CRYPTOGRAPHIC FRAMEWORK FOR CLOUD-BASED DOCUMENT STORAGE USING AES-256 AND SHA-256 HYBRID SYSTEMS

Penulis

  • junaidi Junaidi Surya Universitas Nurdin Hamzah
  • Ahmad Louis University Nurdin Hamzah
  • Faiza Rini University Nurdin Hamzah
  • Sri Mulyati University Nurdin Hamzah
  • Elzas Elzas University Nurdin Hamzah

DOI:

https://doi.org/10.33480/jitk.v11i2.7132

Kata Kunci:

AES-256 , Cloud Drive , Cryptography , Data Integrity, SHA-256

Abstrak

Cloud-based document storage offers significant flexibility but faces security challenges such as the risk of data leaks and illegal modifications. The study proposes a cryptographic framework using a combination of Advanced Encryption Standard (AES)-256 for confidential encryption and Secure Hash Algorithm (SHA)-256 for cloud storage-based document integrity verification. The system was developed with an experimental approach, implemented in application prototypes, and tested on a wide range of file sizes from as small as < 1 mb, 10 mb to 100 mb showing greater efficiency than Rivest-Shamir-Adleman (RSA) and elliptical curve cryptography (ECC). To improve security, a distributed key management scheme and password-based user authentication were added.  The encryption system will be tested on Google Drive, One Drive, and mega cloud platforms and evaluated through a series of performance and security tests combined with on-premises personal computer (PC) systems. This framework provides a practical solution for secure document storage in the cloud with a balance between security, performance, and ease of use. This research reinforces the urgency of applying modern cryptography in dealing with the risk of data leakage in public cloud services, and can be adopted as a security and efficiency model and solution for individuals, as well as government and private offices that use cloud storage as a storage base for important documents such as Decrees, Securities, certificates, diplomas and other important data

Unduhan

Data unduhan belum tersedia.

Referensi

D. T. Valivarthi, “Implementing the SHA Algorithm in an Advanced Security Framework for Improved Data Protection in Cloud Computing via Cryptography,” 2023.

S. H. Murad and K. H. Rahouma, “Hybrid Cryptographic Approach to Safeguard Cloud Computing Services: A Survey,” 2021, pp. 785–793. doi: 10.1007/978-3-030-69717-4_72.

R. Ardiansyah, S. Widodo, and M. Lestari, “Analysis of the effectiveness of SHA-256 on data authenticity verification,” J Cybersecur, vol. 4, no. 1, pp. 12–22, 2023.

M. Alshalaan and N. A. Khan, “Complexities and Challenges for Securing Digital Assets and Infrastructure in Academia,” in Complexities and Challenges for Securing Digital Assets and Infrastructure, IGI Global, 2025, pp. 225–244. doi: 10.4018/979-8-3373-1370-2.ch011.

M. Pamungkas and D. Chandra, “Analisis Pola dan Dampak Serangan Cryptojacking dengan Menggunakan Metode Analisis Dinamis dan Analisis Statis,” JURIKOM (Jurnal Riset Komputer), vol. 9, p. 1511, Oct. 2022, doi: 10.30865/jurikom.v9i5.5041.

P. Biswas, “A Comparative Study Of Encryption Algorithms For Enhancing Data Confidentiality In Cloud Storage Systems,” 2025. [Online]. Available: https://www.theaspd.com/ijes.php

L. K. Suresh Kumar, “Cloud Computing Data Storage Security: A Comprehensive Review,” International Journal of Intelligent Systems and Applications in Engineering, vol. 12, no. 3, pp. 4443 – 4449, Mar. 2024, [Online]. Available: https://ijisae.org/index.php/IJISAE/article/view/7205

M. Rais Rabtsani, A. Triayudi, and G. Soepriyono, “Combination of AES (Advanced Encryption Standard) and SHA256 Algorithms for Data Security in Bill Payment Applications,” SAGA: Journal of Technology and Information Systems, vol. 2, no. 1, p. 175189, 2024, doi: 10.58905/SAGA.vol2i1.250.

R. Indrayani, P. Ferdiansyah, and M. Koprawi, “Analisis Penggunaan Kriptografi Metode AES 256 Bit pada Pengamanan File dengan Berbagai Format,” Digital Transformation Technology, vol. 4, no. 2, pp. 1245–1251, Feb. 2025, doi: 10.47709/digitech.v4i2.5457.

L. Aprillia, M. Febiyana, and S. S. Pungkasari, “PERAN CLOUD COMPUTING DALAM MENINGKATKAN EFISIENSI SISTEM INFORMASI DI PERUSAHAAN.”

William Stallings, Cryptography_and_Network_Security, 8th ed. Pearson, 2022. Accessed: Nov. 26, 2025. [Online]. Available: https://dokumen.pub/qdownload/security-and-cryptography-for-networks-i-6340972.html

N. W. Hidayatulloh, M. Tahir, H. Amalia, N. A. Basyar, A. F. Prianggara, and M. Yasin, “Mengenal Advance Encryption Standard (AES) sebagai Algoritma Kriptografi dalam Mengamankan Data,” Digital Transformation Technology, vol. 3, no. 1, pp. 1–10, May 2023, doi: 10.47709/digitech.v3i1.2293.

S. S. R and A. C. M, “Comparison Between Encryption Algorithms: A Performance and Security Perspective,” 2025.

Rajesh Kumar, Neha Gupta, and Arun Mehta, “A Comparative Analysis of Cryptographic Algorithms for Secure Data Transmission in 5G Networks,” International Journal of Information Engineering and Science, vol. 1, no. 2, pp. 08–12, May 2024, doi: 10.62951/ijies.v1i2.88.

A. Chincholkar, A. Londhe, M. Joshi, P. Gole, and S. Mirgale, “Ensuring Confidentiality and Integrity in Cloud Storage using AES Encryption and SHA-256 Hashing,” 2025. doi: DOI:10.17577/IJERTV14IS100041.

Mrs. G. Venkateswari, S. Sowjanya, S. Meenamrutha, K. S. Mounika, S. H. Priyanka, and M. Anvitha, “Detecting Replicated Files in the Cloud,” Int J Res Appl Sci Eng Technol, vol. 11, no. 4, pp. 3621–3627, Apr. 2023, doi: 10.22214/ijraset.2023.50987.

Saman Khan, “Enhancing Cloud Data Security using a Hybrid Cryptographic Model: A Combination of Advanced Encryption Standard and Elliptic Curve Cryptography,” Journal of Information Systems Engineering and Management, vol. 10, no. 34s, pp. 01–13, Apr. 2025, doi: 10.52783/jisem.v10i34s.5770.

T. Blake, R. Wells, M. Barton, M. Song, and M. Yates, “Data Encryption and Key Management with AWS KMS: A Comprehensive Exploration of Secure Cloud Cryptography,” Nov. 2024.

M. Blessing, “Cloud Encryption Strategies and Key Management,” Sep. 2024.

J. Surya and M. Fattachul, PEMROGRAMAN MYSQL DATABASE WITH STREAMLIT PYTHON. PT. Sonpedia Publishing Indonesia. [Online]. Available: www.buku.sonpedia.com

Peter Iris, “PERFORMANCE ANALYSIS OF AES, RSA, AND ECC IN REAL- TIME APPLICATIONS,” Jul. 2025.

Springer, Security and Cryptography for Networks, vol. 14973. Cham: Springer Nature Switzerland, 2024. doi: 10.1007/978-3-031-71070-4.

D. Tohanean and S.-G. Toma, “The Impact of Cloud Systems on Enhancing Organizational Performance through Innovative Business Models in the Digitalization Era,” Proceedings of the International Conference on Business Excellence, vol. 18, pp. 3568–3577, Jul. 2024, doi: 10.2478/picbe-2024-0289.

W. Miller, K. Lerner, A. Conn, and H. Blake, “The Importance of Cryptographic Key Management in Cloud Security,” Feb. 2023.

Y. M. A. Abualkas and L. B. D, “Hybrid Approach to Cloud Storage Security Using ECC-AES Encryption and Key Management Techniques,” International Journal of Engineering Trends and Technology, vol. 72, no. 4, pp. 92–100, Apr. 2024, doi: 10.14445/22315381/IJETT-V72I4P110.

J. Hutagalung, P. S. Ramadhan, and S. J. Sihombing, “Keamanan Data Menggunakan Secure Hashing Algorithm (SHA)-256 dan Rivest Shamir Adleman (RSA) pada Digital Signature,” Jurnal Teknologi Informasi dan Ilmu Komputer, vol. 10, no. 6, pp. 1213–1222, Dec. 2023, doi: 10.25126/jtiik.2023107319.

K. Sasikumar and S. Nagarajan, “Enhancing Cloud Security: A Multi-Factor Authentication and Adaptive Cryptography Approach Using Machine Learning Techniques,” IEEE Open Journal of the Computer Society, vol. 6, pp. 392–402, 2025, doi: 10.1109/OJCS.2025.3538557.

##submission.downloads##

Diterbitkan

2025-12-01

Cara Mengutip

[1]
junaidi Junaidi Surya, A. . Louis, F. . Rini, S. . Mulyati, dan E. Elzas, “CRYPTOGRAPHIC FRAMEWORK FOR CLOUD-BASED DOCUMENT STORAGE USING AES-256 AND SHA-256 HYBRID SYSTEMS”, jitk, vol. 11, no. 2, hlm. 535–549, Des 2025.