RSA-AES Cryptosystem with Auto-Key Rotation for Cloud Storage

Azanuddin Azanuddin, Asyahri Hadi Nasyuha, Ikhwan Ruslianto, Moch. Iswan Perangin Angin, Moustafa H. Aly, Moses Adeolu Agoi

Abstract


The widespread adoption of cloud storage systems has increased the demand for cryptographic mechanisms that ensure data confidentiality while limiting security risks associated with static and long-lived encryption keys. Although hybrid RSA–AES schemes are commonly employed to balance security and computational efficiency, key management—particularly autonomous and quantitatively bounded key rotation—remains insufficiently formalized. This study proposes a hybrid RSA–AES cryptosystem equipped with an autonomous auto-key rotation mechanism defined through explicit analytical constraints. AES-256 is employed for bulk data encryption, while RSA-2048 is used for secure encapsulation of symmetric session keys. Key renewal is governed by inequality-based conditions on elapsed time (Δt ≤ 30 minutes) and encryption usage (n ≤ 10 operations), yielding a mathematically bounded key lifecycle without manual intervention or external infrastructure. System performance and operational security properties are evaluated in a simulated cloud environment using file sizes ranging from 100 KB to 10 MB. Quantitative metrics include encryption and decryption time complexity, computational overhead relative to AES-only encryption, key variability measured by Hamming distance, and data integrity verification using SHA-256. Experimental results demonstrate linear scalability and a stable average overhead of approximately 12.8%, indicating a bounded constant-factor cost independent of workload size. Successive AES-256 keys exhibit a mean Hamming distance of 127.42 bits, consistent with high key variability and effective key freshness. These findings show that analytically constrained key rotation enables controlled symmetric-key exposure while preserving practical efficiency overall.


Keywords


Auto-Rotation Key; Cloud Storage; Hybrid Cryptosystem; Key Lifecycle Modeling; RSA–AES

Full Text:

PDF

References


V. Verma, P. Kumar, R. K. Verma, and S. Priya, “A Novel Approach for Security in Cloud Data Storage Using AES-DES-RSA Hybrid Cryptography,” in 2021 Emerging Trends in Industry 4.0 (ETI 4.0), 2021, doi: 10.1109/ETI4.051663.2021.9619274.

R. Adee and H. Mouratidis, “A Dynamic Four-Step Data Security Model for Data in Cloud Computing Based on Cryptography and Steganography,” Sensors (Switzerland), vol. 1109, no. 22, pp. 1–23, 2022, doi: https://doi.org/10.3390/s22031109.

A. M. Qadir and N. Varol, “A review paper on cryptography,” 7th Int. Symp. Digit. Forensics Secur. ISDFS 2019, 2019, doi: 10.1109/ISDFS.2019.8757514.

M. Mumtaz and L. Ping, “Forty years of attacks on the RSA cryptosystem : A brief survey,” vol. 0529, 2019, doi: 10.1080/09720529.2018.1564201.

K. Sharma, A. Agrawal, D. Pandey, R. A. Khan, and S. Kumar, “RSA based encryption approach for preserving con fi dentiality of big data,” vol. 34, pp. 2088–2097, 2022.

Y. Luo, X. Ouyang, J. Liu, and L. Cao, “An Image Encryption Method Based on Elliptic Curve Elgamal Encryption and Chaotic Systems,” IEEE Access, vol. 7, no. c, pp. 38507–38522, 2019, doi: 10.1109/ACCESS.2019.2906052.

E. Jintcharadze and M. Iavich, “Hybrid Implementation of Twofish, AES, ElGamal and RSA Cryptosystems,” in 2020 IEEE East-West Design & Test Symposium (EWDTS), 2020, doi: 10.1109/EWDTS50664.2020.9224901.

H. Byun, J. Kim, Y. Jeong, B. Seok, and S. Gong, “A Security Analysis of Cryptocurrency Wallets against Password Brute-Force Attacks,” Electronics, pp. 1–15, 2024, doi: https://doi.org/10.3390/electronics13132433.

A. I. Mallick and R. Nath, “Navigating the Cyber security Landscape: A Comprehensive Review of Cyber-Attacks, Emerging Trends, and Recent Developments,” World Sci. News An Int. Sci. J., vol. 190, no. 1, pp. 1–69, 2024.

R. K. Muhammed, K. H. A. Faraj, J. F. Gul-Mohammed, T. N. A. Al Attar, S. J. Saydah, and D. A. Rashid, “Automated Performance analysis E-services by AES-Based Hybrid Cryptosystems with RSA, ElGamal, and ECC,” Adv. Sci. Technol. Eng. Syst. J., vol. 9, no. 3, pp. 84–91, 2024, doi: https://dx.doi.org/10.25046/aj090308.

D. Shivaramakrishna and M. Nagaratna, “A novel hybrid cryptographic framework for secure data storage in cloud computing: Integrating AES-OTP and RSA with adaptive key management and Time-Limited access control,” Alexandria Eng. J., vol. 84, no. December, pp. 275–284, 2023, doi: https://doi.org/10.1016/j.aej.2023.10.054.

G. Dhamodharan, “An Enhanced and Dynamic Key AES Algorithm for Internet of Things Data Security,” J. Adv. Zool., vol. 44, no. S-6, pp. 1323–1332, 2023, doi: 10.17762/jaz.v44iS6.2444.

F. M. Khalaf and A. M. Sagheer, “A Hybrid Encryption Model with Blockchain Integration for Secure Cloud Data Storage and Retrieval,” vol. 10, 2025.

A. O. Aseeri and A. Anjum, “Hybrid AES-ECC Model for the Security of Data over Cloud Storage,” vol. 10, pp. 1–20, 2021, doi: https://doi.org/10.3390/electronics10212673.

J. Reuben and J. O. Ouma, “Secure management of encryption keys for small and medium enterprises in Africa : A comparative study .,” no. May, 2022.

P. Elumalaivasan, T. Munirathinam, V. Kayalvizhi, G. Sekar, T. M. Sivanesan, and S. G, “Comparative Analysis of AES and AES-RSA Hybrid Techniques for Securing Visual Data Integrity,” in 11th International Conference on Communication and Signal Processing (ICCSP), 2025, vol. July, doi: 10.1109/ICCSP64183.2025.11089233.

C. U. Betrand, C. G. Onukwugha, M. E. Benson-emenike, C. Ofoegbu, and N. M. Awaji, “File Storage Security in Cloud Computing Using Hybrid Encryption File Storage Security in Cloud Computing Using Hybrid Encryption,” vol. 12, no. 1, pp. 1–9, 2024, doi: 10.11648/j.iotcc.20241201.11.

M. E. Smid, “Development of the Advanced Encryption Standard,” vol. 126, no. 126024, pp. 1–18, 2022.

N. E. El-attar, D. S. El-morshedy, and W. A. Awad, “A New Hybrid Automated Security Framework to Cloud Storage System,” cryptography, no. December, pp. 1–20, 2021, doi: https://doi.org/10.3390/cryptography5040037.

H. T. Assa, I. A. Hashim, A. A. Naser, and I. A. Hashim, “Advanced Encryption Standard ( AES ) acceleration and analysis using graphical processing unit ( GPU ),” no. 0123456789, pp. 1–6, 2021.

O. C. Abikoye, A. D. Haruna, A. Abubakar, N. O. Akande, and E. O. Asani, “Modified Advanced Encryption Standard Algorithm for Information Security,” pp. 1–16, 2019, doi: 10.3390/sym11121484.

J. Kaur, S. Lamba, and P. Saini, “Advanced Encryption Standard: Attacks and Current Research Trends,” 2021, pp. 112–116, doi: 10.1109/ICACITE51222.2021.9404716.

S. Devi and H. D. Kotha, “AES encryption and decryption standards,” in International conference on computer vision and machine learning, 2019, pp. 1–11, doi: 10.1088/1742-6596/1228/1/012006.

M. F. Abdelwahed, “A hybrid method for data compression and encryption based on bit packing , 128-based numerals , and bitmap manipulations : application to seismic data,” 2020.

S. Arshad and M. Khan, “New extension of data encryption standard over 128-bit key for digital images,” vol. 5, 2021.

S. Camtepe, J. Duda, A. Mahboubi, P. Morawiecki, M. Pawłowski, and J. Pieprzyk, “ANS-based compression and encryption with 128-bit security,” Int. J. Inf. Secur., vol. 21, no. 5, pp. 1051–1067, 2022, doi: 10.1007/s10207-022-00597-4.

A. Ghosh, S. Adhikari, S. Karforma, and W. Bengal, “A FAST AND EFFICIENT DOCUMENT ENCRYPTION METHOD FOR E-LEARNING APPLICATIONS USINGMODIFIED AES-CBCWITH CHAOTIC LOGISTIC PSEUDO RANDOM NUMBER SEQUENCE,” Adv. Mech., vol. 9, no. 3, pp. 1051–1060, 2021.

S. Lee and K. Sim, “Design and Hardware Implementation of a Simplified DAG-Based Blockchain and New AES-CBC Algorithm for IoT Security,” 2021.

A. S. Al-Bayati, “Enhancing Performance of Hybrid AES, RSA and Quantum Encryption Algorithm,” University for the degree of Master of Philosophy (MPhil), 2021.




DOI: http://dx.doi.org/10.30829/zero.v9i3.26827

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

Publisher :
Department of Mathematics
Faculty of Science and Technology
Universitas Islam Negeri Sumatera Utara Medan
📱 WhatsApp:085270009767 (Admin Official)
SINTA 2 Google Scholar CrossRef Garuda DOAJ