0% found this document useful (0 votes)
238 views14 pages

I Twin Technology11 PDF

iTwin is an innovative secure USB device that allows users to access and share files between any two online computers without security or privacy risks of cloud storage or USB flash drives. It uses two USB connectors attached to different systems that are paired using a password. Files can then be dragged and dropped between systems, with encryption providing security. The unlimited storage capacity is limited only by computer hard drive sizes.

Uploaded by

Chandhan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
238 views14 pages

I Twin Technology11 PDF

iTwin is an innovative secure USB device that allows users to access and share files between any two online computers without security or privacy risks of cloud storage or USB flash drives. It uses two USB connectors attached to different systems that are paired using a password. Files can then be dragged and dropped between systems, with encryption providing security. The unlimited storage capacity is limited only by computer hard drive sizes.

Uploaded by

Chandhan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

Chapter 1

INTRODUCTION

1.1 INTRODUCTON
A USB flash drive is a data storage device that consists of flash memory with an
integrated Universal Serial Bus (USB) interface. A Cloud Storage is also a similar
case where in the data is stored remotely and is accessed whenever needed. In Cloud
Storages the data can be stolen or misused if the username and password of an ac-
count to access the storage is hacked by someone. There are many more drawbacks
like limited storage, nosecurity, backup, tempfiles, no remote disable etc.

iTwin is a ’limitless’ secure USB device that enables users to access, edit and
share all their files and media between any two online computers anywhere in the
world. The only limit is the size of one’s computer’s hard drive. iTwin is an inno-
vative solution that allows remote file access without the security and privacy risks
of the cloud and USB flash drives. It’s very easy to access as a USB device and no
special installation is required. iTwin uses thoroughly analyzed crypto protocols and
algorithms(AES 256 bit encryption). It has features like bi-directional file access,
no temp files, remote disable, smart key generation, password support and twin trust
authentication. iTwin was invented by an Indian named Lux Anantharaman. After
achieving a Bachelors degree in Electrical and Electronic Engineering from IIT in
Chennai and a Masters degree from IISc in Bangalore, Lux worked first as an IT
security researcher at the Institute of Systems Science, Singapore and then as senior
researcher at Kent Ridge Digital Labs and the Institute for Infcomm Research.

1
1.2 AIM OF THE SEMINAR
TThe aim of this ITWIN Technology is to share a huge amount of data from one
system to other through online.

1.3 SCOPE OF THE SEMINAR


The scope of iTwin technology is To show the high security level while transfer-
ring the data and To make the sharing process simple by using USB connectors

1.4 METHODOLOGY
The general methodology of the project is represented in four modules .

•PIN THE USB: iTwin has two USB connector. Those 2 connectors are used
to share the files between 2 systems . User has to pin the one end of connector to the
home or office system and other end to the personal computer or laptop

•SECURITY: After connecting the connector to the system there is a pop up


window will be opened and asks for security password. The user has to enter the
correct and same password in both the connectors.

•DRAG AND DROP FILES: After entering the password the pop up window
will show drag and drop option.

•SHARING: The user can drag the files from one system and drop it in the USB
connector, those files will be appear in the other USB connector.

2
Chapter 2

LITERATURE REVIEW

2.1 iTWIN TECHNOLOGY


In April 2016 Gole Akshay B , Shaikh Asif M , Prof. Y.V. Kadam published paper
on the ‘iTwin technology’ mentioning USB flash drive is device that is used to store
the data. Cloud storage is also used to store the data on the middle server. But the
USB flash drive has the drawback that it is too small in size, because of that it can be
easily misplaced or lost. In case of cloud storage data can be misused if the username
and password is hacked by someone else. To overcome all these problems, iTwin is
the best solution.It is the secure USB device that can be used to access, share edit
all the files and media between any two online computers anywhere in the world. It
allows remote file access without any security and privacy risks.

2.2 iTWIN DATA SHARING DEVICE


In June 2016 Sainikhil Bheemanathini, Madhukar Pokala published paper ‘iTwin
data sharing device’mentioning iTwin cuses well evaluated crypto protocols.It has
features like no temp files, remote disable, password support and twin trust au-
thentication iTwin is an extra-ordinary solution for users who wish to work from
home.They can remotely access, edit,and share files between home and office com-
puters.iTwin bypasses cloud services to turn the physical storage in to its own net-
working solution. Moreover,iTwin is simple plug and play type device which solves
drop box limitations extensively.

3
2.3 NEW INNOVATION IN USB AND CLOUD STORAGE-iTWIN
In July 2017 Shivkumar Goel , Nehank Poilkar published a paper on ‘New Inno-
vation in USB and Cloud Storage-iTwin’ mentioning iTwin takes the idea of remote
connection and transfers it to hardware. A simple two-part USB drive allows one
user to plug it in to one computer and then snap off and hand the second part to
someone else with another computer. They will then have instant access to the other
computer. iTwin Connect shows a rare solution for catering secure connection to
your files and information from a remote location, the AES256-bit encryption tech-
nology is used in this iTwin. The iTwin works like a Peer to Peer access except the
information is shared between two computer

4
Chapter 3

SEMINAR DESCRIPTION

3.1 EXISTING SYSTEM


In the previous times there were pendrive’s to transfer the data from one system
to other system but the major drawback is storage capacity. Some wired connectors
are also used to transfer the data between two systems

3.1.1 ADVANTAGES
*No storage limitations.
*No temporary files.
*Easy to install and uninstall.
*In case of network problem files will pause.
*If one end of itwin connector is lost u can disable it.
*High security level

3.2 FEASIBILITY STUDY


Feasibility studies are undertaken within tight time constraints and normally cul-
minate in a written and oral feasibility report.We have taken a week in feasibility
study with my project members.The contents and recommendations of the feasibility
study helped as transferring of huge data by the project.It helped in taking decisions
such as which software to install and use.This study investigated the feasibility of
speed and flow rate of the data transfer between two systems. Thus we concluded
the our model is far better than when compared to the existing systems of this project.

5
3.2.1 ECONOMIC FEASIBILITY
Among the most important information contained in feasibility study is the cost-
benefit analysis. That is, an assessment of economic justification for computer-based
system. Cost-benefit analysis delineates cost for development and weights them
against tangible and intangible benefits in the system.

3.2.2 TECHNICAL FEASIBILITY


Technical analysis evaluates technical merits of the system at the same time col-
lecting additional information about performance, reliability, maintainability and
productivity. In some cases, this system analysis step also includes a limited amount
of research and design.

3.2.3 SOCIAL FEASIBILITY


Operational feasibility measures how well the solution will work in the organi-
zation and how will end-user management feels about the system. Proposed system
is helpful for all the users associated with the organization. It will allow the admin-
istrator to have up-to-date information regarding all the aspects of their users. The
decision-making process will also become faster with the use of data integration,
consolidation. So it is feasible to implement the system.

6
Chapter 4

METHODOLOGIES

4.1 PIN THE USB:


iTwin has two USB connector. Those two connectors are attached to two systems
and used to share the files between two different systems. User has to pin the one
end of connector to the home or office system desktop and other end to the personal
computer or laptop. The connectors are physical devices that seems to be same like
pendrive’s but the internal hardware is different from the other pendrive’s. These two
connectors has a virtual cloud storage

Figure 4.1: Two USB connectors

7
4.2 SECURITY:
Security means its a ’Two Factor Authentication’ for the connectors. Without
connecting one connector to the system user can’t open the files of other system. Af-
ter connecting the connector to the system there is a pop up window will be opened
and asks for security password. The user has to enter the correct and same password
in both the connectors set by the user. The user can only access the data in that two
systems. There is no loss of Data

Figure 4.2: Security

4.3 DRAG AND DROP FILES:


To transfer the data from one system to other system using the twin connectors
there will be a separate window in the system for the connector to drag and drop the
files. The main file will be in the hard disk of the system and a copy file will be
created in the connector. If both ends of connectors are removed from the systems
the copy files will be deleted, so there will be no temp files

8
Figure 4.3: Transfer from one system to other

4.4 SHARING:
The user can drag the files from one system and drop it in the USB connector
those files will be appear in the other USB connector. The sharing is so simple like a
copy paste it works same as pendrive but the sharing capacity is unlimited. Same as
the space as hard disk the user can transfer the data.

Figure 4.4: Sharing of files

9
4.5 ALGORITHM USED:

4.5.1 AES ALGORITHM


AES consist three block ciphers: AES-128/ AES-192 / AES256. Each cipher
encrypts and decrypts data in blocks of 128 bits using cryptographic keys of 128-,
192- and 256-bits, respectively. Symmetric (also known as secret-key) ciphers use
the same key for encrypting and decrypting, so the sender and the receiver must both
know and use the same secret key. All key lengths are deemed sufficient to protect
classified information up to the ”Secret” level with ”Top Secret” information requir-
ing either 192- or 256-bit key lengths. There are 10 rounds for 128-bit keys, 12
rounds for 192-bit keys and 14 rounds for 256-bit keys a round consists of several
processing steps that include substitution, transposition and mixing of the input plain
text and transform it into the final output of cipher text. The AES encryption algo-
rithm sets a number of transformations that needs to be performed for the data stored
in an array. The first step in this algorithm is to put the data into an array; after which
the cipher transformations are done over a number of encryption rounds. The counts
of rounds are decided by the key length, with 10 rounds for 128- bit keys, 12 rounds
for 192-bit keys and 14times for 256-bit keys.
•First step is substation
•Second step is transformation
•The third step is mixing columns
•Last step is exclusive OR(XOR) operation performed on each column using a dif-
ferent part of the encryption key longer keys need extra rounds to complete

Figure 4.5: AES Design

10
Chapter 5

RESULTS AND DISCUSSIONS

The Cloud looms above us all, threatening to rain down a tech torrent on to our
hard drives and memory sticks, frying their circuits into obsolescence. Thankfully,
we’re not quite there yet but the iTwin marks a step in that direction. It’s a twin pack
of USB sticks that lock into each other and can transfer files between each other over
the web - from thousands of miles apart.
Stuck together, the iTwin twins look like a double-ended USB flash memory stick.
However, there’s no real storage available in either. Instead, this natty gadget creates
a sort of wormhole through the internet, joining together the two computers that the
halves of the iTwin are plugged into.

The iTwin creates its own ”virtual storage” drive that appears as a network drive
in Windows’s My Computer area. Either computer can then fill this space with any
kind of files and folders it’s much like using a USB stick, except that there’s no actual
storage here in the traditional sense. The data isn’t uploaded to some mystical cloud
server either Getting you. The iTwin’s metal-covered body is strong and very light
- not too surprising considering there can’t be all that much to fit in, component-wise.

11
Chapter 6

CONCLUSION AND FUTURE


ENHANCEMENTS

6.1 CONCLUSION
iTwin is a extra-ordinary solution for users who wish to work from home. They
can remotely access, edit, and share files between home and office computers. iTwin
bypasses cloud services to turn your physical storage into its own networking so-
lution. Moreover, iTwin is simple plug and play type device which solves drop box
limitations extensively.The iTwin bypasses the virtual world of cloud services to turn
your physical storage into its own networking solution. For peoples who want to
maintain files up-to-date among two computers the iTwin is for them.The iTwin is a
simple and easy to use file collaboration solution, with a mix of encryption and hard-
ware authentication to create a highly-secure personal cloud. On the small scale the
iTwin is easy to use, but when expanding out into multiple pairs, it becomes clunky
and costly.

6.2 FUTURE ENHANCEMENTS

The iTwin technology has a drawback of little lack of functioning in low network
connections .There is a scope of development in the working of the iTwin according
to the functioning in low network connections or by developing the network speeds
into new generations. .

12
13

You might also like