SlideShare a Scribd company logo
1 of 34
SECRY
SECURE FILE STORAGE ON CLOUD USING HYBRID CRYPTOGRAPHY
A project presentation on
PROJECT GUIDE
MRS. SOJA SALIM
ASSISTANT PROFESSOR,
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING.
SREE CHITRA THIRUNAL COLLEGE OF ENGINEERING
PROJECT TEAM
ALIN BABU (SCT15CS007)
AKSHAY P S (SCT16CS008)
RAHUL M (SCT16CS046)
2https://secrycloud.tech
Contents
3
 Introduction
 Problem Statement
 Literature Survey
 Existing System
 Proposed System
 System Architecture
 Activity Diagram & Use Case diagram
 Requirements
 ER Diagram & Database Tables
 Implementation
 Cloud Database Configuration
 Demonstration
 Conclusion
 References
https://secrycloud.tech
Introduction
 To store huge amount of data cloud computing is used now a days. We can
retrieve any data from cloud, when the user request for it.
 Many issues are faced while storing the data, the solution for these issues we
are using hybrid cryptography technique.
 In this system, we use three cryptography algorithm for providing block wise
security to the data.
 We store files as shards to different servers thus a single file is not stored at
one location.
4https://secrycloud.tech
Problem statement
In cloud the data is stored and handled by unknown servers, these servers
can be sometimes accessed by unauthorized persons thus leading to violation of
data integrity and security, and also user has no control over data when it is in cloud
in order to solve these issues we can store data in distributed manner in encrypted
format using hybrid cryptography.
5https://secrycloud.tech
Literature Survey
 IEEE WiSPNET 2016 conference paper on Secure File storage in Cloud
Computing using Hybrid Cryptography Algorithm by Punam V. Maitri and
Aruna Verma suggest the secure storage of file in cloud using hybrid
cryptography.
 The above mentioned paper proposes the way of splitting files into different parts
and then applying the hybrid cryptography for each part.
 The method uses LSB steganography method for storing keys and uses symmetric
cryptographic algorithm for encryption and decryption.
6https://secrycloud.tech
Literature Survey (Cont.)
 IEEE 2018 Fourth International Conference on Computing Communication Control and Automation on Cloud
Oriented Distributed and Encrypted File Storage (CODE-FS) by Mihir Manek, Kinjal Shah, Mehvash Khan,
Aditi Chhadwa and Manish Potey suggest the secure storage of file in distributed manner.
 The file is first encrypted and then uploaded to the server where it is divided into shards and these shards are
distributed over multiple cloud nodes.
 Each and every node contains only a single shard of a particular file of any format uploaded by user which
ensures that if any attack takes place no important data is compromised.
 The file transfer between all entities in the network will be end-to-end encrypted, thus ensuring that no entity
will get access to sensitive information.
 In this method only single algorithm is used and only after encryption the file is divided into shards and stored
7https://secrycloud.tech
Literature Survey (Cont.)
 IEEE 2018 Fourth International Conference on Computing Communication Control
and Automation on Implementation of Secure File Storage on Cloud with owner-
defined Attributes for Encryption by Ms. Supriya Kute and Prof. S. B. Javheri
proposed the method storing file with encryption and attributes defined by file owner.
 The paper proposes the method storing file along with owner defined attributes and
encryption algorithm.
 The file decrypted using the attributes defined by owner and key thus ensuring
security.
 The problem in this method was that if a user who knows the attributes can decrypt
the file easily.
8https://secrycloud.tech
Literature Survey (Cont.)
 2018 International Conference on Information, Communication, Engineering and
Technology on Attribute-Based Encryption Along with Data Performance and
Security on Cloud Storage by Ms. Snehal Rathod, S. A. Ubale and Sulabha S. Apte
proposed the method storing file with attribute based encryption.
 The paper proposes the Hybrid Encryption using Cipher-text Policy Attribute with
Verifiable Delegation method.
 The proposed system, fuse with verifiable computation such as hybrid encryption,
key generation, transformation, verify decryption, the data security and hence the
correctness of the delegated computing results are well secured at a same time.
9
https://secrycloud.tech
Existing System
 In order to store, handle and calculate numerous data, the cloud servers are being used. Large
number of applications moves on to cloud computing platforms which has to be handled.
 In existing system single algorithm is used for data encrypt and decrypt purpose. But use of
single algorithm is not accomplishable for high level security.
 If we use public key cryptography algorithm than we have to face security problem for storing
public key.
 Key transmission problem occur while sharing key into multiuser environment. Public key
cryptography algorithms accomplish high security but maximum delay is needed for data
encrypt and decrypt.
10https://secrycloud.tech
Proposed System
 In our system cloud owner upload the data on cloud server. To enhance security of file in
cloud computing source file is break into different parts.
 Every part of file is encrypted using each encryption algorithm. Encrypted file is stored
on cloud database server.
 Each part of file is stored in different cloud database server. Each and every cloud server
contains only a single part of a particular file of any format uploaded by user which
ensures that if any attack takes place no important data is compromised.
11https://secrycloud.tech
Proposed System (Cont.)
 The file transfer between all entities in the network will be end-to-end encrypted, thus
ensuring that no entity will get access to sensitive information. Moreover, the servers
storing the parts doesn’t contain any info of which part of the file is stored.
 Parts of the same file will not be stored on same server location, thus preventing the
attacker from guessing the location of other parts.
 The files that are selected for upload by the user will be encrypted at the client side
before uploading and will be decrypted after the user downloads it, with the user’s key
12https://secrycloud.tech
Proposed v/s Existing System
13
Encryption time Comparison
with
AES and Proposed System
Decryption time Comparison
with
AES and Proposed System
Encryption Time Comparison with
Blowfish and Proposed System
Decryption Time Comparison with
Blowfish and Proposed Systemhttps://secrycloud.tech
Project Objective
 Providing more secure cloud storage.
 Cost and time efficient.
 Increase data integrity and confidentiality.
 Eliminate third party access.
 Provide Authentication.
14https://secrycloud.tech
System Architecture
15https://secrycloud.tech
Splitting & Encrypting Files
16
File_Split2
Encrypt - DES
File_Split3
Encrypt – RC4
File_Split1
Encrypt - AES
File
https://secrycloud.tech
Decrypting & Merging File
17
File_Split1 File_Split2 File_Split3
Decrypt -
AES
Decrypt -
DES
Decrypt -
RC4
Merge
File
https://secrycloud.tech
Activity Diagram-Upload
18https://secrycloud.tech
Activity Diagram-Download
19https://secrycloud.tech
Use case Diagram
20https://secrycloud.tech
Requirements
 Front End – HTML ,CSS, jQuery
 Backend – Python, MySQL
 Framework – Django, Bootstrap4
 Cloud Web server – AWS EC2
 Cloud Database server – AWS RDS
21https://secrycloud.tech
Implementation Phases
22
UI
Development
Splitting &
Merging
Encryption Decryption
SteganographyDatabase
Design
Cloud
Integration
Deployment
https://secrycloud.tech
Database Tables
23
Field Type
user_id varchar(10) PK
username varchar(150)
first_name varchar(30)
last_name varchar(150)
password varchar(128)
email varchar(254)
phone bigint(20)
location varchar(30)
Field Type
file_id varchar(10) PK
file_name varchar(50)
file_size double
file_key varchar(150)
user_id
varchar(10)
FK
Field Type
store_i
d
varchar(150)
PK
content longblob
Users
File_Info
File_Storage
https://secrycloud.tech
ER Diagram
24https://secrycloud.tech
Implementation
Algorithm split()
1. Get the file.
2. Store it in a temporary location.
3. Get the size of file and divide it by three.
4. Call FileSplit python library and pass file location, chunk size and
destination location.
25https://secrycloud.tech
Implementation (Cont.)
 Cryptographic Algorithms
 AES - Advanced Encryption Standard
 Triple DES - Triple Data Encryption Standard
 ARC4 - Alleged Rivest Cipher 4
 Uses python Cryptography library to implement the hybrid cryptography
 Steganography techniques to store cryptographic key.
 Uses python stegano library to implement the LSB steganography technique.
26https://secrycloud.tech
Implementation (Cont.)
 Stegano library key hiding function
 Stegano library key reveal function
Algorithm join()
1. Get the file location.
2. Sort the files based on filename.
3. For each file write the contents of each file to output file.
4. Store the output file in temporary folder.
27https://secrycloud.tech
Cloud database configuration – Database 1
28
Database Location : us-east-2(Ohio)
AWS RDS configuration screenshot of database location us-east-2
https://secrycloud.tech
Cloud database configuration – Database 2
29
Database Location : us-east-1(N-Virginia)
AWS RDS configuration screenshot of database location us-east-1
https://secrycloud.tech
Cloud database configuration – Database 3
30
Database Location : eu-west-1(Ireland)
AWS RDS configuration screenshot of database location us-west-1
https://secrycloud.tech
Demonstration
31https://secrycloud.tech
https://drive.google.com/file/d/1GS1_mdcnaYZtc76CQ6RZZqt_907DT5Kd/view?usp=sharin
g
Conclusion
 Information security is the main concern of todays world.
 In order to achieve file security we proposes hybrid cryptography and storing files as
shards.
 We uses mainly three cryptographic algorithms to provide security.
 Each shard is stored in sperate database server as blob.
 Each file can be accessed using a key file which is a image that uses LSB
steganography
 In this project we only considered the text files only, in future work we can include
more file types for securely storing.
32https://secrycloud.tech
References
1. Punam V Maitri and Aruna Verma. “Secure file storage in cloud computing using hybrid cryptography
algorithm”. In 2016 International Conference on Wireless Communications, Signal Processing and
Networking (WiSPNET), pages 1635-1638. IEEE, 2016.
2. Mihir Manek, Aditi Chhadwa, Kinjal Shah, Manish Potey, and Mehvash Khan. “Cloud Oriented Distributed
and Encrypted File Storage (CODE-FS)”. In 2018 Fourth International Conference on Computing
Communication Control and Automation (ICCUBEA),pages 1-5. IEEE, 2018.
3. Supriya Kute and SB Javheri. “Implementation of Secure File Storage on Cloud with Owner-Defined
Attributes for Encryption”. In 2018 Fourth International Conference on Computing Communication
Control and Automation (ICCUBEA), pages 1{6. IEEE, 2018.
4. Ms Snehal Rathod, SA Ubale, and Sulabha S Apte. “Attribute-Based Encryption Along with Data
Performance and Security on Cloud Storage”. In 2018 International Conference on Information,
Communication, Engineering and Technology (ICICET), pages 1-3. IEEE, 2018.
5. https://docs.djangoproject.com/en/3.0/
6. https://getbootstrap.com/docs/4.4/getting-started/introduction/
7. https://medium.com/saarthi-ai/ec2apachedjango-838e3f6014ab
8. https://github.com/ALINBABU/SECRY
33https://secrycloud.tech
34https://secrycloud.tech

More Related Content

What's hot

Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securitypatisa
 
Security in distributed systems
Security in distributed systems Security in distributed systems
Security in distributed systems Haitham Ahmed
 
Cia security model
Cia security modelCia security model
Cia security modelImran Ahmed
 
Network security & cryptography full notes
Network security & cryptography full notesNetwork security & cryptography full notes
Network security & cryptography full notesgangadhar9989166446
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptxchWaqasZahid
 
Password strength svm
Password strength svmPassword strength svm
Password strength svmSunil Rm
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network SecurityJohn Ely Masculino
 
Security Mechanisms
Security MechanismsSecurity Mechanisms
Security Mechanismspriya_trehan
 
Steganography
Steganography Steganography
Steganography Uttam Jain
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On SteganographyTeachMission
 
Image steganography
Image steganographyImage steganography
Image steganographyvaidya_sanyu
 
06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - Notes06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - NotesKranthi
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket LayerNaveen Kumar
 
Mini Project on Data Encryption & Decryption in JAVA
Mini Project on Data Encryption & Decryption in JAVAMini Project on Data Encryption & Decryption in JAVA
Mini Project on Data Encryption & Decryption in JAVAchovatiyabhautik
 

What's hot (20)

Cloud Encryption
Cloud EncryptionCloud Encryption
Cloud Encryption
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Email security
Email securityEmail security
Email security
 
Security in distributed systems
Security in distributed systems Security in distributed systems
Security in distributed systems
 
Cia security model
Cia security modelCia security model
Cia security model
 
Network security & cryptography full notes
Network security & cryptography full notesNetwork security & cryptography full notes
Network security & cryptography full notes
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
Password strength svm
Password strength svmPassword strength svm
Password strength svm
 
Seminar ppt fog comp
Seminar ppt fog compSeminar ppt fog comp
Seminar ppt fog comp
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Security Mechanisms
Security MechanismsSecurity Mechanisms
Security Mechanisms
 
Steganography
Steganography Steganography
Steganography
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
 
Image steganography
Image steganographyImage steganography
Image steganography
 
Email security
Email securityEmail security
Email security
 
06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - Notes06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - Notes
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Mini Project on Data Encryption & Decryption in JAVA
Mini Project on Data Encryption & Decryption in JAVAMini Project on Data Encryption & Decryption in JAVA
Mini Project on Data Encryption & Decryption in JAVA
 
Authentication techniques
Authentication techniquesAuthentication techniques
Authentication techniques
 

Similar to SECRY - Secure file storage on cloud using hybrid cryptography

IRJET- A Survey on File Storage and Retrieval using Blockchain Technology
IRJET- A Survey on File Storage and Retrieval using Blockchain TechnologyIRJET- A Survey on File Storage and Retrieval using Blockchain Technology
IRJET- A Survey on File Storage and Retrieval using Blockchain TechnologyIRJET Journal
 
Implementation of De-Duplication Algorithm
Implementation of De-Duplication AlgorithmImplementation of De-Duplication Algorithm
Implementation of De-Duplication AlgorithmIRJET Journal
 
Secry poster
Secry posterSecry poster
Secry posterALIN BABU
 
Multi-part Dynamic Key Generation For Secure Data Encryption
Multi-part Dynamic Key Generation For Secure Data EncryptionMulti-part Dynamic Key Generation For Secure Data Encryption
Multi-part Dynamic Key Generation For Secure Data EncryptionCSCJournals
 
Providing Secure Cloud for College Campus
Providing Secure Cloud for College CampusProviding Secure Cloud for College Campus
Providing Secure Cloud for College Campusvivatechijri
 
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET Journal
 
Paper id 712019116
Paper id 712019116Paper id 712019116
Paper id 712019116IJRAT
 
Paper id 27201448
Paper id 27201448Paper id 27201448
Paper id 27201448IJRAT
 
Secured Authorized Deduplication Based Hybrid Cloud
Secured Authorized Deduplication Based Hybrid CloudSecured Authorized Deduplication Based Hybrid Cloud
Secured Authorized Deduplication Based Hybrid Cloudtheijes
 
E031102034039
E031102034039E031102034039
E031102034039theijes
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET Journal
 
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET -  	  Multi Authority based Integrity Auditing and Proof of Storage wit...IRJET -  	  Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...IRJET Journal
 
The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...Kimberly Thomas
 
IRJET - A Secure Access Policies based on Data Deduplication System
IRJET - A Secure Access Policies based on Data Deduplication SystemIRJET - A Secure Access Policies based on Data Deduplication System
IRJET - A Secure Access Policies based on Data Deduplication SystemIRJET Journal
 
Improving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudIJTET Journal
 
A Novel Approach for Data Security in Cloud Environment
A Novel Approach for Data Security in  Cloud EnvironmentA Novel Approach for Data Security in  Cloud Environment
A Novel Approach for Data Security in Cloud EnvironmentSHREYASSRINATH94
 
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...dbpublications
 
Improving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using HadoopImproving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using HadoopIJERA Editor
 
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud ComputingSecurely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud ComputingIJERA Editor
 
Data Sharing: Ensure Accountability Distribution in the Cloud
Data Sharing: Ensure Accountability Distribution in the CloudData Sharing: Ensure Accountability Distribution in the Cloud
Data Sharing: Ensure Accountability Distribution in the CloudSuraj Mehta
 

Similar to SECRY - Secure file storage on cloud using hybrid cryptography (20)

IRJET- A Survey on File Storage and Retrieval using Blockchain Technology
IRJET- A Survey on File Storage and Retrieval using Blockchain TechnologyIRJET- A Survey on File Storage and Retrieval using Blockchain Technology
IRJET- A Survey on File Storage and Retrieval using Blockchain Technology
 
Implementation of De-Duplication Algorithm
Implementation of De-Duplication AlgorithmImplementation of De-Duplication Algorithm
Implementation of De-Duplication Algorithm
 
Secry poster
Secry posterSecry poster
Secry poster
 
Multi-part Dynamic Key Generation For Secure Data Encryption
Multi-part Dynamic Key Generation For Secure Data EncryptionMulti-part Dynamic Key Generation For Secure Data Encryption
Multi-part Dynamic Key Generation For Secure Data Encryption
 
Providing Secure Cloud for College Campus
Providing Secure Cloud for College CampusProviding Secure Cloud for College Campus
Providing Secure Cloud for College Campus
 
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud Computing
 
Paper id 712019116
Paper id 712019116Paper id 712019116
Paper id 712019116
 
Paper id 27201448
Paper id 27201448Paper id 27201448
Paper id 27201448
 
Secured Authorized Deduplication Based Hybrid Cloud
Secured Authorized Deduplication Based Hybrid CloudSecured Authorized Deduplication Based Hybrid Cloud
Secured Authorized Deduplication Based Hybrid Cloud
 
E031102034039
E031102034039E031102034039
E031102034039
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
 
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET -  	  Multi Authority based Integrity Auditing and Proof of Storage wit...IRJET -  	  Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
 
The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...
 
IRJET - A Secure Access Policies based on Data Deduplication System
IRJET - A Secure Access Policies based on Data Deduplication SystemIRJET - A Secure Access Policies based on Data Deduplication System
IRJET - A Secure Access Policies based on Data Deduplication System
 
Improving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-Cloud
 
A Novel Approach for Data Security in Cloud Environment
A Novel Approach for Data Security in  Cloud EnvironmentA Novel Approach for Data Security in  Cloud Environment
A Novel Approach for Data Security in Cloud Environment
 
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
 
Improving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using HadoopImproving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using Hadoop
 
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud ComputingSecurely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
 
Data Sharing: Ensure Accountability Distribution in the Cloud
Data Sharing: Ensure Accountability Distribution in the CloudData Sharing: Ensure Accountability Distribution in the Cloud
Data Sharing: Ensure Accountability Distribution in the Cloud
 

More from ALIN BABU

Project final report
Project final reportProject final report
Project final reportALIN BABU
 
Secure Cloud Storage
Secure Cloud StorageSecure Cloud Storage
Secure Cloud StorageALIN BABU
 
Prediciting restaurant and popularity based on Yelp Dataset project report
Prediciting restaurant and popularity based on Yelp Dataset  project reportPrediciting restaurant and popularity based on Yelp Dataset  project report
Prediciting restaurant and popularity based on Yelp Dataset project reportALIN BABU
 
Prediciting restaurant and popularity based on Yelp Dataset - 2
Prediciting restaurant and popularity based on Yelp Dataset - 2Prediciting restaurant and popularity based on Yelp Dataset - 2
Prediciting restaurant and popularity based on Yelp Dataset - 2ALIN BABU
 
Prediciting restaurant and popularity based on Yelp Dataset - 1
Prediciting restaurant and popularity based on Yelp Dataset - 1Prediciting restaurant and popularity based on Yelp Dataset - 1
Prediciting restaurant and popularity based on Yelp Dataset - 1ALIN BABU
 
Secure cloud storage
Secure cloud storageSecure cloud storage
Secure cloud storageALIN BABU
 

More from ALIN BABU (8)

Project final report
Project final reportProject final report
Project final report
 
Secure Cloud Storage
Secure Cloud StorageSecure Cloud Storage
Secure Cloud Storage
 
Prediciting restaurant and popularity based on Yelp Dataset project report
Prediciting restaurant and popularity based on Yelp Dataset  project reportPrediciting restaurant and popularity based on Yelp Dataset  project report
Prediciting restaurant and popularity based on Yelp Dataset project report
 
Prediciting restaurant and popularity based on Yelp Dataset - 2
Prediciting restaurant and popularity based on Yelp Dataset - 2Prediciting restaurant and popularity based on Yelp Dataset - 2
Prediciting restaurant and popularity based on Yelp Dataset - 2
 
Prediciting restaurant and popularity based on Yelp Dataset - 1
Prediciting restaurant and popularity based on Yelp Dataset - 1Prediciting restaurant and popularity based on Yelp Dataset - 1
Prediciting restaurant and popularity based on Yelp Dataset - 1
 
Secure cloud storage
Secure cloud storageSecure cloud storage
Secure cloud storage
 
iPhone
iPhoneiPhone
iPhone
 
Report
ReportReport
Report
 

Recently uploaded

VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoordharasingh5698
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01KreezheaRecto
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Standamitlee9823
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxJuliansyahHarahap1
 

Recently uploaded (20)

VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 

SECRY - Secure file storage on cloud using hybrid cryptography

  • 1. SECRY SECURE FILE STORAGE ON CLOUD USING HYBRID CRYPTOGRAPHY A project presentation on
  • 2. PROJECT GUIDE MRS. SOJA SALIM ASSISTANT PROFESSOR, DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. SREE CHITRA THIRUNAL COLLEGE OF ENGINEERING PROJECT TEAM ALIN BABU (SCT15CS007) AKSHAY P S (SCT16CS008) RAHUL M (SCT16CS046) 2https://secrycloud.tech
  • 3. Contents 3  Introduction  Problem Statement  Literature Survey  Existing System  Proposed System  System Architecture  Activity Diagram & Use Case diagram  Requirements  ER Diagram & Database Tables  Implementation  Cloud Database Configuration  Demonstration  Conclusion  References https://secrycloud.tech
  • 4. Introduction  To store huge amount of data cloud computing is used now a days. We can retrieve any data from cloud, when the user request for it.  Many issues are faced while storing the data, the solution for these issues we are using hybrid cryptography technique.  In this system, we use three cryptography algorithm for providing block wise security to the data.  We store files as shards to different servers thus a single file is not stored at one location. 4https://secrycloud.tech
  • 5. Problem statement In cloud the data is stored and handled by unknown servers, these servers can be sometimes accessed by unauthorized persons thus leading to violation of data integrity and security, and also user has no control over data when it is in cloud in order to solve these issues we can store data in distributed manner in encrypted format using hybrid cryptography. 5https://secrycloud.tech
  • 6. Literature Survey  IEEE WiSPNET 2016 conference paper on Secure File storage in Cloud Computing using Hybrid Cryptography Algorithm by Punam V. Maitri and Aruna Verma suggest the secure storage of file in cloud using hybrid cryptography.  The above mentioned paper proposes the way of splitting files into different parts and then applying the hybrid cryptography for each part.  The method uses LSB steganography method for storing keys and uses symmetric cryptographic algorithm for encryption and decryption. 6https://secrycloud.tech
  • 7. Literature Survey (Cont.)  IEEE 2018 Fourth International Conference on Computing Communication Control and Automation on Cloud Oriented Distributed and Encrypted File Storage (CODE-FS) by Mihir Manek, Kinjal Shah, Mehvash Khan, Aditi Chhadwa and Manish Potey suggest the secure storage of file in distributed manner.  The file is first encrypted and then uploaded to the server where it is divided into shards and these shards are distributed over multiple cloud nodes.  Each and every node contains only a single shard of a particular file of any format uploaded by user which ensures that if any attack takes place no important data is compromised.  The file transfer between all entities in the network will be end-to-end encrypted, thus ensuring that no entity will get access to sensitive information.  In this method only single algorithm is used and only after encryption the file is divided into shards and stored 7https://secrycloud.tech
  • 8. Literature Survey (Cont.)  IEEE 2018 Fourth International Conference on Computing Communication Control and Automation on Implementation of Secure File Storage on Cloud with owner- defined Attributes for Encryption by Ms. Supriya Kute and Prof. S. B. Javheri proposed the method storing file with encryption and attributes defined by file owner.  The paper proposes the method storing file along with owner defined attributes and encryption algorithm.  The file decrypted using the attributes defined by owner and key thus ensuring security.  The problem in this method was that if a user who knows the attributes can decrypt the file easily. 8https://secrycloud.tech
  • 9. Literature Survey (Cont.)  2018 International Conference on Information, Communication, Engineering and Technology on Attribute-Based Encryption Along with Data Performance and Security on Cloud Storage by Ms. Snehal Rathod, S. A. Ubale and Sulabha S. Apte proposed the method storing file with attribute based encryption.  The paper proposes the Hybrid Encryption using Cipher-text Policy Attribute with Verifiable Delegation method.  The proposed system, fuse with verifiable computation such as hybrid encryption, key generation, transformation, verify decryption, the data security and hence the correctness of the delegated computing results are well secured at a same time. 9 https://secrycloud.tech
  • 10. Existing System  In order to store, handle and calculate numerous data, the cloud servers are being used. Large number of applications moves on to cloud computing platforms which has to be handled.  In existing system single algorithm is used for data encrypt and decrypt purpose. But use of single algorithm is not accomplishable for high level security.  If we use public key cryptography algorithm than we have to face security problem for storing public key.  Key transmission problem occur while sharing key into multiuser environment. Public key cryptography algorithms accomplish high security but maximum delay is needed for data encrypt and decrypt. 10https://secrycloud.tech
  • 11. Proposed System  In our system cloud owner upload the data on cloud server. To enhance security of file in cloud computing source file is break into different parts.  Every part of file is encrypted using each encryption algorithm. Encrypted file is stored on cloud database server.  Each part of file is stored in different cloud database server. Each and every cloud server contains only a single part of a particular file of any format uploaded by user which ensures that if any attack takes place no important data is compromised. 11https://secrycloud.tech
  • 12. Proposed System (Cont.)  The file transfer between all entities in the network will be end-to-end encrypted, thus ensuring that no entity will get access to sensitive information. Moreover, the servers storing the parts doesn’t contain any info of which part of the file is stored.  Parts of the same file will not be stored on same server location, thus preventing the attacker from guessing the location of other parts.  The files that are selected for upload by the user will be encrypted at the client side before uploading and will be decrypted after the user downloads it, with the user’s key 12https://secrycloud.tech
  • 13. Proposed v/s Existing System 13 Encryption time Comparison with AES and Proposed System Decryption time Comparison with AES and Proposed System Encryption Time Comparison with Blowfish and Proposed System Decryption Time Comparison with Blowfish and Proposed Systemhttps://secrycloud.tech
  • 14. Project Objective  Providing more secure cloud storage.  Cost and time efficient.  Increase data integrity and confidentiality.  Eliminate third party access.  Provide Authentication. 14https://secrycloud.tech
  • 16. Splitting & Encrypting Files 16 File_Split2 Encrypt - DES File_Split3 Encrypt – RC4 File_Split1 Encrypt - AES File https://secrycloud.tech
  • 17. Decrypting & Merging File 17 File_Split1 File_Split2 File_Split3 Decrypt - AES Decrypt - DES Decrypt - RC4 Merge File https://secrycloud.tech
  • 21. Requirements  Front End – HTML ,CSS, jQuery  Backend – Python, MySQL  Framework – Django, Bootstrap4  Cloud Web server – AWS EC2  Cloud Database server – AWS RDS 21https://secrycloud.tech
  • 22. Implementation Phases 22 UI Development Splitting & Merging Encryption Decryption SteganographyDatabase Design Cloud Integration Deployment https://secrycloud.tech
  • 23. Database Tables 23 Field Type user_id varchar(10) PK username varchar(150) first_name varchar(30) last_name varchar(150) password varchar(128) email varchar(254) phone bigint(20) location varchar(30) Field Type file_id varchar(10) PK file_name varchar(50) file_size double file_key varchar(150) user_id varchar(10) FK Field Type store_i d varchar(150) PK content longblob Users File_Info File_Storage https://secrycloud.tech
  • 25. Implementation Algorithm split() 1. Get the file. 2. Store it in a temporary location. 3. Get the size of file and divide it by three. 4. Call FileSplit python library and pass file location, chunk size and destination location. 25https://secrycloud.tech
  • 26. Implementation (Cont.)  Cryptographic Algorithms  AES - Advanced Encryption Standard  Triple DES - Triple Data Encryption Standard  ARC4 - Alleged Rivest Cipher 4  Uses python Cryptography library to implement the hybrid cryptography  Steganography techniques to store cryptographic key.  Uses python stegano library to implement the LSB steganography technique. 26https://secrycloud.tech
  • 27. Implementation (Cont.)  Stegano library key hiding function  Stegano library key reveal function Algorithm join() 1. Get the file location. 2. Sort the files based on filename. 3. For each file write the contents of each file to output file. 4. Store the output file in temporary folder. 27https://secrycloud.tech
  • 28. Cloud database configuration – Database 1 28 Database Location : us-east-2(Ohio) AWS RDS configuration screenshot of database location us-east-2 https://secrycloud.tech
  • 29. Cloud database configuration – Database 2 29 Database Location : us-east-1(N-Virginia) AWS RDS configuration screenshot of database location us-east-1 https://secrycloud.tech
  • 30. Cloud database configuration – Database 3 30 Database Location : eu-west-1(Ireland) AWS RDS configuration screenshot of database location us-west-1 https://secrycloud.tech
  • 32. Conclusion  Information security is the main concern of todays world.  In order to achieve file security we proposes hybrid cryptography and storing files as shards.  We uses mainly three cryptographic algorithms to provide security.  Each shard is stored in sperate database server as blob.  Each file can be accessed using a key file which is a image that uses LSB steganography  In this project we only considered the text files only, in future work we can include more file types for securely storing. 32https://secrycloud.tech
  • 33. References 1. Punam V Maitri and Aruna Verma. “Secure file storage in cloud computing using hybrid cryptography algorithm”. In 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), pages 1635-1638. IEEE, 2016. 2. Mihir Manek, Aditi Chhadwa, Kinjal Shah, Manish Potey, and Mehvash Khan. “Cloud Oriented Distributed and Encrypted File Storage (CODE-FS)”. In 2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA),pages 1-5. IEEE, 2018. 3. Supriya Kute and SB Javheri. “Implementation of Secure File Storage on Cloud with Owner-Defined Attributes for Encryption”. In 2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA), pages 1{6. IEEE, 2018. 4. Ms Snehal Rathod, SA Ubale, and Sulabha S Apte. “Attribute-Based Encryption Along with Data Performance and Security on Cloud Storage”. In 2018 International Conference on Information, Communication, Engineering and Technology (ICICET), pages 1-3. IEEE, 2018. 5. https://docs.djangoproject.com/en/3.0/ 6. https://getbootstrap.com/docs/4.4/getting-started/introduction/ 7. https://medium.com/saarthi-ai/ec2apachedjango-838e3f6014ab 8. https://github.com/ALINBABU/SECRY 33https://secrycloud.tech