0% found this document useful (0 votes)
14 views

Seminar Report

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views

Seminar Report

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

(7KS09) Seminar Report

on
Title
Submitted by

Srushti .A. Patekar

Seventh Semester
B.E. (Computer Science & Engineering)

Guided by

Prof. Ms. N. M. Yawale

PRMIT&R
Department of Computer Science & Engineering,
Prof. Ram Meghe Institute of Technology & Research,
Badnera - Amravati
2022-2023
CERTIFICATE

This is to certify that the Seminar report entitled

ONLINE AUTOMATIC SPACE MANAGEMENT AND


FILE STORAGE ON CLOUD USING HYBRID
CRYPTOGRAPHY

is a bonafide work and it is submitted to the


Sant Gadge Baba Amravati University, Amravati
by

Ms.Srushti .A. Patekar

Seventh Semester B.E.(Computer Science & Engineering) in


the partial fulfillment of the requirement for the degree of Bachelor of
Engineering in Computer Science & Engineering, during the academic year
2022-2023 under my guidance.

Prof. Ms. N. M. Yawale Dr. G. R. Bamnote


Guide HOKD
Department of Computer Sci.& Engg Department of Computer Sci.& Engg
PRM Institute Of Technology & Research, PRM Institute Of Technology & Research,
Badnera Badnera

Department of Computer Science & Engineering,


Prof. Ram Meghe Institute of Technology & Research,
Badnera - Amravati
Online automatic space management and File Storage On Cloud Using Hybrid Cryptography

2022-2023

3
Acknowledgment

With great pleasure we hereby acknowledge the help given to us by various individuals
throughout the project. This Project itself is an acknowledgement to the inspiration,
drive and technical assistance contributed by many individuals. This project would
have never seen the light of this day without the help and guidance we have received.

We would like to express our profound thanks to Prof. Ms. N. M. Yawale


for their guidance and constant supervision as well as for providing necessary infor-
mation regarding the project & also for their support in completing the project. We
would also thank the faculties of the Department of Computer Science & Engineering,
for their kind co-operation and encouragement which help us in completion of this
project. We owe an incalculable debt to all staffs of the Department of Computer
Science & Engineering for their direct and indirect help.

Our thanks and appreciations also go to our colleague in developing the project
and people who have willingly helped us out with their abilities.

We extend our heartfelt thanks to our parents, friends and well wishers for their
support and timely help. Last but not the least; we thank the God Almighty for
guiding us in every step of the way.

i
Abstract

This is a cloud application which can be used in corporate sector to store, share and
upload documents. This application makes it easier for the cloud admin as well as the
company admin and the users (including branch manager and employees) to operate
documents/files which are present on cloud server/database.

This project will have solutions to upload and download documents, store docu-
ments on the server, also to view documents shared by other users and to view file
details which are on the server. In the proposed system, the cloud admin will provide
login credentials to the company admin after successful verification of the registration
details. When the user will upload a document, it will be automatically encrypted
using the hybrid algorithm.

The users will have more solutions to manage access permission such as edit or up-
date access permission as well as store access permission on the cloud server. The
admin/user will be able to access shared documents as well as download them in the
decrypted form using verified OTP.

In this cloud application, an automatic space manager will be used to track various
actions related to document such as how many times the document is being down-
loaded and shared. This will help find out unused files and move them on backup
server. In case the unused file’s demand suddenly increases, then the file will be
moved from backup server to main cloud server using automatic space manager

ii
Contents

1 Introduction 1
1.1 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1

2 Related Work 2
2.1 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
2.2 Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2

3 Proposed Work 3
3.1 Problem Definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
3.2 Aim . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
3.3 Proposed Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
3.4 Methodology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3

4 Conclusion 4

References 5

5 References 5

iii
1 Introduction

Data security , Data management ,Data availability and data accessibility


have dramatic impact on individuals during data retrieval,data storage and data up-
dation . These carry with them various factors like economical , environmental ,data
security ,etc. If data is compromised it has a huge effect on an individual , organiza-
tion or firm.
Nowadays Automatic space management and security both concepts are very demand-
ing in any organization who are dealing with huge amount of data.Cloud computing
and cryptography both domains are the key to successful data handling , data pro-
cessing ,data security and data storage.
Cloud computing is the on-demand availability of computer system resources, espe-
cially data storage and computing power, without direct active management by the
user. Large clouds often have functions distributed over multiple locations, each lo-
cation being a data center. Cloud computing relies on sharing of resources to achieve
coherence and typically using a ”pay-as-you-go” model which can help in reducing
capital expenses but may also lead to unexpected operating expenses for unaware
users.
Cryptography is the study of secure communications techniques that allow only the
sender and intended recipient of a message to view its contents. The term is derived
from the Greek word kryptos, which means hidden. It is closely associated to encryp-
tion, which is the act of scrambling ordinary text into what’s known as ciphertext
and then back again upon arrival.
Cryptography in the cloud employs encryption techniques to secure data that will be
used or stored in the cloud. It allows users to conveniently and securely access shared
cloud services, as any data that is hosted by cloud providers is protected with encryp-
tion. Cryptography in the cloud protects sensitive data without delaying information
exchange.
This system aims at development of automatic space management system on cloud
followed by hybrid cryptography.Blowfish and ECC algorithm are the backbone of
hybrid cryptography.System could be implemented in any sector including corpo-
rate,banking and legal sectors.

1.1 Motivation
The main motivation behind cloud computing is to enable businesses to get
access to data centers and manage tasks from a remote location. Cloud computing
works on the pay-as-you go pricing model, which helps businesses lower their operating
cost and run infrastructure more efficiently

1
2 Related Work

2.1 Background
The most fundamental problem in cloud computing is security and there
many other problems like space management,accessibility.Hybrid cryptography is
implemented using blowfish and ECC.Backup server is used to automatically man-
age space on cooperate cloud server.Various modules like admin panel,user manage-
ment,document encryption,manage access permission,access shared documents and
automatic space management together contribute as backbone of system.Many re-
search have been carried out on combination of cloud computing and cryptography
because of increase in demand of cloud computing.

2.2 Methods
For data integrity ,group members suggested to use cryptography algorithms
like Blowfish and ECC.User will upload documents on cloud server using login id and
password.cloud server will automatically split document into 4 parts.These 4 parts
will be encrypted alternately using ECC and blowfish.
Encrypted keys will be stored on cloud server in encrypted format.Various access
permissions will be managed.As well as they will be stored in cloud server.There are
applications of this system like Document storage and sharing system for Corporate
sector ,Online cloud based Evidence management system ,Important document stor-
age application for general user
Deployment platform used will be windows,Application server is apache tomcat,technology
used will be java EE,spring boot will be used as mvc framework and development tool
is eclipse IDE 2022-06.

2
3 Proposed Work

3.1 Problem Definition


Automatic Space management is one of the major task of cloud comput-
ing.Applying security to the files uploaded on cloud server is one of the major task
of hybrid cryptography.

3.2 Aim
Research work focuses on automatic space management on cloud and redirect-
ing unused files to backupserver and hybrid cryptography to prevent data accessibility
by an unauthorized individual.Almost all type of data including image,video,audio,files,etc
can be included.Along with this all types of cryptography algorithms including DES,AES,
blowfish,ECC,RSA,SHA,etc can be used .whereas in this reserach work more emphasis
is given on blowfish and ECC. In this research work a local cloud server for coorporate
sector will be designed and developed comprising a cryptography based approach for
managing data.

3.3 Proposed Objectives


The objectives of the project are:
ˆ To develop an online cloud based storage system
ˆ To implement automatic space management algorithm
ˆ To implement hybrid cryptography for document security

3.4 Methodology
In the proposed research work a system will be designed and developed com-
prising proposed feature of both cloud computing and hyrid cryptography
1 client or end user logins to cloud using login id and password.
2 After logging in users upload document on cloud server.
3 Split document into 4 parts.Encrypt document using ECC and blowfish algo-
rithms.
4 Store encrypted keys on cloud server in encrypted format.
5 Store document on cloud Server.Manage Access permissions.
6 Store access permissions on cloud server.

3
4 Conclusion

Automatic space management deals with the automatically managing space on


cloud and redirecting unused files like audio,video,document ,image files to backup
servers.This article focuses on a typical space management phenomena along with
data security.Cloud computing and cryptography is an emerging research area .various
research is being carried out to find numerous ways to implement cryptography along
with cloud computing.This field has attracted considerable research attention in the
past few years.Applications that utilize results from this idea is also expected to
emerge in the near future.Blowfish and ECC are seen as the backbone of hybrid
cryptography in this article

4
5 References

A lot of researches have been made considering security in cloud computing so far.
Different authors have suggested different techniques to achieve security considering
as the primary concern for the users.

In, [2] Anshika Negi et al. proposed a model where the encryption as well as the
decryption method is performed by making use of counter propagation neural (CPN)
networks. It is an enhancement on the traditional security system. It discusses about
three level authentication mechanisms to improve information security. It does not
talk about the performance. The real time monitoring of the system and functioning
of the forensic virtual machine is also included in the solution proposed

. Shakeeba S. Khan et al. in [10] proposed a multilevel encryption and decryption


algorithm to improve the security with respect to cloud. According to this technique,
the attacker or some unauthorized user would have to perform decryption of data
at every level, which proves to be a more troublesome task than decrypting it at a
single level. The three levels have three different algorithms namely Rivest-Shamir
Adleman (RSA), Data Encryption Standard (DES), and Advanced Encryption Stan-
dard (AES) respectively. This aims at shielding the data from an unauthorized access.

Divya Prathana Timothy et al. in [14] proposed a hybrid model that uses Blowfish,
RSA, and SHA-2 algorithms. It is a union of both symmetric as well as asymmetric
algorithms. Data confidentiality is handled by Blowfish, authentication is dealt with
RSA and the integrity of data is handled by SHA-2 algorithm. A high security is
provided in this model during data transmission over the internet.

Manju Khari et al. in [15] proposed a Hybrid Encryption Scheme. For user iden-
tification and verification, they use a biometric process. The various algorithms used
in this paper are Secure Hash Algorithm (SHA), Rivest-Shamir-Adleman (RSA), 3
DES (Data Encryption Standard) algorithms. For uploading the information securely,
SHA and RSA algorithms are used whereas 3DES cryptography algorithm is used for
data transmission to be done securely. This architecture will create a highly secure
environment and also prevent from unauthorized access.

Shilpi Singh et al. in [16] propose a scheme that uses Elliptic Curve Cryptogra-
phy. Here, the data is encrypted at the client side and can only be decrypted after
downloading. Also, at the time of login, the user authenticates themselves via differ-
ent input parameters. For further security, Elliptic curve cryptosystem (ECC) and
Elliptic Curve Diffie-Hellman (ECDH) algorithms are used. They are efficient because
key size is less here, and security is much more efficient

You might also like