Have a personal or library account? Click to login
Hybrid Techniques for Shared File Security in Cloud Environment Using SHA-256 Cover

Hybrid Techniques for Shared File Security in Cloud Environment Using SHA-256

Open Access
|Mar 2026

References

  1. Al-Qtiemat, E. M. A. N., Z. E. Y. A. D. Al-Odat. Examining Cloud Security: Identifying Risks and the Implemented Mitigation Strategies. – Journal of Theoretical and Applied Information Technology, Vol. 102, 2024, No 7.
  2. Amajuoyi, C. P., L. K. Nwobodo, M. D. Adegbola. Transforming Business Scalability and Operational Flexibility with Advanced Cloud Computing Technologies. – Computer Science & IT Research Journal, Vol. 5, 2024, No 6, pp. 1469-1487.
  3. Anusha, P., R. Maruthi, D. M. Kumar, H. P. Begum. Double Encryption Technique for Sharing and Storing Images in the Cloud Environment. – In: Proc. of 4th International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies (ICAECT’24), IEEE, 2024, pp. 1-4.
  4. Arogundade, O. R. Strategic Security Risk Management in Cloud Computing: A Comprehensive Examination and Application of the Risk Management Framework. – International Advanced Research Journal in Science, Engineering and Technology, Vol. 11, 2024, No 1.
  5. Okazaki, N., S. Usuzaki, T. Waki, H. Kawagoe, M. Park, H. Yamaba, K. Aburada. Optimal Weighted Voting-Based Collaborative Malware Detection for Zero-Day Malware: A Case Study on VirusTotal and MalwareBazaar. – Future Internet, Vol. 16, 2024, No 8, 259.
  6. Haq, M. Y. M., A. Abhishta, S. Zeijlemaker, A. Chau, M. Siegel, L. J. Nieuwenhuis. Measuring Malware Detection Capability for Security Decision Making. – In: Proc. of IEEE European Symposium on Security and Privacy Workshops (EuroS&PW’24), IEEE, 2024, pp. 342-351.
  7. Aydin, Y., A. M. Garipcan, F. Özkaynak. A Novel Secure S-box Design Methodology Based on FPGA and SHA-256 Hash Algorithm for Block Cipher Algorithms. – Arabian Journal for Science and Engineering, 2024, pp. 1-14.
  8. Bezerra, J. I. M., A. Molter, G. Machado, R. I. Soares, V. V. D. A. Camargo. A Novel Single Kernel Parallel Image Encryption Scheme Based on a Chaotic Map. – Journal of Real-Time Image Processing, Vol. 21, 2024, No 4, pp. 1-13.
  9. Chauhan, R. Hybrid Approaches for Improving Cybersecurity and Network Intrusion Systems. – In: Hybrid Information Systems: Non-Linear Optimization Strategies with Artificial Intelligence, 2024, p. 153.
  10. Chen, A. C. Evaluation of Advanced Encryption Standard Algorithms for Image Encryption. – In: Proc. of International Conference on Smart Systems for Applications in Electrical Sciences (ICSSES’24), IEEE, 2024, pp. 1-6.
  11. Deshmukh, P. M., A. S. Gughane, P. L. Hasija, S. P. Katpale. Maintaining File Storage Security in Cloud Computing. – International Journal of Emerging Technology and Advanced Engineering, Vol. 2, 2012, No 10, pp. 2250-2459.
  12. Gilbert, H., H. Handschuh. Security Analysis of SHA-256 and Sisters. – In: Proc. of International Workshop on Selected Areas in Cryptography, Berlin, Heidelberg, Springer, 2003, pp. 175-193.
  13. Gowthaman, A., M. Sumathi. Performance Study of Enhanced SHA-256 Algorithm. – International Journal of Applied Engineering Research, Vol. 10, 2015, No 4, pp. 10921-10932.
  14. Gupta, A., N. Banakar, C. Kumar, M. Aryan, U. Purushotham. Design and Implementation of an Efficient Fingerprint Authentication Algorithm Using SHA-512. – In: Proc. of 3rd International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE’24), IEEE, 2024, pp. 1-7.
  15. Gupta, S., P. Kumar, A. Sardana, A. Abraham. A Secure and Lightweight Approach for Critical Data Security in Cloud. – In: Proc. of 4th International Conference on Computational Aspects of Social Networks (CASoN’12), IEEE, 2012, pp. 315-320.
  16. Hossain, M. A., M. B. Hossain, M. S. Uddin, S. M. Imtiaz. Performance Analysis of Different Cryptography Algorithms. – International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 6, 2016, No 3.
  17. Hussain, M. Z., M. Z. Hasan, A. N. Qureshi, G. Mustafa. Implementation of a Blockchain-Based Secure Cloud Computing Mechanism for Transactions. – In: Blockchain-Based Internet of Things, Chapman and Hall/CRC, 2024, pp. 146-166.
  18. Jain, S., S. Thaseen. Revolutionizing Malware Detection: Feature-Based Approach for Targeting Diverse Malware Categories. – In: Proc. of IEEE International Carnahan Conference on Security Technology (ICCST’23), IEEE, 2023, pp. 1-5.
  19. Jain, N., P. Singhal. Secure Cloud Data Storage and Sharing. – Journal of Informatics Electrical and Electronics Engineering (JIEEE), Vol. 5, 2024, No 1, pp. 1-12.
  20. Kishore, N., P. Raina. Parallel Cryptographic Hashing: Developments in the Last 25 Years. – Cryptologia, Vol. 43, 2019, No 6, pp. 504-535.
  21. Lanke, R., A. M. Z. Rahman, R. Bhardwaj, D. S. Reddy, P. Jain, T. R. Mahesh. Cloud Cryptography: Mechanism of Different Encryption Standards. – In: Proc. of 11th International Conference on Computing for Sustainable Global Development (INDIACom’24), IEEE, 2024, pp. 356-360.
  22. Marquis, Y. A. From Theory to Practice: Implementing Effective Role-Based Access Control Strategies to Mitigate Insider Risks in Diverse Organizational Contexts. – Journal of Engineering Research and Reports, Vol. 26, 2024, No 5, pp. 138-154.
  23. Mohammed, A. S., M. Alfudail, A. Alkhulaiwi, A. Bashar. Performance Analysis of Cryptographic Algorithms in Cloud Computing Systems. – In: Proc. of International Conference on Inventive Computation Technologies (ICICT’24), IEEE, 2024, pp. 1399-1405.
  24. Mohammed, Z. A., K. A. Hussein. PRC6: Hybrid Lightweight Cipher for Enhanced Cloud Data Security in Parallel Environment. – Security and Privacy, 2024, e413.
  25. Mustafa, N. A. A. Analysis of Attackers’ Methods with Hashing Secure Password Using CSPRNG and PBKDF2. – Wasit Journal of Engineering Sciences, Vol. 12, 2024, No 2, pp. 60-70.
  26. Myint, S. M., M. M. Myint, A. A. Cho. A Study of SHA Algorithm in Cryptography. – International Journal of Trend in Scientific Research and Development, Vol. 3, 2019, pp. 1453-1454.
  27. Olanrewaju, R. F., K. Abdullah, H. Darwis. Enhancing Cloud Data Security Using a Hybrid of Advanced Encryption Standard and Blowfish Encryption Algorithms. – In: Proc. of 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT’18), IEEE, 2018, pp. 18-23.
  28. Rawal, B. S., S. S. Vivek. Secure Cloud Storage and File Sharing. – In: Proc. of IEEE International Conference on Smart Cloud (SmartCloud’17), IEEE, 2017, pp. 78-83.
  29. Sasikumar, K., S. Nagarajan. Comprehensive Review and Analysis of Cryptography Techniques in Cloud Computing. – IEEE Access, 2024.
  30. Sattaiah, K., K. Chinnaiah. Providing Security in Genesis and Other Blocks of Blockchain Technology Using SHA-256 Algorithm. – In: Proc. of 3rd International Conference for Innovation in Technology (INOCON’24), IEEE, 2024, pp. 1-6.
  31. Sharma, M. S. A Study on Integrated Crypto-Biometric System to Protect Against Unauthorized Access of Data. – Journal of Interdisciplinary and Multidisciplinary Research (JIMR), Vol. 19, 2024, No 4.
  32. Srikanth, B., J. V. R. Ravindra, G. A. E. Satish, P. Kumar, F. Shaik. Implementation of an Improved High-Speed SHA-256 Algorithm from RTL to GDSII Using Verilog HDL. – In: Modern Approaches in Machine Learning and Cognitive Science: A Walkthrough. Vol. 4. Cham, Springer International Publishing, 2024, pp. 1-17.
  33. Su, B., Z. H. U. Yongcong, J. Pang, C. Wang, J. Li, X. Liu. Design of Security Protection Framework for Power Grid Cloud Application API Based on Zero Trust. – In: Proc. of 8th International Conference on Energy System, Electricity, and Power (ESEP’2023), SPIE, Vol. 13159, 2024, pp. 2035-2043.
  34. Tran, T. H., H. L. Pham, Y. Nakashima. A High-Performance Multimem SHA-256 Accelerator for Society 5.0. – IEEE Access, Vol. 9, 2021, pp. 39182-39192.
  35. Wagh, A., S. Yadav, P. Patil, S. Magdum, S. Shiravale. Enhanced File Storage on Cloud Using Hybrid Cryptography Algorithm. – In: Proc. of 3rd International Conference on Power Electronics and IoT Applications in Renewable Energy and its Control (PARC’24), IEEE, 2024, pp. 398-404.
  36. Wang, J., G. Liu, Y. Chen, S. Wang. Construction and Analysis of SHA-256 Compression Function Based on Chaos S-box. – IEEE Access, Vol. 9, 2021, pp. 61768-61777.
  37. Wang, Z., X. Dong, Y. Kang, H. Chen, Q. Wang. An Example of Parallel Merkle Tree Traversal: Post-Quantum Leighton-Micali Signature on the GPU. – ACM Transactions on Architecture and Code Optimization, 2024.
  38. Wu, R., X. Zhang, M. Wang, L. Wang. A High-Performance Parallel Hardware Architecture of SHA-256 Hash in ASIC. – In: Proc. of 22nd International Conference on Advanced Communication Technology (ICACT’20), IEEE, 2020, pp. 1242-1247.
  39. MalwareBazaar (Online). https://bazaar.abuse.ch/
  40. Ketipov, R., R. Schnalle, L. Doukovska, D. Dehez. Managing Cybersecurity: Digital Footprint Threats. – Cybernetics and Information Technologies, Vol. 24, 2024, No 3, pp. 151-162.
DOI: https://doi.org/10.2478/cait-2026-0003 | Journal eISSN: 1314-4081 | Journal ISSN: 1311-9702
Language: English
Page range: 37 - 54
Submitted on: Oct 7, 2025
|
Accepted on: Nov 28, 2025
|
Published on: Mar 21, 2026
In partnership with: Paradigm Publishing Services
Publication frequency: 4 issues per year

© 2026 Alaa AlKhazaleh, Feras E. AbuAladas, Saad M. Ismail, Mamoun Abu Helou, Waheeb Abu-ulbeh, Rizik M. H. Al-Sayyed, published by Bulgarian Academy of Sciences, Institute of Information and Communication Technologies
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.