Secure Files Storage in Cloud using Hybrid Cryptography

Debabrat Bharali*, Dipu Medhi **, Wahengbam Shibananda Singh ***, Afrin Haque ****, Kuldeep Nath *****
*-***** Department of Computer Science and Engineering, Regional Institute of Science and Technology, Meghalaya, India.
Periodicity:July - December'2020


Today, cloud computing is used in various fields like industry, military, college, etc. for various services and storage of huge amounts of data. The data stored in the cloud can be accessed or retrieved by user request without direct access to the server computer. But the major concern regarding the storage of data online on the cloud is about the security of the file. Cryptography and steganography are the most commonly used security techniques. So, we have introduced a security that uses a combination of multiple cryptographic algorithms. In this proposed system, Data Encryption Standard (DES), Rivest Cipher 4 (RC4), and Advanced Encryption Standard (AES) algorithms are used to provide security to data. Key information will contain the information regarding the encrypted part of the file, the algorithm, and the key for the algorithm. During the Encryption phase, the file will be split into three parts and each part will be separately encrypted using AES, DES, and RC4 algorithms. Our methodology provides better security and assurance of user data by storing on the cloud server, using AES, DES, and RC4 algorithm.


Cryptography, Hybrid Cryptography, Encryption, Decryption, Cloud Security, Cloud Storage.

How to Cite this Article?

Bharali, D., Medhi, D., Singh, W. S., Haque, A., and Nath, K. (2020). Secure Files Storage in Cloud using Hybrid Cryptography. i-manager's Journal on Cloud Computing, 7(2), 8-14.


[1]. Amazon Web Services. (n.d.). What is Cloud Storage? Amazon Web Services. Retrieved from com/what-is-cloud-storage/
[2]. Barvekar, R., Behere, S., Pounikar, Y., & Gulhane, A. (2018). An approach to hybrid cryptography on cloud environment. International Journal of Advance Research and Innovative Ideas in Education, 4(2), 4626-4631.
[3]. Dhagat, R., & Joshi, P. (2016, March). New approach of user authentication using digital signature. In 2016, Symposium on Colossal Data Analysis and Networking (CDAN) (pp. 1-3). IEEE. 7570947
[4]. Dutta, T., & Pathak, A. (2016). Secure data sharing in cloud storage using key aggregation cryptography. International Journal of Computer Sciences and Engineering, 4(7), 20-23.
[5]. Gajendra, B. P., Singh, V. K., & Sujeet, M. (2016, April). Achieving cloud security using third party auditor, MD5 and identity-based encr yption. In 2016, International Conference on Computing, Communication and Automation (ICCCA) (pp. 1304-1309). IEEE. 10.1109/CCAA.2016.7813920
[6]. Habib, B., Cambou, B., Booher, D., & Philabaum, C. (2017, October). Public key exchange scheme that is addressable (PKA). In 2017, IEEE Conference on Communications and Network Security (CNS) (pp. 392- 393). IEEE.
[7]. Kaczmarek, J., & Wrobel, M. (2008, May). Modern approaches to file system integrity checking. In 2008, 1st International Conference on Information Technology (pp. 1-4). IEEE.
[8]. Khan, S. S., & Deshmukh, S. S. (2014). Security in cloud computing using cryptographic algorithms. International Journal of Computer Science and Mobile Computing, 3(9), 517-525.
[9]. Maitri, P. V., & Verma, A. (2016, March). Secure file storage in cloud computing using hybrid cryptography algorithm. In 2016, International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET) (pp. 1635-1638). IEEE. WiSPNET.2016.7566416
[10]. Malarvizhi, M., Sujana, J. A. J., & Revathi, T. (2014, March). Secure file sharing using cryptographic techniques in cloud. In 2014, International Conference on Green Computing Communication and Electrical Engineering (ICGCCEE) (pp. 1-6). IEEE. 1109/ICGCCEE.2014.6921421
[11]. Patel, A., Patel, N., & Patel, D. H. (2016). Secure data sharing using cryptography in cloud environment. IOSR Journal of Computer Engineering (IOSR-JCE), 18(1), 58-62.
[12]. Sharma, S. (2019). Security in Cloud Computing using Hybrid Cryptographic Algorithms. (Undergraduate Project). Jaypee University of Information Technology, Himachal Pradesh, India. Retrieved from 20in%20Cloud%20Computing%20using%20Hybrid%20C ryptographic%20Algorithms.pdf
[13]. Sharma, S., Singla, K., Rathee, G., & Saini, H. (2020). A hybrid cr yptographic technique for file storage mechanism over cloud. In First International Conference on Sustainable Technologies for Computational Intelligence (pp. 241-256). Springer, Singapore. https://doi. org/10.1007/978-981-15-0029-9_19
[14]. Stilson, B. (2018, April 20). Let’s Encrypt Files With Node. Medium. Retrieved from stilson/lets-encrypt-files-with-node-85037bea8c0e

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

If you have access to this article please login to view the article or kindly login to purchase the article
Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.