Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

SECURE FILE STORAGE USING HYBRID CRYPTOGRAPHY

S.Gokulraj1, P.Ananthi2, R.Baby3, E.Janani4

1
Associate Professor, Computer Science and Engineering, Velalar College Of Engineering
and Technology, Erode, Tamilnadu, India, gokulrajs1@gmail.com

2
M.E. Student, Computer Science and Engineering, Velalar College Of Engineering and
Technology, Erode, Tamilnadu, India, ananthi2698p@gmail.com

3
B.E Student, Computer Science and Engineering, Velalar College Of Engineering and
Technology, Erode, Tamilnadu, India, babycse1718@gmail.com

4
B.E Student, Computer Science and Engineering, Velalar College Of Engineering and
Technology, Erode, Tamilnadu, India, jananicse201718@gmail.com

ABSTRACT:

To meet the required security needs of data center of cloud, blowfish used for the
encryption of file slices takes minimum time and has maximum throughput for encryption and
decryption from other symmetric algorithms. The idea of splitting and merging adds on to meet
the principle of data security. The hybrid approach when deployed in cloud environment makes
the remote server more secure and thus, helps the cloud providers to fetch more trust of their
users. For data security and privacy protection issues, the fundamental challenge of separation
of sensitive data and access control is fulfilled. Cryptography technique translates original data
into unreadable form. Cryptography technique is divided into symmetric key cryptography and
public key cryptography. This technique uses keys for translate data into unreadable form. So
only authorized person can access data from cloud server. Cipher text data is visible for all
people.

KEYWORDS: Blowfish, Encryption, Decryption, Symmetric algorithms, Data security.

INTRODUCTION:
Now a day's cloud computing is used in many areas like industry, military colleges etc.
to storing huge amount of data. By retrieving data from cloud on request of user, to store data
on cloud there have been many issues. To provide the solution to these issues there are multiple
ways. Cryptography and steganography techniques are more popular now-a-days for data

Electronic copy available at: https://ssrn.com/abstract=3802668


security. Use of a single algorithm is not effective for high level security to data in cloud
computing. The introduction of new security mechanism using symmetric key cryptography
algorithm and steganography. File security concerns arise because both user’s application and
program are residing in provider premises. The cloud provider can solve this problem by
encrypting the files by using encryption algorithm. A file security model to provide an efficient
solution for the basic problem of security in local system environment. Hybrid encryption is
used where files are encrypted by three algorithms coupled with file splitting which is used for
the secured communication between users and the servers.

PROPOSED SYSTEM:

AES, DES, RC2 algorithms are used to provide block wise security to data. LSB
steganography technique is introduced for key information security. Key information contains
which part of file is encrypted using by which algorithm and key. File is fragmented into 3
parts. Each and every part of file is encrypted using different algorithm. All parts of file are
encrypted simultaneously with the help of multithreading technique. Data encryption Keys are
inserted into cover image using LSB technique. Stego-Image is sent to valid receiver using
email. For file decryption purpose reverse process of encryption is applied.

PROPOSED CLOUD COMPUTING SECURITY ARCHITECTURE:

In order to ensure file security on cloud, the above hybrid cryptosystem is deployed on
cloud. We assume cloud server as trusted but in order to prevent tampering/misuse of data by
intruder or data leakage or other security concerns, the data is stored at server in the encrypted
form. By classifying the scheme deployed on cloud in three phases:

• Registration Phase
• Uploading Phase
• Downloading Phase

Azure toolkit is used to set up cloud environment.

A. Registration Phase

In the Registration Phase, the client registers himself in order to upload and view his
files to/from the cloud server.

B. Uploading Phase

Electronic copy available at: https://ssrn.com/abstract=3802668


The files are uploaded by the client to the registered server. The encryption of uploaded
files is done using the hybrid cryptosystem. The private keys are sent to user so that only the
authenticated user is able to view his uploaded file.

C. Downloading Phase

On successful authentication, the client will input the private key for the corresponding
n slices. The private keys will decrypt the corresponding encrypted image. The decrypted files
are merged to generate original file. The decrypted file is downloaded and viewed at client end.

METHODS:

Register / Login: User need to register first by filling up basic registration details. By
using the login id and password, user can login into the system. Upload Image: The image file
to be stored is encrypted using Advance Encryption Standard, Data Encryption Standard and
Rivest Cipher 2 encryption algorithm. Least Significant Bit steganography technique is
introduced for key information security. Key information contains which part of file is
encrypted using which algorithm and key. Sending Message via Email: This encrypted file is
sent along with the image containing the key that is hidden in the image using LSB. Download
Image: When the user request for a file to be downloaded, then that file is decrypted using
AES, DES and RC2. After successful decryption, the image file is merged into one file and
then downloaded. The key is extracted from the image.

SYSTEM ARCHITECTURE:

Electronic copy available at: https://ssrn.com/abstract=3802668


The Existing users can directly enter into the system using login form, and new users
have to register all their details in the registration form provided. In order to get the meaningful
output and to achieve good accuracy the input should be acceptable and understandable by the
user. Getting a correct output is a task that has to be concentrated, as a system is validated as a
correct one only if it gives the correct output according to the input. Input as five different
images with one as a grayscale image and four as a colored image. The three days of inductions
if the employee has completed all his/her input, then the output shows the status as completed
or his status will be pending. The output is displayed as same five different images with one as
a grayscale image and four as a colored image.

Electronic copy available at: https://ssrn.com/abstract=3802668


CONCLUSION:

By using the algorithms, the stored image file is completely secured, as the file is being
encrypted not by just using one but three encryption algorithm which are AES, DES and RC2.
The key is also safe as it embeds the key in image using LSB. The system is very secure and
robust in nature. There is one other issue of cloud data storage that after storing our data in
cloud data storage we have very comfortable for access our data in any place or in any location
without carrying data to everywhere. In cloud computing, data storage system all users know
that different from the traditional computing model, utilizes the virtual computing technology.
User’s personal data may be distributed in various virtual data centre rather than stay in the
same physical location. At this time, data privacy protection will face the controversy of
different legal systems.

REFERENCES:

1. A Hybrid Cryptography Algorithm for Cloud Computing Security, International journal of


Core Engineering & Management – 2017.
2. A New Approach for Security in Cloud Data Storage for IOT Applications Using Hybrid
Cryptography Technique, International Conference on Power Electronics & IoT
Applications in Renewable Energy and its Control (PARC) - 2020
3. A Novel Technique of Cloud Security Based on Hybrid Encryption by Blowfish and MD5,
4th IEEE International Conference on Signal Processing, Computing and Control - 2017.
4. Hybrid Cryptography Algorithms in Cloud Computing: A Review, 15th International
Conference on Electronics Computer and Computation ICECCO – 2019.
5. Security of Multimedia in Cloud using Secret Shared Key, International Conference on
Computing, Power and Communication Technologies (GUCON) -2018.
6. Security design for Instant Messaging system based on RSA and triple DES, International
Conference on Image Analysis and Signal Processing – 2019
7. Security Improvement of Cloud Data Using Hybrid Cryptography and Steganography
International Conference on Computer Science and Software Engineering (CSASE) –
2020.
4.

Electronic copy available at: https://ssrn.com/abstract=3802668

You might also like