Professional Documents
Culture Documents
SSRN Id3802668
SSRN Id3802668
1
Associate Professor, Computer Science and Engineering, Velalar College Of Engineering
and Technology, Erode, Tamilnadu, India, gokulrajs1@gmail.com
2
M.E. Student, Computer Science and Engineering, Velalar College Of Engineering and
Technology, Erode, Tamilnadu, India, ananthi2698p@gmail.com
3
B.E Student, Computer Science and Engineering, Velalar College Of Engineering and
Technology, Erode, Tamilnadu, India, babycse1718@gmail.com
4
B.E Student, Computer Science and Engineering, Velalar College Of Engineering and
Technology, Erode, Tamilnadu, India, jananicse201718@gmail.com
ABSTRACT:
To meet the required security needs of data center of cloud, blowfish used for the
encryption of file slices takes minimum time and has maximum throughput for encryption and
decryption from other symmetric algorithms. The idea of splitting and merging adds on to meet
the principle of data security. The hybrid approach when deployed in cloud environment makes
the remote server more secure and thus, helps the cloud providers to fetch more trust of their
users. For data security and privacy protection issues, the fundamental challenge of separation
of sensitive data and access control is fulfilled. Cryptography technique translates original data
into unreadable form. Cryptography technique is divided into symmetric key cryptography and
public key cryptography. This technique uses keys for translate data into unreadable form. So
only authorized person can access data from cloud server. Cipher text data is visible for all
people.
INTRODUCTION:
Now a day's cloud computing is used in many areas like industry, military colleges etc.
to storing huge amount of data. By retrieving data from cloud on request of user, to store data
on cloud there have been many issues. To provide the solution to these issues there are multiple
ways. Cryptography and steganography techniques are more popular now-a-days for data
PROPOSED SYSTEM:
AES, DES, RC2 algorithms are used to provide block wise security to data. LSB
steganography technique is introduced for key information security. Key information contains
which part of file is encrypted using by which algorithm and key. File is fragmented into 3
parts. Each and every part of file is encrypted using different algorithm. All parts of file are
encrypted simultaneously with the help of multithreading technique. Data encryption Keys are
inserted into cover image using LSB technique. Stego-Image is sent to valid receiver using
email. For file decryption purpose reverse process of encryption is applied.
In order to ensure file security on cloud, the above hybrid cryptosystem is deployed on
cloud. We assume cloud server as trusted but in order to prevent tampering/misuse of data by
intruder or data leakage or other security concerns, the data is stored at server in the encrypted
form. By classifying the scheme deployed on cloud in three phases:
• Registration Phase
• Uploading Phase
• Downloading Phase
A. Registration Phase
In the Registration Phase, the client registers himself in order to upload and view his
files to/from the cloud server.
B. Uploading Phase
C. Downloading Phase
On successful authentication, the client will input the private key for the corresponding
n slices. The private keys will decrypt the corresponding encrypted image. The decrypted files
are merged to generate original file. The decrypted file is downloaded and viewed at client end.
METHODS:
Register / Login: User need to register first by filling up basic registration details. By
using the login id and password, user can login into the system. Upload Image: The image file
to be stored is encrypted using Advance Encryption Standard, Data Encryption Standard and
Rivest Cipher 2 encryption algorithm. Least Significant Bit steganography technique is
introduced for key information security. Key information contains which part of file is
encrypted using which algorithm and key. Sending Message via Email: This encrypted file is
sent along with the image containing the key that is hidden in the image using LSB. Download
Image: When the user request for a file to be downloaded, then that file is decrypted using
AES, DES and RC2. After successful decryption, the image file is merged into one file and
then downloaded. The key is extracted from the image.
SYSTEM ARCHITECTURE:
By using the algorithms, the stored image file is completely secured, as the file is being
encrypted not by just using one but three encryption algorithm which are AES, DES and RC2.
The key is also safe as it embeds the key in image using LSB. The system is very secure and
robust in nature. There is one other issue of cloud data storage that after storing our data in
cloud data storage we have very comfortable for access our data in any place or in any location
without carrying data to everywhere. In cloud computing, data storage system all users know
that different from the traditional computing model, utilizes the virtual computing technology.
User’s personal data may be distributed in various virtual data centre rather than stay in the
same physical location. At this time, data privacy protection will face the controversy of
different legal systems.
REFERENCES: