=Paper= {{Paper |id=Vol-1830/Paper57 |storemode=property |title=Securing File on Cloud Computing System using Encryption Software: A Comparative Analysis |pdfUrl=https://ceur-ws.org/Vol-1830/Paper57.pdf |volume=Vol-1830 |authors=Victor O. Waziri,John K. Alhassan,Ismaila Idris,Raji Abdullahi Egigogo }} ==Securing File on Cloud Computing System using Encryption Software: A Comparative Analysis== https://ceur-ws.org/Vol-1830/Paper57.pdf
                      International Conference on Information and Communication Technology and Its Applications
                                                             (ICTA 2016)
                                                      Federal University of Technology, Minna, Nigeria
                                                                     November 28 – 30, 2016




         Securing File on Cloud Computing System using Encryption Software: A
                                 Comparative Analysis



                     Victor O. Waziri, John K. Alhassan, Ismaila Idris, and Raji Abdullahi Egigogo
                           Cyber Security Department, Federal University of Technology Minna, Nigeria
                                                 victor.waziri@futminna.edu.ng

Abstract—The need for an efficient, secure, accurate, reliable            information is turned over to another organization making it
way of securing user information arises as individuals and                unsecured. It is essential to ensure that data is only accessed
organizations increase their dependency on cloud computing.               by the authorized user to overcome the high level of
Data encryption is very important nowadays due to increasing              insecurity [6]. For businesses, organizations and individuals
in data theft not only on cloud platform but also on user's               that are in view of using a cloud services need to know the
computer. For this study, 3 different Open Source encryption              privacy policies, understands the security and practices of the
software's (7-zip, B1 Free Archiver and Axcrypt) were tested              cloud providers.
for their encryption type, usability, advantages, accessibility               The complexity and cost of operating and owning
and others, all of which were found to be using AES 256-bit
                                                                          computers and networks is significantly reduced when using
Algorithm for encryption due to its reliability. 7 zip is the most
preferred encryption program due to its wide availability, light
                                                                          cloud computing. For example If an individual or company
weight, faster encryption and better compression ratio. To                uses a cloud services, less money is needed and spent on
ensure the security of information, encryption of sensitive data          buying software licenses or hardware or even information
not only to be uploaded to the cloud but also on user’s                   technology infrastructure
computer becomes necessary.                                                   One of the major cloud service providers Microsoft is
                                                                          committed to providing a cloud you can trust. They believe
   Keywords-cloud; 7-zip; B1 Free Archiver; Axcrypt                       there are five critical areas you need to know about when
                                                                          talking about cloud security [7]:
                                                                               Security options and capabilities available in the
                      I.     INTRODUCTION                                          cloud
    The delivery of computing services across the globe is                     Maintaining privacy and control of your data
cloud computing [1]. Cloud facilities allow persons and                        Addressing industry compliance rules
companies to use hardware and software that are handled                        The need for transparency and visibility into how
by third parties at inaccessible locations [2]. There are                          your data is stored and protected.
services provided by the cloud such as webmail, online file
storage, online business applications and social networking                   Several literatures have proposed various method of
sites among others. The cloud computing model permits                     ensuring the security of data in cloud such as authentication,
access to computer resources and information from                         accesses controls and cryptography among others which are
everywhere that a network connection is available. It also                mostly enforced either by third parties or service providers.
offers a shared pool of resources, including computer                     The paper proposed a technique of securing files on cloud
processing power, networks data storage space, specialized                using encryption program by suggesting the best amongst the
corporate and user applications [3].                                      three presented based on the comparison made.
    A common reoccurring word in cloud computing is the                       The paper is structured in the following manner. The first
internet. The Internet is a mechanism for information                     segment is the introduction which contained motivation, aim,
dissemination, and a medium for collaboration and                         objectives, scope and limitation of the research. The next
interaction between individuals and their computers without               segment reviewed several literatures that are related to the
regard for the geographic location [4].                                   subject matter in details. In Section III, methodology used in
    It is a worldwide system of unified networks of computer              evaluating and testing the software’s is discussed. The main
 that use the(TCP/IP) that is internet protocol suite to join             activities involved in evaluating the three (3) selected progra
billions of devices worldwide, consisting of millions of                  m and a comparative analysis of the selected programs were
academic, private, business, public, and government                       explored in Section IV. Finally, the paper is completed with
networks of local to global scope, coupled with a wide array              the succeeding segment.
of wireless, optical networking technologies and electronic
devices [5].                                                              A. Motivation for the Research
    In cloud, privacy and security of personal information is                 Today, numerous organizations that offer cloud
very important. Often in another country, personal                        technologies include among others Amazon, Google,
                                                                     97
                                        International Conference on Information and Communication Technology and Its Applications (ICTA 2016)

Dropbox and Microsoft with new once coming up every now                centralized data management and processing servers. As the
and then. Every of these cloud providers come with its own             Internet became widely adopted and business computing
kind of services and different security technologies that              needs grew, the original simple client-server architecture
strive to convince the customer of it been the best either way.        changed into more compound architectures. Thus, the
    It will be wiser if the security of information is placed          complexity and the management costs of IT have passed
more in the hands of the owner as this go along to install and         even the costs of real software development in big
improve the confidence level in cloud security and data                organizations are typically lesser than infrastructure
integrity since the only person that can easily access                 maintenance and costs of the software.
information on the cloud must be the same person that puts                 The dream of numerous enterprises is the
them or any other party granted access by the owner of the             background information technology matters and how to
information. Hence, the motivation for this research came as           focus on core business instead. However, the result of the
result of the increasing need to have more effective way for           cloud computing acceptance is yet to be pictured, many
securing data on the cloud to keep it away from data theft.            companies think that cloud computing may present a feasible
                                                                       alternative model that may cut costs and complexity whereas
B. Aim and Objectives of the Study                                     escalating operational competence.
    The aim of this research is to implement and test
different encryption software platforms and select the one's           A. Cloud
that will be best suited to use in securing files on the cloud             The Cloud is a computing platform that depends on the
technology. The objectives of the study include to:                    internet for availability and accessibility [9]. The cloud
     Test for different software encryption (Types/                   makes it feasible to use information from everywhere at any
         parameters).                                                  time. In the case of traditional computer setup, the person
     Employ the use of some encryption software's and                 accessing the resources is required to be in the same place
         implement a means of ensuring security by allowing            with the data storage device [10]. This is especially helpful
         access to file using password encryption setup by the         for businesses that cannot afford the same amount of
         information owner so that the integrity of the                hardware and storage space as a bigger company which
         outsourced data is not compromised on the cloud.              makes the cloud cheap and accessible for all.
     Compare the encryption software's and ascertain the
         area that is best suited for securing files on the            B. Cloud Computing
         cloud                                                             [10] defined Cloud computing as a subscription-based
                                                                       service where you can obtain networked storage space and
C. Scope and Limitation                                                computer resources. A clearer way to understand cloud
    The research covers implementation of some encryption              computing is to relate it to the experience with email. The
software. Cloud computing system is an internet based                  email client such as Yahoo!, Gmail, Hotmail among others
application, which makes its accessible from every corner of           takes care of housing all the hardware and software
the world. The research will provide standard and guidelines           necessary to support the user personal email account. The
for the cloud service providers and as well as cloud users.            authors classified cloud computing into two which are can be
                                                                       based on services offered (infrastructure as a service (Iaas),
                  II.   LITERATURE REVIEW                              platform as a service (PaaS) and software as a service
                                                                       (SaaS)) and location (public, private, and hybrid community
    The idea behind a centralized computing began as far               cloud).
back as the 1960s, when mainframe time-sharing technology
was the computing services provided across a network. At               C. Cloud Security
exactly 1966, a book titled "The Challenge of the Computer
Utility" was put out by a Canadian engineer Douglass                       The set of control-based policies and technologies are
Parkhill, which traces the idea of computing as a public               designed to protect and adhere to regulatory compliance rule
utility with a centralized computing facility to which many            in other to enforce overall security in cloud computing, it
remote users connect over networks [8].                                usage is associated with infrastructure and data applications
    In the 1960s, computing resources were efficiently used            [11].
by the mainframe time-sharing method and offered                           The most challenging obstacle to the acceptance of cloud
acceptable performance to users; As a result of increasingly           is the security of data. Data is most valuable asset,
high hardware costs mainframes were hard to provision up-              individuals and organizations are really concern to know the
front and scale. Therefore, users didn’t have full power over          status of their data. That is whether the data is safe or not.
the performance of mainframe applications as it depended on                When data are stored internally, individuals, companies,
how many users used the mainframe at a given moment.                   and government are rest assured of its security as they handle
Thus, with the preface of personal computers users prefer to           the overall control. Even though no warranty that data is
have absolute power over their computing resources, even               more confined within when compared with the public cloud.
although these resources are not efficiently used.                     The public cloud might be even more secured in storing data
    Personal computers became affordable and business                  due to the fact that the providers of these services may
deserted mainframes with the change in the semiconductor               implement advance level of security. Various methods of
industry. The challenge of how to share data was then                  protecting data in the cloud have been implemented but full
introduced. Client-server systems were believed to tackle this         protection of data cannot be assured. The following are some
data-sharing challenge through the means of providing                  of the resent techniques proposed by different authors.

                                                                  98
                                       International Conference on Information and Communication Technology and Its Applications (ICTA 2016)

    A secure and efficient auditing scheme was developed by           in the cloud either accidentally or intentionally with the help
[12] which have capabilities such as confidentiality, public          of Roll Back Access Control (RBAC).
auditing, maintaining the data integrity and privacy                      [22], in this paper, the RSA cryptographic method was
preserving among others. The scheme is made up of three               combined with Magic Square algorithm when implementing
entities: data owner, TPA and cloud server each with its own          data security in cloud computing. The RSA was used to
responsibility. This proposed auditing scheme makes use of            evaluate the local and cloud environment which was
SHA-2 for integrity check, RSA signature for digital                  analysed with different input file size while magic square
signature calculation and AES algorithm for encryption.               deals with complexity in encryption and boosts the security
    [15] presented a flexible and efficient distributed method        in the cloud environment.          The result revealed that
with assured dynamic data support, as well as delete, append          encryption and decryption of data using RSA consumed time
and block update. This method support public auditing                 at an average rate both in the local and cloud environment. It
mechanism and preserving privacy of shared data in the                was concluded that RSA algorithm is very secure with the
cloud. It involves the hashing technique to achieve the               aid of the magic square.
correctness of data across the server in the cloud. The TPA               The proposed scheme provides client-side security
can execute many auditing tasks concurrently.                         measure that can be taken to guarantee the information
    Two separate algorithms namely symmetric key                      stored in the cloud. The proposal uses the cryptographic
cryptographic and message authentication code (MAC)                   techniques of encryption using Diffie-Hellman algorithms
generation and was introduced by [16] to support effective            and Advanced Encryption Standard (AES). AES was used to
storage of data in cloud using public integrity auditing              encipher the data before uploading to the cloud while Diffie-
technique. The main research objective was to improve the             Hellman algorithm was employed to generate the key pair.
integrity of the content of data stored in cloud and to reduce
the bandwidth. The performance of the scheme was assessed                                   III.   METHODOLOGY
in aspect of block size, time computationa, cycles per block,
                                                                           This chapter looked into procedures for testing and
number of rounds, key size. The evaluation shows that the
                                                                      evaluating the softwares under consideration. These
proposed scheme provides the better results.
                                                                      procedures follow a systematically structured approach to
    [17] proposed cryptographic technique that combines
                                                                      effectively understand and provide techniques for the
Secure Hash Algorithm 1 (SHA 1) and AES for key
                                                                      usability and the advantages of the softwares by comparing
generation process and encryption respectively, using a trust
                                                                      all standards.
computation means for securing the communication amid
two servers. This method of trust computation includes the            A. Software
dynamicity of IP address, server rating by users and the
number of connection refused.                                             The following software’s were used to conduct the
    [18], to ascertain the correctness of users' data in the          research:
cloud, an efficient means with outstanding characteristic of               7zip
data confidentiality and integrity was used. This account                  B1 Free Archiver
presented a clarification which uses the RSA algorithm and                 AxCrypt
the means of hash function beside with different coding tools             These software were selected based on ranking and
to give an improved security to the information stored in the         accessibility offering open source license.
cloud. This model cannot completely decipher the hitch of                 The 7zip was developed by Igor Pavlov 1999. It is
storage of huge data which will grant data access control             an open-source file archiver, an application primarily used to
mechanisms and share data files with integrity and                    compress files. Also uses its own 7z archive format, but can
confidentiality.                                                      read and write several other archive formats. The program
    According to [19], offered a means of providing                   can be used from a command-line interface, graphical user
confidentiality and integrity of the data stored in mobile            interface and with window-based shell integration.
cloud. The anticipated method uses the RSA algorithm with             The cross-platform version of the command line utility 7zip
other decryption and encryption processes so as to ensure             is also available.
that information does not leak on the cloud. In this method,              B1 Free Archiver is a free multiplatform compression
encryption is used to provide security to the data while on           tool and an open-source software project that produces a
transit                                                               cross-platform command-line tool and a Java library for
    [20] proposed privacy preserving public auditing using            creating and extracting file archives in the B1 archive format.
TPA for security of data files stored on cloud. The proposed              AxCrypt is an efficient, simple, free open source, and
method support data partitioning technique for data storage           easy to use encryption tool. It is a GNU GPL-licensed
security in cloud service Partitions are again divided into           program for windows which integrates properly with the
chunks for send at servers this helps to quick retrieval and          windows shell. The tool locked a file for a certain period of
store. To authenticate the user before gaining access to data         time and later decrypt itself or if the intended receiver
so that great level of security achieve, the authors used one         obtained it. AxCrypt proffers security against brute force
time password (OTP) in authenticating the user over                   cracking attempts with a lightweight less than 1MB and
network.                                                              supports 128-bit AES encryption only.
    [21] proposed a technique that makes use of
cryptographic algorithms such as Blowfish, RSA and Digital            B. Considered Implementation of the Software
signature, prevent unauthorized users from accessing the data             The following are considered in the implementation of
                                                                      the software.
                                                                 99
                                        International Conference on Information and Communication Technology and Its Applications (ICTA 2016)

       Software Encryption Type/Parameters.                                        TABLE II.      COMPARATIVE ANALYSIS
       Use of Password protection on files.
       Easy Implementation procedures.
       Comparing the three Softwares and ascertaining the
        most suitable depending on user need.

C. System Hardware Requirements
   The following are the system hardware requirements
   A computer system (either desktop or laptop)
    Processor of any kind e.g. Intel Pentium 4.
    1GB RAM and above.
    At least 200mb Installation Space
    Keyboard.
    Mouse.
    Internet Access

                IV.    TEST AND EVALUATION
    This section deals with the main activities involved in
evaluating the three (3) selected programs for the study. The
programs were selected due to wide availability, simplicity,
and accessibility. System testing involves any activity aimed
at evaluating an attribute or capability of a program or
system and determining that it meets its required results [13].
It is the installation of the new software after all user
requirements are met which basically includes system
operating system (OS) and system hardware configuration.
    For this study, we made use of Microsoft Windows 7
Professional Edition was used as the OS and a computer
system with the following Hardware configurations.
                                                                            The study revealed that 7 Zip is a lightweight application
                                                                        with just 1.31 megabytes (MB) of installation file size in a
           TABLE I.      SYSTEM SPECIFICATIONS                          64-bit version. It is the most compatible with all the three
                                                                        application used during this research with wide support for
                                                                        almost all common operating systems (windows, Linux,
                                                                        FreeBSD, Mac Os, Solaris and Aix among others). It is an
                                                                        opens source application under the Great New Utility (GNU)
                                                                        and Lesser General Public License (LGPL); therefore 7-Zip
                                                                        can be used on any computer, including a computer in a
                                                                        commercial organization. 7zip support 256bit AES
                                                                        Encryption Algorithm which is still currently unbreakable
                                                                        except using brute force attack which is only easy and
                                                                        possible if password set is not strong enough. i.e using only
                                                                        small length numbers and alphabets with no capitalization
                                                                        and other characters as a password. Even after installing the
                                                                        software the file size is still comparatively smaller than the
                                                                        others. 7zip support self-extraction this implies that a zip file
                                                                        can be created using 7zip that can extract itself without
    The Table I shows basic information of the system used              needing any zip manager or 7-zip been installed preinstalled
during testing and evaluation of the programs. All the                  on the system. It is the only one amongst them that support
programs performed excellently well with no known                       this feature. Some computer hardware vendors install 7zip on
compatibility issues with the Operating System.                         their machine during factory installation showcasing its wide
    Table II shows that all software's require little space for         acceptance and usability. For software developers and
installation with the highest file size requirement were                command line gigs 7 zip support command line interface
140mb.                                                                  which can be easily integrated into other software for
    The table II shows comparative analysis of the 3 selected           usability within the software's and also since it is an open
program based on File Size (64 Bit Installer), File Size after          source, developers are free to lookup the source code to add,
installation on system, open source, version/release date,              modify and make the application better and more suitable for
encryption algorithm, OS compatibility, license, command                the purpose they require it to perform. It integrates very well
line interface, self extractor, unlock other encryption,                with windows operating system and provides easy access
compression ration window Context Menu Integration and                  through the windows context menu.
Registration.

                                                                  100
                                         International Conference on Information and Communication Technology and Its Applications (ICTA 2016)

   7zip can be easily downloaded from the website and has
basic windows installation requirement to install. Figure 1
shows a graphical representation of 7zip download website.
   Download website: http://www.7-zip.org/download.html




                                                                                    Figure 2. 7zip user Interface after Installation



                                                                               This is the most important aspect of the Encryption
                                                                                were password is set to protect the archive from
                                                                                unauthorized access. Without this option been setup,
                 Figure 1. 7-zip Download Page                                  the archive is just a normal archive that can be easily
                                                                                accessed by anyone. Around it, a select box that
                                                                                shows the kind of Encryption system been used
    The software requires a very simple installation process.                   (AES 256) which till date is one of the strongest
When running the installer, is run, it simply pops up an                        encryption system known.
installer windows with the default Program file directory                      This provides option for SFX as earlier discussed in
where the software is going to be installed to, alternatively,                  number 5.
the default directory if so desired during the installation                    After everything is setup and looking ok. This option
process.                                                                        commits the selection and proceeds with the
                                                                                archiving. The archived file is by default placed in
                                                                                the same directory as the navigated directory in 1,
A. Encrypting File with 7-zip                                                   except if new directory is re-specified by the user.
    The graphical representation on Figure 2 is been labeled
with a number to provide the reader with easy reference to
the part of the program been explained. This allows the                 B. Archiving a File Using the Context Menu
reader pictorial and graphical representation of the program
which foster easy comprehension and retention. Though
bearing in mind the most important part of the research
(encryption), effective use the software from the interface is
performed the following after running the software.

       Navigate to the Directory where the file to be
        Encrypted resides.
       Select the File or Files to be Encrypted
       Click on the Add Button (A new Popup window
        appears showing you all the possible Encryption
        parameter possible on the software).
       This represents the encryption parameters that can be
        choosing, for the purpose of the default parameters
        provided by the system was used.
       7z extension is the default file type for 7zip                             Figure 3. Archiving a file using the context menu
        Archive/Encryption, the extension changes when
        another Archive format is selected (.zip .tar .gzip and            Below are procedures of Creating an Archive
        others), every of which has its drawback and                    (Encryption from the Windows Context Menu). The contexts
        advantage. Also, the extension file can be .exe                 menu provides a fast and easy way of creating Encrypted
        telling you option 7 from the graphic is selected               Archive.
        representing Self-Extracting Archive (SFX). SFX                     Right-click on the desired file/files, folder/folders or
        are archives that can extract themselves without                       a combination of both to be encrypted.
        requiring any preinstalled archive or extraction                    Select the 7-zip option on the context menu to
        software.                                                              display other options
                                                                  101
                                             International Conference on Information and Communication Technology and Its Applications (ICTA 2016)

       Click on "Add to Archive" to pop up the Encryption                  source code to add, modify and make the application better
        option as earlier covered. If basic Archive requires                and more suitable for the purpose they require it to perform.
        without encryption quickly do that by selecting add                 It integrates very well with windows operating system and
        to (Filename).7z" or "(Filename).zip".                              provides easy access through the windows context menu.
                                                                            Below represents a graphical presentation of the software.
C. Extracting file from the context menu
                                                                            D. Encrypting/Archiving File with B1 Free Archiver




       Figure 4. Extracting file using the windows context Menu

   If 7zip is setup as the default zip managing software then
you can see a file type like the one labeled 1 on the figure 4.                    Figure 5. Encrypting/Archiving File with B1 Free Archive
    7zip Archived file
    7-zip SFX file                                                            Figure 5 depicts how B1 free Archive is used to create
    Right click on the file or files you wish to extract                   secured encrypted file after running the program.
        and scroll down to 7-zip and select                                     Address Bar shows the Address of the current
    Select the option most suitable to you. Open                                   working folder, if the need arises, easy navigation to
        Archive, Extract Files..., Extract Files Here all pops                      the desired folder the files to be encrypted reside.
        up a new window demanding for password used in                          Select file/Files intended to archive.
        setting up the Encrypted Archive file.                                  This is a preview page used to preview your files,
    Insert the Passphrase used in encrypting the file                              though, limited to only certain file types
    Select ok to begin file extraction.                                        Create Button used to create the Encrypted file after
                                                                                    the selection process.
    Alternatively, file from 7-zip application menu can also
be selected by selecting the desired file to be extracted and
clicking on the extract button from the menu. For further
guidance and instruction, the help files by selecting help
from the file menu then click on content.
    B1 Free Archiver compared with other programs used for
this study and commonly known encryption software, B1
free Archiver is large with an approximate file size of 44.55
MB. It is the second most compatible software with support
for four common most used OS (windows, Linux, Mac Os
and Android). It is also an Opens Source Application under
the GNU LGPL license, which makes it accessibility span
over both private and public usage. It supports 256bit AES
Encryption Algorithm which according to [12] is still
currently unbreakable except using brute force attack which
is only easy and possible if password set is not strong                                  Figure 6. B1 Free Archive Encryption Menu
enough. i.e using only small length numbers and alphabets
with no capitalization and other characters as a password.                          This is where the location of the Output destination
After installing the software, the file size tripled to an                           is set and also file name of the Encrypted file. By
approximate 140 MB which is due to offer special features                            Default it is set to the destination of the selected
like the file preview and beautified GUI offered by the                              file/files for Encryption and the name of the file if
software. It does not support self-extraction. For software                          single or the name of the folder if multiple.
developers and command line gigs B1 Free Archiver support                           This is the option used to select the type of archive
command line interface which can be easily integrated into                           to be created. by Default .B1 is selected which
other software's for usability within the software's and also                        cannot be opened by any other known program
since it is an open source developer are free to lookup the
                                                                      102
                                             International Conference on Information and Communication Technology and Its Applications (ICTA 2016)

        except B1 which provides it with another layer of                   were posted on the image board which was gotten from a
        security.                                                           hack on the cloud account of the celebrities, if the files were
       This option allows you add Encryption to the                        encrypted while uploading them, the hacker will have just
        Archive.                                                            been left with useless information since the main aim of
       After all, parameters are well inserted you then                    encryption is to prevent unauthorized access. Also, there is a
        proceed by clicking this button to commit changes.                  fear of administrators of the cloud accessing user
        If a password is inserted, a confirmation dialogue                  information; this can be prevented using an encryption from
        pops up to confirm the password and to prevent                      the user end. AES 256 Encryption till date proves to be one
        mistakes.                                                           of the best encryption algorithms with no known fact on
                                                                            crackability except using password guesses which can be
E. Extracting Files with B1 Free Archiver (Context Menu)                    prevented using stronger passwords.
                                                                                7-zip is lightweight with little memory requirement and
                                                                            is compatible with most archive formats. It has a very high
                                                                            compression ratio with a simple to use user interface. B1 free
                                                                            Archive is very easy to use and with a very appealing
                                                                            graphical interface. It is simple flexible and supports
                                                                            numerous file extensions also with a B1 format that can only
                                                                            be extracted using the software itself.
                                                                                When storing or would like to store your files in the
                                                                            cloud, make sure they are securely encrypted before
                                                                            uploading them to the cloud. Encrypting your files will
                                                                            safeguard the privacy of your data, which is especially
                                                                            important when storing sensitive corporate data or personal
                                                                            information that should never fall into the wrong hands.

                                                                             VI.    SUMMARY, CONCLUSION AND RECOMMENDATIONS

                                                                            A. Summary
                                                                                Encrypting files before been sent through any media or
                                                                            stored by the owner of the document is currently the best
    Figure 7. Extracting Files with B1 Free Archive (Context Menu)          way of preventing unauthorized access to files. Cloud
                                                                            Computing offers enormous benefits to user in terms of file
    The following are the procedure in extracting file from                 accessibility from any part of the world but has its limitations
the context menu:                                                           mostly in the area of Security. The most challenging obstacle
     Right-click on the desired file to be extracted.                      to the acceptance of cloud is the security of data. Data is
     Select Extract Here from the context menu and the                     most valuable asset, individuals and organizations are really
        extracted files to be in the same Directory as the one              concern to know the status of their data. That is whether the
        are currently working on else are selected.                         data is safe or not.
     Select “Extract to” for other options to populate                         When data are stored internally, individuals, companies,
        describing where and how the downloaded files will                  and government are rest assured of its security as they handle
        be.                                                                 the overall control. Even though no warranty that data is
                                                                            more confined within when compared with the public cloud.
     A pop-up window appears asking to input the
                                                                            The public cloud might be even more secured in storing data
        password used during the encryption before the
                                                                            due to the fact that the providers of these services may
        extraction will begin.
                                                                            implement advance level of security. Various methods of
                                                                            protecting data in the cloud have been implemented but full
     B1 Free Archiver supports numerous archive file format
                                                                            protection of data cannot be assured. Therefore the best way
and can be used for common Archive management alone that
                                                                            of securing files even on user’s computer is by Encrypting
is (.B1, .zip, .gzip, others).
                                                                            sensitive information.
                                                                                7-zip, B1 Free File Archive, and Axcrypt all provide
                         V.     DISCUSSION                                  secure encryption mechanism using AES 256-bit algorithm
    Nowadays information theft and ransomware are the                       to effectively encrypt files. AES 256-bit algorithm currently
leading threat to computer and digital data. It is believed that            has no proven record of crackability, which means any file
all cloud provider put in an extra effort to see that                       encrypted with AES 256-bit is secure and cannot be accessed
information stored with them are adequately secured and free                except by using the correct password set during encryption.
from prying eyes. Although, that has not been able to totally                   7zip support self-extraction this implies that a zip file can
prevent information theft and privacy intrusions. Some                      be created using 7zip that can extract itself without needing
information gets into the wrong hands through malware                       any zip manager or 7-zip been installed preinstalled on the
installed on target computers [14], some through an insecure                system. It is the only one amongst them that support this
network and others through security breach on the cloud                     feature. Some computer hardware vendors install 7zip on
platform. Recently a collection of private pictures of various              their machine during factory installation showcasing its wide
celebrities, mostly women and with many containing nudity                   acceptance and usability
                                                                      103
                                                 International Conference on Information and Communication Technology and Its Applications (ICTA 2016)

B. Conclusion                                                                        [7]  Cyber Centre, “Cloud Computing Security Considerations” updated
                                                                                          2012, 2011.
    Data encryption is very important nowadays due to                                [8] R. Tim, “Five things you should know about cloud security”.
increasing in data theft and independence on cloud                                        Retrieved                                                       from
platforms. The research work presents securing file on cloud                              https://blogs.microsoft.com/cybertrust/2016/01/06/five-things-you-
computing system using encryption software: a comparative                                 should-know-about-cloud-security and accessed on 17th July 2016.
analysis.The encryption programs are 7zip, B1 free acrhiver                          [9] G. Eugene, “Cloud Computing Models” Composite Information
and Axcrpt which are been compared on varieties of                                        Systems Laboratory (CISL), Sloan School of Management, Room
                                                                                          E62-422, Massachusetts Institute of Technology. 2013
paramiters. The result have revealed that among the
encryption softawares, 7zip work better due to its wide                              [10] A. Huth and J. Cebula “The Basics of Cloud Computing”. Retrieved
                                                                                          from
availability, light weight, faster encryption and better                                  https://www.uscert.gov/sites/default/files/.../CloudComputingHuthCe
compression ratio when compared to the others.                                            bulaand accessed 17th July 2016 2011.
                                                                                     [11] A. W. Khan, S. U., Khan, M. Ilyas and M. I. Azeem, “A literature
C. Recommendations                                                                        survey on data privacy/protection issues and challenges in cloud
     File Encryption provides an efficient, secure, accurate,                             computing”. IOSRJCE, vol 11 pg., 28-36, 2012.
reliable way of securing sensitive information both on user                          [12] M. Swapnali and C. Sangita. “Third Party Public Auditing scheme for
                                                                                          Cloud Storage”, 7th International Conference on Communication,
computer and cloud. Companies and individuals should put                                  Computing and Virtualization retrieved from www.sciencedirect.com
in time and efforts to ensure that sensitive information is well                          accessed on 20th August, 2016, 2016
encrypted to prevent unauthorized access. The following                              [13] B.Subramani and P.N.Indu Vikashini “A security issues on cloud com
recommendations are proffered.                                                            puting” worldwidejournals.com/paripex/file.php?val=April_2016_14
      Encrypting sensitive files and information before                                  60809682__130..2016
          been uploaded to the cloud.                                                [14] N. Dave, “AES encryption is cracked Researchers find a weakness in
      Using a combination of alphabets, numbers and                                      the
                                                                                          algorithm". Retrieved from http://www.theinquirer.net/inquirer/news/
          characters as Encryption password to reduce the                                 2102435/aes-encryption-cracked. 2011and accessed 17th January
          possibility of brute force attack.                                              2016.
                                                                                     [15] C., Sneha, C. A. Suriya, and S. Indhumathi, “A secure the data in
D. Suggestions for Further Study                                                          cloud by using private auditing scheme”. Retrieved from
                                                                                          http://www.ripublication.com and accessed on 20th august 2016, 2016
    Design and implementation of encryption programs
      that is back to back compatible with all cloud service                         [16] A. J. Emily and S. Karthigaiveni, “New Public Integrity Auditing
                                                                                          Scheme for Cloud Data Storage Using Mac And Symmetric Key
      providers from the client's end.                                                    Cryptographic Algorithms”. International Journal of Applied
    Implementing password strengthening parameters                                       Engineering Research vol. 11 issue 3, pp 1894-1899 retrieved from
      when setting up a password to ensure the user sees                                  http://www.ripublication.com and accessed on 20th august 2016
      the strength of the password been set.                                         [17] T. Gaur and D. Sharma, “A Secure and Efficient Client-Side
                                                                                          Encryption Scheme in Cloud Computing.” I.J. Wireless and
                              REFERENCES                                                  Microwave Technologies, vol 1, 23-33 Published Online January
                                                                                          2016
[1]   M. Maslin and R., Ailar “A Review of Cloud Computing Technology
                                                                                     [18] M. Priyanka and S. Priya, “Cloud Data Outsourcing and off sourcing
      Solution for Healthcare System’. Journal of Applied Sciences,
                                                                                          using trust computation” (IJCSIT) International Journal of Computer
      engineering and technology vol 8 iss.20, 2150-2153, 2014.
                                                                                          Science and Information Technologies, Vol. 7 iss.3 , 2016, 1417-
[2]   K. Lakhtaria, “Next Generation Wireless Network Security and Priva                  1424, 2016.
      cy. Advances In Information Security, Privacy And Ethics.Retrieved f
                                                                                     [19] S.V. Tikore and D. K Pradeep, “Ensuring the Data Integrity and
      rom https://books.google.com.ng/books?isbn=146668688X and Acce
                                                                                          Confidentiality in Cloud Storage Using Hash Function and TPA”.
      ssed on 20th June, 2016.
                                                                                          International Journal on Recent and Innovation Trends in Computing
[3]   Priv, "Introduction to Cloud Computing". Retrieved from https://ww                  and Communication.Vol.3 Iss. 5, 2015
      w.priv.gc.ca/resource/fs-fi/02_05_d_51_cc_e.pdf, and Accessed 17th
                                                                                     [20] S. Yogesh and V. Alka, “Privacy Preserving using Data Partitioning
      July 2016 and 2016
                                                                                          Technique for Secure Cloud Storage” International Journal of
[4]   A. Aized, M. Irfan, K. and A. Fazal, “Encryption techniques for cloud               Computer Applications (0975 – 8887) vol. issue 116 (16). Retrieved
      data                                                                                from research.ijcaonline.org/volume116/number16/pxc3902721.pd
      confidentiality”. International Journal of Grid Distribution Computing              access on 20th march 2016
       7(4) 11 20 http://dx.doi.org/10.14257/ijgdc.2014.7.4.02 ISSN: 2005-
                                                                                     [21] D Rani and R. K. Rajan, “Enhance data security of private cloud
      4262 IJGDC 2014.
                                                                                          using encryption scheme with RBAC”. International Journal of
[5]   M. Barry et al “A Brief History of the Internet.”. Retrieved from                   Advanced Research in Computer and Communication Engineering
      www.internetsociety.org/internet/what-internet/history-internet/brief-              Vol. 3, Issue 6, June 2014
      history-internet and accessed 17th July 2016 2009.
                                                                                     [22] A. Dharini, et al “Data Security for Cloud Computing Using RSA
[6]   R. O Ugwuoke, "Contributions and challenges of the internet to the                  with Magic Square Algorithm”. International Journal of Innovation
      development of university undergraduates" June 2013 retrieved from                  and Scientific Research ISSN 2351-8014 Vol. 11 No. 2 2014, pp.
      google and accessed on 27/07/2016                                                   439-444.




                                                                               104