TSPaper 1
TSPaper 1
  ABSTRACT In the rapidly evolving realm of cloud computing security, this paper introduces an innovative
  solution to address persistent challenges. The proliferation of cloud technology has brought forth heightened
  concerns regarding data security, necessitating novel approaches to safeguarding sensitive information.
  The issue centers on the vulnerability of cloud-stored data, usually necessitating enhanced encryption
  and key management strategies. Traditional methods usually fall short in mitigating risks associated with
  compromised encryption keys and centralized key storage. To combat these challenges, our proposed
  solution encompasses a two-phase approach. In the first phase, dynamic Advanced Encryption Standard
  (AES) keys are generated, ensuring each file’s encryption with a unique and ever-changing key. This
  approach significantly enhances file-level security, curtailing an attacker’s ability to decrypt multiple files
  even if a key is compromised. The second phase introduces blockchain technology, where keys are securely
  stored with accompanying metadata, bolstering security and data integrity. Elliptic Curve Cryptography
  (ECC) public key encryption enhances security during transmission and storage, while also facilitating
  secure file sharing. In conclusion, this comprehensive approach enhances cloud security, providing robust
  encryption, decentralized key management, and protection against unauthorized access. Its scalability and
  adaptability make it a valuable asset in contemporary cloud security paradigms, assuring users of data
  security in the cloud.
INDEX TERMS AES, blockchain, cloud computing, cloud storage, dynamic encryption, ECC.
monitoring stored data. To address this imperative and foster                     Advanced Encryption Standard (AES). This method
broad user acceptance, a multitude of data and resource                           is characterized by its dynamic and efficient key
protection strategies have been introduced and integrated                         generation mechanism, which bolsters the security of
within the domain of cloud security, leveraging contemporary                      file storage in the cloud.
cryptographic algorithms.                                                     •   Blockchain-Powered Key Security: A notable contribu-
   Data protection through encryption in the cloud entails                        tion lies in the integration of Blockchain technology to
the implementation of robust security measures to safeguard                       secure cryptographic keys within the cloud environment.
customer data within server centers against external and                          This ensures the robust protection of encryption keys and
internal threats, facilitated by encryption algorithms [5].                       safeguards against potential security breaches.
Two primary categories of encryption methods, supported                       •   User-Friendly Key Management: The article streamlines
by cryptographic keys, are symmetric and asymmetric                               the process of key management for end-users. This
cryptography [6]. The selection between these methods                             simplification empowers users to efficiently manage the
hinges on the number of keys employed: one key for                                substantial volume of dynamic keys required for encryp-
symmetric cryptography and a pair of keys for asymmetric                          tion tasks, thereby enhancing usability and security in
encryption/decryption. The use of larger and more intricate                       cloud-based storage systems.
keys enhances the security of encryption algorithms and
renders attacks more formidable.
   Conversely, cloud users have the opportunity to bolster                  II. BACKGROUND AND METHODOLOGY
trust and enhance data protection when engaging in out-                     A. DYNAMIC ENCRYPTION
sourcing and cloud services by harnessing the innovative and                In contrast to the conventional practices of encrypting data
emerging technology of Blockchain [7]. Blockchain security                  either at rest (i.e., during storage) or during transmission
offers a more complex and reliable paradigm than centralized                (i.e., while traversing a network), dynamic encryption,
database security. Blockchain works by keeping track of                     also referred to as ‘‘runtime encryption’’ or ‘‘real-time
documents in a ledger that are safely connected to earlier                  encryption,’’ encompasses the process of encrypting data as
blocks using cryptographic hash algorithms. A blockchain                    it is generated or accessed. Dynamic encryption ensures the
is a type of distributed ledger that is used to record                      protection of data from the moment of its creation or access
transactions and prevent tampering. Usually run via a peer-                 until it is no longer required.
to-peer network, the Blockchain is designed specifically to                     Key characteristics and principles associated with dynamic
prevent unwanted manipulation. As a result, Blockchain can                  encryption include the following:
furnish security measures on par with those found in central
database storage, effectively averting potential attacks and                  •   Encryption in Real-Time [9]: Dynamic encryption
data breaches from a managerial perspective.                                      secures data while it is in use, typically employing
   Furthermore, in scenarios where data transparency is                           encryption keys generated or derived in the active
imperative, Blockchain’s inherent attribute of openness can                       process. This ensures data security during processing,
facilitate the necessary level of data transparency [8].                          transfer, or utilization.
Because of these unique benefits, Blockchain is used in a                     •   Data-in-Use Protection [10]: Dynamic encryption safe-
variety of industries, such as finance and the Internet of                        guards data during its active utilization, ensuring encryp-
Things (IoT) ecosystem, and its use is expected to grow                           tion even when authorized users access it or applications
dramatically. In light of its effectiveness and accessibility,                    process it. That sets it apart from data-in-transit encryp-
numerous IT environments have embraced cloud computing.                           tion (like file encryption on storage devices) and data-at-
Consequently, there has been a heightened focus on exploring                      rest encryption (like network transmission encryption).
critical security facets concerning cloud security and privacy                •   Granular Access Control [11]: is frequently used in
issues.                                                                           tandem with dynamic encryption, gives businesses the
   This paper introduces a novel approach aimed at enhancing                      ability to specify who can access data and under what
file storage security within the cloud infrastructure. This                       conditions. Permissions granted to the user, the time, the
approach leverages a hybrid dynamic encryption technique,                         place, and other pertinent variables can all be used to
incorporating elements of Elliptic Curve Cryptography,                            restrict access.
Advanced Encryption Standard, and Blockchain technology.                      •   Adaptive Security [12]: Dynamic encryption demon-
The primary objective is to establish a highly secure                             strates flexibility in reaction to changing security sce-
environment conducive to elevating the overall security of                        narios. For example, according on the perceived danger
cloud-based storage solutions.                                                    level or the sensitivity of the material, the encryption
   The article’s primary contributions are encapsulated within                    strength and key management may be changed.
the following key points:                                                     •   Robust Authentication [13]: Strict authentication pro-
                                                                                  cedures are often included with dynamic encryption to
   •   Dynamic AES File Encryption: The article introduces                        guarantee that only authorized entities-individuals or
       an innovative approach to file encryption utilizing the                    systems-are able to access encrypted data. Techniques
      such as digital certificates and multi-factor authentica-     TLS protocol, that establish a secure internet connection. The
      tion may be deployed for this purpose.                        prime modulus p, the generator point G, the elliptic curve’s
  •   Key Management [14]: Managing keys well is essential          coefficients a and b, and the order of the generator point n
      when it comes to dynamic encryption. To maintain the          are input parameters for the ECC method. The public key Q
      security of encrypted data, encryption keys must be           is determined as dG, while the private key d is produced as a
      generated, stored, cycled, and destroyed on time and          random integer between 1 and n − 1.
      securely.                                                        Considering the aforementioned points, ECC is a secure
   In order to protect sensitive data, dynamic encryption           and efficient encryption algorithm which can be used for a
adds an extra layer of security, reducing the danger of data        wide range of applications consisting of those that require the
breaches and illegal access. It is frequently used in situations    use of mobile gadgets.
like secure communications, financial transactions, health-            An equation: y2 = x 3 + ax + b is an equation of an elliptic
care, and cloud computing, where data security and privacy          curve. In this equation, the constants a and b represent the
are crucial.                                                        shape of the curve which looks like an elongated circle or
                                                                    oval. The curve contains point at infinity which is involved in
                                                                    the point addition operation and it also has locations where
B. AES
                                                                    y2 = x 3 + ax + b.
In 2000, the NIST intentionally selected Rijndael as the               The algorithm starts with a point P and perform a point
advanced encryption standard due to its outstanding qualities       doubling or point addition operation to create points on the
in terms of security, performance, and elegance. As per NIST        curve. A point P on the curve is used as input for the point
guidelines, the symmetric encryption method AES has a               doubling operation, which outputs a new point 2P. When two
block size of 128 bits. A key feature is that AES can vary          points P and Q are added together, a third point R, which is
the number of encryption rounds according to the size of the        also on the curve, is produced.
encryption key. More specifically, For a 128-bit key, the AES
uses 10 rounds of encryption; for 192-bit and 256-bit keys,
it uses 12 rounds and 14 rounds, respectively [15].                 D. BLOCKCHAIN TECHNOLOGY
   The fundamental building blocks of each encryption round         Blockchain technology has recently garnered potential to
in AES encompass SubBytes, ShiftRows, MixColumns, and               revolutionize several industries, including cloud computing
AddRoundKey operations. Among these, the AddRoundKey                recently [18]. The urgency with which this problem must
operation assumes paramount importance as it executes an            be solved in order to improve cloud data storage security is
exclusive OR (XOR) operation between the input state matrix         highlighted. Because blockchain technology is known for its
and the cryptographic key. It is noteworthy that in the             immutable, transparent, and secure record-keeping, it appears
traditional AES framework, each round key is generated by           to be a viable solution. Blockchain integration with cloud
means of a predetermined key expansion process.                     computing systems seems to be a good fit because of its
   The selection of Rijndael as the advanced encryption             decentralized architecture, which protects against fraud and
standard, its block length, the variable number of encryp-          manipulation.
tion rounds, and the integral components of AES rounds,                The application of blockchain technology holds promise
including the critical AddRoundKey operation, collectively          in addressing several critical issues within the realm of
contribute to the robustness and effectiveness of this widely       cloud security research. Blockchain technology may provide
adopted encryption algorithm [16].                                  a strong answer to this issue by utilizing smart contracts that
                                                                    are able to confirm device identities and authorize network
C. ELIPTIC CURVE CRYPTOGRAPHY                                       access in accordance with predetermined standards [19].
Elliptic Curve Cryptography, which also know as ECC, is a              Numerous research endeavors have explored the utilization
method for encrypting and decrypting data that creates a            of blockchain technology to enhance cloud security. These
pair of keys by mathematically connecting each point on an          studies include the use of blockchain-based solutions to
elliptic curve to a specific set of public and private keys [17].   protect the privacy and integrity of data, enable private
But the public key is distributed, the private key remains          communication in cloud services, and provide secure device
private. To guarantee the security of data being transmitted        identification. Still, more study is required to fully understand
through ECC the sender has to get the recipient’s public key        how blockchain technology might improve cloud security and
first. The data is then encrypted using the public key and          to determine the best ways to put it into practice.
can be unencrypted only with the recipient’s private key. The          Public and private blockchains exhibit marked dispar-
data can be viewed only by the intended receiver when the           ities in terms of their decentralization paradigms. While
encryption method is applied.                                       private blockchains act as closed, limited networks, public
   Many applications from Virtual Private Networks (VPNs)           blockchains are open, decentralized, and welcome participa-
to file transfers and secure email protocols employ the             tion from everybody interested [20]. Consequently, private
currently popular methods, the so-called ECC. It is also            blockchains, in theory, offer superior efficiency and security
utilized in the design of cryptographic protocols such as the       attributes when compared to their public counterparts.
However, more centralization and decreased transparency are                 from different forms of cyberattacks. These featured pro-
the cost paid for this improved performance.                                cesses are enabled by the system’s remarkable capability to
   In this paper, a private blockchain has been employed as the             use biometric authentication correctly that was achieved by
chosen framework for implementing blockchain technology                     developing a strong approval procedure which follows the
to enhance the security of data within cloud storage systems.               rule of permissions and requirements to the latter.
                                                                               In 2023, An novel Non-Deterministic Cryptographic
III. RELATED WORKS                                                          Scheme (NCS) solution has been proposed to ensure
The growing adoption of cloud storage can be attributed                     data confidentiality and privacy in cloud environments,
to its convenient accessibility, resource efficiency, and cost-             incorporating Sliding Window Algorithm (SWA), Linear
effectiveness. However, ensuring user privacy during data                   Congruential Generator (LGC), and XOR implementation.
transfers to the cloud requires implementing technologies                   The suggested method’s strength was compared with the
that guarantee data privacy and integrity. This aspect holds                encryption algorithms of AES, RSA, and DES to show
particular significance within the related work context, where              its superiority in terms of execution time. The resolution
investigating diverse techniques for enhancing security in                  presented in [25] also emphasized striking a balance between
data migration to the cloud remains a central focus.                        the encryption algorithm’s strength and efficiency in relation
   In 2021, [21] introduced a new Lightweight Cryptographic                 to the volume of data.
Algorithm named (NLCA), which operates as a 16-byte block                      In 2023, the solution in [26] proposed utilizing AES, RSA,
cipher and utilizes a 16-byte key for encryption within cloud               DES, and Blowfish encryption algorithms to elevate data
environments. The objective of this proposal is to enhance                  security within a cloud environment. The solution is including
data security. Notably, the algorithm exhibits a flexible nature            computing time, strength of encryption, and resource use
while concurrently achieving optimal encryption speed and                   is carried out to undertake a thorough performance evalua-
an elevated level of security which is accomplished by incor-               tion of these methods. The comparison analysis’s findings
porating supplementary logical operations, distinguishing                   demonstrate the AES algorithm’s superiority in terms of
NLCA from other encryption algorithms.                                      cryptographic resilience and encryption speed.
   In 2021, Hybrid algorithms have demonstrated their
effectiveness in enhancing data protection within the cloud                 IV. PROPOSED DYNAMIC ENCRYPTION SOLUTION
environment, corroborated by researchers in [22]. This                      The proposed solution relies primarily on three fundamental
research proffered a hybrid algorithm that capitalizes on                   elements, as shown in Figure 1, to secure data at three
the synergistic attributes of Elliptic Curve Cryptography                   levels: when it is transferred from the client to the server,
(ECC) and AES algorithms. An ECC algorithm was enlisted                     when it is stored and managed on the server, and when it
for AES key generation to harmonize the imperatives of                      is shared among clients. The utilized components are the
data security, computational efficiency, and implementation                 AES encryption algorithm, the ECC public key encryption
expediency. The algorithm’s key size, notable for its compact               algorithm, and blockchain technology.
dimensions, is an additional strength of the proposed system.                  Therefore, we will elucidate the processes of securing data
A comprehensive comparative analysis involving diverse                      through data encryption and decryption, as well as how to
encryption algorithms and alternative proposed systems                      manage file sharing operations by creating branches in the
was conducted. The outcomes firmly establish that the                       blockchain, thereby enhancing blockchain management.
AES-ECC hybrid algorithm attains superior levels of security
and exhibits reduced energy consumption in contrast to                      A. KEY GENERATION AND FILE ENCRYPTION
its counterparts, rendering it a quintessential choice for                  In the initial stage of the proposed solution, the client initiates
data-safeguarding endeavors in the cloud.                                   the blockchain if they do not already possess any previous
   In 2022, Blockchain technology has been employed to                      blocks. The first block is initialized with random data, and
tackle the shortcomings and obstacles inherent in conven-                   the block number and creation date are added to it, as depicted
tional medical cloud storage systems and establish trust, audi-             in Figure 2. However, if the client already has a pre-existing
bility, and data-sharing interoperability as employed in [23].              blockchain, they have two options. They can either fetch the
The proposed solution incorporates a consensus algorithm for                latest block from the server, should it not be available locally,
validating new blocks, authenticating healthcare providers,                 or retrieve it from their device, if it is locally available.
and enhancing data management in the cloud.                                    This flexibility allows the user to access the necessary data
   In 2022, the Fine-Grained Access Control (FGAC) system                   even if it is not present locally or to leverage the data available
has been proposed to enhance the trustworthiness and                        on their device to expedite operations. Following this, the
confidentiality of users and service providers by leveraging a              client inputs the file they wish to upload to the cloud storage
fuzzy logic framework [24]. The system creates three groups                 service into the SHA-256 algorithm to obtain the file’s hash
of keys which are the public, private, and session keys. The                code. Subsequently, the client inputs the hash code of the last
proposed solution utilizes such an elaborate management                     block in the blockchain into the same algorithm to acquire a
scheme to deliver an array of security functions. Thus,                     hash code. These two codes are then combined using XOR to
it encompasses various aspects of possible threats emerging                 yield a final code, which serves as the encryption key for the
                                                                  requested from the server that holds the clients’ public ECC
                                                                  algorithm keys.
                                                                     The ability to modify the blockchain mechanism and
                                                                  add new branches to it provides the advantage of verifying
                                                                  that a file has been shared from a trusted source. This
                                                                  is achieved by regenerating the block from the file after
                                                                  decrypting it. Additionally, revoking or deleting a file from
                                                                  the blockchain will not affect the main chain that contains
                                                                  the user’s primary files uploaded to the server. This flexibility
                                                                  allows for the creation of branches to any extent, with each
                                                                  branch containing multiple files in a hierarchical manner.
                                                                  B. SENSITIVITY ANALYSIS
file with. The recipient hashes the file they want to share and   The proportion of ’1’s within a binary data stream relative
then creates a new block and a new encryption key in the          to the total number of bits in the data is commonly denoted
same way previously explained for file encryption and block       as sensitivity or bit density. Bit density serves as a metric to
construction. They assign a sequence to the block directly        assess the entropy or predictability of a given data stream.
after the number of the block received from the client they       In the case of highly random data, it is anticipated that the
intend to share with. Then, they encrypt the file and the block   bit density will closely approach 0.5, signifying an equitable
with the recipient’s ECC public key, which can be directly        distribution of ‘‘0’’ and ‘‘1’’ bits.
[21] F. Thabit, A. P. S. Alhomdy, A. H. A. Al-Ahdal, and P. D. S. Jagtap,                                       MEJDL SAFRAN received the bachelor’s degree
     ‘‘A new lightweight cryptographic algorithm for enhancing data security                                    in computer science from King Saud University,
     in cloud computing,’’ Global Transitions Proc., vol. 2, no. 1, pp. 91–99,                                  in 2007, and the master’s and Ph.D. degrees in
     Jun. 2021.                                                                                                 computer science from Southern Illinois Univer-
[22] S. Rehman, N. Talat Bajwa, M. A. Shah, A. O. Aseeri, and A. Anjum,                                         sity Carbondale, in 2013 and 2018, respectively.
     ‘‘Hybrid AES-ECC model for the security of data over cloud storage,’’                                      He is currently a Passionate Researcher and an
     Electronics, vol. 10, no. 21, p. 2673, Oct. 2021.                                                          Educator in the field of artificial intelligence, with
[23] S. K. Dwivedi, R. Amin, J. D. Lazarus, and V. Pandi, ‘‘Blockchain-
                                                                                                                a focus on deep learning and its applications in
     based electronic medical records system with smart contract and consensus
                                                                                                                various domains. He is also an Assistant Professor
     algorithm in cloud environment,’’ Secur. Commun. Netw., vol. 2022,
     pp. 1–10, Sep. 2022.                                                                                       in computer science with King Saud University,
[24] S. Virushabadoss and T. P. Anithaashri, ‘‘Enhancing data security in           where he has been a Faculty Member, since 2008. His doctoral dissertation
     mobile cloud using novel key generation,’’ Proc. Comput. Sci., vol. 215,       was on developing efficient learning-based recommendation algorithms for
     pp. 567–576, 2022.                                                             top-N tasks and top-N workers in large-scale crowdsourcing systems. He has
[25] J. K. Dawson, F. Twum, J. B. Hayfron Acquah, and Y. M. Missah,                 published more than 20 articles in peer-reviewed journals and conference
     ‘‘Ensuring confidentiality and privacy of cloud data using a non-              proceedings, such as ACM Transactions on Information Systems, Applied
     deterministic cryptographic scheme,’’ PLoS ONE, vol. 18, no. 2, Feb. 2023,     Computing and Informatics, Mathematics, Sustainability, International
     Art. no. e0274628.                                                             Journal of Digital Earth, IEEE ACCESS, Biomedicine, Sensors, IEEE
[26] Y. Alemami, A. M. Al-Ghonmein, K. G. Al-Moghrabi, and                          International Conference on Cluster, IEEE International Conference on
     M. A. Mohamed, ‘‘Cloud data security and various cryptographic                 Computer and Information Science, International Conference on Database
     algorithms,’’ Int. J. Electr. Comput. Eng. (IJECE), vol. 13, no. 2, p. 1867,   Systems for Advanced Applications, and International Conference on
     Apr. 2023.                                                                     Computational Science and Computational Intelligence. He has been leading
[27] Y. A. Liu, L. Chen, X. W. Li, Y. L. Liu, S. G. Hu, Q. Yu, T. P. Chen,          grant projects in the fields of AI in medical imaging and AI in smart farming.
     and Y. Liu, ‘‘A dynamic AES cryptosystem based on memristive neural
                                                                                    He has been an AI Consultant for several national and international agencies,
     network,’’ Sci. Rep., vol. 12, no. 1, p. 12983, Jul. 2022.
                                                                                    since 2018. His current research interests include developing novel deep
[28] K. Lee, S.-Y. Lee, and K. Yim, ‘‘Machine learning based file entropy
     analysis for ransomware detection in backup systems,’’ IEEE Access,            learning methods for image processing, pattern recognition, natural language
     vol. 7, pp. 110205–110215, 2019.                                               processing, predictive analytics, and modeling and analyzing user behavior
[29] C.-M. Hsu, C.-C. Yang, H.-H. Cheng, P. E. Setiasabda, and J.-S. Leu,           and interest in online platforms.
     ‘‘Enhancing file entropy analysis to improve machine learning detection
     rate of ransomware,’’ IEEE Access, vol. 9, pp. 138345–138351, 2021.
                         MOHAMMED Y. SHAKOR received the Master                                               SULTAN ALFARHOOD received the Ph.D. degree
                         of Science degree from the Computer Science                                          in computer science from the University of
                         Department, College of Science, University of                                        Arkansas. He is currently an Assistant Professor
                         Sulaimani, in 2019. He is currently a Lecturer                                       with the Department of Computer Science, King
                         with the University of Garmian. He is also                                           Saud University (KSU). Since joining KSU,
                         an accomplished academic professional with a                                         in 2007, he has made several contributions to the
                         profound expertise in computer science. During                                       field of computer science through his research
                         this tenure, he exhibited a remarkable aptitude                                      and publications. His research interests include
                         for advanced concepts and demonstrated a keen                                        machine learning, recommender systems, linked
                         interest in cutting-edge developments within the                                     open data, text mining, and the ML-based IoT
field. His research interests include cloud security, cryptography, deep            systems. His work includes proposing innovative approaches and techniques
learning, and cloud computing. He has developed innovative methods and              to enhance the accuracy and effectiveness of these systems. His recent
techniques to enhance accuracy and efficiency in these fields.                      publications have focused on using deep learning and machine learning
                                                                                    techniques to address challenges in these domains. His research continues to
                                                                                    make significant contributions to the field of computer science and machine
                                                                                    learning. His work has been published in several high-impact journals and
                                                                                    conferences.