Advancing Cloud Image Security via AES Algorithm Enhancement Techniques
Received: 7 November 2023 | Revised: 23 November 2023 | Accepted: 20 December 2023 | Online: 8 February 2024
Corresponding author: Zahraa A. Mohammed
Abstract
Communication system and internet dominance in our society, has made image security a matter of paramount concern. Cryptography involves encrypting data to protect information exchange between senders and receivers, establishing a foundation for secure communication. The Advanced Encryption Standard (AES) is an exceptional algorithm that plays a pivotal role in this area because of its ability to consistently transform plain data into cipher data using the same encryption key. This algorithm engages intricate encryption techniques, harnessing a variety of algorithms and transformations to ensure robust data security. This study introduces an image encryption technique to comprehensively address security requirements. The proposed method uses the AES algorithm to provide high reliability and unparalleled safety, effectively protecting precious images against any form of malicious attack. The sender's image is intelligently fragmented into multiple pieces to maximize data confidentiality, employing a sophisticated algorithm. Upon decryption by the intended recipient, these fragments seamlessly merge to reconstruct the original image. The suggested technique allows users to securely store their data in the cloud, mitigating concerns related to potential data leakage, damage, or corruption. Thus, by integrating a cloud-based storage system, and utilizing digital signatures through OpenSSL, this method guarantees airtight security and reliability for sensitive data.
Keywords:
cloud computing, cryptography, encryption, decryption, AES algorithm, digital signature, openSSLDownloads
References
F. Thabit, O. Can, A. O. Aljahdali, G. H. Al-Gaphari, and H. A. Alkhzaimi, "Cryptography Algorithms for Enhancing IoT Security," Internet of Things, vol. 22, Jul. 2023, Art. no. 100759.
A. A. Pujari and S. S. Shinde, "Data Security using Cryptography and Steganography," IOSR Journal of Computer Engineering, vol. 18, no. 04, pp. 130–139, Apr. 2016.
K. D. Abel, S. Misra, A. Agrawal, R. Maskeliunas, and R. Damasevicius, "Data Security Using Cryptography and Steganography Technique on the Cloud," in Computational Intelligence in Machine Learning, Singapore, 2022, pp. 475–481.
M. E. Saleh, A. A. Aly, and F. A. Omara, "Data Security Using Cryptography and Steganography Techniques," International Journal of Advanced Computer Science and Applications, vol. 7, no. 6, 2016.
A. O. Aljahdali, F. Thabit, H. Aldissi, and W. Nagro, "Dynamic Keystroke Technique for a Secure Authentication System based on Deep Belief Nets," Engineering, Technology & Applied Science Research, vol. 13, no. 3, pp. 10906–10915, Jun. 2023.
Z. Yan, R. H. Deng, and V. Varadharajan, "Cryptography and data security in cloud computing," Information Sciences, vol. 387, pp. 53–55, May 2017.
V. Agrahari, "Data security in cloud computing using cryptography algorithms," International Journal of Scientific Development and Research (IJSDR), vol. 5, no. 9, pp. 258–260, 2020.
F. Thabit, A. S. Alhomdy, A. H. A. Al-Ahdal, and D. S. Jagtap, "Exploration of Security Challenges in Cloud Computing: Issues," Journal of Information and Computational Science, vol. 10, no. 12, pp. 35–57, 2020.
F. Thabit, S. Alhomdy, and S. Jagtap, "Security analysis and performance evaluation of a new lightweight cryptographic algorithm for cloud computing," Global Transitions Proceedings, vol. 2, no. 1, pp. 100–110, Jun. 2021.
F. Thabit, S. Alhomdy, and S. Jagtap, "A new data security algorithm for the cloud computing based on genetics techniques and logical-mathematical functions," International Journal of Intelligent Networks, vol. 2, pp. 18–33, Jan. 2021.
F. Thabit, O. Can, R. U. Z. Wani, M. A. Qasem, S. B. Thorat, and H. A. Alkhzaimi, "Data security techniques in cloud computing based on machine learning algorithms and cryptographic algorithms: Lightweight algorithms and genetics algorithms," Concurrency and Computation: Practice and Experience, vol. 35, no. 21, 2023, Art. no. e7691.
O. Can, F. Thabit, A. O. Aljahdali, S. Al-Homdy, and H. A. Alkhzaimi, "A Comprehensive Literature of Genetics Cryptographic Algorithms for Data Security in Cloud Computing," Cybernetics and Systems, 2023.
E. S. I. Harba, "Secure Data Encryption Through a Combination of AES, RSA and HMAC," Engineering, Technology & Applied Science Research, vol. 7, no. 4, pp. 1781–1785, Aug. 2017.
A. H. Al-Omari, "Lightweight Dynamic Crypto Algorithm for Next Internet Generation," Engineering, Technology & Applied Science Research, vol. 9, no. 3, pp. 4203–4208, Jun. 2019.
G. S. Mahmood, D. J. Huang, and B. A. Jaleel, "Achieving an Effective, Confidentiality and Integrity of Data in Cloud Computing," nternational Journal of Network Security, vol. 21, no. 2, pp. 326–332.
S. M. Chavanv and S. C. Tamane, "Comparison of symmetric and asymmetric algorithms for cloud storage security," International Journal of Advanced Science and Technology, vol. 29, no. 3, pp. 785–91, 2020.
B. Seth et al., "Secure Cloud Data Storage System using Hybrid Paillier-Blowfish Algorithm," Computers, Materials & Continua, vol. 67, no. 1, pp. 779–798, 2021.
K. El Makkaoui, A. Beni-Hssane, A. Ezzati, and A. El-Ansari, "Fast Cloud-RSA Scheme for Promoting Data Confidentiality in the Cloud Computing," Procedia Computer Science, vol. 113, pp. 33–40, Jan. 2017.
E. Elgeldawi, M. Mahrous, and A. Sayed, "A Comparative Analysis of Symmetric Algorithms in Cloud Computing: A Survey," International Journal of Computer Applications, vol. 182, no. 48, pp. 7–16, Apr. 2019.
A. El-Yahyaoui and M. D. Ech-Chrif El Kettani, "A verifiable fully homomorphic encryption scheme to secure big data in cloud computing," in 2017 International Conference on Wireless Networks and Mobile Communications (WINCOM), Rabat, Morocco, Aug. 2017, pp. 1–5.
A. El-Yahyaoui and M. D. Ech-Cherif El Kettani, "A Verifiable Fully Homomorphic Encryption Scheme for Cloud Computing Security," Technologies, vol. 7, no. 1, Mar. 2019, Art. no. 21.
V. Keer, S. I. Ali, and P. N. Sharma, "Hybrid Approach of Cryptographic Algorithms in Cloud Computing," International Journal of Emerging Technology and Advanced Engineering, vol. 6, no. 7, pp. 87–90, 2016.
M. Louk and H. Lim, "Homomorphic encryption in mobile multi cloud computing," in 2015 International Conference on Information Networking (ICOIN), Cambodia, Jan. 2015, pp. 493–497.
S. Bajpai and P. Srivastava, "A fully homomorphic encryption Implementation on cloud computing," International Journal of Information & Computation Technology, vol. 4, no. 8, pp. 811–816, 2014.
Downloads
How to Cite
License
Copyright (c) 2023 Zahraa A. Mohammed, Hadeel Qasem Gheni, Zahraa Jabbar Hussein, Ali Kadhum M. Al-Qurabat
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.