Secure File Storage using Hybrid Cryptography

  • Unique Paper ID: 164104
  • Volume: 10
  • Issue: 12
  • PageNo: 3115-3121
  • Abstract:
  • Conducting a comprehensive comparative study of all cryptographic algorithms for secure file storage using hybrid cryptography involves analyzing various aspects of each algorithm. The choice of cryptographic algorithms depends on factors such as security, performance, and suitability for specific use cases. Aim: The aim is to do comparative study on selection and implementation of cryptographic algorithms on a file storage system. Objectives: The study aims to achieve these key objectives: • Security Assessment: Determine the cryptographic algorithms' advantages and disadvantages as well as how well they withstand known cyberattacks. • Performance Analysis: Examine the cryptography algorithms' performance characteristics, taking into account things like resource usage, computational overhead, and the speed at which data is encrypted and decrypted. • Suitability for Specific Use Cases: Examine how well cryptographic techniques fit the requirements of safe file storage. • Hybrid Cryptography Integration: Examine whether incorporating hybrid cryptography— which mixes symmetric and asymmetric encryption—for secure file storage is feasible and effective. Examine how hybrid cryptography provides an efficient solution to the shortcomings of individual algorithms. • Key Management Considerations: Examine each algorithm's key management features, such as key creation, distribution, and storage. Assess the degree to which each algorithm facilitates safe and efficient key management procedures.

Copyright & License

Copyright © 2025 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

BibTeX

@article{164104,
        author = {Ishika Shroff and Kartik Ghanani and Kabeer Gupta},
        title = {Secure File Storage using Hybrid Cryptography},
        journal = {International Journal of Innovative Research in Technology},
        year = {2024},
        volume = {10},
        number = {12},
        pages = {3115-3121},
        issn = {2349-6002},
        url = {https://ijirt.org/article?manuscript=164104},
        abstract = {Conducting a comprehensive comparative study of all cryptographic algorithms for secure file storage using hybrid cryptography involves analyzing various aspects of each algorithm. The choice of cryptographic algorithms depends on factors such as security, performance, and suitability for specific use cases. 
Aim: The aim is to do comparative study on selection and implementation of cryptographic algorithms on a file storage system. 
Objectives:  The study aims to achieve these key objectives: 
•	Security Assessment: Determine the cryptographic algorithms' advantages and disadvantages as well as how well they withstand known cyberattacks. 
•	Performance Analysis: Examine the cryptography algorithms' performance characteristics, taking into account things like resource usage, computational overhead, and the speed at which data is encrypted and decrypted. 
•	Suitability for Specific Use Cases: Examine how well cryptographic techniques fit the requirements of safe file storage.  
•	Hybrid Cryptography Integration: Examine whether incorporating hybrid cryptography— which mixes symmetric and asymmetric encryption—for secure file storage is feasible and effective. Examine how hybrid cryptography provides an efficient solution to the shortcomings of individual algorithms. 
•	Key Management Considerations: Examine each algorithm's key management features, such as key creation, distribution, and storage. Assess the degree to which each algorithm facilitates safe and efficient key management procedures. 
},
        keywords = {Here a
re some potential keywords for the research paper on study on Secure File Storage  
•	Secure File Storage 
•	Encryption 
•	Cloud Storage Security 
•	Access Control 
•	Authentication 
•	Data Integrity 
•	Compliance 
•	Secure File Deletion 
•	Audit Trails 
•	Data Loss Prevention (DLP) 
•	Risk Management 
•	Mobile Security 
•	User Education and Training 
},
        month = {July},
        }

Cite This Article

  • ISSN: 2349-6002
  • Volume: 10
  • Issue: 12
  • PageNo: 3115-3121

Secure File Storage using Hybrid Cryptography

Related Articles