SlideShare a Scribd company logo
1 of 5
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4804
An Implementation of Secured Data Integrity Technique for Cloud
Storage through 3DES Algorithm
Ms Amrita Nagda1, Mr Nikhil Karale2, Dr S.S. Dhande3
1M.E II yr, DRGITR, SGBAU University, Amravati, Maharashtra, India.
2Assistant Professor, DRGITR, SGBAU University, Amravati, Maharashtra, India.
3HOD,Dept of Computer Science & Engineering, SIPNA College, SGBAU University, Amravati, Maharashtra , India.
----------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Cloud Computing is a set of IT Services, for
example network, software system, storage, hardware,
software, and resources and these services are provided to a
customer over a network. The IT services of Cloud Computing
are delivered by third party provider who owns the
infrastructure. Benefits of cloudstorageareeasyaccessmeans
access to your knowledge anyplace, anyhow, anytime,
scalability, resilience, cost efficiency, and highreliabilityofthe
data. Because of these benefits each and every organization is
moving its data to the cloud, means it uses the storage service
provided by the cloud provider. So there is a need to protect
that data against unauthorized access, modification or denial
of services etc. To secure the Cloud means secure the
treatments (calculations) and storage (databases hosted by
the Cloud provider).In this project, we have proposed to make
use of 3DES algorithm which is a well-known symmetric
cryptosystem and is widely used for secure data transmission,
along with that we will blend it with Random Key Generator
and Graphical Password to add an extra security measure.
This proposed architecture of three way mechanism and the
use of symmetric method of encryption make it tough for
hackers to crack the security system, thereby protecting data
stored in cloud. This Cipher Block chaining system is to be
secure for clients and server. The security architecture of the
system is designed by using DES cipher block chaining, which
eliminates the fraud that occurs today with stolen data. There
is no danger of any data sent within the system being
intercepted, and replaced. The system with encryption is
acceptably secure, but that the level of encryption has to be
stepped up, as computing power increases. Results in order to
be secure the system the communication between modules is
encrypted using symmetric key.
Key Words: Cloud, Cloud Security, Cryptosystem, 3DES,
Random Key Generator, Block Cipher Chaining, Symmetric
Techniques.
1. INTRODUCTION
Cloud computing is an emerging computing technology that
uses the internet and central remote servers to maintain
data and applications. Basically cloud computing is the idea
of accessing files, software and computing services through
the Internet instead of on our personal computer. The
primary benefits of Cloud Computing are the ability to
create, update and store your files through any computer
that has access to the Web. It has the ability to rent a virtual
server, load software on it, turn cloud services on and off at
will, or clone it ten times to meet a sudden workload
demands. It can be storingandsecuringimmenseamountsof
data that is only accessible by authorized applications and
user. Cloud computing has the ability to use applications on
the Internet that store and protect data while providing a
service.
Cloud Computing moves the application software and
databases to the large data centres, where the management
of the data and services may not be fully trustworthy. This
unique attribute, however, poses many new security
challenges which have not been well understood. In this
project, we focus on cloud data storage,encryptionofdata as
well as security of the data, which has always been an
important aspect of quality of service
1.1 CLOUD WITH CRYPTOGRAPHY
Whenever we save our valuable information on our phones
and desktops or on our notebooks, we always get worried
about the security of data. .The main aim of ours is to save
that information from the third party vendor or from the
Unauthorized user. So security is the major concern which
we have to keep in our mind. This is the biggest issue of
today’s world. To save our data on the cloud we use various
techniques and cryptography is one of them. We use various
cryptography algorithms to keep our data more securefrom
the unauthorized access.Wheneverwehavetosendourdata
from one network to another network over the internet,
there are so many possibilities to get our data leaked by the
third party. So while sending our data to the destination
from the source we simply perform two operations the first
one is encryption and another one is decryption. Encryption
is also used to protect our data and plays a vital role for the
security of data. Encryption can be defined as a technique of
securing our data from the intruders in which a plain text is
converted into the cipher text and cannot be readable by
them.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4805
Fig -1: Cryptography
In cryptography, there are many algorithms which are used
for the security of data. Cryptography can be basically
divided into two parts. One of them is symmetric
cryptography and an other one is asymmetric cryptography.
In symmetric cryptography we only use one key for both
encryption and decryption process. The algorithms used in
symmetric key cryptography are AES, DES, and3DES.Onthe
other hand asymmetric key cryptography we use two keys
one for he encryption and one for the decryptionprocess. By
using the asymmetric cryptography we can provide the
authentication and nonrepudiation.The algorithms used in
asymmetric key cryptography are RSA and Elliptic Curve
Cryptography.
1.2 3DES
Sample 3DES is developed by IBM in 1978. It is the
successor of DES algorithm which uses 168 bitskeysize.The
key size of 3DES algorithm is 3 times bigger thanthekeysize
of DES algorithm i.e., (3*56 bits) and the block size of 3DES
algorithm is 64 bits. 48 rounds are used in 3DES algorithm
for the encryption process. There are three mainstepsare in
the 3DES algorithm and which are as follows:
1.1 Encryption process is done with a key K1.
1.2 Decryption process is done with a key K2.
1.3 Encryption process is done with a key K1.
Fig -2: Steps in 3DES Algorithm
2. RELATED WORK
Juels et al. [1] described a formal ―proof of retrievability‖
(POR) model for ensuring the remote data integrity. Their
scheme combines spot-checking and error-correcting code
to ensure both possession and retrievability of files on
archive service systems. Shacham et al. [2] built on this
model and constructed a random linear function based
homomorphic authenticator which enables unlimited
number of queries and requires less communication
overhead. Bowers et al. [3] proposed an improved
framework for POR protocolsthatgeneralizesbothJuels and
Shacham’s work. Later in their subsequent work, Bowers et
al. [4] extended POR model to distributed systems.However,
all these schemes are focusing on static data. The
effectiveness of their schemes rests primarily on the
preprocessing steps that the user conducts before
outsourcing the data file F. Any change to the contents of
Feven few bits, must propagate throughthe error-correcting
code, thus introducing significant computation and
communication complexity. Ateniese et al. [5] defined the
―provable data possession‖ (PDP) model for ensuring
possession of file on entrusted storages. Their scheme
utilized public key based homo-morphictagsforauditingthe
data file, thus providing public verifiability. However, their
scheme requiressufficientcomputationoverheadthatcan be
expensive for an entire file. In their subsequent work,
Ateniese et al. [6] described a PDP scheme that uses only
symmetric key cryptography. This method has lower-
overhead than their previous scheme and allows for block
updates, deletions and appends to the stored file, which has
also been supported in our work. However, their scheme
focuses on single server scenario and doesnotaddresssmall
data corruptions, leaving both the distributed scenario and
data error recovery issue unexplored. Curtmola et al.
3. PROPOSED METHODOLOGY
Proposed trusted computing system model is categorized in
two parts. First part describes the functions that can be
performed on cloud for storage and management of files and
the other part describes thesecurityalgorithmappliedonthe
cloud to make it secure. Cryptography is the practice and
study of techniques for secure communication in the
presence of third parties.
Modern cryptography is heavily based on mathematical
theory and computer science practice; cryptographic
algorithms are designed around computational hardness
assumptions, making such algorithms hard to break in
practice by any adversary. It is theoreticallypossibletobreak
such a system but it is infeasible to do so by any known
practical means. These schemes are therefore termed
computationally secure; theoretical advances
A.HardwareandSoftwareRequirementsforDevelopment
1.Minimum 1Gz dual core AMD BRAZO CPU or
Equivalent.
2. Minimum 50 GB storage space on Hard Disk for User
Storage.
3. 4 GB DDR3 RAM or Above
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4806
4. Integrated Network Adapter
5. High Speed LAN Cable
6. Windows 7 Professional or Above
7. Visual Studio 2010
8. MySQL v5.5.3
9. ODBC Connector v5.5.3
10. Heidi SQL
11. IIS Management Server
12. Microsoft Dot-Net Framework v4.0 or above
4. ACTUAL IMPLEMENTATION
We have developed a cloud storage system where a user
would first have to register him on the cloud by creating
an
Fig- 3 : flowchart and working of project
account. We have made use of symmetric key encryption for
data, and for authentication of the user we make use of the
technique of 2-step verification which will containGraphical
password in its second step.
We use the front-end as C# language to create the
application while we use MySQL as back-end technique to
handle the technique of data storage. We have designed the
prototype model which has the desired features which we
had earlier mentioned in our objectives of 2 stepverification
process of using a alphanumerical password in the initial
stage and graphical password in the next stage for the
authentication of the user.
Due to the time constraints we have managed to implement
encryption algorithm on textual content only. However it is
feasible to encrypt images, audio video in future.
The designed prototype will be subjected tothreewell know
globally used penetration testing tools viz. KBG Key-Logger,
Dark Comet-RAT, High Ion Orbit Canon.
The analysis will be consisting of series of test to verify the
security level to which the password can be obtained using
tools. We can say that the project appears as per planned
however the prototype designed gives the glimpse of the
implementation of our objectives. The two step verification
process provides an addedlayerofauthenticationoftheuser
by asking him to perform two task of writing password and
choosing appropriate images.Using3DESalgorithm wehave
successfully encrypted the .txt files while other multimedia
files are safeguarded by key generation policy. Also the
generated key being sent on the users email id only
registered users of that email id can access the key.
1) KBG Key logger Output:
Given below are the screenshots of the KGB Key logger
software which was tested on our project. As shown in the
screen shot the first level of password which consists of
alphanumeric characters is captured by the software
however, it failed to capture the next level of authentication
which is graphical password. This result ensured that the
KBG Key logger was unable to crack the authentication
procedure of our project completely.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4807
Fig-4 : Snapshot of the software tested KGB Key logger
2) 4.7.2 Dark Comet (R.A.T)
To verify that the KBG Key logger output were verified we
made use of anotherfamousTrojanGenerationtoolknownas
the Dark Comet which is the Remote Administration Tool
(R.A.T). The Key logger failedtologthegraphicalpasswordof
the project.
Fig-5:Snapshot of the software tested Dark Comet Key
logger
However our project failed to provide security if a client has
already been affected with a Trojan which has the feature of
remote viewing the desktop activity. In such a scenario the
graphical password can be viewed of the section of the
password made.
5. CONCLUSIONS
The developed project achieved the goals of authentication
and providing security on cloud storage since during our
analysis the tools failed to identify the graphical password
thus failing to proceed further in our project. Also we
achieved data encryption during the storing of the textual
data files. This ensured that the contenttobesafeandsecure
during a scenario of breach-of-data.
This concludes us in saying that the goals that were set
during the development of the projecthave beenachieved as
desired and the project is ready for large scale
implementation or for commercialization.
REFERENCES
[1] A. Juels and J. Burton S. Kaliski, ―PORs: Proofs of
Retrievability for Large Files,‖ Proc. of CCS ’07, pp.
584–597, 2007.
[2] H. Shacham and B. Waters, ―Compact Proofs of
Retrievability,‖ Proc. of Asiacrypt ’08, Dec. 2008.
[3] K. D. Bowers, A. Juels, and A. Oprea, ―Proofs of
Retrievability: Theory and implementation,‖
Cryptology ePrint Archive, Report 2008/175, 2008,
http://eprint.iacr.org/.
[4] K. D. Bowers, A. Juels, and A. Oprea, ―HAIL: A High-
Availability and Integrity Layer for Cloud Storage,‖
Cryptology ePrint Archive, Report 2008/489, 2008,
http://eprint.iacr.org/.
[5] G. Ateniese, R. Burns, R. Curtmola, J. Herring,L.Kissner,Z.
Peterson, and D. Song, ―Provable Data Possession at
Untrusted Stores,‖ Proc. Of CCS ’07, pp. 598–609, 2007
[6] G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik,
―Scalable and Efficient Provable Data Possession,‖ Proc. of
SecureComm ’08, pp. 1
[7] Mrunalini Motilal Shete, Pragati Damodar Hipparkar,
"Data Secure in Cloud Computing Using Encryption
Algorithms ",International Journal of Science and research
(IJSR), Volume 4 Issue 3, pp- 1497-1499, March 2015.
[8]. Rohit Bore, Dr. Rahila Sheikh, "International Journal of
Computer Science and Network", Volume 5, pp-171-176,
February 2016.
[9]. Dr. S. S. Manikandasaran, "Security Attacks and
Cryptography Solutions for Data Stored in Public Cloud
Storage",International Journal of Computer Science and
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4808
Information Technology & Security (IJCSITS),Vol.6,pp-498-
503, Jan-Feb 2016.
[10]. Shaunak S.Ganorkar:” An InformationSecurityScheme
for Cloud based Environment using 3DES Encryption
Algorithm”, International Journal of Recent Development in
Engineering and Technology (ijrdet) (ISSN 2347 – 6435)
(Online) Volume 2, Issue 4, April 2014

More Related Content

What's hot

IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET -  	  Multi Authority based Integrity Auditing and Proof of Storage wit...IRJET -  	  Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...IRJET Journal
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET Journal
 
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmHybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmIJECEIAES
 
Automated diagnosis of attacks in internet of things using machine learning a...
Automated diagnosis of attacks in internet of things using machine learning a...Automated diagnosis of attacks in internet of things using machine learning a...
Automated diagnosis of attacks in internet of things using machine learning a...journalBEEI
 
A novel cloud storage system with support of sensitive data application
A novel cloud storage system with support of sensitive data applicationA novel cloud storage system with support of sensitive data application
A novel cloud storage system with support of sensitive data applicationijmnct
 
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...IRJET Journal
 
Paper id 27201448
Paper id 27201448Paper id 27201448
Paper id 27201448IJRAT
 
IRJET- Key Exchange Privacy Preserving Technique in Cloud Computing
IRJET-  	  Key Exchange Privacy Preserving Technique in Cloud ComputingIRJET-  	  Key Exchange Privacy Preserving Technique in Cloud Computing
IRJET- Key Exchange Privacy Preserving Technique in Cloud ComputingIRJET Journal
 
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...
A PPLICATION OF  C LASSICAL  E NCRYPTION  T ECHNIQUES FOR  S ECURING  D ATA -...A PPLICATION OF  C LASSICAL  E NCRYPTION  T ECHNIQUES FOR  S ECURING  D ATA -...
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...IJCI JOURNAL
 
IRJET- Secure Data Protection in Cloud Computing
IRJET-  	  Secure Data Protection in Cloud ComputingIRJET-  	  Secure Data Protection in Cloud Computing
IRJET- Secure Data Protection in Cloud ComputingIRJET Journal
 
Crypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT DataCrypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT DataIRJET Journal
 
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in CloudAn Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in CloudIRJET Journal
 
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET Journal
 
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...IJSRED
 
Systematic Review Automation in Cyber Security
Systematic Review Automation in Cyber SecuritySystematic Review Automation in Cyber Security
Systematic Review Automation in Cyber SecurityYogeshIJTSRD
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET Journal
 
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...IRJET Journal
 

What's hot (20)

IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET -  	  Multi Authority based Integrity Auditing and Proof of Storage wit...IRJET -  	  Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
 
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmHybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Automated diagnosis of attacks in internet of things using machine learning a...
Automated diagnosis of attacks in internet of things using machine learning a...Automated diagnosis of attacks in internet of things using machine learning a...
Automated diagnosis of attacks in internet of things using machine learning a...
 
A novel cloud storage system with support of sensitive data application
A novel cloud storage system with support of sensitive data applicationA novel cloud storage system with support of sensitive data application
A novel cloud storage system with support of sensitive data application
 
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
 
Paper id 27201448
Paper id 27201448Paper id 27201448
Paper id 27201448
 
IRJET- Key Exchange Privacy Preserving Technique in Cloud Computing
IRJET-  	  Key Exchange Privacy Preserving Technique in Cloud ComputingIRJET-  	  Key Exchange Privacy Preserving Technique in Cloud Computing
IRJET- Key Exchange Privacy Preserving Technique in Cloud Computing
 
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...
A PPLICATION OF  C LASSICAL  E NCRYPTION  T ECHNIQUES FOR  S ECURING  D ATA -...A PPLICATION OF  C LASSICAL  E NCRYPTION  T ECHNIQUES FOR  S ECURING  D ATA -...
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...
 
IRJET- Secure Data Protection in Cloud Computing
IRJET-  	  Secure Data Protection in Cloud ComputingIRJET-  	  Secure Data Protection in Cloud Computing
IRJET- Secure Data Protection in Cloud Computing
 
Crypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT DataCrypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT Data
 
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in CloudAn Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
 
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
 
Br36413417
Br36413417Br36413417
Br36413417
 
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
 
Systematic Review Automation in Cyber Security
Systematic Review Automation in Cyber SecuritySystematic Review Automation in Cyber Security
Systematic Review Automation in Cyber Security
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
 
C017421624
C017421624C017421624
C017421624
 
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
 

Similar to IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storage through 3DES Algorithm

IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET Journal
 
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET Journal
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET Journal
 
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...IRJET Journal
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesIRJET Journal
 
Protection of data using linear programming and fhe technique in cloud computing
Protection of data using linear programming and fhe technique in cloud computingProtection of data using linear programming and fhe technique in cloud computing
Protection of data using linear programming and fhe technique in cloud computingIAEME Publication
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET Journal
 
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET-  	  Efficient Privacy-Preserving using Novel Based Secure Protocol in SVMIRJET-  	  Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVMIRJET Journal
 
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...IRJET Journal
 
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET Journal
 
Proposed system for data security in distributed computing in using triple d...
Proposed system for data security in distributed computing in  using triple d...Proposed system for data security in distributed computing in  using triple d...
Proposed system for data security in distributed computing in using triple d...IJECEIAES
 
Data Division in Cloud for Secured Data Storage using RSA Algorithm
Data Division in Cloud for Secured Data Storage using RSA AlgorithmData Division in Cloud for Secured Data Storage using RSA Algorithm
Data Division in Cloud for Secured Data Storage using RSA AlgorithmIRJET Journal
 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationEditor IJMTER
 
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. IJCERT JOURNAL
 
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageBio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageIJERA Editor
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingAIRCC Publishing Corporation
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGAIRCC Publishing Corporation
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGijcsit
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...IRJET Journal
 
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET Journal
 

Similar to IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storage through 3DES Algorithm (20)

IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
 
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud Computing
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
 
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
 
Protection of data using linear programming and fhe technique in cloud computing
Protection of data using linear programming and fhe technique in cloud computingProtection of data using linear programming and fhe technique in cloud computing
Protection of data using linear programming and fhe technique in cloud computing
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
 
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET-  	  Efficient Privacy-Preserving using Novel Based Secure Protocol in SVMIRJET-  	  Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
 
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
 
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key Exposure
 
Proposed system for data security in distributed computing in using triple d...
Proposed system for data security in distributed computing in  using triple d...Proposed system for data security in distributed computing in  using triple d...
Proposed system for data security in distributed computing in using triple d...
 
Data Division in Cloud for Secured Data Storage using RSA Algorithm
Data Division in Cloud for Secured Data Storage using RSA AlgorithmData Division in Cloud for Secured Data Storage using RSA Algorithm
Data Division in Cloud for Secured Data Storage using RSA Algorithm
 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
 
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions.
 
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageBio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
 
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 

Recently uploaded (20)

VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 

IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storage through 3DES Algorithm

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4804 An Implementation of Secured Data Integrity Technique for Cloud Storage through 3DES Algorithm Ms Amrita Nagda1, Mr Nikhil Karale2, Dr S.S. Dhande3 1M.E II yr, DRGITR, SGBAU University, Amravati, Maharashtra, India. 2Assistant Professor, DRGITR, SGBAU University, Amravati, Maharashtra, India. 3HOD,Dept of Computer Science & Engineering, SIPNA College, SGBAU University, Amravati, Maharashtra , India. ----------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Cloud Computing is a set of IT Services, for example network, software system, storage, hardware, software, and resources and these services are provided to a customer over a network. The IT services of Cloud Computing are delivered by third party provider who owns the infrastructure. Benefits of cloudstorageareeasyaccessmeans access to your knowledge anyplace, anyhow, anytime, scalability, resilience, cost efficiency, and highreliabilityofthe data. Because of these benefits each and every organization is moving its data to the cloud, means it uses the storage service provided by the cloud provider. So there is a need to protect that data against unauthorized access, modification or denial of services etc. To secure the Cloud means secure the treatments (calculations) and storage (databases hosted by the Cloud provider).In this project, we have proposed to make use of 3DES algorithm which is a well-known symmetric cryptosystem and is widely used for secure data transmission, along with that we will blend it with Random Key Generator and Graphical Password to add an extra security measure. This proposed architecture of three way mechanism and the use of symmetric method of encryption make it tough for hackers to crack the security system, thereby protecting data stored in cloud. This Cipher Block chaining system is to be secure for clients and server. The security architecture of the system is designed by using DES cipher block chaining, which eliminates the fraud that occurs today with stolen data. There is no danger of any data sent within the system being intercepted, and replaced. The system with encryption is acceptably secure, but that the level of encryption has to be stepped up, as computing power increases. Results in order to be secure the system the communication between modules is encrypted using symmetric key. Key Words: Cloud, Cloud Security, Cryptosystem, 3DES, Random Key Generator, Block Cipher Chaining, Symmetric Techniques. 1. INTRODUCTION Cloud computing is an emerging computing technology that uses the internet and central remote servers to maintain data and applications. Basically cloud computing is the idea of accessing files, software and computing services through the Internet instead of on our personal computer. The primary benefits of Cloud Computing are the ability to create, update and store your files through any computer that has access to the Web. It has the ability to rent a virtual server, load software on it, turn cloud services on and off at will, or clone it ten times to meet a sudden workload demands. It can be storingandsecuringimmenseamountsof data that is only accessible by authorized applications and user. Cloud computing has the ability to use applications on the Internet that store and protect data while providing a service. Cloud Computing moves the application software and databases to the large data centres, where the management of the data and services may not be fully trustworthy. This unique attribute, however, poses many new security challenges which have not been well understood. In this project, we focus on cloud data storage,encryptionofdata as well as security of the data, which has always been an important aspect of quality of service 1.1 CLOUD WITH CRYPTOGRAPHY Whenever we save our valuable information on our phones and desktops or on our notebooks, we always get worried about the security of data. .The main aim of ours is to save that information from the third party vendor or from the Unauthorized user. So security is the major concern which we have to keep in our mind. This is the biggest issue of today’s world. To save our data on the cloud we use various techniques and cryptography is one of them. We use various cryptography algorithms to keep our data more securefrom the unauthorized access.Wheneverwehavetosendourdata from one network to another network over the internet, there are so many possibilities to get our data leaked by the third party. So while sending our data to the destination from the source we simply perform two operations the first one is encryption and another one is decryption. Encryption is also used to protect our data and plays a vital role for the security of data. Encryption can be defined as a technique of securing our data from the intruders in which a plain text is converted into the cipher text and cannot be readable by them.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4805 Fig -1: Cryptography In cryptography, there are many algorithms which are used for the security of data. Cryptography can be basically divided into two parts. One of them is symmetric cryptography and an other one is asymmetric cryptography. In symmetric cryptography we only use one key for both encryption and decryption process. The algorithms used in symmetric key cryptography are AES, DES, and3DES.Onthe other hand asymmetric key cryptography we use two keys one for he encryption and one for the decryptionprocess. By using the asymmetric cryptography we can provide the authentication and nonrepudiation.The algorithms used in asymmetric key cryptography are RSA and Elliptic Curve Cryptography. 1.2 3DES Sample 3DES is developed by IBM in 1978. It is the successor of DES algorithm which uses 168 bitskeysize.The key size of 3DES algorithm is 3 times bigger thanthekeysize of DES algorithm i.e., (3*56 bits) and the block size of 3DES algorithm is 64 bits. 48 rounds are used in 3DES algorithm for the encryption process. There are three mainstepsare in the 3DES algorithm and which are as follows: 1.1 Encryption process is done with a key K1. 1.2 Decryption process is done with a key K2. 1.3 Encryption process is done with a key K1. Fig -2: Steps in 3DES Algorithm 2. RELATED WORK Juels et al. [1] described a formal ―proof of retrievability‖ (POR) model for ensuring the remote data integrity. Their scheme combines spot-checking and error-correcting code to ensure both possession and retrievability of files on archive service systems. Shacham et al. [2] built on this model and constructed a random linear function based homomorphic authenticator which enables unlimited number of queries and requires less communication overhead. Bowers et al. [3] proposed an improved framework for POR protocolsthatgeneralizesbothJuels and Shacham’s work. Later in their subsequent work, Bowers et al. [4] extended POR model to distributed systems.However, all these schemes are focusing on static data. The effectiveness of their schemes rests primarily on the preprocessing steps that the user conducts before outsourcing the data file F. Any change to the contents of Feven few bits, must propagate throughthe error-correcting code, thus introducing significant computation and communication complexity. Ateniese et al. [5] defined the ―provable data possession‖ (PDP) model for ensuring possession of file on entrusted storages. Their scheme utilized public key based homo-morphictagsforauditingthe data file, thus providing public verifiability. However, their scheme requiressufficientcomputationoverheadthatcan be expensive for an entire file. In their subsequent work, Ateniese et al. [6] described a PDP scheme that uses only symmetric key cryptography. This method has lower- overhead than their previous scheme and allows for block updates, deletions and appends to the stored file, which has also been supported in our work. However, their scheme focuses on single server scenario and doesnotaddresssmall data corruptions, leaving both the distributed scenario and data error recovery issue unexplored. Curtmola et al. 3. PROPOSED METHODOLOGY Proposed trusted computing system model is categorized in two parts. First part describes the functions that can be performed on cloud for storage and management of files and the other part describes thesecurityalgorithmappliedonthe cloud to make it secure. Cryptography is the practice and study of techniques for secure communication in the presence of third parties. Modern cryptography is heavily based on mathematical theory and computer science practice; cryptographic algorithms are designed around computational hardness assumptions, making such algorithms hard to break in practice by any adversary. It is theoreticallypossibletobreak such a system but it is infeasible to do so by any known practical means. These schemes are therefore termed computationally secure; theoretical advances A.HardwareandSoftwareRequirementsforDevelopment 1.Minimum 1Gz dual core AMD BRAZO CPU or Equivalent. 2. Minimum 50 GB storage space on Hard Disk for User Storage. 3. 4 GB DDR3 RAM or Above
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4806 4. Integrated Network Adapter 5. High Speed LAN Cable 6. Windows 7 Professional or Above 7. Visual Studio 2010 8. MySQL v5.5.3 9. ODBC Connector v5.5.3 10. Heidi SQL 11. IIS Management Server 12. Microsoft Dot-Net Framework v4.0 or above 4. ACTUAL IMPLEMENTATION We have developed a cloud storage system where a user would first have to register him on the cloud by creating an Fig- 3 : flowchart and working of project account. We have made use of symmetric key encryption for data, and for authentication of the user we make use of the technique of 2-step verification which will containGraphical password in its second step. We use the front-end as C# language to create the application while we use MySQL as back-end technique to handle the technique of data storage. We have designed the prototype model which has the desired features which we had earlier mentioned in our objectives of 2 stepverification process of using a alphanumerical password in the initial stage and graphical password in the next stage for the authentication of the user. Due to the time constraints we have managed to implement encryption algorithm on textual content only. However it is feasible to encrypt images, audio video in future. The designed prototype will be subjected tothreewell know globally used penetration testing tools viz. KBG Key-Logger, Dark Comet-RAT, High Ion Orbit Canon. The analysis will be consisting of series of test to verify the security level to which the password can be obtained using tools. We can say that the project appears as per planned however the prototype designed gives the glimpse of the implementation of our objectives. The two step verification process provides an addedlayerofauthenticationoftheuser by asking him to perform two task of writing password and choosing appropriate images.Using3DESalgorithm wehave successfully encrypted the .txt files while other multimedia files are safeguarded by key generation policy. Also the generated key being sent on the users email id only registered users of that email id can access the key. 1) KBG Key logger Output: Given below are the screenshots of the KGB Key logger software which was tested on our project. As shown in the screen shot the first level of password which consists of alphanumeric characters is captured by the software however, it failed to capture the next level of authentication which is graphical password. This result ensured that the KBG Key logger was unable to crack the authentication procedure of our project completely.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4807 Fig-4 : Snapshot of the software tested KGB Key logger 2) 4.7.2 Dark Comet (R.A.T) To verify that the KBG Key logger output were verified we made use of anotherfamousTrojanGenerationtoolknownas the Dark Comet which is the Remote Administration Tool (R.A.T). The Key logger failedtologthegraphicalpasswordof the project. Fig-5:Snapshot of the software tested Dark Comet Key logger However our project failed to provide security if a client has already been affected with a Trojan which has the feature of remote viewing the desktop activity. In such a scenario the graphical password can be viewed of the section of the password made. 5. CONCLUSIONS The developed project achieved the goals of authentication and providing security on cloud storage since during our analysis the tools failed to identify the graphical password thus failing to proceed further in our project. Also we achieved data encryption during the storing of the textual data files. This ensured that the contenttobesafeandsecure during a scenario of breach-of-data. This concludes us in saying that the goals that were set during the development of the projecthave beenachieved as desired and the project is ready for large scale implementation or for commercialization. REFERENCES [1] A. Juels and J. Burton S. Kaliski, ―PORs: Proofs of Retrievability for Large Files,‖ Proc. of CCS ’07, pp. 584–597, 2007. [2] H. Shacham and B. Waters, ―Compact Proofs of Retrievability,‖ Proc. of Asiacrypt ’08, Dec. 2008. [3] K. D. Bowers, A. Juels, and A. Oprea, ―Proofs of Retrievability: Theory and implementation,‖ Cryptology ePrint Archive, Report 2008/175, 2008, http://eprint.iacr.org/. [4] K. D. Bowers, A. Juels, and A. Oprea, ―HAIL: A High- Availability and Integrity Layer for Cloud Storage,‖ Cryptology ePrint Archive, Report 2008/489, 2008, http://eprint.iacr.org/. [5] G. Ateniese, R. Burns, R. Curtmola, J. Herring,L.Kissner,Z. Peterson, and D. Song, ―Provable Data Possession at Untrusted Stores,‖ Proc. Of CCS ’07, pp. 598–609, 2007 [6] G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik, ―Scalable and Efficient Provable Data Possession,‖ Proc. of SecureComm ’08, pp. 1 [7] Mrunalini Motilal Shete, Pragati Damodar Hipparkar, "Data Secure in Cloud Computing Using Encryption Algorithms ",International Journal of Science and research (IJSR), Volume 4 Issue 3, pp- 1497-1499, March 2015. [8]. Rohit Bore, Dr. Rahila Sheikh, "International Journal of Computer Science and Network", Volume 5, pp-171-176, February 2016. [9]. Dr. S. S. Manikandasaran, "Security Attacks and Cryptography Solutions for Data Stored in Public Cloud Storage",International Journal of Computer Science and
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4808 Information Technology & Security (IJCSITS),Vol.6,pp-498- 503, Jan-Feb 2016. [10]. Shaunak S.Ganorkar:” An InformationSecurityScheme for Cloud based Environment using 3DES Encryption Algorithm”, International Journal of Recent Development in Engineering and Technology (ijrdet) (ISSN 2347 – 6435) (Online) Volume 2, Issue 4, April 2014