Published on: March 2026 2026
SECURE FILE STORAGE ON CLOUD USING HYBRID CRYPTOGRAPHY
Dhanya P G Amruth Raj D Pranith S Rithik K Sreyas B
Dr S Gunasekaran
Article Status
Available Documents
Abstract
How to Cite this Paper
G, D. P., D, A. R., S, P., K, R. & B, S. (2026). Secure File Storage on Cloud Using Hybrid Cryptography. International Journal of Creative and Open Research in Engineering and Management, <i>02</i>(03). https://doi.org/10.55041/ijcope.v2i3.135
G, Dhanya, et al.. "Secure File Storage on Cloud Using Hybrid Cryptography." International Journal of Creative and Open Research in Engineering and Management, vol. 02, no. 03, 2026, pp. . doi:https://doi.org/10.55041/ijcope.v2i3.135.
G, Dhanya,Amruth D,Pranith S,Rithik K, and Sreyas B. "Secure File Storage on Cloud Using Hybrid Cryptography." International Journal of Creative and Open Research in Engineering and Management 02, no. 03 (2026). https://doi.org/https://doi.org/10.55041/ijcope.v2i3.135.
References
[1] O. F. Rashid, S. A. Tuama, I. J. Mohammed, and M. A. Subhi, “Our contribution lies in combining algorithm rotation with hybrid cryptography and validating the framework through formal security analysis and comparative evaluation. This ensures novelty beyond existing static hybrids and demonstrates resilience against evolving threats. Future work will extend the model with post-quantum algorithms and formal proofs to further strengthen long-term securityAI-Driven Cryptographic and Steganographic Integration for Enhanced Text Security Using OpenAI API,” Fusion: Practice and Applications (FPA), vol. 19, no. 01, pp. 108–116, 2025. doi: 10.54216/FPA.190110.[2] R. Akter, M. A. R. Khan, F. Rahman, S. J. Soheli, and N. J. Suha, “RSA and AES Based Hybrid Encryption Technique for Enhancing Data Security in Cloud Computing,” International Journal of Computational and Applied Mathematics & Computer Science, vol. 3, pp. 60–71, 2023. doi: 10.37394/232028.2023.3.8.
[3] P. Selvi and S. Sakthivel, “A hybrid ECC-AES encryption framework for secure and efficient cloud-based data protection,” Scientific Reports, vol. 15, article 30867, 2025. doi: 10.1038/s41598-025-01315-5.
[4] W. Stallings, Cryptography and Network Security: Principles and Practice, 8th ed., Pearson, 2020.
[5] B. Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C, 20th Anniversary Edition, Wiley, 2015.
[6] N. Koblitz, “Elliptic Curve Cryptosystems,” Mathematics of Computation, vol. 48, no. 177, pp. 203–209, 1987.
[7] J. Daemen and V. Rejman, The Design of Rijndael: AES – The Advanced Encryption Standard, Springer-Verlag, 2002.
[8] R. L. Rivest, A. Shamir, and L. Adleman, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,” Communications of the ACM, vol. 21, no. 2, pp. 120–126, 1978.
[9] N. Provos and P. Honeyman, “Hide and Seek: An Introduction to Steganography,” IEEE Security & Privacy, vol. 1, no. 3, pp. 32–44, 2003.
[10] M. Krawczyk, R. Canetti, and H. Bellare, “HMAC: Keyed-Hashing for Message Authentication,” RFC 2104, Internet Engineering Task Force, 1997.
Ethical Compliance & Review Process
- •All submissions are screened under plagiarism detection.
- •Review follows editorial policy.
- •Authors retain copyright.
- •Peer Review Type: Double-Blind Peer Review
- •Published on: Mar 26 2026
This article is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License. You are free to share and adapt this work for non-commercial purposes with proper attribution.
← Previous Article
Satellite Image Resolution Enhancement by using DWT.Next Article →
Seismic Isolation for Building Structure

