Skip to main content

Hybrid Cryptographic Approach to Safeguard Cloud Computing Services: A Survey

  • Conference paper
  • First Online:
Advanced Machine Learning Technologies and Applications (AMLTA 2021)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1339))

Abstract

Cloud computing is a broad solution that cost-effectively delivers information technology as a service that encourages organizations and individuals to transfer their data and applications to the cloud. It may be used for storing and accessing sensitive information on servers beyond the management and control of the customers making this information susceptible to malicious attacks. Therefore, data security is a fundamental issue that limits the benefits of this technology. Cryptography plays an important role in achieving an appropriate level of data security on the cloud. Hybrid cryptography exploits the advantages of symmetric and asymmetric cryptosystems by blending them instead of applying separately. In this article, an experimental survey has been conducted on the trending hybrid cryptographic models to secure information on the cloud within the period from 2017 to 2020. Each model was reviewed and simulated separately by explaining the methodology, its advantages, weaknesses, and application areas. An important point in this article is the implementation of all of these models using the Python programming language then an analytical comparison of the results was obtained in terms of encryption time and throughput. We aim to provide a scientific contribution in the field of information security in the cloud computing environments.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 229.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 299.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Badger, M.L., Grance, T., Patt-Corner, F., Voas, J.M.: Cloud Computing Synopsis and Recommendations. National Institute of Standards & Technology (2012)

    Google Scholar 

  2. Kyriazis, D., Athanasios, V., Spyridon, V.G., Theodora, A.V.: Data Intensive Storage Services for Cloud Environments. Business Science Reference (2013)

    Google Scholar 

  3. Singh, V., Pandey, S.K.: Cloud computing: vulnerability and threat indications. In: Performance Management of Integrated Systems and its Applications in Software Engineering, pp. 11–20. Springer, Singapore (2020)

    Google Scholar 

  4. Sinchana, M.K., Savithramma, R.M.: Survey on cloud computing security. In: Innovations in Computer Science and Engineering, pp. 1–6. Springer, Singapore (2020)

    Google Scholar 

  5. Forouzan, B.A.: Cryptography and Network Security. McGraw-Hill Inc, United States (2007)

    Google Scholar 

  6. Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C. John Wiley & Sons, Hoboken (2007)

    MATH  Google Scholar 

  7. Chauhan, A., Gupta, J.: A novel technique of cloud security based on hybrid encryption by Blowfish and MD5. In: 2017 4th International Conference on Signal Processing, Computing and Control (ISPCC), pp. 349–355. IEEE (2017)

    Google Scholar 

  8. Timothy, D.P., Santra, A.K.: A hybrid cryptography algorithm for cloud computing security. In: 2017 International Conference on Microelectronic Devices, Circuits and Systems, (ICMDCS), pp. 1–5. IEEE (2017)

    Google Scholar 

  9. Barvekar, R., Behere, S., Pounikar, Y., Gulhane, A.: An approach to hybrid cryptography on cloud environment. Int. J. Adv. Res. Innov. Ideas Educ. 4(2), 4626–4631 (2018)

    Google Scholar 

  10. Ntshabele, K., Isong, B., Moemi, T., Dladlu, N., Gasela, N.: Hybrid encryption model for data security in cloud environment. In: Proceedings of the 2018 International Conference on Grid, Cloud, & Cluster Computing, Las Vegas, Nevada, USA (2018)

    Google Scholar 

  11. Cai, H., Liu, X., Cangelosi, A.: Security of cloud intelligent robot based on RSA algorithm and digital signature. In: 2019 IEEE Symposium Series on Computational Intelligence (SSCI), pp. 1453–1456. IEEE (2019)

    Google Scholar 

  12. Kumar, A., Jain, V., Yadav, A.: A new approach for security in cloud data storage for IOT applications using hybrid cryptography technique. In: 2020 International Conference on Power Electronics & IoT Applications in Renewable Energy and its Control (PARC), pp. 514–517. IEEE (2020)

    Google Scholar 

  13. Poduval, V., Koul, A., Rebello, D., Bhat, K., Revati, M.W.: Cloud based secure storage of files using hybrid cryptography and image steganography (IJRTE). Int. J. Recent Technol. Eng. 8(6) (2020)

    Google Scholar 

  14. Shivam, S., Singla, K., Rathee, G., Saini, H.: A hybrid cryptographic technique for file storage mechanism over cloud. In: First International Conference on Sustainable Technologies for Computational Intelligence, pp. 241–256. Springer, Singapore (2020)

    Google Scholar 

  15. Chaudhary, S., Foram S., Joshi, N.K.: Comparative study between cryptographic and hybrid techniques for implementation of security in cloud computing. In: Performance Management of Integrated Systems and its Applications in Software Engineering, pp. 127–135. Springer, Singapore (2020)

    Google Scholar 

  16. Murad, S.H., Gody, A.M., Barakat, T.M.: Enhanced Security of Symmetric Encryption Using Combination of Steganography with Visual Cryptography. arXiv pre-print arXiv: 1902.11167 (2019)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sherief H. Murad .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Murad, S.H., Rahouma, K.H. (2021). Hybrid Cryptographic Approach to Safeguard Cloud Computing Services: A Survey. In: Hassanien, AE., Chang, KC., Mincong, T. (eds) Advanced Machine Learning Technologies and Applications. AMLTA 2021. Advances in Intelligent Systems and Computing, vol 1339. Springer, Cham. https://doi.org/10.1007/978-3-030-69717-4_72

Download citation

Publish with us

Policies and ethics