Secure file storage using cryptography

  • Post author:

Secure file storage using cryptography

ABSTRACT: 

We aim to securely store information into the cloud, by splitting data into several chunks and storing parts of it on a cloud during a manner that preserves data confidentiality, integrity, and ensures availability. The rapidly increased use of cloud computing, many organization, and IT industries provides new software at a low cost. Ensuring the safety of cloud computing may be a major think about the cloud computing environment, as users often store sensitive information with cloud storage providers, but these providers might not be trusted. Our approach ensures the safety and privacy of client sensitive information by storing data across a single cloud, using AES, DES, and RC2 algorithm. 

PROBLEM-STATEMENT:

Customer’s store’s data at cloud service providers are susceptible to various threats. The first problem is that the single point of failure, which can affect the info availability that would occur if a server at the cloud service provider failed or crashed, which makes it harder for the customer to retrieve his stored data from the server. Availability of knowledge is additionally a crucial issue which might be affected if the cloud service provider (CSP) runs out of service. The second threat is data integrity. Such worries are not any more beneficial issues; therefore, a cloud service customer can’t entirely depend on a cloud service provider to make sure the storage of his vital data.

INTRODUCTION:

 Cryptography is the protection technique of knowledge from the unauthorized party by converting it into a non-readable form. the most purpose of cryptography is maintaining the safety of the info from a third party.

 There are following two sorts of algorithms such as (I) symmetric key-based algorithm, sometimes referred to as the conventional key algorithm and (II) asymmetric key-based algorithm, also referred to as public-key algorithm.

Image result for cryptography diagrams based on types"
Secure file storage using cryptography
  • Symmetric and public key algorithms:

Encryption/Decryption methods fall under two categories. Symmetric key Public key. In symmetric key algorithms, the encryption and decryption keys are known both to the sender and receiver. 

The encryption key’s shared and therefore the decryption key easily calculated from it. In many cases, the encryption and decryption keys are equivalent. 

In public-key cryptography, encryption keys made public, but it’s computationally infeasible to seek out the decryption key without the knowledge known to the receiver. 

Security has the characteristics of a complement to reliability. The utility of this cloud and its services aren’t restricted to a website or any premises. All the users like principals, teachers, and students are allowed to use this data whenever needed. This project has a cloud that’s accessible to all or any, a database to store college-related data and every one information, the website for users to log in to the cloud. 

The cloud is often accessed through the internet from anywhere. The users need to login to the cloud and supply details to access the info from the database. The cloud also will provide security to all or any of the info stored at our server.

The cloud computing environment, security is deemed to be an important aspect thanks to the importance of data stored within the cloud. the info is often confidential and very sensitive. Hence, info management should be completely reliable. 

It is necessary that the knowledge within the cloud is shielded from malicious attacks. Security brings in concerns for confidentiality, integrity, and availability of knowledge. Unauthorized access to information leads to loss of knowledge confidentiality. 

Image result for SECURE FILE STORAGE ON CLOUD USING CRYPTOGRAPHY images"
Secure file storage using cryptography

Data integrity and availability suffer thanks to the failure of cloud services. Security has the characteristics of a complement to reliability. The utility of this cloud and its services aren’t restricted to a website or any premises. All the users like principals, teachers, and students are allowed to use this data whenever needed. This project has a cloud that’s accessible to all or any, a database to store college-related data and every one information, the website for users to log in to the cloud.

The cloud is often accessed through the internet from anywhere. The encryption and decryption algorithms, i.e., DES and RSA were embedded within the code. we’ve used PHP for website development and for encryption and decryption. to supply protection for business data we’ve Bit-Glass, which may be a beta version and provides transparent protection. It aims to scale back the danger of knowledge loss and maintains data visibility. 

Image result for SECURE FILE STORAGE ON CLOUD USING CRYPTOGRAPHY images"

DATA SECURITY: 

1. The volume of individuals with access to the info who might be compromised (e.g., bribed, or coerced) increases dramatically. one company may need a little team of administrators, network engineers, and technicians, but a cloud storage company will have many purchasers and thousands of servers, therefore away from a larger team of technical staff with physical and electronic access to most of the info at the whole facility or perhaps the whole company. 

2. Decryption keys that are kept by the service user, as against the service provider, limit the access to data by service provider employees.

3. It increases the volume of networks over which the info travels. rather than just an area network (LAN) or cargo area network (SAN), data stored on a cloud requires a WAN (wide area network) to attach them both.

4. By sharing storage and networks with many other users/customers it’s possible for other customers to access your data. Sometimes due to erroneous actions, faulty equipment, a bug, and sometimes due to criminal intent.

CONCLUSION:

The main goal is to securely store and access data in the cloud that’s not controlled by the owner of the info. We exploit the technique of elliptic curve cryptography encryption to guard data files within the cloud. Two a part of the cloud server improved the performance during storage and accessing of knowledge. The ECC Encryption algorithm used for encryption is another advantage to enhance the performance during encryption and decryption process. We assume that this manner of storing and accessing data is far secure and has high performance.  

Also Read : Pregna Aid: A maternity Friend

Follow us on Twitter

Leave a Reply