Submit Search
Upload
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storage through 3DES Algorithm
•
0 likes
•
10 views
IRJET Journal
Follow
https://www.irjet.net/archives/V6/i5/IRJET-V6I5582.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 5
Download now
Download to read offline
Recommended
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET Journal
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET Journal
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
IRJET Journal
Cloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve Cryptography
IRJET Journal
IRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET Journal
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET Journal
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
IRJET Journal
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
IRJET Journal
Recommended
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET Journal
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET Journal
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
IRJET Journal
Cloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve Cryptography
IRJET Journal
IRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET Journal
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET Journal
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
IRJET Journal
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
IRJET Journal
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET Journal
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET Journal
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
IJECEIAES
www.ijerd.com
www.ijerd.com
IJERD Editor
Automated diagnosis of attacks in internet of things using machine learning a...
Automated diagnosis of attacks in internet of things using machine learning a...
journalBEEI
A novel cloud storage system with support of sensitive data application
A novel cloud storage system with support of sensitive data application
ijmnct
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET Journal
Paper id 27201448
Paper id 27201448
IJRAT
IRJET- Key Exchange Privacy Preserving Technique in Cloud Computing
IRJET- Key Exchange Privacy Preserving Technique in Cloud Computing
IRJET Journal
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...
IJCI JOURNAL
IRJET- Secure Data Protection in Cloud Computing
IRJET- Secure Data Protection in Cloud Computing
IRJET Journal
Crypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT Data
IRJET Journal
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
IRJET Journal
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET Journal
Br36413417
Br36413417
IJERA Editor
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
IJSRED
Systematic Review Automation in Cyber Security
Systematic Review Automation in Cyber Security
YogeshIJTSRD
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET Journal
C017421624
C017421624
IOSR Journals
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET Journal
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET Journal
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud Computing
IRJET Journal
More Related Content
What's hot
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET Journal
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET Journal
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
IJECEIAES
www.ijerd.com
www.ijerd.com
IJERD Editor
Automated diagnosis of attacks in internet of things using machine learning a...
Automated diagnosis of attacks in internet of things using machine learning a...
journalBEEI
A novel cloud storage system with support of sensitive data application
A novel cloud storage system with support of sensitive data application
ijmnct
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET Journal
Paper id 27201448
Paper id 27201448
IJRAT
IRJET- Key Exchange Privacy Preserving Technique in Cloud Computing
IRJET- Key Exchange Privacy Preserving Technique in Cloud Computing
IRJET Journal
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...
IJCI JOURNAL
IRJET- Secure Data Protection in Cloud Computing
IRJET- Secure Data Protection in Cloud Computing
IRJET Journal
Crypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT Data
IRJET Journal
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
IRJET Journal
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET Journal
Br36413417
Br36413417
IJERA Editor
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
IJSRED
Systematic Review Automation in Cyber Security
Systematic Review Automation in Cyber Security
YogeshIJTSRD
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET Journal
C017421624
C017421624
IOSR Journals
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET Journal
What's hot
(20)
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
www.ijerd.com
www.ijerd.com
Automated diagnosis of attacks in internet of things using machine learning a...
Automated diagnosis of attacks in internet of things using machine learning a...
A novel cloud storage system with support of sensitive data application
A novel cloud storage system with support of sensitive data application
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
Paper id 27201448
Paper id 27201448
IRJET- Key Exchange Privacy Preserving Technique in Cloud Computing
IRJET- Key Exchange Privacy Preserving Technique in Cloud Computing
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...
IRJET- Secure Data Protection in Cloud Computing
IRJET- Secure Data Protection in Cloud Computing
Crypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT Data
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
Br36413417
Br36413417
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
Systematic Review Automation in Cyber Security
Systematic Review Automation in Cyber Security
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
C017421624
C017421624
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
Similar to IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storage through 3DES Algorithm
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET Journal
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud Computing
IRJET Journal
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET Journal
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET Journal
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
IRJET Journal
Protection of data using linear programming and fhe technique in cloud computing
Protection of data using linear programming and fhe technique in cloud computing
IAEME Publication
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET Journal
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET Journal
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET Journal
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key Exposure
IRJET Journal
Proposed system for data security in distributed computing in using triple d...
Proposed system for data security in distributed computing in using triple d...
IJECEIAES
Data Division in Cloud for Secured Data Storage using RSA Algorithm
Data Division in Cloud for Secured Data Storage using RSA Algorithm
IRJET Journal
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Editor IJMTER
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions.
IJCERT JOURNAL
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
IJERA Editor
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
AIRCC Publishing Corporation
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
AIRCC Publishing Corporation
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
ijcsit
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET Journal
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET Journal
Similar to IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storage through 3DES Algorithm
(20)
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud Computing
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
Protection of data using linear programming and fhe technique in cloud computing
Protection of data using linear programming and fhe technique in cloud computing
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key Exposure
Proposed system for data security in distributed computing in using triple d...
Proposed system for data security in distributed computing in using triple d...
Data Division in Cloud for Secured Data Storage using RSA Algorithm
Data Division in Cloud for Secured Data Storage using RSA Algorithm
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions.
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
Soham Mondal
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
srsj9000
Internship report on mechanical engineering
Internship report on mechanical engineering
malavadedarshan25
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
Suhani Kapoor
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
DeepakSakkari2
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
roselinkalist12
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
eptoze12
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
britheesh05
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
hassan khalil
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
KartikeyaDwivedi3
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
DeelipZope
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
wendy cai
Past, Present and Future of Generative AI
Past, Present and Future of Generative AI
abhishek36461
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
asadnawaz62
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
NikhilNagaraju
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
PoojaBan
power system scada applications and uses
power system scada applications and uses
DevarapalliHaritha
Recently uploaded
(20)
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Internship report on mechanical engineering
Internship report on mechanical engineering
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
Past, Present and Future of Generative AI
Past, Present and Future of Generative AI
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
power system scada applications and uses
power system scada applications and uses
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storage through 3DES Algorithm
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4804 An Implementation of Secured Data Integrity Technique for Cloud Storage through 3DES Algorithm Ms Amrita Nagda1, Mr Nikhil Karale2, Dr S.S. Dhande3 1M.E II yr, DRGITR, SGBAU University, Amravati, Maharashtra, India. 2Assistant Professor, DRGITR, SGBAU University, Amravati, Maharashtra, India. 3HOD,Dept of Computer Science & Engineering, SIPNA College, SGBAU University, Amravati, Maharashtra , India. ----------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Cloud Computing is a set of IT Services, for example network, software system, storage, hardware, software, and resources and these services are provided to a customer over a network. The IT services of Cloud Computing are delivered by third party provider who owns the infrastructure. Benefits of cloudstorageareeasyaccessmeans access to your knowledge anyplace, anyhow, anytime, scalability, resilience, cost efficiency, and highreliabilityofthe data. Because of these benefits each and every organization is moving its data to the cloud, means it uses the storage service provided by the cloud provider. So there is a need to protect that data against unauthorized access, modification or denial of services etc. To secure the Cloud means secure the treatments (calculations) and storage (databases hosted by the Cloud provider).In this project, we have proposed to make use of 3DES algorithm which is a well-known symmetric cryptosystem and is widely used for secure data transmission, along with that we will blend it with Random Key Generator and Graphical Password to add an extra security measure. This proposed architecture of three way mechanism and the use of symmetric method of encryption make it tough for hackers to crack the security system, thereby protecting data stored in cloud. This Cipher Block chaining system is to be secure for clients and server. The security architecture of the system is designed by using DES cipher block chaining, which eliminates the fraud that occurs today with stolen data. There is no danger of any data sent within the system being intercepted, and replaced. The system with encryption is acceptably secure, but that the level of encryption has to be stepped up, as computing power increases. Results in order to be secure the system the communication between modules is encrypted using symmetric key. Key Words: Cloud, Cloud Security, Cryptosystem, 3DES, Random Key Generator, Block Cipher Chaining, Symmetric Techniques. 1. INTRODUCTION Cloud computing is an emerging computing technology that uses the internet and central remote servers to maintain data and applications. Basically cloud computing is the idea of accessing files, software and computing services through the Internet instead of on our personal computer. The primary benefits of Cloud Computing are the ability to create, update and store your files through any computer that has access to the Web. It has the ability to rent a virtual server, load software on it, turn cloud services on and off at will, or clone it ten times to meet a sudden workload demands. It can be storingandsecuringimmenseamountsof data that is only accessible by authorized applications and user. Cloud computing has the ability to use applications on the Internet that store and protect data while providing a service. Cloud Computing moves the application software and databases to the large data centres, where the management of the data and services may not be fully trustworthy. This unique attribute, however, poses many new security challenges which have not been well understood. In this project, we focus on cloud data storage,encryptionofdata as well as security of the data, which has always been an important aspect of quality of service 1.1 CLOUD WITH CRYPTOGRAPHY Whenever we save our valuable information on our phones and desktops or on our notebooks, we always get worried about the security of data. .The main aim of ours is to save that information from the third party vendor or from the Unauthorized user. So security is the major concern which we have to keep in our mind. This is the biggest issue of today’s world. To save our data on the cloud we use various techniques and cryptography is one of them. We use various cryptography algorithms to keep our data more securefrom the unauthorized access.Wheneverwehavetosendourdata from one network to another network over the internet, there are so many possibilities to get our data leaked by the third party. So while sending our data to the destination from the source we simply perform two operations the first one is encryption and another one is decryption. Encryption is also used to protect our data and plays a vital role for the security of data. Encryption can be defined as a technique of securing our data from the intruders in which a plain text is converted into the cipher text and cannot be readable by them.
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4805 Fig -1: Cryptography In cryptography, there are many algorithms which are used for the security of data. Cryptography can be basically divided into two parts. One of them is symmetric cryptography and an other one is asymmetric cryptography. In symmetric cryptography we only use one key for both encryption and decryption process. The algorithms used in symmetric key cryptography are AES, DES, and3DES.Onthe other hand asymmetric key cryptography we use two keys one for he encryption and one for the decryptionprocess. By using the asymmetric cryptography we can provide the authentication and nonrepudiation.The algorithms used in asymmetric key cryptography are RSA and Elliptic Curve Cryptography. 1.2 3DES Sample 3DES is developed by IBM in 1978. It is the successor of DES algorithm which uses 168 bitskeysize.The key size of 3DES algorithm is 3 times bigger thanthekeysize of DES algorithm i.e., (3*56 bits) and the block size of 3DES algorithm is 64 bits. 48 rounds are used in 3DES algorithm for the encryption process. There are three mainstepsare in the 3DES algorithm and which are as follows: 1.1 Encryption process is done with a key K1. 1.2 Decryption process is done with a key K2. 1.3 Encryption process is done with a key K1. Fig -2: Steps in 3DES Algorithm 2. RELATED WORK Juels et al. [1] described a formal ―proof of retrievability‖ (POR) model for ensuring the remote data integrity. Their scheme combines spot-checking and error-correcting code to ensure both possession and retrievability of files on archive service systems. Shacham et al. [2] built on this model and constructed a random linear function based homomorphic authenticator which enables unlimited number of queries and requires less communication overhead. Bowers et al. [3] proposed an improved framework for POR protocolsthatgeneralizesbothJuels and Shacham’s work. Later in their subsequent work, Bowers et al. [4] extended POR model to distributed systems.However, all these schemes are focusing on static data. The effectiveness of their schemes rests primarily on the preprocessing steps that the user conducts before outsourcing the data file F. Any change to the contents of Feven few bits, must propagate throughthe error-correcting code, thus introducing significant computation and communication complexity. Ateniese et al. [5] defined the ―provable data possession‖ (PDP) model for ensuring possession of file on entrusted storages. Their scheme utilized public key based homo-morphictagsforauditingthe data file, thus providing public verifiability. However, their scheme requiressufficientcomputationoverheadthatcan be expensive for an entire file. In their subsequent work, Ateniese et al. [6] described a PDP scheme that uses only symmetric key cryptography. This method has lower- overhead than their previous scheme and allows for block updates, deletions and appends to the stored file, which has also been supported in our work. However, their scheme focuses on single server scenario and doesnotaddresssmall data corruptions, leaving both the distributed scenario and data error recovery issue unexplored. Curtmola et al. 3. PROPOSED METHODOLOGY Proposed trusted computing system model is categorized in two parts. First part describes the functions that can be performed on cloud for storage and management of files and the other part describes thesecurityalgorithmappliedonthe cloud to make it secure. Cryptography is the practice and study of techniques for secure communication in the presence of third parties. Modern cryptography is heavily based on mathematical theory and computer science practice; cryptographic algorithms are designed around computational hardness assumptions, making such algorithms hard to break in practice by any adversary. It is theoreticallypossibletobreak such a system but it is infeasible to do so by any known practical means. These schemes are therefore termed computationally secure; theoretical advances A.HardwareandSoftwareRequirementsforDevelopment 1.Minimum 1Gz dual core AMD BRAZO CPU or Equivalent. 2. Minimum 50 GB storage space on Hard Disk for User Storage. 3. 4 GB DDR3 RAM or Above
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4806 4. Integrated Network Adapter 5. High Speed LAN Cable 6. Windows 7 Professional or Above 7. Visual Studio 2010 8. MySQL v5.5.3 9. ODBC Connector v5.5.3 10. Heidi SQL 11. IIS Management Server 12. Microsoft Dot-Net Framework v4.0 or above 4. ACTUAL IMPLEMENTATION We have developed a cloud storage system where a user would first have to register him on the cloud by creating an Fig- 3 : flowchart and working of project account. We have made use of symmetric key encryption for data, and for authentication of the user we make use of the technique of 2-step verification which will containGraphical password in its second step. We use the front-end as C# language to create the application while we use MySQL as back-end technique to handle the technique of data storage. We have designed the prototype model which has the desired features which we had earlier mentioned in our objectives of 2 stepverification process of using a alphanumerical password in the initial stage and graphical password in the next stage for the authentication of the user. Due to the time constraints we have managed to implement encryption algorithm on textual content only. However it is feasible to encrypt images, audio video in future. The designed prototype will be subjected tothreewell know globally used penetration testing tools viz. KBG Key-Logger, Dark Comet-RAT, High Ion Orbit Canon. The analysis will be consisting of series of test to verify the security level to which the password can be obtained using tools. We can say that the project appears as per planned however the prototype designed gives the glimpse of the implementation of our objectives. The two step verification process provides an addedlayerofauthenticationoftheuser by asking him to perform two task of writing password and choosing appropriate images.Using3DESalgorithm wehave successfully encrypted the .txt files while other multimedia files are safeguarded by key generation policy. Also the generated key being sent on the users email id only registered users of that email id can access the key. 1) KBG Key logger Output: Given below are the screenshots of the KGB Key logger software which was tested on our project. As shown in the screen shot the first level of password which consists of alphanumeric characters is captured by the software however, it failed to capture the next level of authentication which is graphical password. This result ensured that the KBG Key logger was unable to crack the authentication procedure of our project completely.
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4807 Fig-4 : Snapshot of the software tested KGB Key logger 2) 4.7.2 Dark Comet (R.A.T) To verify that the KBG Key logger output were verified we made use of anotherfamousTrojanGenerationtoolknownas the Dark Comet which is the Remote Administration Tool (R.A.T). The Key logger failedtologthegraphicalpasswordof the project. Fig-5:Snapshot of the software tested Dark Comet Key logger However our project failed to provide security if a client has already been affected with a Trojan which has the feature of remote viewing the desktop activity. In such a scenario the graphical password can be viewed of the section of the password made. 5. CONCLUSIONS The developed project achieved the goals of authentication and providing security on cloud storage since during our analysis the tools failed to identify the graphical password thus failing to proceed further in our project. Also we achieved data encryption during the storing of the textual data files. This ensured that the contenttobesafeandsecure during a scenario of breach-of-data. This concludes us in saying that the goals that were set during the development of the projecthave beenachieved as desired and the project is ready for large scale implementation or for commercialization. REFERENCES [1] A. Juels and J. Burton S. Kaliski, ―PORs: Proofs of Retrievability for Large Files,‖ Proc. of CCS ’07, pp. 584–597, 2007. [2] H. Shacham and B. Waters, ―Compact Proofs of Retrievability,‖ Proc. of Asiacrypt ’08, Dec. 2008. [3] K. D. Bowers, A. Juels, and A. Oprea, ―Proofs of Retrievability: Theory and implementation,‖ Cryptology ePrint Archive, Report 2008/175, 2008, http://eprint.iacr.org/. [4] K. D. Bowers, A. Juels, and A. Oprea, ―HAIL: A High- Availability and Integrity Layer for Cloud Storage,‖ Cryptology ePrint Archive, Report 2008/489, 2008, http://eprint.iacr.org/. [5] G. Ateniese, R. Burns, R. Curtmola, J. Herring,L.Kissner,Z. Peterson, and D. Song, ―Provable Data Possession at Untrusted Stores,‖ Proc. Of CCS ’07, pp. 598–609, 2007 [6] G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik, ―Scalable and Efficient Provable Data Possession,‖ Proc. of SecureComm ’08, pp. 1 [7] Mrunalini Motilal Shete, Pragati Damodar Hipparkar, "Data Secure in Cloud Computing Using Encryption Algorithms ",International Journal of Science and research (IJSR), Volume 4 Issue 3, pp- 1497-1499, March 2015. [8]. Rohit Bore, Dr. Rahila Sheikh, "International Journal of Computer Science and Network", Volume 5, pp-171-176, February 2016. [9]. Dr. S. S. Manikandasaran, "Security Attacks and Cryptography Solutions for Data Stored in Public Cloud Storage",International Journal of Computer Science and
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4808 Information Technology & Security (IJCSITS),Vol.6,pp-498- 503, Jan-Feb 2016. [10]. Shaunak S.Ganorkar:” An InformationSecurityScheme for Cloud based Environment using 3DES Encryption Algorithm”, International Journal of Recent Development in Engineering and Technology (ijrdet) (ISSN 2347 – 6435) (Online) Volume 2, Issue 4, April 2014
Download now