Abstract

The safeguarding of data from illegal access, use, disclosure, disruption, alteration, or destruction is referred to as data security. Data security is crucial for safeguarding the privacy, availability, and integrity of data as well as for assuring compliance with the rules and laws that control how sensitive data is handled. A potent approach for protecting digital data, including files, is hybrid cryptography. Hybrid cryptography offers quick and secure communication and storage of sensitive information by combining the benefits of both symmetric-key and public-key cryptography. A file is encrypted using a symmetric key in a hybrid cryptography system for secure file storage, and the file is then further encrypted using the recipient's public key. The recipient can then ensure that only permitted parties can access the file by decrypting the symmetric key with their private key. This method is well-liked for safeguarding sensitive data in a number of circumstances because it combines the symmetric key cryptography's effectiveness with the security of public-key cryptography. The need for storing and protecting huge volumes of data grows significantly with evolving technologies. Massive attacks like phishing and malware can target data that is stored in a large number of files. These massive amounts of data could be misused, which could seriously harm the organizations. A local server is incapable of storing a large amount of data. Thus, the use of clouds is considered. Users no longer need to purchase expensive gear thanks to the groundbreaking architecture of cloud computing; however, the rapid adoption of clouds poses various security issues Hacking has become such a major issue in recent years that cloud data security is the main issue. AES, DES, and RSA are only a few of the many algorithms that have been tried and failed to safeguard data. As a result, this study has proposed a method for protecting critical data files and also proposed an algorithm to secure communication and protect data from unauthorized access.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call