You are on page 1of 17

iTWIN TECHNOLOGY

Seminar Report submitted in partial fulfillment for the award of the degree of

BACHELOR OF TECHNOLOGY

By

B.JAGADEESH (17UECS0098)
S.VINAY KUMAR (17UECS0740)
L.MANI TEJA (17UECS0397)

Under the guidance of

Mr.S.N.Manoharan M.E,
ASSISTANT PROFESSOR

.0

DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING


SCHOOL OF COMPUTING

VEL TECH RANGARAJAN Dr. SAGUNTHALA R & D INSTITUTE OF SCIENCE


AND TECHNOLOGY, CHENNAI 600 062, TAMILNADU, INDIA
(Deemed to be University Estd u/s 3 of UGC Act, 1956)

October 2019
BONAFIDE CERTIFICATE

This is to certify that the seminar entitled “ITWIN TECHNOLOGY” submitted by


B.Jagadeesh(17UECS0098), S.VinayKumar(17UECS0740) and L.ManiTeja(17UECS0397) in
partial fulfillment for the requirements for the award of the degree of Bachelor of Technology in
Computer Science and Engineering is an authentic work carried out by them under my supervision
and guidance.
To the best of my knowledge, the matter embodied in the seminar report has not been
submitted to any other University/Institute for the award of any Degree or Diploma.

Signature of Supervisor Signature of Seminar Handling Faculty

Mr. S.N.Manoharan, M.E. Dr.G.Arulkumaran, M.E., Ph.D.


Assistant Professor, Assistant Professor,
Department of CSE, Department of CSE,
Vel Tech Rangarajan Dr. Sagunthala Vel Tech Rangarajan Dr.Sagunthala
R & D Institute of Science and Technology, R&D Institute of Science and Technology,
Avadi, Chennai-600062. Avadi, Chennai-600062.

Submitted for the partial fulfillment for the award of the degree of Bachelor of Technology in
Computer Science and Engineering from Vel Tech Rangarajan Dr. Sagunthala R & D Institute of
Science and Technology (Deemed to be University, u/s 3 of UGC Act,1956).

ii
DECLARATION

We declare that this written submission represents our ideas in our own words and
where others ideas or words have not been included, we have adequately cited and
referenced the original sources. we also declare that we have adhered to all principles
of academic honesty and integrity and have not misrepresented or fabricated or
falsified any idea/data/fact/source in our submission. we understand that any
violation of the above will be cause for disciplinary action by the Institute and can
also evoke penal action from the sources which have thus not been properly cited or
from whom proper permission has not been taken when needed.

(B.Jagadeesh &17UECS0098)

(S.VinayKumar &17UECS0740)

(L.ManiTeja &17UECS0397)

iii
APPROVAL SHEET

The Seminar report entitled “iTwin Technology” by B.Jagadeesh, S.VinayKumar,


L.ManiTeja is approved for the degree of B.Tech Computer Science and Engineering.

Signature of Supervisor Signature of HEAD & DEAN, SOC

Mr. S.N.Manoharan, M.E. Dr.V.Srinivasa Rao, M.Tech, Ph.D.


Assistant Professor, Professor,
Department of CSE, Department of CSE,
Vel Tech Rangarajan Dr. Sagunthala Vel Tech Rangarajan Dr.Sagunthala
R & D Institute of Science and Technology, R & D Institute of Science and Technology,
Avadi, Chennai-600062 Avadi, Chennai-600062.

Date :
Place:

iv
ACKNOWLEDGEMENT

We express our deepest gratitude to our respected Founder Chancellor and


President Col. Prof. Dr. R. RANGARAJAN B.E. (EEE), B.E. (MECH), M.S (AUTO).
DSc., Foundress President Dr.R.SAGUNTHALA RANGARAJAN M.B.B.S., Chair
person Managing Trustee and Vice President.

We are very much grateful to our beloved Vice Chancellor Prof. V.S.S. KUMAR,
Ph.D., for providing us with an environment to complete our seminar successfully.

We are obligated to our beloved Registrar N.S PREMA., for providing immense
support in all our endeavors.

We are thankful to our esteemed Director Academics Dr. ANNE KOTESWARA


RAO, Ph.D., for providing a wonderful environment to complete our seminar successfully.

We record indebtedness to our Head of the Department/Dean Dr.V.SRINIVASA


RAO, M.TECH, Ph.D., for immense care and encouragement towards us throughout the
course of this seminar.

We thank our Seminar handling Faculty DR.G.Arul kumaran M.E, Ph.D. for the
valuable information shared on proceeding with our seminar.

We also take this opportunity to express a deep sense of gratitude to Our Internal
Supervisor Mr. S.N.Manoharan, M.E. for his cordial support, guidance and helping us in
completing this seminar through various stages.

A special thanks to our Seminar Coordinators Mrs.S.HANNAH M.E, Mrs.


D.FEMI M.E and Mrs. T.Anjali M.Tech. for their valuable guidance and support
throughout the course of the seminar.

We thank our department faculty, supporting staffs, parents, and friends for their
help and guidance to complete this seminar.

B.Jagadeesh (VTU 8683) (REG 17UECS0098)


S.Vinay Kumar (VTU 8930) (REG 17UECS0740)
L.ManiTeja (VTU 8784) (REG 17UECS0397)

v
TABLE OF CONTENTS
CHAPTER
TITLE PAGE NO.
NO.

BONAFIED CERTIFICATE ii
DECLARATION iii
APPROVAL iv
ACKNOWLEDGMENT v

ABSTRACT 1

1 INTRODUCTION 2

2 LITERATURE SURVEY 3

3 METHODOLOGY 5

4 RESULTS AND DISCUSSIONS 7

5 CONCLUSION AND FUTURE ENHANCEMENTS

5.1 CONCLUSION 8
5.2 FUTURE ENHANCEMENTS 8

APPENDICES 9

REFERENCES 10
ABSTRACT

iTwin is a revolutionary new file sharing and remote access device introduced by the

company called iTwin. It’s like two ends of a cable, without the cable. It’s literally plug and play.

iTwin can connect any two online computers anywhere in the world. iTwin enables to have access to

any or all of home computer’s files and folders while you’re on-the-go. iTwin enables to have

access to the desktop’s files while one is traveling.

Similarly, one can also use iTwin to access to any or all of their office computer's files and

folders while on-the-go. There's no in-built limit to the amount of storage that can access with iTwin

while user on-the-go. The only limit is the size of one’s hard drives. The only other "limit" is the

speed of the Internet connection. The faster it is, the better will be the experience.

When the iTwin gets connected, a regular window will be popped-up, just as while a regular

USB flash drive is plugged in. Drag and drop files and folders into this window to share them - as

many as user want. Leave the computer with one half of iTwin connected to it. Detach the other half

of iTwin and take it on the go. Wherever , user can remotely access the shared files, simply by

plugging the half of the device carrying into any online Windows computer, anywhere. iTwin allows

user to transfer files to - or from - their home computer.

1
CHAPTER 1

INTRODUCTION

A USB flash drive is a data storage device that consists of flash memory with an
integrated Universal Serial Bus (USB) interface. A Cloud Storage is also a similar case
where in the data is stored remotely and is accessed whenever needed. In Cloud Storages
the data can be stolen or misused if the username and password of an account to access
the storage is hacked by someone. There are many more drawbacks like limited storage,
no security, back up, temp files, no remote disable etc.
iTwin is a 'limitless' secure USB device that enables users to access, edit and share
all their files and media between any two online computers anywhere in the world. The
only limit is the size of one’s computer’s hard drive. iTwin is an innovative solution that
allows remote file access without the security and privacy risks of the cloud and USB
flash drives. It’s very easy to access as a USB device and no special installation is
required. iTwin uses thoroughly analyzed crypto protocols and algorithms(AES 256 bit
encryption). It has features like bi-directional file access, no temp files, remote disable,
smart key generation, password support and twin trust authentication. iTwin was invented
by an Indian named Lux Anantharaman. After achieving a Bachelors degree in Electrical
and Electronic Engineering from IIT in Chennai and a Masters degree from IISc in
Bangalore, Lux worked first as an IT security researcher at the Institute of Systems
Science, Singapore and then as senior researcher at Kent Ridge Digital Labs and the
Institute for Infcomm Research.

2
CHAPTER 2

LITERATURE SURVEY

iTWIN TECHNOLOGY
In April 2016 Gole Akshay B , Shaikh Asif M , Prof. Y.V. Kadam
published paper on the ‘iTwin technology’ mentioning USB flash drive is device that is
used to store the data. Cloud storage is also used to store the data on the middle server. But
the USB flash drive has the drawback that it is too small in size, because of that it can be
easily misplaced or lost. In case of cloud storage data can be misused if the username and
password is hacked by someone else. To overcome all these problems, iTwin is the best
solution. It is the secure USB device that can be used to access, share & edit all the files and
media between any two online computers anywhere in the world. It allows remote file
access without any security and privacy risks.
iTwin Connect represents a unique solution for providing secure access
to your files and information from a remote location, credit to the AES 256- bit encryption
technology. The iTwin connect device performs like to Peer to Peer access excluding the
data is only being shared between user and user’s main computer. If user is travelling with a
Windows device and his main computer is a Mac, user can still access the files since iTwin
Connect will work with both systems.

iTWIN DATA SHARING DEVICE


In June 2016 Sainikhil Bheemanathini , Madhukar Pokala published paper
‘iTwin data sharing device’ mentioning iTwin cuses well evaluated crypto protocols .It
has features like no temp files, remote disable, password support and twin trust
authentication
iTwin is a extra-ordinary solution for users who wish to work from home. They
can remotely access, edit, and share files between home and office computers. iTwin
bypasses cloud services to turn the physical storage into its own networking solution.
Moreover, iTwin is simple plug and play type device which solves drop box limitations
extensively.

3
STUDY OF WORKING TECHNIQUE ITWIN FOR HIGH SPEED DATA
TRANSFER, FROM POINT TO POINT ON INTERNET

In april 2016 Ankush sharma , Priti Sharma , Punita Panwar on ‘Study of


working technique itwin for high speed data transfer from point to point on internet’
mentioning It’s very easy to access as a USB device and no special installation is required.
iTwin uses thoroughly analyzed crypto protocols and algorithms(AES 256 bit encryption).
It has features like bidirectional file access, no temp files, remote disable, smart key
generation, password support and twintrust authentication.
iTwin provides remote access to preselected files and not to the entire desktop.
After the iTwin icon comes up on a Windows Explorer pane at the home computer the files
expected to be used at a remote location must be dragged from a separate copy of the
Windows Explorer and dropped into the WE pane containing the green iTwin icon. It is a
normal procedure for any drag and drop operation. The home computer must be left
switched on with the inner half of the iTwin pair connected to a USB port .for the remote
machine to access the home. If for any reason, the home computer is switched off it must
again be switched on, with the iTwin half connected to its USB port before it can be
remotely accessed.

NEW INNOVATION IN USB AND CLOUD STORAGE-iTWIN


In July 2017 Shivkumar Goel , Nehank Poilkar published a paper on ‘New
Innovation in USB and Cloud Storage-iTwin’ mentioning iTwin takes the idea of remote
connection and transfers it to hardware. A simple two-part USB drive allows one user to
plug it in to one computer and then snap off and hand the second part to someone else with
another computer. They will then have instant access to the other computer.
iTwin Connect shows a rare solution for catering secure connection to
your files and information from a remote location, the AES 256-bit encryption technology is
used in this iTwin. The iTwin works like a Peer to Peer access except the information is
shared between 2 computer

4
CHAPTER 3

METHODOLOGIES
3.1 TWIN TRUST AUTHENTICATION METHOD

Before allowing any data transfer every iTwin is authenticated by iTwin’s Twin
Trust servers All communication between iTwin and Twin Trust is secured using industry
strength https protocol After successful authentication by Twin Trust , Twin trust assist
iTwin to discover it’s another half

3.2 AES ALGORITHM


AES consist three block ciphers: AES-128/ AES-192 / AES256. Each cipher
encrypts and decrypts data in blocks of 128 bits using cryptographic keys of 128-, 192- and
256-bits, respectively. Symmetric (also known as secret-key) ciphers use the same key for
encrypting and decrypting, so the sender and the receiver must both know and use the same
secret key. All key lengths are deemed sufficient to protect classified information up to the
"Secret" level with "Top Secret" information requiring either 192- or 256-bit key lengths.
There are 10 rounds for 128-bit keys, 12 rounds for 192-bit keys and 14 rounds for 256-bit
keys a round consists of several processing steps that include substitution, transposition and
mixing of the input plain text and transform it into the final output of cipher text. The AES
encryption algorithm sets a number of transformations that needs to be performed for the
data stored in an array. The first step in this algorithm is to put the data into an array; after
which the cipher transformations are done over a number of encryption rounds. The counts
of rounds are decided by the key length, with 10 rounds for 128- bit keys, 12 rounds for
192-bit keys and 14 times for 256-bit keys.
 First step is substation
 Second step is transformation
 The third step is mixing columns
 Last step is exclusive OR(XOR) operation performed on each column using a different
part of the encryption key longer keys need extra rounds to complete.

5
Figure 3.1 AES Design

3.3 Two Factor Authentication

iTwin device provides 2-factor authentication for advanced security. Access to the
data is provided based on two different factors: Something the user have the physical iTwin
device. Something the userbe familiar with a password which user have to enter before the
iTwin device can be used. Setting an iTwin device password is optional however it’s better
to set the optional password throughout device initialization to protect the data and network
in the event that user lose the device. The password set for the iTwin is stored only on the
two halves of the iTwin and nowhere else.

Figure 3.2 Working of iTwin


6
CHAPTER 4

RESULTS AND DISCUSSIONS

The Cloud looms above us all, threatening to rain down a tech torrent onto our hard
drives and memory sticks, frying their circuits into obsolescence. Thankfully, we're not
quite there yet but the iTwin marks a step in that direction. It's a twin pack of USB sticks
that lock into each other, and can transfer files between each other over the web - from
thousands of miles apart.
Stuck together, the iTwin twins look like a double-ended USB flash memory stick.
However, there's no real storage available in either. Instead, this natty gadget creates a sort
of wormhole through the internet, joining together the two computers that the halves of the
iTwin are plugged into.
iTwin Cloud storage
Ease of installation Plug n play Install & configureit.need to
create,remember & use login
Storage limit and monthly No storage limit and fee Has storage limit and fee
fees required
Security and privacy Hardware based security Password only
plus optional password and
remote disable
Remote editing Directly edit your home Remote editing requires 2nd
files remotely copy tobe created on other
computers
Accidental delete protection present Not present

Fig 4.1 iTwin Vs cloud storage

The iTwin creates its own "virtual storage" drive that appears as a network drive in
Windows's My Computer area. Either computer can then fill this space with any kind of
files and folders it's much like using a USB stick, except that there's no actual storage here
in the traditional sense. The data isn't uploaded to some mystical cloud server either.
Getting your. The iTwin's metal-covered body is strong and very light - not too surprising
considering there can't be all that much to fit in, component-wise.
7
CHAPTER 5

CONCLUSION AND FUTURE ENHANCEMENTS


5.1 CONCLUSION

iTwin is a extra-ordinary solution for users who wish to work from home. They can
remotely access, edit, and share files between home and office computers. iTwin bypasses
cloud services to turn your physical storage into its own networking solution. Moreover,
iTwin is simple plug and play type device which solves drop box limitations
extensively.The iTwin bypasses the virtual world of cloud services to turn your physical
storage into its own networking solution. For peoples who want to maintain files up-to-date
among two computers the iTwin is for them.The iTwin is a simple and easy to use file
collaboration solution, with a mix of encryption and hardware authentication to create a
highly-secure personal cloud. On the small scale the iTwin is easy to use, but when
expanding out into multiple pairs, it becomes clunky and costly.
5.2 FUTURE ENHANCEMENTS

The iTwin technology has a drawback of little lack of functioning in low network
connections .There is a scope of development in the working of the iTwin according to the
functioning in low network connections or by developing the network speeds into new
generations.

8
Appendix 1

LIST OF FIGURES

S. NO FIG. NO TITLES PAGE. NO


1 3.1 AES Design 6
2 3.2 Working of iTwin 6
3 4.1 iTwin vs cloud storage 7

9
Appendix 2

LIST OF ABBREVIATIONS

ABBREVIATIONS EXPLANATIONS

AES Advanced Encryption Standard

DES Data Encryption Standard

10
REFERENCES

1. iTwin Technology Gole Akshay B , Shaikh Asif M , Prof. Y.V. Kadam International
Journal of Advanced Research in Computer and Communication Engineering Vol. 5,
Issue 4, April 2016

2. iTwin Technology Sainikhil Bheemanathini , Madhukar Pokala International Journal


of Computer Science and Information Technology Research Vol. 4, Issue 2, pp:
(298-302), Month: April - June 2016

3. iTwin Technology: An Approach to Secure Data Transfer Between iTwin device to


Cloud, Bersha KumariUniversity Research Resource Journal Jayoti Vidyapeeth
Women’s University, Jaipur Volume – 1, Issue – 2 (April - June - 2018)

4. E. K. Kolodner, et al., “A cloud environment for data-intensive storage services,” in


CloudCom, 2011, pp. 357–366.

5. Roberto S. Silva Filho, Christof J. Budnik, Willam M. Hasling, “Supporting


Concern-Based Regression Testing and Prioritization in a Model-Driven
Environment”, 34th Annual IEEE Computer Software and Applications Conference
Workshops, 2010.

6. D.Tipper; S. Ramaswamy; T. Dahlberg Wireless Communications and Networking


Conference, 1999 IEEE, 1999.

7. I. Goiri, J. Guitart, and J. Torres, “Characterizing cloud federation for enhancing


providers’ profit,” in Cloud Computing (CLOUD), 2010 IEEE 3rd International
Conference on, Jul 2010, pp. 123–130.

8. W. Li and L. Ping, “Trust model to enhance security and interoperability of cloud


environment,” in Cloud Computing, Nov 2009, pp. 69–79

9. M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee,


D. A. Patterson, A. Rabkin, and M. Zaharia, “Above the Clouds: A Berkeley View
of Cloud Computing,” EECS Department, University of California, Berkeley, Tech.
Rep. UCB/EECS-2009-28, Feb 2009.

10. Ankush Sharma, Priti Sharma. “Data of working technique iTwin for high speed
data transfer, from point to point on internet.” Third International Conference on
Resent Trends in Engineering Science and Management, 2016.

11

You might also like