0% found this document useful (0 votes)
158 views

Secure File Storage On Cloud Using Hybrid Cryptography

This document describes a secure file storage system for cloud computing that uses hybrid cryptography. It splits files into slices and encrypts them with Blowfish, which provides faster encryption than other symmetric algorithms. The system embeds encryption keys in images using least significant bits to further enhance security. It allows authorized users to access encrypted data on the cloud server while preventing unauthorized access. The document also lists the system's software and hardware requirements, advantages like robust security and data protection, disadvantages like relying on internet, and applications like banking data transfers.

Uploaded by

Sanket Ghatte
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
158 views

Secure File Storage On Cloud Using Hybrid Cryptography

This document describes a secure file storage system for cloud computing that uses hybrid cryptography. It splits files into slices and encrypts them with Blowfish, which provides faster encryption than other symmetric algorithms. The system embeds encryption keys in images using least significant bits to further enhance security. It allows authorized users to access encrypted data on the cloud server while preventing unauthorized access. The document also lists the system's software and hardware requirements, advantages like robust security and data protection, disadvantages like relying on internet, and applications like banking data transfers.

Uploaded by

Sanket Ghatte
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Download Cloud Computing projects with Documentation from TutorialsDuniya.

com

Secure File Storage On Cloud Using Hybrid


Cryptography
The proposed model is liable to meet the required security needs of data
center of cloud. Blowfish used for the encryption of file slices takes minimum time
and has maximum throughput for encryption and decryption from other symmetric
algorithms. The idea of splitting and merging adds on to meet the principle of data

m
security. The hybrid approach when deployed in cloud environment makes the

co
remote server more secure and thus, helps the cloud providers to fetch more trust
of their users. For data security and privacy protection issues, the fundamental

a.
challenge of separation of sensitive data and access control is fulfilled.
iy
Cryptography technique translates original data into unreadable form.
un
Cryptography technique is divided into symmetric key cryptography and public key
cryptography. This technique uses keys for translate data into unreadable form. So
D

only authorized person can access data from cloud server. Cipher text data is visible
ls

for all people.


ria

 Software Requirements:
to

 Windows 7 or above
Tu

 SQL Server 2008


 Visual Studio 2010

 Hardware Components:
 Processor – Core i3
 Hard Disk – 160 GB
 Memory – 2GB
 Internet Connection

Download Cloud Computing projects with Documentation from TutorialsDuniya.com


Download Cloud Computing projects with Documentation from TutorialsDuniya.com

 Advantages:

 The stored image file is completely secured, as the file is being encrypted
not by just using one but three encryption algorithm which are AES, DES
and RC6.
 The key is also safe as it embeds the key in image using LSB.
 The system is very secure and robust in nature.
 Data is kept secured on cloud server which avoids unauthorized access.

m
 Disadvantages:

co
 Requires an active internet connection to connect with cloud server.

a.
 Application:
iy
Data security is a major priority. This system can be implemented into
un
banking and corporate sectors to securely transfer confidential data.
D

 Reference:
ls

 http://ieeexplore.ieee.org/document/7566416/
ria
to
Tu

Download Cloud Computing projects with Documentation from TutorialsDuniya.com

You might also like