A Hybrid Approach to Cloud Data Security Using ChaCha20 and ECDH for Secure Encryption and Key Exchange

https://doi.org/10.24017/science.2025.1.5

Abstract views: 0 / PDF downloads: 0

Authors

Abstract

Cloud computing has transformed data storage and processing by offering on-demand resources and global accessibility. However, this convenience introduces significant security risks due to the reliance on third-party services, raising concerns about data confidentiality and integrity. This research proposes a hybrid encryption model that combines the high-speed ChaCha20 algorithm for data encryption with the Elliptic Curve Diffie-Hellman (ECDH) protocol for secure key exchange. The model ensures robust data protection in Cloud environments by generating a ChaCha20 key, encrypting it with ECDH, and securely storing encrypted key fragments in the cloud for later reassembly and decryption. This approach enhances security during data transmission and storage while mitigating the common vulnerabilities found in single-algorithm solutions. The study evaluates and compares the performance of ChaCha20 with ECDH against Rivest-Shamir-Adleman (RSA) with advanced encryption standard (AES) and Blowfish with Elliptic-Curve Cryptography (ECC). The results show that ChaCha20 with ECDH provides the fastest encryption time of 2ms and a key generation time of 15.8ms, with moderate memory usage. By contrast, RSA with AES is slower but offers consistent memory usage, while Blowfish with ECC balances speed and memory efficiency. The proposed hybrid model outperforms traditional encryption methods in both speed and security, making it suitable for modern cloud applications requiring scalability and high performance. Future research could focus on optimizing this model for resource-constrained environments, such as IoT and mobile.

Keywords:

ChaCha20 Encryption, Elliptic Curve Diffie-Hellman (ECDH), Key Transfer

References

Y. S. Abdulsalam and M. Hedabou, “Security and privacy in cloud computing: technical review,” Future Internet, vol. 14, no. 11, pp. 1-27, Dec. 27, 2022. doi: 10.3390/fi14010011. DOI: https://doi.org/10.3390/fi14010011

S. Akter, K. Michael, M. R. Uddin, G. McCarthy, and M. Rahman, “Transforming business using digital innovations: the application of AI, blockchain, cloud and data analytics,” Annals of Operations Research, vol. 308, no. 1–2, pp. 7–39, Jan. 2022, doi: 10.1007/s10479-020-03620-w. DOI: https://doi.org/10.1007/s10479-020-03620-w

K. Sasikumar and S. Nagarajan, “Comprehensive review and analysis of cryptography techniques in cloud compu-ting,” IEEE Access, vol. 12, pp. 52325–52351, 2024, doi: 10.1109/ACCESS.2024.3385449. DOI: https://doi.org/10.1109/ACCESS.2024.3385449

M. A. M.Sadeeq, S. R. M. Zeebaree, R. Qashi, S. H. Ahmed, and K. Jacksi, “Internet of things security: a survey,” in 2018 International Conference on Advanced Science and Engineering (ICOASE), 2018, pp. 162–166. doi: 10.1109/ICOASE.2018.8548785. DOI: https://doi.org/10.1109/ICOASE.2018.8548785

A. Orobosade, T. A. Favour-Bethy, A. B. Kayode, and A. J. Gabriel, “Cloud application security using hybrid encryp-tion,” Communications on Applied Electronics, vol. 7, no. 33, pp. 25–31, 2020, doi: 10.5120/cae2020652866. DOI: https://doi.org/10.5120/cae2020652866

S. Srisakthi and A. P. Shanthi, “Design of a secure encryption model (sem) for cloud data storage using hadamard transforms,” Wireless Personal Communications, vol. 100, no. 4, pp. 1727–1741, 2018, doi: 10.1007/s11277-018-5667-8. DOI: https://doi.org/10.1007/s11277-018-5667-8

X.M. He, X. S. Wang, D. Li, and Y.-N. Hao, “Semi-Homogenous generalization: improving homogenous generalization for privacy preservation in cloud computing,”Journal of Computer Science and Technology, vol. 31, no. 6, pp. 1124–1135, 2016, doi: 10.1007/s11390-016-1687-6. DOI: https://doi.org/10.1007/s11390-016-1687-6

R. K. Muhammed, K. H. Ali Faraj, J. F. G. Mohammed, T. N. Ahmad Al Attar, S. J. Saydah, and D. A. Rashid, “Auto-mated performance analysis e-services by AES-based hybrid cryptosystems with RSA, ElGamal, and ECC,” Advances in Science, Technology and Engineering Systems Journal, vol. 9, no. 3, pp. 84–91, Jul. 2024, doi: 10.25046/aj090308.

R. K. Muhammed, K. H. Ali Faraj, J. F. G. Mohammed, T. N. Ahmad Al Attar, S. J. Saydah, and D. A. Rashid, “Auto-mated performance analysis E-services by AES-based hybrid cryptosystems with RSA, ElGamal, and ECC,” Advances in Science, Technology and Engineering Systems Journal, vol. 9, no. 3, pp. 84–91, Jul. 2024, doi: 10.25046/aj090308. DOI: https://doi.org/10.25046/aj090308

M. Bhavitha, K. Rakshitha, and S. M. Rajagopal, “Performance evaluation of AES, DES, RSA, and paillier homomor-phic for image security,” in 2024 IEEE 9th International Conference for Convergence in Technology (I2CT), IEEE, Apr. 2024, pp. 1–5. doi: 10.1109/I2CT61223.2024.10544282. DOI: https://doi.org/10.1109/I2CT61223.2024.10544282

Muhammed et al., “Comparative analysis of AES, Blowfish, Twofish, Salsa20, and ChaCha20 for Image Encryption,” Kurdistan Journal of Applied Research, vol. 9, no. 1, pp. 52–65, May 2024, doi: 10.24017/science.2024.1.5. DOI: https://doi.org/10.24017/science.2024.1.5

P. Verma, J. Shekhar, and A. A. Preety, “A survey for performance analysis various cryptography techniques digital contents,” International Journal of Computer Science and Mobile Computing, vol. 4, no. 1, pp. 522–531, 2015.

A. Gour, S. Singh Malhi, G. Singh, and G. Kaur, “Hybrid cryptographic approach: for secure data communication using block cipher techniques,” E3S Web of Conferences, vol. 556, p. 01048, Aug. 2024, doi: 10.1051/e3sconf/202455601048. DOI: https://doi.org/10.1051/e3sconf/202455601048

V. S. Mahalle and A. K. Shahade, “Enhancing the data security in Cloud by implementing hybrid (Rsa & Aes) encryp-tion algorithm,” in 2014 IEEE International Conference on Power, Automation and Communication (INPAC), IEEE, Oct. 2014, pp. 146-149. doi: 10.1109/INPAC.2014.6981152. DOI: https://doi.org/10.1109/INPAC.2014.6981152

S. Zaineldeen and A. Ate, “Improved cloud data transfer security using hybrid encryption algorithm,” Indonesian Jour-nal of Electrical Engineering and Computer Science, vol. 20, no. 1, pp. 521–527, Oct. 2020, doi: 10.11591/ijeecs.v20.i1.pp521-527. DOI: https://doi.org/10.11591/ijeecs.v20.i1.pp521-527

N. Almoysheer, M. Humayun, and N. Z. Jhanjhi, “Enhancing cloud data security using multilevel encryption tech-niques.,” Turkish Online Journal of Qualitative Inquiry, vol. 12, no. 3, 2021.

D. A. S. Anjana, “Hybrid Cryptographic solution using RSA, Blowfish and MD5 for information security in cloud computing,” Mathematical Statistician and Engineering Applications, vol. 71, no. 3s, pp. 1250–1268, 2022.

A. G. Deshpande, C. Srinivasan, R. Raman, S. Rajarajan, and R. Adhvaryu, “Enhancing cloud security: a deep crypto-graphic analysis,” in 2023 International Conference on Advances in Computation, Communication and Information Technolo-gy (ICAICCIT), 2023, pp. 1118–1123. doi: 10.1109/ICAICCIT60255.2023.10465863. DOI: https://doi.org/10.1109/ICAICCIT60255.2023.10465863

R. M. Muthulakshmi and T. P Anithaashri, “A Robust Approach to Cloud data security using an amalgamation of aes and code-based cryptography,” in 2024 International Conference on Science Technology Engineering and Management (IC-STEM), 2024, pp. 1–5. doi: 10.1109/ICSTEM61137.2024.10560532. DOI: https://doi.org/10.1109/ICSTEM61137.2024.10560532

S. G. Chaloop and M. Z. Abdullah, “Enhancing hybrid security approach using AES and RSA algorithms,” Journal of Engineering and Sustainable Development, vol. 25, no. 4, pp. 58–66, Feb. 2022, doi: 10.31272/jeasd.25.4.6. DOI: https://doi.org/10.31272/jeasd.25.4.6

Y. M. A. Abualkas and D. L. Bhaskari, “Hybrid approach to cloud storage security using ECC-AES encryption and key management techniques,” International Journal of Engineering Trends and Technology, vol. 72, no. 4, pp. 92–100, Apr. 2024, doi: 10.14445/22315381/IJETT-V72I4P110. DOI: https://doi.org/10.14445/22315381/IJETT-V72I4P110

B. Sarkar, A. Saha, D. Dutta, G. De Sarkar, and K. Karmakar, “A Survey on the Advanced Encryption Standard (AES): A Pillar of Modern Cryptography,” International Journal of Computer Science and Mobile Computing, vol. 13, no. 4, pp. 68–87, Apr. 2024, doi.org/10.47760/ijcsmc.2024.v13i04.008 DOI: https://doi.org/10.47760/ijcsmc.2024.v13i04.008

E. Ochoa-Jimenez, L. Rivera-Zamarripa, N. Cruz-Cortes, and F. Rodriguez-Henriquez, “Implementation of RSA Signatures on GPU and CPU architectures,” IEEE Access, vol. 8, pp. 9928–9941, 2020, doi: 10.1109/ACCESS.2019.2963826. DOI: https://doi.org/10.1109/ACCESS.2019.2963826

M. Faheem, S. Jamel, A. Hassan, Z. A., N. Shafinaz, and M. Mat, “A Survey on the cryptographic encryption Algorithms,” International Journal of Advanced Computer Science and Applications, vol. 8, no. 11, 2017, doi: 10.14569/IJACSA.2017.081141. DOI: https://doi.org/10.14569/IJACSA.2017.081141

O. Popoola, M. A. Rodrigues, J. Marchang, A. Shenfield, A. Ikpehai, and J. Popoola, “An optimized hybrid encryption framework for smart home healthcare: ensuring data confidentiality and security,” Internet of Things, vol. 27, p. 101314, Oct. 2024, doi: 10.1016/j.iot.2024.101314. DOI: https://doi.org/10.1016/j.iot.2024.101314

Z. A. Mohammed, H. Q. Gheni, Z. J. Hussein, and A. K. M. Al-Qurabat, “Advancing cloud image security via aes algo-rithm enhancement techniques,” Engineering, Technology & Applied Science Research, vol. 14, no. 1, pp. 12694–12701, Feb. 2024, doi: 10.48084/etasr.6601. DOI: https://doi.org/10.48084/etasr.6601

S. F. Yousif, “Performance Comparison between RSA and El-Gamal algorithms for speech data encryption and de-cryption,” Diyala Journal of Engineering Sciences, pp. 123–137, Mar. 2023, doi: 10.24237/djes.2023.16112. DOI: https://doi.org/10.24237/djes.2023.16112

P. William, A. Choubey, G. S. Chhabra, R. Bhattacharya, K. Vengatesan, and S. Choubey, “Assessment of hybrid cryp-tographic algorithm for secure sharing of textual and pictorial content,” in 2022 International Conference on Electronics and Renewable Systems (ICEARS), IEEE, Mar. 2022, pp. 918–922. doi: 10.1109/ICEARS53579.2022.9751932. DOI: https://doi.org/10.1109/ICEARS53579.2022.9751932

P. Chinnasamy, S. Padmavathi, R. Swathy, and S. Rakesh, “Efficient data security using hybrid cryptography on cloud computing,” 2021, pp. 537–547. doi: 10.1007/978-981-15-7345-3_46. DOI: https://doi.org/10.1007/978-981-15-7345-3_46

C. Manifavas, G. Hatzivasilis, K. Fysarakis, and Y. Papaefstathiou, “A survey of lightweight stream ciphers for em-bedded systems,” Security and Communication Networks, vol. 9, no. 10, pp. 1226–1246, Jul. 2016, doi: 10.1002/sec.1399. DOI: https://doi.org/10.1002/sec.1399

M. Coutinho and T. C. Souza Neto, “Improved linear approximations to ARX ciphers and attacks against ChaCha,” in Advances in Cryptology – EUROCRYPT 2021, A. Canteaut and F.-X. Standaert, Eds., Cham: Springer International Pub-lishing, 2021, pp. 711–740. doi: doi.org/10.1007/978-3-030-77870-5_25. DOI: https://doi.org/10.1007/978-3-030-77870-5_25

P. McLaren, W. J. Buchanan, G. Russell, and Z. Tan, “Deriving ChaCha20 key streams from targeted memory analysis,” Journal of Information Security and Applications, vol. 48, p. 102372, 2019, doi: 10.1016/j.jisa.2019.102372. DOI: https://doi.org/10.1016/j.jisa.2019.102372

S. M. S. Reza, A. Ayob, M. M. Arifeen, N. Amin, M. H. M. Saad, and A. Hussain, “A lightweight security scheme for advanced metering infrastructures in smart grid,” Bulletin of Electrical Engineering and Informatics, vol. 9, no. 2, pp. 777–784, 2020, doi: 10.11591/eei.v9i2.2086. DOI: https://doi.org/10.11591/eei.v9i2.2086

A. Saepulrohman and T. P. Negara, “Implementation of elliptic curve diffie-hellman (ECDH) for encoding messeges becomes a point on the gf (pp),” 2020.

S. Madasu, P. Murugesan, H. V. Jaganathan, and S. Pamulaparthyvenkata, “Elliptic curve diffie-hellman based priva-cy-preserving deduplication for big data in cloud systems,” in 2024 International Conference on Intelligent Algorithms for Computational Intelligence Systems (IACIS), IEEE, Aug. 2024, pp. 1–4. doi: 10.1109/IACIS61494.2024.10721723. DOI: https://doi.org/10.1109/IACIS61494.2024.10721723

A. P. Jagadeesan, K. Jain, and R. Aragona, “Performance comparison of hybrid encryption models,” in 2023 Second International Conference on Augmented Intelligence and Sustainable Systems (ICAISS), IEEE, Aug. 2023, pp. 1196–1203. doi: 10.1109/ICAISS58487.2023.10250698. DOI: https://doi.org/10.1109/ICAISS58487.2023.10250698

Downloads

How to Cite

[1]
R. K. Muhammed, Z. N. Rashid, and S. J. Saydah, “A Hybrid Approach to Cloud Data Security Using ChaCha20 and ECDH for Secure Encryption and Key Exchange”, KJAR, vol. 10, no. 1, pp. 66–82, Mar. 2025, doi: 10.24017/science.2025.1.5.

Article Metrics

Published

10-03-2025

Issue

Section

Pure and Applied Science