Abstract
Cloud computing is a broad solution that cost-effectively delivers information technology as a service that encourages organizations and individuals to transfer their data and applications to the cloud. It may be used for storing and accessing sensitive information on servers beyond the management and control of the customers making this information susceptible to malicious attacks. Therefore, data security is a fundamental issue that limits the benefits of this technology. Cryptography plays an important role in achieving an appropriate level of data security on the cloud. Hybrid cryptography exploits the advantages of symmetric and asymmetric cryptosystems by blending them instead of applying separately. In this article, an experimental survey has been conducted on the trending hybrid cryptographic models to secure information on the cloud within the period from 2017 to 2020. Each model was reviewed and simulated separately by explaining the methodology, its advantages, weaknesses, and application areas. An important point in this article is the implementation of all of these models using the Python programming language then an analytical comparison of the results was obtained in terms of encryption time and throughput. We aim to provide a scientific contribution in the field of information security in the cloud computing environments.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Badger, M.L., Grance, T., Patt-Corner, F., Voas, J.M.: Cloud Computing Synopsis and Recommendations. National Institute of Standards & Technology (2012)
Kyriazis, D., Athanasios, V., Spyridon, V.G., Theodora, A.V.: Data Intensive Storage Services for Cloud Environments. Business Science Reference (2013)
Singh, V., Pandey, S.K.: Cloud computing: vulnerability and threat indications. In: Performance Management of Integrated Systems and its Applications in Software Engineering, pp. 11–20. Springer, Singapore (2020)
Sinchana, M.K., Savithramma, R.M.: Survey on cloud computing security. In: Innovations in Computer Science and Engineering, pp. 1–6. Springer, Singapore (2020)
Forouzan, B.A.: Cryptography and Network Security. McGraw-Hill Inc, United States (2007)
Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C. John Wiley & Sons, Hoboken (2007)
Chauhan, A., Gupta, J.: A novel technique of cloud security based on hybrid encryption by Blowfish and MD5. In: 2017 4th International Conference on Signal Processing, Computing and Control (ISPCC), pp. 349–355. IEEE (2017)
Timothy, D.P., Santra, A.K.: A hybrid cryptography algorithm for cloud computing security. In: 2017 International Conference on Microelectronic Devices, Circuits and Systems, (ICMDCS), pp. 1–5. IEEE (2017)
Barvekar, R., Behere, S., Pounikar, Y., Gulhane, A.: An approach to hybrid cryptography on cloud environment. Int. J. Adv. Res. Innov. Ideas Educ. 4(2), 4626–4631 (2018)
Ntshabele, K., Isong, B., Moemi, T., Dladlu, N., Gasela, N.: Hybrid encryption model for data security in cloud environment. In: Proceedings of the 2018 International Conference on Grid, Cloud, & Cluster Computing, Las Vegas, Nevada, USA (2018)
Cai, H., Liu, X., Cangelosi, A.: Security of cloud intelligent robot based on RSA algorithm and digital signature. In: 2019 IEEE Symposium Series on Computational Intelligence (SSCI), pp. 1453–1456. IEEE (2019)
Kumar, A., Jain, V., Yadav, A.: A new approach for security in cloud data storage for IOT applications using hybrid cryptography technique. In: 2020 International Conference on Power Electronics & IoT Applications in Renewable Energy and its Control (PARC), pp. 514–517. IEEE (2020)
Poduval, V., Koul, A., Rebello, D., Bhat, K., Revati, M.W.: Cloud based secure storage of files using hybrid cryptography and image steganography (IJRTE). Int. J. Recent Technol. Eng. 8(6) (2020)
Shivam, S., Singla, K., Rathee, G., Saini, H.: A hybrid cryptographic technique for file storage mechanism over cloud. In: First International Conference on Sustainable Technologies for Computational Intelligence, pp. 241–256. Springer, Singapore (2020)
Chaudhary, S., Foram S., Joshi, N.K.: Comparative study between cryptographic and hybrid techniques for implementation of security in cloud computing. In: Performance Management of Integrated Systems and its Applications in Software Engineering, pp. 127–135. Springer, Singapore (2020)
Murad, S.H., Gody, A.M., Barakat, T.M.: Enhanced Security of Symmetric Encryption Using Combination of Steganography with Visual Cryptography. arXiv pre-print arXiv: 1902.11167 (2019)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Murad, S.H., Rahouma, K.H. (2021). Hybrid Cryptographic Approach to Safeguard Cloud Computing Services: A Survey. In: Hassanien, AE., Chang, KC., Mincong, T. (eds) Advanced Machine Learning Technologies and Applications. AMLTA 2021. Advances in Intelligent Systems and Computing, vol 1339. Springer, Cham. https://doi.org/10.1007/978-3-030-69717-4_72
Download citation
DOI: https://doi.org/10.1007/978-3-030-69717-4_72
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-69716-7
Online ISBN: 978-3-030-69717-4
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)