References
[1]. Amazon Web Services. (n.d.). What is Cloud Storage? Amazon Web Services. Retrieved from https://aws.amazon. com/what-is-cloud-storage/
[2]. Barvekar, R., Behere, S., Pounikar, Y., & Gulhane, A. (2018). An approach to hybrid cryptography on cloud environment. International Journal of Advance Research and Innovative Ideas in Education, 4(2), 4626-4631.
[3]. Dhagat, R., & Joshi, P. (2016, March). New approach of user authentication using digital signature. In 2016, Symposium on Colossal Data Analysis and Networking (CDAN) (pp. 1-3). IEEE. https://doi.org/10.1109/CDAN.2016. 7570947
[4]. Dutta, T., & Pathak, A. (2016). Secure data sharing in cloud storage using key aggregation cryptography. International Journal of Computer Sciences and Engineering, 4(7), 20-23.
[5]. Gajendra, B. P., Singh, V. K., & Sujeet, M. (2016, April). Achieving cloud security using third party auditor, MD5 and identity-based encr yption. In 2016, International Conference on Computing, Communication and Automation (ICCCA) (pp. 1304-1309). IEEE. https://doi.org/ 10.1109/CCAA.2016.7813920
[6]. Habib, B., Cambou, B., Booher, D., & Philabaum, C. (2017, October). Public key exchange scheme that is addressable (PKA). In 2017, IEEE Conference on Communications and Network Security (CNS) (pp. 392- 393). IEEE. https://doi.org/10.1109/CNS.2017.8228693
[7]. Kaczmarek, J., & Wrobel, M. (2008, May). Modern approaches to file system integrity checking. In 2008, 1st International Conference on Information Technology (pp. 1-4). IEEE. https://doi.org/10.1109/INFTECH.2008.4621669
[8]. Khan, S. S., & Deshmukh, S. S. (2014). Security in cloud computing using cryptographic algorithms. International Journal of Computer Science and Mobile Computing, 3(9), 517-525.
[9]. Maitri, P. V., & Verma, A. (2016, March). Secure file storage in cloud computing using hybrid cryptography algorithm. In 2016, International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET) (pp. 1635-1638). IEEE. https://doi.org/10.1109/ WiSPNET.2016.7566416
[10]. Malarvizhi, M., Sujana, J. A. J., & Revathi, T. (2014, March). Secure file sharing using cryptographic techniques in cloud. In 2014, International Conference on Green Computing Communication and Electrical Engineering (ICGCCEE) (pp. 1-6). IEEE. https://doi.org/10. 1109/ICGCCEE.2014.6921421
[11]. Patel, A., Patel, N., & Patel, D. H. (2016). Secure data sharing using cryptography in cloud environment. IOSR Journal of Computer Engineering (IOSR-JCE), 18(1), 58-62. https://doi.org/10.9790/0661-18145862
[12]. Sharma, S. (2019). Security in Cloud Computing using Hybrid Cryptographic Algorithms. (Undergraduate Project). Jaypee University of Information Technology, Himachal Pradesh, India. Retrieved from https://www.ir.juit. ac.in:8080/jspui/bitstream/123456789/22787/1/Security% 20in%20Cloud%20Computing%20using%20Hybrid%20C ryptographic%20Algorithms.pdf
[13]. Sharma, S., Singla, K., Rathee, G., & Saini, H. (2020). A hybrid cr yptographic technique for file storage mechanism over cloud. In First International Conference on Sustainable Technologies for Computational Intelligence (pp. 241-256). Springer, Singapore. https://doi. org/10.1007/978-981-15-0029-9_19
[14]. Stilson, B. (2018, April 20). Let’s Encrypt Files With Node. Medium. Retrieved from https://medium.com/@brandon stilson/lets-encrypt-files-with-node-85037bea8c0e