Professional Documents
Culture Documents
Project Report
On
By
CERTIFICATE
is a bonafide student of this institute and the work has been carried out by
his under the supervision of Prof. Anita Mahajan and it is approved for
the partial fulfillment of the requirement of Savitribai Phule Pune
University, for the award of the degree of Master of Engineering
(Computer Engineering).
Acknowledgement
We take this opportunity to express my hearty thanks to all those who
helped me in the completion of the Project stage-2 on “Secure file
storage on cloud using hybrid cryptography ”
Shraddha Gholap
Abstract
Cloud is used in various fields like industry, military, college, etc. for various services and storage of huge
amount of data. Data stored in this cloud can be accessed or retrieved on the users request without direct
access to the server computer. But the major concern regarding storage of data online that is on the cloud
is the Security. This Security concern can be solved using various ways, the most commonly used
techniques are cryptography and steganography. But sometimes a single technique or algorithm alone
cannot provide high-level security. So we have introduces a new security mechanism that uses a
combination of multiple cryptographic algorithms of symmetric key and steganography. In this proposed
system 3DES (Triple Data Encryption Standard), RC6 (Rivest Cipher 6) and AES (Advanced Encryption
Standard) algorithms are used to provide security to data. All the algorithms use 128-bit keys. LSB
steganography technique is used to securely store the key information. Key information will contain the
information regarding the encrypted part of the file, the algorithm and the key for the algorithm. File during
encryption is split into three parts. These individual parts of the file will be encrypted using different
encryption algorithm simultaneously with the help of multithreading technique. The key information is
inserted into an image using the LSB technique. Our methodology guarantees better security and
protection of customer data by storing encrypted data on a single cloud server, using AES, DES and RC6
algorithm.
Keywords— Cloud Computing and Storage, AES Algorithm, RSA Algorithm, Blowfish Algorithm
Table Of Contents
1. Introduction
2. Literature Survey
3. Problem Definition and Scope
a) Problem statement
b) Goals and objectives
c) Methodology
d) Software resource requirement
e) Implementation
f) Use case Diagram
4. Input Output design
5. Techniques / Algorithms Used
6. Existing system
7. Proposed system
8. Challenges
9. Project Planning
10. Project Design
11. Conclusion and Reference
12. Research paper
13. Reference
Chapter 1.Introduction
Cloud computing is originated from earlier large-scale distributed computing technology. NIST defines
cloud computing as a model for enabling convenient on demand network access to a shared pool of
configurable computing resources ( like network, storage, application and services) that can be quickly
provisioned and released with minimal management effort or service provider interaction. In Cloud
computing files and software are not fully contained on the user’s application and Program are residing in
provider premises. The cloud provider can solve this problem by encryption the files by using encryption
algorithm. This paper presents a file security model to provide an efficient solution for the basic problem of
security in cloud environment. In this model, hybrid encryption is used where files are encrypted by file
splitting and RSA is used for the secured communication between users and the servers
Data security issues
Due to openness and multi-tenant characteristics of the cloud, the traditional security mechanisms are no
longer suitable for application and data in cloud. Some of the issues are as following:
Due to dynamic scalability, service and location transparency features of cloud computing model, all kinds
of application and data of the cloud platform have no fixed infrastructure and security boundaries. In the
event of security breach, it is difficult to isolate a particular resource that has been compromised.
According to service delivery models of cloud computing, resources and cloud services may be owned by
multiple providers. As there is a conflict of interest, it is difficult to deploy a unified security measure.
Due to the openness of cloud and sharing virtualized resources by multitenant, user data may be accessed
by other unauthorized users.
a) Problem Statement:
• In cloud the data is stored and handled by unknown servers, these servers can be
sometimes accessed by an unauthorized person thus leading to the violation of data
integrity and security and also user has no control on the data.
• When it is in cloud in order to solve this issue, we can store data in distributed manner in
encrypted format using hybrid cryptography.
c) Methodology
• This framework AES, RC6, Blowfish and BRA calculations are utilized for block
savvy security to information. Proposed framework is hybridization of AES, RC6,
Blowfish and BRA.
• All calculations are symmetric key cryptography. These calculations utilizes a solitary
key for document encode and disentangle reason. All calculations key size is 128
digit. To conceal key data into cover picture utilizing LSB method. Usage of
proposed framework is finished utilizing java language.
• Document encoding and disentangling time is determined with the assistance of
java programming. Record encode and decipher time is determined for just content
document with examination of existing AES and Blowfish calculations. Document
size is given in MB for AES calculation.
•
Ajeeknya DY Patil School Of Engineering
“Secure file storage on cloud computing using hybrid cryptography ”
d)Software Requirement
• Operating system : Windows 10 Pro
• Coding Language : Python
• Data Base : MYSQL
• Server : Flask
• Tool : PyCharm
e) Implementation
Cloud proprietor transfer the information on cloud worker. Record is part into octet. All aspects of
document are encoded all the while utilizing multithreading strategy. Encoded record is put away
on cloud worker. Keys utilized for encryption are put away into cover picture. Distributed
computing is the multi-client climate. In this beyond what one client can get to record from cloud
worker. Cloud client demand for file. On solicitation of record client additionally get steno picture
utilizing email which comprise of key data. Switch measure is utilized for translate the document .
MODULES:
Data Owner
Data User
Admin
Cloud
MODULES DESCRIPTION:
Cloud:
Cloud module can operate by the admin in cloud module having all the registered users and
owners details and owner uploaded file details and user downloaded details.
Admin:
Admin login with username and password, the entered username and password is correct
then only admin enter into the home page, if entered details are incorrect admin can’t login to
home page, after entered into the home page admin act like owner of this application and admin
activate and deactivate the user and owner and admin can view all uploaded file details and
request details.
INPUT DESIGN
The input design is the link between the information system and the user. It comprises the
developing specification and procedures for data preparation and those steps are necessary to
put transaction data in to a usable form for processing can be achieved by inspecting the
computer to read data from a written or printed document or it can occur by having people
keying the data directly into the system. The design of input focuses on controlling the
amount of input required, controlling the errors, avoiding delay, avoiding extra steps and
keeping the process simple. The input is designed in such a way so that it provides security
and ease of use with retaining the privacy. Input Design considered the following things:
1. Input Design is the process of converting a user-oriented description of the input into a
computer-based system. This design is important to avoid errors in the data input process and
show the correct direction to the management for getting correct information from the
computerized system.
2. It is achieved by creating user-friendly screens for the data entry to handle large volume of
data. The goal of designing input is to make data entry easier and to be free from errors. The
data entry screen is designed in such a way that all the data manipulates can be performed. It
also provides record viewing facilities.
3. When the data is entered it will check for its validity. Data can be entered with the help of
screens. Appropriate messages are provided as when needed so that the user will not be in
OUTPUT DESIGN
A quality output is one, which meets the requirements of the end user and presents the
information clearly. In any system results of processing are communicated to the users and to
other system through outputs. In output design it is determined how the information is to be
displaced for immediate need and also the hard copy output. It is the most important and
direct source information to the user. Efficient and intelligent output design improves the
system’s relationship to help user decision-making.
1. Designing computer output should proceed in an organized, well thought out manner; the
right output must be developed while ensuring that each output element is designed so that
people will find the system can use easily and effectively. When analysis design computer
output, they should Identify the specific output that is needed to meet the requirements.
3. Create document, report, or other formats that contain information produced by the
system.
The output form of an information system should accomplish one or more of the following
objectives.
Having in mind its good qualities, it comes as no surprise that AES has
become the industry standard for encryption.
Blowfish Algorithm
Blowfish is an encryption technique designed by Bruce Schneier in 1993 as an
alternative to DES Encryption Technique . It is significantly faster than DES and provides
a good encryption rate with no effective cryptanalysis technique found to date. It is one of
the first, secure block cyphers not subject to any patents and hence freely available for
anyone to use. It is symmetric block cipher algorithm.
1. blockSize: 64-bits
2. keySize: 32-bits to 448-bits variable size
3. number of subkeys: 18 [P-array]
4. number of rounds: 16
5. number of substitution boxes: 4 [each having 512 entries of 32-bits each]
1.
Ajeeknya DY Patil School Of Engineering
“Secure file storage on cloud computing using hybrid cryptography ”
Parameter Definition
w represent 32 bits as the size of word
It denotes number of round for encryption. If the size of block is 128 bits, then r, the number, is
r
20
b 16, 24 and 32 byte key
2. Table 4 RC6 Parameters
a>>>b rotate the w-bit word a to the right by the amount given by the least
significant lg w bits of b
Key Schedule
The key schedule of RC6-w/r/b is similar to the key schedule of RC5-w/r/b. The user supplies a key of b
bytes. From this key, 2r + 4 words (w bits each) are derived and stored in the array S [0, 2r + 3]. This
array is used in both encryption and decryption
Encryption
The encryption process in RC6 is relatively simple. RC6 consist of four w-bit registers (A, B, C, D) which
is used to store the initial input plain text and the final output cipher text is also stored in the same
register. The first byte of plaintext or cipher text is placed in the least significant byte of A; the last byte
of plaintext or cipher text is placed into the most significant byte of D. The pseudo-code for the
encryption is given below.
Number of r rounds
w-bit round keys S[0,,2r + 3] Output : Cipher Text stored in A, B, C, D Procedure : B = B + S[0];
D = D + S[1];
for i = 1 to r do
A = A + S[2r+2]; C = C + S[2r+3];
Basic Operation
For all variants, RC6- w/r/b operates on units of four w-bit words using the following six basic
operations. The base-two logarithm of w will be denoted by lg w.
o a<<<b rotate the w-bit word a to the left by the amount given by the least significant lg w
bits of b
Decryption operation performs in a similar way as encryption. The main difference is that the cipher
text is given as input and produce output as plain text. The pseudo-code for the decryption is shown
below.
C = C + S[2r+3]; A = A + S[2r+2];
for i = r downto 1 do
C = ((C – S[2i+1]) t) u;
A = ((A – S[2i]) u) t;
D = D – S[1];
B = B – S[0];
In existing framework single calculation is utilized for information encode and unravel
reason. Yet, utilization of single calculation isn't achieve elevated level security. On the off
chance that we utilize single symmetric key cryptography calculation than we need to
confront security issue on the grounds that in this kind of calculation applies a solitary key
for information encode and interpret. So key transmission issue happen while sharing key
into multiuser climate. Public key cryptography calculations achieve high security however
most extreme postponement is required for information encode and translate.
more data storage needs turning over to the cloud, finding a secure and efficient data
access structure has become a major research issue
Security techniques are not applied in the protection of offloaded data from attacks.
Once uploaded and shared, the data owner inevitably loses control over the data,
opening the door to unauthorized data access.
PROPOSED SYSTEM:
Selectively sharing data files on the cloud becomes a burden on the data owner as the
hierarchy grows (the access privileges increase in number) and/or as the access restrictions
become more complex due to an increase in the sensitivity of the file segments. A trivial
solution involves the data owner to use public key encryption. This solution would require
the data owner to encrypt the same part of the data file once for each data user being granted
access then upload the resulting cipher texts to the cloud. The data users would then fetch
their uniquely encrypted parts of the file from the cloud and utilize their private keys to
decrypt them. This method ensures that no unprivileged data user will gain access to any part
of the data file even if that user is able to download the cipher texts from the cloud.
However, on a large scale, public key encryption becomes an inefficient solution due to the
increase in the number of encryptions and large storage spaces required. Therefore, the
challenge is to provide the data owners with an efficient, secure and privilege-based method
that allows them to selectively share their data files among multiple data users while
minimizing the required cloud storage space needed to store the encrypted data segments.
Requiring less network communication.
A new security layer is added to encrypt the data of the task before transferring to the
cloud side by using AES encryption technique.
Chapter 8 . Challenges
Secure file storage on the cloud using hybrid cryptography presents several challenges
that need to be addressed to ensure robust protection of data. Here are some common
challenges:
1. Key Management: Hybrid cryptography involves using both symmetric and asymmetric encryption,
which requires managing keys effectively. The challenge lies in securely generating, storing, and
distributing keys to authorized users while preventing unauthorized access.
2. Secure Key Exchange: Ensuring a secure key exchange between parties is critical. Transmitting keys
securely over the internet without being intercepted by malicious actors is a challenge, especially
when dealing with asymmetric keys during the initial setup.
3. Performance Overhead: Hybrid cryptography may introduce performance overhead due to the use
of both symmetric and asymmetric encryption algorithms. Asymmetric encryption tends to be
slower compared to symmetric encryption, which can impact file storage and retrieval speed.
4. Compatibility and Interoperability: Compatibility issues might arise when different systems or
applications use different encryption algorithms or key formats. Ensuring interoperability across
various platforms and technologies can be a challenge.
5. Trust and Security Assurance: Trusting the security of third-party cloud service providers is crucial.
Ensuring that the cloud storage provider implements robust security measures, including
encryption protocols and access controls, is essential for maintaining the security of stored files.
6. Regulatory Compliance: Compliance with various data protection regulations (such as GDPR,
HIPAA, etc.) while storing encrypted files on the cloud adds complexity. Meeting compliance
requirements without compromising the security of the stored data is a significant challenge.
7. Data Integrity and Authenticity: Maintaining data integrity and ensuring the authenticity of stored
files is crucial. Implementing measures to detect unauthorized modifications or tampering of files
during storage or transmission is challenging in a hybrid encryption environment.
8. Scalability: Ensuring scalability while maintaining security in a hybrid cryptography setup can be
challenging. As the volume of data grows, managing encryption keys, access controls, and
maintaining performance becomes more complex.
To address these challenges, organizations implementing secure file storage using hybrid
cryptography must invest in robust encryption technologies, employ secure key management
practices, regularly update security protocols, and conduct thorough risk assessments to identify
potential vulnerabilities. Collaboration with experienced security professionals and adherence to
best practices can help mitigate these challenges and enhance the overall security of cloud-based
file storage systems.
1 Planning and
Research
2 Infrastructure
Setup
3 System Design
and
Development
4 Testing and
Quality
Assurance
5 Deployment and
Implementation
6 Maintenance and
Support
d)Class diagram
d)Sequence diagram
e) Activity diagram
CONCLUSION
The various benefits gave by the cloud have driven numerous huge staggered associations to
store and share their information on it. This paper starts by calling attention to significant
security concerns information proprietors have when sharing their information on the cloud.
Next, the most generally executed and explored information sharing plans are briefly
examined uncovering purposes of shortcoming in each. To address the worries, this paper
proposes a Privilege-based Multilevel Organizational Data sharing plan that permits
information to be shared efficiently and safely on the cloud. Parcels an information file into
numerous sections dependent on client advantages and information affectability. Each
section of the information file is then common relying upon information client advantages.
We officially demonstrate that is secure against adaptively picked plaintext assault accepting
that the DBDH presumption holds. Our extensive presentation and reproduction
examinations with the three most delegate plans show that can significantly decrease the
computational multifaceted nature while limiting the extra room. Our proposed conspire
establishes a framework for future characteristic based, secure information the executives
and savvy contract improvement
Future scope
The future scope of secure file storage on cloud computing using hybrid cryptography appears
promising due to the growing reliance on cloud-based services and the increasing concerns
regarding data security and privacy. Here are some potential areas of future development and
opportunities for this technology:
In conclusion, the future scope of secure file storage on cloud computing using hybrid
cryptography is promising, given the increasing emphasis on data security and the ongoing
advancements in encryption technologies. Continuous innovation, improved usability, regulatory
compliance, and addressing emerging challenges like quantum computing will shape the evolution
of this field.
1. Anjali Patil, Nimisha Patel, Dr. Hiren Patel. (2016). Secure data sharing using cryptography
in a cloud environment. Far East Journal of Electronics and Communications, 18(4), 521–
546.
2. Bilal Habib, Bertrand Cambou, DuaneBooher, Christopher Philabaum.(2017).
3. Secure data sharing in cloud storage using key aggregation cryptography. International
Journal of Pure and Applied Mathematics, 119(16), 3257-3262.
4. Sharma and K. Sharma(2017), “ Secure File Storage and Sharing in Cloud Computing
using Hybrid Cryptography”.
5. Mr. Rohit Barvekar, Mr. ShrajalBehere, Mr. Yash Pounikar, Ms. Anushka Gulhane (2018).
Security in Cloud Computing using Cryptographic Algorithms.
6. Mr. Rohit Barvekar, Mr. ShrajalBehere, Mr. Yash Pounikar, Ms. Anushka Gulhane(2018),
“Secure File Storage and Sharing in Cloud Computing using Hybrid Cryptography”
7. P. Kumar and P. Singh(2019) , “Secure File Storage and Sharing in Cloud Computing
using Hybrid Cryptography”.
8. M.A. Khan, M.A. Rahman, and M. Islam(2020), “A Hybrid Encryption Scheme for Cloud
Storage Security”.
9. S.S.S Sharma and S. Kumari(2021), “Enhanced Security for Cloud Storage using Hybrid
Cryptography”