Project

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 43

SECURE FILE STORAGE ON CLOUD

USING HYBRID CRYPTORAPHY

Presented by
Under the guidance of Shraddha Gholap
Prof. Anita Mahajan ME SE ( 3rd Sem )
CONTENTS
• Introduction
• Problem statement
• Abstract
• Objective
• Literature survey
• Existing system
• Proposed system
• System methodology
• System design
• Input design
• Output design
• Requirement design
• Implementation
• Data flow diagram
• Use case diagram
• Class diagram
• Sequence diagram
• Activity diagram
• Algorithm
• System study
• System testing
• Future scope
• Conclusion
• Reference
INTRODUCTION

• Cloud storage is a convenient and reliable option to store and retrieve data.
• The information over internet is becoming a critical issue . Cryptography
concepts are used for securing storage system of cloud .
• Many issues are faced while storing the data , the solution for these issues is
hybrid cryptography .
• In this system we have used three cryptography algorithms for providing
block wise security to the data.
• We store files as shard to different servers thus a single file is not stored at
one location .
INTRODUCTION
• Cryptography - Cryptography is the process of hiding or coding information so that only the person a message
was intended for can read it. The art of cryptography has been used to code messages for thousands of years
and continues to be used in bank cards, computer passwords, and ecommerce.

Types of cryptography

Asymmetric Encryption
INTRODUCTION
• Hybrid Cryptography- The Hybrid Encryption primitive combines the efficiency of symmetric encryption with
the convenience of public key (asymmetric) cryptography. Anyone can encrypt data using the public key, but
only users with the private key can decrypt the data.
• In this form of cryptography, a pair of keys is used to encrypt and decrypt information. Encryption is done with
a public key, and decryption is done with a private key.
• For Hybrid Encryption, the sender generates a fresh symmetric key to encrypt the plaintext of each message to
produce a ciphertext. That symmetric key is encapsulated with the recipient's public key. For Hybrid Decryption,
the symmetric key is decapsulated by the recipient and then used to decrypt the ciphertext to recover the
original plaintext

What are the steps in hybrid encryption?


The hybrid encryption process involves four steps:
1. generating the symmetric key,
2. encrypting the data with the symmetric key,
3. encrypting the symmetric key with the public key, and
4. sending the encrypted data and the encrypted key.
PROBLEM STATEMENT
• In cloud the data is stored and handled by unknown servers , these servers can be sometimes accessed by an
unauthorized person thus leading to the violation of data integrity and security and also user has no control
on the data.
• When it is in cloud in order to solve this issues we can store data in distributed manner in encrypted format
using hybrid cryptography.
ABSTRACT
• Cloud Computing is the on demand availability of resources, through the use of internet. It also provides
process and storage of large amount of data online with the help of computing power. However, storing
large amount of data creates a concern due to its security and privacy issues.
• One solution for this problem is to use hybrid cryptography technique for the security issues as it
combines both the features of symmetric as well as asymmetric cryptography and it provides secure file
storage on the cloud.
• Data security and privacy protection are the primary problems that need to be solved. The model
proposed here is a secure hybrid cryptography approach scenario to provide a safe storage and safe
transmission for Confidential Data files. iv Here we've taken several cryptographic algorithms like AES, DES
and RC6.
• These algorithm are providing block wise security to the whole info so these are going to be used as a
hybrid cryptographic algorithm. Here the methodology has firstly loaded the file on the server so divide
the file into 3 parts means file slicing is finished then any of those select above cryptographic algorithms &
these algorithms are often changed with every part and then uploaded over the different cloud server
nodes and can only be encrypted using its key .
• Keywords - Cloud Computing and Storage, AES Algorithm, DES Algorithm, RC6 Algorithm, blowfish
algorithm
OBJECTIVES

 Providing more secure cloud storage.


 Cost and time effective .
 Increase data integrity and confidentiality.
 Eliminate third party access
 Provide authentication
SR NO NAME OF PAPER
LITERATURE
NAME OF AUTHOR
SURVEY
YEAR OF DESCRIPTION
PUBLICATIO
N
1 “Hybrid Cryptography for Chivukula susmitha , siyyadri 2023 In this project they have used ASE ,
Secure File Storage” srineeharika DSE , RC6 for the process of
encryption .
2 “Enhanced Security for Cloud S.S.S Sharma and S. Kumari 2021 This research proposes an enhanced
Storage using Hybrid security model for cloud storage
Cryptography” using hybrid cryptography, which
combines AES and RSA algorithms for
encryption and decryption. The
proposed model also includes secure
key management system, ensuring
the confidentiality and integrity of
data in cloud storage. The study
evaluates the effectiveness of the
proposed model through simulations
and experiments, demonstrating its
potential for secure cloud storage
LITERATURE SURVEY
SR NO NAME OF PAPER NAME OF AUTHOR YEAR OF DESCRIPTION
PUBLICATI
ON
3 “A Hybrid Encryption M.A. Khan, M.A. 2020 This research proposes a hybrid encryption scheme
Scheme for Cloud Rahman, and M. Islam for cloud storage security, which uses both symmetric
Storage Security” and asymmetric encryption. The proposed scheme
employs AES and RSA algorithms for encryption and
decryption, respectively. The study evaluates the
security and performance of the proposed scheme
through simulations and experiments, demonstrating
its effectiveness in mitigating security risks in cloud
storage.

4 “Secure File Storage and y P. Kumar and P. Singh 2019 This study proposes a hybrid cryptographic model for
Sharing in Cloud secure file storage and sharing in cloud computing.
Computing using Hybrid The model uses a combination of AES and RSA
Cryptography” encryption algorithms, ensuring both confidentiality
and integrity of data. The study demonstrates the
effectiveness of the proposed model in terms of
security and performance through simulations and
experiments.
LITERATURE SURVEY
SR NO NAME OF PAPER NAME OF AUTHOR YEAR OF DESCRIPTION
PUBLICATI
ON
5 “Secure File Storage and Mr. Rohit Barvekar, Mr. 2018 The proposed security mechanisms will prevent
Sharing in Cloud ShrajalBehere, Mr. Yash confidential data from being misused making the
Computing using Hybrid Pounikar, Ms. Anushka system more reliable. The proposed method will
Cryptography” Gulhane make encryption and decryption with keys.

6 “ Secure File Storage and y A. Sharma and K. 2017 This study proposes a hybrid cryptography-based
Sharing in Cloud Sharma model for secure file storage and cloud computing,
Computing using Hybrid uses a combination of AES and ECC encryption
Cryptography” algorithms. The proposed model ensures
confidentiality, integrity and availability through the
use of encryption and decryption techniques. The
study demonstrates the effectiveness of the proposed
model in terms of security and performance through
simulations and experiments.
EXISTING SYSTEM
In existing framework single calculation is utilized for information encode and unravel reason. Yet,
utilization of single calculation isn't achieve elevated level security. On the off chance that we utilize
single symmetric key cryptography calculation than we need to confront security issue on the grounds
that in this kind of calculation applies a solitary key for information encode and interpret. So key
transmission issue happen while sharing key into multiuser climate. Public key cryptography
calculations achieve high security however most extreme postponement is required for information
encode and translate.
 more data storage needs turning over to the cloud, finding a secure and efficient data access
structure has become a major research issue

 Security techniques are not applied in the protection of offloaded data from attacks.
 Once uploaded and shared, the data owner inevitably loses control over the data, opening the door
to unauthorized data access.
PROPOSED SYSTEM
Selectively sharing data files on the cloud becomes a burden on the data owner as the hierarchy grows (the access privileges
increase in number) and/or as the access restrictions become more complex due to an increase in the sensitivity of the file
segments. A trivial solution involves the data owner to use public key encryption. This solution would require the data owner to
encrypt the same part of the data file once for each data user being granted access then upload the resulting cipher texts to the
cloud. The data users would then fetch their uniquely encrypted parts of the file from the cloud and utilize their private keys to
decrypt them. This method ensures that no unprivileged data user will gain access to any part of the data file even if that user is
able to download the cipher texts from the cloud. However, on a large scale, public key encryption becomes an inefficient solution
due to the increase in the number of encryptions and large storage spaces required. Therefore, the challenge is to provide the data
owners with an efficient, secure and privilege-based method that allows them to selectively share their data files among multiple
data users while minimizing the required cloud storage space needed to store the encrypted data segments.
 Requiring less network communication.
 We present multiple data file partitioning techniques and propose a privilege-based access structure that facilitate data sharing
in hierarchical settings.
 A new security layer is added to encrypt the data of the task before transferring to the cloud side by using AES encryption
technique.
SYSTEM METHODOLOGY
This framework AES, RC6, Blowfish and BRA calculations are utilized for block savvy security to
information. Proposed framework is hybridization of AES, RC6, Blowfish and BRA. All calculations
are symmetric key cryptography. These calculations utilizes a solitary key for document encode and
disentangle reason. All calculations key size is 128 digit. To conceal key data into cover picture
utilizing LSB method. Usage of proposed framework is finished utilizing java language. Document
encoding and disentangling time is determined with the assistance of java programming. Record
encode and decipher time is determined for just content document with examination of existing AES
and Blowfish calculations. Document size is given in MB for AES calculation.
SYSTEM DESIGN
INPUT DESIGN
The input design is the link between the information system and the user. It comprises the developing specification and
procedures for data preparation and those steps are necessary to put transaction data in to a usable form for processing can be
achieved by inspecting the computer to read data from a written or printed document or it can occur by having people keying the
data directly into the system. The design of input focuses on controlling the amount of input required, controlling the errors,
avoiding delay, avoiding extra steps and keeping the process simple. The input is designed in such a way so that it provides
security and ease of use with retaining the privacy. Input Design considered the following things:

 What data should be given as input?

 How the data should be arranged or coded?

 The dialog to guide the operating personnel in providing input.

 Methods for preparing input validations and steps to follow when error occur.
INPUT DESIGN
OBJECTIVES

1. Input Design is the process of converting a user-oriented description of the input into a computer-based system. This
design is important to avoid errors in the data input process and show the correct direction to the management for getting
correct information from the computerized system.

2. It is achieved by creating user-friendly screens for the data entry to handle large volume of data. The goal of designing
input is to make data entry easier and to be free from errors. The data entry screen is designed in such a way that all the
data manipulates can be performed. It also provides record viewing facilities.

3. When the data is entered it will check for its validity. Data can be entered with the help of screens. Appropriate
messages are provided as when needed so that the user will not be in maize of instant. Thus the objective of input design
is to create an input layout that is easy to follow
OUTPUT DESIGN
A quality output is one, which meets the requirements of the end user and presents the information clearly. In any system
results of processing are communicated to the users and to other system through outputs. In output design it is determined
how the information is to be displaced for immediate need and also the hard copy output. It is the most important and direct
source information to the user. Efficient and intelligent output design improves the system’s relationship to help user
decision-making.
1. Designing computer output should proceed in an organized, well thought out manner; the right output must be developed
while ensuring that each output element is designed so that people will find the system can use easily and effectively. When
analysis design computer output, they should Identify the specific output that is needed to meet the requirements.

2. Select methods for presenting information.

3. Create document, report, or other formats that contain information produced by the system.
OUTPUT DESIGN
The output form of an information system should accomplish one or more of the following objectives.

 Convey information about past activities, current status or projections of the

 Future.

 Signal important events, opportunities, problems, or warnings.

 Trigger an action.

 Confirm an action.
REQUIREMENT ANALYSIS
Hardware requirement Software requirement

• Operating system : Windows 10 Pro.


• System :Intel Core I3
• Coding Language : Python
• Hard Disk :1 Terabyte
• Data Base : MYSQL
• Monitor : 15VGA Colour.
• Server : Flask
• Mouse : Logitech.
• Tool : Pycharm
• Ram : 4 GB.
IMPLEMENTATION
Cloud proprietor transfer the information on cloud worker. Record is part into octet. All aspects of
document is encoded all the while utilizing multithreading strategy. Encoded record is put away on cloud
worker. Keys utilized for encryption are put away into cover picture. Distributed computing is the multi-
client climate .In this beyond what one client can get to record from cloud worker. Cloud client demand for
file. On solicitation of record client additionally get steno picture utilizing email which comprise of key
data. Switch measure is utilized for translate the document

MODULES:

 Data Owner
 Data User
 Admin
 Cloud

.
IMPLEMENTATION
MODULES DESCRIPTION:

Data Owner (DO):

Owner upload the data on cloud server. File is split into octet. Every part of file is encoded simultaneously using multithreading
technique. Encoded file is stored on cloud server. Keys used for encryption are stored into cover image. Cloud computing is the
multi user environment.

Data User (DU):

Cloud user request for file. On request of file user also get key using email which consist of key information. Reverse process is
used for decode the file.

Cloud:

Cloud module can operate by the admin in cloud module having all the registered users and owners details and owner
uploaded file details and user downloaded details.
DATA FLOW DIAGRAM
USE CASE DIAGRAM
USE CASE DIAGRAM
USE CASE DIAGRAM
USE CASE DIAGRAM
CLASS DIAGRAM
SEQUENCE DIAGRAM
ACTIVITY DIAGRAM
ALGORITHM
• Algorithms Used Advanced Encryption Standard (AES)
AES is a technique for encryption of electronic data established by the U.S National Institute of Standards and
Technology (NIST) in 2001. AES is mostly used nowadays as it is stronger than DES and triple DES and harder to
implement[1]. It takes 128 bits as input and outputs 128 bits of encrypted cipher text. AES relies on substitution-
permutation network principle.
ALGORITHM
• Data Encryption Standard (DES)
The Data Encryption Standard is a symmetric-key algorithm for the encryption of digital data. Although its short key
length of 56 bits makes it too insecure for modern applications, it has been highly influential in the advancement of
cryptography
ALGORITHM
• Triple Data Encryption Standard (3DES)
In cryptography, 3DES is an inherited enhanced version of DES (Data Encryption Standard). In the Triple DES algorithm,
DES is used trice to increase the security level. Triple DES is also referred to as TDES or Triple Data Encryption Algorithm
(TDEA).
• Blowfish
ALGORITHM
Blowfish is a symmetric block cipher which uses a Fiestal network, 16 rounds of iterative encryption and decryption
functional design. The block size used is of 64-bits and key size can vary from any length to 448.Blowfish cipher uses 18
sub arrays each of 32-bit commonly known as P-boxes and four Substitution boxes each of 32-bit, each having 256
entries. The algorithm design is shown in figure. It consists of two phases: one is Key Expansion phase another is Data
Encryption phase. In Key expansion phase, key is converted into several sub-keys and in Data Encryption phase,
encryption occurs via 16-round networks. Each round consists of a key dependent permutation and a key and data
dependent substitution
SYSTEM STUDY
FEASIBILITY STUDY

The feasibility of the project is analyzed in this phase and business proposal is put forth with a very general plan for t
project and some cost estimates. During system analysis the feasibility study of the proposed system is to be carried out. This is
ensure that the proposed system is not a burden to the company. For feasibility analysis, some understanding of the maj
requirements for the system is essential.
Three key considerations involved in the feasibility analysis are

 ECONOMICAL FEASIBILITY

 TECHNICAL FEASIBILITY

 SOCIAL FEASIBILITY
SYSTEM STUDY
ECONOMICAL FEASIBILITY

This study is carried out to check the economic impact that the system will have on the organization. The amount of fund th
the company can pour into the research and development of the system is limited. The expenditures must be justified. Thus t
developed system as well within the budget and this was achieved because most of the technologies used are freely available. Only t
customized products had to be purchased.

TECHNICAL FEASIBILITY
This study is carried out to check the technical feasibility, that is, the technical requirements of the system. Any syste
developed must not have a high demand on the available technical resources. This will lead to high demands on the available technic
resources. This will lead to high demands being placed on the client. The developed system must have a modest requirement, as on
minimal or null changes are required for implementing this system.
SYSTEM STUDY
SOCIAL FEASIBILITY

The aspect of study is to check the level of acceptance of the system by the user. This includes the process of training the us
to use the system efficiently. The user must not feel threatened by the system, instead must accept it as a necessity. The level
acceptance by the users solely depends on the methods that are employed to educate the user about the system and to make h
familiar with it. His level of confidence must be raised so that he is also able to make some constructive criticism, which is welcome
as he is the final user of the system.
SYSTEM TESTING
TYPES OF TESTS
Unit testing

Unit testing involves the design of test cases that validate that the internal program logic is functioning properly, and
that program inputs produce valid outputs. All decision branches and internal code flow should be validated. It is the
testing of individual software units of the application .it is done after the completion of an individual unit before
integration. This is a structural testing, that relies on knowledge of its construction and is invasive. Unit tests perform basic
tests at component level and test a specific business process, application, and/or system configuration. Unit tests ensure
that each unique path of a business process performs accurately to the documented specifications and contains clearly
defined inputs and expected results.
SYSTEM TESTING
TYPES OF TESTS

Integration testing

Integration tests are designed to test integrated software components to determine if they actually run as one
program. Testing is event driven and is more concerned with the basic outcome of screens or fields. Integration tests
demonstrate that although the components were individually satisfaction, as shown by successfully unit testing, the
combination of components is correct and consistent. Integration testing is specifically aimed at exposing the problems
that arise from the combination of components.
SYSTEM TESTING
Functional test

Functional tests provide systematic demonstrations that functions tested are available as specified by the business and
technical requirements, system documentation, and user manuals.

Functional testing is centered on the following items:

Valid Input : identified classes of valid input must be accepted.

Invalid Input : identified classes of invalid input must be rejected.

Functions : identified functions must be exercised.

Output : identified classes of application outputs must be exercised.

Systems/Procedures: interfacing systems or procedures must be invoked


FUTURE SCOPE
The future scope of secure file storage using hybrid cryptography on cloud computing is promising as more organizations
and individuals continue to rely on cloud-based storage and computing solutions. Hybrid cryptography, which combines the
benefits of both symmetric and asymmetric encryption, offers a higher level of security for storing sensitive files in the
cloud. Some of future developments in this area are:
1. Increased adoption of hybrid cryptography: As more organizations and individuals become aware of the benefits of
hybrid cryptography for secure file storage, we can expect to see an increase in its adoption. This leads to the
development of more advanced hybrid encryption algorithms and tools.
2. Advancements in cloud security: As cloud providers continue to invest in their security capabilities, we can expect to see
more advanced security features such a key
3. management, access controls, and multi-factor authentication. This will make it easier for users to secure their data in
the cloud.
4. Integration with blockchain: The use of blockchain technology can add an additional layer of security to cloud-based file
storage. Blockchain-based solutions can provide immutable records of data transactions, ensuring that files remain secure
and tamper-proof.
5. Development of quantum-safe cryptography: As quantum computing technology advances, traditional encryption
methods may become vulnerable. Quantum-safe cryptography, which is designed to withstand attacks from quantum
computers, will become increasingly important for secure file storage in the cloud.
CONCLUSION
• In conclusion, secure file storage using cryptography on cloud computing is essential for organizations and
individuals who want to protect their sensitive data from unauthorized access and breaches. Cryptography
provides a secure way to encrypt files, ensuring that only authorized parties can access them.
• The use of hybrid cryptography offers a higher level of security for storing files in the cloud, as it combines
the benefits of both symmetric and asymmetric encryption. This allows for a more efficient and secure way
to store data in the cloud, making it more difficult for hackers to access.
• While cloud computing offers numerous benefits, including scalability and cost-effectiveness, it also
presents security risks. However, with the implementation of strong encryption methods, including hybrid
cryptography, organizations and individuals can mitigate these risks and ensure their data remains secure
in the cloud.
• Overall, secure file storage using cryptography on cloud computing is a critical component of any
organization’s security strategy. With advancements in technology and increased awareness of security
risks, we can expect to see more sophisticated and effective solutions in the future.
REFERENCE
1. Anjali Patil, Nimisha Patel, Dr. Hiren Patel. (2016). Secure data sharing using cryptography in a
cloud environment. Far East Journal of Electronics and Communications, 18(4), 521–546.
2. Bilal Habib, Bertrand Cambou, DuaneBooher, Christopher Philabaum.(2017).
3. Secure data sharing in cloud storage using key aggregation cryptography. International
Journal of Pure and Applied Mathematics, 119(16), 3257-3262.
4. Sharma and K. Sharma(2017), “ Secure File Storage and Sharing in Cloud Computing using
Hybrid Cryptography”.
5. Mr. Rohit Barvekar, Mr. ShrajalBehere, Mr. Yash Pounikar, Ms. Anushka Gulhane (2018).
Security in Cloud Computing using Cryptographic Algorithms.
6. Mr. Rohit Barvekar, Mr. ShrajalBehere, Mr. Yash Pounikar, Ms. Anushka Gulhane(2018),
“Secure File Storage and Sharing in Cloud Computing using Hybrid Cryptography”
7. P. Kumar and P. Singh(2019) , “Secure File Storage and Sharing in Cloud Computing using
Hybrid Cryptography”.
8. M.A. Khan, M.A. Rahman, and M. Islam(2020), “A Hybrid Encryption Scheme for Cloud
Storage Security”.
9. S.S.S Sharma and S. Kumari(2021), “Enhanced Security for Cloud Storage using Hybrid
Cryptography”

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy