Secure File Storage On Cloud Computing Using Cryptographic Algorithm
Secure File Storage On Cloud Computing Using Cryptographic Algorithm
https://doi.org/10.22214/ijraset.2022.41631
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue IV Apr 2022- Available at www.ijraset.com
Abstract: Cloud computing is one among today’s hottest research areas thanks to its ability to scale back costs related to
computing while increasing scalability and adaptability for computing services. Cloud computing is Internet based
computing thanks to shared resources, software and knowledge are provided to consumers on demand dynamically.
Cloud computing is one among the fastest growing technology of the IT trade for business. Since cloud computing share
disseminated resources via the network in the open environment, hence it makes security problems vital for us to develop
the cloud computing applications. Cloud computing security has become the leading explanation for hampering its
development. Cloud computing security has become a hot topic in industry and academic research. This system will
explore data security of cloud in cloud computing by creating unique key and encryption by using that key.
Keywords: cloud computing, cloud security, data security, encryption, elliptic curve cryptography, AES.
I. INTRODUCTION
The demand of internet for wireless communication is rising day by day and therefore there's a need of security to guard similar
communication by druggies on unsecure wireless channels. Data transferred over the communication channels is susceptible to
attacks because of sensitive information it contain.
To defend the data from external trouble the conception of Cryptography is surfaced. Cryptography is defined as “ An art of writing
a secret law” Methodology of writing similar law is cipher where a normal textbook is converted into cipher textbook which is
generally called Encryption whereas the rear practice of converting a cipher textbook into normal textbook is known as Decryption.
Cryptography can be distributed as classical and ultramodern, classical cryptography ways were used to Antipode wiretapping and
communication interception problems whereas the ultramodern cryptography ways are more secure and useful for high speed
dispatches. The plain textbook will be accepted as input and cipher after encryption will be the affair. Using key, stoner can decide
the original plain textbook after decryption
To crack the translated lines, a stoner needs an encryption key. While it's possible to crack translated information, utmost hackers do
not have access to the quantum of computer processing power they would need to decrypt information. Authentication processes,
which bear creating a stoner name and word. The customer lists the people who are authorized to pierce information stored on the
pall system.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 1803
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue IV Apr 2022- Available at www.ijraset.com
In [11] a hybrid approach is employed combining the AES and RSA for improved security where data is encrypted by AES and key
management is performed by RSA. For securing the Bluetooth transmissions a hybrid approach is employed in [12]where AES keys
are encrypted by RSA and this approach takes the benefits of both AES and RSA thus highly secure. For the transmission of digital
motion images AES is employed with DES which will provide better security as AES cannot withstand algebraic attacks [13]. In
[14] encryption is done by AES first, then DES is employed for encryption after encrypting with AES and DES, data is encrypted
with combined approach AES and DES which gave complex results or cipher code that's difficult to break. AES has been used with
various algorithms before like RSA, DSA, Blowfish and lots of more. In this paper we are going to analyze the performance of AES
combining this algorithm with Elliptic curve cryptography (ECC). User will input the text files, then the performance are going to
be analyzed on the idea of varied parameters like time, storage, avalanche effect and correlation.
III. DESIGN
A. Step 1: Software Concept
The first step is to identify a need for the new system. This will include determining whether a business problem or opportunity
exists, conducting a feasibility study to work out if the proposed solution is cost effective, and developing a project plan.
This process may involve end users who come up with a thought for improving their work. Ideally, the process occurs in tandem
with a review of the organization's strategic plan to make sure that it's getting used to assist the organization achieve its strategic
objectives. Management may have to approve concept ideas before any money is budgeted for its development.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 1804
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue IV Apr 2022- Available at www.ijraset.com
F. Step 6: Maintenance
Inevitably the system will need maintenance. Software will definitely undergo change once it is delivered to the customer. There are
many reasons for the change. Change could happen because of some unexpected input values into the system. In addition, the
changes in the system could directly affect the software operations. The software should be developed to accommodate changes that
would happen during the post implementation period.
IV. RESULTS
A. Put Screenshots Of Output
1) Admin Login and Sharing Files with User
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 1805
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue IV Apr 2022- Available at www.ijraset.com
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 1806
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue IV Apr 2022- Available at www.ijraset.com
V. CONCLUSION
The main aim of the system is to securely store and retrieve data on the cloud that is only controlled by the owner of the data.
Cloud storage issues of data security are solved using cryptography. Data security is achieved by using AES and ECC Algorithms.
Users are most concerned about data security, so virtualization security and data security are the main problem of the cloud
computing security. We concern here data security with Elliptic curve cryptography to provide confidentiality and authentication
of data between clouds. The input text file is transformed into encrypted form using AES encryption but the key is generated
through ECC (Elliptic curve cryptography). Client will use that key to decrypt the text file which is uploaded to the server in
encrypted form to get the original text file. At last analysis of AES encryption with ECC is done on the basis of different
parameters like storage requirement, encryption time, decryption time, effect and correlation. Obtained results illustrate that the
impact of this hybrid approach is significant and better than other algorithms.
VI. ACKNOWLEDGEMENT
This project work has been most practical and exciting part of my learning experience, which would be assets for future career. No
system is created entirely by an individual. Many people have helped to create this system and each of their contribution has been
valuable. Proper organization of concept and analysis of the system is due to knee interest and helping hand of my teacher and
colleagues. We would like to take this opportunity to thank all of them from the bottom of our hearts. Our deepest gratitude to our
guide Prof. Manisha Sonawane, without whose counseling this project wouldn’t have been as focused and sound. She showed a
keen interest in checking the minute details of the project work and giving valuable suggestions. With technical knowledge there
was a need of understanding and moral guidance which was also provided by him. Then Dr. Uttara. Gogate , our H.O.D. under
whose direction we could study the project thoroughly. The Honorable Principal, Dr. P.R Rodge who has always encouraged the
work of the students and made sure that all necessary resources were available to us. The Professors of our department played an
important role in the study by clearing all the doubts that arises. An important piece of the success of this project we owe to the
college Head Librarian who helped us sort through the required books. Lastly to all the fellow group members who have worked
very hard for the completion, of this project. Also thank you to every individual who has , in some way or another contributed to
this project research.
REFERENCES
[1] V.S. Mahalle , A. K. Shahade, “Enhancing the Data Security in Cloud by Implementing Hybrid (Rsa & Aes) Encryption Algorithm”, IEEE , INPAC,Oct .2014.
[2] Abu Marjan, Palash Uddin, “Developing Efficient Solution to Information Hiding through text steganography along with cryptography”, IEEE, IFOST ,
October 2014.
[3] P. S. Bhendwade and R. T. Patil, “Steganographic Secure Data Communication” ,IEEE, International Conference on Communication and Signal Processing,
April2014.
[4] Tingyuan Nye and Tang Zhang "An investigation of DES and Blowfish encryption algorithm‟, in Proc. IEEE Region 10 Conference, Jan. 2009.
[5] Achill Buhl, "Rising Security Challenges in Cloud Computing", in Proc. of World Congress on Information and correspondence Technologies , Dec. 2011.
[6] Dr. S.H Patil and Rohini Khalkar, “Data Security Technique In Cloud Storage”, International Journal of Computer Engineering and Technology, vol.4,Issue. 2,
June 2013.
[7] M. Nagle, D. Nilesh, “The New Cryptography Algorithm with High Throughput”, IEEE, ICCCI, January 2014.
[8] Wikipedia: Free Online Encyclopedia; Author – Volunteers around the world and the Wikimedia Foundation; Website Link: https://www.wikipedia.org/
[9] All You Need to Know About Encryption Algorithm : Types and Examples; Author – Noel Cata; Website Link: https://tallyfy.com/encryption/
[10] Microsoft azure cloud: https://azure.microsoft.com/en-in/account
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 1807