Paper 3
Paper 3
1
Computer Science and Engineering Dept Tulsiramji Gaikwad Patil College of Engineering and Technology Nagpur
2
Computer Science and Engineering Dept Tulsiramji Gaikwad Patil College of Engineering and Technology Nagpur
3
Computer Science and Engineering Dept Tulsiramji Gaikwad Patil College of Engineering and Technology Nagpur
1
[email protected], [email protected], [email protected]
Abstract: In the modern digital era, cloud computing has emerged as a fundamental solution for
data storage, benefiting both individuals and businesses. Cloud-based systems provide key
advantages such as scalability, flexibility, and cost-effectiveness, allowing users to securely store
and retrieve large volumes of data remotely. Nonetheless, as more sensitive data is stored in the
cloud, ensuring strong security protections has become increasingly important. Data breaches,
cyber-attacks, and unauthorized access continue to pose significant risks to the confidentiality and
security of data stored in cloud environments.
Keywords— Triple encryption, Hybrid Cryptography, Confidentiality, Integrity, Availability,
Storage, and Security, Data Protection, Encryption, Elliptic Curve Cryptography, AES, RC6, 3DES,
RSA
.
I.INTRODUCTION
Hybrid Cryptography leverages the advantages of both symmetric and asymmetric encryption
to create a more secure, efficient, and scalable encryption system. For symmetric encryption,
Blowfish is chosen for its efficiency and speed, making it ideal for encrypting large files with
minimal computational overhead. To further secure the system, asymmetric encryption methods such
as AES, RC6, 3DES, RSA, or ECC (Elliptic Curve Cryptography) can be applied to encrypt the keys
used by Blowfish, ensuring that these keys are safely stored and transmitted. To achieve a high level
of security, documents are encrypted using three different encryption techniques in succession,
making unauthorized decryption exceedingly challenging. This multi-layered approach significantly
enhances security, particularly when data is transmitted over the internet. Unlike traditional systems
that typically use a single encryption method (either symmetric or asymmetric), our approach
combines Blowfish (a fast symmetric encryption algorithm) with AES, RC6, and 3DES for
symmetric encryption, along with RSA or ECC for asymmetric encryption to secure both the data
and the encryption keys. The widespread use of cloud computing offers several benefits, such as
scalability, flexibility, and cost-effectiveness, but it also brings forth significant concerns regarding
data security. The motivation for utilizing hybrid cryptography with triple encryption in cloud
storage stems from multiple security challenges.
II. RELATED WORK
Data security in cloud is an important issue and hybrid encryption is a popular tool to secure cloudb
ased data storage. Security is important in this digital age. Therefore, a lot of research has been done
in this field (like cloud) to protect customer information from all kinds of security and leaks. At the
same time, different researchers have proposed different security methods to protect cloud data usi
ng cryptography. I am using the following output to form a basis for my project.
Design of secure virtual data storage in cloud using hybrid encryption". By Bello A. Buhari, Aliyu
Mubarak, Bello A. Bodinga, and Muazu D. Sifawa (2022). In their research [1], they introduced a h
ybrid encryption algorithm cryptographic method for archive encryption and decryption based on 2
hash functions. The presented idea is to use a cloud API with REST calls or a client library in PH P.
"Securing data stored in the cloud using Hybrid Encryption" Naveetha K. &T. Tamirasan (2021).
This paper [2] introducesbehaviorbased encryption (ABE) as a hybrid cryptography. The aim of the
system is to provide effective access control to encrypted data and to provide easier and more secur
e access to the management and sharing of data."
Ensuring security of data stored in cloud computing using Hybrid Encryption Techniques", K. R. Vi
noth Kumar and K. Manivann, (2012). This paper [3] proposes cloud data security technology base
d on hybrid encryption technology. This technology combines AES and RSA.
"Performance Comparison of Data Encryption Algorithms", A. Nadeem, (2006). In this paper differ
ent key algorithms such as DES, 3DES, AES and Blowfish have been studied [4]. The proposed me
thods have been implemented and their performances have been compared by encrypting inputs wit
h different content and size. This paper has also tested the algorithm on two different hardware platf
orms to compare its performance. “Transforming Security Using Hybrid Encryption Algorithms” by
Sanjeev Kuma, Garima Karnani, and Madhu Sharma Gaur (2021). This paper [5] presents a securit
y solution for cloud computing based on hybrid cryptography. The proposed scheme combines DES
and RSA algorithms to encrypt and decrypt data. The paper also evaluates the performance of the p
roposed scheme and shows that it can provide data storage in the cloud.
"Securing data stored in the cloud using hybrid encryption techniques" A. Poduvall, A. Doke, H. Ne
made, and R. Nikam (2019). [6] This paper introduces the security of data stored in cloud computin
g based on hybrid encryption. This method uses DES, AES and RC6 algorithms to encrypt and decr
ypt data. This paper also reviews the requirements and demonstrates that it can provide secure data
storage in cloud computing
"Using hybrid encryption algorithms to ensure data security in cloud computing." By Punam V. M
aitri and Aruna Verma, (2016). The article [8] focuses on how data is stored securely on cloud plat
forms. It also talks about the problem of using a single encryption algorithm to encrypt data and ho
w useless the cloud is. This paper divides data into blocks and each block is encrypted using AES,
BlowfishandRC6algorithms.RivestShamirAdleman (RSA) encryption and digital signature". Auth
or: Ping, Z.L., Liang, S.Q. and Liang, L. X. (2011).
Gift Chisoni1 and Dr. Glorindal Selvam-2023This paper proposes a new hybrid cryptography
approach for secure file storage on the cloud regardless of the type of deployment model ie., either
public cloud, private cloud, or hybrid cloud. The proposed approach uses a combination of the
Advanced Encryption Standard (AES) algorithm, Triple Data Encryption Standard (DES)
algorithm, and Rivest cipher 6 (RC6) algorithms are used to provide block-wise security to data.
LSB steganography technique is introduced for key information security. One of the primary
disadvantages of steganography is the risk of detection. If an attacker or unauthorized user suspects
that steganography is being used, they may employ various detection techniques to uncover hidden
messages. This could lead to the exposure of sensitive information.
Pratima Sharma and Rajni Jinda in this paper blockchain technology is used Blockchain systems can
be complex to implement and manage. The decentralized nature of blockchain requires a significant
amount of computational resources, which can lead to scalability issues. As the number of
transactions increases, the network may become congested, resulting in slower processing times.
This is particularly problematic for cloud services that require high-speed data access and
processing
A. Ashok Kumar1, Santhosha1, A.JaganThe work presented here proposed a two layer mechanism
for providing efficient and computationally light security procedure. At the first layer public key
cryptography has been used, whereas second layer is totally based on steganography. RSA method
is used for key exchange and AES for encryption and decryption to make the method
computationally efficient.
III. METHODOLOGY
The system prototype is designed in such a way that it has the following phases:
Register/Login:
All users need to register first by filling up the basic registration fields.
• Using the combination of login id and password, the user can log in to the system.
Upload data:
Here, different types of files to be stored are encrypted using AES (Advance Encryption
Standard), DES (Data Encryption Standard), and RC6 (Rivest Cipher 6) encryption algorithms.
The Least Significant Bit (LSB) technique is widely utilized in fields such as data
compression, digital signal processing, and encryption. In encryption, LSB manipulation often
involves altering the least significant bit of a byte, enabling data embedding without significant
changes to the overall structure.
• Key information contains which part of the file is encrypted using which algorithm and key.
Send a Message via Email:
• Once the encryption process has been completed in the background, this encrypted file is sent
along with the image containing the key that s hidden in the image using LSB.
Download data:
• Here, when the user request for a file to be downloaded, then that file is decrypted using AES,
DES, and RC6.
• After successful decryption, the file is merged into one file and then downloaded.
Log Generation:
• If the file doesn't match the sender’s file, then the system will display a dummy file and the
technical details such as user ill, IP address, date, time, etc. will be stored in the data base.
IX.ACKNOWLEDGMENT
would like to extend my heartfelt thanks to everyone who has supported me during this research
journey. My deepest appreciation goes to my project guide, Mr. Jayent Adhikari, and co-guide Mr.
Nilesh Mahishkar for their continuous guidance, encouragement, and valuable feedback throughout
the entire process. Their expertise and thoughtful advice have played a crucial role in shaping this
work.
X. REFERENCES
[1] Shrikanta Jogarl & Darshan S Handral. (2022). "Secure File Storage on Cloud Using
HybridCryptography", International Journal of Advanced Research in Science,
Communication and Technology (IJARSCT).
[2] Gajanan T, S. Jayde, H.Gaurkhede, R. Vaidya, A. Wankhade& V.Yelekar. (2021). "Secure
File Storage on Cloud Using Hybrid Cryptography", International Research Journal of
Engineering and Technology (IRJET). ISSN: 2395-0056.
[3] M.Naveetha Krishnan&T.Tamilarasan. (2021). "Secure File Storage on Cloud Using
Hybrid Cryptography", International Journal of Advanced Research in Computer Science
Engineering and Information Technology (IJARCSEIT).
[4] Uttam Kumar, Mr. Jay Prakash (2020). "Secure File Storage On Cloud Using Hybrid
Cryptography Algorithm", International Journal of Creative Research Thoughts (IJCRT).
ISSN:- 2320-2882 [Base Paper]. [5]. Aditya Poduval, Abhijeet Doke, Hitesh Nemade& Rohan
Nikam. (2019). "Secure File Storage on Cloud using Hybrid Cryptography", International
Journal of Computer Sciences and Engineering (IJCSE) E-ISSN: 2347-2693.
[6] M. Malarvizhi, J. Angela Jennifa Sujana, T.Revathi (2014). "Secure File Sharing Using
Cryptographic Techniques In Cloud", International Conference On Green Computing
Communication And Electrical Engineering (ICGCCEE).
[7] Lowlesh Yadav and Asha Ambhaikar, “IOHT based Tele-Healthcare Support System for
Feasibility and perfor-mance analysis,” Journal of Electrical Systems, vol. 20, no. 3s, pp. 844–
850, Apr. 2024, doi: 10.52783/jes.1382.
[8] L. Yadav and A. Ambhaikar, "Feasibility and Deployment Challenges of Data Analysis in
Tele-Healthcare System," 2023 International Conference on Artificial Intelligence for
Innovations in Healthcare Industries (ICAIIHI), Raipur, India, 2023, pp. 1-5, doi:
10.1109/ICAIIHI57871.2023.10489389.
[9] L. Yadav and A. Ambhaikar, "Approach Towards Development of Portable Multi-Model
Tele-Healthcare System," 2023 International Conference on Artificial Intelligence for
Innovations in Healthcare Industries (ICAIIHI), Raipur, India, 2023, pp. 1-6, doi:
10.1109/ICAIIHI57871.2023.10489468.
[10] Lowlesh Yadav and Asha Ambhaikar, Exploring Portable Multi-Modal Telehealth
Solutions: A Development Approach. International Journal on Recent and Innovation Trends in
Computing and Communication (IJRITCC), vol. 11, no. 10, pp. 873– 879, Mar. 2024.11(10),
873–879.
[11] Lowlesh Yadav, Predictive Acknowledgement using TRE System to reduce cost and
Bandwidth, March 2019. International Journal of Research in Electronics and Computer
Engineering (IJRECE), VOL. 7 ISSUE 1 (JANUARY- MARCH 2019) ISSN: 2393-9028
(PRINT) | ISSN: 2348-2281 (ONLINE).