Data Security in Cloud Storage using Advanced Encryption Standard 256

Because of cloud computing, more people can easily access data from afar, scalable services are available and this helps in education, healthcare, industry and defense. Even so, having these tools creates serious security challenges. Because data can be accessed from many platforms and devices today...

Full description

Saved in:
Bibliographic Details
Published in:2025 3rd International Conference on Self Sustainable Artificial Intelligence Systems (ICSSAS) pp. 1896 - 1902
Main Authors: Bharadwaj, S., Navaroj, G. Indra
Format: Conference Proceeding
Language:English
Published: IEEE 11.06.2025
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Because of cloud computing, more people can easily access data from afar, scalable services are available and this helps in education, healthcare, industry and defense. Even so, having these tools creates serious security challenges. Because data can be accessed from many platforms and devices today, keeping it safe and secure from unauthorized users is a significant problem. More and more use of cloud services raises the chance of sensitive information being hacked, stolen or tampered with. So, we propose a hybrid method by combining symmetric key cryptography and strongly highlighting AES-256 which is considered one of the most reliable and broadly used encryption algorithms in the world today. The data used in our proposed solution is encrypted with AES-256 before being moved to the cloud. As a result, the safety of your data is not affected even if there is an attack on cloud storage. Managing encryption keys is an innovative approach our system uses. The design of the system is such that key details are not all kept in one place, but instead are broken down into file segment data, algorithm metadata and the encryption key itself. Split components are stored or delivered via different channels, so attackers need to piece them together before attempting to crack the code and see the original data. The results from experimental use have confirmed that the proposed approach is effective and efficient. It performed significantly better than the traditional method SHA-1 by managing data with an accuracy of 98%. The rating for system vulnerability was 'very low' as a result of using frequently rotated, split keys and the system's solid resistance to brute-and collision attacks. Also, AES-256 demonstrated good speed and memory efficiency, especially if hardware acceleration and parallel processing were turned on. By using encryption, large amounts of data were managed quickly and used minimum memory, so the system remained effective and rapid in real-time use. On the whole, the hybrid approach uses reliable encryption, together with strategic key management, to secure cloud-stored information adequately. It guarantees powerful security as well as outstanding performance and flexibility, making it well suited for today's cloud architectures.
DOI:10.1109/ICSSAS66150.2025.11081033