Mobile Application Design for Protecting the Data in Cloud Using Enhanced Technique of Encryption

  • Authors

    • Sakinah Ali Pitchay
    • Wail Abdo Ali Alhiagem
    • Farida Ridzuan
    • Sundresan Perumal
    2018-10-07
    https://doi.org/10.14419/ijet.v7i4.15.21427
  • Big Data Security, Cloud Computing, Encryption, MD5 Hashing.
  • This paper provides an enhanced technique for improving the security and protecting the privacy of the cloud computing users by encrypting the data before it reached to server’s storage. Encrypting means the process of converting information or data into unreadable language to prevent unauthorized access. This paper will propose a mobile application design, which will allow the user to encrypt and decrypt the data hence maintaining security and privacy. In the proposed system design, the AES Algorithm will handle the encryption of the data using a keyword which will be defined by the user during the creation of the account. The encryption keyword will be hashed by the system using MD5 Algorithm. The keys will remain in encrypted form, while they are on the server side. Both encrypted data, encryption and decryption keys will be saved on the server in secured form. The idea behind hashing the encryption keys is to protect the keys while they are stored on the server, therefore, any unauthorized access to the server will gain no advantages since every bit of data on the server is encrypted including the private keys. The proposed system design will participate by improving the security and privacy of the users by giving them the capability to encrypt and decrypt data in enhanced way using AES as a data encryption method and MD5 hash algorithm for encrypting the encryption keys.

     

     

  • References

    1. [1] Taylor, C. (2017). Cloud Computing and Service Level Agreements (SLAs), http://www.datamation.com/cloud-computing/service-level-agreements.html.

      [2] Sailaja, K. & Usharani, M. (2015). Cloud computing security issues, challenges and its solutions in financial sectors. International Journal of Advanced Scientific Technologies, Engineering and Management Sciences, 3(1), 190-196.

      [3] Yao, G., Li, Y., Lei, L., Wang, H., & Lin, C. (2016). An efficient dynamic provable data possession scheme in cloud storage. In X. Huang, Y. Xiang, & K. C. Li (Eds.), Green, Pervasive, and Cloud Computing. Cham: Springer, pp. 63-81.

      [4] Keerthana, G., Prabu, S., & Swarnalatha, P. (2016). An efficient data security in cloud computing using cryptography. International Journal of Advanced Research in Computer Science and Software Engineering, 6(5), 654-660.

      [5] Panchenko, A. (2016). Industry perspectives, nine main challenges in big data security, http://www.datacenterknowledge.com/archives/2016/01/19/nine-main-challenges-big-data-security/.

      [6] Olalekan, I., & Kayode, A. (2015). Security and reliability issues in the deployment of cloud computing system. Arabian Journal of Business and Management Review, 5(2), 1-8.

      [7] Sen, M., & Choudhury, S. S (2017). Security and privacy issues for cloud computing and its challenges. Review of Computer Engineering Studies, 4(2), 62–66.

      [8] Aldossary, S., & Allen, W. (2016). Data security, privacy, availability and integrity in cloud computing: Issues and current solutions. International Journal of Advanced Computer Science and Applications, 7(4), 485-498.

      [9] Pancholi, V. R., & Patel, B. P. (2016). Enhancement of cloud computing security with secure data storage using AES. International Journal for Innovative Research in Science and Technology, 2(9), 18-21.

      [10] Wagh, G., Guran, S., Vira, S, Dung, M., & Chaugule, A. (2017). Securing user’s data on cloud using AES. International Journal on Recent and Innovation Trends in Computing and Communication, 5(2), 17–20.

      [11] Pitchay, S. A., Alhiagem, W. A. A., Ridzuan, F., & Saudi, M. M. (2015). A proposed system concept on enhancing the encryption and decryption method for cloud computing. Proceedings of the IEEE 17th UKSim-AMSS International Conference on Modelling and Simulation, pp. 201-205.

      [12] Chauhan, A., & Gupta, J. (2016). Review on encrypt the text by MD5 and RSA in client cloud approach. International Journal of Advance Research, Ideas and Innovations in Technology, 2, 1-7.

      [13] Jaglan, V. (2015). Proposing efficient approach to improve integrity checking in cloud data security. International Journal of Recent Research Aspects, 2(3), 125-129.

      [14] Kartit, Z., & El Marraki, M. (2015). Applying encryption algorithm to enhance data security in cloud storage. Engineering Letters, 23(4), 1-6.

      [15] Jacob, N. M. (2016). Vulnerability of data security using MD5 function in PHP database design. International Journal of Science and Engineering, 1(1), 11-15.

      [16] Pandey T. (2016). A secure data transmission over the cloud computing: using salted MD5. International Journal of Innovative Research in Computer and Communication Engineering, 4(2), 1-6.

      [17] Nicholas, K., Wilson, C., Kibe, A. (2017). Enhancing trust in cloud computing using MD5 hashing algorithm and RSA encryption standard. International Journal of Scientific and Engineering Research, 8(3), 550-566.

      [18] Gul, F, Amin, A, & Ahsraf, S. (2017). Enhancement of cloud computing security with secure data storage using AES. International Journal of Computer Science and Mobile Computing, 6(7), 27-32.

  • Downloads

  • How to Cite

    Ali Pitchay, S., Abdo Ali Alhiagem, W., Ridzuan, F., & Perumal, S. (2018). Mobile Application Design for Protecting the Data in Cloud Using Enhanced Technique of Encryption. International Journal of Engineering & Technology, 7(4.15), 98-102. https://doi.org/10.14419/ijet.v7i4.15.21427