Enhanced Cloud Data Security by Employing HMAC for Advanced Cryptographic Protection
Keywords:
HMAC, cloud data security, cryptographic protection, SHA-256, SHA-3, MD5, SHA-512, cybersecurity, authentication, data integrityAbstract
Using the well-known cryptographic algorithms SHA-256, SHA-3, MD5, and SHA-512, this study investigates new methods to increase cloud data security utilizing HMAC (Hash-based Message Authentication Code). This effort attempts to secure cloud data storage by preventing unwanted access, alteration, or destruction of private data. The goal is to examine HMAC's compatibility with various hash algorithms and rate how well they protect data from being altered or stolen. This study adds to the existing body of knowledge by combining HMAC with other hash algorithms in a strategic manner, so providing an additional line of protection against cyberattacks. In contrast to more conventional methods, the solution offered by this technology may be easily adapted to work with different cloud environments. This research sets a new standard for the safety of cloud-stored data via rigorous testing and comparative analysis, showing that HMAC-enhanced cryptographic algorithms are more resistant to typical assaults. This study makes a substantial advancement by proposing a workable and scalable approach to resolving current issues in cloud data security.
References
[1]. B. Baban, and S. A. Hameed, “Securing a Web-Based Hospital Management System Using a Combination of AES and HMAC,” Iraqi Journal for Electrical and Electronic Engineering, pp. 93-99, 2023.
[2]. S. Patil, S. Bhosale, and S. Sonawane, “A Survey paper on Public Integrity Auditing for Shared Dynamic Cloud Data Using HMAC Algorithm.” International Journal of Advanced Research in Computer and Communication Engineering, vol. 6, no.3, pp. 525-528, 2017.
[3]. J. R. Babu, M. Nadeem, K. A. Kumar, and A. Shaik, “Cloud File Storage Security Using Hybrid Cryptography,” International Journal for Advanced Research in Science and Technology, vol. 13, no. 6, pp. 64-75, 2023
[4]. C. Manthiramoorthy, and K. M. Khan, “Comparing Several Encrypted Cloud Storage Platforms,” International Journal of Mathematics, Statistics, and Computer Science, vol. 2, pp. 44-62, 2024.
[5]. W. A. Krushnarao, and S. Gandage, “Secure-Medishare: A Comprehensive Secure Medical Data-Sharing System Using Blockchain, Watermarking, Steganography, And Optimized Hybrid Cryptography,” Scandinavian Journal of Information Systems, vol. 35, no. 3, pp. 1-22, 2023
[6]. R. Juárez, and B. Bordel, “NeoStarling: An Efficient and Scalable Collaborative Blockchain-Enabled Obstacle Mapping Solution for Vehicular Environments,” Sensors, vol. 23, no. 17, pp. 1-29, 2023
[7]. S. Khare, and V. Verma, “Designing a Security Framework for Mitigating Flaws in Cloud Based Web Hosting for Privacy and Confidentiality Services,” International Journal of Intelligent Systems and Applications in Engineering, vol. 11, no. 4, pp. 62-81, 2023
[8]. V. Sindhu, and R. Mukesh, “Intelligent Data Security for Cloud Computing Using Partial Homomorphic Encryption,” Journal of Data Acquisition and Processing, vol. 38, no. 3, pp. 2453-2467, 2023
[9]. S. Ahmad, and S. Mehfuz, “Efficient time-oriented latency-based secure data encryption for cloud storage,” Cyber Security and Applications, vol. 2, pp. 1-10, 2024
[10]. M. Jalasri, and L. Lakshmanan, “Code-based encryption techniques with distributed cluster head and energy consumption routing protocol,” Complex and Intelligent Systems, vol. 9, no. 3, pp. 2943-2955, 2023
[11]. P. Roy, J. Chadrasekaran, E. Lanus, L. Freeman, and J. Werner, “A Survey of Data Security: Practices from Cybersecurity and Challenges of Machine Learning,” arXiv preprint arXiv: 2310.04513, pp. 1-18, 2023
[12]. A. Saraswathi, “An Empirical study of Hybrid Cryptographic Algorithms,” International Journal of Information Technology, Research and Applications, vol. 2, no. 1, pp. 22-32, 2023
[13]. S. Bojjagani, N. R. Seelam, N. K. Sharma, R. Uyyala, S. R. Akuri, A. K. Maurya, “The Use of IoT-based Wearable Devices to Ensure Secure Lightweight Payments in Fin Tech Applications,” Journal of King Saud University-Computer and Information Sciences, pp. 1-24, 2023
[14]. T. Aljrees, A. Kumar, K. U. Singh, and T. Singh, “Enhancing IoT Security through a Green and Sustainable Federated Learning Platform: Leveraging Efficient Encryption and the Quondam Signature Algorithm,” Sensors, vol. 23, no. 19, pp. 1-28, 2023
[15]. M. Al-Zubaidie, and G. S. Shyaa, “Applying Detection Leakage on Hybrid Cryptography to Secure Transaction Information in E-Commerce Apps,” Future Internet, vol. 15, no. 8, pp. 1-20, 2023
[16]. A. D. Joshua, and O. E. Taylor, “An Enhanced Software as A Service (SAAS) Architectural Model for Cloud Based Security Using Hybrid Symmetric Algorithm,” International Journal of Advanced Research in Computer Science, vol. 14, no. 3, pp. 138-143, 2023
[17]. I. G. Kamdem, and M. J. Nkenlifack, “Data Security in healthcare Systems,” Inria.HAL.Science Web Portal, pp. 1-21, 2023
[18]. S. Singha, and R. Singha, “Protecting Data and Privacy: Cloud-based Solutions for Intelligent Transportation Applications,”
Scalable Computing: Practice and Experience, vol. 24, no. 3, pp. 257-276, 2023
[19]. S. N. Prasad, and C. Rekha, “Block chain based IAS protocol to enhance security and privacy in cloud computing,” Measurement: Sensors, vol. 28, no. 2023, pp. 1-6.
[20]. G. Airlangga, and A. Liu, “A Study of the Data Security Attack and Defense Pattern in a Centralized UAV–Cloud Architecture,” Drones, vol. 7, no. 5, pp. 1-102, 2023
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Chitra Sabapathy Ranganathan, Chelliah Srinivasan

This work is licensed under a Creative Commons Attribution 4.0 International License.