Project
Project
Project
Presented by
Under the guidance of Shraddha Gholap
Prof. Anita Mahajan ME SE ( 3rd Sem )
CONTENTS
• Introduction
• Problem statement
• Abstract
• Objective
• Literature survey
• Existing system
• Proposed system
• System methodology
• System design
• Input design
• Output design
• Requirement design
• Implementation
• Data flow diagram
• Use case diagram
• Class diagram
• Sequence diagram
• Activity diagram
• Algorithm
• System study
• System testing
• Future scope
• Conclusion
• Reference
INTRODUCTION
• Cloud storage is a convenient and reliable option to store and retrieve data.
• The information over internet is becoming a critical issue . Cryptography
concepts are used for securing storage system of cloud .
• Many issues are faced while storing the data , the solution for these issues is
hybrid cryptography .
• In this system we have used three cryptography algorithms for providing
block wise security to the data.
• We store files as shard to different servers thus a single file is not stored at
one location .
INTRODUCTION
• Cryptography - Cryptography is the process of hiding or coding information so that only the person a message
was intended for can read it. The art of cryptography has been used to code messages for thousands of years
and continues to be used in bank cards, computer passwords, and ecommerce.
Types of cryptography
Asymmetric Encryption
INTRODUCTION
• Hybrid Cryptography- The Hybrid Encryption primitive combines the efficiency of symmetric encryption with
the convenience of public key (asymmetric) cryptography. Anyone can encrypt data using the public key, but
only users with the private key can decrypt the data.
• In this form of cryptography, a pair of keys is used to encrypt and decrypt information. Encryption is done with
a public key, and decryption is done with a private key.
• For Hybrid Encryption, the sender generates a fresh symmetric key to encrypt the plaintext of each message to
produce a ciphertext. That symmetric key is encapsulated with the recipient's public key. For Hybrid Decryption,
the symmetric key is decapsulated by the recipient and then used to decrypt the ciphertext to recover the
original plaintext
4 “Secure File Storage and y P. Kumar and P. Singh 2019 This study proposes a hybrid cryptographic model for
Sharing in Cloud secure file storage and sharing in cloud computing.
Computing using Hybrid The model uses a combination of AES and RSA
Cryptography” encryption algorithms, ensuring both confidentiality
and integrity of data. The study demonstrates the
effectiveness of the proposed model in terms of
security and performance through simulations and
experiments.
LITERATURE SURVEY
SR NO NAME OF PAPER NAME OF AUTHOR YEAR OF DESCRIPTION
PUBLICATI
ON
5 “Secure File Storage and Mr. Rohit Barvekar, Mr. 2018 The proposed security mechanisms will prevent
Sharing in Cloud ShrajalBehere, Mr. Yash confidential data from being misused making the
Computing using Hybrid Pounikar, Ms. Anushka system more reliable. The proposed method will
Cryptography” Gulhane make encryption and decryption with keys.
6 “ Secure File Storage and y A. Sharma and K. 2017 This study proposes a hybrid cryptography-based
Sharing in Cloud Sharma model for secure file storage and cloud computing,
Computing using Hybrid uses a combination of AES and ECC encryption
Cryptography” algorithms. The proposed model ensures
confidentiality, integrity and availability through the
use of encryption and decryption techniques. The
study demonstrates the effectiveness of the proposed
model in terms of security and performance through
simulations and experiments.
EXISTING SYSTEM
In existing framework single calculation is utilized for information encode and unravel reason. Yet,
utilization of single calculation isn't achieve elevated level security. On the off chance that we utilize
single symmetric key cryptography calculation than we need to confront security issue on the grounds
that in this kind of calculation applies a solitary key for information encode and interpret. So key
transmission issue happen while sharing key into multiuser climate. Public key cryptography
calculations achieve high security however most extreme postponement is required for information
encode and translate.
more data storage needs turning over to the cloud, finding a secure and efficient data access
structure has become a major research issue
Security techniques are not applied in the protection of offloaded data from attacks.
Once uploaded and shared, the data owner inevitably loses control over the data, opening the door
to unauthorized data access.
PROPOSED SYSTEM
Selectively sharing data files on the cloud becomes a burden on the data owner as the hierarchy grows (the access privileges
increase in number) and/or as the access restrictions become more complex due to an increase in the sensitivity of the file
segments. A trivial solution involves the data owner to use public key encryption. This solution would require the data owner to
encrypt the same part of the data file once for each data user being granted access then upload the resulting cipher texts to the
cloud. The data users would then fetch their uniquely encrypted parts of the file from the cloud and utilize their private keys to
decrypt them. This method ensures that no unprivileged data user will gain access to any part of the data file even if that user is
able to download the cipher texts from the cloud. However, on a large scale, public key encryption becomes an inefficient solution
due to the increase in the number of encryptions and large storage spaces required. Therefore, the challenge is to provide the data
owners with an efficient, secure and privilege-based method that allows them to selectively share their data files among multiple
data users while minimizing the required cloud storage space needed to store the encrypted data segments.
Requiring less network communication.
We present multiple data file partitioning techniques and propose a privilege-based access structure that facilitate data sharing
in hierarchical settings.
A new security layer is added to encrypt the data of the task before transferring to the cloud side by using AES encryption
technique.
SYSTEM METHODOLOGY
This framework AES, RC6, Blowfish and BRA calculations are utilized for block savvy security to
information. Proposed framework is hybridization of AES, RC6, Blowfish and BRA. All calculations
are symmetric key cryptography. These calculations utilizes a solitary key for document encode and
disentangle reason. All calculations key size is 128 digit. To conceal key data into cover picture
utilizing LSB method. Usage of proposed framework is finished utilizing java language. Document
encoding and disentangling time is determined with the assistance of java programming. Record
encode and decipher time is determined for just content document with examination of existing AES
and Blowfish calculations. Document size is given in MB for AES calculation.
SYSTEM DESIGN
INPUT DESIGN
The input design is the link between the information system and the user. It comprises the developing specification and
procedures for data preparation and those steps are necessary to put transaction data in to a usable form for processing can be
achieved by inspecting the computer to read data from a written or printed document or it can occur by having people keying the
data directly into the system. The design of input focuses on controlling the amount of input required, controlling the errors,
avoiding delay, avoiding extra steps and keeping the process simple. The input is designed in such a way so that it provides
security and ease of use with retaining the privacy. Input Design considered the following things:
Methods for preparing input validations and steps to follow when error occur.
INPUT DESIGN
OBJECTIVES
1. Input Design is the process of converting a user-oriented description of the input into a computer-based system. This
design is important to avoid errors in the data input process and show the correct direction to the management for getting
correct information from the computerized system.
2. It is achieved by creating user-friendly screens for the data entry to handle large volume of data. The goal of designing
input is to make data entry easier and to be free from errors. The data entry screen is designed in such a way that all the
data manipulates can be performed. It also provides record viewing facilities.
3. When the data is entered it will check for its validity. Data can be entered with the help of screens. Appropriate
messages are provided as when needed so that the user will not be in maize of instant. Thus the objective of input design
is to create an input layout that is easy to follow
OUTPUT DESIGN
A quality output is one, which meets the requirements of the end user and presents the information clearly. In any system
results of processing are communicated to the users and to other system through outputs. In output design it is determined
how the information is to be displaced for immediate need and also the hard copy output. It is the most important and direct
source information to the user. Efficient and intelligent output design improves the system’s relationship to help user
decision-making.
1. Designing computer output should proceed in an organized, well thought out manner; the right output must be developed
while ensuring that each output element is designed so that people will find the system can use easily and effectively. When
analysis design computer output, they should Identify the specific output that is needed to meet the requirements.
3. Create document, report, or other formats that contain information produced by the system.
OUTPUT DESIGN
The output form of an information system should accomplish one or more of the following objectives.
Future.
Trigger an action.
Confirm an action.
REQUIREMENT ANALYSIS
Hardware requirement Software requirement
MODULES:
Data Owner
Data User
Admin
Cloud
.
IMPLEMENTATION
MODULES DESCRIPTION:
Owner upload the data on cloud server. File is split into octet. Every part of file is encoded simultaneously using multithreading
technique. Encoded file is stored on cloud server. Keys used for encryption are stored into cover image. Cloud computing is the
multi user environment.
Cloud user request for file. On request of file user also get key using email which consist of key information. Reverse process is
used for decode the file.
Cloud:
Cloud module can operate by the admin in cloud module having all the registered users and owners details and owner
uploaded file details and user downloaded details.
DATA FLOW DIAGRAM
USE CASE DIAGRAM
USE CASE DIAGRAM
USE CASE DIAGRAM
USE CASE DIAGRAM
CLASS DIAGRAM
SEQUENCE DIAGRAM
ACTIVITY DIAGRAM
ALGORITHM
• Algorithms Used Advanced Encryption Standard (AES)
AES is a technique for encryption of electronic data established by the U.S National Institute of Standards and
Technology (NIST) in 2001. AES is mostly used nowadays as it is stronger than DES and triple DES and harder to
implement[1]. It takes 128 bits as input and outputs 128 bits of encrypted cipher text. AES relies on substitution-
permutation network principle.
ALGORITHM
• Data Encryption Standard (DES)
The Data Encryption Standard is a symmetric-key algorithm for the encryption of digital data. Although its short key
length of 56 bits makes it too insecure for modern applications, it has been highly influential in the advancement of
cryptography
ALGORITHM
• Triple Data Encryption Standard (3DES)
In cryptography, 3DES is an inherited enhanced version of DES (Data Encryption Standard). In the Triple DES algorithm,
DES is used trice to increase the security level. Triple DES is also referred to as TDES or Triple Data Encryption Algorithm
(TDEA).
• Blowfish
ALGORITHM
Blowfish is a symmetric block cipher which uses a Fiestal network, 16 rounds of iterative encryption and decryption
functional design. The block size used is of 64-bits and key size can vary from any length to 448.Blowfish cipher uses 18
sub arrays each of 32-bit commonly known as P-boxes and four Substitution boxes each of 32-bit, each having 256
entries. The algorithm design is shown in figure. It consists of two phases: one is Key Expansion phase another is Data
Encryption phase. In Key expansion phase, key is converted into several sub-keys and in Data Encryption phase,
encryption occurs via 16-round networks. Each round consists of a key dependent permutation and a key and data
dependent substitution
SYSTEM STUDY
FEASIBILITY STUDY
The feasibility of the project is analyzed in this phase and business proposal is put forth with a very general plan for t
project and some cost estimates. During system analysis the feasibility study of the proposed system is to be carried out. This is
ensure that the proposed system is not a burden to the company. For feasibility analysis, some understanding of the maj
requirements for the system is essential.
Three key considerations involved in the feasibility analysis are
ECONOMICAL FEASIBILITY
TECHNICAL FEASIBILITY
SOCIAL FEASIBILITY
SYSTEM STUDY
ECONOMICAL FEASIBILITY
This study is carried out to check the economic impact that the system will have on the organization. The amount of fund th
the company can pour into the research and development of the system is limited. The expenditures must be justified. Thus t
developed system as well within the budget and this was achieved because most of the technologies used are freely available. Only t
customized products had to be purchased.
TECHNICAL FEASIBILITY
This study is carried out to check the technical feasibility, that is, the technical requirements of the system. Any syste
developed must not have a high demand on the available technical resources. This will lead to high demands on the available technic
resources. This will lead to high demands being placed on the client. The developed system must have a modest requirement, as on
minimal or null changes are required for implementing this system.
SYSTEM STUDY
SOCIAL FEASIBILITY
The aspect of study is to check the level of acceptance of the system by the user. This includes the process of training the us
to use the system efficiently. The user must not feel threatened by the system, instead must accept it as a necessity. The level
acceptance by the users solely depends on the methods that are employed to educate the user about the system and to make h
familiar with it. His level of confidence must be raised so that he is also able to make some constructive criticism, which is welcome
as he is the final user of the system.
SYSTEM TESTING
TYPES OF TESTS
Unit testing
Unit testing involves the design of test cases that validate that the internal program logic is functioning properly, and
that program inputs produce valid outputs. All decision branches and internal code flow should be validated. It is the
testing of individual software units of the application .it is done after the completion of an individual unit before
integration. This is a structural testing, that relies on knowledge of its construction and is invasive. Unit tests perform basic
tests at component level and test a specific business process, application, and/or system configuration. Unit tests ensure
that each unique path of a business process performs accurately to the documented specifications and contains clearly
defined inputs and expected results.
SYSTEM TESTING
TYPES OF TESTS
Integration testing
Integration tests are designed to test integrated software components to determine if they actually run as one
program. Testing is event driven and is more concerned with the basic outcome of screens or fields. Integration tests
demonstrate that although the components were individually satisfaction, as shown by successfully unit testing, the
combination of components is correct and consistent. Integration testing is specifically aimed at exposing the problems
that arise from the combination of components.
SYSTEM TESTING
Functional test
Functional tests provide systematic demonstrations that functions tested are available as specified by the business and
technical requirements, system documentation, and user manuals.