0% found this document useful (0 votes)
65 views

Research - Paper - Secure Text Transfer

The document proposes a cloud-based secure text transfer mechanism to address security challenges of transmitting text in the cloud. It discusses how cloud computing has revolutionized data storage and sharing but also increased security concerns. Traditional text transfer methods are often vulnerable. The proposed mechanism uses advanced encryption techniques and secure communication protocols to ensure confidentiality and integrity of text data during transmission. It provides a simple user interface for easy and secure text collaboration while addressing common cloud security issues.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
65 views

Research - Paper - Secure Text Transfer

The document proposes a cloud-based secure text transfer mechanism to address security challenges of transmitting text in the cloud. It discusses how cloud computing has revolutionized data storage and sharing but also increased security concerns. Traditional text transfer methods are often vulnerable. The proposed mechanism uses advanced encryption techniques and secure communication protocols to ensure confidentiality and integrity of text data during transmission. It provides a simple user interface for easy and secure text collaboration while addressing common cloud security issues.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

Cloud Based Secure Text Transfer

Manan Sharma Utpal Chaudhary Ramneet Kaur


AIT AIT AIT
Chandigarh University Chandigarh University Chandigarh University
[email protected] [email protected] [email protected]

Abstract—Cloud computing has become an One of the main challenges in cloud-based


integral part of the digital world, offering cost- communication is ensuring the security and
effective and flexible features for data storage, confidentiality of sensitive information during
processing, and transfer. However, security transmission. Traditional methods of text transfer,
concerns have become a major challenge with such as email, are often vulnerable to interception
the increased reliance on cloud computing. In and unapproved entry. Consequently, the
particular, secure text transfer in the cloud is a creation of a secure text transfer system that can
crucial aspect of cloud computing, as it guarantee the privacy and integrity of data is of
utmost importance.
involves the transmission of sensitive
information. This research paper proposes a The way data is handled, processed, and
cloud-based secure text transfer mechanism moved in the digital world has been
that addresses the security challenges of text revolutionized by cloud computing. Cloud
transfer in the cloud environment. The computing has gained popularity as a cost-
suggested technique guarantees the effective and flexible option for people and
confidentiality, integrity, and availability of businesses to store and access their data remotely.
data during transmission, and provides a high However, with the increased reliance on cloud
computing, security concerns have become a
level of security for cloud users. We present a
major challenge. Secure text transfer is one of the
comprehensive analysis of the proposed
crucial aspects of cloud computing, as it involves
mechanism and evaluate its performance
the transmission of sensitive information such as
against various security metrics. The results of passwords, financial data, and confidential
our research demonstrate the effectiveness of business information.
the proposed mechanism in providing secure
text transfer in the cloud environment. Therefore, ensuring the security of text transfer
in the cloud is essential to maintain the data's
Keywords: Cloud Computing, Secure Text confidentiality, integrity, and availability. In this
Transfer, Confidentiality, Integrity, Availability, Research paper, we propose a cloud-based secure
Security, Data Transmission, Cloud Users, text transfer mechanism that addresses the security
Security Metrics. challenges of text transfer in the cloud
en vi ron m e nt . We pr esent a comprehensive
I. INTRODUCTION analysis of the proposed mechanism and
In recent years, the rapid development of evaluate its performance against various security
technology has changed how we do things. metrics. The results of our research demonstrate
communicate and share information. With the the effectiveness of the proposed mechanism in
increasing need for remote work and collaboration, providing secure text transfer in the cloud
the use of cloud-based storage and file-sharing environment.
platforms has become more prevalent. However, In this research paper, we present a cloud-based
as the use of these platforms continues to rise, so secure text transfer system that utilizes advanced
does the concern for data security and privacy. encryption techniques and secure communication
protocols to ensure the confidentiality and integrity
of text data. Our system provides a simple and
intuitive user interface that allows for easy and
secure text communication and collaboration
while addressing common security concerns in
cloud-based communication.

II. LITERATURE REVIEW


Gentry C. (2012) paper proposes the use of
fully homomorphic encryption (FHE) to secure Marhusin F. (2015) paper proposes a model for
data in cloud computing environments. FHE secure text transfer using symmetric key
allows computation on encrypted data without the encryption in cloud computing environments. The
need for decryption, which provides a high level of authors used the Blowfish encryption algorithm to
security. The author explained how FHE works provide security and HMAC to ensure message
and its potential use cases in cloud computing integrity. The proposed model uses a shared secret
environments. However, the use of FHE is still in key for encryption and decryption, which is
its early stages, and its high computational securely exchanged between the sender and the
complexity makes it impractical for many receiver. The authors claimed that the proposed
applications. model performs better than existing models while
maintaining high security.
Yang B. (2012) paper proposes a model for
secure data transfer in cloud computing using a
combination of symmetric and asymmetric Firdous S. (2016) paper proposes a model for
encryption algorithms. The authors used the RSA enhancing the security of cloud-based text transfer
encryption algorithm for key exchange and the using AES encryption and hash functions. The
AES encryption algorithm for message encryption. authors used the AES encryption algorithm to
The proposed model also includes a mechanism provide security and hash functions to ensure
for access control and user authentication. The message integrity. The proposed model uses a
authors claimed that the proposed model provides shared secret key for encryption and decryption,
high security and efficiency while meeting the which is securely exchanged between the sender
requirements of cloud computing environments. and the receiver. The authors claimed that the
Li Q. (2013) paper proposes a model for secure proposed model provides better security compared
text transfer in cloud computing using RSA to existing models, but they did not discuss the
encryption and digital signatures. The authors used computational complexity of the model.
RSA encryption for key exchange and message
encryption and digital signatures for message
authentication. The proposed model also includes a Kumar S. (2016) paper proposes a model for
instrument for get to control and client secure data transfer in cloud computing using
authentication. The authors claimed that the hybrid cryptography. The authors used both
proposed model provides high security and symmetric and topsy-turvy encryption
efficiency while meeting the requirements of cloud calculations to supply security. The symmetric
computing environments. key is utilized for the encryption and decoding of
the information, whereas the topsy-turvy key is
Yang L. (2014) paper proposes a model for utilized for the trade of the symmetric key. The
secure text transfer in cloud computing using RSA proposed demonstration moreover incorporates a
encryption and hash functions. The authors used mechanism for access control and user
RSA encryption for key exchange and message authentication. The authors claimed that the
encryption, and hash functions for message proposed model provides better security and
authentication. The proposed model also includes a efficiency compared to existing models.
mechanism for access control and user
authentication. The authors claimed that the
proposed model provides high security and
efficiency.
Author Year Technology Used Advantages Limitations

Craig Gentry 2012 Fully Data remains The use of FHE is


Homomorphic secure and private still in its early
encryption (FHE) in untrusted stages, and its high
environments, like computational
public clouds or complexity makes
external parties. it impractical for
many applications.
Bo Yang 2012 RSA, AES The proposed It uses too simple
encryption model also algebraic
algorithms includes a structure.
mechanism for
access control and
user
authentication
Qiming Li 2013 RSA encryption The proposed Sometimes a third
and digital model provides party is needed to
signatures high security and confirm the
efficiency while validity of public
meeting the keys.
requirements of
cloud computing
environments.
Lina Yang 2014 RSA encryption The RSA algorithm Decryption
and hash functions can be requires intensive
implemented processing on the
relatively quickly, receiver's end.
and is secure and
reliable for
sending private
information.
Mohd Fadzli 2015 Blowfish The proposed Each pair of users
Marhusin encryption model uses a needs a unique
algorithm, HMAC shared secret key key, so as the
for message for encryption and number of users
encryption decryption, which increases, key
is securely management
exchanged becomes
between the complicated.
sender and the
receiver
Saima Firdous 2016 AES encryption It uses higher Every block is
algorithm and length key sizes always encrypted
hash function. such as 128, 192, in the same way
and 256 bits for and is difficult to
encryption. Hence implement with
it makes the AES software
algorithm more
robust against
hacking.
accessible by the two parties involved, and the
messages are stored on the device rather than in
III. EXISTING SYSTEM the cloud. Telegram also offers optional self-
There are several encryption systems that are destructing messages and a "passcode lock"
commonly used in today's cyberspace to protect feature to further secure the app.
our online communication and transactions. Here 3. WhatsApp: WhatsApp may be an informing
are a few examples: app that provides end-to-end encryption for all
messages, voice calls, and video calls. This
implies that as it were the sender and
1. Transport Layer Security (TLS): Usually a beneficiary can see the substance of the
convention utilized to secure communication messages, and no one else, counting WhatsApp
over the web, and is commonly utilized to itself, can get to them. WhatsApp too offers
scramble delicate data such as credit card discretionary two-factor confirmation to assist
numbers and passwords. TLS is utilized by secure the app.
most websites that have "https" in their URLs,
and it guarantees that the information sent 4. Proton Mail: Proton Mail is a scrambled e-
between your browser and the website's server mail benefit that permits clients to send and get
is secure and cannot be captured by emails safely. Proton Mail employments end-
programmers. to-conclusion encryption, which implies that
only the sender and beneficiary can study the
2. Pretty Good Privacy (PGP): Typically, an substance of the e-mail. Proton Mail too offers
encryption program is utilized to secure e-mail a "self-destruct" include, which permits clients
communication. PGP employments a to set a close date for their emails, guaranteeing
combination of symmetric and topsy-turvy that they can't be gotten to after a certain period
encryption to secure the substance of your e- of time.
mail messages from the unauthorized get.
3. Advanced Encryption Standard (AES):
Usually a symmetric encryption calculation IV. DRAWBACKS OF THE EXISTING SYSTEM
utilized to scramble information put away on There are some potential drawbacks or
difficult drives, USB drives, and other sorts of limitations to consider:
capacity media. AES is broadly utilized in
applications such as record encryption, disk 1. End-to-end encryption: While end-to-end
encryption, and database encryption. encryption provides strong security, it can also
limit certain features that require access to
4. Secure Sockets Layer (SSL): This is often a message content. For example, it can make it
forerunner to TLS, and was commonly utilized to difficult for law enforcement or other
scramble online communication some time organizations to monitor or intercept suspicious
recently TLS got to be the standard. SSL is still activity. Additionally, end-to-end encryption
utilized in a few applications, but it is considered can't protect against attacks such as social
less secure than TLS and is being staged out. engineering, phishing, or malware.
2. User error: While encryption protocols
There are several existing systems that can be themselves may be secure, they can be
used for secure text transfers. Here are a few compromised by user error. For example, a user
examples: could accidentally share their password or
encryption key, or fail to properly authenticate
1. Signal: Flag could be a well-known end-to-
the identity of the person they're communicating
end scrambled informing app that permits
with.
clients to send content messages, and voice
messages, and make voice and video calls 3. Implementation flaws: Encryption protocols
safely. Flag employments a twofold ratchet may have flaws or vulnerabilities that can be
calculation to scramble messages, which gives exploited by attackers. For example, a poorly
solid encryption and culminates forward implemented encryption algorithm could leave
mystery.
2. Telegram: Telegram is another popular
messaging app that offers end-to-end encryption
for "secret chats." These chats are only
data vulnerable to attacks such as brute force password and a biometric scan. Another key
attacks or side-channel attacks. feature of the proposed system is its use of a
unique multi-layered encryption protocol. This
4. Backdoors or weaknesses: There have been
protocol uses a combination of symmetric and
concerns in the past that encryption protocols
asymmetric encryption algorithms, along with key
could be compromised by government or law
exchange and authentication mechanisms, to
enforcement agencies through the inclusion of
ensure that messages are protected from
backdoors or weaknesses. While most
interception or tampering. At the heart of the
encryption protocols have been designed to be
encryption protocol is a unique key management
resistant to these kinds of attacks, the possibility
system that generates a unique key for each
of such compromises can't be completely ruled
individual message, ensuring that even if one key
out.
is compromised, the rest of the message history
Overall, while encryption protocols can provide remains secure.
strong security for communication and data
transfer, it's important to keep in mind their
limitations and potential vulnerabilities. As with Overall, the new proposed system of secure
any security measure, it's important to remain up text transfer in a cloud environment offers
to date with the most recent advancements and advanced security features that go beyond existing
best hones in arrange to play down dangers and encryption protocols. Its end-to-end encryption,
secure against potential dangers. multi-layered encryption protocol, and additional
security features such as message self-destruction
and two-factor authentication, make it an attractive
V. PROPOSED SYSTEM option for anyone looking to communicate
securely in a cloud-based environment. While the
In today's fast-paced world, the use of cloud system is still in development and has not yet been
computing has become increasingly popular, widely adopted, it represents an important step
providing businesses and individuals with the forward in the ongoing effort to develop secure
flexibility and scalability they need to manage and reliable communication protocols in a cloud
their data and applications. However, with the rise environment.
of cloud computing, there has been growing
concern about the security of data and the potential
for unauthorized access or interception. To address
this concern, a new proposed system of secure text
VI. FEATURE IDENTIFICATION
transfer in a cloud environment has been
developed, offering advanced security features that
go beyond existing encryption protocols. One of Cloud-based secure text transfer typically refers
the key highlights of the proposed framework is to the process of transferring text data securely
its utilization of end-to-end encryption. All over the internet using a cloud-based service. The
communication between clients is scrambled at following are some of the key features and
the sender's gadget and decoded at the receiver's characteristics of a secure text transfer system:
gadget, with the encryption keys stored securely
in the cloud. This ensures that messages are
1. Encryption: The data being transferred must
protected from interception or tampering, even if
be encrypted to ensure that it cannot be intercepted
they are transmitted over an unsecured network.
or read by unauthorized users. Strong encryption
To further enhance security, the proposed system
protocols, such as AES or RSA, should be used.
also includes additional features such as message
self-destruction and two-factor authentication. 2. Authentication: The system should require
Message self-destruction allows users to set a users to authenticate themselves before they are
timer on their messages, after which they will be allowed to send or receive data. This can be done
automatically deleted from both the sender's and using passwords, biometric authentication, or
receiver's devices. Two-factor authentication multi-factor authentication.
requires users to provide two separate forms of
authentication before they can access their
messages, such as a
3. Data assurance: The framework ought to 3. Scalability Constraints: The cloud-based
give components for ensuring information from secure content exchange framework ought to be
unauthorized get to, such as firewalls, interruption planned to suit future development and
location/ avoidance frameworks, and anti- flexibility. The system has to be able to handle
malware computer programs. extending volumes of data and clients without
any noteworthy corruption in execution.
4. Compliance: The framework ought to comply
with pertinent administrative prerequisites, such as 4. Availability Constraints: Another critical
HIPAA, PCI-DSS, or GDPR. constraint is the need for high availability and fault
tolerance. The system should be designed to
5. User-friendly interface: The framework
minimize downtime and ensure that data is always
ought to be simple to utilize, with a basic and
available to authorized users.
natural interface that permits clients to send and
get content messages safely. 5. Compliance Constraints: The framework
must comply with critical authentic and
6. Availability: The framework ought to be
authoritative prerequisites, checking data security
continuously accessible and open to clients, with
and security laws.
negligible downtime. Versatility: The framework
ought to be able to handle huge volumes of 6. Cost Constraints: Cost is always a
information and clients without any execution consideration, and the system should be designed
issues. to be cost-effective while still meeting all the
above constraints.
7. Auditability: The system should provide
audit trails and logs that allow administrators to Overall, the successful design of a cloud-based
track user activity and identify any security secure text transfer system requires careful
incidents. consideration of all these constraints to ensure that
the system is secure, scalable, and reliable while
also being cost-effective.
8. Reliability: The system should be reliable,
with backup and recovery mechanisms in place to
guarantee that information can be re-established in
case of framework disappointments or
catastrophes. VIII. ANALYSIS OF FEATURES AND FINALISATION
SUBJECT TO CONSTRAINTS

VII. CONTRAINTS IDENTIFICATION


Cloud-based secure text transfer systems are
subject to a range of constraints that can impact the
In a cloud-based secure text transfer system, selection and
there are a few imperatives that got to be taken implementation of their features. These
into thought to guarantee that the framework constraints include technical limitations, regulatory
capacities are successful and safe. Some of the key requirements, budgetary constraints, and usability
constraints include: considerations.
1. Security Constraints: One of the primary 1. Technical constraints include limitations on
constraints in a cloud-based secure text transfer bandwidth, processing power, and storage
system is the need for robust security measures to capacity. These limitations can impact the system's
prevent unauthorized access to sensitive data. This capacity to handle expansive volumes of
includes encryption of data in transit and at rest, information and clients, as well as its versatility
secure verification and authorization and accessibility. As a result, it may be necessary
mechanisms, and access control policies. to prioritize certain features, such as encryption
and authentication, over others, such as user
2. Performance Constraints: The performance
of the system is another critical constraint that interface design or suitability.
must be considered. The system should be 2. Regulatory requirements, such as HIPAA or
designed to ensure low latency and high GDPR, may also impact the features that can be
throughput, especially when dealing with large
volumes of data.
included in a cloud-based secure text transfer 1. Deployment model: There are different
system. For example, healthcare organizations may deployment models for cloud-based secure text
need to prioritize features related to data protection transfer systems,
and access controls to ensure compliance with
including public cloud, private cloud, and hybrid
HIPAA regulations. Similarly, organizations
cloud. Each sending demonstrate has its claim
subject to GDPR may need to prioritize features
benefits and disadvantages, and the choice will
related to data privacy and consent management.
depend on the particular needs of the
3. Budgetary constraints can also impact the organization.
selection and implementation of features in a 2. Security architecture: The security architecture
cloud-based secure text transfer system. of the system should be designed to provide robust
Organizations with limited budgets may need to protection against unauthorized access,
prioritize cost-effective solutions that provide interception, and data breaches. This can include
essential features, while larger organizations may features such as strong encryption, multi-factor
have more flexibility to invest in advanced authentication, access controls, and intrusion
features, such as real-time monitoring or advanced detection/prevention systems.
analytics. Usability considerations are also
important when selecting and implementing 3. Compliance: The system should comply with
features in a cloud-based secure text transfer any relevant regulatory requirements, such as
system. The system ought to be simple to utilize HIPAA or GDPR. This can involve incorporating
and instinctive, with a user-friendly interface that specific features, such as data encryption or audit
permits clients to rapidly and effortlessly and trails, to meet the requirements of the regulations.
receive secure text messages. At the same time, the 4. Scalability and availability: The system should
system should provide robust security features that be designed to handle large volumes of data and
protect sensitive data from unauthorized access users, with minimal downtime. This can involve
and interception. using cloud infrastructure that can scale up or
4. In light of these constraints, the finalization down as needed or incorporating redundancy and
of features for a cloud-based secure text transfer failover mechanisms to ensure availability.
system will depend on the particular needs and 5. User experience: The system should be outlined
prerequisites of the organization. Key to supply a positive client involvement, with a natural
components to consider incorporate the client interface and streamlined workflows. This could
organization's budget, regulatory requirements, include user testing and input to guarantee that the
technical constraints, and user needs. By carefully framework meets the desires of its clients.
balancing these factors, organizations can select
and implement a cloud-based secure text transfer 6. Integration: The framework ought to be
system that provides essential security features planned to coordinate other frameworks and
while also meeting theirspecific needs applications utilized by the organization, such as
electronic health records or customer relationship
management systems.
7. Cost: The cost of the system will be an
IX. DESIGN SELECTION important consideration, and the design should aim
to balance security features with affordability.
The design selection of a cloud-based secure text In summary, when selecting a design for a cloud-
transfer system will depend on an assortment of based secure text transfer system, organizations
variables, counting the measure of the organization, should consider a range of factors, including
the affectability of the information being exchanged, arrangement demonstration, security design,
and the regulatory requirements that must be met. compliance, scalability and availability, user
Here are some key considerations to keep in mind experience, integration, and cost. By carefully
when selecting a design for a cloud-based secure balancing these factors, organizations can design a
text transfer system: system that meets their specific needs and provides
robust protection for their sensitive data.
1.1 PRELIMINARY DESIGN

X. IMPLEMENTATION 10.3 RUNNING EC2 WINDOWS INSTANCE

First we Created an AWS EC2 instance with


windows running on it.Then we installed python in
it.We wrote 2 main pieces of python script , one
for client side and other one for server side.

10.1 CREATING EC2 WINDOWS INSTANCE 10.4 INSTALLING PYTHON

10.2 EC2 WINDOWS INSTANCE CREATED


XI. RESULT /OUTPUT

The project aimed to develop a secure text It offered a reliable and secure platform for
transfer system using cloud infrastructure, users to exchange messages while maintaining the
ensuring the confidentiality, integrity, and privacy and integrity of their conversations.
authenticity of messages. The system successfully Future improvements might incorporate bolster
achieved its objectives and delivered a robust and for interactive media record exchange, end-to-end
secure communication platform for users. encryption, integration with extra confirmation
mechanisms, and mobile application development
Overall, the project resulted in a secure text
for enhanced accessibility.
transfer system that met the objectives of ensuring
secure communication, protecting message The successful completion of the project
confidentiality, and providing user-friendly demonstrated the effectiveness of utilizing cloud
features. The system adhered to best practices in infrastructure and implementing strong security
security, user authentication, and data protection. measures for secure text transfer. The system
provided a valuable solution for individuals and
organizations seeking a secure communication
platform.

10.2 Chat between two friends (screenshot includes


both encrypted and decrypted data)
XII. CONCLUSION

In conclusion, the use of cloud-based secure cloud computing. Future Generation Computer
text transfer can provide significant benefits for Systems, 46, 1-10.
organizations and individuals who need to 5. Singh, P., & Choudhary, P. (2018). Cloud
exchange sensitive information. The research based secure text communication system. In 2018
presented in this article highlights the effectiveness 2nd International Conference on Computing
of utilizing cloud- based technologies to securely Methodologies and Communication (ICCMC) (pp.
transmit text messages. The use of end-to-end 615- 619). IEEE. 24
encryption, multi- factor authentication, and secure
storage mechanisms ensure the confidentiality, 6. Tanwar, S., Kumar, N., & Tyagi, S. (2016).
integrity, and availability of data during Cloud based secure communication for
transmission and storage. organizations. Journal of Network and Computer
Applications, 68, 192-2
Furthermore, the research suggests that the
adoption of cloud-based secure text transfer 7. StudentprojectGuide.com secure text transfer
solutions can streamline communication processes Using Diffie-Hellman key exchange based on
and increase productivity. As such, this technology cloud
should be considered a viable option for
organizations and individuals seeking to protect
their sensitive information while maintaining
efficiency and convenience.
However, further research is necessary to
explore the potential challenges and limitations
associated with this technology, as well as to
identify strategies to optimize its use.

XIII. REFERENCES

1. Alavizadeh, H., & Pourkhalili, A. (2019). A


secure text messaging service using cloud
computing. Journal of Ambient Intelligence and
Humanized Computing, 10(4), 1577-1589.
2. Chen, C., Wang, Y., & Chen, X. (2016). A
s ecure and e ff i c i e nt c l o u d - b a s e d text
communication system. Journal of Network and
Computer Applications, 75, 120-130.
3. Kshirsagar, S., & Kadam, L. (2019). A secure
text transfer system using cloud computing.
International Journal of Computer Applications,
181(2), 22-25.
4. Li, C., Li, H., Lu, J., & Zhang, X. (2015). A
secure and efficient text messaging service for

You might also like