TSPaper 1
TSPaper 1
ABSTRACT In the rapidly evolving realm of cloud computing security, this paper introduces an innovative
solution to address persistent challenges. The proliferation of cloud technology has brought forth heightened
concerns regarding data security, necessitating novel approaches to safeguarding sensitive information.
The issue centers on the vulnerability of cloud-stored data, usually necessitating enhanced encryption
and key management strategies. Traditional methods usually fall short in mitigating risks associated with
compromised encryption keys and centralized key storage. To combat these challenges, our proposed
solution encompasses a two-phase approach. In the first phase, dynamic Advanced Encryption Standard
(AES) keys are generated, ensuring each file’s encryption with a unique and ever-changing key. This
approach significantly enhances file-level security, curtailing an attacker’s ability to decrypt multiple files
even if a key is compromised. The second phase introduces blockchain technology, where keys are securely
stored with accompanying metadata, bolstering security and data integrity. Elliptic Curve Cryptography
(ECC) public key encryption enhances security during transmission and storage, while also facilitating
secure file sharing. In conclusion, this comprehensive approach enhances cloud security, providing robust
encryption, decentralized key management, and protection against unauthorized access. Its scalability and
adaptability make it a valuable asset in contemporary cloud security paradigms, assuring users of data
security in the cloud.
INDEX TERMS AES, blockchain, cloud computing, cloud storage, dynamic encryption, ECC.
monitoring stored data. To address this imperative and foster Advanced Encryption Standard (AES). This method
broad user acceptance, a multitude of data and resource is characterized by its dynamic and efficient key
protection strategies have been introduced and integrated generation mechanism, which bolsters the security of
within the domain of cloud security, leveraging contemporary file storage in the cloud.
cryptographic algorithms. • Blockchain-Powered Key Security: A notable contribu-
Data protection through encryption in the cloud entails tion lies in the integration of Blockchain technology to
the implementation of robust security measures to safeguard secure cryptographic keys within the cloud environment.
customer data within server centers against external and This ensures the robust protection of encryption keys and
internal threats, facilitated by encryption algorithms [5]. safeguards against potential security breaches.
Two primary categories of encryption methods, supported • User-Friendly Key Management: The article streamlines
by cryptographic keys, are symmetric and asymmetric the process of key management for end-users. This
cryptography [6]. The selection between these methods simplification empowers users to efficiently manage the
hinges on the number of keys employed: one key for substantial volume of dynamic keys required for encryp-
symmetric cryptography and a pair of keys for asymmetric tion tasks, thereby enhancing usability and security in
encryption/decryption. The use of larger and more intricate cloud-based storage systems.
keys enhances the security of encryption algorithms and
renders attacks more formidable.
Conversely, cloud users have the opportunity to bolster II. BACKGROUND AND METHODOLOGY
trust and enhance data protection when engaging in out- A. DYNAMIC ENCRYPTION
sourcing and cloud services by harnessing the innovative and In contrast to the conventional practices of encrypting data
emerging technology of Blockchain [7]. Blockchain security either at rest (i.e., during storage) or during transmission
offers a more complex and reliable paradigm than centralized (i.e., while traversing a network), dynamic encryption,
database security. Blockchain works by keeping track of also referred to as ‘‘runtime encryption’’ or ‘‘real-time
documents in a ledger that are safely connected to earlier encryption,’’ encompasses the process of encrypting data as
blocks using cryptographic hash algorithms. A blockchain it is generated or accessed. Dynamic encryption ensures the
is a type of distributed ledger that is used to record protection of data from the moment of its creation or access
transactions and prevent tampering. Usually run via a peer- until it is no longer required.
to-peer network, the Blockchain is designed specifically to Key characteristics and principles associated with dynamic
prevent unwanted manipulation. As a result, Blockchain can encryption include the following:
furnish security measures on par with those found in central
database storage, effectively averting potential attacks and • Encryption in Real-Time [9]: Dynamic encryption
data breaches from a managerial perspective. secures data while it is in use, typically employing
Furthermore, in scenarios where data transparency is encryption keys generated or derived in the active
imperative, Blockchain’s inherent attribute of openness can process. This ensures data security during processing,
facilitate the necessary level of data transparency [8]. transfer, or utilization.
Because of these unique benefits, Blockchain is used in a • Data-in-Use Protection [10]: Dynamic encryption safe-
variety of industries, such as finance and the Internet of guards data during its active utilization, ensuring encryp-
Things (IoT) ecosystem, and its use is expected to grow tion even when authorized users access it or applications
dramatically. In light of its effectiveness and accessibility, process it. That sets it apart from data-in-transit encryp-
numerous IT environments have embraced cloud computing. tion (like file encryption on storage devices) and data-at-
Consequently, there has been a heightened focus on exploring rest encryption (like network transmission encryption).
critical security facets concerning cloud security and privacy • Granular Access Control [11]: is frequently used in
issues. tandem with dynamic encryption, gives businesses the
This paper introduces a novel approach aimed at enhancing ability to specify who can access data and under what
file storage security within the cloud infrastructure. This conditions. Permissions granted to the user, the time, the
approach leverages a hybrid dynamic encryption technique, place, and other pertinent variables can all be used to
incorporating elements of Elliptic Curve Cryptography, restrict access.
Advanced Encryption Standard, and Blockchain technology. • Adaptive Security [12]: Dynamic encryption demon-
The primary objective is to establish a highly secure strates flexibility in reaction to changing security sce-
environment conducive to elevating the overall security of narios. For example, according on the perceived danger
cloud-based storage solutions. level or the sensitivity of the material, the encryption
The article’s primary contributions are encapsulated within strength and key management may be changed.
the following key points: • Robust Authentication [13]: Strict authentication pro-
cedures are often included with dynamic encryption to
• Dynamic AES File Encryption: The article introduces guarantee that only authorized entities-individuals or
an innovative approach to file encryption utilizing the systems-are able to access encrypted data. Techniques
such as digital certificates and multi-factor authentica- TLS protocol, that establish a secure internet connection. The
tion may be deployed for this purpose. prime modulus p, the generator point G, the elliptic curve’s
• Key Management [14]: Managing keys well is essential coefficients a and b, and the order of the generator point n
when it comes to dynamic encryption. To maintain the are input parameters for the ECC method. The public key Q
security of encrypted data, encryption keys must be is determined as dG, while the private key d is produced as a
generated, stored, cycled, and destroyed on time and random integer between 1 and n − 1.
securely. Considering the aforementioned points, ECC is a secure
In order to protect sensitive data, dynamic encryption and efficient encryption algorithm which can be used for a
adds an extra layer of security, reducing the danger of data wide range of applications consisting of those that require the
breaches and illegal access. It is frequently used in situations use of mobile gadgets.
like secure communications, financial transactions, health- An equation: y2 = x 3 + ax + b is an equation of an elliptic
care, and cloud computing, where data security and privacy curve. In this equation, the constants a and b represent the
are crucial. shape of the curve which looks like an elongated circle or
oval. The curve contains point at infinity which is involved in
the point addition operation and it also has locations where
B. AES
y2 = x 3 + ax + b.
In 2000, the NIST intentionally selected Rijndael as the The algorithm starts with a point P and perform a point
advanced encryption standard due to its outstanding qualities doubling or point addition operation to create points on the
in terms of security, performance, and elegance. As per NIST curve. A point P on the curve is used as input for the point
guidelines, the symmetric encryption method AES has a doubling operation, which outputs a new point 2P. When two
block size of 128 bits. A key feature is that AES can vary points P and Q are added together, a third point R, which is
the number of encryption rounds according to the size of the also on the curve, is produced.
encryption key. More specifically, For a 128-bit key, the AES
uses 10 rounds of encryption; for 192-bit and 256-bit keys,
it uses 12 rounds and 14 rounds, respectively [15]. D. BLOCKCHAIN TECHNOLOGY
The fundamental building blocks of each encryption round Blockchain technology has recently garnered potential to
in AES encompass SubBytes, ShiftRows, MixColumns, and revolutionize several industries, including cloud computing
AddRoundKey operations. Among these, the AddRoundKey recently [18]. The urgency with which this problem must
operation assumes paramount importance as it executes an be solved in order to improve cloud data storage security is
exclusive OR (XOR) operation between the input state matrix highlighted. Because blockchain technology is known for its
and the cryptographic key. It is noteworthy that in the immutable, transparent, and secure record-keeping, it appears
traditional AES framework, each round key is generated by to be a viable solution. Blockchain integration with cloud
means of a predetermined key expansion process. computing systems seems to be a good fit because of its
The selection of Rijndael as the advanced encryption decentralized architecture, which protects against fraud and
standard, its block length, the variable number of encryp- manipulation.
tion rounds, and the integral components of AES rounds, The application of blockchain technology holds promise
including the critical AddRoundKey operation, collectively in addressing several critical issues within the realm of
contribute to the robustness and effectiveness of this widely cloud security research. Blockchain technology may provide
adopted encryption algorithm [16]. a strong answer to this issue by utilizing smart contracts that
are able to confirm device identities and authorize network
C. ELIPTIC CURVE CRYPTOGRAPHY access in accordance with predetermined standards [19].
Elliptic Curve Cryptography, which also know as ECC, is a Numerous research endeavors have explored the utilization
method for encrypting and decrypting data that creates a of blockchain technology to enhance cloud security. These
pair of keys by mathematically connecting each point on an studies include the use of blockchain-based solutions to
elliptic curve to a specific set of public and private keys [17]. protect the privacy and integrity of data, enable private
But the public key is distributed, the private key remains communication in cloud services, and provide secure device
private. To guarantee the security of data being transmitted identification. Still, more study is required to fully understand
through ECC the sender has to get the recipient’s public key how blockchain technology might improve cloud security and
first. The data is then encrypted using the public key and to determine the best ways to put it into practice.
can be unencrypted only with the recipient’s private key. The Public and private blockchains exhibit marked dispar-
data can be viewed only by the intended receiver when the ities in terms of their decentralization paradigms. While
encryption method is applied. private blockchains act as closed, limited networks, public
Many applications from Virtual Private Networks (VPNs) blockchains are open, decentralized, and welcome participa-
to file transfers and secure email protocols employ the tion from everybody interested [20]. Consequently, private
currently popular methods, the so-called ECC. It is also blockchains, in theory, offer superior efficiency and security
utilized in the design of cryptographic protocols such as the attributes when compared to their public counterparts.
However, more centralization and decreased transparency are from different forms of cyberattacks. These featured pro-
the cost paid for this improved performance. cesses are enabled by the system’s remarkable capability to
In this paper, a private blockchain has been employed as the use biometric authentication correctly that was achieved by
chosen framework for implementing blockchain technology developing a strong approval procedure which follows the
to enhance the security of data within cloud storage systems. rule of permissions and requirements to the latter.
In 2023, An novel Non-Deterministic Cryptographic
III. RELATED WORKS Scheme (NCS) solution has been proposed to ensure
The growing adoption of cloud storage can be attributed data confidentiality and privacy in cloud environments,
to its convenient accessibility, resource efficiency, and cost- incorporating Sliding Window Algorithm (SWA), Linear
effectiveness. However, ensuring user privacy during data Congruential Generator (LGC), and XOR implementation.
transfers to the cloud requires implementing technologies The suggested method’s strength was compared with the
that guarantee data privacy and integrity. This aspect holds encryption algorithms of AES, RSA, and DES to show
particular significance within the related work context, where its superiority in terms of execution time. The resolution
investigating diverse techniques for enhancing security in presented in [25] also emphasized striking a balance between
data migration to the cloud remains a central focus. the encryption algorithm’s strength and efficiency in relation
In 2021, [21] introduced a new Lightweight Cryptographic to the volume of data.
Algorithm named (NLCA), which operates as a 16-byte block In 2023, the solution in [26] proposed utilizing AES, RSA,
cipher and utilizes a 16-byte key for encryption within cloud DES, and Blowfish encryption algorithms to elevate data
environments. The objective of this proposal is to enhance security within a cloud environment. The solution is including
data security. Notably, the algorithm exhibits a flexible nature computing time, strength of encryption, and resource use
while concurrently achieving optimal encryption speed and is carried out to undertake a thorough performance evalua-
an elevated level of security which is accomplished by incor- tion of these methods. The comparison analysis’s findings
porating supplementary logical operations, distinguishing demonstrate the AES algorithm’s superiority in terms of
NLCA from other encryption algorithms. cryptographic resilience and encryption speed.
In 2021, Hybrid algorithms have demonstrated their
effectiveness in enhancing data protection within the cloud IV. PROPOSED DYNAMIC ENCRYPTION SOLUTION
environment, corroborated by researchers in [22]. This The proposed solution relies primarily on three fundamental
research proffered a hybrid algorithm that capitalizes on elements, as shown in Figure 1, to secure data at three
the synergistic attributes of Elliptic Curve Cryptography levels: when it is transferred from the client to the server,
(ECC) and AES algorithms. An ECC algorithm was enlisted when it is stored and managed on the server, and when it
for AES key generation to harmonize the imperatives of is shared among clients. The utilized components are the
data security, computational efficiency, and implementation AES encryption algorithm, the ECC public key encryption
expediency. The algorithm’s key size, notable for its compact algorithm, and blockchain technology.
dimensions, is an additional strength of the proposed system. Therefore, we will elucidate the processes of securing data
A comprehensive comparative analysis involving diverse through data encryption and decryption, as well as how to
encryption algorithms and alternative proposed systems manage file sharing operations by creating branches in the
was conducted. The outcomes firmly establish that the blockchain, thereby enhancing blockchain management.
AES-ECC hybrid algorithm attains superior levels of security
and exhibits reduced energy consumption in contrast to A. KEY GENERATION AND FILE ENCRYPTION
its counterparts, rendering it a quintessential choice for In the initial stage of the proposed solution, the client initiates
data-safeguarding endeavors in the cloud. the blockchain if they do not already possess any previous
In 2022, Blockchain technology has been employed to blocks. The first block is initialized with random data, and
tackle the shortcomings and obstacles inherent in conven- the block number and creation date are added to it, as depicted
tional medical cloud storage systems and establish trust, audi- in Figure 2. However, if the client already has a pre-existing
bility, and data-sharing interoperability as employed in [23]. blockchain, they have two options. They can either fetch the
The proposed solution incorporates a consensus algorithm for latest block from the server, should it not be available locally,
validating new blocks, authenticating healthcare providers, or retrieve it from their device, if it is locally available.
and enhancing data management in the cloud. This flexibility allows the user to access the necessary data
In 2022, the Fine-Grained Access Control (FGAC) system even if it is not present locally or to leverage the data available
has been proposed to enhance the trustworthiness and on their device to expedite operations. Following this, the
confidentiality of users and service providers by leveraging a client inputs the file they wish to upload to the cloud storage
fuzzy logic framework [24]. The system creates three groups service into the SHA-256 algorithm to obtain the file’s hash
of keys which are the public, private, and session keys. The code. Subsequently, the client inputs the hash code of the last
proposed solution utilizes such an elaborate management block in the blockchain into the same algorithm to acquire a
scheme to deliver an array of security functions. Thus, hash code. These two codes are then combined using XOR to
it encompasses various aspects of possible threats emerging yield a final code, which serves as the encryption key for the
requested from the server that holds the clients’ public ECC
algorithm keys.
The ability to modify the blockchain mechanism and
add new branches to it provides the advantage of verifying
that a file has been shared from a trusted source. This
is achieved by regenerating the block from the file after
decrypting it. Additionally, revoking or deleting a file from
the blockchain will not affect the main chain that contains
the user’s primary files uploaded to the server. This flexibility
allows for the creation of branches to any extent, with each
branch containing multiple files in a hierarchical manner.
B. SENSITIVITY ANALYSIS
file with. The recipient hashes the file they want to share and The proportion of ’1’s within a binary data stream relative
then creates a new block and a new encryption key in the to the total number of bits in the data is commonly denoted
same way previously explained for file encryption and block as sensitivity or bit density. Bit density serves as a metric to
construction. They assign a sequence to the block directly assess the entropy or predictability of a given data stream.
after the number of the block received from the client they In the case of highly random data, it is anticipated that the
intend to share with. Then, they encrypt the file and the block bit density will closely approach 0.5, signifying an equitable
with the recipient’s ECC public key, which can be directly distribution of ‘‘0’’ and ‘‘1’’ bits.
[21] F. Thabit, A. P. S. Alhomdy, A. H. A. Al-Ahdal, and P. D. S. Jagtap, MEJDL SAFRAN received the bachelor’s degree
‘‘A new lightweight cryptographic algorithm for enhancing data security in computer science from King Saud University,
in cloud computing,’’ Global Transitions Proc., vol. 2, no. 1, pp. 91–99, in 2007, and the master’s and Ph.D. degrees in
Jun. 2021. computer science from Southern Illinois Univer-
[22] S. Rehman, N. Talat Bajwa, M. A. Shah, A. O. Aseeri, and A. Anjum, sity Carbondale, in 2013 and 2018, respectively.
‘‘Hybrid AES-ECC model for the security of data over cloud storage,’’ He is currently a Passionate Researcher and an
Electronics, vol. 10, no. 21, p. 2673, Oct. 2021. Educator in the field of artificial intelligence, with
[23] S. K. Dwivedi, R. Amin, J. D. Lazarus, and V. Pandi, ‘‘Blockchain-
a focus on deep learning and its applications in
based electronic medical records system with smart contract and consensus
various domains. He is also an Assistant Professor
algorithm in cloud environment,’’ Secur. Commun. Netw., vol. 2022,
pp. 1–10, Sep. 2022. in computer science with King Saud University,
[24] S. Virushabadoss and T. P. Anithaashri, ‘‘Enhancing data security in where he has been a Faculty Member, since 2008. His doctoral dissertation
mobile cloud using novel key generation,’’ Proc. Comput. Sci., vol. 215, was on developing efficient learning-based recommendation algorithms for
pp. 567–576, 2022. top-N tasks and top-N workers in large-scale crowdsourcing systems. He has
[25] J. K. Dawson, F. Twum, J. B. Hayfron Acquah, and Y. M. Missah, published more than 20 articles in peer-reviewed journals and conference
‘‘Ensuring confidentiality and privacy of cloud data using a non- proceedings, such as ACM Transactions on Information Systems, Applied
deterministic cryptographic scheme,’’ PLoS ONE, vol. 18, no. 2, Feb. 2023, Computing and Informatics, Mathematics, Sustainability, International
Art. no. e0274628. Journal of Digital Earth, IEEE ACCESS, Biomedicine, Sensors, IEEE
[26] Y. Alemami, A. M. Al-Ghonmein, K. G. Al-Moghrabi, and International Conference on Cluster, IEEE International Conference on
M. A. Mohamed, ‘‘Cloud data security and various cryptographic Computer and Information Science, International Conference on Database
algorithms,’’ Int. J. Electr. Comput. Eng. (IJECE), vol. 13, no. 2, p. 1867, Systems for Advanced Applications, and International Conference on
Apr. 2023. Computational Science and Computational Intelligence. He has been leading
[27] Y. A. Liu, L. Chen, X. W. Li, Y. L. Liu, S. G. Hu, Q. Yu, T. P. Chen, grant projects in the fields of AI in medical imaging and AI in smart farming.
and Y. Liu, ‘‘A dynamic AES cryptosystem based on memristive neural
He has been an AI Consultant for several national and international agencies,
network,’’ Sci. Rep., vol. 12, no. 1, p. 12983, Jul. 2022.
since 2018. His current research interests include developing novel deep
[28] K. Lee, S.-Y. Lee, and K. Yim, ‘‘Machine learning based file entropy
analysis for ransomware detection in backup systems,’’ IEEE Access, learning methods for image processing, pattern recognition, natural language
vol. 7, pp. 110205–110215, 2019. processing, predictive analytics, and modeling and analyzing user behavior
[29] C.-M. Hsu, C.-C. Yang, H.-H. Cheng, P. E. Setiasabda, and J.-S. Leu, and interest in online platforms.
‘‘Enhancing file entropy analysis to improve machine learning detection
rate of ransomware,’’ IEEE Access, vol. 9, pp. 138345–138351, 2021.
MOHAMMED Y. SHAKOR received the Master SULTAN ALFARHOOD received the Ph.D. degree
of Science degree from the Computer Science in computer science from the University of
Department, College of Science, University of Arkansas. He is currently an Assistant Professor
Sulaimani, in 2019. He is currently a Lecturer with the Department of Computer Science, King
with the University of Garmian. He is also Saud University (KSU). Since joining KSU,
an accomplished academic professional with a in 2007, he has made several contributions to the
profound expertise in computer science. During field of computer science through his research
this tenure, he exhibited a remarkable aptitude and publications. His research interests include
for advanced concepts and demonstrated a keen machine learning, recommender systems, linked
interest in cutting-edge developments within the open data, text mining, and the ML-based IoT
field. His research interests include cloud security, cryptography, deep systems. His work includes proposing innovative approaches and techniques
learning, and cloud computing. He has developed innovative methods and to enhance the accuracy and effectiveness of these systems. His recent
techniques to enhance accuracy and efficiency in these fields. publications have focused on using deep learning and machine learning
techniques to address challenges in these domains. His research continues to
make significant contributions to the field of computer science and machine
learning. His work has been published in several high-impact journals and
conferences.