Cloud Data Security and privacy based on AES and SHA hash -256 Based Technique
Authors: Poonam Singh rajput , Deepak Mishra
Certificate: View Certificate
Abstract
Cloud data security and privacy are crucial concerns for individuals and organizations as they entrust their sensitive data to third-party cloud service providers. Encryption is one of the commonly used techniques for ensuring cloud data security, and Advanced Encryption Standard (AES) and Secure Hash Algorithm (SHA) are widely used cryptographic algorithms for securing cloud data. AES is a symmetric-key block cipher encryption algorithm that provides a high level of security. It works by transforming plaintext into ciphertext using a symmetric key, making it unreadable to anyone without the key. On the other hand, SHA-256 is a hashing algorithm that generates a unique 256-bit hash value for a given input. This hash value can be used to verify the integrity of the data and ensure that it has not been tampered with. This paper presents a simulation-based study of cloud data security and privacy based on AES and SHA-256 techniques. The simulation is done in NetBeans, an integrated development environment (IDE) that allows developers to write, compile, and test code. The simulation involves writing a program to encrypt data using AES and generate a SHA-256 hash value for the encrypted data. The effectiveness of the AES and SHA-256-based technique in securing cloud data is evaluated based on several parameters, such as encryption and decryption time, throughput, and the quality of the generated hash value. The simulation results show that the AES and SHA-256-based technique provides a high level of security and is efficient in securing cloud data
Introduction
The term "cloud computing" refers to a type of utility computing that uses an unlimited number of virtualized resources to build a custom infrastructure or platform that can be used to run applications or full parts of services on a pay-per-use basis. Cloud computing has made the traditional way of putting systems in place obsolete. Advanced system implementations can be hidden from the end user by using virtualization techniques. When resources are virtualized, it makes it seem like the system can grow and be used everywhere [1,2]. Cloud computing makes the long-held dream of utility computing a reality by using a pay-as-you-go pricing model and systems that can be expanded indefinitely and are available everywhere. Developers who have new ideas for new Internet services don't have to spend a lot of money to put up the hardware and software they need. Computing in the cloud refers to all of the applications that are offered as a service over the internet, as well as the hardware infrastructure and platform on which these applications are built. Formally, the hardware infrastructure is called a "data centre," and it includes a wide range of physical devices, from personal computers all the way up to high-end server machines
Conclusion
The purpose of this work is to ensure the secure sharing of sensitive data on public cloud platforms. To achieve this, the AES algorithm is used to encrypt the data before it is uploaded to the cloud environment. Additionally, the key escrow and revocation problem is addressed by this scheme. The Netbeans simulator is utilized to create a cloud environment for testing and implementation. Before uploading important data to the cloud, it is encrypted for protection. To further enhance security, the Private Key generated on the cloud is encrypted using the SHA algorithm before being stored alongside the encrypted data on the cloud. To decrypt the data, the user must first authenticate them on the cloud platform. Once authenticated, the key is compared to the hash code, and if they match, the data can be successfully decrypted. This ensures that sensitive data can be securely shared on public cloud platforms.
Copyright
Copyright © 2025 Poonam Singh rajput , Deepak Mishra . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.