Ponte Academic Journal May 2018, Volume 74, Issue 5 |
EFFICIENT 3-TIER HYBRID ENCRYPTION MODEL FOR IMPROVED DATA SECURITY IN THE CLOUD LANDSCAPE Author(s): BASSEY ISONG ,Koketso Ntshabele, Thusoyaone Moemi, Nosipho Dladlu, Naison Gasela J. Ponte - May 2018 - Volume 74 - Issue 5 doi: 10.21506/j.ponte.2018.5.17 Abstract: Cloud computing is a computing paradigm that offers several benefits such as scalability,
reduced cost, mobile storage, ubiquitous access and energy saving. It is also faced with
several challenges dominated by security, trust and privacy. Particularly, security challenges
such as data security has been considered as a serious bottleneck and has impeded several
individuals and organizations from migrating their businesses and data to the cloud. Users�
data integrity and confidentiality are prone to unauthorized access and compromises. Albeit
several solutions have been offered such as data encryption, cloud-end users� data is still at
risk. Encryption has several algorithms either symmetric or asymmetric with each having its
own strengths and weaknesses. However, due to the sophistication of today�s attacks, using
individual algorithm is no longer sufficient to protect users� data and identifying which
combination of the algorithms to use in reinforcing security strength at reduced computational
and resource usage cost poses a challenging task. Therefore, this paper analyses the state-ofthe-
art of encryption algorithms used for data encryption in cloud environment with the goal
of identifying their strengths and weaknesses. We analyzed ten (10) articles which utilized
hybrid algorithms with emphasis on 3 symmetric and 3 asymmetric algorithms. The analysis
results shows that the symmetric techniques are mostly computational and resource-efficient
than the asymmetric techniques. However, the asymmetric technique is considered a better
option for data security to ensure users� data confidentiality and integrity. Furthermore, this
paper proposes a 3-tier RSA-Blowfish-DES hybrid model to protect users� data stored in the
cloud. The model was designed, developed and performance evaluated against a 2-tier RSABlowfish
hybrid model. The evaluation was based on the security strength, time efficiency
and the data size after encryption and decryption. The evaluation shows that both hybrid
models were effective in the protection of data stored in the cloud compared to individual
algorithms. The 2-tier model has a better time efficiency than the 3-tier model, while the data
size was observed to slightly increase after encryption but assumed its original size after
decryption. Nonetheless, the 3-tier RSA-DES-Blowfish model was found to be more secured.
Consequently, the 3-tier model could be more preferable in ensuring the confidentiality and
integrity of cloud users� data which in turn will reduce or eliminate existing skepticism about
security of data stored in cloud.
|
Download full text: Check if you have access through your login credentials or your institution |
|
Guide for Authors
This guideline has been prepared for the authors to new submissions and after their manuscripts have been accepted |
Authors Login
We welcome refrees who would be willing to act as reviewers |
Paper Tracking
You can track your submitted article from this tab |
Editorial Board
The international editorial board is headed by Dr. Maria E. Boschi |
General Policies
Papers that are published or held by the Journal may not be published elsewhere |
Peer Review Process
Papers will be sent to three peer reviewers for evaluation |