Open Access Open Access  Restricted Access Subscription or Fee Access

Simple and Secure File Transfer on Cloud Using Hybrid Cryptography and Steganography

Y. Chirag, N. Nachiketh Subramanya, P. Anitha

Abstract


In the world of fast-growing internet activities, the transfer of data through various networks to reach the device of interest might lead to loss of data, theft, manipulation or even threats. But it is necessary to find an optimal way to carry out the process smoothly and quickly. Thus, we use ciphering at the source and deciphering at the destination as our primary objective. This paper also targets on the authentication of the data that is being transferred via Hybrid cryptography. Key sharing for the receiver is done via image steganography to make sure no attacker can crack the key. Also, every registered user is granted their files eventually through dynamic password method and hence enhancing and ensuring the safety.

Keywords


AES, Cloud, Dynamic Password, Hybrid Cryptography, LSB Image Steganography, RSA.

Full Text:

PDF

References


S. K. Ghosh, S. Rana, A. Pansari, J. Hazra and S. Biswas, "Hybrid Cryptography Algorithm For Secure And Low Cost Communication," 2020 International Conference on Computer Science, Engineering and Applications (ICCSEA), 2020, pp. 1-5, doi: 10.1109/ICCSEA49143.2020.9132862.

P. V. Maitri and A. Verma, "Secure file storage in cloud computing using hybrid cryptography algorithm," 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), 2016, pp. 1635-1638, doi: 10.1109/WiSPNET.2016.7566416.

Secure File Storage Using Hybrid Cryptography, Ronak Karani, Tejas Choudhari, Anindita Bhajan, Madhu Nashipudimath ,2020

O. Elharrouss, N. Almaadeed and S. Al-Maadeed, "An image steganography approach based on k-least significant bits (k-LSB)," 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT), 2020, pp. 131-135, doi: 10.1109/ICIoT48696.2020.9089566.

D. P. Timothy and A. K. Santra, "A hybrid cryptography algorithm for cloud computing security," 2017 International conference on Microelectronic Devices, Circuits and Systems (ICMDCS), 2017, pp. 1-5, doi: 10.1109/ICMDCS.2017.8211728.

Y. P. Astuti, D. R. I. M. Setiadi, E. H. Rachmawanto and C. A. Sari, "Simple and secure image steganography using LSB and triple XOR operation on MSB," 2018 International Conference on Information and Communications Technology (ICOIACT), 2018, pp. 191-195, doi: 10.1109/ICOIACT.2018.8350661.

M. J. Dubai, T. R. Mahesh and P. A. Ghosh, "Design of new security algorithm: Using hybrid Cryptography architecture," 2011 3rd International Conference on Electronics Computer Technology, 2011, pp. 99-101, doi: 10.1109/ICECTECH.2011.5941965.

Arpit Agarwal, Gunjan Patnakar,” Design of Hybrid Cryptography Algorithm for Secure Communication”, International Research Journal of Engineering and Technology (IRJET) Volume: 03 Issue: 01 — Jan-2016

Dr.Vivek Kapoor, Rahul Yadav, ”A Hybrid cryptography technique for increasing network security”, International Journal of Computer Applications (0975 – 8887) Volume 141 – No.11, May 2016[10] Y. Alkady, M. I. Habib and R. Y. Rizk, "A new security protocol using hybrid cryptography algorithms," 2013 9th International Computer Engineering Conference (ICENCO), 2013, pp. 109-115, doi: 10.1109/ICENCO.2013.6736485.

Y. Alkady, M. I. Habib and R. Y. Rizk, "A new security protocol using hybrid cryptography algorithms," 2013 9th International Computer Engineering Conference (ICENCO), 2013, pp. 109-115, doi: 10.1109/ICENCO.2013.6736485.

A. Kumar, V. Jain and A. Yadav, "A New Approach for Security in Cloud Data Storage for IOT Applications Using Hybrid Cryptography Technique," 2020 International Conference on Power Electronics & IoT Applications in Renewable Energy and its Control (PARC), 2020, pp. 514-517, doi: 10.1109/PARC49193.2020.236666.

M. S. Abbas, S. S. Mahdi and S. A. Hussien, "Security Improvement of Cloud Data Using Hybrid Cryptography and Steganography," 2020 International Conference on Computer Science and Software Engineering (CSASE), 2020, pp. 123-127, doi: 10.1109/CSASE48920.2020.9142072.

S. Al Mamun, M. A. Mahmood and M. A. Amin, "Ensuring Security of Encrypted Information by Hybrid AES and RSA Algorithm with Third-Party Confirmation," 2021 5th International Conference on Intelligent Computing and Control Systems (ICICCS), 2021, pp. 337-343, doi: 10.1109/ICICCS51141.2021.9432174.

P. Kuppuswamy, Shanmugasundaram and R. John, "A Novel approach of Designing E-commerce authentication scheme using Hybrid Cryptography based on Simple symmetric key and extended Linear block cipher algorithm," 2020 International Conference on Computing and Information Technology (ICCIT-1441), 2020, pp. 1-6, doi: 10.1109/ICCIT-144147971.2020.9213815.

B. Deepthi, G. Ramani, R. Deepika and M. Shabbeer., "Hybrid Secure Cloud Storage data based on improved Encryption Scheme," 2021 International Conference on Emerging Smart Computing and Informatics (ESCI), 2021, pp. 776-779, doi: 10.1109/ESCI50559.2021.9396842.

K. Jaspin, S. Selvan, S. Sahana and G. Thanmai, "Efficient and Secure File Transfer in Cloud Through Double Encryption Using AES and RSA Algorithm," 2021 International Conference on Emerging Smart Computing and Informatics (ESCI), 2021, pp. 791-796, doi: 10.1109/ESCI50559.2021.9397005.

E. Jintcharadze and M. Iavich, "Hybrid Implementation of Twofish, AES, ElGamal and RSA Cryptosystems," 2020 IEEE East-West Design & Test Symposium (EWDTS), 2020, pp. 1-5, doi: 10.1109/EWDTS50664.2020.9224901.

A. Hamza and B. Kumar, "A Review Paper on DES, AES, RSA Encryption Standards," 2020 9th International Conference System Modeling and Advancement in Research Trends (SMART), 2020, pp. 333-338, doi: 10.1109/SMART50582.2020.9336800.

Pronika and S. S. Tyagi, "Secure Data Storage in Cloud using Encryption Algorithm," 2021 Third International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV), 2021, pp. 136-141, doi: 10.1109/ICICV50876.2021.9388388.

Z. Zhang, P. Cheng, J. Wu and J. Chen, "Secure State Estimation Using Hybrid Homomorphic Encryption Scheme," in IEEE Transactions on Control Systems Technology, doi: 10.1109/TCST.2020.3019501.

C. A. Subasini and S. Nikkath Bushra, "Securing of Cloud Data with Duplex Data Encryption Algorithm," 2021 5th International Conference on Computing Methodologies and Communication (ICCMC), 2021, pp. 252-256, doi: 10.1109/ICCMC51019.2021.9418247.

A. Ahmed, M. F. Nanne and B. Gueye, "A hybrid model to secure the exchange of DH keys," 2021 International Conference on Computer Communication and Informatics (ICCCI), 2021, pp. 1-5, doi: 10.1109/ICCCI50826.2021.9402345.

R. S. Ganesh, V. Nagaraj, S. A. Sivakumar and B. M. Shankar, "An Intelligent and Hybrid Method of Combining Spatial and Frequency Representation for Digital Image Steganography," 2020 3rd International Conference on Intelligent Sustainable Systems (ICISS), 2020, pp. 1057-1061, doi: 10.1109/ICISS49785.2020.9315918.

L. Voleti, R. M. Balajee, S. K. Vallepu, K. Bayoju and D. Srinivas, "A Secure Image Steganography Using Improved Lsb Technique And Vigenere Cipher Algorithm," 2021 International Conference on Artificial Intelligence and Smart Systems (ICAIS), 2021, pp. 1005-1010, doi: 10.1109/ICAIS50930.2021.9395794.

O. I. Al-Sanjary, O. Ahmed Ibrahim and K. Sathasivem, "A New Approach to Optimum Steganographic Algorithm for Secure Image," 2020 IEEE International Conference on Automatic Control and Intelligent Systems (I2CACIS), 2020, pp. 97-102, doi: 10.1109/I2CACIS49202.2020.9140186.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.