Design of an Encryption-Based Automated Cloud Backup and Recovery Framework with Ransomware Resistance
DOI:
https://doi.org/10.66566/ijmir/2026.v6n2.10Keywords:
Ransomware Resilience, Cloud Backup, Cloud Recovery, AES Encryption, SHA-256 Hashing, Data Confidentiality, Data Integrity, Automated Synchronization, Anomaly Detection, Business Continuity.Abstract
This paper introduces an automated and secure cloud backup and recovery framework designed to enhance ransomware resilience through the integration of encryption, scheduled synchronization, and anomaly detection. The system utilizes client-side AES encryption to preserve data confidentiality prior to transmission, while SHA-256 hashing ensures data integrity throughout the backup and recovery processes. Automated synchronization maintains up-to-date encrypted copies, minimizing potential data loss and enabling efficient recovery of unaffected versions after ransomware incidents. Additionally, an anomaly detection module continuously monitors irregular encryption behaviors and file modification patterns to identify potential ransomware activity. The framework was implemented and tested using cloud platforms such as AWS S3 under simulated ransomware attacks. Experimental results indicate that the proposed system achieves strong confidentiality, integrity, and recovery reliability with minimal performance overhead. Overall, this approach offers a practical and robust solution for securing sensitive cloud data against ransomware threats while ensuring business continuity in dynamic and untrusted environments.
References
[1] A. D. Singh, et al., “RANSOMNET+: Enhancing Ransomware Attack Detection Using Transfer Learning and Deep Learning Ensemble Models on Cloud-Encrypted Data,” Electronics, vol. 12, no. 18, p. 3899, 2024.
[2] P. L. Sharma and R. Kumar, “Immutable Storage Design for Cloud-Native Disaster Recovery with Ransomware Defense,” IEEE Transactions on Cloud Computing, vol. 12, no. 4, pp. 2110–2123, 2024.
[3] B. T. Lu and C. K. Wang, “Integrating AI-Driven Anomaly Detection in Zero-Trust Cloud Backup Architecture,” Journal of Cloud Computing, vol. 13, no. 1, p. 15, 2024.
[4] M. F. Hossain and S. N. Chowdhury, “Performance Analysis of AES-GCM and SHA-256 for Client-Side Encryption in Multi-Cloud Environments,” International Journal of Information Security, vol. 23, no. 2, pp. 345–360, 2024.
[5] J. Chen and L. W. Hu, “A Blockchain-Based Approach for Verifiable and Immutable Cloud Backup Versioning,” Future Generation Computer Systems, vol. 149, pp. 1–12, 2024.
Downloads
Published
Issue
Section
License
Copyright (c) 2026 Council of Industrial Innovation and Research (CIIR), Noida, India.

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.