SECURE FILES STORAGE ON AWS S3 USING AES ALGORITHM
Keywords:
Amazon Cloud, Amazon Web Service, Security, Secure storage, cloud storageAbstract
Many people around the world use cloud computing services, which are provided by companies such as Amazon, Microsoft, and Google. One of the commonly used services is the cloud storage service. The service allows users to store and retrieve data over the Internet from anywhere, however, the remotely stored data maintained by the service provider raises data security and privacy concerns. As the security of cloud computing is a wide set of policies, technologies and controls to protect the data spread on its various servers distributed around the world. In this project, I suggest applying a method for encrypting files before uploading to the cloud based on an approach called Client Side Encryption in which the user will be responsible for creating and managing the encryption key and also responsible for the encryption and decryption currencies. The proposed mechanism is to use the AES-256 algorithm to encrypt files before uploading, whereby the key is first generated on the client and then the key is used to encrypt the file before uploading to Amazon Simple Storage Service (S3). In an attempt to enhance the level of security and protection for this data while it is on the Internet, and thus increase the confidence of users, whether individuals or organizations, in using cloud services.
References
P. Borra, “Comprehensive survey of amazon web services (AWS): techniques, tools, and best practices for cloud solutions,” International Research Journal of Advanced Engineering and Science, vol. 9, no. 3, pp. 24–29, 2024.
Abhishek Saini, Chaman Sharma, Nadeem Khan, Rohit Chauchan, and Gurjeet Singh, “A REVIEW PAPER ON AWS,” EPRA International Journal of Multidisciplinary Research (IJMR), 2024, doi: 10.36713/epra15444.
J. Hamdard, N. Delhi, P. Agarwal, J. Hamdard, and N. Delhi, “Cryptography Based Security for Cloud Computing System,” International Journal of Advanced Research in Computer Science, vol. 8, no. 5, 2017.
I. Saeed, S. Baras, and H. Hajjdiab, “Security and privacy of AWS S3 and Azure blob storage services,” in 2019 IEEE 4th International Conference on Computer and Communication Systems, ICCCS 2019, 2019. doi: 10.1109/CCOMS.2019.8821735.
S. Mirghani and H. Hajjdiab, “Comparison between amazon S3 and google cloud drive,” in ACM International Conference Proceeding Series, 2017. doi: 10.1145/3158233.3159381.
S. Narula, A. Jain, and Prachi, “Cloud computing security: Amazon web service,” in International Conference on Advanced Computing and Communication Technologies, ACCT, 2015. doi: 10.1109/ACCT.2015.20.
A. Richards, Foundations of Data and Digital Journalism. 2023. doi: 10.4324/9781003182238.
“What Is a Servlet? (The Java EE 5 Tutorial).” Accessed: Nov. 15, 2023. [Online]. Available: Oracle.com
“IBM i 7.4.” Accessed: Oct. 10, 2024. [Online]. Available: https://www.ibm.com/docs/en/i/7.4?topic=platform-java-development-kit
“Apache Tomcat® - Welcome!” Accessed: Jan. 01, 2024. [Online]. Available: tomcat.apache.org
“IntelliJ IDEA overview - Help | IntelliJ IDEA.” Accessed: May 10, 2024. [Online]. Available: https://www.jetbrains.com/help/idea/discover-intellij-idea.html
“ما المقصود بالتخزين السحابي؟ - التخزين السحابي - AWS,” Amazon Web Services, Inc. Accessed: Nov. 15, 2023. [Online]. Available: https://aws.amazon.com/ar/what-is/cloud-storage/
B. Preneel, Understanding cryptography. Springer, 2014.
Downloads
Published
Issue
Section
License
Copyright (c) 2024 Journal of Basic Sciences

This work is licensed under a Creative Commons Attribution 4.0 International License.