Professional Documents
Culture Documents
Cloud Storage 1
Cloud Storage 1
UNIVERSITY OF EMBU
BACHELOR OF SCIENCE
In
COMPUTER SCIENCE
By
EDWIN NGUGI
B135/14860/2017
Project Supervisor
2.1.3 Justification
The most critical and single reason why individuals and businesses should emphasize security
when devising for mobile phone file storage and sharing is the continuous growth of the value of
data in recent years. The rapid growth in big data analytics and business intelligence technology
has accelerated the importance of personal and organizational data. In emphasizing the need for
secure file transfers it is essential to note that data that is in motion is vulnerable to intercept,
alteration, and manipulation than data at rest. Another essential reason for the need of developing
the system is because it is cheaper to prevent data breaches rather than paying for the
consequences of these events. In addition to this, a company that experiences these data breaches
results in a loss of confidence by its customers. In a business environment, organizations rely on
fast and secure access to essential files and documents on many devices. However, security can
become a major problem, especially when using mobile devices. Most secure file-sharing
solutions have their core in cloud technology. Cloud technology allows individuals and
organizations to collaborate and store critical documents (Basu et al., 2018). Cloud technology is
often utilized to host email systems but the most essential use is in file storage and sharing. The
primary goal of a storage platform is to offer secure access to information (Basu et al., 2018).
2.1.5 Objectives
2.1.5.1 General objectives
Today cloud storage is one of the most efficient and convenient methods to store data remotely.
The objectives of this system are to:
Enhance data security through the use of cloud storage and encryption in file transfer. Cloud
storage keeps copies of your data redundantly which makes the data safe. Encryption provides a
layer of abstraction of your data.
To provide a cost-efficient form of storage as you do not have to set up or purchase storage
equipment to store your data. The data in the cloud is powered and managed by the cloud
provider and thus providing reliability and cheap solution.
To provide security to both data in motion and data at rest. This is enabled through the use of
cloud storage and encryption of data before sharing.
To promote the privacy of personal and organizational data which eventually results in the
improved trust from your customers.
To enhance disaster recovery as cloud storage provides storage backup plans and thus limiting
data loss as the company or individual can retrieve backup data from the cloud in case they lose
their data.
To promote scalability and flexibility as the storage plan can be revised in case the storage
allocated is not enough.
Cloud storage promotes convenience as you do not need a flash drive to access or view the data
as it can all be done in an online environment.
Improved file security and authorization as only the one with a key can view the contents of an
encrypted file.
2.1.5.2 Specific objectives
The primary objective of the application is to keep the uploaded user file safe and secured and
only accessed by the appropriate registered user.
The application allows users to view and download the file uploaded to the cloud through the
application interface.
The application allows users to send and receive encrypted files through their registered email
addresses.
The application will enable users to select a file from the internal storage or any other available
external storage and upload it to the cloud.
2.1.6 Anticipated output
The anticipated product will be an android application that will run on android devices that are
running Android version 8.1 and above. The application will be a bundle application file with a
.apk extension that will be used to install the application.
References
Abdullah, A. (2017). Advanced encryption standard (aes) algorithm to encrypt and decrypt data.
Cryptography and Network Security, 16.
Banik, S., Bogdanov, A., & Regazzoni, F. (2019). Compact circuits for combined AES
encryption/decryption. Journal of Cryptographic Engineering, 9(1), 69-83.
Kalaiprasath, R., Elankavi, R., & Udayakumar, R. (2017). CLOUD SECURITY AND
COMPLIANCE-A SEMANTIC APPROACH IN END TO END SECURITY. International
Journal on Smart Sensing & Intelligent Systems, 10.
Basu, S., Bardhan, A., Gupta, K., Saha, P., Pal, M., Bose, M., ... & Sarkar, P. (2018, January).
Cloud computing security challenges & solutions-A survey. In 2018 IEEE 8th Annual
Computing and Communication Workshop and Conference (CCWC) (pp. 347-356). IEEE.
Rahardjo, M. R. D., & Shidik, G. F. (2017, October). Design and implementation of self
encryption method on file security. In 2017 International Seminar on Application for Technology
of Information and Communication (iSemantic) (pp. 181-186). IEEE.
Yang, L., Han, Z., Huang, Z., & Ma, J. (2018). A remotely keyed file encryption scheme under
mobile cloud computing. Journal of Network and Computer Applications, 106, 90-99.