Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Storage on cloud using dynamic encryption


Published on

In this presentation, Bhargavi tackles the problem of security in data transfer through novel encryption techniques.

Published in: Software
  • Login to see the comments

Storage on cloud using dynamic encryption

  1. 1. Name: R.Bhargavi Twitter ID: abiramibhargavi University : Pondicherry Year/Semester : III/VI Branch : Information Technology
  2. 2. Problem Area  In this document we tried to overcome the security issue faced by cloud during file transfer. Despite of vast researches made to overcome these issues, there is no perfect solution till determined. We took this as a problem and proposed a simple solution to overcome the issues through DYNAMIC ENCRYPTION algorithms. Here we use two algorithms namely: 1. AES(Advanced Encryption Standard) 2. RSA(Rivest Shamir Adleman)
  3. 3. Problem Area(Cont..)  Where AES is a symmetric algorithm used in server side for dynamic encryption and RSA is a asymmetric algorithm used in client side for one time encryption. This document includes same existing procedure for easy request and respond from client and server. While client request for the particular file or data first the file is decrypted with AES and again it is decrypted with RSA algorithm in client side.
  4. 4. Solution  The topic SCUDE briefly explains Storing and transferring data in Cloud securely Using Dynamic Encryption. The encrypted data in cloud server is again dynamically encrypted with respect to time.  Symmetric key algorithms are used to encrypt the data which rest on cloud, while transferring the data asymmetric key algorithms are used.  The Dynamic Encryption involves two cryptographic algorithms namely RSA(Asymmetric algorithm) and AES(Symmetric algorithm).
  5. 5. Working
  6. 6. Solution(Cont...)  And for decryption the same algorithm is used in reverse process.  The goal of our project is to provide more security for data, even though it has some drawbacks and constraints which we will solve in the upcoming modules.  The main aim of SCUDE is to overcome the Data Insecurity (During File Transfer).
  7. 7. Impacts  This document overcomes five main issues: 1. Data protection in motion 2. Encryption key management 3. Access controls 4. Long-term resiliency of the encryption system 5. Robust Security  Through this project we can avoid data insecurity and data loss using cryptographic algorithms.
  8. 8. Conclusion  The main advantage is preventing hacking and cracking of data from unauthorized source.  Reliability and scalability can be improved.  This algorithm provides high security with firewalls.  Data breach and data loss is the major drawback in the existing system which has been overcome in SCUDE.