Cryptography in Practice,” Financial Cryptography and Data Security: 18th International Conference, Christ Church, Barbados, vol. 8437, pp. 157-175, 2014.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Jianbing Ni et al., “Securing Fog Computing for Internet of Things Applications: Challenges and Solutions,” IEEE Communications Surveys & Tutorials, vol. 20, no. 1, pp. 601-628, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Damilare Nimat Akogun, “Enhancing Data Security in Cloud Storage Using Residue Number System and Advanced Encryption Standard,” M.Sc Thesis, Kwara State University, Nigeria, pp. 1-24, 2020.
[Google Scholar] [Publisher Link]
[6] Michael D. Garris et al., “User's Guide to NIST Fingerprint Image Software (NFIS),” National Institute of Standards and Technology, NIST Interagency/Internal Report, pp. 1-192, 2001.
[Google Scholar] [Publisher Link]
[7] Ria Andriani, Stevi Ema Wijayanti, and Ferry Wahyu Wibowo, “Comparision of AES 128-, 192- and 256-Bit Algorithm for Encryption and Description File,” 2018 3rd International Conference on Information Technology, Information System and Electrical Engineering (ICITISEE), Yogyakarta, Indonesia, pp. 120-124, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Maroti Deshmukh, and Arjun Singh Rawat, “Secure Key Sharing Scheme Using Hamiltonian Path,” International Journal of Information Technology, vol. 15, pp. 4141-4147, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Samiksha Sharma, and Vinay Chopra, “Data Encryption using Advanced Encryption Standard with Key Generation by Elliptic Curve Diffie-Hellman,” International Journal of Security and its Applications, vol. 11, no. 3, pp. 17-28, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Sanjeev Kumar et al., “Cloud Security Using Hybrid Cryptography Algorithms,” 2021 2nd International Conference on Intelligent Engineering and Management (ICIEM), London, United Kingdom, pp. 599-604, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[11] R. Kirubakaramoorthi, D. Arivazhagan, and D. Helen, “Survey on Encryption Techniques Used to Secure Cloud Storage System,” Indian Journal of Science and Technology, vol. 8, no. 36, pp. 1-7, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[12] P. Kavitha Rani et al., “Enhancing Cloud Security with Hybrid Encryption,” 2022 International Conference on Applied Artificial Intelligence and Computing (ICAAIC), Salem, India, pp. 1445-1450, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Ramaswamy Chandramouli, Michaela Iorga, and Santosh Chokhani, Cryptographic Key Management Issues and Challenges in Cloud Services, Secure Cloud Computing, Springer, New York, NY, pp. 1-30, 2013.
[CrossRef] [Google Scholar] [Publisher Link]