Enhancing Cloud Data Security Using a Hybrid Encryption Framework Integrating AES, DES, and RC6 with File Splitting and Steganographic Key Management


Authors : Gift Aruchi Nwatuzie; Lawrence Anebi Enyejo; Chima Umeaku

Volume/Issue : Volume 10 - 2025, Issue 1 - January


Google Scholar : https://tinyurl.com/y6fnj4fx

Scribd : https://tinyurl.com/25fsdd3m

DOI : https://doi.org/10.5281/zenodo.14792173


Abstract : Cloud computing has revolutionized data storage and access, but its reliance on multi-tenant environments introduces significant security risks, including unauthorized access, data breaches, and integrity violations. Addressing these challenges, this study presents a hybrid encryption framework integrating Advanced Encryption Standard (AES), Data Encryption Standard (DES), and RC6 algorithms. The framework incorporates file splitting and steganographic key management to ensure robust data protection in cloud environments. The encryption process involves a layered approach where multiple algorithms are applied sequentially to strengthen data security, while file splitting further complicates unauthorized access. The methodology includes a detailed simulation of the hybrid framework in a controlled environment, assessing its performance against key security metrics such as confidentiality, integrity, and availability. Results demonstrate that the proposed model significantly outperforms conventional encryption systems, offering enhanced security without compromising performance. Additionally, the use of steganography for key management ensures secure and seamless user interactions. This research contributes to the advancement of cloud data security by providing a scalable, efficient, and user-friendly encryption model that meets the growing demands of secure cloud computing. The findings are expected to guide the development of more robust security protocols for cloud storage systems, fostering user trust and adoption.

Keywords : Hybrid Encryption Framework; Advanced Encryption Standard (AES); Data Encryption Standard (DES); RC6 Algorithm; Steganographic Key Management and Cloud Data Security.

References :

  1. Ayoola, V. B., Audu, B. A., Boms, J. C., Ifoga, S. M., Mbanugo, O. J., & Ugochukwu, U. N.  (2024). Integrating Industrial Hygiene in Hospice and Home Based Palliative Care to Enhance Quality of Life for Respiratory and Immunocompromised Patients. NOV 2024 | IRE Journals | Volume 8 Issue 5 | ISSN: 2456-8880.
  2. Ayoola, V. B., Ugochukwu, U. N.,  Adeleke, I., Michael, C. I. Adewoye, M. B., & Adeyeye, Y. (2024). Generative AI-Driven Fraud Detection in Health Care Enhancing Data Loss Prevention and Cybersecurity Analytics for Real-Time Protection of Patient Records. International Journal of Scientific Research and Modern Technology (IJSRMT), Volume 3, Issue 11, 2024.https://www.ijsrmt.com/index.php/ijsrmt/article/view/112  
  3. Bian, J., Al Arafat, A., Xiong, H., Li, J., Li, L., Chen, H., ... & Guo, Z. (2022). Machine learning in real-time Internet of Things (IoT) systems: A survey. IEEE Internet of Things Journal9(11), 8364-8386.
  4. Ebenibo, L.,  Enyejo, J. O., Addo, G., &  Olola, T. M. (2024). Evaluating the Sufficiency of the data protection act 2023 in the age of Artificial Intelligence (AI): A comparative case study of Nigeria and the USA. International Journal of Scholarly Research and Reviews, 2024, 05(01), 088–107. https://srrjournals.com/ijsrr/content/evaluating-sufficiency-data-protection-act-2023-age-artificial-intelligence-ai-comparative
  5. Enyejo, J. O., Adeyemi, A. F., Olola, T. M., Igba, E & Obani, O. Q. (2024). Resilience in supply chains: How technology is helping USA companies navigate disruptions. Magna Scientia Advanced Research and Reviews, 2024, 11(02), 261–277. https://doi.org/10.30574/msarr.2024.11.2.0129
  6. Enyejo, J. O., Adeyemi, A. F., Olola, T. M., Igba, E & Obani, O. Q. (2024). Resilience in supply chains: How technology is helping USA companies navigate disruptions. Magna Scientia Advanced Research and Reviews, 2024, 11(02), 261–277. https://doi.org/10.30574/msarr.2024.11.2.0129
  7. Enyejo, J. O., Babalola, I. N. O., Owolabi, F. R. A. Adeyemi, A. F., Osam-Nunoo, G., & Ogwuche, A. O. (2024). Data-driven digital marketing and battery supply chain optimization in the battery powered aircraft industry through case studies of Rolls-Royce’s ACCEL and Airbus's E-Fan X Projects. International Journal of Scholarly Research and Reviews, 2024, 05(02), 001–020.  https://doi.org/10.56781/ijsrr.2024.5.2.0045.
  8. Enyejo, J. O., Fajana, O. P., Jok, I. S., Ihejirika, C. J.,  Awotiwon,  B. O., & Olola, T. M. (2024). Digital Twin Technology, Predictive Analytics, and Sustainable Project Management in Global Supply Chains for Risk Mitigation, Optimization, and Carbon Footprint Reduction through Green Initiatives. International Journal of Innovative Science and Research Technology, Volume 9, Issue 11, November– 2024.  ISSN No:-2456-2165.   https://doi.org/10.38124/ijisrt/IJISRT24NOV1344
  9. Enyejo, L. A., Adewoye, M. B. & Ugochukwu, U. N. (2024). Interpreting Federated Learning (FL) Models on Edge Devices by Enhancing Model Explainability with Computational Geometry and Advanced Database Architectures. International Journal of Scientific Research in Computer Science, Engineering and Information Technology. Vol. 10 No. 6 (2024): November-December doi : https://doi.org/10.32628/CSEIT24106185
  10. Hayat, M. A., Islam, S., & Hossain, M. F. (2024). Securing the Cloud Infrastructure: Investigating Multi-tenancy Challenges, Modern Solutions and Future Research Opportunities. ResearchGate, Aug.
  11. Idoko, D. O., Olarinoye, H. S., Adepoju, O. A., Folayan, T. A. & Enyejo, L. A. (2024). Exploring the Role of Human Behavior Analytics in Strengthening Privacy-Preserving Systems for Sensitive Data Protection. International Journal of Innovative Science and Research Technology ISSN No:-2456-2165. Volume 9, Issue 12, December – 2024.
  12. Idoko, I. P., Igbede, M. A., Manuel, H. N. N., Adeoye, T. O., Akpa, F. A., & Ukaegbu, C. (2024). Big data and AI in employment: The dual challenge of workforce replacement and protecting customer privacy in biometric data usage. *Global Journal of Engineering and Technology Advances*, 19(02), 089-106. https://doi.org/10.30574/gjeta.2024.19.2.0080
  13. Idoko, I. P., Ijiga, O. M., Enyejo, L. A., Akoh, O., & Isenyo, G. (2024). Integrating superhumans and synthetic humans into the Internet of Things (IoT) and ubiquitous computing: Emerging AI applications and their relevance in the US context. *Global Journal of Engineering and Technology Advances*, 19(01), 006-036.
  14. Igba, E., Adeyemi, A. F., Enyejo, J. O., Ijiga, A. C., Amidu, G., & Addo, G. (2024). Optimizing Business loan and Credit Experiences through AI powered ChatBot Integration in financial services. Finance & Accounting Research Journal, P-ISSN: 2708-633X, E-ISSN: 2708, Volume 6, Issue 8, P.No. 1436-1458, August 2024. DOI:10.51594/farj.v6i8.1406
  15. Ijiga, A. C., Aboi, E. J., Idoko, P. I., Enyejo, L. A., & Odeyemi, M. O. (2024). Collaborative innovations in Artificial Intelligence (AI): Partnering with leading U.S. tech firms to combat human trafficking. Global Journal of Engineering and Technology Advances, 2024,18(03), 106-123. https://gjeta.com/sites/default/files/GJETA-2024-0046.pdf.
  16. Ijiga, A. C., Olola, T. M., Enyejo, L. A., Akpa, F. A., Olatunde, T. I., & Olajide, F. I. (2024). Advanced surveillance and detection systems using deep learning to combat human trafficking. Magna Scientia Advanced Research and Reviews, 2024, 11(01), 267–286. https://magnascientiapub.com/journals/msarr/sites/default/files/MSARR-2024-0091.pdf.
  17. Ijiga, O. M., Idoko, I. P., Ebiega, G. I., Olajide, F. I., Olatunde, T. I., & Ukaegbu, C. (2024). Harnessing adversarial machine learning for advanced threat detection: AI-driven strategies in cybersecurity risk assessment and fraud prevention.
  18. Michael, C. I,  Campbell, T.  Idoko, I. P., Bemologi, O. U.,  Anyebe, A. P.,  & Odeh, I. I. (2024). Enhancing Cybersecurity Protocols in Financial Networks through Reinforcement Learning. International Journal of Scientific Research and Modern Technology (IJSRMT). Vol 3, Issue 9, 2024. Doi:- 10.38124/ijsrmt.v3i9.58 
  19. Ning, L., Ali, Y., Ke, H., Nazir, S., & Huanli, Z. (2020). A hybrid MCDM approach of selecting lightweight cryptographic cipher based on ISO and NIST lightweight cryptography security requirements for internet of health things. IEEE Access8, 220165-220187.
  20. Okeke, R. O., Ibokette, A. I., Ijiga, O. M., Enyejo, L. A., Ebiega, G. I., & Olumubo, O. M. (2024). The reliability assessment of power transformers. *Engineering Science & Technology Journal*, 5(4), 1149-1172.
  21. Panwar, A., Singh, A., Dixit, A., & Parashar, G. (2022). Cloud Computing and Load Balancing: A Review. In 2022 International Conference on Computational Intelligence and Sustainable Engineering Solutions (CISES) (pp. 334-343). IEEE.
  22. Sasikumar, K., & Nagarajan, S. (2024). Comprehensive Review and Analysis of Cryptography Techniques in Cloud Computing. IEEE Access.
  23. Shaikh, Z. A., Hajjej, F., Uslu, Y. D., Yüksel, S., Dınçer, H., Alroobaea, R., ... & Chinta, U. (2024). A new trend in cryptographic information security for industry 5.0: a systematic review. IEEE Access12, 7156-7169.
  24. Soveizi, N., Turkmen, F., & Karastoyanova, D. (2023). Security and privacy concerns in cloud-based scientific and business workflows: A systematic review. Future Generation Computer Systems148, 184-200.
  25. Starks, R. (2022). Exploring the Current Challenges and Developing Reliable Measures to Guarantee the Best Security (Doctoral dissertation, Northcentral University).
  26. Tudesco, D. M., Deshpande, A., Laghari, A. A., Khan, A. A., Lopes, R. T., Jenice Aroma, R., ... & Khan, A. (2024). Utilization of Deep Learning Models for Safe Human‐Friendly Computing in Cloud, Fog, and Mobile Edge Networks. Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat Detection, 221-248.
  27. Yang, P., Xiong, N., & Ren, J. (2020). Data security and privacy protection for cloud storage: A survey. Ieee Access8, 131723-131740.
  28. Zobaed, S. M., & Amini Salehi, M. (2023). Confidential Computing Across Edge‐To‐Cloud for Machine Learning: A Survey Study. Software: Practice and Experience.

Cloud computing has revolutionized data storage and access, but its reliance on multi-tenant environments introduces significant security risks, including unauthorized access, data breaches, and integrity violations. Addressing these challenges, this study presents a hybrid encryption framework integrating Advanced Encryption Standard (AES), Data Encryption Standard (DES), and RC6 algorithms. The framework incorporates file splitting and steganographic key management to ensure robust data protection in cloud environments. The encryption process involves a layered approach where multiple algorithms are applied sequentially to strengthen data security, while file splitting further complicates unauthorized access. The methodology includes a detailed simulation of the hybrid framework in a controlled environment, assessing its performance against key security metrics such as confidentiality, integrity, and availability. Results demonstrate that the proposed model significantly outperforms conventional encryption systems, offering enhanced security without compromising performance. Additionally, the use of steganography for key management ensures secure and seamless user interactions. This research contributes to the advancement of cloud data security by providing a scalable, efficient, and user-friendly encryption model that meets the growing demands of secure cloud computing. The findings are expected to guide the development of more robust security protocols for cloud storage systems, fostering user trust and adoption.

Keywords : Hybrid Encryption Framework; Advanced Encryption Standard (AES); Data Encryption Standard (DES); RC6 Algorithm; Steganographic Key Management and Cloud Data Security.

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe