HYBRID ENCRYPTION AND MULTI-CLOUD ARCHITECTURE FOR ZERO-KNOWLEDGE SECURE PASSWORD PROTECTION
With the rapid adoption of cloud computing, secure password storage has become a critical cybersecurity challenge due to increasing data breaches and unauthorized access. Traditional password storage mechanisms rely on centralized architectures, making them vulnerable to single-point failures and server-side attacks. This paper proposes a hybrid encryption and multi-cloud architecture for zero-knowledge secure password protection. The proposed model integrates advanced cryptographic techniques, including password-based key derivation functions (PBKDF2/Argon2), AES-256 encryption, and Shamir Secret Sharing for distributed storage. Additionally, it incorporates multi-factor authentication, device-based authentication, and periodic key rotation to enhance security. The zero-knowledge approach ensures that sensitive information is never exposed to the cloud provider. Experimental analysis demonstrates that the proposed model significantly improves resistance against brute-force attacks, insider threats, and cloud breaches while maintaining usability. This research contributes a scalable and robust framework for secure password storage in distributed cloud environments.
Verma, P. (2026). Hybrid Encryption and Multi-Cloud Architecture for Zero-Knowledge Secure Password Protection. International Journal of Science, Strategic Management and Technology, 02(05). https://doi.org/10.55041/ijsmt.v2i5.171
Verma, Prakhar. "Hybrid Encryption and Multi-Cloud Architecture for Zero-Knowledge Secure Password Protection." International Journal of Science, Strategic Management and Technology, vol. 02, no. 05, 2026, pp. . doi:https://doi.org/10.55041/ijsmt.v2i5.171.
Verma, Prakhar. "Hybrid Encryption and Multi-Cloud Architecture for Zero-Knowledge Secure Password Protection." International Journal of Science, Strategic Management and Technology 02, no. 05 (2026). https://doi.org/https://doi.org/10.55041/ijsmt.v2i5.171.
2.Attasena, J. Darmont, and N. Harbi, “Secret Sharing for Cloud Data Security,” arXiv preprint arXiv:1712.10155, 2017.
3.Čuřík, “Practical Use of Secret Sharing for Enhancing Privacy in Cloud Storage,” Electronics, vol. 11, no. 17, p. 2758, 2022, doi: 10.3390/electronics11172758.
4.Niknia, A. Ghaffari, and M. R. Aref, “Secure cloud-of-clouds storage with space-efficient secret sharing,” Journal of Systems and Software, vol. 170, p. 110742, 2021, doi: 10.1016/j.jss.2020.110742.
5.Ali et al., “Advancing cloud security: Unveiling the protective potential of secret sharing and homomorphic encryption,” Ain Shams Engineering Journal, 2024, doi: 10.1016/j.asej.2024.102336.
6.Yuan et al., “Multiple time servers timed-release encryption based on Shamir secret sharing for EHR cloud system,” Journal of Cloud Computing, vol. 13, no. 1, 2024, doi: 10.1186/s13677-024-00676-y.
7.S. Lakshmi and R. Geetha, “Collusion resistant secret sharing scheme for secure data storage in cloud,” Journal of Information Security and Applications, vol. 58, p. 102742, 2021, doi: 10.1016/j.jisa.2021.102742.
8.Bissoli and F. D’Amore, “Authentication as a service: Shamir Secret Sharing with Byzantine components,” arXiv preprint arXiv:1806.07291, 2018.
9.Fujiwara et al., “Unbreakable distributed storage with quantum key distribution network and password-authenticated secret sharing,” arXiv preprint arXiv:1607.00468, 2016.
10.Gupta, A. K. Singh, C.-N. Lee, and R. Buyya, “Secure data storage and sharing techniques for data protection in cloud environments: A systematic review,” IEEE Access, vol. 10, pp. 19175–19195, 2022