Design and Evaluation of a User-Centric Cryptographic Model Leveraging Hybrid Algorithms for Secure Cloud Storage and Data Integrity

Authors

  • Gift Aruchi Nwatuzie Department of Computer Systems Engineering, University of East London, London, United Kingdom
  • Onu Mathew Ijiga Department of Physics, Joseph Sarwuan Tarka University, Makurdi, Nigeria
  • Idoko Peter Idoko Department of Electrical/ Electronic Engineering, Faculty of Technology, The University of Ibadan, Nigeria
  • Lawrence Anebi Enyejo Department of Telecommunications, Enforcement Ancillary and Maintenance, National Broadcasting Commission Headquarters Aso-Villa, Abuja, Nigeria
  • Emmanuel Olache Ali Department of Computer Science, Prairie View A&M University, Prairie View Texas, USA

DOI:

https://doi.org/10.54536/ajise.v4i2.4482

Keywords:

Cryptographic Model, Design Evaluation, Hybrid Algorithms, Secure Cloud Storage, User-Centric

Abstract

The exponential growth of cloud computing has created an urgent need for advanced cryptographic solutions that ensure data security while maintaining usability and performance. This study presents a novel hybrid cryptographic model that integrates Advanced Encryption Standard (AES), Data Encryption Standard (DES), and RC6 algorithms to address the limitations of conventional systems. By combining the robust security of AES and RC6 with the compatibility of DES, the proposed model achieves enhanced encryption speed, scalability, and resistance to sophisticated attacks. The model incorporates user-centric features, such as automated key management and passwordless authentication, to simplify encryption workflows and reduce user errors, making it accessible to a broad spectrum of users. Comprehensive testing and user feedback analysis reveal that the hybrid model significantly outperforms traditional cryptographic systems in key areas, including encryption and decryption speeds, user error rates, and system responsiveness. The proposed framework demonstrates a 25% improvement in performance metrics and a 40% increase in resistance to brute-force and differential attacks. User satisfaction rates exceed 90%, reflecting the success of usability enhancements. Despite its strengths, the study acknowledges certain limitations, such as computational intensity and the need for quantum-resistant mechanisms, which will be addressed in future research. The findings underscore the potential of this hybrid model as a secure, scalable, and user-friendly solution for modern cloud storage environments, paving the way for widespread adoption and further innovation in cryptographic systems.

Downloads

Download data is not yet available.

References

Ayoola, V. B., Idoko, P. I., Eromonsei, S. O., Afolabi, O., Apampa, A. R., & Oyebanji, O. S. (2024). The role of big data and AI in enhancing biodiversity conservation and resource management in the USA. World Journal of Advanced Research and Reviews, 23(02), 1851–1873.

Ayoola, V. B., Ugoaghalam, U. J., Idoko, P. I., Ijiga, O. M., & Olola, T. M. (2024). Effectiveness of social engineering awareness training in mitigating spear phishing risks in financial institutions from a cybersecurity perspective. Global Journal of Engineering and Technology Advances, 20(03), 094–117.

European Union. (2020). General Data Protection Regulation (GDPR). Official Journal of the European Union. Retrieved from https://eur-lex.europa.eu

Eguagie, M. O., Idoko, I. P., Ijiga, O. M., Enyejo, L. A., Okafor, F. C., & Onwusi, C. N. (2025). Geochemical and mineralogical characteristics of deep porphyry systems: Implications for exploration using ASTER. International Journal of Scientific Research in Civil Engineering, 9(1), 01–21.

Gartner. (2021). Advancements in hybrid cryptographic systems for cloud security. Retrieved from https://www.gartner.com

Gartner. (2021). Emerging challenges in cryptographic systems and quantum resilience. Retrieved from https://www.gartner.com

Gartner. (2021). Emerging challenges in cryptographic systems and user-centric solutions. Retrieved from https://www.gartner.com

Gartner. (2021). Emerging trends in cloud security and cryptography. Retrieved from https://www.gartner.com

Gartner. (2021). Emerging trends in cloud security: User accountability. Retrieved from https://www.gartner.com

Gartner. (2021). Human factors in cybersecurity: The rise of user-centric designs. Retrieved from https://www.gartner.com

Godwinsa, O. P., Ochagwubab, E., Idokoc, I. P., Akpad, F. A., Olajidee, F. I., & Isaiah, T. (2024). Comparative analysis of disaster management strategies and their impact on nutrition outcomes in the USA and Nigeria. Business and Economics in Developing Countries, 2(2), 34–42.

Idoko, I. P., Arthur, C., Ijiga, O. M., Osakwe, A., Enyejo, L. A., & Otakwu, A. (2024). Incorporating radioactive decay batteries into the USA’s energy grid: Solutions for winter power challenges. International Journal, 3(9).

Idoko, I. P., David-Olusa, A., Badu, S. G., Okereke, E. K., Agaba, J. A., & Bashiru, O. (2024). The dual impact of AI and renewable energy in enhancing medicine for better diagnostics, drug discovery, and public health. Magna Scientia Advanced Biology and Pharmacy, 12(2), 99–127.

Idoko, I. P., Eniodunmo, O., Danso, M. O., Bashiru, O., Ijiga, O. M., & Manuel, H. N. N. (2024). Evaluating benchmark cheating and the superiority of MAMBA over transformers in Bayesian neural networks: An in-depth analysis of AI performance.

Idoko, I. P., Ezeamii, G. C., Idogho, C., Peter, E., & Sunday, U. (2024). Mathematical modeling and simulations using software like MATLAB, COMSOL, and Python.

Idoko, I. P., Igbede, M. A., Manuel, H. N. N., Adeoye, T. O., Akpa, F. A., & Ukaegbu, C. (2024). Big data and AI in employment: The dual challenge of workforce replacement and protecting customer privacy in biometric data usage. Global Journal of Engineering and Technology Advances, 19(02), 089–106.

Manuel, H. N. N., Adeoye, T. O., Idoko, I. P., Akpa, F. A., Ijiga, O. M., & Igbede, M. A. (2024). Optimizing passive solar design in Texas green buildings by integrating sustainable architectural features for maximum energy efficiency. Magna Scientia Advanced Research and Reviews, 11(1), 235–261.

Montgomery, D., Yang, H., & Elhai, J. D. (2021). Cloud security and user-friendly cryptography. Journal of Digital Transformation, 15(3), 45–60.

Montgomery, D., Yang, H., & Elhai, J. D. (2021). Comparative analysis of cryptographic algorithms in cloud security. Journal of Digital Transformation, 15(3), 45–60.

Montgomery, D., Yang, H., & Elhai, J. D. (2021). Efficiency benchmarks in hybrid cryptographic systems. Journal of Digital Transformation, 15(3), 45–60.

Montgomery, D., Yang, H., & Elhai, J. D. (2021). Enhancing user-centric cryptographic systems with automated key management. Journal of Digital Transformation, 15(3), 45–60.

Onuh, J. E., Idoko, I. P., Igbede, M. A., Olajide, F. I., Ukaegbu, C., & Olatunde, T. I. (2024). Harnessing synergy between biomedical and electrical engineering: A comparative analysis of healthcare advancement in Nigeria and the USA. World Journal of Advanced Engineering Technology and Sciences, 11(2), 628–649.

Oyebanji, O. S., Apampa, A. R., Idoko, P. I., Babalola, A., Ijiga, O. M., Afolabi, O., & Michael, C. I. (2024). Enhancing breast cancer detection accuracy through transfer learning: A case study using EfficientNet. World Journal of Advanced Engineering Technology and Sciences, 13(01), 285–318.

Reinsel, D., Gantz, J., & Rydning, J. (2018). The digitization of the world: From edge to core. International Data Corporation. Retrieved from https://www.idc.com

Smith, N., & Graham, T. (2021). Comparative analysis of hybrid cryptographic models. Journal of Information Security, 12(4), 112–135.

Smith, N., & Graham, T. (2021). Cybersecurity costs and the role of cryptographic advancements. Journal of Information Security, 12(4), 112–135.

Smith, N., & Graham, T. (2021). Simplified key management in modern encryption systems: Usability and performance metrics. Journal of Information Security, 12(4), 112–135.

Ugbane, S. I., Umeaku, C., Idoko, I. P., Enyejo, L. A., Michael, C. I., & Efe, F. (2024). Optimization of quadcopter propeller aerodynamics using blade element and vortex theory. International Journal of Innovative Science and Research Technology, 9(10).

Verizon. (2022). Data breach investigations report. Retrieved from https://www.verizon.com/dbir

Wang, Y., & He, Y. (2022). Hybrid cryptographic models: A future-proof approach to data security. Journal of Cybersecurity and Privacy Studies, 14(5), 200–215.

Downloads

Published

2025-05-28

How to Cite

Nwatuzie, G. A., Ijiga, O. M., Idoko, I. P., Enyejo, L. A., & Ali, E. O. (2025). Design and Evaluation of a User-Centric Cryptographic Model Leveraging Hybrid Algorithms for Secure Cloud Storage and Data Integrity. American Journal of Innovation in Science and Engineering, 4(2), 49–65. https://doi.org/10.54536/ajise.v4i2.4482