Skip to main content

Efficient Data Security Using Hybrid RSA-TWOFISH Encryption Technique on Cloud Computing

  • Conference paper
  • First Online:
Intelligent Data Engineering and Analytics (FICTA 2023)

Abstract

In recent times, whichever technology can’t be specified faultlessly up to its permitted susceptibility. Several skills have grown up in regular life that proposes accessible data storing, actuality capable to contact the data after everywhere every time you need and utmost essentially, they deliver on the Internet use some software. Cloud computing is an example given that you through data storing and too it owns dissimilar facilities on let convention ability. In the context of cloud computing cloud safety is a big worry. To protect the cloud environment, several investigation mechanisms are being planned. Cryptography is used to overwhelm the safety concern and attain the CIA’s possessions. Cryptography is the great equalizer of data transmission and storing safety it is an identical and valuable method to safeguard. Customary symmetric and asymmetric have certain restrictions. To resolve this, we are successful to present a fresh hybrid method to attain extraordinary data safety and privacy. In this paper, we are examining RSA and Twofish to appliance a hybrid procedure. The presentation of the hybrid method is equated through the current hybrid technique and displays that the planned technique delivers high safety and privacy of patient data. To overthrow the problems of together symmetric and asymmetric, hybrid cryptography is used.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Mishra, S., Tyagi, A.K.: The role of machine learning techniques in internet of things-based cloud applications. In: Artificial Intelligence-Based Internet of Things Systems, pp. 105–135 (2022)

    Google Scholar 

  2. Akhtar, N., et al.: A comprehensive overview of privacy and data security for cloud storage. Int. J. Sci. Res. Sci. Eng. Technol. (2021)

    Google Scholar 

  3. Bhadra, S.: Cloud computing threats and risks: uncertainty and unconrollability in the risk society (2020)

    Google Scholar 

  4. Krishna, R.R., et al.: State-of-the-art review on IoT threats and attacks: taxonomy, challenges and solutions. Sustainability 13–16, 9463 (2021)

    Google Scholar 

  5. Saad, W., et al.: Wireless Communications and Networking for Unmanned Aerial Vehicles. Cambridge University Press (2020)

    Google Scholar 

  6. Hashim, F.A., et al.: Archimedes optimization algorithm: a new metaheuristic algorithm for solving optimization problems. Appl. Intell. 51, 1531–1551 (2021)

    Google Scholar 

  7. Sander, B.: Democracy under the influence: paradigms of state responsibility for cyber influence operations on elections. Chin. J. Int. Law 18(1), 1–56 (2019)

    Google Scholar 

  8. Paiva, T.A.B.: Attacking and defending post-quantum cryptography candidates. Diss., Universidade de São Paulo (2022)

    Google Scholar 

  9. Priyadarshini, R., et al.: An enhanced encryption-based security framework in the CPS cloud. J. Cloud Comput. 11(1), 64 (2022)

    Article  Google Scholar 

  10. Tyagi, K., Yadav, S.K., Singh, M.: Cloud data security and various security algorithms. J. Phys. Conf. Ser. 1998 (2021). IOP Publishing

    Google Scholar 

  11. Imam, R., et al.: Systematic and critical review of RSA based public key cryptographic schemes: past and present status. IEEE Access 9, 155949–155976 (2021)

    Google Scholar 

  12. Soni, P., Malik, R.: Efficient cipher scheme for hybrid models with internal structure modification

    Google Scholar 

Download references

Acknowledgements

The authors would like to thank the reviewers for all of their careful, constructive and insightful comments in relation to this work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to A. Jenice Prabhu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Jenice Prabhu, A. et al. (2023). Efficient Data Security Using Hybrid RSA-TWOFISH Encryption Technique on Cloud Computing. In: Bhateja, V., Carroll, F., Tavares, J.M.R.S., Sengar, S.S., Peer, P. (eds) Intelligent Data Engineering and Analytics. FICTA 2023. Smart Innovation, Systems and Technologies, vol 371. Springer, Singapore. https://doi.org/10.1007/978-981-99-6706-3_42

Download citation

Publish with us

Policies and ethics