IJCOPE Journal

UGC Logo DOI / ISO Logo

International Journal of Creative and Open Research in Engineering and Management

A Peer-Reviewed, Open-Access International Journal Supporting Multidisciplinary Research, Digital Publishing Standards, DOI Registration, and Academic Indexing.
Journal Information
ISSN: 3108-1754 (Online)
Crossref DOI: Available
ISO Certification: 9001:2015
Publication Fee: 599/- INR
Compliance: UGC Journal Norms
License: CC BY 4.0
Peer Review: Double Blind
Volume 02, Issue 03

Published on: March 2026 2026

SECURE FILE STORAGE ON CLOUD USING HYBRID CRYPTOGRAPHY

Dhanya P G Amruth Raj D Pranith S Rithik K Sreyas B

Dr S Gunasekaran

Ahalia School of Engineering and Technology Palakkad India

Article Status

Plagiarism Passed Peer Reviewed Open Access

Available Documents

Abstract

Cloud computing gives versatile and taken a toll compelling capacity, but guaranteeing secrecy and strength against advancing dangers remains a challenge. This paper presents a half breed cryptographic system that combines symmetric calculations (AES, Blowfish, ChaCha20) for effective bulk encryption with deviated calculations (RSA/ECC) for secure key trade. A novel calculation turn component powerfully switches encryption strategies based on affectability classification and predefined turn arrangements, diminishing long term presentation to single calculation vulnerabilities. Exploratory assessment illustrates that the proposed framework accomplishes lower encryption time and diminished computational overhead compared to ordinary RSA AES and ECC AES crossovers. Unlike prior RSA-AES or ECC-AES hybrids, our framework integrates dynamic algorithm rotation with hybrid cryptography and enforces metadata security and role-based access control. We further validate the system through formal security analysis, including resistance to chosen-plaintext and chosen-ciphertext attacks, and comparative evaluation against state-of-the-art hybrid frameworks. Results show that algorithm rotation reduces long-term exposure to single-algorithm vulnerabilities while maintaining efficiency, offering a rigorously validated and future-ready solution for secure cloud storage.

How to Cite this Paper

G, D. P., D, A. R., S, P., K, R. & B, S. (2026). Secure File Storage on Cloud Using Hybrid Cryptography. International Journal of Creative and Open Research in Engineering and Management, <i>02</i>(03). https://doi.org/10.55041/ijcope.v2i3.135

G, Dhanya, et al.. "Secure File Storage on Cloud Using Hybrid Cryptography." International Journal of Creative and Open Research in Engineering and Management, vol. 02, no. 03, 2026, pp. . doi:https://doi.org/10.55041/ijcope.v2i3.135.

G, Dhanya,Amruth D,Pranith S,Rithik K, and Sreyas B. "Secure File Storage on Cloud Using Hybrid Cryptography." International Journal of Creative and Open Research in Engineering and Management 02, no. 03 (2026). https://doi.org/https://doi.org/10.55041/ijcope.v2i3.135.

Search & Index

References

[1] O. F. Rashid, S. A. Tuama, I. J. Mohammed, and M. A. Subhi, Our contribution lies in combining algorithm rotation with hybrid cryptography and validating the framework through formal security analysis and comparative evaluation. This ensures novelty beyond existing static hybrids and demonstrates resilience against evolving threats. Future work will extend the model with post-quantum algorithms and formal proofs to further strengthen long-term securityAI-Driven Cryptographic and Steganographic Integration for Enhanced Text Security Using OpenAI API,” Fusion: Practice and Applications (FPA), vol. 19, no. 01, pp. 108–116, 2025. doi: 10.54216/FPA.190110.

[2] R. Akter, M. A. R. Khan, F. Rahman, S. J. Soheli, and N. J. Suha, “RSA and AES Based Hybrid Encryption Technique for Enhancing Data Security in Cloud Computing,” International Journal of Computational and Applied Mathematics & Computer Science, vol. 3, pp. 60–71, 2023. doi: 10.37394/232028.2023.3.8.

[3] P. Selvi and S. Sakthivel, “A hybrid ECC-AES encryption framework for secure and efficient cloud-based data protection,” Scientific Reports, vol. 15, article 30867, 2025. doi: 10.1038/s41598-025-01315-5.

[4] W. Stallings, Cryptography and Network Security: Principles and Practice, 8th ed., Pearson, 2020.

[5] B. Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C, 20th Anniversary Edition, Wiley, 2015.

[6] N. Koblitz, “Elliptic Curve Cryptosystems,” Mathematics of Computation, vol. 48, no. 177, pp. 203–209, 1987.

[7] J. Daemen and V. Rejman, The Design of Rijndael: AES – The Advanced Encryption Standard, Springer-Verlag, 2002.

 

[8] R. L. Rivest, A. Shamir, and L. Adleman, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,” Communications of the ACM, vol. 21, no. 2, pp. 120–126, 1978.

[9] N. Provos and P. Honeyman, “Hide and Seek: An Introduction to Steganography,” IEEE Security & Privacy, vol. 1, no. 3, pp. 32–44, 2003.

[10] M. Krawczyk, R. Canetti, and H. Bellare, “HMAC: Keyed-Hashing for Message Authentication,” RFC 2104, Internet Engineering Task Force, 1997.

Ethical Compliance & Review Process

  • All submissions are screened under plagiarism detection.
  • Review follows editorial policy.
  • Authors retain copyright.
  • Peer Review Type: Double-Blind Peer Review
  • Published on: Mar 26 2026
CCBYNC

This article is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License. You are free to share and adapt this work for non-commercial purposes with proper attribution.

View License
Scroll to Top