You are on page 1of 32

“Secure file storage on cloud computing using hybrid cryptography ”

Project Report
On

“SECURE FILE STORAGE ON CLOUD COMPUTING


USING HYBRID CRYPTOGRAPHY”

By

2152 – Shraddha Gholap


Under the guidance
Of

Prof. Anita Mahajan

Ajeeknya DY Patil School Of Engineering


“Secure file storage on cloud computing using hybrid cryptography ”

CERTIFICATE

This is to certify that the project report entitles

“Secure File Storage On Cloud Computing Using Hybrid


Cryptography ”

2152- Shraddha Gholap

is a bonafide student of this institute and the work has been carried out by
his under the supervision of Prof. Anita Mahajan and it is approved for
the partial fulfillment of the requirement of Savitribai Phule Pune
University, for the award of the degree of Master of Engineering
(Computer Engineering).

Prof. Anita Mahajan Prof. Dr. Pankaj Agarkar


Internal Guide HOD
Dept. of Computer Engg. Dept. of Computer Engg.

Ajeeknya DY Patil School Of Engineering


“Secure file storage on cloud computing using hybrid cryptography ”

Dr. Farook Sayyad


External Examiner Principal

Acknowledgement
We take this opportunity to express my hearty thanks to all those who
helped me in the completion of the Project stage-2 on “Secure file
storage on cloud using hybrid cryptography ”

We would especially like to express my sincere gratitude to Prof. Anita


Mahajan , my Guide and Prof. Dr Pankaj Agarkar HOD Department of
Computer Engineering who extended their moral support, inspiring
guidance and encouraging independence throughout this task.

We are also grateful to Dr. Dr Pankaj Agarkar, Head of Computer


Engineering Department, Ajeeknya D.Y. Patil School of Engineering for
his indispensable support, suggestions.

Shraddha Gholap

(M.E. Computer Engg.)

Ajeeknya DY Patil School Of Engineering


“Secure file storage on cloud computing using hybrid cryptography ”

Abstract

Cloud is used in various fields like industry, military, college, etc. for various services and storage of huge
amount of data. Data stored in this cloud can be accessed or retrieved on the users request without direct
access to the server computer. But the major concern regarding storage of data online that is on the cloud
is the Security. This Security concern can be solved using various ways, the most commonly used
techniques are cryptography and steganography. But sometimes a single technique or algorithm alone
cannot provide high-level security. So we have introduces a new security mechanism that uses a
combination of multiple cryptographic algorithms of symmetric key and steganography. In this proposed
system 3DES (Triple Data Encryption Standard), RC6 (Rivest Cipher 6) and AES (Advanced Encryption
Standard) algorithms are used to provide security to data. All the algorithms use 128-bit keys. LSB
steganography technique is used to securely store the key information. Key information will contain the
information regarding the encrypted part of the file, the algorithm and the key for the algorithm. File during
encryption is split into three parts. These individual parts of the file will be encrypted using different
encryption algorithm simultaneously with the help of multithreading technique. The key information is
inserted into an image using the LSB technique. Our methodology guarantees better security and
protection of customer data by storing encrypted data on a single cloud server, using AES, DES and RC6
algorithm.

Keywords— Cloud Computing and Storage, AES Algorithm, RSA Algorithm, Blowfish Algorithm

Ajeeknya DY Patil School Of Engineering


“Secure file storage on cloud computing using hybrid cryptography ”

Table Of Contents
1. Introduction
2. Literature Survey
3. Problem Definition and Scope
a) Problem statement
b) Goals and objectives
c) Methodology
d) Software resource requirement
e) Implementation
f) Use case Diagram
4. Input Output design
5. Techniques / Algorithms Used
6. Existing system
7. Proposed system
8. Challenges
9. Project Planning
10. Project Design
11. Conclusion and Reference
12. Research paper
13. Reference

Ajeeknya DY Patil School Of Engineering


“Secure file storage on cloud computing using hybrid cryptography ”

Chapter 1.Introduction

Cloud computing is originated from earlier large-scale distributed computing technology. NIST defines
cloud computing as a model for enabling convenient on demand network access to a shared pool of
configurable computing resources ( like network, storage, application and services) that can be quickly
provisioned and released with minimal management effort or service provider interaction. In Cloud
computing files and software are not fully contained on the user’s application and Program are residing in
provider premises. The cloud provider can solve this problem by encryption the files by using encryption
algorithm. This paper presents a file security model to provide an efficient solution for the basic problem of
security in cloud environment. In this model, hybrid encryption is used where files are encrypted by file
splitting and RSA is used for the secured communication between users and the servers
Data security issues
Due to openness and multi-tenant characteristics of the cloud, the traditional security mechanisms are no
longer suitable for application and data in cloud. Some of the issues are as following:
Due to dynamic scalability, service and location transparency features of cloud computing model, all kinds
of application and data of the cloud platform have no fixed infrastructure and security boundaries. In the
event of security breach, it is difficult to isolate a particular resource that has been compromised.
According to service delivery models of cloud computing, resources and cloud services may be owned by
multiple providers. As there is a conflict of interest, it is difficult to deploy a unified security measure.
Due to the openness of cloud and sharing virtualized resources by multitenant, user data may be accessed
by other unauthorized users.

Ajeeknya DY Patil School Of Engineering


“Secure file storage on cloud computing using hybrid cryptography ”

Chapter 2. Literature Survey


SR NAME NAME OF YEAR OF DESCRIPTION
NO OF AUTHOR PUBLICATION
PAPER

1 “Hybrid Chivukula 2023 In this project they have used ASE


Cryptography susmitha , , DSE , RC6 for the process of
for Secure File siyyadri encryption
Storage” srineeharika

2 “Enhanced S.S.S Sharma 2021 This research proposes an


Security for and S. Kumari enhanced security model for cloud
Cloud Storage storage using hybrid cryptography,
using Hybrid which combines AES and RSA
Cryptography” algorithms for encryption and
decryption. The proposed model
also includes secure key
management system, ensuring the
confidentiality and integrity of data
in cloud storage. The study
evaluates the effectiveness of the
proposed model through
simulations and experiments,
demonstrating its potential for
secure cloud storage

3 “A Hybrid M.A. Khan, 2020 This research proposes a hybrid


Encryption M.A. Rahman, encryption scheme for cloud
Scheme for and M. Islam storage security, which uses both
Cloud Storage symmetric and asymmetric
Security” encryption. The proposed scheme
employs AES and RSA algorithms
for encryption and decryption,
respectively. The study evaluates
the security and performance of
the proposed scheme through
simulations and experiments,
demonstrating its effectiveness in
mitigating security risks in cloud
storage.

Ajeeknya DY Patil School Of Engineering


“Secure file storage on cloud computing using hybrid cryptography ”

SR NAME NAME OF YEAR OF DESCRIPTION


NO OF AUTHOR PUBLICATION
PAPER

4 “Secure File y P. Kumar and 2019 This study proposes a hybrid


Storage and P. Singh cryptographic model for secure file
Sharing in storage and sharing in cloud
Cloud computing. The model uses a
Computing combination of AES and RSA
using Hybrid encryption algorithms, ensuring
Cryptography” both confidentiality and integrity of
data. The study demonstrates the
effectiveness of the proposed
model in terms of security and
performance through simulations
and experiments.

5 “Secure File Mr. Rohit 2018 The proposed security


Storage and Barvekar, Mr. mechanisms will prevent
Sharing in ShrajalBehere, confidential data from being
Cloud Mr. Yash misused making the system more
Computing Pounikar, Ms. reliable. The proposed method will
using Hybrid Anushka make encryption and decryption
Cryptography” Gulhane with keys.

6 “ Secure File y A. Sharma 2017 This study proposes a hybrid


Storage and and K. Sharma cryptography-based model for
Sharing in secure file storage and cloud
Cloud computing, uses a combination of
Computing AES and ECC encryption
using Hybrid algorithms. The proposed model
Cryptography” ensures confidentiality, integrity
and availability through the use of
encryption and decryption
techniques. The study
demonstrates the effectiveness of
the proposed model in terms of
security and performance through
simulations and experiments.

Ajeeknya DY Patil School Of Engineering


“Secure file storage on cloud computing using hybrid cryptography ”

Chapter 3 Problem Definition and Scope

a) Problem Statement:
• In cloud the data is stored and handled by unknown servers, these servers can be
sometimes accessed by an unauthorized person thus leading to the violation of data
integrity and security and also user has no control on the data.
• When it is in cloud in order to solve this issue, we can store data in distributed manner in
encrypted format using hybrid cryptography.

b)Goals and Objectives:


• Providing more secure cloud storage.
• Cost and time effective.
• Increase data integrity and confidentiality.
• Eliminate third party access
• Provide authentication

c) Methodology
• This framework AES, RC6, Blowfish and BRA calculations are utilized for block
savvy security to information. Proposed framework is hybridization of AES, RC6,
Blowfish and BRA.
• All calculations are symmetric key cryptography. These calculations utilizes a solitary
key for document encode and disentangle reason. All calculations key size is 128
digit. To conceal key data into cover picture utilizing LSB method. Usage of
proposed framework is finished utilizing java language.
• Document encoding and disentangling time is determined with the assistance of
java programming. Record encode and decipher time is determined for just content
document with examination of existing AES and Blowfish calculations. Document
size is given in MB for AES calculation.


Ajeeknya DY Patil School Of Engineering
“Secure file storage on cloud computing using hybrid cryptography ”
d)Software Requirement
• Operating system : Windows 10 Pro
• Coding Language : Python
• Data Base : MYSQL
• Server : Flask
• Tool : PyCharm

e) Implementation
Cloud proprietor transfer the information on cloud worker. Record is part into octet. All aspects of
document are encoded all the while utilizing multithreading strategy. Encoded record is put away
on cloud worker. Keys utilized for encryption are put away into cover picture. Distributed
computing is the multi-client climate. In this beyond what one client can get to record from cloud
worker. Cloud client demand for file. On solicitation of record client additionally get steno picture
utilizing email which comprise of key data. Switch measure is utilized for translate the document .

MODULES:
 Data Owner
 Data User
 Admin
 Cloud

MODULES DESCRIPTION:

Data Owner (DO):


Owner upload the data on cloud server. File is split into octet. Every part of file is encoded
simultaneously using multithreading technique. Encoded file is stored on cloud server. Keys used
for encryption are stored into cover image. Cloud computing is the multi user environment.

Data User (DU):


Ajeeknya DY Patil School Of Engineering
“Secure file storage on cloud computing using hybrid cryptography ”
Cloud user request for file. On request of file user also get key using email which consist of key
information. Reverse process is used for decode the file.

Cloud:
Cloud module can operate by the admin in cloud module having all the registered users and
owners details and owner uploaded file details and user downloaded details.

Admin:
Admin login with username and password, the entered username and password is correct
then only admin enter into the home page, if entered details are incorrect admin can’t login to
home page, after entered into the home page admin act like owner of this application and admin
activate and deactivate the user and owner and admin can view all uploaded file details and
request details.

f) Use case diagram –


A use case diagram in the Unified Modeling Language (UML) is a type of behavioral
diagram defined by and created from a Use-case analysis. Its purpose is to present a
graphical overview of the functionality provided by a system in terms of actors, their goals
(represented as use cases), and any dependencies between those use cases. The main
purpose of a use case diagram is to show what system functions are performed for which
actor. Roles of the actors in the system can be depicted.
i. Use case diagram for data Owner :

Ajeeknya DY Patil School Of Engineering


“Secure file storage on cloud computing using hybrid cryptography ”

ii. Use case diagram for Data User :

iii. Use case diagram for Admin :

iv. Use case diagram for cloud:

Ajeeknya DY Patil School Of Engineering


“Secure file storage on cloud computing using hybrid cryptography ”

Chapter 4 Input Output design

INPUT DESIGN

The input design is the link between the information system and the user. It comprises the
developing specification and procedures for data preparation and those steps are necessary to
put transaction data in to a usable form for processing can be achieved by inspecting the
computer to read data from a written or printed document or it can occur by having people
keying the data directly into the system. The design of input focuses on controlling the
amount of input required, controlling the errors, avoiding delay, avoiding extra steps and
keeping the process simple. The input is designed in such a way so that it provides security
and ease of use with retaining the privacy. Input Design considered the following things:

 What data should be given as input?


 How the data should be arranged or coded?
 The dialog to guide the operating personnel in providing input.
 Methods for preparing input validations and steps to follow when error occur.
OBJECTIVES

1. Input Design is the process of converting a user-oriented description of the input into a
computer-based system. This design is important to avoid errors in the data input process and
show the correct direction to the management for getting correct information from the
computerized system.

2. It is achieved by creating user-friendly screens for the data entry to handle large volume of
data. The goal of designing input is to make data entry easier and to be free from errors. The
data entry screen is designed in such a way that all the data manipulates can be performed. It
also provides record viewing facilities.

3. When the data is entered it will check for its validity. Data can be entered with the help of
screens. Appropriate messages are provided as when needed so that the user will not be in

Ajeeknya DY Patil School Of Engineering


“Secure file storage on cloud computing using hybrid cryptography ”
maize of instant. Thus the objective of input design is to create an input layout that is easy to
follow

OUTPUT DESIGN

A quality output is one, which meets the requirements of the end user and presents the
information clearly. In any system results of processing are communicated to the users and to
other system through outputs. In output design it is determined how the information is to be
displaced for immediate need and also the hard copy output. It is the most important and
direct source information to the user. Efficient and intelligent output design improves the
system’s relationship to help user decision-making.

1. Designing computer output should proceed in an organized, well thought out manner; the
right output must be developed while ensuring that each output element is designed so that
people will find the system can use easily and effectively. When analysis design computer
output, they should Identify the specific output that is needed to meet the requirements.

2. Select methods for presenting information.

3. Create document, report, or other formats that contain information produced by the
system.

The output form of an information system should accomplish one or more of the following
objectives.

 Convey information about past activities, current status or projections of the


 Future.
 Signal important events, opportunities, problems, or warnings.
 Trigger an action.
 Confirm an action.

Ajeeknya DY Patil School Of Engineering


“Secure file storage on cloud computing using hybrid cryptography ”

Chapter 5: Techniques / Algorithms Used


1. Algorithms Used Advanced Encryption Standard (AES)
 AES encryption, or advanced encryption standard, is a type of cipher
that protects the transfer of data online.

 Currently, AES is one of the best encryption protocols available, as it


flawlessly combines speed and security, letting us enjoy our daily online
activities without any disruption.

 Having in mind its good qualities, it comes as no surprise that AES has
become the industry standard for encryption.

Ajeeknya DY Patil School Of Engineering


“Secure file storage on cloud computing using hybrid cryptography ”

Ajeeknya DY Patil School Of Engineering


“Secure file storage on cloud computing using hybrid cryptography ”

 Data Encryption Standard (DES)


Data Encryption Standard (DES) is a block cipher with a 56-bit key length that has played
a significant role in data security. Data encryption standard (DES) has been found
vulnerable to very powerful attacks therefore, the popularity of DES has been found
slightly on the decline. DES is a block cipher and encrypts data in blocks of size of 64
bits each, which means 64 bits of plain text go as the input to DES, which produces 64
bits of ciphertext. The same algorithm and key are used for encryption and decryption,
with minor differences. The key length is 56 bits.

 Blowfish Algorithm
Blowfish is an encryption technique designed by Bruce Schneier in 1993 as an
alternative to DES Encryption Technique . It is significantly faster than DES and provides
a good encryption rate with no effective cryptanalysis technique found to date. It is one of
the first, secure block cyphers not subject to any patents and hence freely available for
anyone to use. It is symmetric block cipher algorithm.
1. blockSize: 64-bits
2. keySize: 32-bits to 448-bits variable size
3. number of subkeys: 18 [P-array]
4. number of rounds: 16
5. number of substitution boxes: 4 [each having 512 entries of 32-bits each]

Ajeeknya DY Patil School Of Engineering


“Secure file storage on cloud computing using hybrid cryptography ”

 Triple Data Encryption Standard (3DES)


Triple DES is a encryption technique which uses three instance of DES on same plain
text. It uses there different types of key choosing technique in first all used keys are
different and in second two keys are same and one is different and in third all keys are
same.

 Rivest Cipher 6 (RC6)


 RC6 is a symmetric key block cipher derived from RC5. It was designed in the year
1998 by Ron Rivest in collaboration with his associates from RSA Laboratories [9,10].
RC6 includes many new features, which are not available in RC5. RC6 algorithm has a
modified Feistel structure and presented symbolically as RC6-w/r/b and the derails of
w/r/b are given in table4.

1.
Ajeeknya DY Patil School Of Engineering
“Secure file storage on cloud computing using hybrid cryptography ”
Parameter Definition
w represent 32 bits as the size of word
It denotes number of round for encryption. If the size of block is 128 bits, then r, the number, is
r
20
b 16, 24 and 32 byte key
2. Table 4 RC6 Parameters

 a>>>b rotate the w-bit word a to the right by the amount given by the least
significant lg w bits of b

Key Schedule

The key schedule of RC6-w/r/b is similar to the key schedule of RC5-w/r/b. The user supplies a key of b
bytes. From this key, 2r + 4 words (w bits each) are derived and stored in the array S [0, 2r + 3]. This
array is used in both encryption and decryption

Encryption

The encryption process in RC6 is relatively simple. RC6 consist of four w-bit registers (A, B, C, D) which
is used to store the initial input plain text and the final output cipher text is also stored in the same
register. The first byte of plaintext or cipher text is placed in the least significant byte of A; the last byte
of plaintext or cipher text is placed into the most significant byte of D. The pseudo-code for the
encryption is given below.

Input : Plain text stored in four w-bit input registers A, B, C, D

Number of r rounds

w-bit round keys S[0,,2r + 3] Output : Cipher Text stored in A, B, C, D Procedure : B = B + S[0];

D = D + S[1];

for i = 1 to r do

4.3.1 Structure of the RC6 Algorithm


Decryption

t = (B (2B + 1)) log w; u = (D (2D + 1)) log w; A = ((A t) u) + S[2i];

C = ((C u) t) + S[2i+1]; (A, B, C, D) = (B, C, D, A);

A = A + S[2r+2]; C = C + S[2r+3];

RC6 algorithm contains four components they are

Ajeeknya DY Patil School Of Engineering


“Secure file storage on cloud computing using hybrid cryptography ”
1. Basic Operation, (2) Key Schedule, (3) Encryption and (4) Decryption

Basic Operation

For all variants, RC6- w/r/b operates on units of four w-bit words using the following six basic
operations. The base-two logarithm of w will be denoted by lg w.

o a + b integer addition modulo 2w

o a – b integer subtraction modulo 2w

o a Ã…b bitwise exclusive-or of w-bit words

o a X b integer multiplication modulo 2w

o a<<<b rotate the w-bit word a to the left by the amount given by the least significant lg w
bits of b

Decryption operation performs in a similar way as encryption. The main difference is that the cipher
text is given as input and produce output as plain text. The pseudo-code for the decryption is shown
below.

C = C + S[2r+3]; A = A + S[2r+2];

for i = r downto 1 do

(A, B, C, D) = (D, A, B, C);

u = (D (2D + 1)) log w; t = (B (2B + 1)) log w;

C = ((C – S[2i+1]) t) u;

A = ((A – S[2i]) u) t;

D = D – S[1];

B = B – S[0];

Ajeeknya DY Patil School Of Engineering


“Secure file storage on cloud computing using hybrid cryptography ”

Chapter 6. Existing system


EXISTING SYSTEM:

In existing framework single calculation is utilized for information encode and unravel
reason. Yet, utilization of single calculation isn't achieve elevated level security. On the off
chance that we utilize single symmetric key cryptography calculation than we need to
confront security issue on the grounds that in this kind of calculation applies a solitary key
for information encode and interpret. So key transmission issue happen while sharing key
into multiuser climate. Public key cryptography calculations achieve high security however
most extreme postponement is required for information encode and translate.

 more data storage needs turning over to the cloud, finding a secure and efficient data
access structure has become a major research issue

 Security techniques are not applied in the protection of offloaded data from attacks.

 Once uploaded and shared, the data owner inevitably loses control over the data,
opening the door to unauthorized data access.

Ajeeknya DY Patil School Of Engineering


“Secure file storage on cloud computing using hybrid cryptography ”

Chapter 7. Proposed system

PROPOSED SYSTEM:

Selectively sharing data files on the cloud becomes a burden on the data owner as the
hierarchy grows (the access privileges increase in number) and/or as the access restrictions
become more complex due to an increase in the sensitivity of the file segments. A trivial
solution involves the data owner to use public key encryption. This solution would require
the data owner to encrypt the same part of the data file once for each data user being granted
access then upload the resulting cipher texts to the cloud. The data users would then fetch
their uniquely encrypted parts of the file from the cloud and utilize their private keys to
decrypt them. This method ensures that no unprivileged data user will gain access to any part
of the data file even if that user is able to download the cipher texts from the cloud.
However, on a large scale, public key encryption becomes an inefficient solution due to the
increase in the number of encryptions and large storage spaces required. Therefore, the
challenge is to provide the data owners with an efficient, secure and privilege-based method
that allows them to selectively share their data files among multiple data users while
minimizing the required cloud storage space needed to store the encrypted data segments.
 Requiring less network communication.

 We present multiple data file partitioning techniques and propose a privilege-based


access structure that facilitate data sharing in hierarchical settings.

 A new security layer is added to encrypt the data of the task before transferring to the
cloud side by using AES encryption technique.

Ajeeknya DY Patil School Of Engineering


“Secure file storage on cloud computing using hybrid cryptography ”

Chapter 8 . Challenges

Secure file storage on the cloud using hybrid cryptography presents several challenges
that need to be addressed to ensure robust protection of data. Here are some common
challenges:

1. Key Management: Hybrid cryptography involves using both symmetric and asymmetric encryption,
which requires managing keys effectively. The challenge lies in securely generating, storing, and
distributing keys to authorized users while preventing unauthorized access.
2. Secure Key Exchange: Ensuring a secure key exchange between parties is critical. Transmitting keys
securely over the internet without being intercepted by malicious actors is a challenge, especially
when dealing with asymmetric keys during the initial setup.
3. Performance Overhead: Hybrid cryptography may introduce performance overhead due to the use
of both symmetric and asymmetric encryption algorithms. Asymmetric encryption tends to be
slower compared to symmetric encryption, which can impact file storage and retrieval speed.
4. Compatibility and Interoperability: Compatibility issues might arise when different systems or
applications use different encryption algorithms or key formats. Ensuring interoperability across
various platforms and technologies can be a challenge.
5. Trust and Security Assurance: Trusting the security of third-party cloud service providers is crucial.
Ensuring that the cloud storage provider implements robust security measures, including
encryption protocols and access controls, is essential for maintaining the security of stored files.
6. Regulatory Compliance: Compliance with various data protection regulations (such as GDPR,
HIPAA, etc.) while storing encrypted files on the cloud adds complexity. Meeting compliance
requirements without compromising the security of the stored data is a significant challenge.
7. Data Integrity and Authenticity: Maintaining data integrity and ensuring the authenticity of stored
files is crucial. Implementing measures to detect unauthorized modifications or tampering of files
during storage or transmission is challenging in a hybrid encryption environment.
8. Scalability: Ensuring scalability while maintaining security in a hybrid cryptography setup can be
challenging. As the volume of data grows, managing encryption keys, access controls, and
maintaining performance becomes more complex.

To address these challenges, organizations implementing secure file storage using hybrid
cryptography must invest in robust encryption technologies, employ secure key management
practices, regularly update security protocols, and conduct thorough risk assessments to identify
potential vulnerabilities. Collaboration with experienced security professionals and adherence to
best practices can help mitigate these challenges and enhance the overall security of cloud-based
file storage systems.

Ajeeknya DY Patil School Of Engineering


“Secure file storage on cloud computing using hybrid cryptography ”

Chapter 9 Project Planning

SRNO TASK 11/12/23 1/1/24 27/2/24 13/3/24 26/3/24 29/4/24 30/4/24

1 Planning and
Research

2 Infrastructure
Setup

3 System Design
and
Development

4 Testing and
Quality
Assurance

5 Deployment and
Implementation

6 Maintenance and
Support

Ajeeknya DY Patil School Of Engineering


“Secure file storage on cloud computing using hybrid cryptography ”

Chapter 10. Project design


a) System architecture

b)Data flow diagram

Ajeeknya DY Patil School Of Engineering


“Secure file storage on cloud computing using hybrid cryptography ”

c) Use case diagram


Use case diagram of data owner

Use case diagram of data user

Ajeeknya DY Patil School Of Engineering


“Secure file storage on cloud computing using hybrid cryptography ”

Use case diagram of Admin

Use case diagram of cloud

d)Class diagram

Ajeeknya DY Patil School Of Engineering


“Secure file storage on cloud computing using hybrid cryptography ”

d)Sequence diagram

e) Activity diagram

Ajeeknya DY Patil School Of Engineering


“Secure file storage on cloud computing using hybrid cryptography ”

Ajeeknya DY Patil School Of Engineering


“Secure file storage on cloud computing using hybrid cryptography ”

Chapter 11. Conclusion and future scope

CONCLUSION
The various benefits gave by the cloud have driven numerous huge staggered associations to
store and share their information on it. This paper starts by calling attention to significant
security concerns information proprietors have when sharing their information on the cloud.
Next, the most generally executed and explored information sharing plans are briefly
examined uncovering purposes of shortcoming in each. To address the worries, this paper
proposes a Privilege-based Multilevel Organizational Data sharing plan that permits
information to be shared efficiently and safely on the cloud. Parcels an information file into
numerous sections dependent on client advantages and information affectability. Each
section of the information file is then common relying upon information client advantages.
We officially demonstrate that is secure against adaptively picked plaintext assault accepting
that the DBDH presumption holds. Our extensive presentation and reproduction
examinations with the three most delegate plans show that can significantly decrease the
computational multifaceted nature while limiting the extra room. Our proposed conspire
establishes a framework for future characteristic based, secure information the executives
and savvy contract improvement
Future scope
The future scope of secure file storage on cloud computing using hybrid cryptography appears
promising due to the growing reliance on cloud-based services and the increasing concerns
regarding data security and privacy. Here are some potential areas of future development and
opportunities for this technology:

1. Enhanced Security Measures: Continuous improvements in encryption algorithms, key


management, and access control will likely lead to more robust security measures. This could
involve advancements in hybrid cryptography techniques, including the integration of quantum-
resistant algorithms as the threat landscape evolves.
2. Regulatory Compliance: Stricter data protection regulations globally (such as GDPR, CCPA) are
driving organizations to adopt stronger security protocols. Implementing advanced cryptographic
techniques for secure file storage could assist in complying with these regulations.
3. Cloud Service Providers (CSPs): CSPs are likely to focus more on offering enhanced security
features as a competitive advantage. They may integrate hybrid cryptography solutions into their
platforms to attract and retain customers concerned about data security.
4. Integration of Emerging Technologies: Integration with emerging technologies like blockchain
or homomorphic encryption could offer additional layers of security, ensuring data integrity and
confidentiality.

Ajeeknya DY Patil School Of Engineering


“Secure file storage on cloud computing using hybrid cryptography ”
5. User-Friendly Interfaces: Developing more user-friendly interfaces and tools for managing
encryption keys, accessing encrypted files, and monitoring security could encourage wider
adoption among non-technical users.
6. Quantum Computing Challenges: The emergence of quantum computing poses a potential
threat to existing cryptographic methods. Future research might focus on developing hybrid
cryptography resilient to quantum attacks to ensure long-term data security.
7. AI and Machine Learning Integration: Utilizing AI and machine learning algorithms for threat
detection and anomaly identification within encrypted data without compromising security could
be a key area of future research.
8. Cost Optimization: Finding ways to implement these advanced security measures without
significantly increasing costs will be crucial. Optimizing resource usage, scalability, and efficiency of
cryptographic processes will be a focus.
9. Collaboration and Standardization: Collaboration among industry experts and standardization
bodies to establish best practices and standards for hybrid cryptography implementation could
drive widespread adoption and interoperability.
10. Security Education and Awareness: Educating users and organizations about the importance and
benefits of secure file storage using hybrid cryptography will be essential to foster trust and
promote adoption.

In conclusion, the future scope of secure file storage on cloud computing using hybrid
cryptography is promising, given the increasing emphasis on data security and the ongoing
advancements in encryption technologies. Continuous innovation, improved usability, regulatory
compliance, and addressing emerging challenges like quantum computing will shape the evolution
of this field.

Ajeeknya DY Patil School Of Engineering


“Secure file storage on cloud computing using hybrid cryptography ”
Chapter 13. Reference

1. Anjali Patil, Nimisha Patel, Dr. Hiren Patel. (2016). Secure data sharing using cryptography
in a cloud environment. Far East Journal of Electronics and Communications, 18(4), 521–
546.
2. Bilal Habib, Bertrand Cambou, DuaneBooher, Christopher Philabaum.(2017).
3. Secure data sharing in cloud storage using key aggregation cryptography. International
Journal of Pure and Applied Mathematics, 119(16), 3257-3262.
4. Sharma and K. Sharma(2017), “ Secure File Storage and Sharing in Cloud Computing
using Hybrid Cryptography”.
5. Mr. Rohit Barvekar, Mr. ShrajalBehere, Mr. Yash Pounikar, Ms. Anushka Gulhane (2018).
Security in Cloud Computing using Cryptographic Algorithms.
6. Mr. Rohit Barvekar, Mr. ShrajalBehere, Mr. Yash Pounikar, Ms. Anushka Gulhane(2018),
“Secure File Storage and Sharing in Cloud Computing using Hybrid Cryptography”
7. P. Kumar and P. Singh(2019) , “Secure File Storage and Sharing in Cloud Computing
using Hybrid Cryptography”.
8. M.A. Khan, M.A. Rahman, and M. Islam(2020), “A Hybrid Encryption Scheme for Cloud
Storage Security”.
9. S.S.S Sharma and S. Kumari(2021), “Enhanced Security for Cloud Storage using Hybrid
Cryptography”

Ajeeknya DY Patil School Of Engineering

You might also like