2025/04/26, Volume 13, Issue 1, pp.9-15
Designing Advanced Cryptographic Solutions for Cloud Storage Security through Dual-Layer Encryption Protocols
Paul Kobina Arhin Jnr, James Ben Hayfron-Acquah, Frimpong Twum and Alfred Kumah Abstract: This paper presents a novel hybrid cryptosystem combining ElGamal and ChaCha20-Poly1305 for securing data in cloud storage environments. Elgamal, an asymmetric encryption algorithm is utilized for secure key exchange to ensure the safe transmission of keys. ChaCha20-Poly1305, a high-performance symmetric encryption algorithm is used for efficient data encryption and authentication, thereby addressing the performance limitations of using traditional asymmetric algorithms alone. Using ChaCha20-Poly1305 for bulk data encryption and transmission significantly improves speed and reduces computational overhead compared to using only asymmetric algorithm. This makes it ideal for modern cloud storage applications. This novel system is made to provide robust defence against common cloud-based attacks such as eavesdropping, replay attacks, brute force and man-in-the-middle attacks. By making use of the strengths of both asymmetric and symmetric encryption algorithms, the system will ensure high security with better performance. The proposed hybrid Algorithm was tested and compared with the traditional Elgamal alone, and it achieved 83% faster encryption, 79.5% faster decryption and 69.5% lower memory usage. This shows its efficiency for secure cloud data storage and transmission.
Keywords: Cloud Storage, Data Integrity, Hybrid Cryptosystem, ChaCha20-Poly1305, ElGamal Encryption.
DOI: 10.25673/119210
Download: PDF
References:
- I. Odun-Ayo, O. O. Ajayi, B. Akanle, and R. Ahuja, “An Overview of Data Storage in Cloud Computing,” 2017 Int. Conf. Next Gener. Comput. Inf. Syst. (ICNGCIS), pp. 29-34, 2017, [Online]. Available: https://doi.org/10.1109/ICNGCIS.2017.9.
- F. Safar and R. Al King, “Data Security in Cloud Computing,” Int. J. Wireless Ad Hoc Commun., vol. 7, no. 1, 2023, [Online]. Available: https://doi.org/10.54216/ijwac.070105.
- W. E. Kedi, C. Ejimuda, and M. D. Ajegbile, “Cloud computing in healthcare: A comprehensive review of data storage and analysis solutions,” World Journal of Advanced Engineering Technology and Sciences, 2024, [Online]. Available: https://doi.org/10.30574/wjaets.2024.12.2.0291.
- R. Sivan and Z. Zukarnain, “Security and Privacy in Cloud-Based E-Health System,” Symmetry, vol. 13, p. 742, 2021, [Online]. Available: https://doi.org/10.3390/sym13050742.
- S. Reema, “Cloud Computing as a Solution for Security and Privacy Concerns,” Int. J. Res. Appl. Sci. Eng. Technol., 2023, [Online]. Available: https://doi.org/10.22214/ijraset.2023.49375.
- M. Joshi, R. Priya, and M. M. Joshi, “A Review: Analysis of Various Encryption Techniques for Securing Cloud Data,” 2022 4th Int. Conf. Adv. Comput. Commun. Control Netw. (ICAC3N), pp. 1945-1948, 2022, [Online]. Available: https://doi.org/10.1109/ICAC3N56670.2022.10074465.
- M. A. Althamir, A. Alabdulhay, and M. M. Yasin, “A Systematic Literature Review on Symmetric and Asymmetric Encryption Comparison Key Size,” 2023 3rd International Conference on Smart Data Intelligence (ICSMDI), pp. 110-117, 2023, [Online]. Available: https://doi.org/10.1109/ICSMDI57622.2023.00027.
- J. Khudair, K. A. Ghan, and M. R. B. Baharon, “Comparative Study in Enhancing AES Algorithm: Data Encryption,” Wasit Journal for Pure Sciences, 2023, [Online]. Available: https://doi.org/10.31185/wjps.100.
- A. V., A. P. Nirmala, B. K., Aldred Christi, and N. A., “A Review on Cloud Cryptography Techniques to Improve Security in E-health Systems,” 2022 6th International Conference on Computing Methodologies and Communication (ICCMC), pp. 100-104, 2022, [Online]. Available: https://doi.org/10.1109/ICCMC53470.2022.9753999.
- A. Emmanuel, O. Aderemi, A. O., and A. O., “A Note on Time and Space Complexity of RSA and ElGamal Cryptographic Algorithms,” International Journal of Advanced Computer Science and Applications (IJACSA), vol. 12, no. 7, 2021, [Online]. Available: https://doi.org/10.14569/ijacsa.2021.0120716.
- T. Rezk, R. Bhargavan, and M. Blanchet, “Security Analysis of ElGamal Implementations,” Inria, 2018.
- M. Kumar, R. Sharma, and P. Bhushan, “An Optimal and Efficient Data Security Technique Through Crypto-Stegano for E-Commerce,” Computational Intelligence and Neuroscience, vol. 2023, no. 9906588, pp. 1-10, 2023, [Online]. Available: https://doi.org/10.1155/2023/9906588.
- H. Guo, X. Li, and J. Zhang, “A Novel Image Encryption Algorithm Based on ElGamal Cryptography and Chaotic System,” Physica Scripta, vol. 98, no. 11, pp. 1-12, 2023, [Online]. Available: https://doi.org/10.1088/1402-4896/98/11/115251.
- V. O. Waziri, J. Ojeniyi, H. Danladi, A. Isah, A. S. Magaji, and M. Abdullahi, “Network Security in Cloud Computing with Elliptic Curve Cryptography,” Network and Communication Technologies, vol. 2, no. 2, pp. 43-58, 2013, [Online]. Available: https://doi.org/10.5539/nct.v2n2p43.
- V. Satheesh and D. Shanmugam, “Implementation Vulnerability Analysis: A case study on ChaCha of SPHINCS,” 2020 IEEE International Symposium on Smart Electronic Systems (iSES), pp. 97-102, 2020, [Online]. Available: https://doi.org/10.1109/iSES50453.2020.00032.
- S. H. Tariq, R. P. Singh, and J. Gill, “Preserving Privacy in Industrial IoT: A Machine Learning Framework Enhanced by Poly1305 Encryption,” International Journal for Research in Applied Science and Engineering Technology, 2023, [Online]. Available: https://doi.org/10.22214/ijraset.2023.55767.
- Y. Peng, W. Zhao, F. Xie, Z. Dai, Y. Gao, and D. Chen, “Secure cloud storage based on cryptographic techniques,” J. China Univ. Posts Telecommun., vol. 19, pp. 182-189, 2012, [Online]. Available: https://doi.org/10.1016/S1005-8885(11)60424-X.
- D. Salman and N. Sulaiman, “A Review of Encryption Algorithms for Enhancing Data Security in Cloud Computing,” AlKadhim J. Comput. Sci., 2024, [Online]. Available: https://doi.org/10.61710/kjcs.v2i1.68.
- S. Ahmad and A. Garko, “Hybrid Cryptography Algorithms in Cloud Computing: A Review,” 2019 15th Int. Conf. Electron. Comput. Computat. (ICECCO), pp. 1-6, 2019, [Online]. Available: https://doi.org/10.1109/ICECCO48375.2019.9043254.
- H. Sharma, R. Kumar, and M. Gupta, “A Review Paper on Hybrid Cryptographic Algorithms in Cloud Network,” 2023 2nd Int. Conf. Innov. Technol. (INOCON), pp. 1-5, 2023, [Online]. Available: https://doi.org/10.1109/INOCON57975.2023.10101044.
- S. Kaur and L. Jain, “A Hybrid Cryptographic Scheme for Improving Cloud Security Using ECC and TDES Algorithms,” Curr. J. Appl. Sci. Technol., vol. 39, no. 4, pp. 73-84, 2020, [Online]. Available: https://doi.org/10.9734/CJAST/2020/V39I4731184.
- R. Mendez, “Enhance Data Storage Security DNA Cryptography in Cloud,” 2020.
- A. Kavya and S. Acharva, “A Comparative Study on Homomorphic Encryption Schemes in Cloud Computing,” 2018 3rd IEEE Int. Conf. Recent Trends Electron. Inf. Commun. Technol. (RTEICT), pp. 112-116, 2018, [Online]. Available: https://doi.org/10.1109/RTEICT42901.2018.9012261.
- M. Madhavi and D. Sivareddy, “A Review of Research on Dual-Server Public-Key Encryption with Keyword Search for Secure Cloud Storage,” Int. J. Res., vol. 4, pp. 630-638, 2017.
- A. Gadad and D. Anbusezhiyan, “Cloud security: literature survey,” Int. J. Electr. Comput. Eng. (IJECE), vol. 13, no. 4, pp. 4734-4742, 2023, [Online]. Available: https://doi.org/10.11591/ijece.v13i4.pp4734-4742.
- A. Sharma, R. S. Thakur, and S. Jaloree, “Analyzing the Behavior of Symmetric Algorithms Usage in Securing and Storing Data in Cloud,” Springer, pp. 381-389, 2018, [Online]. Available: https://doi.org/10.1007/978-981-10-5523-2_35.
- K. Sasikumar and S. Nagarajan, “Comprehensive Review and Analysis of Cryptography Techniques in Cloud Computing,” IEEE Access, vol. 12, pp. 52325-52351, 2024, [Online]. Available: https://doi.org/10.1109/ACCESS.2024.3385449.
- S. Njuki, J. Zhang, E. C. Too, and R. Richard, “An Evaluation on Securing Cloud Systems based on Cryptographic Key Algorithms,” Proceedings of the 2nd International Conference on Algorithms, Computing and Systems, 2018, [Online]. Available: https://doi.org/10.1145/3242840.3242853.
- N. L. Kodumru and M. Supriya, “Secure Data Storage in Cloud Using Cryptographic Algorithms,” 2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA), 2018, [Online]. Available: https://doi.org/10.1109/ICCUBEA.2018.8697550.
- D. S. S. Marar, J. M. Joyson, and L. Ashish, “Secure Cloud Storage Using Different Algorithms in Cryptography,” International Journal for Research in Applied Science and Engineering Technology, 2022, [Online]. Available: https://doi.org/10.22214/ijraset.2022.43500.
- A. Poduval, A. Doke, H. Nemade, and R. Nikam, “Secure File Storage on Cloud using Hybrid Cryptography,” International Journal of Computer Sciences and Engineering, vol. 7, no. 1, 2019, [Online]. Available: https://doi.org/10.26438/ijcse/v7i1.587591.
|

HOME

- Call for Papers
- Paper Submission
- For Authors
- For Reviewers
- Important Dates
- Conference Committee
- Editorial Board
- Reviewers
- Last Proceedings

PROCEEDINGS
-
Volume 13, Issue 1 (ICAIIT 2025)
-
Volume 12, Issue 2 (ICAIIT 2024)
-
Volume 12, Issue 1 (ICAIIT 2024)
-
Volume 11, Issue 2 (ICAIIT 2023)
-
Volume 11, Issue 1 (ICAIIT 2023)
-
Volume 10, Issue 1 (ICAIIT 2022)
-
Volume 9, Issue 1 (ICAIIT 2021)
-
Volume 8, Issue 1 (ICAIIT 2020)
-
Volume 7, Issue 1 (ICAIIT 2019)
-
Volume 7, Issue 2 (ICAIIT 2019)
-
Volume 6, Issue 1 (ICAIIT 2018)
-
Volume 5, Issue 1 (ICAIIT 2017)
-
Volume 4, Issue 1 (ICAIIT 2016)
-
Volume 3, Issue 1 (ICAIIT 2015)
-
Volume 2, Issue 1 (ICAIIT 2014)
-
Volume 1, Issue 1 (ICAIIT 2013)

PAST CONFERENCES
ICAIIT 2025
-
Photos
-
Reports
ICAIIT 2024
-
Photos
-
Reports
ICAIIT 2023
-
Photos
-
Reports
ICAIIT 2021
-
Photos
-
Reports
ICAIIT 2020
-
Photos
-
Reports
ICAIIT 2019
-
Photos
-
Reports
ICAIIT 2018
-
Photos
-
Reports
ETHICS IN PUBLICATIONS
ACCOMODATION
CONTACT US
|
|