Presentation on Cloud Based Secure Text Transfer
Presentation on Cloud Based Secure Text Transfer
Transfer
The problem with the current solutions is that they lack the ability to provide
end-to-end encryption for data transfers, making them vulnerable to
unauthorized access, hacking, and data breaches.
fi
Introduction to Project(contd)
Additionally, existing solutions may be cumbersome and dif cult to use,
requiring technical expertise to operate.
fi
fi
LITERATURE REVIEW
Marhusin F. (2015) paper proposes a model for secure text transfer using symmetric key encryption in cloud
computing environments. The authors used the Blowfish encryption algorithm to provide security and HMAC
to ensure message integrity. The proposed model uses a shared secret key for encryption and decryption, which
is securely exchanged between the sender and the receiver. The authors claimed that the proposed model
performs better than existing models while maintaining high security.
Gentry C. (2012) paper proposes the use of fully homomorphic encryption (FHE) to secure data in cloud
computing environments. FHE allows computation on encrypted data without the need for decryption, which
provides a high level of security. The author explained how FHE works and its potential use cases in cloud
computing environments. However, the use of FHE is still in its early stages, and its high computational
complexity makes it impractical for many applications
LITERATURE REVIEW(Contd.)
Firdous S. (2016) paper proposes a model for enhancing the security of cloud-based text transfer using AES
encryption and hash functions. The authors used the AES encryption algorithm to provide security and hash
functions to ensure message integrity. The proposed model uses a shared secret key for encryption and decryption,
which is securely exchanged between the sender and the receiver. The authors claimed that the proposed model
provides better security compared to existing models, but they did not discuss the computational complexity of the
model
Yang L. (2014) paper proposes a model for secure text transfer in cloud computing using RSA encryption and hash
functions. The authors used RSA encryption for key exchange and message encryption, and hash functions for
message authentication. The proposed model also includes a mechanism for access control and user authentication.
The authors claimed that the proposed model provides high security and efficiency
EXISTING SYSTEM
There are several encryption systems that are commonly used in today's cyber
space to protect our online communication and transactions. Here are a few
examples:
2.Pretty Good Privacy (PGP): This is an encryption program used to secure email
communication. PGP uses a combination of symmetric and asymmetric
encryption to protect the contents of your email messages from unauthorized
access.
3. Advanced Encryption Standard (AES): This is a symmetric encryption
algorithm used to encrypt data stored on hard drives, USB drives, and
other types of storage media. AES is widely used in applications such
as le encryption, disk encryption, and database encryption.
4. Secure Sockets Layer (SSL): This is a predecessor to TLS, and was
commonly used to encrypt online communication before TLS became
the standard. SSL is still used in some applications, but it is
considered less secure than TLS and is being phased out.
fi
There are several existing
systems that can be used for
secure text transfers. Here are a
few examples:
SIGNAL
2.User error: While encryption protocols themselves may be secure, they can be compromised
by user error. For example, a user could accidentally share their password or encryption key,
or fail to properly authenticate the identity of the person they're communicating with.
3.Implementation aws: Encryption protocols may have aws or vulnerabilities that can be
exploited by attackers. For example, a poorly implemented encryption algorithm could leave
data vulnerable to attacks such as brute force attacks or side-channel attacks.
4.Backdoors or weaknesses: There have been concerns in the past that encryption protocols
could be compromised by government or law enforcement agencies through the inclusion of
backdoors or weaknesses. While most encryption protocols have been designed to be
resistant to these kinds of attacks, the possibility of such compromises can't be completely
ruled out.
ffi
fl
fl
PROPOSED
SYSTEM
end-to-end encryption, multi-layered encryption protocol, and additional security features
END TO END ENCRYPTION
• Two-factor authentication
requires users to provide two
separate forms of
authentication before they can
access their messages, such
as a password and a biometric
scan.
Multi-Layerd
Encryption Protocol