Research Article
File Storage Security in Cloud Computing Using Hybrid Encryption
Chidi Ukamaka Betrand*,
Chinwe Gilean Onukwugha,
Mercy Eberechi Benson-Emenike,
Christopher ifeanyi Ofoegbu,
Nneka Martina Awaji
Issue:
Volume 12, Issue 1, April 2024
Pages:
1-9
Received:
16 December 2023
Accepted:
28 December 2023
Published:
11 January 2024
Abstract: Cloud is used in various fields for storage of big data with the major challenge regarding this storage being security. Existing conventional encryption systems can be vulnerable to brute-force attacks. The goal of this project was to develop a hybrid encryption scheme that will only allow authorized users to access and download files stored online, thus enhancing file storage security in the cloud. Rapid Application Development (RAD) methodology was used to create the proposed system, allowing for modifications to be made to the system as it was being developed. The hybrid encryption scheme employs both symmetric and asymmetric encryption. The AES (Advanced Encryption Standard) algorithm and RSA (Rivest–Shamir–Adleman) algorithm were combined to develop the proposed hybrid encryption system. PHP, JavaScript and Laravel were the programming languages and web framework used to implement the system. The proposed system was tested and evaluated by users. The experimental results show that the proposed hybrid encryption scheme was fast and provided a high level of security but had some drawbacks which include increase in file size after it was encrypted and inability to sort files in the web app. Overall, the proposed system enhances confidentiality and data protection in cloud environments, guarding against potential breaches and unauthorized access.
Abstract: Cloud is used in various fields for storage of big data with the major challenge regarding this storage being security. Existing conventional encryption systems can be vulnerable to brute-force attacks. The goal of this project was to develop a hybrid encryption scheme that will only allow authorized users to access and download files stored online...
Show More
Review Article
The Current Status and Challenges of Cybersecurity Risks
Xudong Sun*
Issue:
Volume 12, Issue 1, March 2024
Pages:
10-16
Received:
28 May 2024
Accepted:
18 June 2024
Published:
4 July 2024
Abstract: Research Context and Aims: The swift expansion of internet technologies has rendered the digital network essential to contemporary life, highlighting the significance of cybersecurity. Network data not only encompasses personal information management and communication but also pertains to the protection of confidential corporate, governmental, and vital national infrastructures. Consequently, cybersecurity has become a critical issue in current society. Frequent occurrences like privacy violations, data thefts, and national security threats underline the critical need for enhanced network defenses and protective measures. Research Approach: This study examines the state of cybersecurity by assessing pertinent studies across public databases such as PubMed, CNKI, and CrossRef. It compiles and evaluates significant cybersecurity events including data breaches, malware attacks, and phishing, outlining key security challenges faced by networks. The paper also evaluates the current cybersecurity technologies and methods, pinpointing their effectiveness and limitations in addressing network threats. Research Findings: The findings reveal that cyber attackers have refined their methods, employing sophisticated, covert techniques for prolonged periods, which often outpace current defenses. In cases of data breaches, perpetrators frequently utilize precise social engineering or deploy advanced persistent threats (APTs). Additionally, the proliferation of IoT technology has not only obscured the boundaries of cybersecurity but also broadened potential attack vectors. Despite the implementation of security measures like encryption and multi-factor authentication, these can be compromised by managerial or operational oversights. Research Conclusions: With the cybersecurity landscape becoming increasingly challenging, future defenses will likely prioritize the adoption of integrated, proactive strategies. It is crucial to foster the development of smart security solutions, such as leveraging artificial intelligence to detect and respond to anomalies. Furthermore, boosting security awareness among users and ensuring standardized practices are imperative. Ultimately, formulating future cybersecurity policies will require a holistic approach, integrating technological, managerial, legal, and educational initiatives to forge a robust network defense architecture.
Abstract: Research Context and Aims: The swift expansion of internet technologies has rendered the digital network essential to contemporary life, highlighting the significance of cybersecurity. Network data not only encompasses personal information management and communication but also pertains to the protection of confidential corporate, governmental, and ...
Show More