
Research Article
A File Encryption and Chunking System Development and Implementation Within A Cloud Computing Infrastructure: Enhancing Data Security and Management
@INPROCEEDINGS{10.4108/eai.28-4-2025.2358044, author={R. Anand and Ritika G and Dhinakaran S and Aravind B}, title={A File Encryption and Chunking System Development and Implementation Within A Cloud Computing Infrastructure: Enhancing Data Security and Management }, proceedings={Proceedings of the 4th International Conference on Information Technology, Civil Innovation, Science, and Management, ICITSM 2025, 28-29 April 2025, Tiruchengode, Tamil Nadu, India, Part II}, publisher={EAI}, proceedings_a={ICITSM PART II}, year={2025}, month={10}, keywords={cloud computing file encryption aes-256 rsa data integrity file chunking rbac otp authentication scalability key management cloud storage}, doi={10.4108/eai.28-4-2025.2358044} }
- R. Anand
Ritika G
Dhinakaran S
Aravind B
Year: 2025
A File Encryption and Chunking System Development and Implementation Within A Cloud Computing Infrastructure: Enhancing Data Security and Management
ICITSM PART II
EAI
DOI: 10.4108/eai.28-4-2025.2358044
Abstract
The proposed file encryption method with a chunking system works to improve cloud data security and enhance management facilities. The system offers data protection through multiple encryption approaches which combine AES-256 and RSA while implementing file chunking protocols. A file distribution system splits big data into protected fragments that spread across many cloud servers for maximum storage capacity and faster data retrieval in addition to failure message tolerance. The combination of SHA-256 hashing maintains data integrity together with OTP-based authentication and RBAC protocol which protects user security. The system exhibits scalability through cloud deployments at scale while also protecting users against cyber threats such as breaches and key attacks. Advanced functions for performance enhancement together with secure key administration systems potentiate data handling capabilities and security features. The system operates as a future-proof security platform which enables safe cloud data storage that fulfills corporate application requirements and disaster recovery protocols and meets regulatory standards.