You are on page 1of 10

VISVESVARAYA TECHNOLOGICAL UNIVERSITY

"Jnana Sangama", Machhe, Belagavi- 590018

Synopsis on
DATA STORAGE IN CLOUD USING SPLIT-MERGE
HYBRID CRYPTOGRAPHIC TECHNIQUES
Bachelor of Engineering
in
Computer Science and Engineering
by

Saddala Sai Charan 1AY18CS100


Perumala Neeraj 1AY18CS075

Tatireddy Varun Sai Reddy 1AY18CS128

Under the guidance of


Mrs. VARALAKSHMI B D
ASSISTANT PROFESSOR

DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING


ACHARYA INSTITUTE OF TECHNOLOGY
(Affiliated to Visvesvaraya Technological University, Belgaum)
2021-2022
CHAPTER 1
INTRODUCTION
Data Storage in Cloud using split-merge and hybrid cryptography Techniques

CHAPTER 1
INTRODUCTION
1.1 Introduction
Today’s technology advance at a breakneck pace, providing users with a plethora of
appealing services to alleviate the strain of large-scale data storage and maintenance.
Many online services are available nowadays that offer all services and data online, such
as e-messaging, e-billing, e-transactions, and email. Many of these services allowed users
to submit data electronically to be processed. This data may be any sensitive information
that the consumer needs to keep secure from malicious behavior, as the leakage of
sensitive information can cause significant harm to the user. There is a strong demand for
data security and protection from unauthorized users and to protect our sensitive data
from such malicious attacks, we must establish a sound, safe, and protected system.

There is a need to translate sensitive data into a format that is incomprehensible to an


intruder, and only approved users can decipher what data is being transmitted.
Cryptography is one of the most popular methods for meeting this requirement by
enabling us to convert a message into a type that is unreadable by a malicious attacker.
Authentication is a top priority for maintaining security standards such as data
confidentiality and integrity, as it prevents any unauthorized user from sniffing the data to
be exchanged between two or more parties. To solve this problem, the owner must
encrypt the data before uploading it to the cloud service provider, and only approved
users should have access to the decryption key. The use of cryptography protects the user
data and ensures that the sensitive information of the user is safe and secure from
unauthorized user access and malicious attacks. The lack of a key makes illegal access a
difficult job for the attacker.

By using hybrid cryptography to provide data protection in the cloud, we can overcome
the drawbacks faced by most of current approaches to data storage, which use a single
cryptography algorithm. The problem of stable key transmission and storage arises when

Department of CS&E, Acharya IT, Bangalore


Data Storage in Cloud using split-merge and hybrid cryptography Techniques

using a public key cryptography algorithm. By using cloud platforms for our work, which
is Secure data storage using split-merge cryptographic techniques, we gain the advantages
and benefits the cloud platforms offer, from ease of scaling to cost cutting and speed. The
objective of this application is to provide cloud storage application at no extra cost and to
increase cloud security by employing cryptographic and split-merge techniques, which
involves splitting data into multiple parts for increased security

1.2 Description
There is a lot of data being generated in the world today. This data requires be processed
into usable form and be stored in a secure location. Cloud proves to be one of the best
data storages. Data security and privacy are one among the most important considerations
today, even when storing data in the cloud. A need arises for techniques and methods to
keep data safe.

Cryptography is one such technique which can used, by converting data into an unusable
form by making use of keys. Current systems employ single cryptography, which may not
be secure enough. By using hybrid cryptography to provide data protection in the cloud,
we can improve security in the current system, this method can be a solution to data
security, and is both efficient and safe. A problem of stable key transmission and storage
arises when using a public key cryptography algorithm. Hybrid cryptography and file
splitting solves a few of these security problems of data protection.

Department of CS&E, Acharya IT, Bangalore


Data Storage in Cloud using split-merge and hybrid cryptography Techniques

1.3 Objectives
The primary goal of this project is to provide and simulate an effective solution to face
the challenges and solve security issues that exists in cloud computing. Cloud Computing
is the impending need of computing which is used for the IT Industries It is one of the
hottest topics in research areas. Scalability and Flexibility increases for the computing
services. Cloud Computing is the fastest growing technology for IT Industry. The
Information is being transmitted via the network therefore security is one of the main
problems or issue. The Application is deployed on the Cloud and for the secure
transmission of the data we will be using AES Algorithm in our project because of its
advantages in terms of CPU utilization, time for Encryption and Key Size. This Project
will explore the deployment of Application on the Cloud and increases the security level
by implementing DES, RSA Algorithm, and AES Algorithm for secure file handling and
Encryption.

1.4 Problem Statement


Almost everything is online in today’s world, and we use the cloud to store the data. Data
can be any sensitive information that the user wants to keep secure from malicious
attacks. Since the leakage of sensitive information could cause significant harm to the
consumer, there is a strong demand for data security and protection from unauthorized
users. We must develop a safe and secure system for users to protect sensitive data from
malicious attacks. Cloud storage is in demand, as it provides numerous benefits, from
economic benefits to ease of use. Cryptography, which allows data to be translated into an
unreadable format, is one of the most important techniques for meeting this requirement.
Unauthorized access to data must also be reduced. This can be achieved by using split and
merge techniques. We need to develop a mechanism to ensure that security standards
such as data confidentiality, integrity, and authentication are met, and that data is
translated into an unreadable format and stored on the cloud using hybrid cryptography to
prevent unauthorized access.

Department of CS&E, Acharya IT, Bangalore


CHAPTER 2
LITERATURE SURVEY
Data Storage in Cloud using split-merge and hybrid cryptography Techniques

CHAPTER 2
LITERATURE SURVEY

Sl.no Paper Title and Name of the Techniques/ Limitations


Publication details authors Algorithms &
Advantages

1 A Performance Selecting the


Comparison of Data Cryptography algorithms for
Encryption Algorithms algorithms, our project
IEEE -7803-9421 performance analysis of based on their
Aamer AES, DES, 3DES, time and space
Nadeem, Blowfish complexity
Published on : 2015 Dr M. algorithms,RSA
Younus
Javed

Department of CS&E, Acharya IT, Bangalore


Data Storage in Cloud using split-merge and hybrid cryptography Techniques

2 Cloud Application Security Orobosade Use of both symmetric We came to


using Hybrid Cryptography Alabi, Boniface and asymmetric know that how
Kayode Alese, cryptographic algorithms the combination
Research gate Aderonke for high level security of symmetric and
Thompson, asymmetric
Arome Junior algorithms helps
Published on : may 2020 Gabriel in getting the
flexibility of
both time and
space complexity
along with high
security

3 A Hybrid Cryptosystem Meenakshi splitting and the merging This is the main
Approach for File Security sharama, Vishu mechanism of a file part that is is
by using Merging Sharma . different from
Mechanism others we
included in our
IJARS project by which
the encrypted
Published on: 2018 files are less
prone to the third
party attacks and
provide security

Department of CS&E, Acharya IT, Bangalore


Data Storage in Cloud using split-merge and hybrid cryptography Techniques

Secure File Storage in Swarna C, Securing the file on cloud We came to


4 Marrynal S.
Cloud Computing Using know the merits
Hybrid Eastaff
of hybrid
Cryptography Algorithm cryptographic
techniques over
IJARS single algorithm
Published on: 2018

5 Implementation of Secure Supriya Kute, Data confidentiality, To achieve more


File Storage on Cloud with S.B. Jhaveri fragmentation,It also security, file is
Owner-defined Attributes gives us the guarantee of split into
for Encryption the the delegated multiple
computer results fragments
IEEE according to file
size & stored on
Published on: 2018 multiple nodes
instead of being
stored on single
node

Department of CS&E, Acharya IT, Bangalore


Data Storage in Cloud using split-merge and hybrid cryptography Techniques

REFERENCES

[1].Aamer Nadeem, Dr M. Younus Javed. “A Performance Comparison of Data


Encryption Algorithms”. 7803-9421. IEEE, 2015 .

[2].Orobosade Alabi, Boniface Kayode Alese, Aderonke Thompson, Arome Junior


Gabriel. “cloud application security using hybrid cryptography”. research gate,
May 2020.

[3].Swarna C, Marrynal S. Eastaff. “Secure File Storage in Cloud Computing Using


Hybrid cryptography”.IJARS, 2018 Cryptography Algorithm.

[4].Meenakshi sharama, Vishu Sharma . “A Hybrid Cryptosystem Approach for File


Security by using Merging Mechanism”. IEEE, 2018.

[5].Supriya Kute, S.B. Jhaveri . “Implementation of Secure File Storage on Cloud


with Owner-defined Attributes for Encryption” . IEEE, 2018.

Department of CS&E, Acharya IT, Bangalore

You might also like