Proceedings of International Conference on Applied Innovation in IT
2025/06/27, Volume 13, Issue 2, pp.17-24
Secure Data Management Via Lightweight Cryptographic Frameworks: A Comparative Study of ChaCha20 for Encryption and SHA-256 for Hashing Secure Using a Big Data
Azhar Sadiq Jafer and Huda Najeh Abbood Abstract: With the advent of large-scale data applications, the security and efficiency of cryptographic systems have become two critical concerns. In this paper we present a cryptographic solution that combines the ChaCha20 encryption algorithm and SHA-256 hashing to provide data confidentiality and integrity. The system works on data in chunks to optimize for memory usage and scaling from 10 MB to 1 GB datasets. While achieving low resource utilization (CPU usage < 12% and a memory footprint < 50 MB) the proposed technique achieves cipher and decipher rates up to 88 MB/s with significant performance gain. SHA-256 based integrity verification achieved 100% accuracy, preventing tampering and corruption. The comparison with conventional systems (e.g., AES, MD5) reflected the superiority of the proposed system in various factors (i.e., speed, resource efficiency, and robustness). The system also proved capable of supporting large datasets through scalability testing, enabling uses in cloud storage, IoT security, and secure communications. These findings highlight the proposed system's ability as a lightweight and scalable cryptographic solution to meet the data security demands of the advanced digital era. With the rise of IoT and cloud computing, traditional encryption like AES struggles with high memory usage in resource-constrained devices. This paper proposes a lightweight framework combining ChaCha20 (for encryption) and SHA-256 (for integrity), optimized for big data. Our chunk-based approach achieves 88 MB/s throughput with <12% CPU usage, outperforming AES in software environments. Experimental results on datasets up to 1GB demonstrate 100% tamper detection accuracy, making it ideal for IoT and real-time applications.
Keywords: ChaCha20, Encryption, Decryption, Security, Big Data, SHA256.
DOI: 10.25673/120390
Download: PDF
References:
- R.G., S. Kumar, and A. Sharma, "Selective Text Encryption for E-Governance," in Proc. 5th Int. Conf. Emerging Technol. Trends, pp. 267-278, 2023.
- J.K., M. Patel, and R. Gupta, "Performance Metrics for Cryptographic Algorithms: An Overview," IEEE Internet of Things Journal, vol. 9, no. 6, pp. 4357-4370, 2022.
- S.K. and A. Singh, "Securing Mobile Messages Using AES and Blockchain," ResearchGate Preprint, 2023.
- N.M., P. Singh, and D. Sharma, "Rotor64: A Modern Lightweight Cryptography Mechanism," Multimedia Tools and Applications, 2023.
- L.W., H. Zhao, and Y. Chen, "Advanced Cryptographic Techniques for Secure Cloud Systems," IEEE Cloud Computing, vol. 9, no. 4, pp. 17-26, 2021.
- A. Kumar, V. Patel, and M. Shah, "ChaCha20 vs. AES-256: A Performance Benchmark in Edge Devices," IEEE Transactions on Cloud Computing, vol. 11, no. 2, pp. 345-360, 2023.
- A. Sharma, "Hybrid Cryptographic Systems: Balancing Efficiency and Security," IEEE Access, vol. 8, pp. 89763-89772, 2021.
- S. Lee and P.H. Lee, "Secure Nonce Generation for Lightweight Cryptography in IoT Networks," Journal of Network and Computer Applications, vol. 215, pp. 103-118, 2024.
- Y.Z., T. Liu, and M. Wang, "DNA Coding and Chaotic Maps for Secure Encryption," Human-centric Computing and Information Sciences, vol. 12, pp. 16-30, 2022.
- R. Patel and A.J. Patel, "Performance Trade-offs Between SHA-256 and BLAKE3 in Real-Time Systems," IEEE Internet of Things Journal, vol. 10, no. 5, pp. 4321-4335, 2023.
- C. Peikert, "Post-Quantum Cryptography: Security in the Quantum Era," IEEE Transactions on Information Theory, vol. 67, no. 10, pp. 6679-6719, 2021.
- Y. Zhang, L. Zhou, and P. Zhao, "Efficient Data Integrity Verification for Cloud Storage Using SHA-256 and Merkle Trees," Future Generation Computer Systems, vol. 148, pp. 200-215, 2023.
- I. Mishkhal, N. Abdullah, H.H. Saleh, N.I.R. Ruhaiyem, and F.H. Hassan, "Facial Swap Detection Based on Deep Learning: Comprehensive Analysis and Evaluation," Iraqi Journal for Computer Science and Mathematics, vol. 6, no. 1, Article 8, 2025, [Online]. Available: https://doi.org/10.52866/2788-7421.1229
- S.R. Das and R.C.A. Das, "Lightweight Cryptography for IoT Devices: Challenges and Future Directions," Springer Advances in Intelligent Systems and Computing, vol. 1042, pp. 141-153, 2020.
- D. Bernstein, "The ChaCha20 Encryption Algorithm: High-Speed and Secure," IETF RFC 8439, 2018.
- S.T., M. Johnson, and K. Brown, "Performance Evaluation of Stream Ciphers: A Case Study of ChaCha20," IEEE Access, vol. 9, pp. 120437-120446, 2021.
- NIST, "Secure Hash Standard (SHS): SHA-256 and SHA-3 Families," NIST Special Publication, 2020.
- R.R., L. Anderson, and J. Clark, "Hash Functions for Cryptographic Integrity," ACM Computing Surveys, vol. 53, no. 4, pp. 1-29, 2021.
- H.L. Kim and S.P.J. Kim, "Performance and Resource Utilization Analysis of Lightweight Cryptographic Algorithms," IEEE IoT Journal, vol. 8, no. 5, pp. 3205-3218, 2021.
|

HOME

- Conference
- Journal
- Paper Submission to Journal
- For Authors
- For Reviewers
- Important Dates
- Conference Committee
- Editorial Board
- Reviewers
- Last Proceedings

PROCEEDINGS
-
Volume 13, Issue 2 (ICAIIT 2025)
-
Volume 13, Issue 1 (ICAIIT 2025)
-
Volume 12, Issue 2 (ICAIIT 2024)
-
Volume 12, Issue 1 (ICAIIT 2024)
-
Volume 11, Issue 2 (ICAIIT 2023)
-
Volume 11, Issue 1 (ICAIIT 2023)
-
Volume 10, Issue 1 (ICAIIT 2022)
-
Volume 9, Issue 1 (ICAIIT 2021)
-
Volume 8, Issue 1 (ICAIIT 2020)
-
Volume 7, Issue 1 (ICAIIT 2019)
-
Volume 7, Issue 2 (ICAIIT 2019)
-
Volume 6, Issue 1 (ICAIIT 2018)
-
Volume 5, Issue 1 (ICAIIT 2017)
-
Volume 4, Issue 1 (ICAIIT 2016)
-
Volume 3, Issue 1 (ICAIIT 2015)
-
Volume 2, Issue 1 (ICAIIT 2014)
-
Volume 1, Issue 1 (ICAIIT 2013)

PAST CONFERENCES
ICAIIT 2025
-
Photos
-
Reports
ICAIIT 2024
-
Photos
-
Reports
ICAIIT 2023
-
Photos
-
Reports
ICAIIT 2021
-
Photos
-
Reports
ICAIIT 2020
-
Photos
-
Reports
ICAIIT 2019
-
Photos
-
Reports
ICAIIT 2018
-
Photos
-
Reports
ETHICS IN PUBLICATIONS
ACCOMODATION
CONTACT US
|
|