Meet Updated
Meet Updated
BACHELOR OF TECHNOLOGY
in
COMPUTER SCIENCE ENGINEERING
with specialization in CYBER SECURITY
MAY 2024
Department of Networking And Communications
SRM Institute of Science & Technology
Title of Work : SecureDataPro: Advanced Encryption and Robust Data Chunking System
We hereby certify that this assessment compiles with the University’s Rules and Regulations relating
to Academic misconduct and plagiarism, as listed in the University Website, Regulations, and the
Education Committee guidelines.
We confirm that all the work contained in this assessment is my / our own except where indicated,
and that We have met the following conditions:
We understand that any false claim for this work will be penalized in accordance with the
University policies and regulations.
DECLARATION:
We are aware of and understand the University’s policy on Academic misconduct and plagiarism and I
certify that this assessment is my / our own work, except where indicated by referring, and that I have
followed the good academic practices noted above.
ii
SRM INSTITUTE OF SCIENCE AND TECHNOLOGY
KATTANKULATHUR – 603 203
BONAFIDE CERTIFICATE
iii
ACKNOWLEDGEMENT
We extend our sincere thanks to Dean-CET, SRM Institute of Science and Technology, Dr.
T.V.Gopal, for his invaluable support.
We wish to thank Dr. Revathi Venkataraman, Professor & Chairperson, School of Computing,
SRM Institute of Science and Technology, for her support throughout the project work.
We are incredibly grateful to our Head of the Department, Dr. Annapurani K, Professor,
Department of Networking And Communications SRM Institute of Science and Technology, for her
suggestions and encouragement at all the stages of the project work.
We want to convey our thanks to our Project Coordinator, Dr. Deepa Thilak K, Associate
Professor, Panel Head, Dr. Manickam M, Assistant Professor and members, Dr. Kalaiselvi K, Associate
Professor, Dr. KA Varun Kumar, Assistant Professor, Department of Networking and Communications,
SRM Institute of Science and Technology, for their inputs during the project reviews and support.
We register our immeasurable thanks to our Faculty Advisor, Dr. Thanga Revathi S, Associate
Professor, Department of Networking and Communications, SRM Institute of Science and Technology, for
leading and helping us to complete our course.
Our inexpressible respect and thanks to our guide, Dr. Manickam M, Assistant Professor,
Department of Networking and Communications, SRM Institute of Science and Technology, for providing
us with an opportunity to pursue our project under his mentorship. He provided us with the freedom and
support to explore the research topics of our interest. His passion for solving problems and making a
difference in the world has always been inspiring.
We sincerely thank the Networking and Communications Department staff and students, SRM
Institute of Science and Technology, for their help during our project. Finally, we would like to thank
parents, family members, and friends for their unconditional love, constant support, and encouragement.
Akshay Modi[RA2011030010084]
Saksham[RA2011030010074]
Ishaan Markanday[RA2011030010082]
Sahil Singh[RA2011030010096]
iv
v
ABSTRACT
vi
TABLE OF CONTENTS
ABSTRACT vi
LIST OF FIGURES ix
LIST OF TABLES x
ABBREVIATIONS 1
1 INTRODUCTION 2
1.1 About 3
1.2 Objectives 5
1.3 Scope 6
1.4 Problem Statement 8
2 LITERATURE SURVEY 11
2.1 Research Gap 13
vii
5 MODULES AND IMPLEMENTATION OF ADVANCED
ENCRYPTION AND DATA CHUNKING SYSTEM 27
5.1 Modules 27
5.1.1 File Splitting Module 27
5.1.2 Encryption Decryption Module 28
5.1.3 Data Integrity And Authentication Module 29
5.2 Implementation 30
5.2.1 Training Strategies for SecureDataPro Implementatiion 30
5.2.2 Encryption Algorithms used in SecureDataPro Implementation 31
5.3 User Interface 33
5.3.1 Home Page 33
5.3.2 Sign Up Page 34
5.3.3 Login Page 35
5.3.4 Encryption Page 36
5.3.5 File List Page 37
5.3.6 Decryption Page 38
5.3.7 Database 39
REFERENCES 54
APPENDIX 55
A CODING 55
B CONFERENCE AND JOURNAL PUBLICATION 71
C PLAGIARISM REPORT 74
viii
LIST OF FIGURES
System 16
Chunking System 23
System 24
System 25
System 26
5.7 Database 40
6.1 Comparison of Memory usage by AES, DES and RSA
45
ix
x
LIST OF TABLES
6.1 Comparison of various packet sizes for DES,AES & RSA algorithm 42
xi
ABBREVIATIONS
RSA - Rivest-Shamir-Adleman
DH - Diffie-Hellman
XOR - Exclusive OR
1
CHAPTER 1
INTRODUCTION
Data protection is a critical aspect in the realm of cybersecurity, and innovative approaches are
continuously being developed to safeguard sensitive information from unauthorized access.
One such pioneering method is SecureDataPro, which emphasizes data protection through a
unique combination of file splitting and diverse encryption algorithms. This approach involves
breaking down a file into smaller chunks, thereby reducing the risk of exposing the entire
dataset in the event of a breach. Each fragment is then encrypted using a variety of encryption
techniques, enhancing the overall security of the data. By employing multiple encryption
algorithms, SecureDataPro ensures that even if one layer of protection is compromised, the rest
of the data remains secure. This multi-layered approach increases the complexity for potential
attackers, making it significantly more challenging to decrypt the information without proper
authorization. Additionally, the use of diverse encryption algorithms adds an extra level of
security by providing different levels of protection to each file chunk. Ultimately,
SecureDataPro stands out as an innovative solution that not only enhances data protection but
also raises the bar for cybersecurity practices, offering a robust defense mechanism against
unauthorized access and potential data breaches.
2
SecureDataPro presents a groundbreaking method of data protection by employing file splitting
and diverse encryption algorithms. One key encryption algorithm utilized in SecureDataPro is
AES, which is widely recognized for its efficiency and security in encrypting sensitive
information. AES operates with different key sizes, ensuring strong protection against potential
cyber threats. Another encryption algorithm featured in SecureDataPro is Rivest-Shamir-
Adleman (RSA), which utilizes both asymmetric and symmetric encryption techniques to
enhance data security. RSA's unique approach of using a public and private key pair adds an
extra layer of protection to the encrypted files, making it challenging for unauthorized users to
access the information. Additionally, SecureDataPro harnesses the power of Twofish
encryption, known for its robustness and resistance to cryptanalysis. Twofish's intricate key
schedule and encryption process make it an ideal choice for securing data through file splitting
and encryption. By employing a strategic combination of AES, RSA, and Twofish encryption
algorithms, SecureDataPro sets a new standard in data protection, prioritizing security and
integrity in a digital landscape fraught with potential risks. In today's digital world, the data
proliferation across various platforms and devices has underscored the critical importance of
robust data protection measures. In response to the escalating cybersecurity threats and the
ever-increasing volume of sensitive information, innovative solutions are imperative to
safeguarding data integrity and confidentiality. SecureDataPro emerges as a pioneering
approach to address these challenges, leveraging the combined power of file splitting and
diverse encryption algorithms. By breaking down files into smaller, more manageable chunks
and encrypting them with multiple encryption techniques, SecureDataPro offers a dynamic
defense mechanism against unauthorized access and potential data breaches. This introduction
of advanced cryptographic techniques not only enhances data security but also ensures the
preservation of privacy in an era characterized by heightened digital risks. SecureDataPro
represents a paradigm shift in data protection, setting new standards for safeguarding valuable
information assets across diverse digital environments.
1.1 ABOUT
3
data security and privacy, providing users with greater control over their digital assets.
As the digital landscape continues to evolve and cyber threats become increasingly
sophisticated, SecureDataPro's innovative approach to data protection offers a robust
solution to safeguard valuable information. The strategic combination of file splitting
and diverse encryption algorithms not only enhances data security but also raises the
bar for cybersecurity practices. SecureDataPro stands out as a comprehensive data
protection solution that prioritizes security and confidentiality, providing a high level of
protection against potential data breaches and unauthorized access.
4
This unique approach to data protection, where file splitting and multi-layered
encryption meet, represents a significant advancement in cybersecurity. By leveraging
these technologies, SecureDataPro establishes itself as a leading solution for secure data
storage and transmission, offering peace of mind in a world where data security is
paramount.
1.2 OBJECTIVES
5
SecureDataPro bolsters the robustness of data encryption, presenting a formidable
challenge for attackers attempting to breach sensitive information without access to the
requisite decryption keys. Moreover, SecureDataPro is designed to adapt to the
evolving landscape of digital threats, offering users a resilient solution tailored to the
demands of an increasingly digitized world. By fostering a multidimensional defense
mechanism, By reducing the dangers of data breaches and illegal access, SecureDataPro
enables both people and businesses to efficiently protect their data assets. In the end,
SecureDataPro proves to be a ground-breaking solution ready to raise the bar for data
security and guarantee the confidentiality and integrity of critical data in modern digital
settings..
1.3 SCOPE
6
The scope for SecureDataPro's application and impact in the realm of data protection is
vast and promising. With its innovative approach integrating file splitting and diverse
encryption algorithms, SecureDataPro has the power to address a many range of
cybersecurity challenges across various industries and use cases. One key aspect of its
scope lies in its adaptability to diverse environments, including but not limited to cloud
computing, IoT devices, and mobile applications. SecureDataPro's versatility enables it
to safeguard data across different platforms and devices, ensuring comprehensive
protection for organizations and individuals alike. Additionally, as data volumes
continue to escalate exponentially, SecureDataPro's robust file splitting techniques and
encryption algorithms position it as a scalable solution capable of handling large
datasets effectively. Moreover, as regulatory requirements around data privacy and
security become increasingly stringent, SecureDataPro offers a proactive approach to
compliance, assisting organizations in meeting regulatory standards and avoiding
potential penalties. Furthermore, as the cybersecurity landscape evolves with emerging
threats and technologies, SecureDataPro's continuous innovation and adaptability
ensure its relevance and effectiveness in safeguarding sensitive information. Overall,
the scope for SecureDataPro extends across various industries and scenarios, providing
a versatile and comprehensive solution to the complex challenges of data protection in
the digital age.
7
sensitive data generated and processed at the edge, preventing unwanted access and
data breaches, by putting its file splitting and encryption techniques into practice.
The scope of SecureDataPro also includes enabling safe cloud environment data
management and storage. With the growing number of enterprises depending on cloud
services for data processing and storage, SecureDataPro can offer an additional security
layer to enhance the capabilities of current cloud security protocols. SecureDataPro
improves data safety and resilience against cloud-based dangers including data breaches
and illegal access by encrypting data before storing it in the cloud and using its file
splitting algorithms to distribute data over many storage locations.
8
By leveraging file splitting techniques alongside diverse encryption algorithms,
SecureDataPro establishes a robust shield against potential data breaches. This
comprehensive defense mechanism not only fortifies security measures but also mitigates
vulnerabilities inherent in centralized data storage systems. Through its innovative
methodology, SecureDataPro sets a new benchmark for data protection standards,
prioritizing maximum security and resilience in an ever-evolving digital landscape.
9
challenges in the rapidly evolving cybersecurity landscape. By staying ahead of emerging
threats and evolving its security measures accordingly, SecureDataPro empowers
organizations and individuals to navigate the complexities of data security with confidence
and peace of mind.
10
CHAPTER 2
LITERATURE SURVEY
1. Seth, B., Dalal, S., Jaglan, V., Le, D. N., Mohan, S., & Srivastava, G. (2022). Integrating
encryption techniques for secure data storage in the cloud. Transactions on Emerging
Telecommunications Technologies, 33(4), e4108.
Seth, B., Dalal, S., Jaglan, V., Le, D. N., Mohan, S., & Srivastava, G. (2022) present their
innovative approach in their recent article on integrating encryption techniques for secure data
storage in the cloud. Their work, titled "SecureDataPro: Advanced Encryption and Robust Data
Chunking System," focuses on enhancing data security through a combination of file splitting
and diverse encryption algorithms. Published in Transactions on Emerging
Telecommunications Technologies, this research highlights the importance of implementing
advanced encryption strategies for protecting sensitive data stored in cloud environments.
2. Arora, A., Garg, H., & Shivani, S. (2023). Privacy protection of digital images using
watermarking and qr code-based visual cryptography. Advances in Multimedia, 2023.
Arora, A., Garg, H., & Shivani, S. (2023) in their research article titled "Privacy protection of
digital images using watermarking and QR code-based visual cryptography" published in
Advances in Multimedia, 2023, propose innovative methods for safeguarding digital image
privacy. Their study explores the combination of watermarking and QR code-based visual
cryptography to enhance data protection measures. This research contributes to the
advancement of privacy preservation techniques in the digital realm, offering valuable insights
for further developments in the field.
3. Malina, L., Dzurenda, P., Ricci, S., Hajny, J., Srivastava, G., Matulevičius, R., ... & Tang, Q.
11
(2021). Post-quantum era privacy protection for intelligent infrastructures. IEEE Access, 9,
36038-36077.
Malina et al. (2021) present a pioneering approach called SecureDataPro for data protection in
the post-quantum era. This innovative method involves file splitting and utilizing diverse
encryption algorithms to safeguard intelligent infrastructures and ensure privacy. The proposed
technique in their study, published in IEEE Access, focuses on enhancing security measures for
data transmission and storage within advanced technological environments. With a
comprehensive framework that addresses the challenges of the evolving threat landscape,
SecureDataPro offers a robust solution for protecting sensitive information in modern systems.
4. Shi, Z., Oskolkov, B., Tian, W., Kan, C., & Liu, C. (2024). Sensor Data Protection Through
Integration of Blockchain and Camouflaged Encryption in Cyber-Physical Manufacturing
Systems. Journal of Computing and Information Science in Engineering, 24(7).
Shi, Z., Oskolkov, B., Tian, W., Kan, C., and Liu, C. (2024) proposed a novel approach in their
research article titled "Sensor Data Protection Through Integration of Blockchain and
Camouflaged Encryption in Cyber-Physical Manufacturing Systems" published in the Journal
of Computing and Information Science in Engineering. The study introduces SecureDataPro, a
pioneering method that focuses on data protection through file splitting and the utilization of
diverse encryption algorithms. This innovative approach aims to enhance security measures in
cyber-physical manufacturing systems by combining blockchain technology with camouflaged
encryption techniques.
5. Samanta, D., Alahmadi, A. H., Karthikeyan, M. P., Khan, M. Z., Banerjee, A., Dalapati, G.
K., & Ramakrishna, S. (2021). Cipher block chaining support vector machine for secured
decentralized cloud enabled intelligent IoT architecture. IEEE Access, 9, 98013-98025.
Samanta, D., Alahmadi, A. H., Karthikeyan, M. P., Khan, M. Z., Banerjee, A., Dalapati, G. K.,
& Ramakrishna, S. (2021) proposed a Cipher Block Chaining Support Vector Machine for
Secured Decentralized Cloud Enabled Intelligent IoT Architecture. This innovative approach
was presented in the IEEE Access journal. The study focuses on enhancing data protection in
IoT environments by utilizing advanced encryption techniques. The research highlights the
importance of secure decentralized cloud architecture in ensuring the confidentiality and
integrity of sensitive information.
6. Li, T., He, X., Jiang, S., & Liu, J. (2022). A survey of privacy-preserving offloading
methods in mobile-edge computing. Journal of Network and Computer Applications, 203,
103395.Li, T., He, X., Jiang, S., & Liu, J. (2022) conducted a survey on privacy-preserving
offloading methods in mobile-edge computing, as published in the Journal of Network and
12
Computer Applications. Their research delves into cutting-edge strategies that maintain data
security during offloading processes. This study sheds light on the pivotal role of privacy
preservation in enhancing mobile-edge computing efficiency and security. Their findings offer
valuable insights for developing novel approaches in data protection for mobile-edge
environments.
7. Pham, H., Woodworth, J., & Amini Salehi, M. (2019). Survey on secure search over
encrypted data on the cloud. Concurrency and Computation: Practice and Experience, 31(17),
e5284.
Pham, H., Woodworth, J., & Amini Salehi, M. (2019) conducted a survey on secure search
over encrypted data on the cloud. The study, published in Concurrency and Computation:
Practice and Experience, explores the challenges and strategies for ensuring data security in
cloud environments. The researchers highlight the importance of utilizing diverse encryption
algorithms and file splitting techniques to protect sensitive information effectively. Their work
contributes to the advancement of secure data management practices in cloud computing.
8. Thushara, G. A., & Bhanu, S. M. S. (2022, November). A Flexible and Adaptive Hybrid
Algorithm for Secure Data Sharing in Cloud Computing. In 2022 IEEE 19th India Council
International Conference (INDICON) (pp. 1-8). IEEE.
Thushara, G. A., & Bhanu, S. M. S. (2022) presented a flexible and adaptive hybrid algorithm
aimed at enhancing secure data sharing in cloud computing in their paper titled "A Flexible and
Adaptive Hybrid Algorithm for Secure Data Sharing in Cloud Computing" presented at the
2022 IEEE 19th India Council International Conference (INDICON). This pioneering approach
combines file splitting and diverse encryption algorithms, collectively known as
SecureDataPro, to bolster data protection measures. Through this innovative method, the
authors aim to address the growing concerns related to data security and confidentiality in
cloud computing environments.
9. Vijayakumar, A., & Jebaseeli, A. N. (2020). Pioneer approach of data deduplication to
remove redundant data from cloud storage. International Journal of Advanced Research in
Engineering and Technology (IJARET), 11(10), 535-544.
Vijayakumar, A., & Jebaseeli, A. N. (2020) introduced a pioneering approach to data
deduplication in cloud storage, aimed at removing redundant data efficiently. Their work,
published in the International Journal of Advanced Research in Engineering and Technology
(IJARET), details a novel method to streamline storage and enhance data security measures
through innovative techniques.
10. Alkhalidy, M., Taha, M. B., Chowdhury, R., Ould-Slimane, H., Mourad, A., & Talhi, C.
13
(2023). Vehicular edge based approach for optimizing urban data privacy. IEEE Sensors
Journal. Alkhalidy et al. (2023) propose a vehicular edge-based approach to optimize urban
data privacy in their study published in IEEE Sensors Journal. Their work discusses the use of
SecureDataPro, a pioneering method that employs file splitting and diverse encryption
algorithms for enhanced data protection.
Your research with SecureDataPro addresses this gap by introducing a novel strategy
that combines file splitting with a variety of encryption techniques. This approach
reduces the risk of exposing the entire dataset in the event of a security breach by
breaking it into smaller, more manageable chunks, each independently encrypted with a
different technique. This method creates a multi-layered defense, ensuring that even if
one encryption method is compromised, the other parts of the data remain secure. The
use of varied encryption techniques decreases the likelihood of successful attacks, as
attackers would need to breach multiple encryption layers to access the full dataset.
Furthermore, the file-splitting method reduces the attack surface by limiting the impact
of breaches to smaller data segments, increasing the overall security of the system. This
unique approach offers a stronger protection mechanism against unauthorized access
and cyberattacks, providing a more reliable and resilient solution for safeguarding
sensitive information in today's digital age. SecureDataPro's strategy, thus, fills a
critical gap in existing research by offering a more robust and flexible data protection
solution that adapts to evolving cyber threats.
14
CHAPTER 3
15
compromised. This granular approach to data protection reduces the risk of data loss or
exposure and lessens the effect of possible breaches.
The result is an advanced level of data protection that instills confidence in users
to store and share their files securely. With SecureDataPro, users can rest assured that
their sensitive information is safeguarded using cutting-edge encryption methods,
setting a new standard in data security and privacy.
In essence, SecureDataPro represents a paradigm shift in data protection,
offering a comprehensive solution that addresses the evolving challenges of
cybersecurity. Its innovative approach not only enhances security but also reinforces
user privacy, making it an indispensable tool for individuals and organizations alike
seeking robust data protection in an increasingly digital world.
16
Subsequently, these chunks are encrypted using a blend of encryption algorithms,
represented by the rectangular box labelled "Encrypt with Diverse Algorithms (AES,
RSA, ECC)". The now encrypted chunks are then stored securely in the secure storage
This secure storage could be a physical device or a cloud-based storage system.In
conclusion, SecureDataPro employs a multifaceted approach to data security by
fragmenting files into chunks and encrypting them with various algorithms. This
strategy aims to guarantee that even if one encryption layer is compromised, the
remaining data chunks are shielded.
SecureDataPro breaks down files into smaller, more manageable chunks. This
process reduces the risk of a single point of failure by dispersing the data across
multiple chunks.By splitting files, SecureDataPro minimizes the impact of
potential breaches. Even if one chunk is compromised, the exposure is limited to
that specific portion of the data, rather than the entire file.This granular
approach to data storage and protection enhances resilience against unauthorized
access and data manipulation.SecureDataPro encrypts every data piece
separately using a range of encryption techniques. Industry-standard techniques
like Rivest-Shamir-Adleman (RSA), Advanced Encryption Standard (AES), and
Elliptic Curve Cryptography (ECC) might be included in these algorithms.Using
a variety of encryption algorithms increases the process' complexity and makes
it much harder for bad actors to decode the data.The confidentiality and integrity
of the data are maintained even in the event that one encryption scheme is
broken because the other encrypted portions are safe.
17
various encryption techniques, SecureDataPro establishes multiple layers of
protection.
This multi-layered approach significantly improves data protection and
confidentiality, reducing the likelihood of successful attacks and mitigating the
impact of potential breaches.
Rivest-Shamir-Adleman (RSA):
RSA is a public-key encryption algorithm that relies on asymmetric key
pairs (public and private keys) for encryption and decryption.SecureDataPro
uses asymmetric key distribution with RSA to improve data security. The
matching private key is used for decryption, and the public key is used for
encryption.
Strong security guarantees are provided by RSA, especially in situations where
18
parties must exchange keys securely.SecureDataPro improves the security of
data storage and transmission by integrating RSA into its encryption framework,
particularly in situations involving secure communication channels.
19
and diverse encryption algorithms. Firstly, data normalization ensures that input
data maintains uniformity in format and structure, optimizing subsequent
encryption processes for efficiency. This standardization streamlines encryption
procedures, contributing to smoother operations and consistent results.
Secondly, data tokenization segments the input data into smaller, more
manageable chunks, simplifying the management and encryption of individual
components. This segmentation enhances data security by dispersing sensitive
information across multiple encrypted chunks, minimizing the impact of
potential breaches. Thirdly, data cleansing eliminates inconsistencies and
extraneous elements from the input data, ensuring that only relevant and valid
information undergoes encryption. This purification process enhances the
integrity of the encrypted data, reducing the risk of errors or vulnerabilities.
Finally, data compression reduces the size of the input data, enhancing storage
efficiency and expediting encryption and decryption processes. By reducing data
volume without compromising security, SecureDataPro optimizes resource
utilization and enhances overall system performance. Collectively, these pre-
processing techniques streamline data protection efforts, fortify encryption
security, and establish SecureDataPro as a pioneering solution for safeguarding
sensitive information in today's digital landscape.Furthermore, the integration of
these pre-processing techniques in SecureDataPro not only enhances data
protection but also contributes to the overall effectiveness and efficiency of the
encryption process. Data normalization ensures that regardless of the original
format or structure of the input data, SecureDataPro can consistently apply
encryption algorithms, thus optimizing performance and reducing the errors.
Data tokenization not only facilitates easier management of data chunks but also
enhances security by reducing the exposure of sensitive information within each
individual segment. This segmentation strategy not only improves security but
also facilitates easier management and retrieval of encrypted data. Furthermore,
by eliminating any anomalies or superfluous components that can jeopardize the
encrypted data's security, data cleansing is essential to guaranteeing the quality
and integrity of the data.. By purifying the input data before encryption,
SecureDataPro minimizes the risk of vulnerabilities and enhances the reliability
of the encrypted data. Finally, data compression not only reduces storage
requirements but also speeds up encryption and decryption processes, thus
20
enhancing overall system performance. This optimization of resource utilization
contributes to a more efficient and scalable data protection solution, making
SecureDataPro a pioneering approach in safeguarding sensitive information
through file splitting and diverse encryption algorithms.
21
additional degree of complexity, making it difficult for them to jeopardize
important data. This multi-layered security framework ensures comprehensive
protection for valuable data assets.
CHAPTER 4
22
components, and functionalities of the Advanced Encryption and Robust Data Chunking
System. It outlines the systematic arrangement of modules, including data chunking, data
encryption, data decryption, and user interface development. The system design emphasizes the
integration of advanced encryption and decryption algorithms for encryption and decryption.
23
Fig 4.1 System Architecture of Advanced Encryption and Data Chunking Sytem
Fig.4.1 shows a high level overview of system architecture of advanced encryption and
data chunking system. In detail, the first step involves creating a container. This container can
be a folder or directory on a computer system. Once a container is created, files can be saved
within it. The file management system also has a file chunking system which seems to break
down large files into multiple parts for storage. Additionally, the system encrypts files using
AES and Fernet algorithms which helps to secure them. After the files are encrypted, they are
then saved in the container. The system also has a decryption system that is likely used to
decrypt the files when they are needed. Finally, there is a saving metadata in SQL step. SQL
likely refers to Structured Query Language which is a query language used to access and
manipulate data stored in a relational database management system. In this context, the
metadata is likely information about the files such as their name, size, and creation date. This
metadata is stored in a database using SQL. Overall, the file management system provides a
way to organize, store, secure and encrypt files.
24
SecureDataPro's development process leverages a rigorous system design approach.
Class diagrams, a fundamental tool in object-oriented design, play a crucial role in visualizing
and documenting the system's architecture. These diagrams represent the blueprint of the
system, outlining the various classes (software building blocks) and their interactions. In the
context of SecureDataPro, class diagrams would likely depict classes like 'File', 'Chunk',
'EncryptionAlgorithm', 'StorageManager', and 'UserManager'. These classes would encapsulate
the functionalities of file splitting, encryption, secure storage, and user access control. By
meticulously defining these classes and their relationships through class diagrams, developers
can ensure a clear understanding of the system's structure and functionality. This promotes
efficient development, reduces the risk of errors, and facilitates future maintenance of
SecureDataPro.
Fig 4.2 Class Diagram of Advanced Encryption and Data Chunking Sytem
Fig 4.2 shows class diagram,the system leverages a two-pronged approach that
combines file chunking and multiple encryption algorithms to safeguard data. In the first step, a
file is divided into smaller chunks. Subsequently, these chunks are encrypted using encryption
algorithms. Then, the encrypted chunks are stored securely. This strategy aims to guarantee that
even if one encryption layer is compromised, the remaining data chunks are shielded.
25
The foremost motive of a use case diagram is to show what device capabilities are
finished for which actor. Roles of the actors in the gadget can be depicted. The number one
reason of a use case diagram is to provide a graphical illustration of the machine's functionality
in terms of the interactions between actors and the system itself. It illustrates the specific use
instances, or duties, that actors can carry out inside the device to perform their desires. These
use instances constitute unique functionalities or functions of the system that satisfy the desires
or requirements of the actors. The use case diagram visually depicts the relationships between
actors and use cases, in addition to any dependencies or institutions among exclusive use
cases.. Additionally, the use case diagram can highlight the glide of facts or manage between
actors and the gadget, presenting insights into the system's basic capability.
Fig 4.3 Use Case Diagram of Advanced Encryption and Data Chunking System
Fig 4.3 shows use case diagram which depicts the key interactions and functionalities of
SecureDataPro, a system designed to provide enhanced data security through file splitting and
26
multi-algorithm encryption. The "User" is responsible for uploading files to the system, which
triggers the core operations of file splitting and encryption using multiple algorithms. These
encrypted chunks are then stored securely. When the "User" wants to retrieve their file, they
can request the reassembly and decryption of the chunks. The system reassembles the original
file from the stored chunks and decrypts it before delivering it back to the "User." Additionally,
users can share files securely through a designated use case.
Fig 4.4 DFD Diagram of Advanced Encryption and Data Chunking System
Fig 4.4 shows the DFD diagram. In the first step, user uploads file and then file is
divided into smaller chunks. Subsequently, these chunks are encrypted using a blend of
encryption algorithms. Then, the encrypted chunks are stored securely. This strategy aims to
guarantee that even if one encryption layer is compromised, the remaining data chunks are
shielded.
CHAPTER 5
27
MODULES AND IMPLEMENTATION OF
ADVANCED ENCRYPTION AND ROBUST DATA
CHUNKING SYSTEM
This chapter delves into the practical aspects of the project, presenting a comprehensive
overview of the modules and their implementation. It provides a detailed insight into the real
world application of SecureDataPro, Quality Analysis and Production Management System,
highlighting its operational components and functionality.
5.1 MODULES
The SecureDataPro system commences with the File Splitting module, acting as
the cornerstone for data protection. This module assumes the critical role of
meticulously dissecting the input file into smaller, manageable fragments we call
chunks. The primary objective behind file splitting is to significantly enhance data
security. By strategically distributing the file across multiple storage devices or
locations, the system mitigates the risk associated with a single point of failure. Imagine
a scenario where one storage location is compromised; the remaining chunks, residing
in separate locations, would remain secure. This distributed storage approach also
deters unauthorized access attempts. Even if an attacker gains access to one chunk, the
scattered nature of the data significantly complicates efforts to reconstruct the entire file
without the corresponding fragments.
The File Splitting module operates with meticulous precision, meticulously
considering various factors to determine the optimal chunk size and the total number of
chunks. File size plays a crucial role – larger files necessitate a higher number of
chunks for effective distribution. Security requirements are also factored in; for highly
sensitive data, smaller chunk sizes might be preferable to minimize potential damage if
a chunk is compromised. Additionally, storage constraints of the target locations are
considered to ensure efficient utilization of storage space.
To achieve efficient and accurate file splitting while maintaining the integrity of
the data, the module leverages sophisticated algorithms. These algorithms perform the
28
division process with remarkable speed and precision, ensuring that each chunk is an
exact fragment of the original file. This meticulous splitting is paramount – any errors
or inconsistencies during the splitting process could potentially corrupt the data upon
reconstruction.
In essence, the File Splitting module establishes the foundation for robust data
protection in SecureDataPro. By fragmenting the file and distributing the chunks across
various locations, it minimizes the exposure of sensitive information in the event of a
security breach and significantly increases the complexity for attackers attempting to
access the entire file. This intelligent and multifaceted approach strengthens data
security and instills confidence in users entrusting their valuable information to the
SecureDataPro system.
29
Key generation: This involves creating robust encryption keys using secure
algorithms.
Key distribution: Secure methods are employed to distribute the necessary
keys to authorized users.
Key storage: The system implements secure storage mechanisms to safeguard
encryption keys, preventing unauthorized access.
In essence, the "Encryption Decryption" module plays a pivotal role in SecureDataPro's
data protection strategy. It empowers users with control over their security needs while
providing a comprehensive encryption framework that safeguards data integrity and
confidentiality.
30
corruption.
By meticulously employing these mechanisms, the Data Integrity and Authentication
module significantly strengthens the overall security posture of SecureDataPro. It
ensures users can have complete confidence that their data remains untainted and
authentic
throughout the entire data protection process. This not only prevents unauthorized data
modification but also aids in identifying and mitigating potential security threats. In
essence, this module acts as a cornerstone for reliable and trustworthy data protection
within SecureDataPro.
5.2 IMPLEMENTATION
31
experienced instructors. By actively participating in hands-on activities, users
gain practical skills and insights into SecureDataPro's capabilities, enabling them
to effectively leverage its tools for secure file management and encryption in real-
world scenarios.
On the other hand, online tutorials offer a convenient and accessible learning
avenue for users to acquire knowledge about SecureDataPro's functionalities,
step-by-step processes, and best practices at their own pace. These tutorials
provide comprehensive and structured guidance, covering topics such as
installation, configuration, file splitting methodologies, encryption algorithms,
and troubleshooting. Through a combination of instructional videos, written
guides, and interactive exercises, online tutorials empower users to grasp
SecureDataPro's concepts and techniques thoroughly. Additionally, online forums
and support channels facilitate collaboration and knowledge sharing among users,
enhancing the learning experience and providing valuable resources for
addressing queries and challenges.
By offering both hands-on workshops and online tutorials as training strategies,
organizations can cater to diverse learning preferences and requirements. Hands-
on workshops provide immersive learning experiences that encourage active
participation and practical skill development, while online tutorials offer
flexibility and accessibility for self-paced learning. Together, these training
strategies ensure that users acquire the necessary skills and knowledge to
effectively implement and utilize SecureDataPro for secure file management and
encryption, thereby enhancing data protection measures and mitigating the risk of
unauthorized access or data breaches.
32
combining these diverse encryption algorithms, SecureDataPro provides a multi-
layered defense against unauthorized access and data breaches. This novel
method guarantees the confidentiality and integrity of data during transmission
and storage in addition to improving file security.Four different encryption
methods are used by SecureDataPro as part of its comprehensive data protection
strategy, and each one adds to the company's unique file splitting and encryption
method. First off, the encryption structure of SecureDataPro is based on the
widely used and extremely safe symmetric encryption method AES-256. AES-
256 is essential for protecting data while it is at rest since it guarantees robust
encryption capabilities. Second, to safely exchange encryption keys, the system
makes use of RSA, a potent asymmetric encryption method. SecureDataPro's total
security is improved by RSA's capacity to enable secure key exchange and
communication channels, guaranteeing the confidentiality and integrity of
encrypted data while it is being transmitted.
Thirdly, Twofish's robust and effective block cipher encryption is
incorporated into SecureDataPro. The strong encryption capabilities of Twofish
reinforce SecureDataPro's resistance against illegal access and data breaches. The
advanced encryption standard Serpent is also incorporated into the system
because of its high level of security and resilience to cryptanalysis. Serpent
strengthens SecureDataPro's security posture by adding an additional layer of
defense and offering strong encryption methods that can fend off sophisticated
attacks.
SecureDataPro creates a multi-layered defensive system against unwanted
access and data breaches by combining these various encryption algorithms. This
novel method guarantees the confidentiality and integrity of data during
transmission and storage in addition to improving file security. Through its
comprehensive encryption framework, SecureDataPro offers organizations a
robust solution for protecting sensitive information across various platforms and
environments. By leveraging these diverse encryption algorithms, SecureDataPro
empowers organizations to safeguard their valuable data assets effectively,
ensuring compliance with regulatory requirements and bolstering trust among
stakeholders in an increasingly digital world.
SecureDataPro uses RSA, a potent asymmetric encryption method, in
addition to AES-256 for safe key exchange and communication channels. The
33
power of RSA is in its capacity to provide safe communication between
participants through data encryption using a public key that can only be unlocked
with a matching private key. This reduces the possibility of malevolent actors
intercepting or altering data while it is being transmitted by guaranteeing its
confidentiality and integrity.
Additionally, SecureDataPro's defense against unwanted access and data
breaches is strengthened by the integration of Twofish. Twofish is renowned for
its powerful and effective block cipher encryption, which adds an extra degree of
security to encrypted data. Strong encryption methods strengthen SecureDataPro's
overall security posture and increase its resistance to cryptographic attacks.
Furthermore, because of Serpent's high level of security and resilience to
cryptanalysis, SecureDataPro integrates this advanced encryption standard.
Sensitive data stored or communicated through SecureDataPro is guaranteed to
remain secure and to be intact thanks to Serpent's powerful encryption algorithms,
which provide increased protection against sophisticated attacks.
By combining these diverse encryption algorithms, SecureDataPro
establishes a multi-layered defense mechanism that safeguards data from
unauthorized access and potential security breaches. This innovative approach not
only enhances the security of files but also instills confidence in organizations
regarding the confidentiality and integrity of their data. SecureDataPro's
comprehensive encryption framework sets a new standard in data protection,
empowering organizations to protect their valuable assets and maintain
compliance with regulatory requirements in an ever-evolving digital landscape.
34
security, By offering an advanced encryption algorithm, SecureDataPro not only
fortifies digital assets against potential breaches but also empowers users with a user-
friendly interface.
Fig 5.1 shows the home page of our website SecureDataPro which addresses a
critical concern in today's digital landscape by providing a reliable solution for
safeguarding sensitive files. In an era where data breaches and unauthorized access pose
significant threats, SecureDataPro introduces a sophisticated dual-key encryption
system. This innovative approach ensures that users have granular control over their file
security, By offering an advanced encryption algorithm, SecureDataPro not only
fortifies digital assets against potential breaches but also empowers users with a user-
friendly interface. It has encryption button for encrypting file, file list button for
accessing uploaded file and logout button for logout.
35
Fig 5.2 Sign Up Page of SecureDataPro
Fig 5.2 shows the sign up page of our website SecureDataPro where user can
write their username and password to create their account on our website.
36
Fig 5.3 Login Page of SecureDataPro
Fig 5.3 shows the login page of our website SecureDataPro where user can write
their username and password to login to their account on our website
37
Fig 5.4 Encryption Page of SecureDataPro
38
5.3.5 File List Page
The file list page of our website SecureDataPro contains all the files that user has
encrypted yet with their decryption keys.
Fig 5.5 shows the file list page within SecureDataPro, our secure data protection
platform, acts as a central hub for managing user encrypted files. This user-friendly
interface provides a comprehensive overview of all the files user have encrypted using
SecureDataPro. Each entry on the file list page likely displays essential details about
user encrypted files.
The decryption page on the SecureDataPro website plays a vital role in granting
users access to their previously encrypted files. This user-friendly interface facilitates a
streamlined decryption process.
39
Fig 5.6 Decryption Page of SecureDataPro
Fig 5.6 shows decryption page which offers a user-friendly interface for
regaining access to previously encrypted files. Users initiate the process by uploading
the two unique decryption keys associated with their encrypted data. SecureDataPro
then utilizes these keys to decrypt each individual chunk that comprises the encrypted
file, essentially reversing the encryption process and restoring the original data. Once
all chunks are decrypted, the system seamlessly reassembles them into the original file,
making it available for download by the user. This secure decryption functionality
empowers users to control access to their confidential information whenever needed.
5.3.7 Database
Database contains the all the user information like their username, email, age, sex
40
password and the chunk file detail.
Fig 5.7 shows the database of the SecureDataPro users which contains all the
information about the user including their names, email address, age, sex, password and
all the chunks details.
41
CHAPTER 6
6.1 RESULTS
The SecureDataPro system represents a paradigm shift in data protection
methodologies, introducing a pioneering approach that seamlessly integrates file
splitting with diverse encryption algorithms. Through rigorous evaluation and testing,
SecureDataPro has showcased its ability to substantially enhance data security by
dispersing encrypted chunks across multiple storage devices. This decentralized storage
model significantly reduces the risk of data breaches, as compromising one storage
device does not compromise the entirety of the protected data.
Additionally, the use of several encryption techniques in SecureDataPro's
architecture strengthens the security of sensitive data by adding still another layer of
protection. SecureDataPro adds complexity and diversity to the encryption process by
using several encryption techniques, making it very difficult for potential attackers to
decrypt the encrypted data without the necessary decryption keys.
Overall, SecureDataPro stands as a testament to the power of innovative
approaches in addressing the evolving challenges of data protection. Its groundbreaking
methodology not only enhances data security but also sets a new standard for
comprehensive encryption strategies. As companies struggle to keep up with the ever-
growing threat landscape of cyberattacks and data breaches, SecureDataPro shows itself
to be a dependable and strong option for protecting sensitive data in the modern digital
world.Three core file splitting techniques form the cornerstone of SecureDataPro's
creative data protection approach; each has been painstakingly crafted to strengthen its
defense against unwanted access and possible data breaches. First, files are carefully
42
divided into smaller segments according to their byte count when byte-oriented splitting
is employed. This ensures accurate segmentation and makes encryption procedures run
more smoothly. By using this technique, SecureDataPro can efficiently manage files of
different sizes while also preserving the integrity of data chunk sizes, which maximizes
security precautions.
Secondly, pattern-based splitting is seamlessly integrated into SecureDataPro's
framework, allowing the system to identify and segment files based on specific patterns
or sequences. By dispersing data in a non-linear fashion, this methodology adds an
extra layer of complexity to the encryption process, making it significantly more
challenging for unauthorized users to decipher the data. Pattern-based splitting
enhances security by minimizing predictability and reducing the risk of potential data
exposure in the event of a breach.
43
Table 6.1: Comparison of various packet sizes for DES, AES & RSA algorithm
Table 6.1 shows time taken by RSA algorithm for both encryption and
decryption process is much higher compare to the time taken by AES and DES
algorithm. Variation in buffer size is noticed. It does not increase according to the size
of file in all algorithms.
44
traditional data protection systems that often rely on a single encryption method.
Another significant result is SecureDataPro's pattern-based splitting, which
segments files based on specific sequences. This method disrupts linear data
distribution, reducing the predictability that attackers rely on to reconstruct data.
Additionally, size-based splitting divides files into predefined chunk sizes, contributing
to efficient data transfer and storage optimization, further enhancing system
performance.
6.2 COMPARISON
SecureDataPro is a major advancement in data protection, combining file
splitting with varied encryption techniques to offer a robust framework for safeguarding
sensitive data. When compared to traditional data protection methods, the benefits of
SecureDataPro become clear, demonstrating a significant shift in how data security is
approached in a world where cyber threats are constantly evolving.
Traditional data protection methods often rely on a single encryption algorithm
to secure entire datasets. While these algorithms can be robust, they present a major
risk: if an attacker manages to compromise the encryption key, the entire dataset
becomes vulnerable, leading to massive data breaches and potential exposure of
sensitive information. Additionally, traditional systems are typically centralized,
meaning that data is stored in one location or system. This centralization creates a
single point of failure, so when a breach occurs, the consequences can be extensive and
require substantial efforts to contain and remediate the damage.
In contrast, SecureDataPro's approach of splitting files into smaller segments
significantly reduces the impact of a security breach. By dividing files into smaller,
manageable chunks, SecureDataPro inherently complicates the task for attackers. An
attacker would need to reassemble all the individual pieces to reconstruct the dataset,
making it much more difficult to gain unauthorized access. This decentralized approach
also enhances system resilience, ensuring that a breach in one part of the system does
not necessarily compromise the entire dataset. This separation and dispersion of data
45
not only adds complexity for potential attackers but also optimizes storage and data
management.
Adding to this security is SecureDataPro's use of multiple encryption
techniques. While traditional methods typically rely on a single algorithm like AES or
RSA, SecureDataPro employs a diverse range of encryption techniques across the
different file segments. This multi-layered encryption approach ensures that even if one
encryption method is compromised, the other segments remain secure. This variation in
encryption provides a significant advantage over traditional systems, which can be more
vulnerable to breaches if their single encryption method is compromised. Attackers
would need to break through multiple encryption barriers to access the entire dataset,
thereby increasing the level of security and resilience against unauthorized access.
46
Fig 6.1: Comparison of Memory usage by AES, DES and RSA
47
RSA Consumes the Most Memory: Notably, the figure reveals that the RSA algorithm
consistently exhibits the highest memory usage across all text file sizes tested. This
characteristic is primarily attributed to the complex mathematical operations involved in
RSA encryption and decryption. As the size of the text file grows, the computational
demands on the system also increase, leading to a corresponding rise in memory
utilization.
AES and DES Show Lower Memory Usage: Conversely, both AES and DES
demonstrate significantly lower memory consumption compared to RSA. This is due to
their simpler key exchange and encryption/decryption processes. While AES offers a
strong balance between security and performance, DES is considered less secure by
modern standards. However, its inclusion in this comparison provides a valuable
reference point for understanding how memory usage can vary between different
encryption algorithms.
Memory Usage Implications: The memory usage variations depicted in Fig 6.1
have crucial implications for real-world applications. Resource-constrained
environments, such as mobile devices or embedded systems, may struggle with the high
memory demands of RSA, particularly when dealing with large files. In such scenarios,
AES or other memory-efficient algorithms might be more suitable choices.
SecureDataPro also brings adaptability and flexibility to data protection, which
is a major departure from traditional systems. Conventional methods can be rigid and
less effective against evolving cyber threats. SecureDataPro's methodology, with its
combination of file splitting and varied encryption, allows it to adapt to different data
types and environments, providing consistent protection regardless of the platform. This
adaptability is essential in a cybersecurity landscape where attackers are continually
developing new techniques to breach security systems.
The decentralized storage model employed by SecureDataPro also contrasts
with traditional systems, which typically rely on centralized storage. By splitting files
and storing them across multiple devices, SecureDataPro reduces the risk of large-scale
data breaches, ensuring that compromising one storage device does not compromise the
entire dataset. This approach not only enhances security but also optimizes storage
utilization and improves overall system performance.
48
Fig 6.2: Comparison of Output Byte used by AES, DES and RSA
Fig 6.2 presents a compelling finding related to the output byte size generated
by the encryption algorithms employed in our experiment. Notably, the figure
demonstrates that regardless of the text file size used, all three encryption algorithms
(likely RSA, ECC, and AES) produce the same output byte size. This outcome signifies
a key characteristic of these specific encryption algorithms – their ability to maintain a
consistent output size irrespective of the original file size.
49
This consistency in output byte size offers several advantages:
Simplified Storage Management: With a predictable output size, storage
allocation and management become more streamlined. Knowing the exact
amount of storage required for each encrypted file, regardless of its original size,
simplifies storage planning and capacity allocation.
Performance Optimization: Consistent output size can potentially contribute
to optimized encryption and decryption performance. By having a predefined
output size, the encryption and decryption processes can be tailored for
efficiency, potentially leading to faster processing times.
Transparency and Predictability: The consistent output size enhances
transparency and predictability within the system. Users can anticipate the
storage requirements for encrypted files beforehand, fostering better planning
and resource allocation.
It's important to note that while consistent output size is a valuable attribute of these
specific algorithms, it's not a universal characteristic of all encryption methods. Some
encryption algorithms might generate variable output sizes depending on the original
file size.
When comparing outcomes, SecureDataPro's methodology demonstrates clear
superiority over traditional methods. The reduced risk of data breaches and enhanced
security from multi-layered encryption set a new standard for data protection.
Traditional systems, with their centralized storage and single-point encryption, offer
less security and resilience, making them more prone to modern cyber threats.
SecureDataPro's approach, with its decentralized storage, varied encryption techniques,
and adaptable framework, provides a robust and reliable solution for safeguarding
sensitive data in a world where cyber threats are increasingly sophisticated. This
innovative approach sets a new benchmark for comprehensive data protection, offering
organizations a strong defense against unauthorized access and other cyber threats.
50
CHAPTER 7
7.1 CONCLUSION
51
contributes an additional security layer, rendering it much more arduous for unapproved
individuals to decode encrypted data. The fragmented nature of the files and the variety
of encryption techniques used by SecureDataPro provide an extra line of protection,
guaranteeing the integrity and secrecy of sensitive data even in the event that one
encryption scheme is compromised.
In summary, SecureDataPro proves to be a useful resource for businesses and
people looking to safeguard their priceless data assets in a constantly changing digital
landscape. SecureDataPro creates a new benchmark in data security by merging file
splitting and encryption methods, providing a strong barrier against illegal access and
data breaches. With its creative methodology, SecureDataPro empowers users to
maintain control over their privacy and safeguard sensitive information, thereby
enhancing cybersecurity resilience in today's interconnected world.
SecureDataPro's innovative approach to data protection extends beyond
traditional security measures, offering a comprehensive solution to the evolving
challenges of cybersecurity. By integrating file splitting and multiple encryption
algorithms, SecureDataPro establishes a dynamic defense mechanism that adapts to the
complexities of modern data threats.
Organizing files into smaller, easier-to-manage segments improves data
management and lessens the chance of security incidents happening. The file splitting
method used by SecureDataPro makes sure that the integrity of the entire data structure
is preserved even in the event that one component of the file is compromised. By
adding an extra degree of security, this file fragmentation makes it much harder for
unauthorized individuals to access or alter important data.
Furthermore, SecureDataPro's use of multiple encryption algorithms enhances
the robustness of its security framework. By encrypting data with diverse algorithms
such as AES, RSA, and ECC, SecureDataPro ensures that encrypted files are
safeguarded against various cryptographic attacks. By strengthening data confidentiality
and resilience against illegal access, this multi-layered encryption strategy gives users
piece of mind that their information is safeguarded by cutting-edge cryptographic
algorithms.
Furthermore, in addition to encryption, SecureDataPro's proactive defensive
approach includes methods for identifying and thwarting possible security risks.
SecureDataPro detects suspicious activity by ongoing monitoring and analysis, and it
takes proactive steps to stop data breaches before they happen. By taking a proactive
52
stance, businesses and people utilizing SecureDataPro can reduce the chance of data
exposure and improve their overall security posture.To sum up, SecureDataPro offers a
comprehensive solution that combines cutting-edge encryption algorithms and creative
file splitting techniques, thereby representing a paradigm change in data protection. In
the current digital environment, SecureDataPro gives consumers the ability to retain
control over their sensitive data by strengthening data security and resistance against
illegal access. Its strong security features and preemptive protection mechanisms,
SecureDataPro sets a new standard for data protection, ensuring the confidentiality and
integrity of data in an increasingly interconnected world.
53
cyber threats.
Integration with Emerging Technologies: SecureDataPro can explore integration
with emerging technologies such as blockchain and quantum computing. Integration
with blockchain can provide immutable data storage, enhancing data integrity and
auditability. Meanwhile, collaboration with quantum-safe encryption techniques can
prepare SecureDataPro for the era of quantum computing, ensuring data remains secure
against quantum-based attacks.Enhanced User Experience: Future iterations of
SecureDataPro can focus on improving user experience through intuitive interfaces,
streamlined workflows, and automation features. Enhancements in usability can
encourage wider adoption of SecureDataPro among users with varying levels of
technical expertise.
Advanced Threat Detection: SecureDataPro can integrate advanced threat
detection mechanisms powered by AI and ML algorithms. By analyzing patterns and
anomalies in data access and usage, SecureDataPro can proactively identify and
mitigate potential security threats in real-time.Cross-Platform Compatibility: Future
versions of SecureDataPro can prioritize cross-platform compatibility, allowing
seamless integration with a wide range of devices and operating systems. This can
include compatibility with mobile devices, cloud platforms, and IoT devices, ensuring
comprehensive data protection across diverse environments.Regulatory Compliance:
GDPR, CCPA, and other new and developing data protection laws can be more easily
complied with with the help of SecureDataPro's enhanced functionality. Access control,
audit logging, and data governance are all integrated into SecureDataPro, which helps
businesses stay compliant with regulations and stay out of trouble.Secure Collaboration
Tools: SecureDataPro can expand its capabilities to include secure collaboration tools,
enabling encrypted file sharing and communication channels among authorized users.
Integration with collaborative platforms and communication tools can facilitate secure
collaboration while ensuring data privacy and confidentiality.
Scalability and Performance Optimization: As data volumes continue to grow
exponentially, SecureDataPro can focus on optimizing scalability and performance to
handle large-scale deployments effectively. This can involve enhancements in data
processing speed, scalability of encryption algorithms, and efficient resource utilization.
Continuous Research and Development: SecureDataPro can invest in continuous
research and development efforts to stay ahead of emerging cybersecurity threats and
technological advancements. By fostering a culture of innovation, SecureDataPro can
54
evolve its capabilities to address the evolving needs of users in an ever-changing digital
landscape.
Interoperability and Standardization: SecureDataPro can work towards
interoperability and standardization within the cybersecurity landscape. Collaborating
with industry stakeholders and standardization bodies can help establish common
55
REFERENCES
[1] Seth, B., Dalal, S., Jaglan, V., Le, D. N., Mohan, S., & Srivastava, G. (2022). Integrating
encryption techniques for secure data storage in the cloud. Transactions on Emerging
Telecommunications Technologies, 33(4), e4108.
[2] Arora, A., Garg, H., & Shivani, S. (2023). Privacy protection of digital images using
watermarking and qr code-based visual cryptography. Advances in Multimedia, 2023.
[3] Malina, L., Dzurenda, P., Ricci, S., Hajny, J., Srivastava, G., Matulevičius, R., ... & Tang,
Q. (2021). Post-quantum era privacy protection for intelligent infrastructures. IEEE
Access, 9, 36038-36077.
[4] Shi, Z., Oskolkov, B., Tian, W., Kan, C., & Liu, C. (2024). Sensor Data Protection
Through Integration of Blockchain and Camouflaged Encryption in Cyber-Physical
Manufacturing Systems. Journal of Computing and Information Science in Engineering,
24(7).
[5] Samanta, D., Alahmadi, A. H., Karthikeyan, M. P., Khan, M. Z., Banerjee, A., Dalapati,
G. K., & Ramakrishna, S. (2021). Cipher block chaining support vector machine for
secured decentralized cloud enabled intelligent IoT architecture. IEEE Access, 9, 98013-
98025.
[6] Li, T., He, X., Jiang, S., & Liu, J. (2022). A survey of privacy-preserving offloading
methods in mobile-edge computing. Journal of Network and Computer Applications, 203,
103395.
[7] Pham, H., Woodworth, J., & Amini Salehi, M. (2019). Survey on secure search over
encrypted data on the cloud. Concurrency and Computation: Practice and Experience,
31(17), e5284.
[8] Thushara, G. A., & Bhanu, S. M. S. (2022, November). A Flexible and Adaptive Hybrid
56
Algorithm for Secure Data Sharing in Cloud Computing. In 2022 IEEE 19th India Council
International Conference (INDICON) (pp. 1-8). IEEE.
[9] Vijayakumar, A., & Jebaseeli, A. N. (2020). Pioneer approach of data deduplication to
remove redundant data from cloud storage. International Journal of Advanced Research in
Engineering and Technology (IJARET), 11(10), 535-544.
[10] Alkhalidy, M., Taha, M. B., Chowdhury, R., Ould-Slimane, H., Mourad, A., & Talhi,
C. (2023). Vehicular edge based approach for optimizing urban data privacy. IEEE
Sensors Journal.
APPENDIX 1
A CODING
def encrypt(filename):
file_size = os.path.getsize(filename)
chunked_size = file_size//2
act_file_name = filename.split('/')[-1]
os.mkdir(f'media/files/{act_file_name}')
fs = Split(inputfile=filename, outputdir=f'media/files/{act_file_name}')
fs.bysize(chunked_size)
aes_key = get_random_bytes(16)
fernet_key = Fernet.generate_key()
files = []
if file != 'manifest':
files.append(f'media/files/{act_file_name}/{file}')
57
with open(f'media/key/rsakey.key', 'wb') as f:
f.write(aes_key)
f.write(fernet_key)
data = f.read()
file_out.close()
fernet = Fernet(fernet_key)
fer_data = f.read()
fer_enc_data = fernet.encrypt(fer_data)
f.write(fer_enc_data)
return f'media/files/{filename}'
aes_key = aes_key.read()
fernet_key = fernet_key.read()
58
files = []
if file != 'manifest':
files.append(f'media/files/{filename}/{file}')
f.write(data)
fernet_cipher = Fernet(fernet_key)
data = f.read()
original = fernet_cipher.decrypt(data)
f.write(original)
mg = Merge(inputdir=f'media/files/{filename}', outputdir='media/temp',
outputfilename=filename)
mg.merge(cleanup=False)
#shutil.rmtree(f'media/files/{filename}')
Decrypt HTML
{% extends "main.html" %}
{% block content %}
<div class='encrypt-form-container'>
59
<form method='POST' enctype='multipart/form-data' class="files-container-outer
decrypt-form">
{% csrf_token %}
<div>
</div>
<div>
</div>
</div>
</div>
<div>
</div>
<div>
60
<div class="select-file-btn">Select File</div>
</div>
</div>
</div>
</div>
</form>
{% if file_path %}
</div>
{% endif %}
<div class="pop-up">
<div class="pop-up-container">
<img
src="https://s3-alpha-sig.figma.com/img/76f0/6444/2813a914064d9f9ae3e780993b9ec
8f4?
Expires=1701043200&Signature=IAa28Jnng78e7sgksF7J~4UgUcFa2APNfr4RHALvr
LyOlLCn4MZx9qCxp9D~1IwUaG~OOTHxtSGT0tsj5z-
8AP0in9pPRT0AOJidxZMogZY0wPshzvTFHX1jLyODUymU9oYRI~G7cXOfxUUZ
15YhGVRJHYLFS-
61
~9ChtY0un~foV9jlQKYo180o2L~KrwcZe5ymHP6iRbSmEVzE0L9hYNnHBz-
DG9wOupGbBS13o8JCP4d2cpPpD4di6vpRfM43tg6srJADrehZjW-
smVgdHmUwOs2p~Tc9WbuGlk8cUXUiMug-
66dnT8krOaJdY8cedHSS4AXo8VYCSbC59jYbvTQA__&Key-Pair-
Id=APKAQ4GOSFWCVNEHN3O4 " alt="">
<h3>Success!</h3>
<button onclick="closePopUp()">Close</button>
</div>
</div>
</div>
<script>
function closePopUp(){
popup.style.display='none';
btn.addEventListener('click',function(){
popup.style.display="flex";
62
})
input.addEventListener('change', function () {
handleFiles(this.files, index);
});
});
e.preventDefault();
this.classList.add('drag-over');
});
area.addEventListener('dragleave', function () {
this.classList.remove('drag-over');
});
e.preventDefault();
this.classList.remove('drag-over');
handleFiles(index, e.dataTransfer.files);
});
});
function browseFiles(index) {
fileInputs[index].click();
63
for (const file of files) {
uploadingFileDiv.classList.add('current-uploading-file');
<div>${file.name}</div>
<div class="progress-bar-outer">
<div class="progress-bar-inner"></div>
</div>`;
uploadingArea.appendChild(uploadingFileDiv);
let progress = 0;
progressDiv.querySelector('.progress-bar-inner').style.width = `${progress}%`;
clearInterval(interval);
}, 500);
64
function onUploadComplete(index, file, progressDiv) {
uploadedFileDiv.classList.add('uploaded-file');
uploadedFileDiv.classList.add('on-decrypt');
uploadedFileDiv.innerHTML = `
<div class="file-info">
<div>${file.name}</div>
</div>
<div>Uploaded</div>`;
uploadingArea.appendChild(uploadedFileDiv);
progressDiv.remove();
</script>
{% endblock content %}
Encrypt HTML
{% extends "main.html" %}
{% block content %}
<div class='encrypt-form-container'>
65
{% csrf_token %}
<div class='file-name-input'>
</div>
<div class="upload-container">
<div>
</div>
<div>
</div>
</div>
<div class="uploading-area">
<div>Filename.txt</div>
66
<div class="progress-bar-outer">
<div class="progress-bar-inner"></div>
</div>
</div> -->
<div class="file-info">
<div>Filename.txt</div>
</div>
<div>Uploaded</div>
</div> -->
</div>
</div>
</form>
{% if enc %}
<h4>These keys are very important 2nd key will be required for 1st layer
decryption and 1st key will be required for the 2nd layer decryption</h4>
<div class="keys-container-inner">
<div class="headings-row">
<div>S.No.</div>
<div></div>
<div>Key Name</div>
67
<div class="delete-icon"></div>
<div></div>
<div class="download-heading">Download</div>
</div>
<div class="file-row">
<div class="s-no">1</div>
<div class="file-icon">
</div>
<div class="file-name">
RSA Key
</div>
<div></div>
<div></div>
<div class="key-download">
</div>
</div>
<div class="file-row">
<div class="s-no">2</div>
<div class="file-icon">
</div>
68
<div class="file-name">
</div>
<div></div>
<div></div>
<div class="key-download">
</div>
DECRYPT HTML
{% extends "main.html" %}
{% block content %}
<div class='encrypt-form-container'>
{% csrf_token %}
<div class='file-name-input'>
</div>
69
<div class="upload-container">
<div>
</div>
<div>
</div>
</div>
<div class="uploading-area">
<div>Filename.txt</div>
<div class="progress-bar-outer">
<div class="progress-bar-inner"></div>
</div>
</div> -->
<div class="file-info">
70
<div>Filename.txt</div>
</div>
<div>Uploaded</div>
</div> -->
</div>
</div>
</form>
{% if enc %}
<h4>These keys are very important 2nd key will be required for 1st layer
decryption and 1st key will be required for the 2nd layer decryption</h4>
<div class="keys-container-inner">
<div class="headings-row">
<div>S.No.</div>
<div></div>
<div>Key Name</div>
<div class="delete-icon"></div>
<div></div>
<div class="download-heading">Download</div>
</div>
<div class="file-row">
<div class="s-no">1</div>
<div class="file-icon">
71
<img src="../media/images/Vector.svg" alt="">
</div>
<div class="file-name">
<div class="file-info">
<div>Filename.txt</div>
</div>
<div>Uploaded</div>
</div> -->
</div>
</div>
<div class="upload-container">
<div>
</div>
<div>
</div>
72
</div>
73
74
75
76
77