Professional Documents
Culture Documents
Synopsis on
DATA STORAGE IN CLOUD USING SPLIT-MERGE
HYBRID CRYPTOGRAPHIC TECHNIQUES
Bachelor of Engineering
in
Computer Science and Engineering
by
CHAPTER 1
INTRODUCTION
1.1 Introduction
Today’s technology advance at a breakneck pace, providing users with a plethora of
appealing services to alleviate the strain of large-scale data storage and maintenance.
Many online services are available nowadays that offer all services and data online, such
as e-messaging, e-billing, e-transactions, and email. Many of these services allowed users
to submit data electronically to be processed. This data may be any sensitive information
that the consumer needs to keep secure from malicious behavior, as the leakage of
sensitive information can cause significant harm to the user. There is a strong demand for
data security and protection from unauthorized users and to protect our sensitive data
from such malicious attacks, we must establish a sound, safe, and protected system.
By using hybrid cryptography to provide data protection in the cloud, we can overcome
the drawbacks faced by most of current approaches to data storage, which use a single
cryptography algorithm. The problem of stable key transmission and storage arises when
using a public key cryptography algorithm. By using cloud platforms for our work, which
is Secure data storage using split-merge cryptographic techniques, we gain the advantages
and benefits the cloud platforms offer, from ease of scaling to cost cutting and speed. The
objective of this application is to provide cloud storage application at no extra cost and to
increase cloud security by employing cryptographic and split-merge techniques, which
involves splitting data into multiple parts for increased security
1.2 Description
There is a lot of data being generated in the world today. This data requires be processed
into usable form and be stored in a secure location. Cloud proves to be one of the best
data storages. Data security and privacy are one among the most important considerations
today, even when storing data in the cloud. A need arises for techniques and methods to
keep data safe.
Cryptography is one such technique which can used, by converting data into an unusable
form by making use of keys. Current systems employ single cryptography, which may not
be secure enough. By using hybrid cryptography to provide data protection in the cloud,
we can improve security in the current system, this method can be a solution to data
security, and is both efficient and safe. A problem of stable key transmission and storage
arises when using a public key cryptography algorithm. Hybrid cryptography and file
splitting solves a few of these security problems of data protection.
1.3 Objectives
The primary goal of this project is to provide and simulate an effective solution to face
the challenges and solve security issues that exists in cloud computing. Cloud Computing
is the impending need of computing which is used for the IT Industries It is one of the
hottest topics in research areas. Scalability and Flexibility increases for the computing
services. Cloud Computing is the fastest growing technology for IT Industry. The
Information is being transmitted via the network therefore security is one of the main
problems or issue. The Application is deployed on the Cloud and for the secure
transmission of the data we will be using AES Algorithm in our project because of its
advantages in terms of CPU utilization, time for Encryption and Key Size. This Project
will explore the deployment of Application on the Cloud and increases the security level
by implementing DES, RSA Algorithm, and AES Algorithm for secure file handling and
Encryption.
CHAPTER 2
LITERATURE SURVEY
3 A Hybrid Cryptosystem Meenakshi splitting and the merging This is the main
Approach for File Security sharama, Vishu mechanism of a file part that is is
by using Merging Sharma . different from
Mechanism others we
included in our
IJARS project by which
the encrypted
Published on: 2018 files are less
prone to the third
party attacks and
provide security
REFERENCES