Professional Documents
Culture Documents
SSRN Id4209511
SSRN Id4209511
CRYPTOGRAPHY
Kota Chandu
Student, CSED
Aurora’s Technological & Research Institute
(Affiliated to Jawaharlal Nehru Technological University, Hyderabad)
Hyderabad, India
chandukota777@gmail.com
Abstract:- Cloud is playing a major role in for the transmission of data among employees. On
industrial, educational, and personal sectors. The user usage, many users today have numerous
storage devices used earlier like CD drives, hard devices. Accordingly, cloud storage provides a
drives, floppy drives are depreciating. Cloud was secure way to store data and access the data from
introduced to all and many sectors got aware of it. their own personal devices. Therefore, cloud
Due to the rapid increase in technology storage has become one of the most beneficial and
tremendous amount of data is created every day. efficient methods to store data online. In cloud
As we know that this large amount is shared computing, the user, instead of saving the data at
among various cloud servers. servers. So, data local storage or hard disk, stores data somewhere
confidentiality becomes difficult as it is necessary at a different location, which can be accessed using
to maintain the privacy of clients' data. internet service. The cloud is basically a broadcast
Cloud computing is beneficial in idioms of low place to share and store information through
fees and accessibility of records. Cloud satellite networks. Every cloud application has a
computing offers a lot of benefits with low fees domain, and the domain of the company is
and of records accessibility via the Internet. responsible for maintaining the large data centers
Ensuring the protection of cloud computing can that provide the security, storage capacity and
be predominating. As customers regularly computing power needed to cultivate all
preserve delicate records with cloud garage information users send to the cloud. In cloud
corporations, however, the one’s corporations storage, the user, other than saving the data at local
additionally may be untrusted. In order to achieve storage or hard disk, stores data at different
security issues, Cryptography comes into the locations, which can be accessed using internet
picture to maintain confidentiality. Using a single service. In the cloud, users can store all kinds of
cryptography technique provides security, but it files, such as text documents, audio, video,
can easily be broken. So, a mechanism called spreadsheets, PDFs, etc. extensive features are
hybrid cryptography comes into the picture where provided by different cloud platforms, including
symmetric cryptographic algorithms i.e., AES, backup options. If data on one’s cloud gets deleted
and an asymmetric cryptographic algorithm i.e., by a wild card, or if the user loses the physical
RSA are used to achieve confidentiality. These storage devices such as a hard disk, then the user’s
algorithms encrypt the files into the cloud and data can be permanently lost. In that case, the
decryption is done by only the authorized user. cloud acts as a backup option.
5. PROPOSED SOLUTION :
We propose a method for securely storing files in
the cloud using hybrid cryptography algorithms i.e.
AES, and RSA. We use public-key cryptography
algorithms i.e., asymmetric algorithms. With the
help of hybrid cryptography techniques, we aim in
making the data secure as the entire data is
encrypted using the public key. In our project, we
propose to use HYBRID CRYPTOGRAPHY
during which we used AES and RSA to attain data FIG NO 1
security. One of the rationales, why we use Hybrid
2. The user has to click on encrypt button and
Encryption, is because public-key cryptosystems select a file from the folder.
FIG NO 2
FIG NO 3
[1]. U.Veeresh, S.P.Kumar, “ Multi-Cloud [8]. Shakeeba S. Khan, Prof.R.R. Tuteja, “Security
Architecture to Provide Data Privacy and in Cloud Computing using Cryptographic
Integrity” IJCERT, Vol. 2, Issue 9, PP 558-564, Algorithms”, 2015 Anjali Patil, Nimisha Patel, Dr.
ISSN 2349-7084, September 2015. Hiren Patel “Secure data sharing using
cryptography in cloudenvironment”, 2016.
[2]. S. Ali Abbas, “Enhancing the Security of
Identity and Access Management in Cloud [9] Fortune Mata, Michael Kimmel, George
Computing using Elliptic Curve Cryptography”, Okeyo, “Enhanced Secure Data Storage in Cloud
IJERMT, Volume-4, Issue-7, ISSN: 2278-9359 Computing Using Hybrid Cryptographic
pages 8-15,2015. Techniques (AES and Blowfish).
[3]. Kiruthika. R, Jeena. R, “Enhancing Cloud [10] Kumar, M.A., and Karthikeyan, S., 2012.
Computing Security using AES Algorithm”, Investigating the efficiency of Blowfish and
IJARCSSE, Volume 5, Issue 3, ISSN 2277 128X, Rejindael (AES) Algorithms. International Journal
pp 630-635, March 2015. of Computer Network & Information
Security, 4(2), p.22.
[4]. P. Kanchan, “Use of Digital Signature with
Diffie Hellman Key Exchange and Hybrid [11] Mahalle, V.S. and Shahade, A.K., 2014,
Cryptographic algorithm to Enhance Data Security October. Enhancing the data security in Cloud by
in Cloud Computing”, Volume 5, Issue 6, ISSN implementing a hybrid (Rsa & Aes)
2250-3153, pp 1-4, June 2015. encryption algorithm. In 2014 International
Conference on Power, Automation and
[5]. Kranthi Kumar K, Devi T (2018). Secured Communication (INPAC) (pp. 146-149). IEEE.
Data Transmission in Cloud Using Hybrid
Cryptography. International Journal of Pure and [12] Bhandari, A., Gupta, A. and Das, D., 2016,
Applied Mathematics, 119(16), 3257-3262. January. Secure algorithm for cloud computing and
its applications. In 2016 6th International