2022
DOI: 10.33093/jiwe.2022.1.2.1
|View full text |Cite
|
Sign up to set email alerts
|

Secure File Storage On Cloud Using Hybrid Cryptography

Abstract: As technology today is moving forward exponentially, data exchange over the Internet has become a daily routine. Furthermore, businesses are growing internationally and offices are being established in a variety of different places throughout the world. This has resulted in the necessity to make data accessible and practical from any place. As a result, information sent via an may lead to critical security problems involving the breach of secrecy, authentication, and data integrity. This paper introduces a clo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 9 publications
0
4
0
Order By: Relevance
“…Finally due to restricting our work mainly in the symmetric key domain, our search efficiency is theorized to perform faster than the prototype by Lai and Heng, 2022 [34] which utilizes asymmetric key cryptography, but it would be interesting to see a side-by-side comparison. Another avenue of research is to see if the same leakage attacks that we study will work on their prototype and if not, how effective are the defenses.…”
Section: Discussionmentioning
confidence: 99%
“…Finally due to restricting our work mainly in the symmetric key domain, our search efficiency is theorized to perform faster than the prototype by Lai and Heng, 2022 [34] which utilizes asymmetric key cryptography, but it would be interesting to see a side-by-side comparison. Another avenue of research is to see if the same leakage attacks that we study will work on their prototype and if not, how effective are the defenses.…”
Section: Discussionmentioning
confidence: 99%
“…We deliver a symmetric key along with the encrypted data. Once we receive the data, we can use a private key to decipher the symmetric key and decrypt the actual data [95]. The fundamental procedures of hybrid encryption are visually depicted in Figure 5, and Table 8 offers a thorough summary of the various types of hybrid cryptography, allowing for comparative analysis.…”
Section: Hybrid Cryptographymentioning
confidence: 99%
“…This method used the benefits of symmetric and asymmetric key cryptographic approaches to achieve optimal performance. Jian-Foo and Swee-Huay [15] developed, a method to be decentralized. It uses the AES and RSA algorithms to provide a framework that prohibits unauthorized entities from gaining access to the data or messages of users.…”
Section: Introductionmentioning
confidence: 99%