Final project presentation of Final year B.tech CSE Project APJ Abdul Kalam Technological University.
About the project
Cloud computing has now become a major trend, it is a new data hosting technology that is very popular in recent years. In this project, we are developing an web application that can securely store the files to a cloud server. We proposes a system that uses hybrid cryptography technique to securely store the data in cloud. The hybrid approach when deployed in cloud environment makes the remote server more secure and thus, helps the users to fetch more trust of their data in the cloud. For data security and privacy protection issues, the fundamental challenge of separation of sensitive data and access control is fulfilled. Cryptography technique translates original data into unreadable format. This technique uses keys for translate data into unreadable form. So only authorized person can access data from cloud server.
We provide a cloud storage that uses multiple crypotraphic technique which is known by hybrid cryptography. The product provides confidentiality by using security for both upload and download. The data will be secured since we use multi level security techniques and multiple servers for storage.
2. PROJECT GUIDE
MRS. SOJA SALIM
ASSISTANT PROFESSOR,
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING.
SREE CHITRA THIRUNAL COLLEGE OF ENGINEERING
PROJECT TEAM
ALIN BABU (SCT15CS007)
AKSHAY P S (SCT16CS008)
RAHUL M (SCT16CS046)
2https://secrycloud.tech
3. Contents
3
Introduction
Problem Statement
Literature Survey
Existing System
Proposed System
System Architecture
Activity Diagram & Use Case diagram
Requirements
ER Diagram & Database Tables
Implementation
Cloud Database Configuration
Demonstration
Conclusion
References
https://secrycloud.tech
4. Introduction
To store huge amount of data cloud computing is used now a days. We can
retrieve any data from cloud, when the user request for it.
Many issues are faced while storing the data, the solution for these issues we
are using hybrid cryptography technique.
In this system, we use three cryptography algorithm for providing block wise
security to the data.
We store files as shards to different servers thus a single file is not stored at
one location.
4https://secrycloud.tech
5. Problem statement
In cloud the data is stored and handled by unknown servers, these servers
can be sometimes accessed by unauthorized persons thus leading to violation of
data integrity and security, and also user has no control over data when it is in cloud
in order to solve these issues we can store data in distributed manner in encrypted
format using hybrid cryptography.
5https://secrycloud.tech
6. Literature Survey
IEEE WiSPNET 2016 conference paper on Secure File storage in Cloud
Computing using Hybrid Cryptography Algorithm by Punam V. Maitri and
Aruna Verma suggest the secure storage of file in cloud using hybrid
cryptography.
The above mentioned paper proposes the way of splitting files into different parts
and then applying the hybrid cryptography for each part.
The method uses LSB steganography method for storing keys and uses symmetric
cryptographic algorithm for encryption and decryption.
6https://secrycloud.tech
7. Literature Survey (Cont.)
IEEE 2018 Fourth International Conference on Computing Communication Control and Automation on Cloud
Oriented Distributed and Encrypted File Storage (CODE-FS) by Mihir Manek, Kinjal Shah, Mehvash Khan,
Aditi Chhadwa and Manish Potey suggest the secure storage of file in distributed manner.
The file is first encrypted and then uploaded to the server where it is divided into shards and these shards are
distributed over multiple cloud nodes.
Each and every node contains only a single shard of a particular file of any format uploaded by user which
ensures that if any attack takes place no important data is compromised.
The file transfer between all entities in the network will be end-to-end encrypted, thus ensuring that no entity
will get access to sensitive information.
In this method only single algorithm is used and only after encryption the file is divided into shards and stored
7https://secrycloud.tech
8. Literature Survey (Cont.)
IEEE 2018 Fourth International Conference on Computing Communication Control
and Automation on Implementation of Secure File Storage on Cloud with owner-
defined Attributes for Encryption by Ms. Supriya Kute and Prof. S. B. Javheri
proposed the method storing file with encryption and attributes defined by file owner.
The paper proposes the method storing file along with owner defined attributes and
encryption algorithm.
The file decrypted using the attributes defined by owner and key thus ensuring
security.
The problem in this method was that if a user who knows the attributes can decrypt
the file easily.
8https://secrycloud.tech
9. Literature Survey (Cont.)
2018 International Conference on Information, Communication, Engineering and
Technology on Attribute-Based Encryption Along with Data Performance and
Security on Cloud Storage by Ms. Snehal Rathod, S. A. Ubale and Sulabha S. Apte
proposed the method storing file with attribute based encryption.
The paper proposes the Hybrid Encryption using Cipher-text Policy Attribute with
Verifiable Delegation method.
The proposed system, fuse with verifiable computation such as hybrid encryption,
key generation, transformation, verify decryption, the data security and hence the
correctness of the delegated computing results are well secured at a same time.
9
https://secrycloud.tech
10. Existing System
In order to store, handle and calculate numerous data, the cloud servers are being used. Large
number of applications moves on to cloud computing platforms which has to be handled.
In existing system single algorithm is used for data encrypt and decrypt purpose. But use of
single algorithm is not accomplishable for high level security.
If we use public key cryptography algorithm than we have to face security problem for storing
public key.
Key transmission problem occur while sharing key into multiuser environment. Public key
cryptography algorithms accomplish high security but maximum delay is needed for data
encrypt and decrypt.
10https://secrycloud.tech
11. Proposed System
In our system cloud owner upload the data on cloud server. To enhance security of file in
cloud computing source file is break into different parts.
Every part of file is encrypted using each encryption algorithm. Encrypted file is stored
on cloud database server.
Each part of file is stored in different cloud database server. Each and every cloud server
contains only a single part of a particular file of any format uploaded by user which
ensures that if any attack takes place no important data is compromised.
11https://secrycloud.tech
12. Proposed System (Cont.)
The file transfer between all entities in the network will be end-to-end encrypted, thus
ensuring that no entity will get access to sensitive information. Moreover, the servers
storing the parts doesn’t contain any info of which part of the file is stored.
Parts of the same file will not be stored on same server location, thus preventing the
attacker from guessing the location of other parts.
The files that are selected for upload by the user will be encrypted at the client side
before uploading and will be decrypted after the user downloads it, with the user’s key
12https://secrycloud.tech
13. Proposed v/s Existing System
13
Encryption time Comparison
with
AES and Proposed System
Decryption time Comparison
with
AES and Proposed System
Encryption Time Comparison with
Blowfish and Proposed System
Decryption Time Comparison with
Blowfish and Proposed Systemhttps://secrycloud.tech
14. Project Objective
Providing more secure cloud storage.
Cost and time efficient.
Increase data integrity and confidentiality.
Eliminate third party access.
Provide Authentication.
14https://secrycloud.tech
21. Requirements
Front End – HTML ,CSS, jQuery
Backend – Python, MySQL
Framework – Django, Bootstrap4
Cloud Web server – AWS EC2
Cloud Database server – AWS RDS
21https://secrycloud.tech
25. Implementation
Algorithm split()
1. Get the file.
2. Store it in a temporary location.
3. Get the size of file and divide it by three.
4. Call FileSplit python library and pass file location, chunk size and
destination location.
25https://secrycloud.tech
26. Implementation (Cont.)
Cryptographic Algorithms
AES - Advanced Encryption Standard
Triple DES - Triple Data Encryption Standard
ARC4 - Alleged Rivest Cipher 4
Uses python Cryptography library to implement the hybrid cryptography
Steganography techniques to store cryptographic key.
Uses python stegano library to implement the LSB steganography technique.
26https://secrycloud.tech
27. Implementation (Cont.)
Stegano library key hiding function
Stegano library key reveal function
Algorithm join()
1. Get the file location.
2. Sort the files based on filename.
3. For each file write the contents of each file to output file.
4. Store the output file in temporary folder.
27https://secrycloud.tech
32. Conclusion
Information security is the main concern of todays world.
In order to achieve file security we proposes hybrid cryptography and storing files as
shards.
We uses mainly three cryptographic algorithms to provide security.
Each shard is stored in sperate database server as blob.
Each file can be accessed using a key file which is a image that uses LSB
steganography
In this project we only considered the text files only, in future work we can include
more file types for securely storing.
32https://secrycloud.tech
33. References
1. Punam V Maitri and Aruna Verma. “Secure file storage in cloud computing using hybrid cryptography
algorithm”. In 2016 International Conference on Wireless Communications, Signal Processing and
Networking (WiSPNET), pages 1635-1638. IEEE, 2016.
2. Mihir Manek, Aditi Chhadwa, Kinjal Shah, Manish Potey, and Mehvash Khan. “Cloud Oriented Distributed
and Encrypted File Storage (CODE-FS)”. In 2018 Fourth International Conference on Computing
Communication Control and Automation (ICCUBEA),pages 1-5. IEEE, 2018.
3. Supriya Kute and SB Javheri. “Implementation of Secure File Storage on Cloud with Owner-Defined
Attributes for Encryption”. In 2018 Fourth International Conference on Computing Communication
Control and Automation (ICCUBEA), pages 1{6. IEEE, 2018.
4. Ms Snehal Rathod, SA Ubale, and Sulabha S Apte. “Attribute-Based Encryption Along with Data
Performance and Security on Cloud Storage”. In 2018 International Conference on Information,
Communication, Engineering and Technology (ICICET), pages 1-3. IEEE, 2018.
5. https://docs.djangoproject.com/en/3.0/
6. https://getbootstrap.com/docs/4.4/getting-started/introduction/
7. https://medium.com/saarthi-ai/ec2apachedjango-838e3f6014ab
8. https://github.com/ALINBABU/SECRY
33https://secrycloud.tech