Data Security in Cloud Storage using Advanced Encryption Standard 256

Because of cloud computing, more people can easily access data from afar, scalable services are available and this helps in education, healthcare, industry and defense. Even so, having these tools creates serious security challenges. Because data can be accessed from many platforms and devices today...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:2025 3rd International Conference on Self Sustainable Artificial Intelligence Systems (ICSSAS) s. 1896 - 1902
Hlavní autoři: Bharadwaj, S., Navaroj, G. Indra
Médium: Konferenční příspěvek
Jazyk:angličtina
Vydáno: IEEE 11.06.2025
Témata:
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Popis
Shrnutí:Because of cloud computing, more people can easily access data from afar, scalable services are available and this helps in education, healthcare, industry and defense. Even so, having these tools creates serious security challenges. Because data can be accessed from many platforms and devices today, keeping it safe and secure from unauthorized users is a significant problem. More and more use of cloud services raises the chance of sensitive information being hacked, stolen or tampered with. So, we propose a hybrid method by combining symmetric key cryptography and strongly highlighting AES-256 which is considered one of the most reliable and broadly used encryption algorithms in the world today. The data used in our proposed solution is encrypted with AES-256 before being moved to the cloud. As a result, the safety of your data is not affected even if there is an attack on cloud storage. Managing encryption keys is an innovative approach our system uses. The design of the system is such that key details are not all kept in one place, but instead are broken down into file segment data, algorithm metadata and the encryption key itself. Split components are stored or delivered via different channels, so attackers need to piece them together before attempting to crack the code and see the original data. The results from experimental use have confirmed that the proposed approach is effective and efficient. It performed significantly better than the traditional method SHA-1 by managing data with an accuracy of 98%. The rating for system vulnerability was 'very low' as a result of using frequently rotated, split keys and the system's solid resistance to brute-and collision attacks. Also, AES-256 demonstrated good speed and memory efficiency, especially if hardware acceleration and parallel processing were turned on. By using encryption, large amounts of data were managed quickly and used minimum memory, so the system remained effective and rapid in real-time use. On the whole, the hybrid approach uses reliable encryption, together with strategic key management, to secure cloud-stored information adequately. It guarantees powerful security as well as outstanding performance and flexibility, making it well suited for today's cloud architectures.
DOI:10.1109/ICSSAS66150.2025.11081033