Authors :
Gift Aruchi Nwatuzie; Lawrence Anebi Enyejo; Chima Umeaku
Volume/Issue :
Volume 10 - 2025, Issue 1 - January
Google Scholar :
https://tinyurl.com/y6fnj4fx
Scribd :
https://tinyurl.com/25fsdd3m
DOI :
https://doi.org/10.5281/zenodo.14792173
Abstract :
Cloud computing has revolutionized data storage and access, but its reliance on multi-tenant environments
introduces significant security risks, including unauthorized access, data breaches, and integrity violations. Addressing these
challenges, this study presents a hybrid encryption framework integrating Advanced Encryption Standard (AES), Data
Encryption Standard (DES), and RC6 algorithms. The framework incorporates file splitting and steganographic key
management to ensure robust data protection in cloud environments. The encryption process involves a layered approach
where multiple algorithms are applied sequentially to strengthen data security, while file splitting further complicates
unauthorized access.
The methodology includes a detailed simulation of the hybrid framework in a controlled environment, assessing its
performance against key security metrics such as confidentiality, integrity, and availability. Results demonstrate that the
proposed model significantly outperforms conventional encryption systems, offering enhanced security without
compromising performance. Additionally, the use of steganography for key management ensures secure and seamless user
interactions.
This research contributes to the advancement of cloud data security by providing a scalable, efficient, and user-friendly
encryption model that meets the growing demands of secure cloud computing. The findings are expected to guide the
development of more robust security protocols for cloud storage systems, fostering user trust and adoption.
Keywords :
Hybrid Encryption Framework; Advanced Encryption Standard (AES); Data Encryption Standard (DES); RC6 Algorithm; Steganographic Key Management and Cloud Data Security.
References :
- Ayoola, V. B., Audu, B. A., Boms, J. C., Ifoga, S. M., Mbanugo, O. J., & Ugochukwu, U. N. (2024). Integrating Industrial Hygiene in Hospice and Home Based Palliative Care to Enhance Quality of Life for Respiratory and Immunocompromised Patients. NOV 2024 | IRE Journals | Volume 8 Issue 5 | ISSN: 2456-8880.
- Ayoola, V. B., Ugochukwu, U. N., Adeleke, I., Michael, C. I. Adewoye, M. B., & Adeyeye, Y. (2024). Generative AI-Driven Fraud Detection in Health Care Enhancing Data Loss Prevention and Cybersecurity Analytics for Real-Time Protection of Patient Records. International Journal of Scientific Research and Modern Technology (IJSRMT), Volume 3, Issue 11, 2024.https://www.ijsrmt.com/index.php/ijsrmt/article/view/112
- Bian, J., Al Arafat, A., Xiong, H., Li, J., Li, L., Chen, H., ... & Guo, Z. (2022). Machine learning in real-time Internet of Things (IoT) systems: A survey. IEEE Internet of Things Journal, 9(11), 8364-8386.
- Ebenibo, L., Enyejo, J. O., Addo, G., & Olola, T. M. (2024). Evaluating the Sufficiency of the data protection act 2023 in the age of Artificial Intelligence (AI): A comparative case study of Nigeria and the USA. International Journal of Scholarly Research and Reviews, 2024, 05(01), 088–107. https://srrjournals.com/ijsrr/content/evaluating-sufficiency-data-protection-act-2023-age-artificial-intelligence-ai-comparative
- Enyejo, J. O., Adeyemi, A. F., Olola, T. M., Igba, E & Obani, O. Q. (2024). Resilience in supply chains: How technology is helping USA companies navigate disruptions. Magna Scientia Advanced Research and Reviews, 2024, 11(02), 261–277. https://doi.org/10.30574/msarr.2024.11.2.0129
- Enyejo, J. O., Adeyemi, A. F., Olola, T. M., Igba, E & Obani, O. Q. (2024). Resilience in supply chains: How technology is helping USA companies navigate disruptions. Magna Scientia Advanced Research and Reviews, 2024, 11(02), 261–277. https://doi.org/10.30574/msarr.2024.11.2.0129
- Enyejo, J. O., Babalola, I. N. O., Owolabi, F. R. A. Adeyemi, A. F., Osam-Nunoo, G., & Ogwuche, A. O. (2024). Data-driven digital marketing and battery supply chain optimization in the battery powered aircraft industry through case studies of Rolls-Royce’s ACCEL and Airbus's E-Fan X Projects. International Journal of Scholarly Research and Reviews, 2024, 05(02), 001–020. https://doi.org/10.56781/ijsrr.2024.5.2.0045.
- Enyejo, J. O., Fajana, O. P., Jok, I. S., Ihejirika, C. J., Awotiwon, B. O., & Olola, T. M. (2024). Digital Twin Technology, Predictive Analytics, and Sustainable Project Management in Global Supply Chains for Risk Mitigation, Optimization, and Carbon Footprint Reduction through Green Initiatives. International Journal of Innovative Science and Research Technology, Volume 9, Issue 11, November– 2024. ISSN No:-2456-2165. https://doi.org/10.38124/ijisrt/IJISRT24NOV1344
- Enyejo, L. A., Adewoye, M. B. & Ugochukwu, U. N. (2024). Interpreting Federated Learning (FL) Models on Edge Devices by Enhancing Model Explainability with Computational Geometry and Advanced Database Architectures. International Journal of Scientific Research in Computer Science, Engineering and Information Technology. Vol. 10 No. 6 (2024): November-December doi : https://doi.org/10.32628/CSEIT24106185
- Hayat, M. A., Islam, S., & Hossain, M. F. (2024). Securing the Cloud Infrastructure: Investigating Multi-tenancy Challenges, Modern Solutions and Future Research Opportunities. ResearchGate, Aug.
- Idoko, D. O., Olarinoye, H. S., Adepoju, O. A., Folayan, T. A. & Enyejo, L. A. (2024). Exploring the Role of Human Behavior Analytics in Strengthening Privacy-Preserving Systems for Sensitive Data Protection. International Journal of Innovative Science and Research Technology ISSN No:-2456-2165. Volume 9, Issue 12, December – 2024.
- Idoko, I. P., Igbede, M. A., Manuel, H. N. N., Adeoye, T. O., Akpa, F. A., & Ukaegbu, C. (2024). Big data and AI in employment: The dual challenge of workforce replacement and protecting customer privacy in biometric data usage. *Global Journal of Engineering and Technology Advances*, 19(02), 089-106. https://doi.org/10.30574/gjeta.2024.19.2.0080
- Idoko, I. P., Ijiga, O. M., Enyejo, L. A., Akoh, O., & Isenyo, G. (2024). Integrating superhumans and synthetic humans into the Internet of Things (IoT) and ubiquitous computing: Emerging AI applications and their relevance in the US context. *Global Journal of Engineering and Technology Advances*, 19(01), 006-036.
- Igba, E., Adeyemi, A. F., Enyejo, J. O., Ijiga, A. C., Amidu, G., & Addo, G. (2024). Optimizing Business loan and Credit Experiences through AI powered ChatBot Integration in financial services. Finance & Accounting Research Journal, P-ISSN: 2708-633X, E-ISSN: 2708, Volume 6, Issue 8, P.No. 1436-1458, August 2024. DOI:10.51594/farj.v6i8.1406
- Ijiga, A. C., Aboi, E. J., Idoko, P. I., Enyejo, L. A., & Odeyemi, M. O. (2024). Collaborative innovations in Artificial Intelligence (AI): Partnering with leading U.S. tech firms to combat human trafficking. Global Journal of Engineering and Technology Advances, 2024,18(03), 106-123. https://gjeta.com/sites/default/files/GJETA-2024-0046.pdf.
- Ijiga, A. C., Olola, T. M., Enyejo, L. A., Akpa, F. A., Olatunde, T. I., & Olajide, F. I. (2024). Advanced surveillance and detection systems using deep learning to combat human trafficking. Magna Scientia Advanced Research and Reviews, 2024, 11(01), 267–286. https://magnascientiapub.com/journals/msarr/sites/default/files/MSARR-2024-0091.pdf.
- Ijiga, O. M., Idoko, I. P., Ebiega, G. I., Olajide, F. I., Olatunde, T. I., & Ukaegbu, C. (2024). Harnessing adversarial machine learning for advanced threat detection: AI-driven strategies in cybersecurity risk assessment and fraud prevention.
- Michael, C. I, Campbell, T. Idoko, I. P., Bemologi, O. U., Anyebe, A. P., & Odeh, I. I. (2024). Enhancing Cybersecurity Protocols in Financial Networks through Reinforcement Learning. International Journal of Scientific Research and Modern Technology (IJSRMT). Vol 3, Issue 9, 2024. Doi:- 10.38124/ijsrmt.v3i9.58
- Ning, L., Ali, Y., Ke, H., Nazir, S., & Huanli, Z. (2020). A hybrid MCDM approach of selecting lightweight cryptographic cipher based on ISO and NIST lightweight cryptography security requirements for internet of health things. IEEE Access, 8, 220165-220187.
- Okeke, R. O., Ibokette, A. I., Ijiga, O. M., Enyejo, L. A., Ebiega, G. I., & Olumubo, O. M. (2024). The reliability assessment of power transformers. *Engineering Science & Technology Journal*, 5(4), 1149-1172.
- Panwar, A., Singh, A., Dixit, A., & Parashar, G. (2022). Cloud Computing and Load Balancing: A Review. In 2022 International Conference on Computational Intelligence and Sustainable Engineering Solutions (CISES) (pp. 334-343). IEEE.
- Sasikumar, K., & Nagarajan, S. (2024). Comprehensive Review and Analysis of Cryptography Techniques in Cloud Computing. IEEE Access.
- Shaikh, Z. A., Hajjej, F., Uslu, Y. D., Yüksel, S., Dınçer, H., Alroobaea, R., ... & Chinta, U. (2024). A new trend in cryptographic information security for industry 5.0: a systematic review. IEEE Access, 12, 7156-7169.
- Soveizi, N., Turkmen, F., & Karastoyanova, D. (2023). Security and privacy concerns in cloud-based scientific and business workflows: A systematic review. Future Generation Computer Systems, 148, 184-200.
- Starks, R. (2022). Exploring the Current Challenges and Developing Reliable Measures to Guarantee the Best Security (Doctoral dissertation, Northcentral University).
- Tudesco, D. M., Deshpande, A., Laghari, A. A., Khan, A. A., Lopes, R. T., Jenice Aroma, R., ... & Khan, A. (2024). Utilization of Deep Learning Models for Safe Human‐Friendly Computing in Cloud, Fog, and Mobile Edge Networks. Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat Detection, 221-248.
- Yang, P., Xiong, N., & Ren, J. (2020). Data security and privacy protection for cloud storage: A survey. Ieee Access, 8, 131723-131740.
- Zobaed, S. M., & Amini Salehi, M. (2023). Confidential Computing Across Edge‐To‐Cloud for Machine Learning: A Survey Study. Software: Practice and Experience.
Cloud computing has revolutionized data storage and access, but its reliance on multi-tenant environments
introduces significant security risks, including unauthorized access, data breaches, and integrity violations. Addressing these
challenges, this study presents a hybrid encryption framework integrating Advanced Encryption Standard (AES), Data
Encryption Standard (DES), and RC6 algorithms. The framework incorporates file splitting and steganographic key
management to ensure robust data protection in cloud environments. The encryption process involves a layered approach
where multiple algorithms are applied sequentially to strengthen data security, while file splitting further complicates
unauthorized access.
The methodology includes a detailed simulation of the hybrid framework in a controlled environment, assessing its
performance against key security metrics such as confidentiality, integrity, and availability. Results demonstrate that the
proposed model significantly outperforms conventional encryption systems, offering enhanced security without
compromising performance. Additionally, the use of steganography for key management ensures secure and seamless user
interactions.
This research contributes to the advancement of cloud data security by providing a scalable, efficient, and user-friendly
encryption model that meets the growing demands of secure cloud computing. The findings are expected to guide the
development of more robust security protocols for cloud storage systems, fostering user trust and adoption.
Keywords :
Hybrid Encryption Framework; Advanced Encryption Standard (AES); Data Encryption Standard (DES); RC6 Algorithm; Steganographic Key Management and Cloud Data Security.