SlideShare a Scribd company logo
INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056
VOLUME: 07 ISSUE: 03 | MAR 2020 WWW.IRJET.NET P-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 5214
Multi-Key Privacy in Cloud Computing
Ankit Shetty1, Rachana Vannal2, Uzair Pawaskar3, K. Suresh Babu4
1,2,3BE Student, Department of Information Technology, MES Pillai College of Engineering , Navi Mumbai, India
4Assistant Professor, Department of Information Technology, MES Pillai College of Engineering, Navi Mumbai, India
----------------------------------------------------------------------------***--------------------------------------------------------------------------
Abstract— The project helps to have a secure data exchange
to and from the cloud through and android application.
Integrated cryptographic techniques such as Advanced
Encryption Standard (AES), Rivest–Shamir–Adleman (RSA),
and Hash-based Message Authentication Code (HMAC) are
used to encrypt the data. Android as a User Interface and
Firebase cloud services are used to store data on the cloud.
Keywords— Cloud Computing, Android, AES, RSA, HMAC.
1. INTRODUCTION
The proposed system helps users to find information by
providing an easy login into the system to upload the files in
the device/ retrieve the uploaded files. The data files in the
cloud would be first encrypted using encryption algorithms
i.e. security algorithms and then be stored on the cloud. The
user can again login into the system after a while and again
access the files by decrypting the selected files i.e. file of the
user’s choice. For decrypting the user will be provided with a
private security key which would help the decryption of files.
The secret key is used in order to provide the authentication,
authorization and integrity of the saved data.
1.1 TECHNIQUES USED
A. Advanced Encryption Standard (AES) Algorithm
It is one of the most common and widely used symmetric
block cipher algorithms worldwide. This algorithm has its
own particular structure to encrypt and decrypt sensitive
data and is applied in hardware and software all over the
world. It is extremely difficult for hackers to get the real data
when encrypting by AES algorithm.
Till date there is no evidence about the crack of this
algorithm. AES has the ability to deal with three different key
sizes such as AES 128, 192 and 256 bit and each of this
ciphers has 128 bit block size. The Advanced Encryption
Standard (AES) algorithm is one of the block cipher
encryption algorithms that was published by the National
Institute of Standards and technology (NIST) in 2000. The
main aim of this algorithm was to replace the DES algorithm
after some vulnerable aspects appeared.
01. Key generation
Our proposal is based mainly upon the following; a key
generator which is able to generate new keys depending
upon three parts (M1, M2 and S) and a set of operations.
Results are merged to check the size of output equal to the
size of the plain text. In case the size of the output is equal to
the size of the plain text, therefore, the merged key can be
entered as a secret key.
The below algorithm illustrates the steps of the key
generation. AES-128 bits of Encryption and Decryption We
describe in detail the rounds of Advanced Encryption
Standard (AES-128) Algorithms in order to encrypt files or
documents and each round consist of four sub-processes as
follows.
Procedure: Encryption and Decryption
a. Sub Bytes:
Byte Substitution is a nonlinear byte substitution that
operates independently on each byte by looking up on a fixed
table is called (S-box) and the result of the 16 input bytes is a
matrix of as well as four columns as well as four rows.
b. Shift Rows:
It is shifted to the left for each of the four rows of the matrix
and transformation operates on the rows, it cyclically shifts
on bytes in each row and bytes that fall off of the row are
reinserted on the right side of the same row. The shift is
carried out as follows:
● Unchanged of The first row.
● Shifted one byte (one position) to the left of the
second row.
INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056
VOLUME: 07 ISSUE: 03 | MAR 2020 WWW.IRJET.NET P-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 5215
● Shifted two byte (two positions) to the left of the
third row.
● Shifted three byte (three positions) to the left of the
fourth row.
● The output is a novel matrix containing the same
byte but shifted.
c. Mix Columns:
Mix Columns is the transformed process of all the columns
that contain four bytes by means of certain mathematical
functions. Such a function takes for each column four bytes
as input and the result is four totally novel bytes, and novel
bytes is replace with original bytes .The result is a novel
matrix containing 16 new bytes. This step is not executed in
the final round.
d. Add round key:
In this Add Round Key operation which executed (XOR)
operation to the 128 bits of the round key. If this is the final
round then the result is encrypted documents or files.
Executed XOR operations on results from mix column and
round keys. For AES 128,128 bit XOR operations are
executed. Otherwise, the resulting 128 bits are interpreted as
16 bytes and then we begin another similar round.
Fig 1. AES ALGORITHM.
The above figure depicts the process of AES Algorithm with
the elements involved in the process and the rounds needed
in the algorithm.
B. RSA (Rivest–Shamir–Adleman) Algorithm
It is one of the first public-key cryptosystems and is
widely used for secure data transmission. In such a
cryptosystem, the encryption key is public and it is different
from the decryption key which is kept secret (private). In
RSA, this asymmetry is based on the practical difficulty of the
factorization of the product of two large prime numbers, the
"factoring problem". The acronym RSA is made of the initial
letters of the surnames of Ron Rivest, Adi Shamir, and
Leonard Adleman, who first publicly described the algorithm
in 1977.
Fig 2. RSA ENCRYPTION PROCESS OF A TEXT.
● Key Generation:
The keys for the RSA algorithm are generated in the
following way:
1. Choose two distinct prime numbers a and b.
○ For security purposes, the
integers a and b should be
chosen at random, and should
be similar in magnitude but
differ in length by a few digits
to make factoring harder. Prime
integers can be efficiently found
using a primality test.
○ a and b are kept secret.
2. Compute n = ab.
○ n is used as the modulus for
both the public and private
keys. Its length, usually
expressed in bits, is the key
length.
○ n is released as part of the
public key.
3. Compute λ(n), where λ is Carmichael's
totient function. Since n = ab, λ(n) =
lcm(λ(a),λ(b)), and since a and b are prime,
INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056
VOLUME: 07 ISSUE: 03 | MAR 2020 WWW.IRJET.NET P-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 5216
λ(a) = φ(a) = a − 1 and likewise λ(a) = b − 1.
Hence λ(n) = lcm(a − 1, b − 1).
○ λ(n) is kept secret.
4. Choose an integer e such that 1 < e < λ(n)
and gcd(e, λ(n)) = 1; that is, e and λ(n) are
coprime.
○ e having a short bit-length and
small Hamming weight results
in more efficient encryption –
the most commonly chosen
value for e is 216 + 1 = 65,537.
The smallest (and fastest)
possible value for e is 3, but
such a small value for e has
been shown to be less secure in
some settings.
○ e is released as part of the
public key.
5. Determine d as d ≡ e−1 (mod λ(n)); that is, d
is the modular multiplicative inverse of e
modulo λ(n).
○ This means: solve for d the
equation d⋅e ≡ 1 (mod λ(n)). d
can be computed efficiently by
using the Extended Euclidean
algorithm.
d is kept secret as the private key exponent.
Fig 3. RSA PROCESS
C. Hash-Based Message Authentication Code (HMAC)
Algorithm
In cryptography, an HMAC (sometimes expanded as either
keyed-hash message authentication code or hash-based
message authentication code) is a specific type of message
authentication code (MAC) involving a cryptographic hash
function and a secret cryptographic key. It may be used to
simultaneously verify both the data integrity and the
authenticity of a given message, as with any MAC. Any
cryptographic hash function, such as SHA-256 or SHA-3, may
be used in the calculation of an HMAC; the resulting MAC
algorithm is termed HMAC-X, where X is the hash function
used (e.g. HMAC-SHA256 or HMAC-SHA3).
The cryptographic strength of the HMAC depends upon the
cryptographic strength of the underlying hash function, the
size of its hash output, and the size and quality of the key.
HMAC does not encrypt the message. Instead, the message
(encrypted or not) must be sent alongside the HMAC hash.
Parties with the secret key will hash the message again
themselves, and if it is authentic, the received and computed
hashes will match.
Fig 4. HMAC CONSTRUCT DIAGRAM
2. PROPOSED SYSTEM:
2.1 General Description of The Application
PGPR-RootExplorer application is an application that applies
the concept of digital signatures using RSA and SHA-256
algorithms and AES-256 block cipher algorithm for the
encryption process.
INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056
VOLUME: 07 ISSUE: 03 | MAR 2020 WWW.IRJET.NET P-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 5217
Fig 5. BLOCK DIAGRAM
The application is implemented in Android Java
programming that guarantees the integrity, confidentiality,
authentication and non-repudiation. Java language is used
because it is more mobile, object-oriented, portable, and
open source. It has two schemes which are the protection
scheme and verification scheme. The protection step is on
the 4 digit passcode to open the application and
ENCRYPTION and the DECRYPTION process is on the main
page.
The details of the two processes are of the following:
1 .Signing and Passcode: On the protection schemes , two
processes are running: the securing process (encryption)
and the authenticating process (signing). The generation of
the private key and the public key is done before the
encryption and signing process is executed. The scheme of
securing and authenticating documents is done in a simple
manner following the scheme in Fig. 6 & 7.
2) Encryption Data: The encryption process is done by
selecting the data which we want to encrypt and then add a
key to it. (see Fig. 11). The file is firstly encrypted using a key
that has been used previously in the encryption process.
After this process, the file is hashed and then digital
signature calculations using a public key that has been
generated and stored in the protection stage is performed.
The verification process is the process of calculating the
digital signature value of the hashed document using the
public key. If appropriate, it will display a notification that
the document is successfully decrypted and proven to be
authentic. If it does not match, the notification will show that
the document was not authentic or has been a change.
2.2 Implementation of PGP-RootExplorer
The implementation of File Encryption includes steps using
PGP application. The steps in the implementation of PGP
application are as follows:
1) Login process: When the user runs the application, a
welcome message will appear to start logging the process.
Then the user needs to fill the USERNAME and PASSWORD
fields. By pressing the LET’S GO button, the login process
begins.
Fig 6. LOGIN PROCESS
Fig 7. LOGIN PAGE
INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056
VOLUME: 07 ISSUE: 03 | MAR 2020 WWW.IRJET.NET P-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 5218
2) Main Screen Contents: When the user successfully logs
into the application all the contents available in the device
will be shown similar to the file manager, the user just needs
to select the files which are going to be encrypted or
decrypted once this is done.
Fig 8. FILES ON THE DEVICE
Fig 9. MAIN SCREEN CONTENTS
3) Set the Key: Once the files have been selected the
password key will be given to the user and that key will be
used to encrypt every file even after a wholesome amount of
time. Once the key is set the data will be encrypted using that
key and the same key can be used for the decryption process
too.
Fig 10. KEY DETAILS
4) Upload data to cloud: Uploading files to cloud will give a
data backup solution to the user if something goes sideways.
Fig 11. ENCRYPT, DECRYPT AND UPLOAD OPTIONS
INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056
VOLUME: 07 ISSUE: 03 | MAR 2020 WWW.IRJET.NET P-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 5219
Fig 12. DATA UPLOADED TO FIREBASE
The project uses Firebase as a cloud storage platform as it is convenient to use for android based projects. It has a user friendly
interface and is supported by Google Cloud, Firebase Storage offers you almost endless storage space for storing your data.
2.3 Actors Present in Proposed system:
1) User: The user will be the person who uses this application to encrypt data or send Encrypted data via the main
process.
2) Database: To store or retrieve files that are Encrypted or decrypted
3) Cloud: To securely save a backup of the files.
4) Receiver: The person who will receive Encrypted files and key and will decrypt by doing the same process.
The design is made user-friendly so that any person who is not a developer can use this application.
3. ACKNOWLEDGMENT
We would especially like to thank our Guide Prof. K. Suresh Babu who encouraged us as well as helped us in various activities.
We give a special gratitude to our H.O.D of Information Technology Department Dr. Satish Kumar L. Varma for this opportunity
and motivate us to do innovative things that will be beneficial for our future.
We are thankful to all those who provided us with the opportunity to complete this project. We would like to thank our
Principal Dr. Sandeep Joshi who always encouraged us and motivated us.
4. CONCLUSION
In this project a combination of two types of encryption algorithms and one authentication algorithm has been used in order to
build a high security system. Using all the three algorithms in the android application one can use this system as a secure
gateway for storing and sharing files through cloud or using local storage. This system uses these three algorithms to perfectly
utilize each other’s advantages to counteract their own weaknesses.
INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056
VOLUME: 07 ISSUE: 03 | MAR 2020 WWW.IRJET.NET P-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 5220
5. References
1. Harba Eman Salim Ibrahim, "Secure Data Encryption by Combination AES, RSA and HMAC", 2018
2. Faheem Gul, Aaqib Amin, and Suhail Ashraf, "Enhancement of cloud computing security with secure data storage using
AES" , July 2017
3. Khnd Sri Sandhya, K. Venkat Rao,”Privacy-Preserving and Dynamic Multikey Generation over Encrypted Cloud
Data”,October 2016
4. Pathak Namita N, and Meghana Nagori, "Enhanced security for multi cloud storage using AES algorithm", 2015
5. Preetha M, and M. Nithya, "A study and Performance Analysis of RSA Algorithm." June 2013

More Related Content

What's hot

dld 01-introduction
dld 01-introductiondld 01-introduction
dld 01-introduction
United International University
 
FPGA Based Implementation of AES Encryption and Decryption with Low Power Mul...
FPGA Based Implementation of AES Encryption and Decryption with Low Power Mul...FPGA Based Implementation of AES Encryption and Decryption with Low Power Mul...
FPGA Based Implementation of AES Encryption and Decryption with Low Power Mul...
IOSRJECE
 
DEL-244Chep i
DEL-244Chep iDEL-244Chep i
DEL-244Chep i
Bala Ganesh
 
Chapter 2 ee202 boolean part a
Chapter 2 ee202 boolean part aChapter 2 ee202 boolean part a
Chapter 2 ee202 boolean part a
CT Sabariah Salihin
 
Digital Logic Design
Digital Logic Design Digital Logic Design
Digital Logic Design
Vaagdevi College of Engineering
 
Design and Implementation A different Architectures of mixcolumn in FPGA
Design and Implementation A different Architectures of mixcolumn in FPGADesign and Implementation A different Architectures of mixcolumn in FPGA
Design and Implementation A different Architectures of mixcolumn in FPGA
VLSICS Design
 
Finding the shortest path in a graph and its visualization using C# and WPF
Finding the shortest path in a graph and its visualization using C# and WPF Finding the shortest path in a graph and its visualization using C# and WPF
Finding the shortest path in a graph and its visualization using C# and WPF
IJECEIAES
 
EFFECTIVE AES IMPLEMENTATION
 EFFECTIVE AES IMPLEMENTATION EFFECTIVE AES IMPLEMENTATION
EFFECTIVE AES IMPLEMENTATION
IAEME Publication
 
To the networks rfwkidea32 16, 32-8, 32-4, 32-2 and rfwkidea32-1, based on th...
To the networks rfwkidea32 16, 32-8, 32-4, 32-2 and rfwkidea32-1, based on th...To the networks rfwkidea32 16, 32-8, 32-4, 32-2 and rfwkidea32-1, based on th...
To the networks rfwkidea32 16, 32-8, 32-4, 32-2 and rfwkidea32-1, based on th...
ijcisjournal
 
for sbi so Ds c c++ unix rdbms sql cn os
for sbi so   Ds c c++ unix rdbms sql cn osfor sbi so   Ds c c++ unix rdbms sql cn os
for sbi so Ds c c++ unix rdbms sql cn os
alisha230390
 
RTL Verification and FPGA Implementation of 4x4 Vedic Multiplier
RTL Verification and FPGA Implementation of 4x4 Vedic MultiplierRTL Verification and FPGA Implementation of 4x4 Vedic Multiplier
RTL Verification and FPGA Implementation of 4x4 Vedic Multiplier
Mohd Esa
 
New modification on feistel DES algorithm based on multi-level keys
New modification on feistel DES algorithm based on  multi-level keys New modification on feistel DES algorithm based on  multi-level keys
New modification on feistel DES algorithm based on multi-level keys
IJECEIAES
 
FPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
FPGA Implementation of an Area Optimized Architecture for 128 bit AES AlgorithmFPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
FPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
IJERA Editor
 
Computer organiztion3
Computer organiztion3Computer organiztion3
Computer organiztion3
Umang Gupta
 
Digital logic design part1
Digital logic design part1Digital logic design part1
Digital logic design part1
Vaagdevi College of Engineering
 
Digital electronics nandhini kusuma
Digital electronics nandhini kusumaDigital electronics nandhini kusuma
Digital electronics nandhini kusuma
kusuma11
 
Sha
ShaSha
Sha
ha123
 
Combinational logic circuits by Tahir Yasin
Combinational logic circuits by Tahir YasinCombinational logic circuits by Tahir Yasin
Combinational logic circuits by Tahir Yasin
TAHIR YASIN
 
Networking notes 2
Networking notes 2Networking notes 2
Networking notes 2
Beth Bauzon
 
logic gates By ZAK
logic gates By ZAKlogic gates By ZAK
logic gates By ZAK
Tabsheer Hasan
 

What's hot (20)

dld 01-introduction
dld 01-introductiondld 01-introduction
dld 01-introduction
 
FPGA Based Implementation of AES Encryption and Decryption with Low Power Mul...
FPGA Based Implementation of AES Encryption and Decryption with Low Power Mul...FPGA Based Implementation of AES Encryption and Decryption with Low Power Mul...
FPGA Based Implementation of AES Encryption and Decryption with Low Power Mul...
 
DEL-244Chep i
DEL-244Chep iDEL-244Chep i
DEL-244Chep i
 
Chapter 2 ee202 boolean part a
Chapter 2 ee202 boolean part aChapter 2 ee202 boolean part a
Chapter 2 ee202 boolean part a
 
Digital Logic Design
Digital Logic Design Digital Logic Design
Digital Logic Design
 
Design and Implementation A different Architectures of mixcolumn in FPGA
Design and Implementation A different Architectures of mixcolumn in FPGADesign and Implementation A different Architectures of mixcolumn in FPGA
Design and Implementation A different Architectures of mixcolumn in FPGA
 
Finding the shortest path in a graph and its visualization using C# and WPF
Finding the shortest path in a graph and its visualization using C# and WPF Finding the shortest path in a graph and its visualization using C# and WPF
Finding the shortest path in a graph and its visualization using C# and WPF
 
EFFECTIVE AES IMPLEMENTATION
 EFFECTIVE AES IMPLEMENTATION EFFECTIVE AES IMPLEMENTATION
EFFECTIVE AES IMPLEMENTATION
 
To the networks rfwkidea32 16, 32-8, 32-4, 32-2 and rfwkidea32-1, based on th...
To the networks rfwkidea32 16, 32-8, 32-4, 32-2 and rfwkidea32-1, based on th...To the networks rfwkidea32 16, 32-8, 32-4, 32-2 and rfwkidea32-1, based on th...
To the networks rfwkidea32 16, 32-8, 32-4, 32-2 and rfwkidea32-1, based on th...
 
for sbi so Ds c c++ unix rdbms sql cn os
for sbi so   Ds c c++ unix rdbms sql cn osfor sbi so   Ds c c++ unix rdbms sql cn os
for sbi so Ds c c++ unix rdbms sql cn os
 
RTL Verification and FPGA Implementation of 4x4 Vedic Multiplier
RTL Verification and FPGA Implementation of 4x4 Vedic MultiplierRTL Verification and FPGA Implementation of 4x4 Vedic Multiplier
RTL Verification and FPGA Implementation of 4x4 Vedic Multiplier
 
New modification on feistel DES algorithm based on multi-level keys
New modification on feistel DES algorithm based on  multi-level keys New modification on feistel DES algorithm based on  multi-level keys
New modification on feistel DES algorithm based on multi-level keys
 
FPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
FPGA Implementation of an Area Optimized Architecture for 128 bit AES AlgorithmFPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
FPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
 
Computer organiztion3
Computer organiztion3Computer organiztion3
Computer organiztion3
 
Digital logic design part1
Digital logic design part1Digital logic design part1
Digital logic design part1
 
Digital electronics nandhini kusuma
Digital electronics nandhini kusumaDigital electronics nandhini kusuma
Digital electronics nandhini kusuma
 
Sha
ShaSha
Sha
 
Combinational logic circuits by Tahir Yasin
Combinational logic circuits by Tahir YasinCombinational logic circuits by Tahir Yasin
Combinational logic circuits by Tahir Yasin
 
Networking notes 2
Networking notes 2Networking notes 2
Networking notes 2
 
logic gates By ZAK
logic gates By ZAKlogic gates By ZAK
logic gates By ZAK
 

Similar to IRJET - Multi-Key Privacy in Cloud Computing

IRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
IRJET- Implementation of AES Algorithm in Arduino Mega2560 BoardIRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
IRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
IRJET Journal
 
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG DesignAn Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
IRJET Journal
 
A03530107
A03530107A03530107
IRJET - Enhancement in AES Algorithm
IRJET - Enhancement in AES AlgorithmIRJET - Enhancement in AES Algorithm
IRJET - Enhancement in AES Algorithm
IRJET Journal
 
Design of area optimized aes encryption core using pipelining technology
Design of area optimized aes encryption core using pipelining technologyDesign of area optimized aes encryption core using pipelining technology
Design of area optimized aes encryption core using pipelining technology
IAEME Publication
 
Design And Implementation Of Tiny Encryption Algorithm
Design And Implementation Of Tiny Encryption AlgorithmDesign And Implementation Of Tiny Encryption Algorithm
Design And Implementation Of Tiny Encryption Algorithm
IJERA Editor
 
Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...
Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...
Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...
IJMTST Journal
 
Analysis of symmetric key cryptographic algorithms
Analysis of symmetric key cryptographic algorithmsAnalysis of symmetric key cryptographic algorithms
Analysis of symmetric key cryptographic algorithms
IRJET Journal
 
An Efficient VLSI Architecture for AES and It's FPGA Implementation
An Efficient VLSI Architecture for AES and It's FPGA ImplementationAn Efficient VLSI Architecture for AES and It's FPGA Implementation
An Efficient VLSI Architecture for AES and It's FPGA Implementation
IRJET Journal
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
Aes
AesAes
Implementation of Fast Pipelined AES Algorithm on Xilinx FPGA
Implementation of Fast Pipelined AES Algorithm on Xilinx FPGAImplementation of Fast Pipelined AES Algorithm on Xilinx FPGA
Implementation of Fast Pipelined AES Algorithm on Xilinx FPGA
International Journal of Science and Research (IJSR)
 
Js2517181724
Js2517181724Js2517181724
Js2517181724
IJERA Editor
 
Js2517181724
Js2517181724Js2517181724
Js2517181724
IJERA Editor
 
icwet1097
icwet1097icwet1097
icwet1097
Sapna Agarwal
 
Arm recognition encryption by using aes algorithm
Arm recognition    encryption by using aes algorithmArm recognition    encryption by using aes algorithm
Arm recognition encryption by using aes algorithm
eSAT Journals
 
IRJET- A Review on Various Secured Data Encryption Models based on AES Standard
IRJET- A Review on Various Secured Data Encryption Models based on AES StandardIRJET- A Review on Various Secured Data Encryption Models based on AES Standard
IRJET- A Review on Various Secured Data Encryption Models based on AES Standard
IRJET Journal
 
Secure Text Transfer Using Diffie-Hellman Key Exchange Based On Cloud
Secure Text Transfer Using Diffie-Hellman Key Exchange Based On CloudSecure Text Transfer Using Diffie-Hellman Key Exchange Based On Cloud
Secure Text Transfer Using Diffie-Hellman Key Exchange Based On Cloud
IRJET Journal
 
IMPLEMENTATION OF DNA CRYPTOGRAPHY IN CLOUD COMPUTING AND.pptx
IMPLEMENTATION OF DNA CRYPTOGRAPHY IN CLOUD COMPUTING AND.pptxIMPLEMENTATION OF DNA CRYPTOGRAPHY IN CLOUD COMPUTING AND.pptx
IMPLEMENTATION OF DNA CRYPTOGRAPHY IN CLOUD COMPUTING AND.pptx
DeepikaShivam
 
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
IRJET Journal
 

Similar to IRJET - Multi-Key Privacy in Cloud Computing (20)

IRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
IRJET- Implementation of AES Algorithm in Arduino Mega2560 BoardIRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
IRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
 
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG DesignAn Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
 
A03530107
A03530107A03530107
A03530107
 
IRJET - Enhancement in AES Algorithm
IRJET - Enhancement in AES AlgorithmIRJET - Enhancement in AES Algorithm
IRJET - Enhancement in AES Algorithm
 
Design of area optimized aes encryption core using pipelining technology
Design of area optimized aes encryption core using pipelining technologyDesign of area optimized aes encryption core using pipelining technology
Design of area optimized aes encryption core using pipelining technology
 
Design And Implementation Of Tiny Encryption Algorithm
Design And Implementation Of Tiny Encryption AlgorithmDesign And Implementation Of Tiny Encryption Algorithm
Design And Implementation Of Tiny Encryption Algorithm
 
Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...
Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...
Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...
 
Analysis of symmetric key cryptographic algorithms
Analysis of symmetric key cryptographic algorithmsAnalysis of symmetric key cryptographic algorithms
Analysis of symmetric key cryptographic algorithms
 
An Efficient VLSI Architecture for AES and It's FPGA Implementation
An Efficient VLSI Architecture for AES and It's FPGA ImplementationAn Efficient VLSI Architecture for AES and It's FPGA Implementation
An Efficient VLSI Architecture for AES and It's FPGA Implementation
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Aes
AesAes
Aes
 
Implementation of Fast Pipelined AES Algorithm on Xilinx FPGA
Implementation of Fast Pipelined AES Algorithm on Xilinx FPGAImplementation of Fast Pipelined AES Algorithm on Xilinx FPGA
Implementation of Fast Pipelined AES Algorithm on Xilinx FPGA
 
Js2517181724
Js2517181724Js2517181724
Js2517181724
 
Js2517181724
Js2517181724Js2517181724
Js2517181724
 
icwet1097
icwet1097icwet1097
icwet1097
 
Arm recognition encryption by using aes algorithm
Arm recognition    encryption by using aes algorithmArm recognition    encryption by using aes algorithm
Arm recognition encryption by using aes algorithm
 
IRJET- A Review on Various Secured Data Encryption Models based on AES Standard
IRJET- A Review on Various Secured Data Encryption Models based on AES StandardIRJET- A Review on Various Secured Data Encryption Models based on AES Standard
IRJET- A Review on Various Secured Data Encryption Models based on AES Standard
 
Secure Text Transfer Using Diffie-Hellman Key Exchange Based On Cloud
Secure Text Transfer Using Diffie-Hellman Key Exchange Based On CloudSecure Text Transfer Using Diffie-Hellman Key Exchange Based On Cloud
Secure Text Transfer Using Diffie-Hellman Key Exchange Based On Cloud
 
IMPLEMENTATION OF DNA CRYPTOGRAPHY IN CLOUD COMPUTING AND.pptx
IMPLEMENTATION OF DNA CRYPTOGRAPHY IN CLOUD COMPUTING AND.pptxIMPLEMENTATION OF DNA CRYPTOGRAPHY IN CLOUD COMPUTING AND.pptx
IMPLEMENTATION OF DNA CRYPTOGRAPHY IN CLOUD COMPUTING AND.pptx
 
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
JamalHussainArman
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
Exception Handling notes in java exception
Exception Handling notes in java exceptionException Handling notes in java exception
Exception Handling notes in java exception
Ratnakar Mikkili
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
digital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdfdigital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdf
drwaing
 
Wearable antenna for antenna applications
Wearable antenna for antenna applicationsWearable antenna for antenna applications
Wearable antenna for antenna applications
Madhumitha Jayaram
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
ClaraZara1
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
IJNSA Journal
 
Series of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.pptSeries of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.ppt
PauloRodrigues104553
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
rpskprasana
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
RadiNasr
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
heavyhaig
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
gestioneergodomus
 
Low power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniquesLow power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniques
nooriasukmaningtyas
 

Recently uploaded (20)

ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
Exception Handling notes in java exception
Exception Handling notes in java exceptionException Handling notes in java exception
Exception Handling notes in java exception
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
digital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdfdigital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdf
 
Wearable antenna for antenna applications
Wearable antenna for antenna applicationsWearable antenna for antenna applications
Wearable antenna for antenna applications
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
 
Series of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.pptSeries of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.ppt
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
 
Low power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniquesLow power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniques
 

IRJET - Multi-Key Privacy in Cloud Computing

  • 1. INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056 VOLUME: 07 ISSUE: 03 | MAR 2020 WWW.IRJET.NET P-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 5214 Multi-Key Privacy in Cloud Computing Ankit Shetty1, Rachana Vannal2, Uzair Pawaskar3, K. Suresh Babu4 1,2,3BE Student, Department of Information Technology, MES Pillai College of Engineering , Navi Mumbai, India 4Assistant Professor, Department of Information Technology, MES Pillai College of Engineering, Navi Mumbai, India ----------------------------------------------------------------------------***-------------------------------------------------------------------------- Abstract— The project helps to have a secure data exchange to and from the cloud through and android application. Integrated cryptographic techniques such as Advanced Encryption Standard (AES), Rivest–Shamir–Adleman (RSA), and Hash-based Message Authentication Code (HMAC) are used to encrypt the data. Android as a User Interface and Firebase cloud services are used to store data on the cloud. Keywords— Cloud Computing, Android, AES, RSA, HMAC. 1. INTRODUCTION The proposed system helps users to find information by providing an easy login into the system to upload the files in the device/ retrieve the uploaded files. The data files in the cloud would be first encrypted using encryption algorithms i.e. security algorithms and then be stored on the cloud. The user can again login into the system after a while and again access the files by decrypting the selected files i.e. file of the user’s choice. For decrypting the user will be provided with a private security key which would help the decryption of files. The secret key is used in order to provide the authentication, authorization and integrity of the saved data. 1.1 TECHNIQUES USED A. Advanced Encryption Standard (AES) Algorithm It is one of the most common and widely used symmetric block cipher algorithms worldwide. This algorithm has its own particular structure to encrypt and decrypt sensitive data and is applied in hardware and software all over the world. It is extremely difficult for hackers to get the real data when encrypting by AES algorithm. Till date there is no evidence about the crack of this algorithm. AES has the ability to deal with three different key sizes such as AES 128, 192 and 256 bit and each of this ciphers has 128 bit block size. The Advanced Encryption Standard (AES) algorithm is one of the block cipher encryption algorithms that was published by the National Institute of Standards and technology (NIST) in 2000. The main aim of this algorithm was to replace the DES algorithm after some vulnerable aspects appeared. 01. Key generation Our proposal is based mainly upon the following; a key generator which is able to generate new keys depending upon three parts (M1, M2 and S) and a set of operations. Results are merged to check the size of output equal to the size of the plain text. In case the size of the output is equal to the size of the plain text, therefore, the merged key can be entered as a secret key. The below algorithm illustrates the steps of the key generation. AES-128 bits of Encryption and Decryption We describe in detail the rounds of Advanced Encryption Standard (AES-128) Algorithms in order to encrypt files or documents and each round consist of four sub-processes as follows. Procedure: Encryption and Decryption a. Sub Bytes: Byte Substitution is a nonlinear byte substitution that operates independently on each byte by looking up on a fixed table is called (S-box) and the result of the 16 input bytes is a matrix of as well as four columns as well as four rows. b. Shift Rows: It is shifted to the left for each of the four rows of the matrix and transformation operates on the rows, it cyclically shifts on bytes in each row and bytes that fall off of the row are reinserted on the right side of the same row. The shift is carried out as follows: ● Unchanged of The first row. ● Shifted one byte (one position) to the left of the second row.
  • 2. INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056 VOLUME: 07 ISSUE: 03 | MAR 2020 WWW.IRJET.NET P-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 5215 ● Shifted two byte (two positions) to the left of the third row. ● Shifted three byte (three positions) to the left of the fourth row. ● The output is a novel matrix containing the same byte but shifted. c. Mix Columns: Mix Columns is the transformed process of all the columns that contain four bytes by means of certain mathematical functions. Such a function takes for each column four bytes as input and the result is four totally novel bytes, and novel bytes is replace with original bytes .The result is a novel matrix containing 16 new bytes. This step is not executed in the final round. d. Add round key: In this Add Round Key operation which executed (XOR) operation to the 128 bits of the round key. If this is the final round then the result is encrypted documents or files. Executed XOR operations on results from mix column and round keys. For AES 128,128 bit XOR operations are executed. Otherwise, the resulting 128 bits are interpreted as 16 bytes and then we begin another similar round. Fig 1. AES ALGORITHM. The above figure depicts the process of AES Algorithm with the elements involved in the process and the rounds needed in the algorithm. B. RSA (Rivest–Shamir–Adleman) Algorithm It is one of the first public-key cryptosystems and is widely used for secure data transmission. In such a cryptosystem, the encryption key is public and it is different from the decryption key which is kept secret (private). In RSA, this asymmetry is based on the practical difficulty of the factorization of the product of two large prime numbers, the "factoring problem". The acronym RSA is made of the initial letters of the surnames of Ron Rivest, Adi Shamir, and Leonard Adleman, who first publicly described the algorithm in 1977. Fig 2. RSA ENCRYPTION PROCESS OF A TEXT. ● Key Generation: The keys for the RSA algorithm are generated in the following way: 1. Choose two distinct prime numbers a and b. ○ For security purposes, the integers a and b should be chosen at random, and should be similar in magnitude but differ in length by a few digits to make factoring harder. Prime integers can be efficiently found using a primality test. ○ a and b are kept secret. 2. Compute n = ab. ○ n is used as the modulus for both the public and private keys. Its length, usually expressed in bits, is the key length. ○ n is released as part of the public key. 3. Compute λ(n), where λ is Carmichael's totient function. Since n = ab, λ(n) = lcm(λ(a),λ(b)), and since a and b are prime,
  • 3. INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056 VOLUME: 07 ISSUE: 03 | MAR 2020 WWW.IRJET.NET P-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 5216 λ(a) = φ(a) = a − 1 and likewise λ(a) = b − 1. Hence λ(n) = lcm(a − 1, b − 1). ○ λ(n) is kept secret. 4. Choose an integer e such that 1 < e < λ(n) and gcd(e, λ(n)) = 1; that is, e and λ(n) are coprime. ○ e having a short bit-length and small Hamming weight results in more efficient encryption – the most commonly chosen value for e is 216 + 1 = 65,537. The smallest (and fastest) possible value for e is 3, but such a small value for e has been shown to be less secure in some settings. ○ e is released as part of the public key. 5. Determine d as d ≡ e−1 (mod λ(n)); that is, d is the modular multiplicative inverse of e modulo λ(n). ○ This means: solve for d the equation d⋅e ≡ 1 (mod λ(n)). d can be computed efficiently by using the Extended Euclidean algorithm. d is kept secret as the private key exponent. Fig 3. RSA PROCESS C. Hash-Based Message Authentication Code (HMAC) Algorithm In cryptography, an HMAC (sometimes expanded as either keyed-hash message authentication code or hash-based message authentication code) is a specific type of message authentication code (MAC) involving a cryptographic hash function and a secret cryptographic key. It may be used to simultaneously verify both the data integrity and the authenticity of a given message, as with any MAC. Any cryptographic hash function, such as SHA-256 or SHA-3, may be used in the calculation of an HMAC; the resulting MAC algorithm is termed HMAC-X, where X is the hash function used (e.g. HMAC-SHA256 or HMAC-SHA3). The cryptographic strength of the HMAC depends upon the cryptographic strength of the underlying hash function, the size of its hash output, and the size and quality of the key. HMAC does not encrypt the message. Instead, the message (encrypted or not) must be sent alongside the HMAC hash. Parties with the secret key will hash the message again themselves, and if it is authentic, the received and computed hashes will match. Fig 4. HMAC CONSTRUCT DIAGRAM 2. PROPOSED SYSTEM: 2.1 General Description of The Application PGPR-RootExplorer application is an application that applies the concept of digital signatures using RSA and SHA-256 algorithms and AES-256 block cipher algorithm for the encryption process.
  • 4. INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056 VOLUME: 07 ISSUE: 03 | MAR 2020 WWW.IRJET.NET P-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 5217 Fig 5. BLOCK DIAGRAM The application is implemented in Android Java programming that guarantees the integrity, confidentiality, authentication and non-repudiation. Java language is used because it is more mobile, object-oriented, portable, and open source. It has two schemes which are the protection scheme and verification scheme. The protection step is on the 4 digit passcode to open the application and ENCRYPTION and the DECRYPTION process is on the main page. The details of the two processes are of the following: 1 .Signing and Passcode: On the protection schemes , two processes are running: the securing process (encryption) and the authenticating process (signing). The generation of the private key and the public key is done before the encryption and signing process is executed. The scheme of securing and authenticating documents is done in a simple manner following the scheme in Fig. 6 & 7. 2) Encryption Data: The encryption process is done by selecting the data which we want to encrypt and then add a key to it. (see Fig. 11). The file is firstly encrypted using a key that has been used previously in the encryption process. After this process, the file is hashed and then digital signature calculations using a public key that has been generated and stored in the protection stage is performed. The verification process is the process of calculating the digital signature value of the hashed document using the public key. If appropriate, it will display a notification that the document is successfully decrypted and proven to be authentic. If it does not match, the notification will show that the document was not authentic or has been a change. 2.2 Implementation of PGP-RootExplorer The implementation of File Encryption includes steps using PGP application. The steps in the implementation of PGP application are as follows: 1) Login process: When the user runs the application, a welcome message will appear to start logging the process. Then the user needs to fill the USERNAME and PASSWORD fields. By pressing the LET’S GO button, the login process begins. Fig 6. LOGIN PROCESS Fig 7. LOGIN PAGE
  • 5. INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056 VOLUME: 07 ISSUE: 03 | MAR 2020 WWW.IRJET.NET P-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 5218 2) Main Screen Contents: When the user successfully logs into the application all the contents available in the device will be shown similar to the file manager, the user just needs to select the files which are going to be encrypted or decrypted once this is done. Fig 8. FILES ON THE DEVICE Fig 9. MAIN SCREEN CONTENTS 3) Set the Key: Once the files have been selected the password key will be given to the user and that key will be used to encrypt every file even after a wholesome amount of time. Once the key is set the data will be encrypted using that key and the same key can be used for the decryption process too. Fig 10. KEY DETAILS 4) Upload data to cloud: Uploading files to cloud will give a data backup solution to the user if something goes sideways. Fig 11. ENCRYPT, DECRYPT AND UPLOAD OPTIONS
  • 6. INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056 VOLUME: 07 ISSUE: 03 | MAR 2020 WWW.IRJET.NET P-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 5219 Fig 12. DATA UPLOADED TO FIREBASE The project uses Firebase as a cloud storage platform as it is convenient to use for android based projects. It has a user friendly interface and is supported by Google Cloud, Firebase Storage offers you almost endless storage space for storing your data. 2.3 Actors Present in Proposed system: 1) User: The user will be the person who uses this application to encrypt data or send Encrypted data via the main process. 2) Database: To store or retrieve files that are Encrypted or decrypted 3) Cloud: To securely save a backup of the files. 4) Receiver: The person who will receive Encrypted files and key and will decrypt by doing the same process. The design is made user-friendly so that any person who is not a developer can use this application. 3. ACKNOWLEDGMENT We would especially like to thank our Guide Prof. K. Suresh Babu who encouraged us as well as helped us in various activities. We give a special gratitude to our H.O.D of Information Technology Department Dr. Satish Kumar L. Varma for this opportunity and motivate us to do innovative things that will be beneficial for our future. We are thankful to all those who provided us with the opportunity to complete this project. We would like to thank our Principal Dr. Sandeep Joshi who always encouraged us and motivated us. 4. CONCLUSION In this project a combination of two types of encryption algorithms and one authentication algorithm has been used in order to build a high security system. Using all the three algorithms in the android application one can use this system as a secure gateway for storing and sharing files through cloud or using local storage. This system uses these three algorithms to perfectly utilize each other’s advantages to counteract their own weaknesses.
  • 7. INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056 VOLUME: 07 ISSUE: 03 | MAR 2020 WWW.IRJET.NET P-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 5220 5. References 1. Harba Eman Salim Ibrahim, "Secure Data Encryption by Combination AES, RSA and HMAC", 2018 2. Faheem Gul, Aaqib Amin, and Suhail Ashraf, "Enhancement of cloud computing security with secure data storage using AES" , July 2017 3. Khnd Sri Sandhya, K. Venkat Rao,”Privacy-Preserving and Dynamic Multikey Generation over Encrypted Cloud Data”,October 2016 4. Pathak Namita N, and Meghana Nagori, "Enhanced security for multi cloud storage using AES algorithm", 2015 5. Preetha M, and M. Nithya, "A study and Performance Analysis of RSA Algorithm." June 2013