Final Review
Final Review
By
Guide
123003003 - Abitha A
Lavanya M
123003164 - Nila B
Asst.Prof III
123003220 - Sethana Shree P
AIM OF THE PROJECT
2
LITERATURE SURVEY
TITLE OF THE AUTHOR NAME ADVANTAGES OF THE DISADVANTAGES OF THE
PAPER PAPER PAPER
Design and M.A. Hossain, A. Ullah, The algorithm intents to come with some Encryption is that all parties involved in
Development of a Novel N.I. Khan, M.F. solutions that will reduce the security communication have to exchange the key
Symmetric Algorithm for Alam,2019 threats and ensure far better security to the used to encrypt the message before they can
Enhancing Data Security data stored in cloud and overcome some decrypt it.
in Cloud Computing security issue with the data stored in .
Hybrid encryption G. Viswanath, P.V. The proposed framework contains data Lack of Data Encryption Non-encrypted
framework for securing Krishna,2020 uploading, slicing, indexing, encryption, network transmissions and data are
big data storage in multi- distribution, decryption, retrieval and vulnerable to attacks,Poor Regulatory
cloud environment merging process. results prove the Compliance The adherence to compliance
superiority of the proposed algorithm and best practices becomes complicated
compared to the bench mark algorithms. when you use a DDOS Attack
Homomorphic M. Louk, H. Lim,2015 Data remains secure and private in Requires either application modifications or
encryption in mobile untrusted environments, like public clouds dedicated and specialized client-server
multi cloud computing or external parties. ...Eliminates tradeoff applications in order to make it work
between data usability and data privacy functionally. 3
LITERATURE SURVEY
TITLE OF THE AUTHOR ADVANTAGES OF THE PAPER DISADVANTAGES OF PAPER
PAPER NAME
Using Fully Homomorphic I. Jabbar,2016 Traditional encryption schemes to encrypt Partially Homomorphic Encryption (PHE)
Encryption to secure cloud the remoted data before sending to the cloud such as RSA and Paillier schemes are
computing provider has been most widely used insufficient to secure cloud computing
technique to bridge this security gap. because these schemes allow to perform
Homomorphic encryption allows to perform only one operation on the encrypted data
computations on encrypted data without of client.
decryption.
Security Techniques for data K. Jakimoski, 2016 The proposed techniques are suggested for The proposed work has a lot of issues that
protection in cloud computing data protection in cloud computing, they are should be considered in order to have
SSL (Secure Socket Layer) Encryption, improved data security in the cloud
Intrusion Detection System; Multi Tenancy computing, like proper usage of
based Access Control, etc. administrative privileges,data recovery and
boundary defense in the cloud.
Performance analysis of D. Chandravathi, This paper presents modified RSA (MRSA) The weakness of RSA lies in the generation
modified RSA and RSA D.P.V. encryption scheme clustering of prime of Prime numbers. This is achieved by a
Homomorphic encryption Lakshmi,2017 numbers for the generation of keys for new classification technique in modified
encryption and decryption is done which RSA (MRSA).
scheme for Cloud data fastens the process of encryption. 4
security.
LITERATURE SURVEY
TITLE OF THE AUTHOR NAME ADVANTAGES OF THE PAPER DISADVANTAGES OF THE
PAPER PAPER
Secure Cloud Computing Maha Tebaa, El Hajii,2019 Cloud Computing offers a number of These cloud providers must provide
through Homomorphic benefits and services to its customers who guarantees on the protection of privacy
Encryption pay the use of hardware ,software and sensitive data stored in their data
resources on demand which they can centers shared between multiple clients
access via internet without the need of a using the concept of virtualization.
large storage system capacity and without
paying any equipment maintenance fees
A novel cryptographic Ankit Dhamija, October 2015 Design for cloud architecture which There are large number of information,
and steganographic ensures secure data transmission from the huge file size, therefore someone can
approach for secure cloud client's organization to the servers of the suspect about it. If this approach is
data migration Cloud Service provider (CSP). We have gone in the wrong hands such as
used a combined approach of hackers, terrorist, criminals then this
cryptography and steganography because can be very much critical.
it will provide a two way security to the
data being transmitted on the network.
Secure User Data in Pronika, S.S.Tyagi, 2021 The proposed different security algorithms Proposed algorithms are helpful for past
Cloud Computing Using to eliminate the concerns regarding data requirement. In future several
Encryption algorithms loss. Algorithms like: RSA, DES, AES, comparisons with different approaches
Blowfish have been used ensure the and results to show effectiveness of
security of data on cloud proposed framework can be provided.
5
EXISTING SYSTEM METHODOLOGIES
Effective light weight homomorphic cryptographic algorithm contains two layers of
encryption.
The methods encrypt data with a 16-byte (128-bit) block cipher and a 16-byte (128-
bit) key to enhance the encryption’s complexity.
6
EXISTING SYSTEM
METHODOLOGIES
SECOND LAYER:A Multiplicative Homomorphic Schemes which utilizes
properties of RSA.
The second layer is based on asymmetric cryptography.
7
WORK FLOW
ENCRYPTION PROCESS
DECRYPTION PROCESS
8
Key Generation Process
• The key is the critical component of the algorithm in the process of encryption
and decryption.
• The diffusion and confusion techniques used to generate the proposed algorithm
strengthen the key.
• The strength of key generation results in increased security, better encryption
complexity, and decreased knowledge of the key by attackers. Two keys will be
generated from the Key.
• The first will be used to decrypt the data, while the second will be used as an entry
key in the key expansion process.
• The key expansion requires a 128-bit length, and the key is split into seven sub-
keys (K1, K2, K3, K4, KK1, KK2, SK).
9
Encryption Process
• The technique used for converting data from an identifiable type into an
understandable form using diffusion and confusion strategies is named
cryptography.
• The encryption block process is the algorithm works on seven rounds to reduce
energy usage.
• Each round is based on basic arithmetic to increase the security rate .
10
F-Function
• The F-Function approach consists of numerous non-linear and linear operations
that ensure the complex dependence of output bits on input bits.
• This mechanism, referred to as confusion and diffusion.
• Confusion - Making relationship between encryption key and ciphertext as
complex as possible.
• Diffusion – Making each plaintext bit affect as many ciphertext bits as possible.
11
Output snapshots
12
Matlab Snapshots
Histogram of Plain
Image
Histogram of Cipher
Image
13
Matlab Snapshots
Correlation:
14
Comparison of Encryption time
we have compared various lightweight cryptographic algorithms and symmetric and
asymmetric algorithms with our proposed algorithm and we have calculated encryption time.
15
Comparison of Throughput and Time complexity
We have calculated the throughput and time complexity for our
proposed algorithm
Throughput
Time Complexity 16
Comparison of Block size, Key size, No of rounds
17
Cloud Storage by AWS S3 bucket using Django
We have created an AWS S3 bucket to download and upload the files using Django.
18
Choosing the encrypted image to upload into Amazon s3
19
Uploaded files using Django into Aws s3
20
Download Files from AWS s3
21
Image downloaded from AWS which is stored in AWS
22
Encrypted Image downloaded from AWS
23
Conclusion
The result of the proposed algorithm outperforms another Lightweight
Cryptographic Algorithm. (HIGHT,RC6) and some of the symmetric and
asymmetric algorithm (AES, BLOWFISH, HOMOMORPHIC
RSA,HOMOMORPHIC ELGAMAL) in regard to the size of the ciphertext,
encryption time, throughput, and security level. The Proposed Lightweight
Homomorphic Cryptographic algorithm with double layer gives more security and
encryption, decryption process is more faster than any other lightweight
cryptographic algorithms(Hight,RC6) and symmetric and asymmetric
algorithms(AES, Blowfish, Elgamal, DES,RSA). We have analysed the encryption
time,throughput, comparative analysis with lightweight cryptographic
algorithm(Hight, RC6) and implemented the upload and download of data from
AWS S3 using Django.
24
REFERENCE LINKS
• BASE PAPER LINK:
• https://reader.elsevier.com/reader/sd/pii/S2666603022000033?token=61
101D3B09AECD34A7BA181BD9125E46D2241EB0447D71FECEEF4
60D6FF976CAFF9A2FCA43E2B428490B3EAD6B31F1FC&originRe
gion=eu-west-1&originCreation=20230226065629
• REFERENCE LINKS:
• https://www.scirp.org/journal/paperinformation.aspx?paperid=95684
• https://arxiv.org/abs/1409.0829
• https://www.sciencepublishinggroup.com/journal/paperinfo?journalid=
238&doi=10.11648/j.iotcc.20160402.12
25