Raspberry Pi-Based Encrypted Cloud Storage Gateway (Review 2)
Raspberry Pi-Based Encrypted Cloud Storage Gateway (Review 2)
Storage Gateway
Domain: Cybersecurity
The Raspberry Pi-Based Encrypted Cloud Storage Gateway project represents a pioneering solution to the persistent
challenges of data security and user control in cloud storage environments.
This project introduces an innovative gateway that serves as an intermediary between local devices and cloud storage
services.
Its core mission is to bolster data security by implementing user-controlled encryption, local data encryption, and data
integrity verification.
By leveraging the versatility of Raspberry Pi, our gateway not only fortifies data privacy but also seamlessly integrates
with leading cloud providers.
The gateway will empower users to generate and manage their encryption keys locally on the Raspberry Pi
device.
The project addresses the limitations of existing cloud storage services and elevates data security,
confidentiality, and integrity for users.
Potential for Data Breaches: With centralized cloud storage, a single breach in the provider's infrastructure can expose
vast amounts of user data. Recent high-profile breaches have shown that even large service providers are not immune to
such incidents, putting sensitive user data at risk.
Lack of Transparent Encryption: While encryption might be offered, it's often unclear how and when encryption is
applied. This lack of transparency can lead to doubts about the effectiveness of data protection during transmission and
storage.
Data Exposure During Transit: Existing systems may not provide sufficient protection for data while in transit between
user devices and the cloud. Without local encryption, sensitive data could be vulnerable to interception during transfer.
July 5, 2024 Department of CSE 6
PROPOSED SOLUTION
The project involves building a Encrypted Cloud Storage Gateway. Consider the following components for the
project:
User-Controlled Encryption : Users will have the ability to generate and manage their encryption keys
locally on the Raspberry Pi. This user-controlled encryption ensures that sensitive data remains accessible only
to authorized users, reducing the risk of unauthorized access.
Local Data Encryption:Before transmitting data to the cloud storage service, the Raspberry Pi will encrypt the data
locally. This approach ensures that data remains protected during transit, minimizing the risk of data exposure or
interception.
Data Integrity Verification: The proposed solution will implement data integrity verification mechanisms
using cryptographic hashing algorithms. Checksums will be generated before data transfer and compared
upon retrieval to detect any unauthorized modifications.
Cloud Storage Integration:The Raspberry Pi-Based Gateway will seamlessly integrate with popular cloud
storage services, providing users with flexibility in choosing their preferred cloud provider. Integration will be
achieved through the use of cloud storage service APIs.
Auditing and Logging: The system will maintain comprehensive logs and audit trails to record data access,
changes, and file transfers. These logs will facilitate user activity tracking, enhancing accountability and aiding in
forensic analysis.
Secure Authentication: Robust user authentication mechanisms will be implemented to ensure that only
authorized users can access and manage the encrypted cloud storage gateway. Optionally, two-factor
authentication (2FA) can be integrated to provide an extra layer of security.
Security Measures: The project will emphasize implementing security best practices to protect the Raspberry
Pi and the encryption keys from unauthorized physical access. Remote wipe and lock functionalities may be
considered to enable users to take quick actions in case of potential security threats.
• Local Encryption: When a user initiates a file upload to the cloud storage service, our gateway steps
in. The data is first encrypted locally on the user's device using robust encryption algorithms, such as
Advanced Encryption Standard (AES). This ensures that sensitive information remains confidential
even during transmission.
• Secure Transfer: The encrypted data is then securely transferred to the selected cloud storage
service. Our gateway takes care of managing this communication, maintaining the confidentiality of the
data throughout the process.
• Data Retrieval: When a user requests a file from the cloud, our gateway retrieves the encrypted file. It
decrypts the data locally on the Raspberry Pi before presenting it to the user, making it readable and
usable.
July 5, 2024 Department of CSE 26
WORKING PRINCIPLE
• Key Management: A fundamental aspect of our system is user-controlled encryption key management.
Users have the power to generate, manage, and safeguard their encryption keys. This ensures that
only authorized individuals can access their data.
• Integrity Checks: To detect any unauthorized modifications or tampering attempts, our gateway
implements data integrity verification mechanisms. It compares stored data with its original hash value
or checksum to ensure that the data remains unchanged.
• Seamless Interaction: Our gateway integrates transparently with cloud storage services of the user's
choice. Users can continue to interact with their cloud-stored files through familiar interfaces and
applications, experiencing no disruption to their existing workflows.
• Freedom of Choice: Our system is designed to be compatible with various popular cloud storage
providers. Users can select their preferred service while maintaining robust data security.
• Accountability: For accountability and security monitoring, our gateway maintains detailed logs and
audit trails. This feature tracks data access and changes, facilitating forensic analysis in case of
security incidents.
July 5, 2024 Department of CSE 28
RESULT AND CONCLUSION
The "Raspberry Pi-Based Encrypted Cloud Storage Gateway" project successfully developed a secure and
user-controlled gateway for cloud storage, leveraging the computational capabilities of Raspberry Pi and
advanced encryption techniques. The project aimed to address data security concerns associated with traditional
cloud storage solutions by empowering users with control over their encryption keys.
The project's user-controlled encryption approach ensured that only authorized users could access and manage their
confidential data, adding an additional layer of confidentiality to cloud storage. Local data encryption and data integrity
verification mechanisms further strengthened data security, ensuring that data remained protected throughout its lifecycle in
the cloud.
Through comprehensive auditing and logging capabilities, users could monitor data access and changes, promoting
accountability and aiding in forensic investigations in case of security incidents.
The results of the project validate the feasibility and effectiveness of using Raspberry Pi as an encrypted cloud storage
gateway. The system's performance, usability, and security features enhance user trust in cloud-based file storage and
sharing solutions.
In conclusion, the "Raspberry Pi-Based Encrypted Cloud Storage Gateway" project serves as a significant contribution to
the field of cloud storage security. The developed gateway offers a robust, versatile, and user-friendly solution for
safeguarding sensitive data in the cloud, providing users with enhanced control over their confidential information. As
cloud storage continues to play a pivotal role in modern data management, the project's outcomes have far-reaching
implications for data protection and privacy in cloud environments.
We can also download the generated Public and Private key from this page.
July 5, 2024 Department of CSE 34
OUTPUT SCREEN SHOTS
We will be getting a mail with both of the generated Public and Private key.
For decryption we have to upload the encrypted .GPG file which we got while encrypting the file.
When we click on Decrypt button it hits back to the raspberry pi and decrypts the file by verifying the Private Key.
For decryption we have to upload the encrypted .GPG file which we got while encrypting the file.
When we click on Decrypt button it hits back to the raspberry pi and decrypts the file by verifying the Private Key.
[2] A. F. Madni and M. A. Shah, “Security Model for Securing Data on Cloud,” in 2022 17th International Conference on Emerging Technologies
(ICET), IEEE, Nov. 2022, pp. 206–211. doi: 10.1109/ICET56601.2022.10004669.
[3] K. Vijay, W. R. Sabarish Abishek, V. U. Sabarish, and R. Sanjeev Krishnan, “Private Cloud Storage using Raspberry PI via Virtual Network
Computing - An Analysis,” in 2023 International Conference on Computer Communication and Informatics (ICCCI), IEEE, Jan. 2023, pp. 1–7. doi:
10.1109/ICCCI56745.2023.10128489.
[4] A. Al Khateeb and A. Summaq, “Securing Data in a Cloud Environment: Access Control, Encryption, and Immutability Säkerhetshantering av
data som överförs genom molnbaserade tjänster: åtkomstkontroll, kryptering och omutlighet.”
[5] Mishra, S., & Chitkara, M. (2023, February 24). Service Level Trust Key Encryption based Cloud Security using Starvation End-Point
Encryption. 2023 IEEE International Conference on Integrated Circuits and Communication Systems (ICICACS).
https://doi.org/10.1109/icicacs57338.2023.10099816
[6] G. Uma and L. Jayasimman, “Enhanced Convergent Encryption Key Generation for Secured Data Deduplication in Cloud Storage,” J Phys
Conf Ser, vol. 1142, p. 012006, Nov. 2018, doi: 10.1088/1742-6596/1142/1/012006.
[7] W. Jin, R. Xu, T. You, Y.-G. Hong, and D. Kim, “Secure Edge Computing Management Based on Independent Microservices Providers for
Gateway-Centric IoT Networks,” IEEE Access, vol. 8, pp. 187975–187990, 2020, doi: 10.1109/ACCESS.2020.3030297.
[9] S. Prasath kumar, P. Rayavel, N. Anbarasi, B. Renukadevi, and D. Maalini, “Raspberry pi based secured cloud data,” J Phys Conf Ser, vol.
1964, no. 4, p. 042101, Jul. 2021, doi: 10.1088/1742-6596/1964/4/042101.
[10] C.-Y. Yang, C.-C. Lee, T.-H. Sun, and M.-S. Hwang, “Cryptanalysis of A Hierarchical Data Access and Key Management in Cloud
Computing,” IOP Conf Ser Mater Sci Eng, vol. 466, p. 012010, Dec. 2018, doi: 10.1088/1757-899X/466/1/012010.
[11] Ahmad Fayyaz Madni, Munam Ali Shah, “Security Model for Securing Data on Cloud”, 17th International Conference on Emerging Technologies
(ICET) ,2022
[12] Silvian–Marian Petrica; Mihaela–Gabriela Boicu; Mihaela Vasluianu; Giorgian Neculoiu, “Raspberry Pi-based Remote and Real-time
Monitoring of an IoT Gateway”, 13th International Symposium on Advanced Topics in Electrical Engineering (ATEE), 2023
[13] Saket Mishra; Mansi Chitkara, “Service Level Trust Key Encryption based Cloud Security using Starvation End-Point Encryption”, IEEE
International Conference on Integrated Circuits and Communication Systems (ICICACS), 2023
[14] Changqing Sun, Kun Guo, Zhaoxia Xu, Jianhui Ma, Dairong Hu, “Design and Development of Modbus/MQTT Gateway for Industrial IoT
Cloud Applications Using Raspberry Pi”, 2019 Chinese Automation Congress (CAC), 219
[15] Cheng-Ying Yang, Cheng-Chi Lee, Tsuei-Hung Sun, Min-Shiang Hwang “Cryptanalysis of A Hierarchical Data Access and Key Management
in Cloud Computing”, IOP Conference Series: Materials Science and Engineering, Volume 466, 2018 the 2nd annual International Conference on
Cloud Technology and Communication Engineering 17–19 August 2018, Nanjing, China