info@ijrretas.com
+91 77710 84928 Support
ijrretas LogoIJRRETAS
  • About
    • About The Journal
    • Aim & Scope
    • Privacy Statement
    • Journal Policies
    • Disclaimer
    • Abstracting and Indexing
    • FAQ
  • Current
  • Archive
  • For Author
    • Submit Paper Online
    • Article Processing Charges
    • Submission Guidelines
    • Manuscript Types
    • Download Article Template
    • Download Copyright Form
  • Editorial Board
    • Editorial Board
    • Editors Responsibilities
  • Conference
  • Contact
  • Pay Online
  • Submit Paper

Recent Papers

Dedicated to advancing knowledge through rigorous research and scholarly publication

  1. Home
  2. Recent Papers

Cloud Data Security and privacy based on AES and SHA hash -256 Based Technique

Authors: Poonam Singh rajput , Deepak Mishra

Certificate: View Certificate

Abstract

Cloud data security and privacy are crucial concerns for individuals and organizations as they entrust their sensitive data to third-party cloud service providers. Encryption is one of the commonly used techniques for ensuring cloud data security, and Advanced Encryption Standard (AES) and Secure Hash Algorithm (SHA) are widely used cryptographic algorithms for securing cloud data. AES is a symmetric-key block cipher encryption algorithm that provides a high level of security. It works by transforming plaintext into ciphertext using a symmetric key, making it unreadable to anyone without the key. On the other hand, SHA-256 is a hashing algorithm that generates a unique 256-bit hash value for a given input. This hash value can be used to verify the integrity of the data and ensure that it has not been tampered with. This paper presents a simulation-based study of cloud data security and privacy based on AES and SHA-256 techniques. The simulation is done in NetBeans, an integrated development environment (IDE) that allows developers to write, compile, and test code. The simulation involves writing a program to encrypt data using AES and generate a SHA-256 hash value for the encrypted data. The effectiveness of the AES and SHA-256-based technique in securing cloud data is evaluated based on several parameters, such as encryption and decryption time, throughput, and the quality of the generated hash value. The simulation results show that the AES and SHA-256-based technique provides a high level of security and is efficient in securing cloud data

Introduction

The term "cloud computing" refers to a type of utility computing that uses an unlimited number of virtualized resources to build a custom infrastructure or platform that can be used to run applications or full parts of services on a pay-per-use basis. Cloud computing has made the traditional way of putting systems in place obsolete. Advanced system implementations can be hidden from the end user by using virtualization techniques. When resources are virtualized, it makes it seem like the system can grow and be used everywhere [1,2]. Cloud computing makes the long-held dream of utility computing a reality by using a pay-as-you-go pricing model and systems that can be expanded indefinitely and are available everywhere. Developers who have new ideas for new Internet services don't have to spend a lot of money to put up the hardware and software they need. Computing in the cloud refers to all of the applications that are offered as a service over the internet, as well as the hardware infrastructure and platform on which these applications are built. Formally, the hardware infrastructure is called a "data centre," and it includes a wide range of physical devices, from personal computers all the way up to high-end server machines

Conclusion

The purpose of this work is to ensure the secure sharing of sensitive data on public cloud platforms. To achieve this, the AES algorithm is used to encrypt the data before it is uploaded to the cloud environment. Additionally, the key escrow and revocation problem is addressed by this scheme. The Netbeans simulator is utilized to create a cloud environment for testing and implementation. Before uploading important data to the cloud, it is encrypted for protection. To further enhance security, the Private Key generated on the cloud is encrypted using the SHA algorithm before being stored alongside the encrypted data on the cloud. To decrypt the data, the user must first authenticate them on the cloud platform. Once authenticated, the key is compared to the hash code, and if they match, the data can be successfully decrypted. This ensures that sensitive data can be securely shared on public cloud platforms.

Copyright

Copyright © 2025 Poonam Singh rajput , Deepak Mishra . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Download Paper

Paper Id: IJRRETAS216

Publish Date: 2023-07-01

ISSN: 2455-4723

Publisher Name: ijrretas

About ijrretas

ijrretas is a leading open-access, peer-reviewed journal dedicated to advancing research in applied sciences and engineering. We provide a global platform for researchers to disseminate innovative findings and technological breakthroughs.

ISSN
2455-4723
Established
2015

Quick Links

Home Submit Paper Author Guidelines Editorial Board Past Issues Topics
Fees Structure Scope & Topics Terms & Conditions Privacy Policy Refund and Cancellation Policy

Contact Us

Vidhya Innovative Technology 514, Pukhraj Corporate Navlakha, Indore (M.P) - India

info@ijrretas.com

+91 77710 84928

www.ijrretas.com

Indexed In
Google Scholar Crossref DOAJ ResearchGate CiteFactor
© 2026 ijrretas. All Rights Reserved.
Privacy Policy Terms of Service