0% found this document useful (0 votes)
468 views

Secure File Storage Using Hybrid Cryptography

Nowadays the growing use of mobile devices and advancement in networking technology is leading us to secure file storage over the network
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
468 views

Secure File Storage Using Hybrid Cryptography

Nowadays the growing use of mobile devices and advancement in networking technology is leading us to secure file storage over the network
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Volume 5, Issue 12, December – 2020 International Journal of Innovative Science and Research Technology

ISSN No:-2456-2165

Secure File Storage Using Hybrid Cryptography


Aditya SadanandGhadi
Research student, Department of Information Technology
B. K. Birla College of Arts, Science, and Commerce (Autonomous)
Kalyan, India

Abstract:- Nowadays the growing use of mobile devices for all people. But for that again the decryption technique
and advancement in networking technology is leading us has to be used to translate it back into the original text.
to secure file storage over the network. Cryptography is
the most popular technology used for all types of data III. LITERATURE SURVEY
security. This discussed paper is a broad survey of the
different approach which is used for securely storing A literature review is nothing but an objective, aim, or
files, and sharing it over the network. This proposed summary of whatever research has done relevant to a certain
scheme will also ensure the whole model to have topic. The following published articles have been referred to
confidentiality, integrity, and availability mechanisms to create a base for my project. Following are some papers
be implemented in it. been referred to:-

Keywords:- Cryptography, Confidentiality, Integrity, Secure file storage in the cloud using Hybrid
Availability, Storage, and Security. Cryptography;

I. INTRODUCTION [1] Author - Punam V. Maitri, Aruna Verma, Year – 2016


Description – The paper focuses on how files are securely
The aim of the project is to create an encrypted and stored on a cloud platform. Also, it discusses the problem of
secured file storage system to transfer files within users in a using only a single algorithm to encrypt the file and how
remote location. This system will require an input that is ineffective it will be on the cloud. This paper splits the file
successfully encrypted using any of the algorithm into blocks and each block is encrypted using AES,
techniques and store them anywhere. The uploaded file can blowfish, RC6algorithm. The key information about which
be downloaded by other users, but to read the data present in file uses which algorithm is sent to the receiver using
it, they have to decrypt the file using the decryption steganography modern approach to file system integrity
algorithm and the information provided about the file within checking [2]
the users by the owner. The system uses public-key
cryptographic techniques like RSA and Symmetric key Author – M. Malarvizhi, J. Angela JennifaSujana, T.
cryptography like AES. Hashing techniques like static Revathi, Year – 2014
hashing and dynamic hashing are used for performing Description - The main focus of the paper is on the integrity
integrity. Due to the encryption of data, confidentiality is of files and restoring the files if integrity is violated. The
also achieved in the process. The project is also open to new proposed system uses a pattern of each protected file to
challenges and future changes to other advanced determine its modification. The method used for pattern
technologies in keeping the data secured. generation is cryptographic hash functions. The system also
uses a database that stores the files that need to be protected
II. OBJECTIVES and their hash codes. To check the integrity of the file the
hash code of the file is produced and checked with one in
The proposed paper meets the required security needs the database. If the file is successfully tested positively then
and implementation of the data center of the cloud server. access is granted otherwise the administrator gets alerted
The paper uses some symmetric key cryptography and if it is saved copy is available of the same file then the
techniques in addition to stenography techniques. The idea file is restored.
of splitting and merging adds on to meet the principle of
data security. This hybrid approach when implemented in a New approach to user authentication using digital
cloud server makes the remote server more secure and thus, signature [3]
helps the cloud providers to do their work more securely.
For data security and privacy protection problems, the Author - Jerzy Kaczmarek, MichałWróbel, Year -2008
fundamental challenge of separation of sensitive data and Description – This paper describes an approach to the
access control is fulfilled. The Cryptography technique integrity of files and restoring the files if any problem is
converts original data into ciphertext. The cryptography arising in the future. This proposed course uses a pattern of
technique is divided into symmetric-key cryptography and each protected file to determine its modification. Methods
public-key cryptography. So only an authorized person can used for pattern generation are cryptographic hash functions.
access data from the cloud server. Ciphertext data is visible This system uses a database that stores the names of all files

IJISRT20DEC144 www.ijisrt.com 185


Volume 5, Issue 12, December – 2020 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
that are to be protected and their hash codes. To check the Author - Shakeeba S. Khan, Prof. R. R. Tuteja, Year – 2015
integrity of the file the hash code of the file is produced and Description -The proposed algorithm is a Multilevel
checked with one in the database. After the file is verified Encryption and Decryption algorithm. Only the authorized
then only access is granted else the administrator is been user can access the data. Even if some intruder gets the data,
alerted about the problems and a saved copy of the same file he must have to decrypt the data at each level which is a
is restored safely. Secure file sharing using cryptographic very difficult task without a valid key. It is time-consuming
techniques in the cloud [4] as multiple encryption and decryption take place. Secure
data sharing using cryptography in a cloud environment [10]
Author - RashiDhagat, Purvi Joshi, Year– 2016 Description
– The paper focuses on providing the facility to securely Author - Anjali Patil, Nimisha Patel, Dr. Hiren Patel, Year –
store and share the data in a group using cloud technology 2016
for storage. The method discussed in the paper uses group Description - In this paper, The system satisfies
signature and encryption techniques. The advantage of this confidentiality, integrity, and authentication. Provides access
proposed method is that data owners can store the file control. The confidentiality of data is dependent on a trusted
without showing their true identity to others in the cloud. crypt server.
Public key exchange known as (PKA) [5]
Data Security Issues are the main issue in the existing
Author - Bilal Habib, Bertrand Cambou, DuaneBooher, system. Due to the multi-tenant characteristics of the cloud,
Christopher Philabaum, Year – 2017 the previous security mechanisms are no longer suitable for
Description – This paper provides a new method to data in the cloud. Some of the problem areas following:
implement the public key infrastructure. The PKI has the
disadvantage that the mathematical relation between public [1] Due to the high scalability, service, and location
and private between the public and the private key is transparency function of the cloud computing model, all
maintained. Paper proposes a new PKI scheme with kinds of servers and data of the cloud platform have no fixed
addressable elements (PKA). The approach proposed infrastructure and security boundaries. In the event of a
removes the mathematical relation between public and security breach, it is difficult to isolate a particular resource
private keys using addressable cryptographic tables. Secure that has a threat or has been compromised.
data sharing in cloud storage using key aggregation [2] According to service models of Cloud computing, cloud
cryptography [6] services may be owned by many providers. As there is a
conflict of interest, it is difficult to deploy a whole security
Author - Tulip Dutta, Amarjyoti Pathak, Year – 2016 measure.
Description – This paper discusses how a secret key can be [3] Due to the openness of the cloud and sharing virtualized
shared with other users to whom access needs to be given. It resources by multitenant, user data may be accessed by other
discusses the problem with using a single key to encrypt all unauthorized users. The word cryptography means changing
data and using different keys for different files. The solution the message data into a scrambled code that can be retrieved
described in the paper tries to address both the problem back n the open network. The cryptography technique
using key aggregation. In key aggregation, different data secures the sensitive information in unsecured transmission
files are encrypted with different keys and then for networks and which can be read by the intended recipient.
decryption, a single aggregated key is used. The encryption
algorithm used is AES and the system is being implemented A cryptography algorithm needs a key along with a
in java using the key store data structure. Achieving cloud message of any format to form the ciphertext. The level of
security using third party auditor, MD5, and identity- based security of ciphertext depends on the strength of the
encryption [7] cryptographic algorithm and the privacy of the
cryptographic key used. Thus the first security has been
Author -Bhale Pradeep Kumar Gajendra, Vinay Kumar given. Further security can be improved using yet another
Singh, More Sujeet, Year – 2016 Data hiding technique, Steganography.
Description – This paper overcomes the security tradeoff
and improves the performance of data transmission and In this proposed system AES, DES, algorithms are
increases security. Also, MD5 hashes are no longer used to provide block-wise security to data for the user file
considered cryptography secure. An approach to hybrid security. Key information security is implemented by using
cryptography on cloud environment [8] the LSB steganography technique. The purpose of Key
information is to decide the link between the available
Author -Mr. Rohit Barvekar, Mr. ShrajalBehere, Mr. Yash algorithm and key file encryption. By using this technique
Pounikar, Ms. Anushka Gulhane, Year -2018 the file is fragmented into three parts and each part uses a
Description - The proposed security mechanisms will unique algorithm technique. Multithreading is used to
prevent confidential data from being misused making the encrypt every part of the file simultaneously for improving
system more reliable. High speed: The proposed method the performance.
will make encryption and decryption with proper keys much
faster than usual. Security in Cloud Computing using LSB technique is used to insert Data encryption Keys
Cryptographic Algorithms [9] into the cover image. The valid user receives an email with
Stego-Image of the key. The reverse process of encryption is

IJISRT20DEC144 www.ijisrt.com 186


Volume 5, Issue 12, December – 2020 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
applied for file decryption purposes. Symmetric key The high-level architecture of the current secure file
cryptography algorithms are AES, DES. These algorithms storage system is represented in Figure 1. The current
accomplished high-level security but taking more time for system uses symmetric key cryptography and steganography
data encode and decode. Steganography hides the secret data techniques. Symmetric key algorithms like AES, blowfish,
existence into an envelope. RC6 algorithms are used to provide block-wise security to
data in the files. Each file is split into 8 blocks and every
In this technique existence of data is not visible to block is encrypted using a different algorithm. Using LSB
users. The only valid receiver knows about the data's steganography keys are inserted into cover images and then
existence. Secret data of user hide into an image file. After cover images are shared with the user via email. The
adding text into the image file it looks like a normal image existing system only focuses on confidentiality and does not
file. DES algorithm is probably used for text-encode and consider integrity and authentication. Proposed System
decode. Architecture –
Three bit LSB technique used for image
steganography. We can hide a huge amount of images using The main disadvantage of the current system is it does
the LSB steganography technique. AES is a symmetric-key not consider integrity and authentication. Also, it uses
cryptography algorithm. It supports three types of keys. The stenography to share secret keys between users. To
128-bit key requires 10 rounds, the 192-bit key requires 12 overcome these drawbacks we propose a system that
rounds and the 256-bit key requires 14 rounds. The provides integrity and authentication along with
advantage of the modified AES algorithm provides better confidentiality. Also, our system uses asymmetric key
performance in terms of delay. cryptography rather than stenography to share secret keys
among users. We plan to use asymmetric key cryptography
The size of DES the key is 128 bit. In this algorithm, over stenography as it would be better to use asymmetric
many formats are executed randomly so the user cannot key cryptography as our system is using a digital signature.
even guess the steps of the algorithm. Provide high
throughput is the advantage of cryptography algorithms. In our proposed system there are two main entities: an
owner of the file and another with whom the owner has
Improved DES algorithm uses a 112-bit key size for shared access. The owner will upload the file that is required
data encode and decode. The key generation process is done to be stored at a remote location or needs to be shared with
using the random key generation technique. It provides other users. The owner gives access to other users by
security to data. The disadvantage of this algorithm is the sharing the required metadata to decrypt the file using an
essential maximum time for converting data into ciphertext asymmetric cryptosystem.
because it operates on a single byte at a time.
A user with shared access can download the file from a
IV. METHODOLOGY remote storage and view the contents of the file.

The research process aims to detect cloud storage


security using hybrid cryptography. In this scheme, there is
the use of symmetric key cryptography and stenography
techniques. This paper's content is highly focused on the
security of files in the cloud. The data of the above
algorithm is collected from google or another platform of a
research paper. The above techniques and algorithms are a
suitable method for protecting files from social platforms
Figure 2 High level system
and the cloud.

V. MODELING AND ANALYSIS

The system overview is presented in this Section.


Existing System Architecture

Figure 1 Existing system architecture[1] Figure 3 Purposed system architecture

IJISRT20DEC144 www.ijisrt.com 187


Volume 5, Issue 12, December – 2020 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
In our proposed system there are four blocks each [4]. Bhandari, A., Gupta, A., & Das, D. (2016). Secure
having different functionality. algorithm for cloud computing and its applications.
 The file is divided into chunks and then every chunk is 2016 6th International Conference - Cloud System and
encrypted using the AES algorithm and a digital Big Data Engineering (Confluence), 188–192.
signature for the file is generated. A metadata file is https://doi.org/10.1109/confluence.2016.7508111
created consisting of secret keys and information about [5]. Taha, A. A., Elminaam, D. S. A., &Hosny, K. M.
file chunks. (2018). AN IMPROVED SECURITY SCHEMA FOR
 On the server, files are stored and a table is maintained to MOBILE CLOUD COMPUTING USING HYBRID
map hash codes with file names. CRYPTOGRAPHIC ALGORITHMS. Far East
 A different server is maintained as a trusted center for Journal of Electronics and Communications, 18(4),
the distribution of the public key. 521–546. https://doi.org/10.17654/ec018040521
 Lastly, there is a block for downloading the file. The file [6]. Kranthi Kumar K, Devi T,(2018). Secured Data
downloaded is decrypted then it's digital signature is Transmission in Cloud Using Hybrid Cryptography.
verified before showing the file to the user. International Journal of Pure and Applied
Mathematics, 119(16), 3257-3262.
VI. RESULTS AND DISCUSSION [7]. Shimbre, N., & Deshpande, P. (2015). Enhancing
Distributed Data Storage Security for Cloud
The stored file is completely secured, as the file is Computing Using TPA and AES Algorithm. 2015
being encrypted by using symmetric key cryptography and International Conference on Computing
stenography techniques. The system is very secure and Communication Control and
robust. Data of the users issecured on a cloud server which Automation. doi:10.1109/iccubea.2015.16
helps in avoiding unauthorized access from the outside [8]. Ronak Karani ,TejasChoudhari , Anindita Bhajan ,
world.. Data security is a major priority. This system can be Madhu Nashipudimath 2020). Secure File Storage
implemented in the banking and corporate sectors to Using Hybrid Cryptography.2020 INTERNATIONAL
securely transfer confidential data. JOURNAL OF INNOVATIVE RESEARCH IN
TECHNOLOGY, 6(9).
VII. CONCLUSION [9]. Shakeeba S. Khan, Prof.R.R. Tuteja, “Security in
Cloud Computing using Cryptographic Algorithms”,
Based on the survey it was identified that secure file 2015
storage and sharing would not only require confidentiality [10]. Anjali Patil, Nimisha Patel, Dr. Hiren Patel “Secure
but also authentication and integrity. To overcome these data sharing using cryptography in cloudenvironment”,
drawbacks a architecture is proposed which tries to provide 2016
a complete solution for securely storing the files. [11]. Fortine Mata, Michael Kimwele, George Okeyo,
“Enhanced Secure Data Storage in Cloud Computing
ACKNOWLEDGEMENT Using Hybrid Cryptographic Techniques (AES and
Blowfish
Special gratitude is conveyed to our prof. Swapna
Augustine Nikale, Department of information technology of
B. k. Birla College of Arts, Science & Commerce
(Autonomous) Kalyan.

REFERENCES

[1]. Maitri, P. V., & Verma, A. (2016). Secure file storage


in cloud computing using a hybrid cryptography
algorithm. 2016 International Conference on Wireless
Communications, Signal Processing and Networking
(WiSPNET), 1635–1638.
https://doi.org/10.1109/wispnet.2016.7566416
[2]. Shaikh, S., & Vora, D. (2016). Secure cloud auditing
over encrypted data. 2016 International Conference on
Communication and Electronics Systems
(ICCES). doi:10.1109/cesys.2016.7889842
[3]. Gajendra, B. P., Singh, V. K., & Sujeet, M. (2016).
Achieving cloud security using third party auditor,
MD5, and identity-based encryption. 2016
International Conference on Computing,
Communication, and Automation (ICCCA), 1304–
1309. https://doi.org/10.1109/ccaa.2016.7813920

IJISRT20DEC144 www.ijisrt.com 188

You might also like