Paper Title

Securing File Storage on the Cloud using Hybrid Cryptography

Article Type

Research Article

Publication Info

Volume: 9 | Issue: 5 | Pages: f592-f647

Published On

May, 2022

Downloads

Abstract

File security is all about safeguarding your business-critical information from prying eyes by implementing stringent access control measures and flawless permission hygiene. Apart from enabling and monitoring security access controls, decluttering data storage also plays an important role in securing files. Stored files are encrypted with individual record-level, AES- 256 encryption keys generated locally, at the device level. Simply drag and drop files into the Web Vault or Desktop App. On iOS and Android, you can load content from the local device. Cloud storage helps businesses with major data storage needs to save a significant amount of space and money by eliminating the need for data storage infrastructure on the business premises. The cloud storage provider owns and maintains all the necessary hardware and software so the cloud users don't have to. Cloud storage security issues are still common, exposing enterprise data to unauthorized parties. This could potentially lead to angry customers, furious business partners, costly lawsuits and other headaches. Encryption is suggested as a better solution to secure information. Before storing data in cloud server it is better Data Owner can give permission to particular group member such that data can be easily accessed Heterogeneous data centric security is to be used to provide data access cont rol A data security comprises of authentication, data encryption and data integrity, data recovery, user protection has to be designed toimprove the data security over cloud. To ensure privacy and data security data protection can be used as a service. An advantage of hybrid encryption schemes is that a plaintext can be any bit string of any length. Another advantage is that it is sometimes easier to construct secure hybrid encryption schemes than the direct construction of public-key encryption schemes. As the first example, consider the ElGamal encryption scheme. In cryptography, a hybrid cryptosystem is one which combines the convenience of a public-key cryptosystem with the efficiency of a symmetric-key cryptosystem. Public-key cryptosystems are convenient in that they do not require the sender and receiver to share a common secret in order to communicate securely.

View more »