SlideShare una empresa de Scribd logo
SECURE FILE STORAGE
ON CLOUD USING
HYBRID CRYPTOGRAPHY
INTRODUCTION
 Cloud storage is a convenient and reliable
option to store and retrieve data.
 The information over internet is becoming a
critical issue.
 Cryptography concept is used for securing
storage system of cloud.
LITERATUR SURVEY
 Punam V Maitri, Aruna Verma ”Data
security and cloud computing issues”
 Joseph Selvanayagam, Akash Singh,
Joans Michael, and Jaya Jeswani
“Secure File Storage on Cloud using
cryptography”
EXISTING SYSTEM
 User selects the file from the local
storage.
 The file will be uploaded to the cloud
after getting encrypted.
 It uses AES algorithms.
 It needs some more time for encryption
and decryption process.
PROPOSED SYSTEM
 The Proposed system is designed to provide
high security to the data.
 It converts the plain text into a cipher text
and store it into the cloud.
 It uses AES, 3DES and RC6 algorithms for
data encryption and decryption.
 It uses multithreading technique.
MODULE DESCRIPTION
Register
User can register themselves by giving username, password,
address, email-id and phone number.
Login
User can login using credentials.
Data encryption
Data will be encrypted using AES,3DES and RC6 algorithms.
 File upload
Encrypted file will be uploaded to the cloud.
 Request for file
If user wants to download a file then user needs to
request for a file to the cloud.
 Data decryption
Data will be decrypted by using AES, 3DES and
RC6 algorithm.
SYSTEM ARCHITECTURE
SYSTEM REQUIREMENTS
Hardware requirements
 System : Intel Core i3
 Hard Disk : 250 GB
 RAM : 4 GB
 Processor : i3 7th Generation
Software requirements
 Operating system : Windows 7
and above
 Front End :HTML,CSS, JavaScript
 Back End :SQLite Server
CONTEXT FLOW DIAGRAM(CFD)
Admin
User
Secure file
storage
system
Cloud
Login
Login
Encrypt
Decrypt
DATA FLOW DIAGRAM(DFD)
Plaintext Encryption Cipher text
User
Decryption
Plaintext
Decrypted
file
Cloud
Login
Request for file
File
Mail ID and
Password
Level-1 DFD for System
DFD LEVEL-2 for ADMIN
Admin Login
View
user
details
Database
Mail ID and
Password
Check for mail ID
And Password
Login
Successful
If mail ID and Password mismatch
DFD LEVEL-2 for USER
User
Encryption
Decryption
session started
Register
Login Database
Mail ID and
Password
Check for Mail ID
And Password
Login
successful
If Mail ID and Password mismatch
Error if user already exists
ER Diagram
14
ALGORITHMS USED
Advanced Encryption Standard (AES)
 In present day cryptography, AES is widely adopted
and supported in both hardware and software.
 AES uses symmetric key encryption.
 It takes plaintext in blocks of 128,192,
and 256 bits.
 Stronger and faster than Triple-DES.
step1: Substitute Bytes/ Sub Bytes
 AES defines a 16*16 matrix of byte values, called an S-box,
That contains a permutation of all possible 256 8-bit values.
Below table is the inverse S-box. It will be used during
decryption process.
step2: Shift row transformation
Rules of shifting rows,
1) Row 1 = No shifting
2) Row 2 =1 byte left shift
3) Row 3 = 2 byte left shift
4) Row 4 = 3 byte left shift
Step 3 : MixColumn
The mix column transformation operates on each column individually.
Step 4 : AddRoundKey
The state array which is 128 bit value is XORed with the AddRoundKey value
and it will generate cipher text.
 Triple DES is used to increase the
complexity and reduce the weakness of
DES.
 3DES is based on the DES algorithm.
 It works by taking three 64-bit keys.
 It has two-key and three-key versions.
 In the two-key version, the same
algorithm runs three times , but uses k1
for the first and last step.
Triple Data Encryption Standard (3DES)
3DES with three keys(Encryption and Decryption)
Mathematical equation
i. C1=E(K1,P)
ii. C2=E(K2,C1) => C2=E(K2,E(K1,P)
iii. C3=E(K3,C2)
C3=E(K3,E(K2,C1))
C3=E(K3,E(K2,E(K1,P)))
Decryption
Mathematical equation
i. C2=D(K3,C3)
ii. C1=D(K2,C2) => C1=D(K2,D(K1,C3)
iii. P=D(K1,C1)
P=D(K1,D(K2,C2))
P=D(K1,D(K2,D(K1,C3)))
Rivest Cipher 6 (RC6)
 It was developed based on RC5 and does its
job quicker than RC5.
 RC6 uses four working block size registers in
its algorithmic computations.
 It has a block size of 128 bits
 It supports key sizes of 128,192, and 256bits
up to 2040 bits.
How RC6 works
Steps:
1) Pre Whitening
2) Loop of similar round
3) Post Whitening
ADVANTAGES AND DISADVANTAGES
Advantages
 Less time is used for encryption
and decryption process.
 It provides safe backup.
 Data is kept secured on cloud
which avoids unauthorized
access.
Disadvantage
 Needs active internet
connection to connect with
cloud server.
FUTURE SCOPE
 We can also improve the system by supporting more file formats.
 In Future we can use different algorithms for encryption and decryption.
CONCLUSION
 In today’s world data security and privacy protection are the primary
problems.
 We exploit the technique of cryptography encryption to protect data files
in the cloud
 Cryptography techniques convert original data into Cipher text. So only
legitimate users can access data from the cloud storage server.
THANK YOU

Más contenido relacionado

La actualidad más candente

CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail SecurityCRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
Jyothishmathi Institute of Technology and Science Karimnagar
 
Public Key Cryptosystem
Public Key CryptosystemPublic Key Cryptosystem
Public Key Cryptosystem
Devakumar Kp
 
Message authentication
Message authenticationMessage authentication
Message authentication
CAS
 
Key management and distribution
Key management and distributionKey management and distribution
Key management and distribution
Riya Choudhary
 
Security Mechanisms
Security MechanismsSecurity Mechanisms
Security Mechanisms
priya_trehan
 
Trusted systems
Trusted systemsTrusted systems
Trusted systems
ahmad abdelhafeez
 
Image Encryption in java ppt.
Image Encryption in java ppt.Image Encryption in java ppt.
Image Encryption in java ppt.
Pradeep Vishwakarma
 
Email Security : PGP & SMIME
Email Security : PGP & SMIMEEmail Security : PGP & SMIME
Email Security : PGP & SMIME
Rohit Soni
 
CRYPTOGRAPHY & NETWORK SECURITY
CRYPTOGRAPHY & NETWORK SECURITYCRYPTOGRAPHY & NETWORK SECURITY
Cryptography on cloud
Cryptography on cloudCryptography on cloud
Cryptography on cloud
krprashant94
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
Pa Van Tanku
 
Cryptography ppt
Cryptography pptCryptography ppt
SHA- Secure hashing algorithm
SHA- Secure hashing algorithmSHA- Secure hashing algorithm
SHA- Secure hashing algorithm
Ruchi Maurya
 
12 symmetric key cryptography
12   symmetric key cryptography12   symmetric key cryptography
12 symmetric key cryptography
drewz lin
 
AES-Advanced Encryption Standard
AES-Advanced Encryption StandardAES-Advanced Encryption Standard
AES-Advanced Encryption Standard
Prince Rachit
 
Cryptographic algorithms
Cryptographic algorithmsCryptographic algorithms
Cryptographic algorithms
Anamika Singh
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacy
Pawan Arya
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
Vivek Gandhi
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
kusum sharma
 
Substitution cipher and Its Cryptanalysis
Substitution cipher and Its CryptanalysisSubstitution cipher and Its Cryptanalysis
Substitution cipher and Its Cryptanalysis
Sunil Meena
 

La actualidad más candente (20)

CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail SecurityCRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
 
Public Key Cryptosystem
Public Key CryptosystemPublic Key Cryptosystem
Public Key Cryptosystem
 
Message authentication
Message authenticationMessage authentication
Message authentication
 
Key management and distribution
Key management and distributionKey management and distribution
Key management and distribution
 
Security Mechanisms
Security MechanismsSecurity Mechanisms
Security Mechanisms
 
Trusted systems
Trusted systemsTrusted systems
Trusted systems
 
Image Encryption in java ppt.
Image Encryption in java ppt.Image Encryption in java ppt.
Image Encryption in java ppt.
 
Email Security : PGP & SMIME
Email Security : PGP & SMIMEEmail Security : PGP & SMIME
Email Security : PGP & SMIME
 
CRYPTOGRAPHY & NETWORK SECURITY
CRYPTOGRAPHY & NETWORK SECURITYCRYPTOGRAPHY & NETWORK SECURITY
CRYPTOGRAPHY & NETWORK SECURITY
 
Cryptography on cloud
Cryptography on cloudCryptography on cloud
Cryptography on cloud
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
SHA- Secure hashing algorithm
SHA- Secure hashing algorithmSHA- Secure hashing algorithm
SHA- Secure hashing algorithm
 
12 symmetric key cryptography
12   symmetric key cryptography12   symmetric key cryptography
12 symmetric key cryptography
 
AES-Advanced Encryption Standard
AES-Advanced Encryption StandardAES-Advanced Encryption Standard
AES-Advanced Encryption Standard
 
Cryptographic algorithms
Cryptographic algorithmsCryptographic algorithms
Cryptographic algorithms
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacy
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Substitution cipher and Its Cryptanalysis
Substitution cipher and Its CryptanalysisSubstitution cipher and Its Cryptanalysis
Substitution cipher and Its Cryptanalysis
 

Similar a secure file storage on cloud using hybrid Cryptography ppt.pptx

Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES) Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES)
Hardik Manocha
 
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHMSECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
Journal For Research
 
IMAGE SECURITY BY 3 DES.pdf
IMAGE SECURITY BY 3 DES.pdfIMAGE SECURITY BY 3 DES.pdf
IMAGE SECURITY BY 3 DES.pdf
DhamuKing1
 
Identity Based Secure Distributed Storage Scheme
Identity Based Secure Distributed Storage SchemeIdentity Based Secure Distributed Storage Scheme
Identity Based Secure Distributed Storage Scheme
Venkatesh Devam ☁
 
Apache Hadoop India Summit 2011 talk "Provisioning Hadoop’s MapReduce in clou...
Apache Hadoop India Summit 2011 talk "Provisioning Hadoop’s MapReduce in clou...Apache Hadoop India Summit 2011 talk "Provisioning Hadoop’s MapReduce in clou...
Apache Hadoop India Summit 2011 talk "Provisioning Hadoop’s MapReduce in clou...
Yahoo Developer Network
 
Design and Simulation Triple-DES
Design and Simulation Triple-DESDesign and Simulation Triple-DES
Design and Simulation Triple-DES
chatsiri
 
Ijcnc050208
Ijcnc050208Ijcnc050208
Ijcnc050208
IJCNCJournal
 
IJSRED-V2I2P10
IJSRED-V2I2P10IJSRED-V2I2P10
IJSRED-V2I2P10
IJSRED
 
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and SteganographyIRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET Journal
 
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEMSECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
Journal For Research
 
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET -  	  Multi Authority based Integrity Auditing and Proof of Storage wit...IRJET -  	  Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET Journal
 
Password based encryption
Password based encryptionPassword based encryption
Password based encryption
Sachin Tripathi
 
262 265
262 265262 265
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
IRJET Journal
 
A Secure MSSS Scheme and AES Encryption over Cloud Data
A Secure MSSS Scheme and AES Encryption over Cloud DataA Secure MSSS Scheme and AES Encryption over Cloud Data
A Secure MSSS Scheme and AES Encryption over Cloud Data
Editor IJCATR
 
The new rocket science stuff in microsoft pki
The new rocket science stuff in microsoft pkiThe new rocket science stuff in microsoft pki
The new rocket science stuff in microsoft pki
Nathan Winters
 
IRJET- Data Security in Cloud Computing through AES under Drivehq
IRJET- Data Security in Cloud Computing through AES under DrivehqIRJET- Data Security in Cloud Computing through AES under Drivehq
IRJET- Data Security in Cloud Computing through AES under Drivehq
IRJET Journal
 
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
IRJET Journal
 
Psdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storagePsdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storage
ZTech Proje
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
patisa
 

Similar a secure file storage on cloud using hybrid Cryptography ppt.pptx (20)

Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES) Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES)
 
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHMSECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
 
IMAGE SECURITY BY 3 DES.pdf
IMAGE SECURITY BY 3 DES.pdfIMAGE SECURITY BY 3 DES.pdf
IMAGE SECURITY BY 3 DES.pdf
 
Identity Based Secure Distributed Storage Scheme
Identity Based Secure Distributed Storage SchemeIdentity Based Secure Distributed Storage Scheme
Identity Based Secure Distributed Storage Scheme
 
Apache Hadoop India Summit 2011 talk "Provisioning Hadoop’s MapReduce in clou...
Apache Hadoop India Summit 2011 talk "Provisioning Hadoop’s MapReduce in clou...Apache Hadoop India Summit 2011 talk "Provisioning Hadoop’s MapReduce in clou...
Apache Hadoop India Summit 2011 talk "Provisioning Hadoop’s MapReduce in clou...
 
Design and Simulation Triple-DES
Design and Simulation Triple-DESDesign and Simulation Triple-DES
Design and Simulation Triple-DES
 
Ijcnc050208
Ijcnc050208Ijcnc050208
Ijcnc050208
 
IJSRED-V2I2P10
IJSRED-V2I2P10IJSRED-V2I2P10
IJSRED-V2I2P10
 
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and SteganographyIRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
 
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEMSECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
 
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET -  	  Multi Authority based Integrity Auditing and Proof of Storage wit...IRJET -  	  Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
 
Password based encryption
Password based encryptionPassword based encryption
Password based encryption
 
262 265
262 265262 265
262 265
 
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
 
A Secure MSSS Scheme and AES Encryption over Cloud Data
A Secure MSSS Scheme and AES Encryption over Cloud DataA Secure MSSS Scheme and AES Encryption over Cloud Data
A Secure MSSS Scheme and AES Encryption over Cloud Data
 
The new rocket science stuff in microsoft pki
The new rocket science stuff in microsoft pkiThe new rocket science stuff in microsoft pki
The new rocket science stuff in microsoft pki
 
IRJET- Data Security in Cloud Computing through AES under Drivehq
IRJET- Data Security in Cloud Computing through AES under DrivehqIRJET- Data Security in Cloud Computing through AES under Drivehq
IRJET- Data Security in Cloud Computing through AES under Drivehq
 
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
 
Psdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storagePsdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storage
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 

Último

Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
Federico Razzoli
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 

Último (20)

Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 

secure file storage on cloud using hybrid Cryptography ppt.pptx

  • 1. SECURE FILE STORAGE ON CLOUD USING HYBRID CRYPTOGRAPHY
  • 2. INTRODUCTION  Cloud storage is a convenient and reliable option to store and retrieve data.  The information over internet is becoming a critical issue.  Cryptography concept is used for securing storage system of cloud.
  • 3. LITERATUR SURVEY  Punam V Maitri, Aruna Verma ”Data security and cloud computing issues”  Joseph Selvanayagam, Akash Singh, Joans Michael, and Jaya Jeswani “Secure File Storage on Cloud using cryptography”
  • 4. EXISTING SYSTEM  User selects the file from the local storage.  The file will be uploaded to the cloud after getting encrypted.  It uses AES algorithms.  It needs some more time for encryption and decryption process.
  • 5. PROPOSED SYSTEM  The Proposed system is designed to provide high security to the data.  It converts the plain text into a cipher text and store it into the cloud.  It uses AES, 3DES and RC6 algorithms for data encryption and decryption.  It uses multithreading technique.
  • 6. MODULE DESCRIPTION Register User can register themselves by giving username, password, address, email-id and phone number. Login User can login using credentials. Data encryption Data will be encrypted using AES,3DES and RC6 algorithms.
  • 7.  File upload Encrypted file will be uploaded to the cloud.  Request for file If user wants to download a file then user needs to request for a file to the cloud.  Data decryption Data will be decrypted by using AES, 3DES and RC6 algorithm.
  • 9. SYSTEM REQUIREMENTS Hardware requirements  System : Intel Core i3  Hard Disk : 250 GB  RAM : 4 GB  Processor : i3 7th Generation Software requirements  Operating system : Windows 7 and above  Front End :HTML,CSS, JavaScript  Back End :SQLite Server
  • 10. CONTEXT FLOW DIAGRAM(CFD) Admin User Secure file storage system Cloud Login Login Encrypt Decrypt
  • 11. DATA FLOW DIAGRAM(DFD) Plaintext Encryption Cipher text User Decryption Plaintext Decrypted file Cloud Login Request for file File Mail ID and Password Level-1 DFD for System
  • 12. DFD LEVEL-2 for ADMIN Admin Login View user details Database Mail ID and Password Check for mail ID And Password Login Successful If mail ID and Password mismatch
  • 13. DFD LEVEL-2 for USER User Encryption Decryption session started Register Login Database Mail ID and Password Check for Mail ID And Password Login successful If Mail ID and Password mismatch Error if user already exists
  • 15. ALGORITHMS USED Advanced Encryption Standard (AES)  In present day cryptography, AES is widely adopted and supported in both hardware and software.  AES uses symmetric key encryption.  It takes plaintext in blocks of 128,192, and 256 bits.  Stronger and faster than Triple-DES.
  • 16.
  • 17. step1: Substitute Bytes/ Sub Bytes  AES defines a 16*16 matrix of byte values, called an S-box, That contains a permutation of all possible 256 8-bit values.
  • 18. Below table is the inverse S-box. It will be used during decryption process.
  • 19. step2: Shift row transformation Rules of shifting rows, 1) Row 1 = No shifting 2) Row 2 =1 byte left shift 3) Row 3 = 2 byte left shift 4) Row 4 = 3 byte left shift
  • 20. Step 3 : MixColumn The mix column transformation operates on each column individually.
  • 21. Step 4 : AddRoundKey The state array which is 128 bit value is XORed with the AddRoundKey value and it will generate cipher text.
  • 22.  Triple DES is used to increase the complexity and reduce the weakness of DES.  3DES is based on the DES algorithm.  It works by taking three 64-bit keys.  It has two-key and three-key versions.  In the two-key version, the same algorithm runs three times , but uses k1 for the first and last step. Triple Data Encryption Standard (3DES)
  • 23. 3DES with three keys(Encryption and Decryption) Mathematical equation i. C1=E(K1,P) ii. C2=E(K2,C1) => C2=E(K2,E(K1,P) iii. C3=E(K3,C2) C3=E(K3,E(K2,C1)) C3=E(K3,E(K2,E(K1,P)))
  • 24. Decryption Mathematical equation i. C2=D(K3,C3) ii. C1=D(K2,C2) => C1=D(K2,D(K1,C3) iii. P=D(K1,C1) P=D(K1,D(K2,C2)) P=D(K1,D(K2,D(K1,C3)))
  • 25. Rivest Cipher 6 (RC6)  It was developed based on RC5 and does its job quicker than RC5.  RC6 uses four working block size registers in its algorithmic computations.  It has a block size of 128 bits  It supports key sizes of 128,192, and 256bits up to 2040 bits.
  • 26. How RC6 works Steps: 1) Pre Whitening 2) Loop of similar round 3) Post Whitening
  • 27. ADVANTAGES AND DISADVANTAGES Advantages  Less time is used for encryption and decryption process.  It provides safe backup.  Data is kept secured on cloud which avoids unauthorized access. Disadvantage  Needs active internet connection to connect with cloud server.
  • 28. FUTURE SCOPE  We can also improve the system by supporting more file formats.  In Future we can use different algorithms for encryption and decryption.
  • 29. CONCLUSION  In today’s world data security and privacy protection are the primary problems.  We exploit the technique of cryptography encryption to protect data files in the cloud  Cryptography techniques convert original data into Cipher text. So only legitimate users can access data from the cloud storage server.