SlideShare a Scribd company logo
1 of 4
Download to read offline
International Journal of Innovative Research in Information Security (IJIRIS) ISSN: 2349-7017
Issue 11, Volume 4 (November 2017) www.ijiris.com
_________________________________________________________________________________________________
IJIRIS: Impact Factor Value – SJIF: Innospace, Morocco (2016): 4.651
Indexcopernicus: (ICV 2015): 73.48
© 2014- 17, IJIRIS- All Rights Reserved Page -1
HYBRID CRYPTOSYSTEM FOR SECURE DATA
STORAGE
Mihir Shah
Information Technology, Mumbai University
mihir.vs@somaiya.edu
Prof. Sujata Pathak
Information Technology, Mumbai University
sujatapathak@somaiya.edu
Manuscript History
Number: IJIRIS/RS/Vol.04/Issue11/NVIS10080
DOI: 10.26562/IJIRIS.2017.NVIS10080
Received: 03, October 2017
Final Correction: 12, October 2017
Final Accepted: 24, October 2017
Published: November 2017
Citation: Innovative Research Journal in Information Security, Volume IV, 01-04
doi:10.26562/IJIRIS.2017.NVIS10080
Editor: Dr.A.Arul L.S, Chief Editor, IJIRIS, AM Publications, India
Copyright: ©2017 This is an open access article distributed under the terms of the Creative Commons
Attribution License, Which Permits unrestricted use, distribution, and reproduction in any medium,
provided the original author and source are credited
Abstract— Cloud computing has become an integral part of most of the private and public organizations and being
used for data storage and retrieval. There are many usage of cloud computing and widely used in highly
confidential national services like military and treasury for storing confidential information. The cloud computing
for example Google drive, Amazon Web Service and Microsoft Azure are beneficial for organizations and end-users.
Using Cloud computing and its services, organisation/end-users can store their data. There are multiple challenges
while saving organisations highly confidential documents in servers. Hence, the objective of this paper is to provide
a high level design for a storage system maximising security and personal privacy. Though servers are highly
protected against unauthorized access, there are incidents where confidential files stored on servers are accessed
by the maintenance staffs. Hence this research paper provides introductory structure for fully protection of files
stored in the server by using Hybrid Cryptosystem.
Keywords — Cryptography, Encryption, Decryption, Steganography, Security
I. INTRODUCTION
The cloud is popular to store data and files due to the low costs, less maintenance and ease of access from any
location. Apart from the private and public organizations, government services are looking for cloud based storage
and services for their confidential data storage. Every cloud provider like Microsoft Azure, IBM, Amazon Web
Services (AWS) and many others have provided their own technique to encrypt and decrypt the data. The cloud
computing is widely used in private and public services organizations for storing huge amount of data which can be
made available from any location. The usage of cloud is found in industry, military colleges, and private
organizations. The data stored on the cloud is accessible by user authentication but for confidential access multiple
layer of security is implemented. The algorithm of this multiple layer security is dependent on the level of privacy.
To provide the solution to different levels of security, cryptography and steganography techniques are popular.
Multiple algorithms must be incorporated to enhance the level of security in data storage. New technique, using
symmetric key cryptography algorithm and steganography is proposed in this work.
International Journal of Innovative Research in Information Security (IJIRIS) ISSN: 2349-7017
Issue 11, Volume 4 (November 2017) www.ijiris.com
_________________________________________________________________________________________________
IJIRIS: Impact Factor Value – SJIF: Innospace, Morocco (2016): 4.651
Indexcopernicus: (ICV 2015): 73.48
© 2014- 17, IJIRIS- All Rights Reserved Page -2
While accessing the data on cloud front end interface, business layer and data storage layers are used. Though the
front end resides on user computer but the business and data layers reside on service provider premises. Hence
the encryption algorithm is implemented by the cloud service provider. The challenge in encryption is that more
complex logic slows down the reading and writing of the files on the server and hence the algorithm is applied only
when it is needed. Encryption algorithm helps to solve this problem by encrypting the files. This purpose of this
research is to present a file security model for the solution of security issue in cloud environment. In this model,
hybrid encryption is used where files are encrypted by 6 algorithms coupled with file splitting which is used for the
secured communication between users and the servers.
II. LITERATURE REVIEW AND EXISTING SYSTEM
Data Security Issues [5] are main issue in the existing system. Due to openness and multi-tenant characteristics of
the cloud, the traditional security mechanisms are no longer suitable for applications and data in cloud. Some of the
issues are as following:
1. Due to dynamic scalability, service and location transparency features of cloud computing model, all kinds of
application and data of the cloud platform have no fixed infrastructure and security boundaries. In the event of
security breach, it is difficult to isolate a particular resource that has a threat or has been compromised.
2. According to service delivery models of Cloud computing, resources and cloud services may be owned by
multiple providers. As there is a conflict of interest, it is difficult to deploy a unified security measure.
3. Due to the openness of cloud and sharing virtualized resources by multitenant, user data may be accessed by
other unauthorized users.
The word cryptography means changing the message data into a scrambled code which can be retrieved back on
open network. Cryptography technique secures the sensitive information in unsecured transmission networks and
which can be read by intended recipient. A cryptography algorithm needs a key along with a message of any format
to form the cipher text. The level of security of cipher text depends on the strength of cryptographic algorithm and
privacy of the cryptographic key used. Thus the first level of security has been provided. Further security can be
improved using yet another Data hiding technique, Setganography. In this proposed system AES, DES, RC2
algorithms are used to provide block wise security to data. Key information security is implemented by using LSB
steganography technique. The purpose of Key information is to decide link between available algorithm and key
file encryption. By using this technique the file is fragmented into three parts and each part uses unique algorithm
technique. Multithreading is used to encrypt every part of file simultaneously for improving the performance. LSB
technique is used to insert Data encryption Keys into cover image. Valid user receives an email with Stego-Image of
the key. Reverse process of encryption is applied for file decryption purpose. Symmetric key cryptography
algorithms are AES, DES, 3DES, IDEA, BRA, ECB, CBC and blowfish [3]. These algorithms accomplished high level
security but increase delay for data encode and decode. Steganography hide the secret data existence into envelope.
In this technique existence of data is not visible to all people. Only valid receiver knows about the data existence.
Image steganography technique is used to produce high security for data. Secret data of user hide into image file.
After adding text into image file it looks like normal image file. DES algorithm is used for text encode and decode.
Advantage of image steganography technique is providing security to text.
Three bit LSB technique used for image steganography. We can hide huge amount of into image using LSB
steganography technique. AES is symmetric key cryptography algorithm. It supports three types of keys. For 128
bit key require 10 rounds, 192 bit key require 12 rounds and 256 bit key require 14 rounds [6]. In improved AES
algorithm encryption and decryption time is reduced .Advantage of modified AES algorithm is provides better
performance in terms of delay [1]. DES applies a single key for texts encode and decode. Size of key is 128 bit. In
this algorithm many steps are executed randomly so illegitimate user cannot even guess the steps of algorithm.
Provide high throughput is one of the advantages of symmetric key cryptography algorithms. [4] Improved DES
algorithm uses 112 bit key size for data encode and decode. Key generation process is done using random key
generation technique. It provides security to data. Disadvantage of this algorithm is essential maximum time for
converting data into cipher text because it operates on single byte at a time.
III.PROPOSED SYSTEM
The solution of the asymmetric cryptography is enhanced with the additional layer of security by combining AES,
DES, RC6, ECB, CBC, Triple DES algorithms. The proposed system is a process development for file security issues
in storage systems. Same concept as of cloud computing is implemented with new technique and method, where
user can store data and can access it using proposed system. The overall proposed system structure is shown as
below figure 1.
International Journal of Innovative Research in Information Security (IJIRIS) ISSN: 2349-7017
Issue 11, Volume 4 (November 2017) www.ijiris.com
_________________________________________________________________________________________________
IJIRIS: Impact Factor Value – SJIF: Innospace, Morocco (2016): 4.651
Indexcopernicus: (ICV 2015): 73.48
© 2014- 17, IJIRIS- All Rights Reserved Page -3
Fig. 1: Proposed Storage Architecture
The encryption of the multimedia files and images are stored using the steganography technique as shown in the
figure 2.
Fig. 2: Encryption Algorithm for each data part.
In this proposed system AES, DES, RC2, ECB, CBC, 3DES algorithms are used to provide block wise security to data.
LSB steganography technique is introduced for key information security. Key information contains which part of
file is encrypted using by which algorithm and key. File is fragmented into 3-6 parts as per user input. Each and
every part of file is encrypted using different algorithm.
Figure 3: Overall System Architecture
International Journal of Innovative Research in Information Security (IJIRIS) ISSN: 2349-7017
Issue 11, Volume 4 (November 2017) www.ijiris.com
_________________________________________________________________________________________________
IJIRIS: Impact Factor Value – SJIF: Innospace, Morocco (2016): 4.651
Indexcopernicus: (ICV 2015): 73.48
© 2014- 17, IJIRIS- All Rights Reserved Page -4
All parts of file are encrypted simultaneously with the help of multithreading technique data encryption Keys are
inserted into image which is used as a key, using LSB technique. Stego-Image is send to valid receiver using email.
For file decryption purpose reverse process of encryption is applied. Figure 3 provides an overview of system
architecture. In order to ensure file security on storage system, the above hybrid cryptosystem is deployed on
server/cloud/local system. The scheme deployed is in three phases as listed.
1. Registration Phase
2. Uploading Phase
3. Downloading Phase
The phases of implementation are explained below.
1. Registration Phase:
In the Registration Phase, the end users register in order to upload and view files to/from the storage server.
2. Uploading Phase:
The files are uploaded by the end users to the registered server. The encryption of uploaded files is done using the
hybrid cryptosystem. The private keys i.e. stego-image is sent to user over mail so that authenticated user can view
uploaded file.
3. Downloading Phase:
On successful authentication, the user provides the private key i.e. stego-image for the corresponding n slices. The
private keys decrypt the corresponding encrypted slices. The decrypted files are merged to generate original file.
The decrypted file is downloaded and viewed at user end.
IV. CONCLUSIONS
Data Security and Privacy of data stored in have full of challenges. Continuous research is going on to improve the
data storage security. This paper presents hybrid security algorithms using the symmetric key. This approach helps
in reducing the encode and decode time and hence help in improving the performance for storing large data files in
highly secured environment. Because the key is secured, it can only be accessed by the authorized user. The
algorithm is built and computed on cloud server so that data movement traffic is minimized. The solution proposed
in this research provides additional layer of security by combining AES, DES, RC6, ECB, CBC, Triple DES algorithms
to asymmetric cryptography. This technique helps to apply the key information on data storage (server storage
system).
ACKNOWLEDGMENT
I am very thankful to my guide Prof. Sujata Pathak for her invaluable guidance and advice throughout this
project.
REFERENCES
1. Y Manjula, K B Shivakumar. Enhanced Secure Image Steganography using Double Encryption Algorithms, at
International Conference on Computing for Sustainable Global Development IEEE, 2016.
2. Aarti Singh, Manisha Malhotra. Hybrid Two-Tier Framework for Improved Security in Cloud Environment, at
International Conference on Computing for Sustainable Global Development IEEE, 2016.
3. Vishwanath Mahalle, Aniket Shahade. Enhancing the data security in cloud by implementing Hybrid (RSA & AES)
Encryption Algorithm, International journal of pure & applied research in engineering and technology, 2016.
4. Sakinah Ali Pitchay, Wail Abdo Ali Alhiagem, Farida Ridzuan, Madihah Mohd Saudi. A proposed system concept
on Enhancing the Encryption and Decryption Method for Cloud Computing, 17th UKSIM-SMSS International
Conference on Modelling and Simulation, 2015.
5. K.Yang, J.Xiaohua. Security for Cloud storage systems, Springer Brief in Computer Science, 2014.
6. C.K Chan, L.M Cheng. Hiding data in images by simple LSB substitution, Pattern Recognition, vol.37, pp. 469-474,
2014.
7. M.S Sutaone,M.V Khandare. Image based Steganography using LSB insertion Technique, IET International
Conference, 2008.
8. Prof. Vishwanath S. Mahalle. Implementing RSA encryption algorithm to enhance the data security of cloud in
cloud computing, International journal of pure & applied research in engineering and technology, 2013, volume
1(8):220-227, ISSN-2319-507X IJPRET.

More Related Content

What's hot

IRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
IRJET- A Survey: Data Security in Cloud using Cryptography and SteganographyIRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
IRJET- A Survey: Data Security in Cloud using Cryptography and SteganographyIRJET Journal
 
Paper id 27201448
Paper id 27201448Paper id 27201448
Paper id 27201448IJRAT
 
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET-  	  Review on Privacy Preserving on Multi Keyword Search over Encrypte...IRJET-  	  Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...IRJET Journal
 
Big data security_issues_research_paper
Big data security_issues_research_paperBig data security_issues_research_paper
Big data security_issues_research_paperLuisa Francisco
 
Providing Secure Cloud for College Campus
Providing Secure Cloud for College CampusProviding Secure Cloud for College Campus
Providing Secure Cloud for College Campusvivatechijri
 
Securing iClouds Storage Based On Combination of RSA and AES Crypto System
Securing iClouds Storage Based On Combination of RSA and AES Crypto SystemSecuring iClouds Storage Based On Combination of RSA and AES Crypto System
Securing iClouds Storage Based On Combination of RSA and AES Crypto SystemCSCJournals
 
SECURE SENSITIVE DATA SHARING ON BIG DATA PLATFORM
SECURE SENSITIVE DATA SHARING ON BIG DATA PLATFORMSECURE SENSITIVE DATA SHARING ON BIG DATA PLATFORM
SECURE SENSITIVE DATA SHARING ON BIG DATA PLATFORMAM Publications
 
Data Partitioning In Cloud Storage Using DESD Crypto Technique
Data Partitioning In Cloud Storage Using DESD Crypto TechniqueData Partitioning In Cloud Storage Using DESD Crypto Technique
Data Partitioning In Cloud Storage Using DESD Crypto TechniqueIJCSIS Research Publications
 
Improving Security Measures of E-Learning Database
Improving Security Measures of E-Learning DatabaseImproving Security Measures of E-Learning Database
Improving Security Measures of E-Learning DatabaseIOSR Journals
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...IOSR Journals
 
Prevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital EnvelopePrevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital Envelopeiosrjce
 
A Secure MSSS Scheme and AES Encryption over Cloud Data
A Secure MSSS Scheme and AES Encryption over Cloud DataA Secure MSSS Scheme and AES Encryption over Cloud Data
A Secure MSSS Scheme and AES Encryption over Cloud DataEditor IJCATR
 
3 ijece 1 ed iqbal qc
3 ijece 1 ed iqbal qc3 ijece 1 ed iqbal qc
3 ijece 1 ed iqbal qcIAESIJEECS
 
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud StorageSecure Privacy Preserving Using Multilevel Trust For Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud StorageIRJET Journal
 
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA AlgorithmEncryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithmijtsrd
 
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...
A PPLICATION OF  C LASSICAL  E NCRYPTION  T ECHNIQUES FOR  S ECURING  D ATA -...A PPLICATION OF  C LASSICAL  E NCRYPTION  T ECHNIQUES FOR  S ECURING  D ATA -...
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...IJCI JOURNAL
 

What's hot (19)

262 265
262 265262 265
262 265
 
IRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
IRJET- A Survey: Data Security in Cloud using Cryptography and SteganographyIRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
IRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
 
Paper id 27201448
Paper id 27201448Paper id 27201448
Paper id 27201448
 
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET-  	  Review on Privacy Preserving on Multi Keyword Search over Encrypte...IRJET-  	  Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
 
Big data security_issues_research_paper
Big data security_issues_research_paperBig data security_issues_research_paper
Big data security_issues_research_paper
 
Providing Secure Cloud for College Campus
Providing Secure Cloud for College CampusProviding Secure Cloud for College Campus
Providing Secure Cloud for College Campus
 
Securing iClouds Storage Based On Combination of RSA and AES Crypto System
Securing iClouds Storage Based On Combination of RSA and AES Crypto SystemSecuring iClouds Storage Based On Combination of RSA and AES Crypto System
Securing iClouds Storage Based On Combination of RSA and AES Crypto System
 
SECURE SENSITIVE DATA SHARING ON BIG DATA PLATFORM
SECURE SENSITIVE DATA SHARING ON BIG DATA PLATFORMSECURE SENSITIVE DATA SHARING ON BIG DATA PLATFORM
SECURE SENSITIVE DATA SHARING ON BIG DATA PLATFORM
 
C017421624
C017421624C017421624
C017421624
 
Data Partitioning In Cloud Storage Using DESD Crypto Technique
Data Partitioning In Cloud Storage Using DESD Crypto TechniqueData Partitioning In Cloud Storage Using DESD Crypto Technique
Data Partitioning In Cloud Storage Using DESD Crypto Technique
 
Improving Security Measures of E-Learning Database
Improving Security Measures of E-Learning DatabaseImproving Security Measures of E-Learning Database
Improving Security Measures of E-Learning Database
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...
 
Prevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital EnvelopePrevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital Envelope
 
A Secure MSSS Scheme and AES Encryption over Cloud Data
A Secure MSSS Scheme and AES Encryption over Cloud DataA Secure MSSS Scheme and AES Encryption over Cloud Data
A Secure MSSS Scheme and AES Encryption over Cloud Data
 
3 ijece 1 ed iqbal qc
3 ijece 1 ed iqbal qc3 ijece 1 ed iqbal qc
3 ijece 1 ed iqbal qc
 
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud StorageSecure Privacy Preserving Using Multilevel Trust For Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
 
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA AlgorithmEncryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
 
Report dna
Report dnaReport dna
Report dna
 
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...
A PPLICATION OF  C LASSICAL  E NCRYPTION  T ECHNIQUES FOR  S ECURING  D ATA -...A PPLICATION OF  C LASSICAL  E NCRYPTION  T ECHNIQUES FOR  S ECURING  D ATA -...
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...
 

Similar to HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE

IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET -  	  Multi Authority based Integrity Auditing and Proof of Storage wit...IRJET -  	  Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...IRJET Journal
 
Cloud security: literature survey
Cloud security: literature surveyCloud security: literature survey
Cloud security: literature surveyIJECEIAES
 
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...dbpublications
 
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET Journal
 
Cloud Cryptography
Cloud CryptographyCloud Cryptography
Cloud Cryptographyijtsrd
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET Journal
 
SURVEY OF COMPRESSION AND CRYPTOGRAPHY TECHNIQUES OF DATA SECURITY IN E-COMMERCE
SURVEY OF COMPRESSION AND CRYPTOGRAPHY TECHNIQUES OF DATA SECURITY IN E-COMMERCESURVEY OF COMPRESSION AND CRYPTOGRAPHY TECHNIQUES OF DATA SECURITY IN E-COMMERCE
SURVEY OF COMPRESSION AND CRYPTOGRAPHY TECHNIQUES OF DATA SECURITY IN E-COMMERCEAM Publications,India
 
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEMSECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEMJournal For Research
 
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in CloudAn Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in CloudIRJET Journal
 
Improving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using HadoopImproving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using HadoopIJERA Editor
 
Secure_Data_Distribution_Algorithm_for_Fog_Computing.pdf
Secure_Data_Distribution_Algorithm_for_Fog_Computing.pdfSecure_Data_Distribution_Algorithm_for_Fog_Computing.pdf
Secure_Data_Distribution_Algorithm_for_Fog_Computing.pdfHimaBinduKrovvidi
 
Retrieving Secure Data from Cloud Using OTP
Retrieving Secure Data from Cloud Using OTPRetrieving Secure Data from Cloud Using OTP
Retrieving Secure Data from Cloud Using OTPAM Publications
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET Journal
 
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET -  	  DOD Data Hiding Technique using Advanced LSB with AES-256 AlgorithmIRJET -  	  DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 AlgorithmIRJET Journal
 
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...IRJET Journal
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET Journal
 
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud ComputingSecurely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud ComputingIJERA Editor
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...IRJET Journal
 
Color Image Encryption for Secure Transfer over Internet: A survey
Color Image Encryption for Secure Transfer over Internet: A surveyColor Image Encryption for Secure Transfer over Internet: A survey
Color Image Encryption for Secure Transfer over Internet: A surveyIRJET Journal
 
Accessing secured data in cloud computing environment
Accessing secured data in cloud computing environmentAccessing secured data in cloud computing environment
Accessing secured data in cloud computing environmentIJNSA Journal
 

Similar to HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE (20)

IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET -  	  Multi Authority based Integrity Auditing and Proof of Storage wit...IRJET -  	  Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
 
Cloud security: literature survey
Cloud security: literature surveyCloud security: literature survey
Cloud security: literature survey
 
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
 
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud Computing
 
Cloud Cryptography
Cloud CryptographyCloud Cryptography
Cloud Cryptography
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
 
SURVEY OF COMPRESSION AND CRYPTOGRAPHY TECHNIQUES OF DATA SECURITY IN E-COMMERCE
SURVEY OF COMPRESSION AND CRYPTOGRAPHY TECHNIQUES OF DATA SECURITY IN E-COMMERCESURVEY OF COMPRESSION AND CRYPTOGRAPHY TECHNIQUES OF DATA SECURITY IN E-COMMERCE
SURVEY OF COMPRESSION AND CRYPTOGRAPHY TECHNIQUES OF DATA SECURITY IN E-COMMERCE
 
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEMSECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
 
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in CloudAn Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
 
Improving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using HadoopImproving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using Hadoop
 
Secure_Data_Distribution_Algorithm_for_Fog_Computing.pdf
Secure_Data_Distribution_Algorithm_for_Fog_Computing.pdfSecure_Data_Distribution_Algorithm_for_Fog_Computing.pdf
Secure_Data_Distribution_Algorithm_for_Fog_Computing.pdf
 
Retrieving Secure Data from Cloud Using OTP
Retrieving Secure Data from Cloud Using OTPRetrieving Secure Data from Cloud Using OTP
Retrieving Secure Data from Cloud Using OTP
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
 
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET -  	  DOD Data Hiding Technique using Advanced LSB with AES-256 AlgorithmIRJET -  	  DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
 
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
 
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud ComputingSecurely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
 
Color Image Encryption for Secure Transfer over Internet: A survey
Color Image Encryption for Secure Transfer over Internet: A surveyColor Image Encryption for Secure Transfer over Internet: A survey
Color Image Encryption for Secure Transfer over Internet: A survey
 
Accessing secured data in cloud computing environment
Accessing secured data in cloud computing environmentAccessing secured data in cloud computing environment
Accessing secured data in cloud computing environment
 

Recently uploaded

(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 

Recently uploaded (20)

Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 

HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE

  • 1. International Journal of Innovative Research in Information Security (IJIRIS) ISSN: 2349-7017 Issue 11, Volume 4 (November 2017) www.ijiris.com _________________________________________________________________________________________________ IJIRIS: Impact Factor Value – SJIF: Innospace, Morocco (2016): 4.651 Indexcopernicus: (ICV 2015): 73.48 © 2014- 17, IJIRIS- All Rights Reserved Page -1 HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE Mihir Shah Information Technology, Mumbai University mihir.vs@somaiya.edu Prof. Sujata Pathak Information Technology, Mumbai University sujatapathak@somaiya.edu Manuscript History Number: IJIRIS/RS/Vol.04/Issue11/NVIS10080 DOI: 10.26562/IJIRIS.2017.NVIS10080 Received: 03, October 2017 Final Correction: 12, October 2017 Final Accepted: 24, October 2017 Published: November 2017 Citation: Innovative Research Journal in Information Security, Volume IV, 01-04 doi:10.26562/IJIRIS.2017.NVIS10080 Editor: Dr.A.Arul L.S, Chief Editor, IJIRIS, AM Publications, India Copyright: ©2017 This is an open access article distributed under the terms of the Creative Commons Attribution License, Which Permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited Abstract— Cloud computing has become an integral part of most of the private and public organizations and being used for data storage and retrieval. There are many usage of cloud computing and widely used in highly confidential national services like military and treasury for storing confidential information. The cloud computing for example Google drive, Amazon Web Service and Microsoft Azure are beneficial for organizations and end-users. Using Cloud computing and its services, organisation/end-users can store their data. There are multiple challenges while saving organisations highly confidential documents in servers. Hence, the objective of this paper is to provide a high level design for a storage system maximising security and personal privacy. Though servers are highly protected against unauthorized access, there are incidents where confidential files stored on servers are accessed by the maintenance staffs. Hence this research paper provides introductory structure for fully protection of files stored in the server by using Hybrid Cryptosystem. Keywords — Cryptography, Encryption, Decryption, Steganography, Security I. INTRODUCTION The cloud is popular to store data and files due to the low costs, less maintenance and ease of access from any location. Apart from the private and public organizations, government services are looking for cloud based storage and services for their confidential data storage. Every cloud provider like Microsoft Azure, IBM, Amazon Web Services (AWS) and many others have provided their own technique to encrypt and decrypt the data. The cloud computing is widely used in private and public services organizations for storing huge amount of data which can be made available from any location. The usage of cloud is found in industry, military colleges, and private organizations. The data stored on the cloud is accessible by user authentication but for confidential access multiple layer of security is implemented. The algorithm of this multiple layer security is dependent on the level of privacy. To provide the solution to different levels of security, cryptography and steganography techniques are popular. Multiple algorithms must be incorporated to enhance the level of security in data storage. New technique, using symmetric key cryptography algorithm and steganography is proposed in this work.
  • 2. International Journal of Innovative Research in Information Security (IJIRIS) ISSN: 2349-7017 Issue 11, Volume 4 (November 2017) www.ijiris.com _________________________________________________________________________________________________ IJIRIS: Impact Factor Value – SJIF: Innospace, Morocco (2016): 4.651 Indexcopernicus: (ICV 2015): 73.48 © 2014- 17, IJIRIS- All Rights Reserved Page -2 While accessing the data on cloud front end interface, business layer and data storage layers are used. Though the front end resides on user computer but the business and data layers reside on service provider premises. Hence the encryption algorithm is implemented by the cloud service provider. The challenge in encryption is that more complex logic slows down the reading and writing of the files on the server and hence the algorithm is applied only when it is needed. Encryption algorithm helps to solve this problem by encrypting the files. This purpose of this research is to present a file security model for the solution of security issue in cloud environment. In this model, hybrid encryption is used where files are encrypted by 6 algorithms coupled with file splitting which is used for the secured communication between users and the servers. II. LITERATURE REVIEW AND EXISTING SYSTEM Data Security Issues [5] are main issue in the existing system. Due to openness and multi-tenant characteristics of the cloud, the traditional security mechanisms are no longer suitable for applications and data in cloud. Some of the issues are as following: 1. Due to dynamic scalability, service and location transparency features of cloud computing model, all kinds of application and data of the cloud platform have no fixed infrastructure and security boundaries. In the event of security breach, it is difficult to isolate a particular resource that has a threat or has been compromised. 2. According to service delivery models of Cloud computing, resources and cloud services may be owned by multiple providers. As there is a conflict of interest, it is difficult to deploy a unified security measure. 3. Due to the openness of cloud and sharing virtualized resources by multitenant, user data may be accessed by other unauthorized users. The word cryptography means changing the message data into a scrambled code which can be retrieved back on open network. Cryptography technique secures the sensitive information in unsecured transmission networks and which can be read by intended recipient. A cryptography algorithm needs a key along with a message of any format to form the cipher text. The level of security of cipher text depends on the strength of cryptographic algorithm and privacy of the cryptographic key used. Thus the first level of security has been provided. Further security can be improved using yet another Data hiding technique, Setganography. In this proposed system AES, DES, RC2 algorithms are used to provide block wise security to data. Key information security is implemented by using LSB steganography technique. The purpose of Key information is to decide link between available algorithm and key file encryption. By using this technique the file is fragmented into three parts and each part uses unique algorithm technique. Multithreading is used to encrypt every part of file simultaneously for improving the performance. LSB technique is used to insert Data encryption Keys into cover image. Valid user receives an email with Stego-Image of the key. Reverse process of encryption is applied for file decryption purpose. Symmetric key cryptography algorithms are AES, DES, 3DES, IDEA, BRA, ECB, CBC and blowfish [3]. These algorithms accomplished high level security but increase delay for data encode and decode. Steganography hide the secret data existence into envelope. In this technique existence of data is not visible to all people. Only valid receiver knows about the data existence. Image steganography technique is used to produce high security for data. Secret data of user hide into image file. After adding text into image file it looks like normal image file. DES algorithm is used for text encode and decode. Advantage of image steganography technique is providing security to text. Three bit LSB technique used for image steganography. We can hide huge amount of into image using LSB steganography technique. AES is symmetric key cryptography algorithm. It supports three types of keys. For 128 bit key require 10 rounds, 192 bit key require 12 rounds and 256 bit key require 14 rounds [6]. In improved AES algorithm encryption and decryption time is reduced .Advantage of modified AES algorithm is provides better performance in terms of delay [1]. DES applies a single key for texts encode and decode. Size of key is 128 bit. In this algorithm many steps are executed randomly so illegitimate user cannot even guess the steps of algorithm. Provide high throughput is one of the advantages of symmetric key cryptography algorithms. [4] Improved DES algorithm uses 112 bit key size for data encode and decode. Key generation process is done using random key generation technique. It provides security to data. Disadvantage of this algorithm is essential maximum time for converting data into cipher text because it operates on single byte at a time. III.PROPOSED SYSTEM The solution of the asymmetric cryptography is enhanced with the additional layer of security by combining AES, DES, RC6, ECB, CBC, Triple DES algorithms. The proposed system is a process development for file security issues in storage systems. Same concept as of cloud computing is implemented with new technique and method, where user can store data and can access it using proposed system. The overall proposed system structure is shown as below figure 1.
  • 3. International Journal of Innovative Research in Information Security (IJIRIS) ISSN: 2349-7017 Issue 11, Volume 4 (November 2017) www.ijiris.com _________________________________________________________________________________________________ IJIRIS: Impact Factor Value – SJIF: Innospace, Morocco (2016): 4.651 Indexcopernicus: (ICV 2015): 73.48 © 2014- 17, IJIRIS- All Rights Reserved Page -3 Fig. 1: Proposed Storage Architecture The encryption of the multimedia files and images are stored using the steganography technique as shown in the figure 2. Fig. 2: Encryption Algorithm for each data part. In this proposed system AES, DES, RC2, ECB, CBC, 3DES algorithms are used to provide block wise security to data. LSB steganography technique is introduced for key information security. Key information contains which part of file is encrypted using by which algorithm and key. File is fragmented into 3-6 parts as per user input. Each and every part of file is encrypted using different algorithm. Figure 3: Overall System Architecture
  • 4. International Journal of Innovative Research in Information Security (IJIRIS) ISSN: 2349-7017 Issue 11, Volume 4 (November 2017) www.ijiris.com _________________________________________________________________________________________________ IJIRIS: Impact Factor Value – SJIF: Innospace, Morocco (2016): 4.651 Indexcopernicus: (ICV 2015): 73.48 © 2014- 17, IJIRIS- All Rights Reserved Page -4 All parts of file are encrypted simultaneously with the help of multithreading technique data encryption Keys are inserted into image which is used as a key, using LSB technique. Stego-Image is send to valid receiver using email. For file decryption purpose reverse process of encryption is applied. Figure 3 provides an overview of system architecture. In order to ensure file security on storage system, the above hybrid cryptosystem is deployed on server/cloud/local system. The scheme deployed is in three phases as listed. 1. Registration Phase 2. Uploading Phase 3. Downloading Phase The phases of implementation are explained below. 1. Registration Phase: In the Registration Phase, the end users register in order to upload and view files to/from the storage server. 2. Uploading Phase: The files are uploaded by the end users to the registered server. The encryption of uploaded files is done using the hybrid cryptosystem. The private keys i.e. stego-image is sent to user over mail so that authenticated user can view uploaded file. 3. Downloading Phase: On successful authentication, the user provides the private key i.e. stego-image for the corresponding n slices. The private keys decrypt the corresponding encrypted slices. The decrypted files are merged to generate original file. The decrypted file is downloaded and viewed at user end. IV. CONCLUSIONS Data Security and Privacy of data stored in have full of challenges. Continuous research is going on to improve the data storage security. This paper presents hybrid security algorithms using the symmetric key. This approach helps in reducing the encode and decode time and hence help in improving the performance for storing large data files in highly secured environment. Because the key is secured, it can only be accessed by the authorized user. The algorithm is built and computed on cloud server so that data movement traffic is minimized. The solution proposed in this research provides additional layer of security by combining AES, DES, RC6, ECB, CBC, Triple DES algorithms to asymmetric cryptography. This technique helps to apply the key information on data storage (server storage system). ACKNOWLEDGMENT I am very thankful to my guide Prof. Sujata Pathak for her invaluable guidance and advice throughout this project. REFERENCES 1. Y Manjula, K B Shivakumar. Enhanced Secure Image Steganography using Double Encryption Algorithms, at International Conference on Computing for Sustainable Global Development IEEE, 2016. 2. Aarti Singh, Manisha Malhotra. Hybrid Two-Tier Framework for Improved Security in Cloud Environment, at International Conference on Computing for Sustainable Global Development IEEE, 2016. 3. Vishwanath Mahalle, Aniket Shahade. Enhancing the data security in cloud by implementing Hybrid (RSA & AES) Encryption Algorithm, International journal of pure & applied research in engineering and technology, 2016. 4. Sakinah Ali Pitchay, Wail Abdo Ali Alhiagem, Farida Ridzuan, Madihah Mohd Saudi. A proposed system concept on Enhancing the Encryption and Decryption Method for Cloud Computing, 17th UKSIM-SMSS International Conference on Modelling and Simulation, 2015. 5. K.Yang, J.Xiaohua. Security for Cloud storage systems, Springer Brief in Computer Science, 2014. 6. C.K Chan, L.M Cheng. Hiding data in images by simple LSB substitution, Pattern Recognition, vol.37, pp. 469-474, 2014. 7. M.S Sutaone,M.V Khandare. Image based Steganography using LSB insertion Technique, IET International Conference, 2008. 8. Prof. Vishwanath S. Mahalle. Implementing RSA encryption algorithm to enhance the data security of cloud in cloud computing, International journal of pure & applied research in engineering and technology, 2013, volume 1(8):220-227, ISSN-2319-507X IJPRET.