<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Securing File on Cloud Computing System using Encryption Software: A Comparative Analysis</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Victor O. Waziri</string-name>
          <email>victor.waziri@futminna.edu.ng</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>John K. Alhassan</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ismaila Idris</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Raji Abdullahi Egigogo</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Cyber Security Department, Federal University of Technology Minna</institution>
          ,
          <country country="NG">Nigeria</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Federal University of Technology</institution>
          ,
          <addr-line>Minna</addr-line>
          ,
          <country country="NG">Nigeria</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Today, numerous organizations that offer cloud technologies include among others Amazon</institution>
          ,
          <addr-line>Google</addr-line>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2016</year>
      </pub-date>
      <fpage>97</fpage>
      <lpage>104</lpage>
      <abstract>
        <p>-The need for an efficient, secure, accurate, reliable way of securing user information arises as individuals and organizations increase their dependency on cloud computing. Data encryption is very important nowadays due to increasing in data theft not only on cloud platform but also on user's computer. For this study, 3 different Open Source encryption software's (7-zip, B1 Free Archiver and Axcrypt) were tested for their encryption type, usability, advantages, accessibility and others, all of which were found to be using AES 256-bit Algorithm for encryption due to its reliability. 7 zip is the most preferred encryption program due to its wide availability, light weight, faster encryption and better compression ratio. To ensure the security of information, encryption of sensitive data not only to be uploaded to the cloud but also on user's computer becomes necessary.</p>
      </abstract>
      <kwd-group>
        <kwd>-cloud</kwd>
        <kwd>7-zip</kwd>
        <kwd>B1 Free Archiver</kwd>
        <kwd>Axcrypt</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>INTRODUCTION</p>
      <p>
        The delivery of computing services across the globe is
cloud computing [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Cloud facilities allow persons and
companies to use hardware and software that are handled
by third parties at inaccessible locations [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. There are
services provided by the cloud such as webmail, online file
storage, online business applications and social networking
sites among others. The cloud computing model permits
access to computer resources and information from
everywhere that a network connection is available. It also
offers a shared pool of resources, including computer
processing power, networks data storage space, specialized
corporate and user applications [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ].
      </p>
      <p>
        A common reoccurring word in cloud computing is the
internet. The Internet is a mechanism for information
dissemination, and a medium for collaboration and
interaction between individuals and their computers without
regard for the geographic location [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
      </p>
      <p>
        It is a worldwide system of unified networks of computer
that use the(TCP/IP) that is internet protocol suite to join
billions of devices worldwide, consisting of millions of
academic, private, business, public, and government
networks of local to global scope, coupled with a wide array
of wireless, optical networking technologies and electronic
devices [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
      </p>
      <p>
        In cloud, privacy and security of personal information is
very important. Often in another country, personal
information is turned over to another organization making it
unsecured. It is essential to ensure that data is only accessed
by the authorized user to overcome the high level of
insecurity [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. For businesses, organizations and individuals
that are in view of using a cloud services need to know the
privacy policies, understands the security and practices of the
cloud providers.
      </p>
      <p>The complexity and cost of operating and owning
computers and networks is significantly reduced when using
cloud computing. For example If an individual or company
uses a cloud services, less money is needed and spent on
buying software licenses or hardware or even information
technology infrastructure</p>
      <p>
        One of the major cloud service providers Microsoft is
committed to providing a cloud you can trust. They believe
there are five critical areas you need to know about when
talking about cloud security [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]:
 Security options and capabilities available in the
cloud
 Maintaining privacy and control of your data
 Addressing industry compliance rules
 The need for transparency and visibility into how
your data is stored and protected.
      </p>
      <p>Several literatures have proposed various method of
ensuring the security of data in cloud such as authentication,
accesses controls and cryptography among others which are
mostly enforced either by third parties or service providers.
The paper proposed a technique of securing files on cloud
using encryption program by suggesting the best amongst the
three presented based on the comparison made.</p>
      <p>The paper is structured in the following manner. The first
segment is the introduction which contained motivation, aim,
objectives, scope and limitation of the research. The next
segment reviewed several literatures that are related to the
subject matter in details. In Section III, methodology used in
evaluating and testing the software’s is discussed. The main
activities involved in evaluating the three (3) selected progra
m and a comparative analysis of the selected programs were
explored in Section IV. Finally, the paper is completed with
the succeeding segment.</p>
    </sec>
    <sec id="sec-2">
      <title>Motivation for the Research</title>
      <p>Dropbox and Microsoft with new once coming up every now
and then. Every of these cloud providers come with its own
kind of services and different security technologies that
strive to convince the customer of it been the best either way.</p>
      <p>It will be wiser if the security of information is placed
more in the hands of the owner as this go along to install and
improve the confidence level in cloud security and data
integrity since the only person that can easily access
information on the cloud must be the same person that puts
them or any other party granted access by the owner of the
information. Hence, the motivation for this research came as
result of the increasing need to have more effective way for
securing data on the cloud to keep it away from data theft.</p>
    </sec>
    <sec id="sec-3">
      <title>B. Aim and Objectives of the Study</title>
      <p>The aim of this research is to implement and test
different encryption software platforms and select the one's
that will be best suited to use in securing files on the cloud
technology. The objectives of the study include to:
 Test for different software encryption (Types/
parameters).
 Employ the use of some encryption software's and
implement a means of ensuring security by allowing
access to file using password encryption setup by the
information owner so that the integrity of the
outsourced data is not compromised on the cloud.
 Compare the encryption software's and ascertain the
area that is best suited for securing files on the
cloud</p>
    </sec>
    <sec id="sec-4">
      <title>C. Scope and Limitation</title>
      <p>The research covers implementation of some encryption
software. Cloud computing system is an internet based
application, which makes its accessible from every corner of
the world. The research will provide standard and guidelines
for the cloud service providers and as well as cloud users.</p>
      <p>II.</p>
      <p>LITERATURE REVIEW</p>
      <p>
        The idea behind a centralized computing began as far
back as the 1960s, when mainframe time-sharing technology
was the computing services provided across a network. At
exactly 1966, a book titled "The Challenge of the Computer
Utility" was put out by a Canadian engineer Douglass
Parkhill, which traces the idea of computing as a public
utility with a centralized computing facility to which many
remote users connect over networks [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ].
      </p>
      <p>In the 1960s, computing resources were efficiently used
by the mainframe time-sharing method and offered
acceptable performance to users; As a result of increasingly
high hardware costs mainframes were hard to provision
upfront and scale. Therefore, users didn’t have full power over
the performance of mainframe applications as it depended on
how many users used the mainframe at a given moment.
Thus, with the preface of personal computers users prefer to
have absolute power over their computing resources, even
although these resources are not efficiently used.</p>
      <p>Personal computers became affordable and business
deserted mainframes with the change in the semiconductor
industry. The challenge of how to share data was then
introduced. Client-server systems were believed to tackle this
data-sharing challenge through the means of providing
centralized data management and processing servers. As the
Internet became widely adopted and business computing
needs grew, the original simple client-server architecture
changed into more compound architectures. Thus, the
complexity and the management costs of IT have passed
even the costs of real software development in big
organizations are typically lesser than infrastructure
maintenance and costs of the software.</p>
      <p>The dream of numerous enterprises is the
background information technology matters and how to
focus on core business instead. However, the result of the
cloud computing acceptance is yet to be pictured, many
companies think that cloud computing may present a feasible
alternative model that may cut costs and complexity whereas
escalating operational competence.</p>
    </sec>
    <sec id="sec-5">
      <title>A. Cloud</title>
      <p>
        The Cloud is a computing platform that depends on the
internet for availability and accessibility [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. The cloud
makes it feasible to use information from everywhere at any
time. In the case of traditional computer setup, the person
accessing the resources is required to be in the same place
with the data storage device [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. This is especially helpful
for businesses that cannot afford the same amount of
hardware and storage space as a bigger company which
makes the cloud cheap and accessible for all.
      </p>
      <p>B. Cloud Computing</p>
      <p>
        [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] defined Cloud computing as a subscription-based
service where you can obtain networked storage space and
computer resources. A clearer way to understand cloud
computing is to relate it to the experience with email. The
email client such as Yahoo!, Gmail, Hotmail among others
takes care of housing all the hardware and software
necessary to support the user personal email account. The
authors classified cloud computing into two which are can be
based on services offered (infrastructure as a service (Iaas),
platform as a service (PaaS) and software as a service
(SaaS)) and location (public, private, and hybrid community
cloud).
      </p>
    </sec>
    <sec id="sec-6">
      <title>C. Cloud Security</title>
      <p>
        The set of control-based policies and technologies are
designed to protect and adhere to regulatory compliance rule
in other to enforce overall security in cloud computing, it
usage is associated with infrastructure and data applications
[
        <xref ref-type="bibr" rid="ref11">11</xref>
        ].
      </p>
      <p>The most challenging obstacle to the acceptance of cloud
is the security of data. Data is most valuable asset,
individuals and organizations are really concern to know the
status of their data. That is whether the data is safe or not.</p>
      <p>
        When data are stored internally, individuals, companies,
and government are rest assured of its security as they handle
the overall control. Even though no warranty that data is
more confined within when compared with the public cloud.
The public cloud might be even more secured in storing data
due to the fact that the providers of these services may
implement advance level of security. Various methods of
protecting data in the cloud have been implemented but full
protection of data cannot be assured. The following are some
of the resent techniques proposed by different authors.
A secure and efficient auditing scheme was developed by
[
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] which have capabilities such as confidentiality, public
auditing, maintaining the data integrity and privacy
preserving among others. The scheme is made up of three
entities: data owner, TPA and cloud server each with its own
responsibility. This proposed auditing scheme makes use of
SHA-2 for integrity check, RSA signature for digital
signature calculation and AES algorithm for encryption.
      </p>
      <p>
        [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] presented a flexible and efficient distributed method
with assured dynamic data support, as well as delete, append
and block update. This method support public auditing
mechanism and preserving privacy of shared data in the
cloud. It involves the hashing technique to achieve the
correctness of data across the server in the cloud. The TPA
can execute many auditing tasks concurrently.
      </p>
      <p>
        Two separate algorithms namely symmetric key
cryptographic and message authentication code (MAC)
generation and was introduced by [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ] to support effective
storage of data in cloud using public integrity auditing
technique. The main research objective was to improve the
integrity of the content of data stored in cloud and to reduce
the bandwidth. The performance of the scheme was assessed
in aspect of block size, time computationa, cycles per block,
number of rounds, key size. The evaluation shows that the
proposed scheme provides the better results.
      </p>
      <p>
        [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ] proposed cryptographic technique that combines
Secure Hash Algorithm 1 (SHA 1) and AES for key
generation process and encryption respectively, using a trust
computation means for securing the communication amid
two servers. This method of trust computation includes the
dynamicity of IP address, server rating by users and the
number of connection refused.
      </p>
      <p>
        [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ], to ascertain the correctness of users' data in the
cloud, an efficient means with outstanding characteristic of
data confidentiality and integrity was used. This account
presented a clarification which uses the RSA algorithm and
the means of hash function beside with different coding tools
to give an improved security to the information stored in the
cloud. This model cannot completely decipher the hitch of
storage of huge data which will grant data access control
mechanisms and share data files with integrity and
confidentiality.
      </p>
      <p>
        According to [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ], offered a means of providing
confidentiality and integrity of the data stored in mobile
cloud. The anticipated method uses the RSA algorithm with
other decryption and encryption processes so as to ensure
that information does not leak on the cloud. In this method,
encryption is used to provide security to the data while on
transit
      </p>
      <p>
        [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ] proposed privacy preserving public auditing using
TPA for security of data files stored on cloud. The proposed
method support data partitioning technique for data storage
security in cloud service Partitions are again divided into
chunks for send at servers this helps to quick retrieval and
store. To authenticate the user before gaining access to data
so that great level of security achieve, the authors used one
time password (OTP) in authenticating the user over
network.
      </p>
      <p>
        [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ] proposed a technique that makes use of
cryptographic algorithms such as Blowfish, RSA and Digital
signature, prevent unauthorized users from accessing the data
in the cloud either accidentally or intentionally with the help
of Roll Back Access Control (RBAC).
      </p>
      <p>
        [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ], in this paper, the RSA cryptographic method was
combined with Magic Square algorithm when implementing
data security in cloud computing. The RSA was used to
evaluate the local and cloud environment which was
analysed with different input file size while magic square
deals with complexity in encryption and boosts the security
in the cloud environment. The result revealed that
encryption and decryption of data using RSA consumed time
at an average rate both in the local and cloud environment. It
was concluded that RSA algorithm is very secure with the
aid of the magic square.
      </p>
      <p>The proposed scheme provides client-side security
measure that can be taken to guarantee the information
stored in the cloud. The proposal uses the cryptographic
techniques of encryption using Diffie-Hellman algorithms
and Advanced Encryption Standard (AES). AES was used to
encipher the data before uploading to the cloud while
DiffieHellman algorithm was employed to generate the key pair.</p>
      <p>III.</p>
      <p>METHODOLOGY</p>
      <p>This chapter looked into procedures for testing and
evaluating the softwares under consideration. These
procedures follow a systematically structured approach to
effectively understand and provide techniques for the
usability and the advantages of the softwares by comparing
all standards.</p>
    </sec>
    <sec id="sec-7">
      <title>A. Software</title>
      <p>The following software’s were used to conduct the
research:
 7zip
 B1 Free Archiver
 AxCrypt</p>
      <p>These software were selected based on ranking and
accessibility offering open source license.</p>
      <p>The 7zip was developed by Igor Pavlov 1999. It is
an open-source file archiver, an application primarily used to
compress files. Also uses its own 7z archive format, but can
read and write several other archive formats. The program
can be used from a command-line interface, graphical user
interface and with window-based shell integration.
The cross-platform version of the command line utility 7zip
is also available.</p>
      <p>B1 Free Archiver is a free multiplatform compression
tool and an open-source software project that produces a
cross-platform command-line tool and a Java library for
creating and extracting file archives in the B1 archive format.</p>
      <p>AxCrypt is an efficient, simple, free open source, and
easy to use encryption tool. It is a GNU GPL-licensed
program for windows which integrates properly with the
windows shell. The tool locked a file for a certain period of
time and later decrypt itself or if the intended receiver
obtained it. AxCrypt proffers security against brute force
cracking attempts with a lightweight less than 1MB and
supports 128-bit AES encryption only.</p>
    </sec>
    <sec id="sec-8">
      <title>B. Considered Implementation of the Software</title>
      <p>The following are considered in the implementation of
the software.



</p>
      <p>Software Encryption Type/Parameters.</p>
      <p>Use of Password protection on files.</p>
      <p>Easy Implementation procedures.</p>
      <p>Comparing the three Softwares and ascertaining the
most suitable depending on user need.</p>
    </sec>
    <sec id="sec-9">
      <title>C. System Hardware Requirements</title>
      <p>The following are the system hardware requirements
A computer system (either desktop or laptop)
 Processor of any kind e.g. Intel Pentium 4.
 1GB RAM and above.
 At least 200mb Installation Space
 Keyboard.
 Mouse.
 Internet Access</p>
      <p>IV.</p>
      <p>TEST AND EVALUATION</p>
      <p>
        This section deals with the main activities involved in
evaluating the three (3) selected programs for the study. The
programs were selected due to wide availability, simplicity,
and accessibility. System testing involves any activity aimed
at evaluating an attribute or capability of a program or
system and determining that it meets its required results [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ].
It is the installation of the new software after all user
requirements are met which basically includes system
operating system (OS) and system hardware configuration.
      </p>
      <p>For this study, we made use of Microsoft Windows 7
Professional Edition was used as the OS and a computer
system with the following Hardware configurations.</p>
      <p>The Table I shows basic information of the system used
during testing and evaluation of the programs. All the
programs performed excellently well with no known
compatibility issues with the Operating System.</p>
      <p>Table II shows that all software's require little space for
installation with the highest file size requirement were
140mb.</p>
      <p>The table II shows comparative analysis of the 3 selected
program based on File Size (64 Bit Installer), File Size after
installation on system, open source, version/release date,
encryption algorithm, OS compatibility, license, command
line interface, self extractor, unlock other encryption,
compression ration window Context Menu Integration and
Registration.</p>
      <p>The study revealed that 7 Zip is a lightweight application
with just 1.31 megabytes (MB) of installation file size in a
64-bit version. It is the most compatible with all the three
application used during this research with wide support for
almost all common operating systems (windows, Linux,
FreeBSD, Mac Os, Solaris and Aix among others). It is an
opens source application under the Great New Utility (GNU)
and Lesser General Public License (LGPL); therefore 7-Zip
can be used on any computer, including a computer in a
commercial organization. 7zip support 256bit AES
Encryption Algorithm which is still currently unbreakable
except using brute force attack which is only easy and
possible if password set is not strong enough. i.e using only
small length numbers and alphabets with no capitalization
and other characters as a password. Even after installing the
software the file size is still comparatively smaller than the
others. 7zip support self-extraction this implies that a zip file
can be created using 7zip that can extract itself without
needing any zip manager or 7-zip been installed preinstalled
on the system. It is the only one amongst them that support
this feature. Some computer hardware vendors install 7zip on
their machine during factory installation showcasing its wide
acceptance and usability. For software developers and
command line gigs 7 zip support command line interface
which can be easily integrated into other software for
usability within the software's and also since it is an open
source, developers are free to lookup the source code to add,
modify and make the application better and more suitable for
the purpose they require it to perform. It integrates very well
with windows operating system and provides easy access
through the windows context menu.
7zip can be easily downloaded from the website and has
basic windows installation requirement to install. Figure 1
shows a graphical representation of 7zip download website.</p>
      <p>Download website: http://www.7-zip.org/download.html</p>
      <p>The software requires a very simple installation process.
When running the installer, is run, it simply pops up an
installer windows with the default Program file directory
where the software is going to be installed to, alternatively,
the default directory if so desired during the installation
process.</p>
      <p>The graphical representation on Figure 2 is been labeled
with a number to provide the reader with easy reference to
the part of the program been explained. This allows the
reader pictorial and graphical representation of the program
which foster easy comprehension and retention. Though
bearing in mind the most important part of the research
(encryption), effective use the software from the interface is
performed the following after running the software.




</p>
      <p>Navigate to the Directory where the file to be
Encrypted resides.</p>
      <p>Select the File or Files to be Encrypted
Click on the Add Button (A new Popup window
appears showing you all the possible Encryption
parameter possible on the software).</p>
      <p>This represents the encryption parameters that can be
choosing, for the purpose of the default parameters
provided by the system was used.
7z extension is the default file type for 7zip
Archive/Encryption, the extension changes when
another Archive format is selected (.zip .tar .gzip and
others), every of which has its drawback and
advantage. Also, the extension file can be .exe
telling you option 7 from the graphic is selected
representing Self-Extracting Archive (SFX). SFX
are archives that can extract themselves without
requiring any preinstalled archive or extraction
software.</p>
      <p>This is the most important aspect of the Encryption
were password is set to protect the archive from
unauthorized access. Without this option been setup,
the archive is just a normal archive that can be easily
accessed by anyone. Around it, a select box that
shows the kind of Encryption system been used
(AES 256) which till date is one of the strongest
encryption system known.</p>
      <p>This provides option for SFX as earlier discussed in
number 5.</p>
      <p>After everything is setup and looking ok. This option
commits the selection and proceeds with the
archiving. The archived file is by default placed in
the same directory as the navigated directory in 1,
except if new directory is re-specified by the user.
</p>
      <p>Below are procedures of Creating an Archive
(Encryption from the Windows Context Menu). The contexts
menu provides a fast and easy way of creating Encrypted
Archive.</p>
      <p></p>
      <p>Right-click on the desired file/files, folder/folders or
a combination of both to be encrypted.</p>
      <p>Select the 7-zip option on the context menu to
display other options
</p>
      <p>Click on "Add to Archive" to pop up the Encryption
option as earlier covered. If basic Archive requires
without encryption quickly do that by selecting add
to (Filename).7z" or "(Filename).zip".</p>
    </sec>
    <sec id="sec-10">
      <title>Extracting file from the context menu</title>
      <p>source code to add, modify and make the application better
and more suitable for the purpose they require it to perform.
It integrates very well with windows operating system and
provides easy access through the windows context menu.
Below represents a graphical presentation of the software.</p>
    </sec>
    <sec id="sec-11">
      <title>D. Encrypting/Archiving File with B1 Free Archiver</title>
      <p>If 7zip is setup as the default zip managing software then
you can see a file type like the one labeled 1 on the figure 4.
 7zip Archived file
 7-zip SFX file
 Right click on the file or files you wish to extract
and scroll down to 7-zip and select
 Select the option most suitable to you. Open
Archive, Extract Files..., Extract Files Here all pops
up a new window demanding for password used in
setting up the Encrypted Archive file.
 Insert the Passphrase used in encrypting the file
 Select ok to begin file extraction.</p>
      <p>Alternatively, file from 7-zip application menu can also
be selected by selecting the desired file to be extracted and
clicking on the extract button from the menu. For further
guidance and instruction, the help files by selecting help
from the file menu then click on content.</p>
      <p>
        B1 Free Archiver compared with other programs used for
this study and commonly known encryption software, B1
free Archiver is large with an approximate file size of 44.55
MB. It is the second most compatible software with support
for four common most used OS (windows, Linux, Mac Os
and Android). It is also an Opens Source Application under
the GNU LGPL license, which makes it accessibility span
over both private and public usage. It supports 256bit AES
Encryption Algorithm which according to [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] is still
currently unbreakable except using brute force attack which
is only easy and possible if password set is not strong
enough. i.e using only small length numbers and alphabets
with no capitalization and other characters as a password.
After installing the software, the file size tripled to an
approximate 140 MB which is due to offer special features
like the file preview and beautified GUI offered by the
software. It does not support self-extraction. For software
developers and command line gigs B1 Free Archiver support
command line interface which can be easily integrated into
other software's for usability within the software's and also
since it is an open source developer are free to lookup the
      </p>
      <p>Figure 5 depicts how B1 free Archive is used to create
secured encrypted file after running the program.</p>
      <p> Address Bar shows the Address of the current
working folder, if the need arises, easy navigation to
the desired folder the files to be encrypted reside.
 Select file/Files intended to archive.
 This is a preview page used to preview your files,
though, limited to only certain file types
 Create Button used to create the Encrypted file after
the selection process.

</p>
      <p>This is where the location of the Output destination
is set and also file name of the Encrypted file. By
Default it is set to the destination of the selected
file/files for Encryption and the name of the file if
single or the name of the folder if multiple.</p>
      <p>This is the option used to select the type of archive
to be created. by Default .B1 is selected which
cannot be opened by any other known program


except B1 which provides it with another layer of
security.</p>
      <p>This option allows you add Encryption to the
Archive.</p>
      <p>After all, parameters are well inserted you then
proceed by clicking this button to commit changes.
If a password is inserted, a confirmation dialogue
pops up to confirm the password and to prevent
mistakes.</p>
    </sec>
    <sec id="sec-12">
      <title>E. Extracting Files with B1 Free Archiver (Context Menu)</title>
      <p>The following are the procedure in extracting file from
the context menu:
 Right-click on the desired file to be extracted.
 Select Extract Here from the context menu and the
extracted files to be in the same Directory as the one
are currently working on else are selected.
 Select “Extract to” for other options to populate
describing where and how the downloaded files will
be.
 A pop-up window appears asking to input the
password used during the encryption before the
extraction will begin.</p>
      <p>B1 Free Archiver supports numerous archive file format
and can be used for common Archive management alone that
is (.B1, .zip, .gzip, others).</p>
      <p>V.</p>
      <p>DISCUSSION</p>
      <p>
        Nowadays information theft and ransomware are the
leading threat to computer and digital data. It is believed that
all cloud provider put in an extra effort to see that
information stored with them are adequately secured and free
from prying eyes. Although, that has not been able to totally
prevent information theft and privacy intrusions. Some
information gets into the wrong hands through malware
installed on target computers [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ], some through an insecure
network and others through security breach on the cloud
platform. Recently a collection of private pictures of various
celebrities, mostly women and with many containing nudity
were posted on the image board which was gotten from a
hack on the cloud account of the celebrities, if the files were
encrypted while uploading them, the hacker will have just
been left with useless information since the main aim of
encryption is to prevent unauthorized access. Also, there is a
fear of administrators of the cloud accessing user
information; this can be prevented using an encryption from
the user end. AES 256 Encryption till date proves to be one
of the best encryption algorithms with no known fact on
crackability except using password guesses which can be
prevented using stronger passwords.
      </p>
      <p>7-zip is lightweight with little memory requirement and
is compatible with most archive formats. It has a very high
compression ratio with a simple to use user interface. B1 free
Archive is very easy to use and with a very appealing
graphical interface. It is simple flexible and supports
numerous file extensions also with a B1 format that can only
be extracted using the software itself.</p>
      <p>When storing or would like to store your files in the
cloud, make sure they are securely encrypted before
uploading them to the cloud. Encrypting your files will
safeguard the privacy of your data, which is especially
important when storing sensitive corporate data or personal
information that should never fall into the wrong hands.</p>
      <p>SUMMARY, CONCLUSION AND RECOMMENDATIONS</p>
    </sec>
    <sec id="sec-13">
      <title>A. Summary</title>
      <p>Encrypting files before been sent through any media or
stored by the owner of the document is currently the best
way of preventing unauthorized access to files. Cloud
Computing offers enormous benefits to user in terms of file
accessibility from any part of the world but has its limitations
mostly in the area of Security. The most challenging obstacle
to the acceptance of cloud is the security of data. Data is
most valuable asset, individuals and organizations are really
concern to know the status of their data. That is whether the
data is safe or not.</p>
      <p>When data are stored internally, individuals, companies,
and government are rest assured of its security as they handle
the overall control. Even though no warranty that data is
more confined within when compared with the public cloud.
The public cloud might be even more secured in storing data
due to the fact that the providers of these services may
implement advance level of security. Various methods of
protecting data in the cloud have been implemented but full
protection of data cannot be assured. Therefore the best way
of securing files even on user’s computer is by Encrypting
sensitive information.</p>
      <p>7-zip, B1 Free File Archive, and Axcrypt all provide
secure encryption mechanism using AES 256-bit algorithm
to effectively encrypt files. AES 256-bit algorithm currently
has no proven record of crackability, which means any file
encrypted with AES 256-bit is secure and cannot be accessed
except by using the correct password set during encryption.</p>
      <p>7zip support self-extraction this implies that a zip file can
be created using 7zip that can extract itself without needing
any zip manager or 7-zip been installed preinstalled on the
system. It is the only one amongst them that support this
feature. Some computer hardware vendors install 7zip on
their machine during factory installation showcasing its wide
acceptance and usability</p>
    </sec>
    <sec id="sec-14">
      <title>Conclusion</title>
      <p>Data encryption is very important nowadays due to
increasing in data theft and independence on cloud
platforms. The research work presents securing file on cloud
computing system using encryption software: a comparative
analysis.The encryption programs are 7zip, B1 free acrhiver
and Axcrpt which are been compared on varieties of
paramiters. The result have revealed that among the
encryption softawares, 7zip work better due to its wide
availability, light weight, faster encryption and better
compression ratio when compared to the others.</p>
    </sec>
    <sec id="sec-15">
      <title>Recommendations</title>
      <p>File Encryption provides an efficient, secure, accurate,
reliable way of securing sensitive information both on user
computer and cloud. Companies and individuals should put
in time and efforts to ensure that sensitive information is well
encrypted to prevent unauthorized access. The following
recommendations are proffered.</p>
      <p> Encrypting sensitive files and information before
been uploaded to the cloud.
 Using a combination of alphabets, numbers and
characters as Encryption password to reduce the
possibility of brute force attack.</p>
    </sec>
    <sec id="sec-16">
      <title>D. Suggestions for Further Study</title>
      <p>
</p>
      <p>Design and implementation of encryption programs
that is back to back compatible with all cloud service
providers from the client's end.</p>
      <p>Implementing password strengthening parameters
when setting up a password to ensure the user sees
the strength of the password been set.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>M.</given-names>
            <surname>Maslin</surname>
          </string-name>
          and
          <string-name>
            <surname>R.</surname>
          </string-name>
          ,
          <article-title>Ailar “A Review of Cloud Computing Technology Solution for Healthcare System'</article-title>
          .
          <source>Journal of Applied Sciences, engineering and technology</source>
          vol
          <volume>8</volume>
          <fpage>iss</fpage>
          .
          <volume>20</volume>
          ,
          <fpage>2150</fpage>
          -
          <lpage>2153</lpage>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>K.</given-names>
            <surname>Lakhtaria</surname>
          </string-name>
          , “
          <article-title>Next Generation Wireless Network Security and Priva cy</article-title>
          .
          <source>Advances In Information Security</source>
          , Privacy And Ethics.Retrieved f rom https://books.google.
          <source>com.ng/books?isbn=146668688X and Acce ssed on 20th June</source>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Priv</surname>
          </string-name>
          ,
          <article-title>"Introduction to Cloud Computing"</article-title>
          . Retrieved from https://ww w.priv.gc.ca/resource/fs-fi/02_05_d_51_cc_e.pdf,
          <source>and Accessed 17th July 2016 and 2016</source>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>A.</given-names>
            <surname>Aized</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Irfan</surname>
          </string-name>
          ,
          <string-name>
            <surname>K.</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Fazal</surname>
          </string-name>
          , “
          <article-title>Encryption techniques for cloud data confidentiality”</article-title>
          .
          <source>International Journal of Grid Distribution Computing</source>
          <volume>7</volume>
          (
          <issue>4</issue>
          ) 11 20 http://dx.doi.org/10.14257/ijgdc.
          <year>2014</year>
          .
          <volume>7</volume>
          .4.02 ISSN:
          <fpage>2005</fpage>
          - 4262
          <string-name>
            <surname>IJGDC</surname>
          </string-name>
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>M.</given-names>
            <surname>Barry</surname>
          </string-name>
          et al “
          <article-title>A Brief History of the Internet.”. Retrieved from www.internetsociety.org/internet/what-internet/history-internet/briefhistory-internet and accessed 17th</article-title>
          <source>July</source>
          <year>2016</year>
          2009.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>R. O</given-names>
            <surname>Ugwuoke</surname>
          </string-name>
          ,
          <article-title>"Contributions and challenges of the internet to the development of university undergraduates" June 2013 retrieved from google</article-title>
          and
          <source>accessed on 27/07/2016</source>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>Cyber</given-names>
            <surname>Centre</surname>
          </string-name>
          , “Cloud Computing Security Considerations” updated
          <year>2012</year>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>R.</given-names>
            <surname>Tim</surname>
          </string-name>
          , “
          <article-title>Five things you should know about cloud security”</article-title>
          . Retrieved from https://blogs.microsoft.com/cybertrust/2016/01/06/five-things
          <article-title>-youshould-know-about-cloud-security and accessed on 17th July 2016</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>G.</given-names>
            <surname>Eugene</surname>
          </string-name>
          , “
          <source>Cloud Computing Models” Composite Information Systems Laboratory (CISL)</source>
          ,
          <source>Sloan School of Management, Room E62-422</source>
          , Massachusetts Institute of Technology.
          <year>2013</year>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>A.</given-names>
            <surname>Huth</surname>
          </string-name>
          and
          <string-name>
            <surname>J. Cebula “</surname>
          </string-name>
          <article-title>The Basics of Cloud Computing”</article-title>
          . Retrieved from https://www.uscert.gov/sites/default/files/.../CloudComputingHuthCe bulaand accessed
          <issue>17th</issue>
          <year>July 2016</year>
          2011.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>A. W.</given-names>
            <surname>Khan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. U.</given-names>
            ,
            <surname>Khan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Ilyas</surname>
          </string-name>
          and
          <string-name>
            <surname>M. I. Azeem</surname>
          </string-name>
          , “
          <article-title>A literature survey on data privacy/protection issues and challenges in cloud computing”</article-title>
          .
          <source>IOSRJCE</source>
          , vol
          <volume>11</volume>
          pg.,
          <volume>28</volume>
          -
          <fpage>36</fpage>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>M.</given-names>
            <surname>Swapnali</surname>
          </string-name>
          and
          <string-name>
            <given-names>C.</given-names>
            <surname>Sangita</surname>
          </string-name>
          . “
          <article-title>Third Party Public Auditing scheme for Cloud Storage”</article-title>
          , 7th International Conference on Communication,
          <article-title>Computing and Virtualization retrieved from www</article-title>
          .
          <source>sciencedirect.com accessed on 20th August</source>
          ,
          <year>2016</year>
          , 2016
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>B.</given-names>
            <surname>Subramani</surname>
          </string-name>
          and
          <string-name>
            <given-names>P.N.Indu</given-names>
            <surname>Vikashini</surname>
          </string-name>
          “
          <article-title>A security issues on cloud com puting” worldwidejournals</article-title>
          .com/paripex/file.php?val=April_
          <year>2016</year>
          _14 60809682__
          <fpage>130</fpage>
          ..2016
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>N.</given-names>
            <surname>Dave</surname>
          </string-name>
          , “
          <article-title>AES encryption is cracked Researchers find a weakness in the algorithm"</article-title>
          . Retrieved from http://www.theinquirer.net/inquirer/news/ 2102435/aes-encryption-cracked.
          <source>2011and accessed 17th January</source>
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Sneha</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C. A.</given-names>
            <surname>Suriya</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S.</given-names>
            <surname>Indhumathi</surname>
          </string-name>
          , “
          <article-title>A secure the data in cloud by using private auditing scheme”</article-title>
          . Retrieved from http://www.ripublication.
          <source>com and accessed on 20th august</source>
          <year>2016</year>
          ,
          <year>2016</year>
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>A. J.</given-names>
            <surname>Emily</surname>
          </string-name>
          and
          <string-name>
            <given-names>S.</given-names>
            <surname>Karthigaiveni</surname>
          </string-name>
          , “
          <article-title>New Public Integrity Auditing Scheme for Cloud Data Storage Using Mac And Symmetric Key Cryptographic Algorithms”</article-title>
          .
          <source>International Journal of Applied Engineering</source>
          Research vol.
          <volume>11</volume>
          issue
          <issue>3</issue>
          , pp
          <fpage>1894</fpage>
          -
          <lpage>1899</lpage>
          retrieved from http://www.ripublication.
          <source>com and accessed on 20th august 2016</source>
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>T.</given-names>
            <surname>Gaur</surname>
          </string-name>
          and
          <string-name>
            <given-names>D.</given-names>
            <surname>Sharma</surname>
          </string-name>
          , “
          <source>A Secure and Efficient Client-Side Encryption Scheme in Cloud Computing.” I.J. Wireless and Microwave Technologies</source>
          , vol
          <volume>1</volume>
          ,
          <fpage>23</fpage>
          -
          <lpage>33</lpage>
          Published Online January 2016
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>M.</given-names>
            <surname>Priyanka</surname>
          </string-name>
          and
          <string-name>
            <given-names>S.</given-names>
            <surname>Priya</surname>
          </string-name>
          , “
          <article-title>Cloud Data Outsourcing and off sourcing using trust computation” (IJCSIT)</article-title>
          <source>International Journal of Computer Science and Information Technologies</source>
          , Vol.
          <volume>7</volume>
          iss.3 ,
          <year>2016</year>
          ,
          <fpage>1417</fpage>
          -
          <lpage>1424</lpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>S.V.</given-names>
            <surname>Tikore</surname>
          </string-name>
          and
          <string-name>
            <surname>D. K Pradeep</surname>
          </string-name>
          ,
          <article-title>“Ensuring the Data Integrity and Confidentiality in Cloud Storage Using Hash Function and</article-title>
          TPA”.
          <source>International Journal on Recent and Innovation Trends in Computing and Communication</source>
          .Vol.
          <volume>3</volume>
          Iss. 5, 2015
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>S.</given-names>
            <surname>Yogesh</surname>
          </string-name>
          and
          <string-name>
            <given-names>V.</given-names>
            <surname>Alka</surname>
          </string-name>
          , “
          <article-title>Privacy Preserving using Data Partitioning Technique for Secure Cloud Storage</article-title>
          ”
          <source>International Journal of Computer Applications</source>
          (
          <volume>0975</volume>
          -
          <fpage>8887</fpage>
          ) vol. issue
          <volume>116</volume>
          (
          <issue>16</issue>
          ).
          <source>Retrieved from research.ijcaonline.org/volume116/number16/pxc3902721.pd access on 20th march 2016</source>
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>D</given-names>
            <surname>Rani</surname>
          </string-name>
          and
          <string-name>
            <given-names>R. K.</given-names>
            <surname>Rajan</surname>
          </string-name>
          , “
          <article-title>Enhance data security of private cloud using encryption scheme with RBAC”</article-title>
          .
          <source>International Journal of Advanced Research in Computer and Communication</source>
          Engineering Vol.
          <volume>3</volume>
          ,
          <string-name>
            <surname>Issue</surname>
            <given-names>6</given-names>
          </string-name>
          ,
          <string-name>
            <surname>June</surname>
            <given-names>2014</given-names>
          </string-name>
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>A.</given-names>
            <surname>Dharini</surname>
          </string-name>
          , et al “
          <article-title>Data Security for Cloud Computing Using RSA with Magic Square Algorithm”</article-title>
          .
          <source>International Journal of Innovation and Scientific Research ISSN 2351-8014</source>
          Vol.
          <volume>11</volume>
          No. 2
          <year>2014</year>
          , pp.
          <fpage>439</fpage>
          -
          <lpage>444</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>