Download as pdf or txt
Download as pdf or txt
You are on page 1of 8

SECURE FILE STORAGE IN THE CLOUD USING HYBRID

CRYPTOGRAPHY
Kota Chandu
Student, CSED
Aurora’s Technological & Research Institute
(Affiliated to Jawaharlal Nehru Technological University, Hyderabad)
Hyderabad, India
chandukota777@gmail.com
Abstract:- Cloud is playing a major role in for the transmission of data among employees. On
industrial, educational, and personal sectors. The user usage, many users today have numerous
storage devices used earlier like CD drives, hard devices. Accordingly, cloud storage provides a
drives, floppy drives are depreciating. Cloud was secure way to store data and access the data from
introduced to all and many sectors got aware of it. their own personal devices. Therefore, cloud
Due to the rapid increase in technology storage has become one of the most beneficial and
tremendous amount of data is created every day. efficient methods to store data online. In cloud
As we know that this large amount is shared computing, the user, instead of saving the data at
among various cloud servers. servers. So, data local storage or hard disk, stores data somewhere
confidentiality becomes difficult as it is necessary at a different location, which can be accessed using
to maintain the privacy of clients' data. internet service. The cloud is basically a broadcast
Cloud computing is beneficial in idioms of low place to share and store information through
fees and accessibility of records. Cloud satellite networks. Every cloud application has a
computing offers a lot of benefits with low fees domain, and the domain of the company is
and of records accessibility via the Internet. responsible for maintaining the large data centers
Ensuring the protection of cloud computing can that provide the security, storage capacity and
be predominating. As customers regularly computing power needed to cultivate all
preserve delicate records with cloud garage information users send to the cloud. In cloud
corporations, however, the one’s corporations storage, the user, other than saving the data at local
additionally may be untrusted. In order to achieve storage or hard disk, stores data at different
security issues, Cryptography comes into the locations, which can be accessed using internet
picture to maintain confidentiality. Using a single service. In the cloud, users can store all kinds of
cryptography technique provides security, but it files, such as text documents, audio, video,
can easily be broken. So, a mechanism called spreadsheets, PDFs, etc. extensive features are
hybrid cryptography comes into the picture where provided by different cloud platforms, including
symmetric cryptographic algorithms i.e., AES, backup options. If data on one’s cloud gets deleted
and an asymmetric cryptographic algorithm i.e., by a wild card, or if the user loses the physical
RSA are used to achieve confidentiality. These storage devices such as a hard disk, then the user’s
algorithms encrypt the files into the cloud and data can be permanently lost. In that case, the
decryption is done by only the authorized user. cloud acts as a backup option.

Keywords: Storage devices, Cloud computing, 2. EXISTING METHODOLOGY :


Hybrid cryptography, Data Security,
Confidentiality. Data Security Issues are the main issue in the
existing system as there is no proper mechanism
I. INTRODUCTION defined to prevent the breaching issues. The
defined techniques i.e., Advanced Encryption
Predominant storage devices such as flash drives, System (AES), RC6 (Rivest Cipher 6), 3DES
hard disks, and other kinds of secondary storage (Triple Data Encryption Standard), and Blowfish
devices are slowly becoming old-schooled. The help to avoid security breaches and maintain data
reason for this is that many all-over elongated confidentiality. These symmetric key cryptography
managements require predictable storage devices algorithms generate a single secret key that is

Electronic copy available at: https://ssrn.com/abstract=4209511


shared among two parties through which they will time. Performance is analyzed by calculating the
achieve confidentiality. The stored file is time of Encryption and upload, time of download
completely secured, as the file is encrypted by and Decryption, and time of key generation. With
using symmetric key cryptography techniques. The
the help of multiple sizes of files, the Performance
system is very secure and robust. Data of the users
is secured on a cloud server which helps in analysis is performed, and by taking note of the
avoiding unauthorized access from the outside encryption time of files having multiple sizes and
world. Data security is a major priority. This decryption time of the files, and key generation
system can be implemented in the banking and time, the results will be attained.
corporate sectors to securely transfer confidential Author - Punam.V.Maitri and Aruna Verma
data. The introduced mechanism is a hybrid Description – The problem of using a single
cryptography scenario to supply secure storage and
algorithm to encrypt files, the paper uses
safe transmission of Confidential Data files. The
file is being encrypted not by just using one AES,3DES, RC4 algorithms for the encryption of
cryptography algorithm but by three to four files by splitting them into equal parts and
encryption algorithms which are AES, 3DES, RC6, encrypting each part with the algorithm, and
and Blowfish which are responsible for providing storing the key in an image file using
utmost security. These hybrid cryptography steganography. It uses a secret key for encryption
achievements facilitate further by protecting files and decryption. The key generation is done using
stored on the Cloud from unwarranted access,
the random key generation technique. It provides
modification, transfer, and other potential hazards
to data security. With the help of the proposed security to data. Cloud user request for file. Based
security mechanism high security, low delay, and upon the request, the user also gets a
confidentiality are accomplished. These algorithms steganography image using email which consists of
are fast and efficient to store large amounts of data. key information. The reverse process is done for
Symmetric key encryption can be extremely decryption.
secure. It absolutely was selected because of the
Author - Uttam Kumar, Jay Prakash
industry standard for encryption by the U.S.
National Institute of Standards and Technology Description – It discusses the problem of using
(NIST). only a single algorithm to encrypt the file and how
ineffective it will be
on the cloud. This paper utilizes symmetric
3. LITERATURE SURVEY:
cryptography algorithms, which splits the file into
Author - M Naveetha Krishna, T Tamilarasan blocks and each block is
Description - The paper focuses on how files are encrypted using AES, 3DES, blowfish, and RC6
securely stored on a cloud platform. Also, it algorithms. Less time is used for the encryption
discusses the problem of using only a single and decryption process
algorithm to encrypt the file and how ineffective it using the multithreading technique. With the help
will be on the cloud. This paper splits the file into of the proposed security mechanism. AES,
blocks and each block is encrypted using AES, Blowfish, RC6, and BRA
blowfish, and RC6 algorithms. System algorithms are included for security purposes. All
performance is evaluated by calculating the time of algorithms have a 128bit key size and file divided
encryption, time of key generation, and decryption

Electronic copy available at: https://ssrn.com/abstract=4209511


into Eight parts and every part will be encrypted of the multithreading technique. Data encryption
with the help of the Multithreading technique. key keys are inserted into a cover image using the LSB
for data encryption is covered in Image using the technique. Steganography image is sent to a valid
LSB technique. The image is sent to Valid Reviver receiver using email. For file decryption purposes
using mail for decryption purposes. reverse process of encryption is applied. Cloud
Author - Aishwarya S. Dashmukhe and Nilesh security is a defensive method to protect data and
Alone there are various methods to protect data like
Description – The problem of data security on Deterrent controls, Preventive controls, corrective
cloud data storage has been the most important controls, and detective controls. With the concern
issue. To ensure the of security, we should keep some points in mind
correctness of client data in cloud data storage, the like privacy, confidentiality, integrity, and so on.
proposed method encrypts data and stores it in the Author - M. Malarvizhi, J. Angela Jennifa Sujana,
cloud and the user T. Revathi.
is allowed to modification of data. Cloud storage Description – The main focus of the paper is on the
issues are solved using cryptography and integrity of files and restoring the files if integrity
stenography techniques. is violated. The proposed system uses the pattern
Block wise Data security is achieved using AES, of each protected file to determine its modification.
RC6, Blow-fish, and BRA algorithms. The method used for pattern generation is
Data integrity is accomplished using the SHA1 cryptographic hash functions. The system uses a
hash algorithm. The low delay parameter is database that stores the names of files that need to
achieved using the multithreading technique. be protected and their hash codes. To check the
Whenever use makes an effort to upload data on integrity of the file the hash code of the file is
cloud-first that file is stored in the directory for produced and checked with one in the database. If
short time. In the encryption process, the defined the file is verified positively then access is granted
algorithms are applied to the file and get uploaded otherwise the administrator is alerted and if a saved
to the cloud. copy is available of the same file, then the file is
Author - Bala, Bindu; Kamboj, Lovejeet; Luthra, restored.
Pawan. Author - Bilal Habib, Bertrand Cambou, Duane
Description – It discusses the AES, blowfish, RC6, Booher, Christopher Philabaum.
and BRA algorithms that are used to provide Description -The paper provides a new method to
block-wise security to data. All algorithm key size implement the public key infrastructure. The PKI
is 128 bits. LSB steganography technique is has the disadvantage that the mathematical relation
introduced for key information security. Key the between public and private keys is maintained. The
information contains which part of the file is Paper proposes a new PKI scheme with
encrypted using which algorithm and key. The file addressable elements (PKA). The approach
is split into eight parts. Every part of the file is proposed removes the mathematical relation
encrypted using a different algorithm. All parts of between public and private keys using addressable
the file are encrypted simultaneously with the help cryptographic tables.

Electronic copy available at: https://ssrn.com/abstract=4209511


Author - Shakeeba S. Khan, Prof. R.R.Tuteja. encrypted file is shipped to the receiver. Initially,
Description -The proposed algorithm is a the key secret is within the hands of the sender, but
Multilevel Encryption and Decryption algorithm. the matter here deals with how the secret's given to
Thus, in our proposed work, only the authorized the receiver, the sender has many ideas to
user can access the data. Even if some intruder gets distribute the key which are practically impossible.
the data, he must have to decrypt the data at each The man within the middle attack also plays a vital
level which is a very difficult task without a valid role in symmetric-key distribution, where an
key. It is time-consuming as multiple encryption unauthorized person comes into the image and tries
and decryption take place. to urge access to the key. Because there's just one
key the attacker can easily get access to the
4. PROBLEM STATEMENT: information which ends in compromising
The users who store their data within the cloud are confidentiality. While most confidentiality
at risk of several threats, like stealing hints and breaches are unintentional, clients can still suffer
allowing unauthorized users to access the files as a result. To attain the above drawback,
within the cloud. Misconfigurations of cloud asymmetric cryptographic algorithms come to the
security settings are the number one explanation rescue to comprehend confidentiality. Asymmetric
for cloud data breaches. Since cloud infrastructure encryption solves the matter of distributing keys
is meant to be easily usable and to enable easy data for encryption, with everyone publishing their
sharing, making it's difficult for organizations to public keys, while private keys are kept secret. The
make sure that data is barely accessible to Asymmetric-key algorithms work similarly to
authorized parties. Also, organizations using symmetric-key algorithms, where plaintext is
cloud-based infrastructure don't have complete combined with a key, input to an algorithm, and
visibility and control over their infrastructure, outputs ciphertext. the foremost difference is that
meaning that they have to rely on security controls the keys used for the encryption and decryption
provided by their cloud service provider (CSP) to portions are different, thus the asymmetry of the
configure and secure their cloud deployments. algorithm. The key pair is comprised of a
Here, data is encrypted by employing a secret key, non-public key and a public key. because the
then both the encoded message and secret key are names imply, that the public secret is made
sent to the recipient for decryption. The leading available to everyone, whereas the private secret is
problem within the symmetric-key cryptographic kept secret. keys used for encryption and also the
algorithm is critical distribution since it's just one secrets employed for decryption vary relying on
secret key. The disadvantage is the requirement to the intended use of the asymmetric-key algorithm.
stay the key secret - this might be especially In such a system, anyone can encrypt a message
challenging where encryption and decryption using the intended receiver's public key, but that
happen in numerous locations, requiring the key to encrypted message can only be decrypted with the
be moved safely between locations. During receiver's private key. Public key algorithms are
encryption, the sender selects a file on which he fundamental security primitives in modern
applies cryptographic algorithms, and thus the cryptosystems, including applications and

Electronic copy available at: https://ssrn.com/abstract=4209511


protocols which supply assurance of the often depend upon complicated mathematical
confidentiality, authenticity, and non-reputability computations and are thus generally far more
of electronic communications and data storage. inefficient than comparable symmetric-key
The hybrid cryptosystem combines the cryptosystems. A hybrid cryptosystem is one that
convenience of a public-key cryptosystem with the mixes the convenience of a public-key
efficiency of a symmetric-key cryptosystem. cryptosystem with the efficiency of a
Public-key cryptosystems are convenient during symmetric-key cryptosystem. Encrypting a brief
this they're doing not require the sender and plaintext requires only 1 asymmetric operation
receiver to share a customary secret to speak while encrypting an extended message would in
securely (among other useful properties). However, theory require many RSA operations. Instead of
they often rely on complicated mathematical employing a single pair of public and personal
computations and are thus generally rather more keys, we've got further generated separate key
inefficient than comparable symmetric-key pairs for every and each file that's to be encrypted.
cryptosystems. In many applications, the high cost while this is often a hefty process, this ensures that
of encrypting long messages during a very very the files are safer.
public-key cryptosystem is prohibitive. this could
be often addressed by hybrid systems by 6. RESULTS
employing a mix of both. Hybrid encryption is
taken into consideration as a highly secure variety User registration: The User has to sign up for the
cloud and should register into any cloud of user
of encryption as long as the overall public and wishes. The details like username, login details,
personal keys are fully secure. Hybrid encryption passwords, and credentials (for paid clouds).
is achieved through data transfer using unique
session keys together with symmetrical encryption. File upload and Download:
Public key encryption is implemented for random 1. User has to interact with the GUI interface to
symmetric key encryption. upload or download a file.

5. PROPOSED SOLUTION :
We propose a method for securely storing files in
the cloud using hybrid cryptography algorithms i.e.
AES, and RSA. We use public-key cryptography
algorithms i.e., asymmetric algorithms. With the
help of hybrid cryptography techniques, we aim in
making the data secure as the entire data is
encrypted using the public key. In our project, we
propose to use HYBRID CRYPTOGRAPHY
during which we used AES and RSA to attain data FIG NO 1
security. One of the rationales, why we use Hybrid
2. The user has to click on encrypt button and
Encryption, is because public-key cryptosystems select a file from the folder.

Electronic copy available at: https://ssrn.com/abstract=4209511


5. The private key is stored in user files and
invoked when the user decrypts a specific file.

FIG NO 2

3. Then an encrypted file will be uploaded into the FIG NO 5


cloud.
6. The decrypted file is downloaded into decrypted
files folder and deleted from the temporary folder.

FIG NO 3

4. To decrypt a file the user has to click on the FIG NO 6


select file button and select a file from the menu 7. CONCLUSION AND FUTURE SCOPE
and click the decrypt button.
Asymmetric cryptography algorithm i.e., RSA, and
symmetric key cryptographic algorithm i.e., AES
together work as a Hybrid Cryptographic
Algorithm to make the file secure on the cloud.
The standard interface is provided for the user to
encrypt these files and the encrypted files are
uploaded into the cloud. Google Cloud is used as a
cloud platform to store files securely. RSA
algorithm is used because the performance speed is
faster than the other public-key cryptographic
algorithms. The key distribution problem faced
FIG NO 4 while using a symmetric-key cryptographic
algorithm is solved when the asymmetric-key

Electronic copy available at: https://ssrn.com/abstract=4209511


cryptographic algorithm is used. The combination [6]. Shimbre, N., & Deshpande, P. (2015).
of the hybrid cryptographic algorithm makes it Enhancing Distributed Data Storage Security for
impossible for attackers to get access to the files Cloud Computing Using TPA and AES Algorithm.
because the private key is stored only in the
2015 International Conference on Computing
authorized user system. Users have the ability to
communicate through hybrid encryption. With the Communication Control and Automation.
help of these algorithms, Confidentiality is doi:10.1109/iccubea.2015.16.
achieved.
[7]. Ronak Karani,Tejas Choudhari , Anindita
In the future, try to accomplish Bhajan , Madhu Nashipudimath 2020). Secure File
authentication, integrity, and confidentiality using Storage Using Hybrid Cryptography.2020
public key cryptographic algorithms. INTERNATIONAL JOURNAL OF INNOVATIVE
8. REFERENCES RESEARCH IN TECHNOLOGY, 6(9).

[1]. U.Veeresh, S.P.Kumar, “ Multi-Cloud [8]. Shakeeba S. Khan, Prof.R.R. Tuteja, “Security
Architecture to Provide Data Privacy and in Cloud Computing using Cryptographic
Integrity” IJCERT, Vol. 2, Issue 9, PP 558-564, Algorithms”, 2015 Anjali Patil, Nimisha Patel, Dr.
ISSN 2349-7084, September 2015. Hiren Patel “Secure data sharing using
cryptography in cloudenvironment”, 2016.
[2]. S. Ali Abbas, “Enhancing the Security of
Identity and Access Management in Cloud [9] Fortune Mata, Michael Kimmel, George
Computing using Elliptic Curve Cryptography”, Okeyo, “Enhanced Secure Data Storage in Cloud
IJERMT, Volume-4, Issue-7, ISSN: 2278-9359 Computing Using Hybrid Cryptographic
pages 8-15,2015. Techniques (AES and Blowfish).

[3]. Kiruthika. R, Jeena. R, “Enhancing Cloud [10] Kumar, M.A., and Karthikeyan, S., 2012.
Computing Security using AES Algorithm”, Investigating the efficiency of Blowfish and
IJARCSSE, Volume 5, Issue 3, ISSN 2277 128X, Rejindael (AES) Algorithms. International Journal
pp 630-635, March 2015. of Computer Network & Information
Security, 4(2), p.22.
[4]. P. Kanchan, “Use of Digital Signature with
Diffie Hellman Key Exchange and Hybrid [11] Mahalle, V.S. and Shahade, A.K., 2014,
Cryptographic algorithm to Enhance Data Security October. Enhancing the data security in Cloud by
in Cloud Computing”, Volume 5, Issue 6, ISSN implementing a hybrid (Rsa & Aes)
2250-3153, pp 1-4, June 2015. encryption algorithm. In 2014 International
Conference on Power, Automation and
[5]. Kranthi Kumar K, Devi T (2018). Secured Communication (INPAC) (pp. 146-149). IEEE.
Data Transmission in Cloud Using Hybrid
Cryptography. International Journal of Pure and [12] Bhandari, A., Gupta, A. and Das, D., 2016,
Applied Mathematics, 119(16), 3257-3262. January. Secure algorithm for cloud computing and
its applications. In 2016 6th International

Electronic copy available at: https://ssrn.com/abstract=4209511


ConferenceCloud System and Big Data
Engineering (Confluence) (pp. 188-192). IEEE.

[13] Timilsina, S. and Gautam, S., 2019. Analysis


of Hybrid Cryptosystem Developed Using
Blowfish & ECC with Different Key Size.
Technical Journal,

[14]. Youssef Gahi, Mouhcine Guennoun, Hussein


T. Mouftah, “Big Data Analytics: Security and
Privacy Challenges”, IEEE Symposium on
Computers and Communication (ISCC), Messina,
Italy, June 2016, pp 15-17.

[15]. Laila Fetjah, Karim Benzidane, Hassan El


Alloussi, Othman El Warrak, Said Jai-
Andaloussi,” Toward a Big Data Architecture for
Security EventsAnalytic”, IEEE 3rd International
Conference on Cyber Security and Cloud
Computing, Beijing, China,2016,pp 1-7.

[16]. Natalia Miloslavskaya and Aida


Makhmudova, “Survey of Big Data Information
Security”, 4th International Conference on Future
Internet of Things and Cloud Workshops, Vienna,
Austria, Aug 2016, pp 4-.

[17]. Suliman A. Alsuhibany,” A Space-and-Time


Efficient Technique for Big Data Security
Analytics”, vol. 46, no. 2, Riyadh, Saudi Arabia,
pp.241-284, 2016.

Electronic copy available at: https://ssrn.com/abstract=4209511

You might also like