Securing Cloud Storage Using Aes Based On Geo-Key Method

Anything connected to the internet is exposed to cyber risks including the risk of a personal data breach in cloud storage. The use of the internet has risen significantly nationwide during the Covid-19 pandemic resulting in a huge number of cyber incidents being reported. According to the Internet...

Full description

Saved in:
Bibliographic Details
Main Author: Nur Syafiqah binti Mohd Shamsuddin
Format: Thesis
Language:en_US
Subjects:
Online Access:https://oarep.usim.edu.my/bitstreams/daa2e68d-b136-4104-9181-b68bb6ef0256/download
https://oarep.usim.edu.my/bitstreams/58a120be-02dd-4f9c-86f6-a14cfd6b577d/download
https://oarep.usim.edu.my/bitstreams/4f31059c-9169-417f-82e5-176d8f0cadd6/download
https://oarep.usim.edu.my/bitstreams/1b5906c4-246e-4fd0-bcb2-1dba4afc04d5/download
https://oarep.usim.edu.my/bitstreams/c090b27d-2e36-431d-9c1a-6b76b84f63f1/download
https://oarep.usim.edu.my/bitstreams/1ddbc5ef-0eb8-4391-aba7-88ecf98fed80/download
https://oarep.usim.edu.my/bitstreams/c8ef95df-aa31-40c3-94f0-467870cc5d33/download
https://oarep.usim.edu.my/bitstreams/c35ac548-005b-4843-a1d9-9da3831690b6/download
https://oarep.usim.edu.my/bitstreams/2571af33-e4a0-4736-87ab-9ab638c33b70/download
Tags: Add Tag
No Tags, Be the first to tag this record!
id my-usim-ddms-12477
record_format uketd_dc
institution Universiti Sains Islam Malaysia
collection USIM Institutional Repository
language en_US
topic Key generation
geo-key
location coordinate
MAC address
Cloud computing.
Cloud computing--Security measures.
Cybersecurity
Cryptographic
Advanced Encryption Standard (AES)
Symmetric block ciphers
spellingShingle Key generation
geo-key
location coordinate
MAC address
Cloud computing.
Cloud computing--Security measures.
Cybersecurity
Cryptographic
Advanced Encryption Standard (AES)
Symmetric block ciphers
Nur Syafiqah binti Mohd Shamsuddin
Securing Cloud Storage Using Aes Based On Geo-Key Method
description Anything connected to the internet is exposed to cyber risks including the risk of a personal data breach in cloud storage. The use of the internet has risen significantly nationwide during the Covid-19 pandemic resulting in a huge number of cyber incidents being reported. According to the Internet Users Survey (IUS), 2020 report by the Malaysian Communications and Multimedia Commission (MCMC), the percentage of internet users in 2020 grew by 1.3% from 87.4% in 2018 to 88.7% in 2020 while a total of 8,669 cybersecurity incidents were reported to the Cyber Security Malaysia in 2021. As a result of the increasing number of internet users, there are three major data security issues identified that need to be enhanced which are (i) secure file storage, (ii) vulnerable encryption key, and (iii) lack of remote access restriction at cloud storage. One of the strongest options to provide security for file protection in the storage is by implementing a cryptographic method that includes encryption and decryption process. However, strong encryption method such as the AES method is still available to be attacked if the encryption key is vulnerable. Adaptation to a post-pandemic environment by working remotely from the physical office has also attracted unauthorized remote access to files in cloud storage due to a lack of location-based access restrictions. Therefore, to improve the security of accessibility files in storage, this research aims to develop an enhanced cryptographic method by implementing location information to generate the encryption key using the AES method. The enhanced AES method is developed by using the combination of longitude and latitude coordinates, user password, and device MAC address to generate the encryption key known as geo-key. Then, it is evaluated to verify its performance by conducting a time performance comparison between the existing method and the enhanced AES method using a variety of format types as the data set. The result shows that the enhanced AES method takes 2.73% longer time to execute than the existing AES method takes due to the additional combination of key parameters to generate the geo-key while the existing AES method only required a single parameter to generate the key encryption which is the user password. Next, the enhanced AES method is evaluated by validating file decryption successfulness at a different location where it has shown that only files located at an intended location can be decrypted subject to their toleration range of distance. The other testing has been conducted to evaluate the integrity of decrypted files which showing all files that have been decrypted are having the same hash value as the original file’s hash. The results from this third evaluation have proved that the enhanced AES geo-key method keeps the integrity of the original data without any unintended modification and corruption. The enhanced AES method has a significant contribution to protect files in storage if the file has been stolen in the situation of security data breach incident as the encrypted file could never be accessed by an unauthorized owner and only be decrypted inside the intended range of location. This research also aligned with one of the pillar strategies in Malaysia Cyber Security Strategy (MCSS) to establish data leakage protection mechanisms in organization management and business operation.
format Thesis
author Nur Syafiqah binti Mohd Shamsuddin
author_facet Nur Syafiqah binti Mohd Shamsuddin
author_sort Nur Syafiqah binti Mohd Shamsuddin
title Securing Cloud Storage Using Aes Based On Geo-Key Method
title_short Securing Cloud Storage Using Aes Based On Geo-Key Method
title_full Securing Cloud Storage Using Aes Based On Geo-Key Method
title_fullStr Securing Cloud Storage Using Aes Based On Geo-Key Method
title_full_unstemmed Securing Cloud Storage Using Aes Based On Geo-Key Method
title_sort securing cloud storage using aes based on geo-key method
granting_institution Universiti Sains Islam Malaysia
url https://oarep.usim.edu.my/bitstreams/daa2e68d-b136-4104-9181-b68bb6ef0256/download
https://oarep.usim.edu.my/bitstreams/58a120be-02dd-4f9c-86f6-a14cfd6b577d/download
https://oarep.usim.edu.my/bitstreams/4f31059c-9169-417f-82e5-176d8f0cadd6/download
https://oarep.usim.edu.my/bitstreams/1b5906c4-246e-4fd0-bcb2-1dba4afc04d5/download
https://oarep.usim.edu.my/bitstreams/c090b27d-2e36-431d-9c1a-6b76b84f63f1/download
https://oarep.usim.edu.my/bitstreams/1ddbc5ef-0eb8-4391-aba7-88ecf98fed80/download
https://oarep.usim.edu.my/bitstreams/c8ef95df-aa31-40c3-94f0-467870cc5d33/download
https://oarep.usim.edu.my/bitstreams/c35ac548-005b-4843-a1d9-9da3831690b6/download
https://oarep.usim.edu.my/bitstreams/2571af33-e4a0-4736-87ab-9ab638c33b70/download
_version_ 1812444837839896576
spelling my-usim-ddms-124772024-05-29T19:54:38Z Securing Cloud Storage Using Aes Based On Geo-Key Method Nur Syafiqah binti Mohd Shamsuddin Anything connected to the internet is exposed to cyber risks including the risk of a personal data breach in cloud storage. The use of the internet has risen significantly nationwide during the Covid-19 pandemic resulting in a huge number of cyber incidents being reported. According to the Internet Users Survey (IUS), 2020 report by the Malaysian Communications and Multimedia Commission (MCMC), the percentage of internet users in 2020 grew by 1.3% from 87.4% in 2018 to 88.7% in 2020 while a total of 8,669 cybersecurity incidents were reported to the Cyber Security Malaysia in 2021. As a result of the increasing number of internet users, there are three major data security issues identified that need to be enhanced which are (i) secure file storage, (ii) vulnerable encryption key, and (iii) lack of remote access restriction at cloud storage. One of the strongest options to provide security for file protection in the storage is by implementing a cryptographic method that includes encryption and decryption process. However, strong encryption method such as the AES method is still available to be attacked if the encryption key is vulnerable. Adaptation to a post-pandemic environment by working remotely from the physical office has also attracted unauthorized remote access to files in cloud storage due to a lack of location-based access restrictions. Therefore, to improve the security of accessibility files in storage, this research aims to develop an enhanced cryptographic method by implementing location information to generate the encryption key using the AES method. The enhanced AES method is developed by using the combination of longitude and latitude coordinates, user password, and device MAC address to generate the encryption key known as geo-key. Then, it is evaluated to verify its performance by conducting a time performance comparison between the existing method and the enhanced AES method using a variety of format types as the data set. The result shows that the enhanced AES method takes 2.73% longer time to execute than the existing AES method takes due to the additional combination of key parameters to generate the geo-key while the existing AES method only required a single parameter to generate the key encryption which is the user password. Next, the enhanced AES method is evaluated by validating file decryption successfulness at a different location where it has shown that only files located at an intended location can be decrypted subject to their toleration range of distance. The other testing has been conducted to evaluate the integrity of decrypted files which showing all files that have been decrypted are having the same hash value as the original file’s hash. The results from this third evaluation have proved that the enhanced AES geo-key method keeps the integrity of the original data without any unintended modification and corruption. The enhanced AES method has a significant contribution to protect files in storage if the file has been stolen in the situation of security data breach incident as the encrypted file could never be accessed by an unauthorized owner and only be decrypted inside the intended range of location. This research also aligned with one of the pillar strategies in Malaysia Cyber Security Strategy (MCSS) to establish data leakage protection mechanisms in organization management and business operation. Universiti Sains Islam Malaysia 2023-10 Thesis en_US https://oarep.usim.edu.my/handle/123456789/12477 https://oarep.usim.edu.my/bitstreams/daa2e68d-b136-4104-9181-b68bb6ef0256/download 6d823d5e0c77e628a3ea1a9febaef157 https://oarep.usim.edu.my/bitstreams/58a120be-02dd-4f9c-86f6-a14cfd6b577d/download f6d4e5691d8a4fa29a366b4949dffc30 https://oarep.usim.edu.my/bitstreams/4f31059c-9169-417f-82e5-176d8f0cadd6/download d3c1ac2747682765c861401cf39ba3f7 https://oarep.usim.edu.my/bitstreams/1b5906c4-246e-4fd0-bcb2-1dba4afc04d5/download 27e015533c2bb3dedb0f9b9159ec36be https://oarep.usim.edu.my/bitstreams/c090b27d-2e36-431d-9c1a-6b76b84f63f1/download edb45253dbc1b7bf653cf03134698c7f https://oarep.usim.edu.my/bitstreams/1ddbc5ef-0eb8-4391-aba7-88ecf98fed80/download 042034ed230ced30f144016846777f24 https://oarep.usim.edu.my/bitstreams/c8ef95df-aa31-40c3-94f0-467870cc5d33/download b5b427186bfa611eb985399984d3cea1 https://oarep.usim.edu.my/bitstreams/c35ac548-005b-4843-a1d9-9da3831690b6/download 8a9afed38c4e4fb03a7f52fc56a22d74 https://oarep.usim.edu.my/bitstreams/2571af33-e4a0-4736-87ab-9ab638c33b70/download be4a016a13d227bd0c89cce198a92bd2 https://oarep.usim.edu.my/bitstreams/9985eff3-8ce2-402f-8943-ced8a79e0d0e/download 8a4605be74aa9ea9d79846c1fba20a33 https://oarep.usim.edu.my/bitstreams/a512d13e-e5d2-4f63-b563-ae0f40cf2f21/download 68b329da9893e34099c7d8ad5cb9c940 https://oarep.usim.edu.my/bitstreams/60403ada-249f-4fa8-8eb0-71715bce8791/download 9e7d037899dc3c23a25746f5a0bc952d https://oarep.usim.edu.my/bitstreams/856f00e1-cd63-4a3d-b697-56b24c5279e4/download 355423dd8e0796e757c3b8001f0caebc https://oarep.usim.edu.my/bitstreams/f9ac62d5-da97-4fb3-b096-15c8b6955927/download 69144753810350a2cdac5a98cb827198 https://oarep.usim.edu.my/bitstreams/c8c13950-daa1-4e6d-bffb-3233feb61922/download 2e24df0678a52deb61e037ce9899a88c https://oarep.usim.edu.my/bitstreams/6bf40f2b-4f5c-43b8-9822-530d798e0af4/download 9a0b4c23ecada7ac42fff79b797657f5 https://oarep.usim.edu.my/bitstreams/9cd750a4-0952-4854-8466-c62a21c4affc/download 69d52b7ee740f2aeba5808a7192f5b30 https://oarep.usim.edu.my/bitstreams/7e8f4ff9-4790-4673-8533-9fcefbbaa2d5/download cb89d9acb1f78964ef55d81019074dae https://oarep.usim.edu.my/bitstreams/080ebb69-56ea-4e31-862b-b38f9a15db84/download 3f920507dbcdf68cadbe97d843eaa986 Key generation, geo-key, location coordinate, MAC address Cloud computing. Cloud computing--Security measures. Cybersecurity Cryptographic Advanced Encryption Standard (AES) Symmetric block ciphers