A Multi-Privacy Level Encryption Framework for Secure Cloud-Based Data Repositories
Journal Title: International Journal for Modern Trends in Science and Technology - Year 2025, Vol 11, Issue 06
Abstract
The increasing reliance on cloud computing for storing and managing sensitive information has intensified concerns regarding data security. Traditional encryption methods, such as AES, though widely used, face limitations due to the evolving sophistication of cyber threats and their dependence on centralized access control systems, which introduce single points of failure. To address these challenges, this study proposes a robust, multi-layered encryption framework tailored for cloud environments. The approach integrates DNA-based encoding, AES encryption, SHA-256 hashing, and block-level file segmentation to ensure comprehensive data protection. DNA encoding introduces a complex transformation layer, AES guarantees data confidentiality, SHA-256 ensures integrity, and block segmentation enables efficient parallel processing and granular control. A key innovation of this framework is its decentralized key management system, which distributes control among multiple authorities. This decentralization eliminates the vulnerabilities of centralized schemes, enhances scalability, and avoids key escrow risks. The synergy of these mechanisms offers heightened resilience against unauthorized access while maintaining operational efficiency in multi-user cloud settings. The proposed framework significantly improves data confidentiality, integrity, and availability, laying a strong foundation for future advancements in secure cloud data storage and access control. It presents a scalable and practical solution to the limitations of existing cloud security models.
Authors and Affiliations
Jayanthi T & Kanchana T
Interview Automation through Speech Recognition and Semantic Matching
Recruiting freshers when they are in final semesters through off-campus drive is a time- consuming process as it needs more recruiters to assess them. It requires more recruiters to filter the best candidate. The average...
Detection of Fake Certificate using Blockchain Technology
In today's era, the issue of certificate forgery has emerged as a significant concern. The act of forging certificates leads to numerous problems, affecting educational, professional, and legal documents. Historically, t...
A Neural Network Approach to Bird Species Detection from Audio Recordings
The number of birds is changing a lot these days because of things like climate change, global warming, forest fires, deforestation, and other things. Machine learning algorithms can now automatically identify bird spec...
Seasonal Variation in Benthic Macrofaunal Diversity and Distribution in Ambuliyar River and Sethubavachatram Coastal Waters, Southeast India
In the present study, benthic macrofaunal diversity and distribution in Ambuliyar River and Sethubavachatram coastal waters were studied and a total of 59 species of macrofauna consisting of three groups namely Polychaet...
Benefits and Difficulties of Student-Generative Artificial Intelligence Collaboration in Programming Learning: An Empirical Case Study
Conversational generative artificial intelligence Gen AI is sometimes viewed as a two-edged sword that could result in learning that is only superficial. We created and implemented a programming course that emphasizes st...