IJSMT Journal

International Journal of Science, Strategic Management and Technology

An International, Peer-Reviewed, Open Access Scholarly Journal Indexed in recognized academic databases · DOI via Crossref The journal adheres to established scholarly publishing, peer-review, and research ethics guidelines set by the UGC

ISSN: 3108-1762 (Online)
webp (1)

Plagiarism Passed
Peer reviewed
Open Access

HYBRID ENCRYPTION AND MULTI-CLOUD ARCHITECTURE FOR ZERO-KNOWLEDGE SECURE PASSWORD PROTECTION

AUTHORS:
Prakhar Verma
Mentor
Prateek Mathur
Affiliation
Information Technology Noida Institute of Engineering and Technology, Greater Noida
CC BY 4.0 License:
This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Abstract

With the rapid adoption of cloud computing, secure password storage has become a critical cybersecurity challenge due to increasing data breaches and unauthorized access. Traditional password storage mechanisms rely on centralized architectures, making them vulnerable to single-point failures and server-side attacks. This paper proposes a hybrid encryption and multi-cloud architecture for zero-knowledge secure password protection. The proposed model integrates advanced cryptographic techniques, including password-based key derivation functions (PBKDF2/Argon2), AES-256 encryption, and Shamir Secret Sharing for distributed storage. Additionally, it incorporates multi-factor authentication, device-based authentication, and periodic key rotation to enhance security. The zero-knowledge approach ensures that sensitive information is never exposed to the cloud provider. Experimental analysis demonstrates that the proposed model significantly improves resistance against brute-force attacks, insider threats, and cloud breaches while maintaining usability. This research contributes a scalable and robust framework for secure password storage in distributed cloud environments.

Keywords
Article Metrics
Article Views
75
PDF Downloads
1
HOW TO CITE
APA

MLA

Chicago

Copy

Verma, P. (2026). Hybrid Encryption and Multi-Cloud Architecture for Zero-Knowledge Secure Password Protection. International Journal of Science, Strategic Management and Technology, 02(05). https://doi.org/10.55041/ijsmt.v2i5.171

Verma, Prakhar. "Hybrid Encryption and Multi-Cloud Architecture for Zero-Knowledge Secure Password Protection." International Journal of Science, Strategic Management and Technology, vol. 02, no. 05, 2026, pp. . doi:https://doi.org/10.55041/ijsmt.v2i5.171.

Verma, Prakhar. "Hybrid Encryption and Multi-Cloud Architecture for Zero-Knowledge Secure Password Protection." International Journal of Science, Strategic Management and Technology 02, no. 05 (2026). https://doi.org/https://doi.org/10.55041/ijsmt.v2i5.171.

References
1.Satvat, M. Shirvanian, and N. Saxena, “PASSAT: Single Password Authenticated Secret-Shared Intrusion-Tolerant Storage with Server Transparency,” arXiv preprint arXiv:2102.13607, 2021.

2.Attasena, J. Darmont, and N. Harbi, “Secret Sharing for Cloud Data Security,” arXiv preprint arXiv:1712.10155, 2017.

3.Čuřík, “Practical Use of Secret Sharing for Enhancing Privacy in Cloud Storage,” Electronics, vol. 11, no. 17, p. 2758, 2022, doi: 10.3390/electronics11172758.

4.Niknia, A. Ghaffari, and M. R. Aref, “Secure cloud-of-clouds storage with space-efficient secret sharing,” Journal of Systems and Software, vol. 170, p. 110742, 2021, doi: 10.1016/j.jss.2020.110742.

5.Ali et al., “Advancing cloud security: Unveiling the protective potential of secret sharing and homomorphic encryption,” Ain Shams Engineering Journal, 2024, doi: 10.1016/j.asej.2024.102336.

6.Yuan et al., “Multiple time servers timed-release encryption based on Shamir secret sharing for EHR cloud system,” Journal of Cloud Computing, vol. 13, no. 1, 2024, doi: 10.1186/s13677-024-00676-y.

7.S. Lakshmi and R. Geetha, “Collusion resistant secret sharing scheme for secure data storage in cloud,” Journal of Information Security and Applications, vol. 58, p. 102742, 2021, doi: 10.1016/j.jisa.2021.102742.

8.Bissoli and F. D’Amore, “Authentication as a service: Shamir Secret Sharing with Byzantine components,” arXiv preprint arXiv:1806.07291, 2018.

9.Fujiwara et al., “Unbreakable distributed storage with quantum key distribution network and password-authenticated secret sharing,” arXiv preprint arXiv:1607.00468, 2016.

10.Gupta, A. K. Singh, C.-N. Lee, and R. Buyya, “Secure data storage and sharing techniques for data protection in cloud environments: A systematic review,” IEEE Access, vol. 10, pp. 19175–19195, 2022
Ethics and Compliance
✓ All ethical standards met
This article has undergone plagiarism screening and double-blind peer review. Editorial policies have been followed. Authors retain copyright under CC BY-NC 4.0 license. The research complies with ethical standards and institutional guidelines.
Indexed In
Similar Articles
Analysis and Design of A G+3 Reinforced Concreteresidential Building
string(16) "Eslavath Nandini" Nandini, E.et al.
(2026)
DOI: 10.55041/ijsmt.v2i3.363
Consumer Trust and E – Wom as Determinants of Organic Food Purchase Intention in Emerging Market
string(15) "Harmandeep Kaur" Kaur, H.
(2026)
DOI: 10.55041/ijsmt.v2i5.335
Prediction of Flood-Prone Zones using Topographic Rainfall and River Flow Data
string(16) "Juturu Sreevalli" Sreevalli, J.et al.
(2026)
DOI: 10.55041/ijsmt.v2i3.412
Scroll to Top