Advancing Cloud Image Security via AES Algorithm Enhancement Techniques


  • Zahraa A. Mohammed Department of Computer Science, College of Science for Women, University of Babylon, Iraq
  • Hadeel Qasem Gheni Department of Computer Science, College of Science for Women, University of Babylon, Iraq
  • Zahraa Jabbar Hussein Department of Computer Science, College of Science for Women, University of Babylon, Iraq
  • Ali Kadhum M. Al-Qurabat Department of Cyber Security, College of Science, Al-Mustaqbal University, Iraq
Volume: 14 | Issue: 1 | Pages: 12694-12701 | February 2024 |


Communication system and internet dominance in our society, has made image security a matter of paramount concern. Cryptography involves encrypting data to protect information exchange between senders and receivers, establishing a foundation for secure communication. The Advanced Encryption Standard (AES) is an exceptional algorithm that plays a pivotal role in this area because of its ability to consistently transform plain data into cipher data using the same encryption key. This algorithm engages intricate encryption techniques, harnessing a variety of algorithms and transformations to ensure robust data security. This study introduces an image encryption technique to comprehensively address security requirements. The proposed method uses the AES algorithm to provide high reliability and unparalleled safety, effectively protecting precious images against any form of malicious attack. The sender's image is intelligently fragmented into multiple pieces to maximize data confidentiality, employing a sophisticated algorithm. Upon decryption by the intended recipient, these fragments seamlessly merge to reconstruct the original image. The suggested technique allows users to securely store their data in the cloud, mitigating concerns related to potential data leakage, damage, or corruption. Thus, by integrating a cloud-based storage system, and utilizing digital signatures through OpenSSL, this method guarantees airtight security and reliability for sensitive data.


cloud computing, cryptography, encryption, decryption, AES algorithm, digital signature, openSSL


Download data is not yet available.


F. Thabit, O. Can, A. O. Aljahdali, G. H. Al-Gaphari, and H. A. Alkhzaimi, "Cryptography Algorithms for Enhancing IoT Security," Internet of Things, vol. 22, Jul. 2023, Art. no. 100759.

A. A. Pujari and S. S. Shinde, "Data Security using Cryptography and Steganography," IOSR Journal of Computer Engineering, vol. 18, no. 04, pp. 130–139, Apr. 2016.

K. D. Abel, S. Misra, A. Agrawal, R. Maskeliunas, and R. Damasevicius, "Data Security Using Cryptography and Steganography Technique on the Cloud," in Computational Intelligence in Machine Learning, Singapore, 2022, pp. 475–481.

M. E. Saleh, A. A. Aly, and F. A. Omara, "Data Security Using Cryptography and Steganography Techniques," International Journal of Advanced Computer Science and Applications, vol. 7, no. 6, 2016.

A. O. Aljahdali, F. Thabit, H. Aldissi, and W. Nagro, "Dynamic Keystroke Technique for a Secure Authentication System based on Deep Belief Nets," Engineering, Technology & Applied Science Research, vol. 13, no. 3, pp. 10906–10915, Jun. 2023.

Z. Yan, R. H. Deng, and V. Varadharajan, "Cryptography and data security in cloud computing," Information Sciences, vol. 387, pp. 53–55, May 2017.

V. Agrahari, "Data security in cloud computing using cryptography algorithms," International Journal of Scientific Development and Research (IJSDR), vol. 5, no. 9, pp. 258–260, 2020.

F. Thabit, A. S. Alhomdy, A. H. A. Al-Ahdal, and D. S. Jagtap, "Exploration of Security Challenges in Cloud Computing: Issues," Journal of Information and Computational Science, vol. 10, no. 12, pp. 35–57, 2020.

F. Thabit, S. Alhomdy, and S. Jagtap, "Security analysis and performance evaluation of a new lightweight cryptographic algorithm for cloud computing," Global Transitions Proceedings, vol. 2, no. 1, pp. 100–110, Jun. 2021.

F. Thabit, S. Alhomdy, and S. Jagtap, "A new data security algorithm for the cloud computing based on genetics techniques and logical-mathematical functions," International Journal of Intelligent Networks, vol. 2, pp. 18–33, Jan. 2021.

F. Thabit, O. Can, R. U. Z. Wani, M. A. Qasem, S. B. Thorat, and H. A. Alkhzaimi, "Data security techniques in cloud computing based on machine learning algorithms and cryptographic algorithms: Lightweight algorithms and genetics algorithms," Concurrency and Computation: Practice and Experience, vol. 35, no. 21, 2023, Art. no. e7691.

O. Can, F. Thabit, A. O. Aljahdali, S. Al-Homdy, and H. A. Alkhzaimi, "A Comprehensive Literature of Genetics Cryptographic Algorithms for Data Security in Cloud Computing," Cybernetics and Systems, 2023.

E. S. I. Harba, "Secure Data Encryption Through a Combination of AES, RSA and HMAC," Engineering, Technology & Applied Science Research, vol. 7, no. 4, pp. 1781–1785, Aug. 2017.

A. H. Al-Omari, "Lightweight Dynamic Crypto Algorithm for Next Internet Generation," Engineering, Technology & Applied Science Research, vol. 9, no. 3, pp. 4203–4208, Jun. 2019.

G. S. Mahmood, D. J. Huang, and B. A. Jaleel, "Achieving an Effective, Confidentiality and Integrity of Data in Cloud Computing," nternational Journal of Network Security, vol. 21, no. 2, pp. 326–332.

S. M. Chavanv and S. C. Tamane, "Comparison of symmetric and asymmetric algorithms for cloud storage security," International Journal of Advanced Science and Technology, vol. 29, no. 3, pp. 785–91, 2020.

B. Seth et al., "Secure Cloud Data Storage System using Hybrid Paillier-Blowfish Algorithm," Computers, Materials & Continua, vol. 67, no. 1, pp. 779–798, 2021.

K. El Makkaoui, A. Beni-Hssane, A. Ezzati, and A. El-Ansari, "Fast Cloud-RSA Scheme for Promoting Data Confidentiality in the Cloud Computing," Procedia Computer Science, vol. 113, pp. 33–40, Jan. 2017.

E. Elgeldawi, M. Mahrous, and A. Sayed, "A Comparative Analysis of Symmetric Algorithms in Cloud Computing: A Survey," International Journal of Computer Applications, vol. 182, no. 48, pp. 7–16, Apr. 2019.

A. El-Yahyaoui and M. D. Ech-Chrif El Kettani, "A verifiable fully homomorphic encryption scheme to secure big data in cloud computing," in 2017 International Conference on Wireless Networks and Mobile Communications (WINCOM), Rabat, Morocco, Aug. 2017, pp. 1–5.

A. El-Yahyaoui and M. D. Ech-Cherif El Kettani, "A Verifiable Fully Homomorphic Encryption Scheme for Cloud Computing Security," Technologies, vol. 7, no. 1, Mar. 2019, Art. no. 21.

V. Keer, S. I. Ali, and P. N. Sharma, "Hybrid Approach of Cryptographic Algorithms in Cloud Computing," International Journal of Emerging Technology and Advanced Engineering, vol. 6, no. 7, pp. 87–90, 2016.

M. Louk and H. Lim, "Homomorphic encryption in mobile multi cloud computing," in 2015 International Conference on Information Networking (ICOIN), Cambodia, Jan. 2015, pp. 493–497.

S. Bajpai and P. Srivastava, "A fully homomorphic encryption Implementation on cloud computing," International Journal of Information & Computation Technology, vol. 4, no. 8, pp. 811–816, 2014.


How to Cite

Z. A. Mohammed, H. Q. Gheni, Z. J. Hussein, and A. K. M. Al-Qurabat, “Advancing Cloud Image Security via AES Algorithm Enhancement Techniques”, Eng. Technol. Appl. Sci. Res., vol. 14, no. 1, pp. 12694–12701, Feb. 2024.


Abstract Views: 87
PDF Downloads: 65

Metrics Information