Seminar Report
Seminar Report
on
Title
Submitted by
Seventh Semester
B.E. (Computer Science & Engineering)
Guided by
PRMIT&R
Department of Computer Science & Engineering,
Prof. Ram Meghe Institute of Technology & Research,
Badnera - Amravati
2022-2023
CERTIFICATE
2022-2023
3
Acknowledgment
With great pleasure we hereby acknowledge the help given to us by various individuals
throughout the project. This Project itself is an acknowledgement to the inspiration,
drive and technical assistance contributed by many individuals. This project would
have never seen the light of this day without the help and guidance we have received.
Our thanks and appreciations also go to our colleague in developing the project
and people who have willingly helped us out with their abilities.
We extend our heartfelt thanks to our parents, friends and well wishers for their
support and timely help. Last but not the least; we thank the God Almighty for
guiding us in every step of the way.
i
Abstract
This is a cloud application which can be used in corporate sector to store, share and
upload documents. This application makes it easier for the cloud admin as well as the
company admin and the users (including branch manager and employees) to operate
documents/files which are present on cloud server/database.
This project will have solutions to upload and download documents, store docu-
ments on the server, also to view documents shared by other users and to view file
details which are on the server. In the proposed system, the cloud admin will provide
login credentials to the company admin after successful verification of the registration
details. When the user will upload a document, it will be automatically encrypted
using the hybrid algorithm.
The users will have more solutions to manage access permission such as edit or up-
date access permission as well as store access permission on the cloud server. The
admin/user will be able to access shared documents as well as download them in the
decrypted form using verified OTP.
In this cloud application, an automatic space manager will be used to track various
actions related to document such as how many times the document is being down-
loaded and shared. This will help find out unused files and move them on backup
server. In case the unused file’s demand suddenly increases, then the file will be
moved from backup server to main cloud server using automatic space manager
ii
Contents
1 Introduction 1
1.1 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
2 Related Work 2
2.1 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
2.2 Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
3 Proposed Work 3
3.1 Problem Definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
3.2 Aim . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
3.3 Proposed Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
3.4 Methodology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
4 Conclusion 4
References 5
5 References 5
iii
1 Introduction
1.1 Motivation
The main motivation behind cloud computing is to enable businesses to get
access to data centers and manage tasks from a remote location. Cloud computing
works on the pay-as-you go pricing model, which helps businesses lower their operating
cost and run infrastructure more efficiently
1
2 Related Work
2.1 Background
The most fundamental problem in cloud computing is security and there
many other problems like space management,accessibility.Hybrid cryptography is
implemented using blowfish and ECC.Backup server is used to automatically man-
age space on cooperate cloud server.Various modules like admin panel,user manage-
ment,document encryption,manage access permission,access shared documents and
automatic space management together contribute as backbone of system.Many re-
search have been carried out on combination of cloud computing and cryptography
because of increase in demand of cloud computing.
2.2 Methods
For data integrity ,group members suggested to use cryptography algorithms
like Blowfish and ECC.User will upload documents on cloud server using login id and
password.cloud server will automatically split document into 4 parts.These 4 parts
will be encrypted alternately using ECC and blowfish.
Encrypted keys will be stored on cloud server in encrypted format.Various access
permissions will be managed.As well as they will be stored in cloud server.There are
applications of this system like Document storage and sharing system for Corporate
sector ,Online cloud based Evidence management system ,Important document stor-
age application for general user
Deployment platform used will be windows,Application server is apache tomcat,technology
used will be java EE,spring boot will be used as mvc framework and development tool
is eclipse IDE 2022-06.
2
3 Proposed Work
3.2 Aim
Research work focuses on automatic space management on cloud and redirect-
ing unused files to backupserver and hybrid cryptography to prevent data accessibility
by an unauthorized individual.Almost all type of data including image,video,audio,files,etc
can be included.Along with this all types of cryptography algorithms including DES,AES,
blowfish,ECC,RSA,SHA,etc can be used .whereas in this reserach work more emphasis
is given on blowfish and ECC. In this research work a local cloud server for coorporate
sector will be designed and developed comprising a cryptography based approach for
managing data.
3.4 Methodology
In the proposed research work a system will be designed and developed com-
prising proposed feature of both cloud computing and hyrid cryptography
1 client or end user logins to cloud using login id and password.
2 After logging in users upload document on cloud server.
3 Split document into 4 parts.Encrypt document using ECC and blowfish algo-
rithms.
4 Store encrypted keys on cloud server in encrypted format.
5 Store document on cloud Server.Manage Access permissions.
6 Store access permissions on cloud server.
3
4 Conclusion
4
5 References
A lot of researches have been made considering security in cloud computing so far.
Different authors have suggested different techniques to achieve security considering
as the primary concern for the users.
In, [2] Anshika Negi et al. proposed a model where the encryption as well as the
decryption method is performed by making use of counter propagation neural (CPN)
networks. It is an enhancement on the traditional security system. It discusses about
three level authentication mechanisms to improve information security. It does not
talk about the performance. The real time monitoring of the system and functioning
of the forensic virtual machine is also included in the solution proposed
Divya Prathana Timothy et al. in [14] proposed a hybrid model that uses Blowfish,
RSA, and SHA-2 algorithms. It is a union of both symmetric as well as asymmetric
algorithms. Data confidentiality is handled by Blowfish, authentication is dealt with
RSA and the integrity of data is handled by SHA-2 algorithm. A high security is
provided in this model during data transmission over the internet.
Manju Khari et al. in [15] proposed a Hybrid Encryption Scheme. For user iden-
tification and verification, they use a biometric process. The various algorithms used
in this paper are Secure Hash Algorithm (SHA), Rivest-Shamir-Adleman (RSA), 3
DES (Data Encryption Standard) algorithms. For uploading the information securely,
SHA and RSA algorithms are used whereas 3DES cryptography algorithm is used for
data transmission to be done securely. This architecture will create a highly secure
environment and also prevent from unauthorized access.
Shilpi Singh et al. in [16] propose a scheme that uses Elliptic Curve Cryptogra-
phy. Here, the data is encrypted at the client side and can only be decrypted after
downloading. Also, at the time of login, the user authenticates themselves via differ-
ent input parameters. For further security, Elliptic curve cryptosystem (ECC) and
Elliptic Curve Diffie-Hellman (ECDH) algorithms are used. They are efficient because
key size is less here, and security is much more efficient