R&D: Triple Phase Hybrid Security Model for Cloud Storage Using Advanced Encryption Standard
Results demonstrate that proposed security model able to protect data stored in cloud from threats such as unauthorized access, data manipulation and data leakage.
This is a Press Release edited by StorageNewsletter.com on December 5, 2023 at 2:00 pmAfrican Journal of Advances in Science and Technology Research has published an article written by Tashara Solomon, Yusuf Musa Malgwi, Molta Danlami Eli, and Carroll Sermeje Pius, Modibbo Adama University, Yola, Nigeria.
Abstract: “Cloud storage is an integral part of modern computing; however, the associated data security concerns have hindered its widespread adoption. This paper proposes a triple-phase hybrid security model for cloud storage using Advanced Encryption Standard (AES) that can address these security concerns. In the first phase, the AES algorithm is used to encrypt the data using a shared key between the user and the cloud server. In the second phase, a data integrity verification algorithm is applied to guarantee that the data being stored in the cloud are not tampered with. Lastly, a transmission security layer is employed to protect data transmissions between the user and the cloud server. The data is encrypted using AES during the encryption process using a 16-bit key. The encrypted data is inserted into a cover image during the steganography stage. The data is once more encrypted using AES and stored in the cloud during the hybrid phase. The effectiveness of the suggested model was assessed using a variety of security measures. The proposed triple-phase hybrid security model is evaluated in an extensive security experiment. The results demonstrate that the proposed security model is able to effectively protect data stored in the cloud from threats such as unauthorized access, data manipulation and data leakage. Furthermore, the proposed model is also able to effectively minimize the transmission overhead and reduce the total computational cost required for data encryption and decryption.“