SECRY - Secure file storage on cloud using hybrid cryptography

A
SECRY
SECURE FILE STORAGE ON CLOUD USING HYBRID CRYPTOGRAPHY
A project presentation on
PROJECT GUIDE
MRS. SOJA SALIM
ASSISTANT PROFESSOR,
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING.
SREE CHITRA THIRUNAL COLLEGE OF ENGINEERING
PROJECT TEAM
ALIN BABU (SCT15CS007)
AKSHAY P S (SCT16CS008)
RAHUL M (SCT16CS046)
2https://secrycloud.tech
Contents
3
 Introduction
 Problem Statement
 Literature Survey
 Existing System
 Proposed System
 System Architecture
 Activity Diagram & Use Case diagram
 Requirements
 ER Diagram & Database Tables
 Implementation
 Cloud Database Configuration
 Demonstration
 Conclusion
 References
https://secrycloud.tech
Introduction
 To store huge amount of data cloud computing is used now a days. We can
retrieve any data from cloud, when the user request for it.
 Many issues are faced while storing the data, the solution for these issues we
are using hybrid cryptography technique.
 In this system, we use three cryptography algorithm for providing block wise
security to the data.
 We store files as shards to different servers thus a single file is not stored at
one location.
4https://secrycloud.tech
Problem statement
In cloud the data is stored and handled by unknown servers, these servers
can be sometimes accessed by unauthorized persons thus leading to violation of
data integrity and security, and also user has no control over data when it is in cloud
in order to solve these issues we can store data in distributed manner in encrypted
format using hybrid cryptography.
5https://secrycloud.tech
Literature Survey
 IEEE WiSPNET 2016 conference paper on Secure File storage in Cloud
Computing using Hybrid Cryptography Algorithm by Punam V. Maitri and
Aruna Verma suggest the secure storage of file in cloud using hybrid
cryptography.
 The above mentioned paper proposes the way of splitting files into different parts
and then applying the hybrid cryptography for each part.
 The method uses LSB steganography method for storing keys and uses symmetric
cryptographic algorithm for encryption and decryption.
6https://secrycloud.tech
Literature Survey (Cont.)
 IEEE 2018 Fourth International Conference on Computing Communication Control and Automation on Cloud
Oriented Distributed and Encrypted File Storage (CODE-FS) by Mihir Manek, Kinjal Shah, Mehvash Khan,
Aditi Chhadwa and Manish Potey suggest the secure storage of file in distributed manner.
 The file is first encrypted and then uploaded to the server where it is divided into shards and these shards are
distributed over multiple cloud nodes.
 Each and every node contains only a single shard of a particular file of any format uploaded by user which
ensures that if any attack takes place no important data is compromised.
 The file transfer between all entities in the network will be end-to-end encrypted, thus ensuring that no entity
will get access to sensitive information.
 In this method only single algorithm is used and only after encryption the file is divided into shards and stored
7https://secrycloud.tech
Literature Survey (Cont.)
 IEEE 2018 Fourth International Conference on Computing Communication Control
and Automation on Implementation of Secure File Storage on Cloud with owner-
defined Attributes for Encryption by Ms. Supriya Kute and Prof. S. B. Javheri
proposed the method storing file with encryption and attributes defined by file owner.
 The paper proposes the method storing file along with owner defined attributes and
encryption algorithm.
 The file decrypted using the attributes defined by owner and key thus ensuring
security.
 The problem in this method was that if a user who knows the attributes can decrypt
the file easily.
8https://secrycloud.tech
Literature Survey (Cont.)
 2018 International Conference on Information, Communication, Engineering and
Technology on Attribute-Based Encryption Along with Data Performance and
Security on Cloud Storage by Ms. Snehal Rathod, S. A. Ubale and Sulabha S. Apte
proposed the method storing file with attribute based encryption.
 The paper proposes the Hybrid Encryption using Cipher-text Policy Attribute with
Verifiable Delegation method.
 The proposed system, fuse with verifiable computation such as hybrid encryption,
key generation, transformation, verify decryption, the data security and hence the
correctness of the delegated computing results are well secured at a same time.
9
https://secrycloud.tech
Existing System
 In order to store, handle and calculate numerous data, the cloud servers are being used. Large
number of applications moves on to cloud computing platforms which has to be handled.
 In existing system single algorithm is used for data encrypt and decrypt purpose. But use of
single algorithm is not accomplishable for high level security.
 If we use public key cryptography algorithm than we have to face security problem for storing
public key.
 Key transmission problem occur while sharing key into multiuser environment. Public key
cryptography algorithms accomplish high security but maximum delay is needed for data
encrypt and decrypt.
10https://secrycloud.tech
Proposed System
 In our system cloud owner upload the data on cloud server. To enhance security of file in
cloud computing source file is break into different parts.
 Every part of file is encrypted using each encryption algorithm. Encrypted file is stored
on cloud database server.
 Each part of file is stored in different cloud database server. Each and every cloud server
contains only a single part of a particular file of any format uploaded by user which
ensures that if any attack takes place no important data is compromised.
11https://secrycloud.tech
Proposed System (Cont.)
 The file transfer between all entities in the network will be end-to-end encrypted, thus
ensuring that no entity will get access to sensitive information. Moreover, the servers
storing the parts doesn’t contain any info of which part of the file is stored.
 Parts of the same file will not be stored on same server location, thus preventing the
attacker from guessing the location of other parts.
 The files that are selected for upload by the user will be encrypted at the client side
before uploading and will be decrypted after the user downloads it, with the user’s key
12https://secrycloud.tech
Proposed v/s Existing System
13
Encryption time Comparison
with
AES and Proposed System
Decryption time Comparison
with
AES and Proposed System
Encryption Time Comparison with
Blowfish and Proposed System
Decryption Time Comparison with
Blowfish and Proposed Systemhttps://secrycloud.tech
Project Objective
 Providing more secure cloud storage.
 Cost and time efficient.
 Increase data integrity and confidentiality.
 Eliminate third party access.
 Provide Authentication.
14https://secrycloud.tech
System Architecture
15https://secrycloud.tech
Splitting & Encrypting Files
16
File_Split2
Encrypt - DES
File_Split3
Encrypt – RC4
File_Split1
Encrypt - AES
File
https://secrycloud.tech
Decrypting & Merging File
17
File_Split1 File_Split2 File_Split3
Decrypt -
AES
Decrypt -
DES
Decrypt -
RC4
Merge
File
https://secrycloud.tech
Activity Diagram-Upload
18https://secrycloud.tech
Activity Diagram-Download
19https://secrycloud.tech
Use case Diagram
20https://secrycloud.tech
Requirements
 Front End – HTML ,CSS, jQuery
 Backend – Python, MySQL
 Framework – Django, Bootstrap4
 Cloud Web server – AWS EC2
 Cloud Database server – AWS RDS
21https://secrycloud.tech
Implementation Phases
22
UI
Development
Splitting &
Merging
Encryption Decryption
SteganographyDatabase
Design
Cloud
Integration
Deployment
https://secrycloud.tech
Database Tables
23
Field Type
user_id varchar(10) PK
username varchar(150)
first_name varchar(30)
last_name varchar(150)
password varchar(128)
email varchar(254)
phone bigint(20)
location varchar(30)
Field Type
file_id varchar(10) PK
file_name varchar(50)
file_size double
file_key varchar(150)
user_id
varchar(10)
FK
Field Type
store_i
d
varchar(150)
PK
content longblob
Users
File_Info
File_Storage
https://secrycloud.tech
ER Diagram
24https://secrycloud.tech
Implementation
Algorithm split()
1. Get the file.
2. Store it in a temporary location.
3. Get the size of file and divide it by three.
4. Call FileSplit python library and pass file location, chunk size and
destination location.
25https://secrycloud.tech
Implementation (Cont.)
 Cryptographic Algorithms
 AES - Advanced Encryption Standard
 Triple DES - Triple Data Encryption Standard
 ARC4 - Alleged Rivest Cipher 4
 Uses python Cryptography library to implement the hybrid cryptography
 Steganography techniques to store cryptographic key.
 Uses python stegano library to implement the LSB steganography technique.
26https://secrycloud.tech
Implementation (Cont.)
 Stegano library key hiding function
 Stegano library key reveal function
Algorithm join()
1. Get the file location.
2. Sort the files based on filename.
3. For each file write the contents of each file to output file.
4. Store the output file in temporary folder.
27https://secrycloud.tech
Cloud database configuration – Database 1
28
Database Location : us-east-2(Ohio)
AWS RDS configuration screenshot of database location us-east-2
https://secrycloud.tech
Cloud database configuration – Database 2
29
Database Location : us-east-1(N-Virginia)
AWS RDS configuration screenshot of database location us-east-1
https://secrycloud.tech
Cloud database configuration – Database 3
30
Database Location : eu-west-1(Ireland)
AWS RDS configuration screenshot of database location us-west-1
https://secrycloud.tech
Demonstration
31https://secrycloud.tech
https://drive.google.com/file/d/1GS1_mdcnaYZtc76CQ6RZZqt_907DT5Kd/view?usp=sharin
g
Conclusion
 Information security is the main concern of todays world.
 In order to achieve file security we proposes hybrid cryptography and storing files as
shards.
 We uses mainly three cryptographic algorithms to provide security.
 Each shard is stored in sperate database server as blob.
 Each file can be accessed using a key file which is a image that uses LSB
steganography
 In this project we only considered the text files only, in future work we can include
more file types for securely storing.
32https://secrycloud.tech
References
1. Punam V Maitri and Aruna Verma. “Secure file storage in cloud computing using hybrid cryptography
algorithm”. In 2016 International Conference on Wireless Communications, Signal Processing and
Networking (WiSPNET), pages 1635-1638. IEEE, 2016.
2. Mihir Manek, Aditi Chhadwa, Kinjal Shah, Manish Potey, and Mehvash Khan. “Cloud Oriented Distributed
and Encrypted File Storage (CODE-FS)”. In 2018 Fourth International Conference on Computing
Communication Control and Automation (ICCUBEA),pages 1-5. IEEE, 2018.
3. Supriya Kute and SB Javheri. “Implementation of Secure File Storage on Cloud with Owner-Defined
Attributes for Encryption”. In 2018 Fourth International Conference on Computing Communication
Control and Automation (ICCUBEA), pages 1{6. IEEE, 2018.
4. Ms Snehal Rathod, SA Ubale, and Sulabha S Apte. “Attribute-Based Encryption Along with Data
Performance and Security on Cloud Storage”. In 2018 International Conference on Information,
Communication, Engineering and Technology (ICICET), pages 1-3. IEEE, 2018.
5. https://docs.djangoproject.com/en/3.0/
6. https://getbootstrap.com/docs/4.4/getting-started/introduction/
7. https://medium.com/saarthi-ai/ec2apachedjango-838e3f6014ab
8. https://github.com/ALINBABU/SECRY
33https://secrycloud.tech
34https://secrycloud.tech
1 de 34

Recomendados

secure file storage on cloud using hybrid Cryptography ppt.pptx por
secure file storage on cloud using hybrid Cryptography  ppt.pptxsecure file storage on cloud using hybrid Cryptography  ppt.pptx
secure file storage on cloud using hybrid Cryptography ppt.pptxNishmithaHc
2K visualizações30 slides
IRJET- Secure File Storage on Cloud using Cryptography por
IRJET-  	  Secure File Storage on Cloud using CryptographyIRJET-  	  Secure File Storage on Cloud using Cryptography
IRJET- Secure File Storage on Cloud using CryptographyIRJET Journal
478 visualizações4 slides
Data security in cloud computing por
Data security in cloud computingData security in cloud computing
Data security in cloud computingPrince Chandu
77.5K visualizações29 slides
Image encryption using aes key expansion por
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansionSreeda Perikamana
20.8K visualizações36 slides
PPT steganography por
PPT steganographyPPT steganography
PPT steganographyparvez Sharaf
131.7K visualizações17 slides
Block Cipher and its Design Principles por
Block Cipher and its Design PrinciplesBlock Cipher and its Design Principles
Block Cipher and its Design PrinciplesSHUBHA CHATURVEDI
3.4K visualizações8 slides

Mais conteúdo relacionado

Mais procurados

cloud security ppt por
cloud security ppt cloud security ppt
cloud security ppt Devyani Vaidya
2.8K visualizações25 slides
Cryptography por
CryptographyCryptography
CryptographySagar Janagonda
6.4K visualizações18 slides
Cryptography on cloud por
Cryptography on cloudCryptography on cloud
Cryptography on cloudkrprashant94
4K visualizações12 slides
secure file Storage on cloud ppt por
secure file Storage on cloud pptsecure file Storage on cloud ppt
secure file Storage on cloud pptNishmithaHc
219 visualizações30 slides
Cloud security por
Cloud securityCloud security
Cloud securityNiharika Varshney
2.5K visualizações29 slides
Cryptography por
CryptographyCryptography
Cryptographysubodh pawar
2.1K visualizações20 slides

Mais procurados(20)

cloud security ppt por Devyani Vaidya
cloud security ppt cloud security ppt
cloud security ppt
Devyani Vaidya2.8K visualizações
Cryptography por Sagar Janagonda
CryptographyCryptography
Cryptography
Sagar Janagonda6.4K visualizações
Cryptography on cloud por krprashant94
Cryptography on cloudCryptography on cloud
Cryptography on cloud
krprashant944K visualizações
secure file Storage on cloud ppt por NishmithaHc
secure file Storage on cloud pptsecure file Storage on cloud ppt
secure file Storage on cloud ppt
NishmithaHc219 visualizações
Cloud security por Niharika Varshney
Cloud securityCloud security
Cloud security
Niharika Varshney2.5K visualizações
Cryptography por subodh pawar
CryptographyCryptography
Cryptography
subodh pawar2.1K visualizações
Symmetric & Asymmetric Cryptography por chauhankapil
Symmetric & Asymmetric CryptographySymmetric & Asymmetric Cryptography
Symmetric & Asymmetric Cryptography
chauhankapil2.1K visualizações
Secure Socket Layer por Naveen Kumar
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
Naveen Kumar39.1K visualizações
Cloud security ppt por Venkatesh Chary
Cloud security pptCloud security ppt
Cloud security ppt
Venkatesh Chary98.4K visualizações
CRYPTOGRAPHY AND NETWORK SECURITY por Kathirvel Ayyaswamy
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy5.9K visualizações
CRYPTOGRAPHY & NETWORK SECURITY - unit 1 por RAMESHBABU311293
CRYPTOGRAPHY & NETWORK SECURITY -  unit 1CRYPTOGRAPHY & NETWORK SECURITY -  unit 1
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
RAMESHBABU3112931K visualizações
Cloud security Presentation por Ajay p
Cloud security PresentationCloud security Presentation
Cloud security Presentation
Ajay p4.9K visualizações
Pgp pretty good privacy por Pawan Arya
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacy
Pawan Arya69.8K visualizações
DNA based Cryptography_Final_Review por Rasheed Karuvally
DNA based Cryptography_Final_ReviewDNA based Cryptography_Final_Review
DNA based Cryptography_Final_Review
Rasheed Karuvally4.3K visualizações
Encryption And Decryption Using AES Algorithm por Ahmed Raza Shaikh
Encryption And Decryption Using AES AlgorithmEncryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES Algorithm
Ahmed Raza Shaikh1.6K visualizações
Cloud computing and Cloud security fundamentals por Viresh Suri
Cloud computing and Cloud security fundamentalsCloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentals
Viresh Suri9.5K visualizações
Steganography por Deepak Raj
SteganographySteganography
Steganography
Deepak Raj469 visualizações
Cloud Computing Architecture por Animesh Chaturvedi
Cloud Computing ArchitectureCloud Computing Architecture
Cloud Computing Architecture
Animesh Chaturvedi28.4K visualizações
Cryptography - Block cipher & stream cipher por Niloy Biswas
Cryptography - Block cipher & stream cipherCryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipher
Niloy Biswas1.6K visualizações

Similar a SECRY - Secure file storage on cloud using hybrid cryptography

IRJET- A Survey on File Storage and Retrieval using Blockchain Technology por
IRJET- A Survey on File Storage and Retrieval using Blockchain TechnologyIRJET- A Survey on File Storage and Retrieval using Blockchain Technology
IRJET- A Survey on File Storage and Retrieval using Blockchain TechnologyIRJET Journal
52 visualizações4 slides
Implementation of De-Duplication Algorithm por
Implementation of De-Duplication AlgorithmImplementation of De-Duplication Algorithm
Implementation of De-Duplication AlgorithmIRJET Journal
31 visualizações5 slides
Secry poster por
Secry posterSecry poster
Secry posterALIN BABU
239 visualizações1 slide
The Impact Of Cryptanalysis Using Advanced 3D Playfair... por
The Impact Of Cryptanalysis Using Advanced 3D Playfair...The Impact Of Cryptanalysis Using Advanced 3D Playfair...
The Impact Of Cryptanalysis Using Advanced 3D Playfair...Robynn Dixon
2 visualizações45 slides
Multi-part Dynamic Key Generation For Secure Data Encryption por
Multi-part Dynamic Key Generation For Secure Data EncryptionMulti-part Dynamic Key Generation For Secure Data Encryption
Multi-part Dynamic Key Generation For Secure Data EncryptionCSCJournals
430 visualizações10 slides
Providing Secure Cloud for College Campus por
Providing Secure Cloud for College CampusProviding Secure Cloud for College Campus
Providing Secure Cloud for College Campusvivatechijri
16 visualizações4 slides

Similar a SECRY - Secure file storage on cloud using hybrid cryptography(20)

IRJET- A Survey on File Storage and Retrieval using Blockchain Technology por IRJET Journal
IRJET- A Survey on File Storage and Retrieval using Blockchain TechnologyIRJET- A Survey on File Storage and Retrieval using Blockchain Technology
IRJET- A Survey on File Storage and Retrieval using Blockchain Technology
IRJET Journal52 visualizações
Implementation of De-Duplication Algorithm por IRJET Journal
Implementation of De-Duplication AlgorithmImplementation of De-Duplication Algorithm
Implementation of De-Duplication Algorithm
IRJET Journal31 visualizações
Secry poster por ALIN BABU
Secry posterSecry poster
Secry poster
ALIN BABU239 visualizações
The Impact Of Cryptanalysis Using Advanced 3D Playfair... por Robynn Dixon
The Impact Of Cryptanalysis Using Advanced 3D Playfair...The Impact Of Cryptanalysis Using Advanced 3D Playfair...
The Impact Of Cryptanalysis Using Advanced 3D Playfair...
Robynn Dixon2 visualizações
Multi-part Dynamic Key Generation For Secure Data Encryption por CSCJournals
Multi-part Dynamic Key Generation For Secure Data EncryptionMulti-part Dynamic Key Generation For Secure Data Encryption
Multi-part Dynamic Key Generation For Secure Data Encryption
CSCJournals430 visualizações
Providing Secure Cloud for College Campus por vivatechijri
Providing Secure Cloud for College CampusProviding Secure Cloud for College Campus
Providing Secure Cloud for College Campus
vivatechijri16 visualizações
IRJET- Storage Security in Cloud Computing por IRJET Journal
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud Computing
IRJET Journal26 visualizações
Paper id 712019116 por IJRAT
Paper id 712019116Paper id 712019116
Paper id 712019116
IJRAT26 visualizações
Paper id 27201448 por IJRAT
Paper id 27201448Paper id 27201448
Paper id 27201448
IJRAT251 visualizações
Secured Authorized Deduplication Based Hybrid Cloud por theijes
Secured Authorized Deduplication Based Hybrid CloudSecured Authorized Deduplication Based Hybrid Cloud
Secured Authorized Deduplication Based Hybrid Cloud
theijes539 visualizações
E031102034039 por theijes
E031102034039E031102034039
E031102034039
theijes304 visualizações
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr... por IRJET Journal
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET Journal11 visualizações
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit... por IRJET Journal
IRJET -  	  Multi Authority based Integrity Auditing and Proof of Storage wit...IRJET -  	  Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET Journal9 visualizações
The Time-Consuming Task Of Preparing A Data Set For... por Kimberly Thomas
The Time-Consuming Task Of Preparing A Data Set For...The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...
Kimberly Thomas2 visualizações
IRJET - A Secure Access Policies based on Data Deduplication System por IRJET Journal
IRJET - A Secure Access Policies based on Data Deduplication SystemIRJET - A Secure Access Policies based on Data Deduplication System
IRJET - A Secure Access Policies based on Data Deduplication System
IRJET Journal8 visualizações
Improving Efficiency of Security in Multi-Cloud por IJTET Journal
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-Cloud
IJTET Journal317 visualizações
A Novel Approach for Data Security in Cloud Environment por SHREYASSRINATH94
A Novel Approach for Data Security in  Cloud EnvironmentA Novel Approach for Data Security in  Cloud Environment
A Novel Approach for Data Security in Cloud Environment
SHREYASSRINATH9418 visualizações
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)... por dbpublications
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
dbpublications57 visualizações
Improving Data Storage Security in Cloud using Hadoop por IJERA Editor
Improving Data Storage Security in Cloud using HadoopImproving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using Hadoop
IJERA Editor285 visualizações
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing por IJERA Editor
Securely Data Forwarding and Maintaining Reliability of Data in Cloud ComputingSecurely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
IJERA Editor359 visualizações

Mais de ALIN BABU

Project final report por
Project final reportProject final report
Project final reportALIN BABU
529 visualizações46 slides
Secure Cloud Storage por
Secure Cloud StorageSecure Cloud Storage
Secure Cloud StorageALIN BABU
320 visualizações41 slides
Prediciting restaurant and popularity based on Yelp Dataset project report por
Prediciting restaurant and popularity based on Yelp Dataset  project reportPrediciting restaurant and popularity based on Yelp Dataset  project report
Prediciting restaurant and popularity based on Yelp Dataset project reportALIN BABU
91 visualizações6 slides
Prediciting restaurant and popularity based on Yelp Dataset - 2 por
Prediciting restaurant and popularity based on Yelp Dataset - 2Prediciting restaurant and popularity based on Yelp Dataset - 2
Prediciting restaurant and popularity based on Yelp Dataset - 2ALIN BABU
42 visualizações11 slides
Prediciting restaurant and popularity based on Yelp Dataset - 1 por
Prediciting restaurant and popularity based on Yelp Dataset - 1Prediciting restaurant and popularity based on Yelp Dataset - 1
Prediciting restaurant and popularity based on Yelp Dataset - 1ALIN BABU
30 visualizações9 slides
Secure cloud storage por
Secure cloud storageSecure cloud storage
Secure cloud storageALIN BABU
150 visualizações31 slides

Mais de ALIN BABU(8)

Project final report por ALIN BABU
Project final reportProject final report
Project final report
ALIN BABU529 visualizações
Secure Cloud Storage por ALIN BABU
Secure Cloud StorageSecure Cloud Storage
Secure Cloud Storage
ALIN BABU320 visualizações
Prediciting restaurant and popularity based on Yelp Dataset project report por ALIN BABU
Prediciting restaurant and popularity based on Yelp Dataset  project reportPrediciting restaurant and popularity based on Yelp Dataset  project report
Prediciting restaurant and popularity based on Yelp Dataset project report
ALIN BABU91 visualizações
Prediciting restaurant and popularity based on Yelp Dataset - 2 por ALIN BABU
Prediciting restaurant and popularity based on Yelp Dataset - 2Prediciting restaurant and popularity based on Yelp Dataset - 2
Prediciting restaurant and popularity based on Yelp Dataset - 2
ALIN BABU42 visualizações
Prediciting restaurant and popularity based on Yelp Dataset - 1 por ALIN BABU
Prediciting restaurant and popularity based on Yelp Dataset - 1Prediciting restaurant and popularity based on Yelp Dataset - 1
Prediciting restaurant and popularity based on Yelp Dataset - 1
ALIN BABU30 visualizações
Secure cloud storage por ALIN BABU
Secure cloud storageSecure cloud storage
Secure cloud storage
ALIN BABU150 visualizações
iPhone por ALIN BABU
iPhoneiPhone
iPhone
ALIN BABU519 visualizações
Report por ALIN BABU
ReportReport
Report
ALIN BABU167 visualizações

Último

Instrumentation & Control Lab Manual.pdf por
Instrumentation & Control Lab Manual.pdfInstrumentation & Control Lab Manual.pdf
Instrumentation & Control Lab Manual.pdfNTU Faisalabad
6 visualizações63 slides
fakenews_DBDA_Mar23.pptx por
fakenews_DBDA_Mar23.pptxfakenews_DBDA_Mar23.pptx
fakenews_DBDA_Mar23.pptxdeepmitra8
15 visualizações34 slides
MK__Cert.pdf por
MK__Cert.pdfMK__Cert.pdf
MK__Cert.pdfHassan Khan
11 visualizações1 slide
SUMIT SQL PROJECT SUPERSTORE 1.pptx por
SUMIT SQL PROJECT SUPERSTORE 1.pptxSUMIT SQL PROJECT SUPERSTORE 1.pptx
SUMIT SQL PROJECT SUPERSTORE 1.pptxSumit Jadhav
15 visualizações26 slides
Design of machine elements-UNIT 3.pptx por
Design of machine elements-UNIT 3.pptxDesign of machine elements-UNIT 3.pptx
Design of machine elements-UNIT 3.pptxgopinathcreddy
32 visualizações31 slides
CHEMICAL KINETICS.pdf por
CHEMICAL KINETICS.pdfCHEMICAL KINETICS.pdf
CHEMICAL KINETICS.pdfAguedaGutirrez
13 visualizações337 slides

Último(20)

Instrumentation & Control Lab Manual.pdf por NTU Faisalabad
Instrumentation & Control Lab Manual.pdfInstrumentation & Control Lab Manual.pdf
Instrumentation & Control Lab Manual.pdf
NTU Faisalabad 6 visualizações
fakenews_DBDA_Mar23.pptx por deepmitra8
fakenews_DBDA_Mar23.pptxfakenews_DBDA_Mar23.pptx
fakenews_DBDA_Mar23.pptx
deepmitra815 visualizações
MK__Cert.pdf por Hassan Khan
MK__Cert.pdfMK__Cert.pdf
MK__Cert.pdf
Hassan Khan11 visualizações
SUMIT SQL PROJECT SUPERSTORE 1.pptx por Sumit Jadhav
SUMIT SQL PROJECT SUPERSTORE 1.pptxSUMIT SQL PROJECT SUPERSTORE 1.pptx
SUMIT SQL PROJECT SUPERSTORE 1.pptx
Sumit Jadhav 15 visualizações
Design of machine elements-UNIT 3.pptx por gopinathcreddy
Design of machine elements-UNIT 3.pptxDesign of machine elements-UNIT 3.pptx
Design of machine elements-UNIT 3.pptx
gopinathcreddy32 visualizações
CHEMICAL KINETICS.pdf por AguedaGutirrez
CHEMICAL KINETICS.pdfCHEMICAL KINETICS.pdf
CHEMICAL KINETICS.pdf
AguedaGutirrez13 visualizações
Investor Presentation por eser sevinç
Investor PresentationInvestor Presentation
Investor Presentation
eser sevinç25 visualizações
Design_Discover_Develop_Campaign.pptx por ShivanshSeth6
Design_Discover_Develop_Campaign.pptxDesign_Discover_Develop_Campaign.pptx
Design_Discover_Develop_Campaign.pptx
ShivanshSeth632 visualizações
Investigation of Physicochemical Changes of Soft Clay around Deep Geopolymer ... por AltinKaradagli
Investigation of Physicochemical Changes of Soft Clay around Deep Geopolymer ...Investigation of Physicochemical Changes of Soft Clay around Deep Geopolymer ...
Investigation of Physicochemical Changes of Soft Clay around Deep Geopolymer ...
AltinKaradagli12 visualizações
sam_software_eng_cv.pdf por sammyigbinovia
sam_software_eng_cv.pdfsam_software_eng_cv.pdf
sam_software_eng_cv.pdf
sammyigbinovia5 visualizações
Generative AI Models & Their Applications por SN
Generative AI Models & Their ApplicationsGenerative AI Models & Their Applications
Generative AI Models & Their Applications
SN8 visualizações
MSA Website Slideshow (16).pdf por msaucla
MSA Website Slideshow (16).pdfMSA Website Slideshow (16).pdf
MSA Website Slideshow (16).pdf
msaucla76 visualizações
Update 42 models(Diode/General ) in SPICE PARK(DEC2023) por Tsuyoshi Horigome
Update 42 models(Diode/General ) in SPICE PARK(DEC2023)Update 42 models(Diode/General ) in SPICE PARK(DEC2023)
Update 42 models(Diode/General ) in SPICE PARK(DEC2023)
Tsuyoshi Horigome33 visualizações
Searching in Data Structure por raghavbirla63
Searching in Data StructureSearching in Data Structure
Searching in Data Structure
raghavbirla637 visualizações
What is Unit Testing por Sadaaki Emura
What is Unit TestingWhat is Unit Testing
What is Unit Testing
Sadaaki Emura24 visualizações
Control Systems Feedback.pdf por LGGaming5
Control Systems Feedback.pdfControl Systems Feedback.pdf
Control Systems Feedback.pdf
LGGaming56 visualizações
K8S Roadmap.pdf por MaryamTavakkoli2
K8S Roadmap.pdfK8S Roadmap.pdf
K8S Roadmap.pdf
MaryamTavakkoli28 visualizações
DESIGN OF SPRINGS-UNIT4.pptx por gopinathcreddy
DESIGN OF SPRINGS-UNIT4.pptxDESIGN OF SPRINGS-UNIT4.pptx
DESIGN OF SPRINGS-UNIT4.pptx
gopinathcreddy19 visualizações

SECRY - Secure file storage on cloud using hybrid cryptography

  • 1. SECRY SECURE FILE STORAGE ON CLOUD USING HYBRID CRYPTOGRAPHY A project presentation on
  • 2. PROJECT GUIDE MRS. SOJA SALIM ASSISTANT PROFESSOR, DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. SREE CHITRA THIRUNAL COLLEGE OF ENGINEERING PROJECT TEAM ALIN BABU (SCT15CS007) AKSHAY P S (SCT16CS008) RAHUL M (SCT16CS046) 2https://secrycloud.tech
  • 3. Contents 3  Introduction  Problem Statement  Literature Survey  Existing System  Proposed System  System Architecture  Activity Diagram & Use Case diagram  Requirements  ER Diagram & Database Tables  Implementation  Cloud Database Configuration  Demonstration  Conclusion  References https://secrycloud.tech
  • 4. Introduction  To store huge amount of data cloud computing is used now a days. We can retrieve any data from cloud, when the user request for it.  Many issues are faced while storing the data, the solution for these issues we are using hybrid cryptography technique.  In this system, we use three cryptography algorithm for providing block wise security to the data.  We store files as shards to different servers thus a single file is not stored at one location. 4https://secrycloud.tech
  • 5. Problem statement In cloud the data is stored and handled by unknown servers, these servers can be sometimes accessed by unauthorized persons thus leading to violation of data integrity and security, and also user has no control over data when it is in cloud in order to solve these issues we can store data in distributed manner in encrypted format using hybrid cryptography. 5https://secrycloud.tech
  • 6. Literature Survey  IEEE WiSPNET 2016 conference paper on Secure File storage in Cloud Computing using Hybrid Cryptography Algorithm by Punam V. Maitri and Aruna Verma suggest the secure storage of file in cloud using hybrid cryptography.  The above mentioned paper proposes the way of splitting files into different parts and then applying the hybrid cryptography for each part.  The method uses LSB steganography method for storing keys and uses symmetric cryptographic algorithm for encryption and decryption. 6https://secrycloud.tech
  • 7. Literature Survey (Cont.)  IEEE 2018 Fourth International Conference on Computing Communication Control and Automation on Cloud Oriented Distributed and Encrypted File Storage (CODE-FS) by Mihir Manek, Kinjal Shah, Mehvash Khan, Aditi Chhadwa and Manish Potey suggest the secure storage of file in distributed manner.  The file is first encrypted and then uploaded to the server where it is divided into shards and these shards are distributed over multiple cloud nodes.  Each and every node contains only a single shard of a particular file of any format uploaded by user which ensures that if any attack takes place no important data is compromised.  The file transfer between all entities in the network will be end-to-end encrypted, thus ensuring that no entity will get access to sensitive information.  In this method only single algorithm is used and only after encryption the file is divided into shards and stored 7https://secrycloud.tech
  • 8. Literature Survey (Cont.)  IEEE 2018 Fourth International Conference on Computing Communication Control and Automation on Implementation of Secure File Storage on Cloud with owner- defined Attributes for Encryption by Ms. Supriya Kute and Prof. S. B. Javheri proposed the method storing file with encryption and attributes defined by file owner.  The paper proposes the method storing file along with owner defined attributes and encryption algorithm.  The file decrypted using the attributes defined by owner and key thus ensuring security.  The problem in this method was that if a user who knows the attributes can decrypt the file easily. 8https://secrycloud.tech
  • 9. Literature Survey (Cont.)  2018 International Conference on Information, Communication, Engineering and Technology on Attribute-Based Encryption Along with Data Performance and Security on Cloud Storage by Ms. Snehal Rathod, S. A. Ubale and Sulabha S. Apte proposed the method storing file with attribute based encryption.  The paper proposes the Hybrid Encryption using Cipher-text Policy Attribute with Verifiable Delegation method.  The proposed system, fuse with verifiable computation such as hybrid encryption, key generation, transformation, verify decryption, the data security and hence the correctness of the delegated computing results are well secured at a same time. 9 https://secrycloud.tech
  • 10. Existing System  In order to store, handle and calculate numerous data, the cloud servers are being used. Large number of applications moves on to cloud computing platforms which has to be handled.  In existing system single algorithm is used for data encrypt and decrypt purpose. But use of single algorithm is not accomplishable for high level security.  If we use public key cryptography algorithm than we have to face security problem for storing public key.  Key transmission problem occur while sharing key into multiuser environment. Public key cryptography algorithms accomplish high security but maximum delay is needed for data encrypt and decrypt. 10https://secrycloud.tech
  • 11. Proposed System  In our system cloud owner upload the data on cloud server. To enhance security of file in cloud computing source file is break into different parts.  Every part of file is encrypted using each encryption algorithm. Encrypted file is stored on cloud database server.  Each part of file is stored in different cloud database server. Each and every cloud server contains only a single part of a particular file of any format uploaded by user which ensures that if any attack takes place no important data is compromised. 11https://secrycloud.tech
  • 12. Proposed System (Cont.)  The file transfer between all entities in the network will be end-to-end encrypted, thus ensuring that no entity will get access to sensitive information. Moreover, the servers storing the parts doesn’t contain any info of which part of the file is stored.  Parts of the same file will not be stored on same server location, thus preventing the attacker from guessing the location of other parts.  The files that are selected for upload by the user will be encrypted at the client side before uploading and will be decrypted after the user downloads it, with the user’s key 12https://secrycloud.tech
  • 13. Proposed v/s Existing System 13 Encryption time Comparison with AES and Proposed System Decryption time Comparison with AES and Proposed System Encryption Time Comparison with Blowfish and Proposed System Decryption Time Comparison with Blowfish and Proposed Systemhttps://secrycloud.tech
  • 14. Project Objective  Providing more secure cloud storage.  Cost and time efficient.  Increase data integrity and confidentiality.  Eliminate third party access.  Provide Authentication. 14https://secrycloud.tech
  • 16. Splitting & Encrypting Files 16 File_Split2 Encrypt - DES File_Split3 Encrypt – RC4 File_Split1 Encrypt - AES File https://secrycloud.tech
  • 17. Decrypting & Merging File 17 File_Split1 File_Split2 File_Split3 Decrypt - AES Decrypt - DES Decrypt - RC4 Merge File https://secrycloud.tech
  • 21. Requirements  Front End – HTML ,CSS, jQuery  Backend – Python, MySQL  Framework – Django, Bootstrap4  Cloud Web server – AWS EC2  Cloud Database server – AWS RDS 21https://secrycloud.tech
  • 22. Implementation Phases 22 UI Development Splitting & Merging Encryption Decryption SteganographyDatabase Design Cloud Integration Deployment https://secrycloud.tech
  • 23. Database Tables 23 Field Type user_id varchar(10) PK username varchar(150) first_name varchar(30) last_name varchar(150) password varchar(128) email varchar(254) phone bigint(20) location varchar(30) Field Type file_id varchar(10) PK file_name varchar(50) file_size double file_key varchar(150) user_id varchar(10) FK Field Type store_i d varchar(150) PK content longblob Users File_Info File_Storage https://secrycloud.tech
  • 25. Implementation Algorithm split() 1. Get the file. 2. Store it in a temporary location. 3. Get the size of file and divide it by three. 4. Call FileSplit python library and pass file location, chunk size and destination location. 25https://secrycloud.tech
  • 26. Implementation (Cont.)  Cryptographic Algorithms  AES - Advanced Encryption Standard  Triple DES - Triple Data Encryption Standard  ARC4 - Alleged Rivest Cipher 4  Uses python Cryptography library to implement the hybrid cryptography  Steganography techniques to store cryptographic key.  Uses python stegano library to implement the LSB steganography technique. 26https://secrycloud.tech
  • 27. Implementation (Cont.)  Stegano library key hiding function  Stegano library key reveal function Algorithm join() 1. Get the file location. 2. Sort the files based on filename. 3. For each file write the contents of each file to output file. 4. Store the output file in temporary folder. 27https://secrycloud.tech
  • 28. Cloud database configuration – Database 1 28 Database Location : us-east-2(Ohio) AWS RDS configuration screenshot of database location us-east-2 https://secrycloud.tech
  • 29. Cloud database configuration – Database 2 29 Database Location : us-east-1(N-Virginia) AWS RDS configuration screenshot of database location us-east-1 https://secrycloud.tech
  • 30. Cloud database configuration – Database 3 30 Database Location : eu-west-1(Ireland) AWS RDS configuration screenshot of database location us-west-1 https://secrycloud.tech
  • 32. Conclusion  Information security is the main concern of todays world.  In order to achieve file security we proposes hybrid cryptography and storing files as shards.  We uses mainly three cryptographic algorithms to provide security.  Each shard is stored in sperate database server as blob.  Each file can be accessed using a key file which is a image that uses LSB steganography  In this project we only considered the text files only, in future work we can include more file types for securely storing. 32https://secrycloud.tech
  • 33. References 1. Punam V Maitri and Aruna Verma. “Secure file storage in cloud computing using hybrid cryptography algorithm”. In 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), pages 1635-1638. IEEE, 2016. 2. Mihir Manek, Aditi Chhadwa, Kinjal Shah, Manish Potey, and Mehvash Khan. “Cloud Oriented Distributed and Encrypted File Storage (CODE-FS)”. In 2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA),pages 1-5. IEEE, 2018. 3. Supriya Kute and SB Javheri. “Implementation of Secure File Storage on Cloud with Owner-Defined Attributes for Encryption”. In 2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA), pages 1{6. IEEE, 2018. 4. Ms Snehal Rathod, SA Ubale, and Sulabha S Apte. “Attribute-Based Encryption Along with Data Performance and Security on Cloud Storage”. In 2018 International Conference on Information, Communication, Engineering and Technology (ICICET), pages 1-3. IEEE, 2018. 5. https://docs.djangoproject.com/en/3.0/ 6. https://getbootstrap.com/docs/4.4/getting-started/introduction/ 7. https://medium.com/saarthi-ai/ec2apachedjango-838e3f6014ab 8. https://github.com/ALINBABU/SECRY 33https://secrycloud.tech