SECRY
SECURE FILE STORAGE ON CLOUD USING HYBRID CRYPTOGRAPHY
A project presentation on
PROJECT GUIDE
MRS. SOJA SALIM
ASSISTANT PROFESSOR,
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING.
SREE CHITRA THIRUNAL COLLEGE OF ENGINEERING
PROJECT TEAM
ALIN BABU (SCT15CS007)
AKSHAY P S (SCT16CS008)
RAHUL M (SCT16CS046)
2https://secrycloud.tech
Contents
3
 Introduction
 Problem Statement
 Literature Survey
 Existing System
 Proposed System
 System Architecture
 Activity Diagram & Use Case diagram
 Requirements
 ER Diagram & Database Tables
 Implementation
 Cloud Database Configuration
 Demonstration
 Conclusion
 References
https://secrycloud.tech
Introduction
 To store huge amount of data cloud computing is used now a days. We can
retrieve any data from cloud, when the user request for it.
 Many issues are faced while storing the data, the solution for these issues we
are using hybrid cryptography technique.
 In this system, we use three cryptography algorithm for providing block wise
security to the data.
 We store files as shards to different servers thus a single file is not stored at
one location.
4https://secrycloud.tech
Problem statement
In cloud the data is stored and handled by unknown servers, these servers
can be sometimes accessed by unauthorized persons thus leading to violation of
data integrity and security, and also user has no control over data when it is in cloud
in order to solve these issues we can store data in distributed manner in encrypted
format using hybrid cryptography.
5https://secrycloud.tech
Literature Survey
 IEEE WiSPNET 2016 conference paper on Secure File storage in Cloud
Computing using Hybrid Cryptography Algorithm by Punam V. Maitri and
Aruna Verma suggest the secure storage of file in cloud using hybrid
cryptography.
 The above mentioned paper proposes the way of splitting files into different parts
and then applying the hybrid cryptography for each part.
 The method uses LSB steganography method for storing keys and uses symmetric
cryptographic algorithm for encryption and decryption.
6https://secrycloud.tech
Literature Survey (Cont.)
 IEEE 2018 Fourth International Conference on Computing Communication Control and Automation on Cloud
Oriented Distributed and Encrypted File Storage (CODE-FS) by Mihir Manek, Kinjal Shah, Mehvash Khan,
Aditi Chhadwa and Manish Potey suggest the secure storage of file in distributed manner.
 The file is first encrypted and then uploaded to the server where it is divided into shards and these shards are
distributed over multiple cloud nodes.
 Each and every node contains only a single shard of a particular file of any format uploaded by user which
ensures that if any attack takes place no important data is compromised.
 The file transfer between all entities in the network will be end-to-end encrypted, thus ensuring that no entity
will get access to sensitive information.
 In this method only single algorithm is used and only after encryption the file is divided into shards and stored
7https://secrycloud.tech
Literature Survey (Cont.)
 IEEE 2018 Fourth International Conference on Computing Communication Control
and Automation on Implementation of Secure File Storage on Cloud with owner-
defined Attributes for Encryption by Ms. Supriya Kute and Prof. S. B. Javheri
proposed the method storing file with encryption and attributes defined by file owner.
 The paper proposes the method storing file along with owner defined attributes and
encryption algorithm.
 The file decrypted using the attributes defined by owner and key thus ensuring
security.
 The problem in this method was that if a user who knows the attributes can decrypt
the file easily.
8https://secrycloud.tech
Literature Survey (Cont.)
 2018 International Conference on Information, Communication, Engineering and
Technology on Attribute-Based Encryption Along with Data Performance and
Security on Cloud Storage by Ms. Snehal Rathod, S. A. Ubale and Sulabha S. Apte
proposed the method storing file with attribute based encryption.
 The paper proposes the Hybrid Encryption using Cipher-text Policy Attribute with
Verifiable Delegation method.
 The proposed system, fuse with verifiable computation such as hybrid encryption,
key generation, transformation, verify decryption, the data security and hence the
correctness of the delegated computing results are well secured at a same time.
9
https://secrycloud.tech
Existing System
 In order to store, handle and calculate numerous data, the cloud servers are being used. Large
number of applications moves on to cloud computing platforms which has to be handled.
 In existing system single algorithm is used for data encrypt and decrypt purpose. But use of
single algorithm is not accomplishable for high level security.
 If we use public key cryptography algorithm than we have to face security problem for storing
public key.
 Key transmission problem occur while sharing key into multiuser environment. Public key
cryptography algorithms accomplish high security but maximum delay is needed for data
encrypt and decrypt.
10https://secrycloud.tech
Proposed System
 In our system cloud owner upload the data on cloud server. To enhance security of file in
cloud computing source file is break into different parts.
 Every part of file is encrypted using each encryption algorithm. Encrypted file is stored
on cloud database server.
 Each part of file is stored in different cloud database server. Each and every cloud server
contains only a single part of a particular file of any format uploaded by user which
ensures that if any attack takes place no important data is compromised.
11https://secrycloud.tech
Proposed System (Cont.)
 The file transfer between all entities in the network will be end-to-end encrypted, thus
ensuring that no entity will get access to sensitive information. Moreover, the servers
storing the parts doesn’t contain any info of which part of the file is stored.
 Parts of the same file will not be stored on same server location, thus preventing the
attacker from guessing the location of other parts.
 The files that are selected for upload by the user will be encrypted at the client side
before uploading and will be decrypted after the user downloads it, with the user’s key
12https://secrycloud.tech
Proposed v/s Existing System
13
Encryption time Comparison
with
AES and Proposed System
Decryption time Comparison
with
AES and Proposed System
Encryption Time Comparison with
Blowfish and Proposed System
Decryption Time Comparison with
Blowfish and Proposed Systemhttps://secrycloud.tech
Project Objective
 Providing more secure cloud storage.
 Cost and time efficient.
 Increase data integrity and confidentiality.
 Eliminate third party access.
 Provide Authentication.
14https://secrycloud.tech
System Architecture
15https://secrycloud.tech
Splitting & Encrypting Files
16
File_Split2
Encrypt - DES
File_Split3
Encrypt – RC4
File_Split1
Encrypt - AES
File
https://secrycloud.tech
Decrypting & Merging File
17
File_Split1 File_Split2 File_Split3
Decrypt -
AES
Decrypt -
DES
Decrypt -
RC4
Merge
File
https://secrycloud.tech
Activity Diagram-Upload
18https://secrycloud.tech
Activity Diagram-Download
19https://secrycloud.tech
Use case Diagram
20https://secrycloud.tech
Requirements
 Front End – HTML ,CSS, jQuery
 Backend – Python, MySQL
 Framework – Django, Bootstrap4
 Cloud Web server – AWS EC2
 Cloud Database server – AWS RDS
21https://secrycloud.tech
Implementation Phases
22
UI
Development
Splitting &
Merging
Encryption Decryption
SteganographyDatabase
Design
Cloud
Integration
Deployment
https://secrycloud.tech
Database Tables
23
Field Type
user_id varchar(10) PK
username varchar(150)
first_name varchar(30)
last_name varchar(150)
password varchar(128)
email varchar(254)
phone bigint(20)
location varchar(30)
Field Type
file_id varchar(10) PK
file_name varchar(50)
file_size double
file_key varchar(150)
user_id
varchar(10)
FK
Field Type
store_i
d
varchar(150)
PK
content longblob
Users
File_Info
File_Storage
https://secrycloud.tech
ER Diagram
24https://secrycloud.tech
Implementation
Algorithm split()
1. Get the file.
2. Store it in a temporary location.
3. Get the size of file and divide it by three.
4. Call FileSplit python library and pass file location, chunk size and
destination location.
25https://secrycloud.tech
Implementation (Cont.)
 Cryptographic Algorithms
 AES - Advanced Encryption Standard
 Triple DES - Triple Data Encryption Standard
 ARC4 - Alleged Rivest Cipher 4
 Uses python Cryptography library to implement the hybrid cryptography
 Steganography techniques to store cryptographic key.
 Uses python stegano library to implement the LSB steganography technique.
26https://secrycloud.tech
Implementation (Cont.)
 Stegano library key hiding function
 Stegano library key reveal function
Algorithm join()
1. Get the file location.
2. Sort the files based on filename.
3. For each file write the contents of each file to output file.
4. Store the output file in temporary folder.
27https://secrycloud.tech
Cloud database configuration – Database 1
28
Database Location : us-east-2(Ohio)
AWS RDS configuration screenshot of database location us-east-2
https://secrycloud.tech
Cloud database configuration – Database 2
29
Database Location : us-east-1(N-Virginia)
AWS RDS configuration screenshot of database location us-east-1
https://secrycloud.tech
Cloud database configuration – Database 3
30
Database Location : eu-west-1(Ireland)
AWS RDS configuration screenshot of database location us-west-1
https://secrycloud.tech
Demonstration
31https://secrycloud.tech
https://drive.google.com/file/d/1GS1_mdcnaYZtc76CQ6RZZqt_907DT5Kd/view?usp=sharin
g
Conclusion
 Information security is the main concern of todays world.
 In order to achieve file security we proposes hybrid cryptography and storing files as
shards.
 We uses mainly three cryptographic algorithms to provide security.
 Each shard is stored in sperate database server as blob.
 Each file can be accessed using a key file which is a image that uses LSB
steganography
 In this project we only considered the text files only, in future work we can include
more file types for securely storing.
32https://secrycloud.tech
References
1. Punam V Maitri and Aruna Verma. “Secure file storage in cloud computing using hybrid cryptography
algorithm”. In 2016 International Conference on Wireless Communications, Signal Processing and
Networking (WiSPNET), pages 1635-1638. IEEE, 2016.
2. Mihir Manek, Aditi Chhadwa, Kinjal Shah, Manish Potey, and Mehvash Khan. “Cloud Oriented Distributed
and Encrypted File Storage (CODE-FS)”. In 2018 Fourth International Conference on Computing
Communication Control and Automation (ICCUBEA),pages 1-5. IEEE, 2018.
3. Supriya Kute and SB Javheri. “Implementation of Secure File Storage on Cloud with Owner-Defined
Attributes for Encryption”. In 2018 Fourth International Conference on Computing Communication
Control and Automation (ICCUBEA), pages 1{6. IEEE, 2018.
4. Ms Snehal Rathod, SA Ubale, and Sulabha S Apte. “Attribute-Based Encryption Along with Data
Performance and Security on Cloud Storage”. In 2018 International Conference on Information,
Communication, Engineering and Technology (ICICET), pages 1-3. IEEE, 2018.
5. https://docs.djangoproject.com/en/3.0/
6. https://getbootstrap.com/docs/4.4/getting-started/introduction/
7. https://medium.com/saarthi-ai/ec2apachedjango-838e3f6014ab
8. https://github.com/ALINBABU/SECRY
33https://secrycloud.tech
34https://secrycloud.tech

SECRY - Secure file storage on cloud using hybrid cryptography

  • 1.
    SECRY SECURE FILE STORAGEON CLOUD USING HYBRID CRYPTOGRAPHY A project presentation on
  • 2.
    PROJECT GUIDE MRS. SOJASALIM ASSISTANT PROFESSOR, DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. SREE CHITRA THIRUNAL COLLEGE OF ENGINEERING PROJECT TEAM ALIN BABU (SCT15CS007) AKSHAY P S (SCT16CS008) RAHUL M (SCT16CS046) 2https://secrycloud.tech
  • 3.
    Contents 3  Introduction  ProblemStatement  Literature Survey  Existing System  Proposed System  System Architecture  Activity Diagram & Use Case diagram  Requirements  ER Diagram & Database Tables  Implementation  Cloud Database Configuration  Demonstration  Conclusion  References https://secrycloud.tech
  • 4.
    Introduction  To storehuge amount of data cloud computing is used now a days. We can retrieve any data from cloud, when the user request for it.  Many issues are faced while storing the data, the solution for these issues we are using hybrid cryptography technique.  In this system, we use three cryptography algorithm for providing block wise security to the data.  We store files as shards to different servers thus a single file is not stored at one location. 4https://secrycloud.tech
  • 5.
    Problem statement In cloudthe data is stored and handled by unknown servers, these servers can be sometimes accessed by unauthorized persons thus leading to violation of data integrity and security, and also user has no control over data when it is in cloud in order to solve these issues we can store data in distributed manner in encrypted format using hybrid cryptography. 5https://secrycloud.tech
  • 6.
    Literature Survey  IEEEWiSPNET 2016 conference paper on Secure File storage in Cloud Computing using Hybrid Cryptography Algorithm by Punam V. Maitri and Aruna Verma suggest the secure storage of file in cloud using hybrid cryptography.  The above mentioned paper proposes the way of splitting files into different parts and then applying the hybrid cryptography for each part.  The method uses LSB steganography method for storing keys and uses symmetric cryptographic algorithm for encryption and decryption. 6https://secrycloud.tech
  • 7.
    Literature Survey (Cont.) IEEE 2018 Fourth International Conference on Computing Communication Control and Automation on Cloud Oriented Distributed and Encrypted File Storage (CODE-FS) by Mihir Manek, Kinjal Shah, Mehvash Khan, Aditi Chhadwa and Manish Potey suggest the secure storage of file in distributed manner.  The file is first encrypted and then uploaded to the server where it is divided into shards and these shards are distributed over multiple cloud nodes.  Each and every node contains only a single shard of a particular file of any format uploaded by user which ensures that if any attack takes place no important data is compromised.  The file transfer between all entities in the network will be end-to-end encrypted, thus ensuring that no entity will get access to sensitive information.  In this method only single algorithm is used and only after encryption the file is divided into shards and stored 7https://secrycloud.tech
  • 8.
    Literature Survey (Cont.) IEEE 2018 Fourth International Conference on Computing Communication Control and Automation on Implementation of Secure File Storage on Cloud with owner- defined Attributes for Encryption by Ms. Supriya Kute and Prof. S. B. Javheri proposed the method storing file with encryption and attributes defined by file owner.  The paper proposes the method storing file along with owner defined attributes and encryption algorithm.  The file decrypted using the attributes defined by owner and key thus ensuring security.  The problem in this method was that if a user who knows the attributes can decrypt the file easily. 8https://secrycloud.tech
  • 9.
    Literature Survey (Cont.) 2018 International Conference on Information, Communication, Engineering and Technology on Attribute-Based Encryption Along with Data Performance and Security on Cloud Storage by Ms. Snehal Rathod, S. A. Ubale and Sulabha S. Apte proposed the method storing file with attribute based encryption.  The paper proposes the Hybrid Encryption using Cipher-text Policy Attribute with Verifiable Delegation method.  The proposed system, fuse with verifiable computation such as hybrid encryption, key generation, transformation, verify decryption, the data security and hence the correctness of the delegated computing results are well secured at a same time. 9 https://secrycloud.tech
  • 10.
    Existing System  Inorder to store, handle and calculate numerous data, the cloud servers are being used. Large number of applications moves on to cloud computing platforms which has to be handled.  In existing system single algorithm is used for data encrypt and decrypt purpose. But use of single algorithm is not accomplishable for high level security.  If we use public key cryptography algorithm than we have to face security problem for storing public key.  Key transmission problem occur while sharing key into multiuser environment. Public key cryptography algorithms accomplish high security but maximum delay is needed for data encrypt and decrypt. 10https://secrycloud.tech
  • 11.
    Proposed System  Inour system cloud owner upload the data on cloud server. To enhance security of file in cloud computing source file is break into different parts.  Every part of file is encrypted using each encryption algorithm. Encrypted file is stored on cloud database server.  Each part of file is stored in different cloud database server. Each and every cloud server contains only a single part of a particular file of any format uploaded by user which ensures that if any attack takes place no important data is compromised. 11https://secrycloud.tech
  • 12.
    Proposed System (Cont.) The file transfer between all entities in the network will be end-to-end encrypted, thus ensuring that no entity will get access to sensitive information. Moreover, the servers storing the parts doesn’t contain any info of which part of the file is stored.  Parts of the same file will not be stored on same server location, thus preventing the attacker from guessing the location of other parts.  The files that are selected for upload by the user will be encrypted at the client side before uploading and will be decrypted after the user downloads it, with the user’s key 12https://secrycloud.tech
  • 13.
    Proposed v/s ExistingSystem 13 Encryption time Comparison with AES and Proposed System Decryption time Comparison with AES and Proposed System Encryption Time Comparison with Blowfish and Proposed System Decryption Time Comparison with Blowfish and Proposed Systemhttps://secrycloud.tech
  • 14.
    Project Objective  Providingmore secure cloud storage.  Cost and time efficient.  Increase data integrity and confidentiality.  Eliminate third party access.  Provide Authentication. 14https://secrycloud.tech
  • 15.
  • 16.
    Splitting & EncryptingFiles 16 File_Split2 Encrypt - DES File_Split3 Encrypt – RC4 File_Split1 Encrypt - AES File https://secrycloud.tech
  • 17.
    Decrypting & MergingFile 17 File_Split1 File_Split2 File_Split3 Decrypt - AES Decrypt - DES Decrypt - RC4 Merge File https://secrycloud.tech
  • 18.
  • 19.
  • 20.
  • 21.
    Requirements  Front End– HTML ,CSS, jQuery  Backend – Python, MySQL  Framework – Django, Bootstrap4  Cloud Web server – AWS EC2  Cloud Database server – AWS RDS 21https://secrycloud.tech
  • 22.
    Implementation Phases 22 UI Development Splitting & Merging EncryptionDecryption SteganographyDatabase Design Cloud Integration Deployment https://secrycloud.tech
  • 23.
    Database Tables 23 Field Type user_idvarchar(10) PK username varchar(150) first_name varchar(30) last_name varchar(150) password varchar(128) email varchar(254) phone bigint(20) location varchar(30) Field Type file_id varchar(10) PK file_name varchar(50) file_size double file_key varchar(150) user_id varchar(10) FK Field Type store_i d varchar(150) PK content longblob Users File_Info File_Storage https://secrycloud.tech
  • 24.
  • 25.
    Implementation Algorithm split() 1. Getthe file. 2. Store it in a temporary location. 3. Get the size of file and divide it by three. 4. Call FileSplit python library and pass file location, chunk size and destination location. 25https://secrycloud.tech
  • 26.
    Implementation (Cont.)  CryptographicAlgorithms  AES - Advanced Encryption Standard  Triple DES - Triple Data Encryption Standard  ARC4 - Alleged Rivest Cipher 4  Uses python Cryptography library to implement the hybrid cryptography  Steganography techniques to store cryptographic key.  Uses python stegano library to implement the LSB steganography technique. 26https://secrycloud.tech
  • 27.
    Implementation (Cont.)  Steganolibrary key hiding function  Stegano library key reveal function Algorithm join() 1. Get the file location. 2. Sort the files based on filename. 3. For each file write the contents of each file to output file. 4. Store the output file in temporary folder. 27https://secrycloud.tech
  • 28.
    Cloud database configuration– Database 1 28 Database Location : us-east-2(Ohio) AWS RDS configuration screenshot of database location us-east-2 https://secrycloud.tech
  • 29.
    Cloud database configuration– Database 2 29 Database Location : us-east-1(N-Virginia) AWS RDS configuration screenshot of database location us-east-1 https://secrycloud.tech
  • 30.
    Cloud database configuration– Database 3 30 Database Location : eu-west-1(Ireland) AWS RDS configuration screenshot of database location us-west-1 https://secrycloud.tech
  • 31.
  • 32.
    Conclusion  Information securityis the main concern of todays world.  In order to achieve file security we proposes hybrid cryptography and storing files as shards.  We uses mainly three cryptographic algorithms to provide security.  Each shard is stored in sperate database server as blob.  Each file can be accessed using a key file which is a image that uses LSB steganography  In this project we only considered the text files only, in future work we can include more file types for securely storing. 32https://secrycloud.tech
  • 33.
    References 1. Punam VMaitri and Aruna Verma. “Secure file storage in cloud computing using hybrid cryptography algorithm”. In 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), pages 1635-1638. IEEE, 2016. 2. Mihir Manek, Aditi Chhadwa, Kinjal Shah, Manish Potey, and Mehvash Khan. “Cloud Oriented Distributed and Encrypted File Storage (CODE-FS)”. In 2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA),pages 1-5. IEEE, 2018. 3. Supriya Kute and SB Javheri. “Implementation of Secure File Storage on Cloud with Owner-Defined Attributes for Encryption”. In 2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA), pages 1{6. IEEE, 2018. 4. Ms Snehal Rathod, SA Ubale, and Sulabha S Apte. “Attribute-Based Encryption Along with Data Performance and Security on Cloud Storage”. In 2018 International Conference on Information, Communication, Engineering and Technology (ICICET), pages 1-3. IEEE, 2018. 5. https://docs.djangoproject.com/en/3.0/ 6. https://getbootstrap.com/docs/4.4/getting-started/introduction/ 7. https://medium.com/saarthi-ai/ec2apachedjango-838e3f6014ab 8. https://github.com/ALINBABU/SECRY 33https://secrycloud.tech
  • 34.