Design of an Encryption-Based Automated Cloud Backup and Recovery Framework with Ransomware Resistance

Authors

  • Yash Gher MIT School of Computing, MIT-ADT University, Pune, India. Author
  • Anuja Chincholkar MIT School of Computing, MIT-ADT University, Pune, India. Author
  • Ayush Chauhan MIT School of Computing, MIT-ADT University, Pune, India. Author
  • Parag Mogarkar MIT School of Computing, MIT-ADT University, Pune, India. Author
  • Atharva Nirmal MIT School of Computing, MIT-ADT University, Pune, India. Author

DOI:

https://doi.org/10.66566/ijmir/2026.v6n2.10

Keywords:

Ransomware Resilience, Cloud Backup, Cloud Recovery, AES Encryption, SHA-256 Hashing, Data Confidentiality, Data Integrity, Automated Synchronization, Anomaly Detection, Business Continuity.

Abstract

This paper introduces an automated and secure cloud backup and recovery framework designed to enhance ransomware resilience through the integration of encryption, scheduled synchronization, and anomaly detection. The system utilizes client-side AES encryption to preserve data confidentiality prior to transmission, while SHA-256 hashing ensures data integrity throughout the backup and recovery processes. Automated synchronization maintains up-to-date encrypted copies, minimizing potential data loss and enabling efficient recovery of unaffected versions after ransomware incidents. Additionally, an anomaly detection module continuously monitors irregular encryption behaviors and file modification patterns to identify potential ransomware activity. The framework was implemented and tested using cloud platforms such as AWS S3 under simulated ransomware attacks. Experimental results indicate that the proposed system achieves strong confidentiality, integrity, and recovery reliability with minimal performance overhead. Overall, this approach offers a practical and robust solution for securing sensitive cloud data against ransomware threats while ensuring business continuity in dynamic and untrusted environments.

References

[1] A. D. Singh, et al., “RANSOMNET+: Enhancing Ransomware Attack Detection Using Transfer Learning and Deep Learning Ensemble Models on Cloud-Encrypted Data,” Electronics, vol. 12, no. 18, p. 3899, 2024.

[2] P. L. Sharma and R. Kumar, “Immutable Storage Design for Cloud-Native Disaster Recovery with Ransomware Defense,” IEEE Transactions on Cloud Computing, vol. 12, no. 4, pp. 2110–2123, 2024.

[3] B. T. Lu and C. K. Wang, “Integrating AI-Driven Anomaly Detection in Zero-Trust Cloud Backup Architecture,” Journal of Cloud Computing, vol. 13, no. 1, p. 15, 2024.

[4] M. F. Hossain and S. N. Chowdhury, “Performance Analysis of AES-GCM and SHA-256 for Client-Side Encryption in Multi-Cloud Environments,” International Journal of Information Security, vol. 23, no. 2, pp. 345–360, 2024.

[5] J. Chen and L. W. Hu, “A Blockchain-Based Approach for Verifiable and Immutable Cloud Backup Versioning,” Future Generation Computer Systems, vol. 149, pp. 1–12, 2024.

Cover Page

Downloads

Published

01-04-2026

Issue

Section

Articles

How to Cite

[1]
Y. Gher, A. Chincholkar, A. Chauhan, P. Mogarkar, and A. Nirmal, “Design of an Encryption-Based Automated Cloud Backup and Recovery Framework with Ransomware Resistance”, Int. J. Multidiscip. Innovat. Res., vol. 6, no. 2, pp. 90–97, Apr. 2026, doi: 10.66566/ijmir/2026.v6n2.10.