SlideShare a Scribd company logo
Presentation By
Rupera Priyank Anilkumar 1AM09IS052
Vineet Kumar 1AM09IS074
Ajay Kumar Yadav 1AM09IS004
Krishna Kumar 1AM06IS029
Under the Guidance of
Mrs. V . Rose Priyanka
Asst.Prof, Dept of ISE
Content
 Abstract
 Existing System
 Demerits
 Proposed System
 Architecture
 Merits
 Functional Requirements
 Non Functional Requirements
 System Design
 Screen Shots
 References
Abstract
 Implementing threshold proxy re-encryption and decentralized
erasure code.
 Distributed storage System used for distribution purpose, and it
depends on the secure storage system.
 Storage server and key server are used.
 Parameters are more flexible adjustment between
servers(storage and key).
Existing System
 General encryption scheme for storing data.
 DES algorithm is used for key generation.
 For the storage data ,user has to manage his keys .
 Single storage server for whole file.
Demerits
 Communication traffic between the user and storage servers.
 User’s device of storing the keys is lost.
 Storing and retrieving, it is hard for storage servers .
 Only one time encryption using general encryption schemes.
Proposed System
 The method of threshold proxy re-encryption.
 Decentralized erasure code method can be used for distributed
storage system.
 Distributed storage system depends on the secure cloud
storage.
 Storage server and key server those two systems used for
storage system.
 Encryption using Blowfish algorithm.
Architecture
Merits
 Data is more confidential.
 Highly protected by an security mechanism of the Server
 Easy distribution and data forwarding.
 Less Time consuming.
Functional Requirement
 Encryption
 Re-encryption
 Storage
 Decryption
Non Functional Requirement
 Privacy
 Reliability
 Scalability
 Performance
 Security
System Design
 Workflow Diagram
A workflow diagram visually represents the movement and transfer of
resources, documents, data and tasks through the entire work process for a
given product or service.
 Use case Diagram
Use case diagrams are used to describe a set of actions use cases that
some system or systems subject should or can perform in collaboration with
one or more external users of the system actors.
 Sequence Diagram
A sequence diagram is a kind of interaction diagram that shows how
processes operate with one another and in what order.
Workflow Diagram
Use Case Diagram
Sequence Diagram
Login Register Home File select
jButtonActionPerformed
Register to cloud
jButtonActionPerformed
Select file for encryption
Encryption
jButtonActionPerformed
jButtonActionPerformed
jButtonActionPerformed
Continue…
Re-encryptionSplitting
Select No. of tokens
jButtonActionPerformed
Upload file
jButtonActionPerformed
Select VM1 and VM2
Retrieve
jButtonActionPerformed
Receiving from
VM1 and VM2
Decryption
jButtonActionPerformed
Modules
 Process Encryption
 Threshold-Proxy Function
 Secure Cloud Storage
 Data Forwarding
Login and Registration
Encryption Process
// Creation of Secret key
byte key[] = "HUFEdcba".getBytes();
String k = key.toString();
SecretKeySpec secretKey = new SecretKeySpec(key, "Blowfish");
// Creation of Cipher objects
Cipher encrypt = Cipher.getInstance("Blowfish");
encrypt.init(Cipher.ENCRYPT_MODE, secretKey);
// Open the Plaintext file
cis = new CipherInputStream(fis, encrypt);
// Write to the Encrypted file
byte[] b = new byte[1024];
int i = cis.read(b);
while (i != -1) {
fos.write(b, 0, i);
i = cis.read(b); }
fos.flush();
fos.close();
cis.close();
fis.close();
String fenc = " File Encrypted ";
JOptionPane.showMessageDialog(null, fenc);
count++;
Coding
Splitting Process
Threshold Proxy Re-encryption Scheme
// Creation of Secret key
byte key[] = "abcdEFUH".getBytes();
SecretKeySpec secretKey = new
SecretKeySpec(key,"Blowfish");
// Creation of Cipher objects
Cipher encrypt = Cipher.getInstance("Blowfish");
encrypt.init(Cipher.ENCRYPT_MODE,
secretKey);
Selecting Servers For Files
Secure Cloud Storage
Server Side File Receiving
int bytesRead;
int current = 0;
ServerSocket serverSocket = null;
serverSocket = new ServerSocket(7777);
while(true) {
Socket clientSocket = null;
clientSocket = serverSocket.accept();
InputStream in = clientSocket.getInputStream();
OutputStream output = new
FileOutputStream("C:/"+filename+".zip");
byte[] buffer = new byte[1024];
while ((bytesRead = in.read(buffer)) != -1) {
output.write(buffer, 0, bytesRead);
}
Coding
try
{
Socket sock1 = new Socket("192.168.0.154", 7777);
// sendfile
File myFile = zipFile1;
System.out.println(zipFile1);
byte[] mybytearray = new byte[(int) myFile.length()];
FileInputStream fis = new FileInputStream(myFile);
BufferedInputStream bis = new BufferedInputStream(fis);
bis.read(mybytearray, 0, mybytearray.length);
OutputStream os = sock1.getOutputStream();
os.write(mybytearray, 0, mybytearray.length);
os.flush();
sock1.close();
String sen="Files are forwarded to cloud Storage server 1 !!!";
JOptionPane.showMessageDialog(null,sen);
jTextArea1.append("Sending File:"+z1);
jTextArea1.append("Files are forwarded to cloud Storage server 1 !!!");
}
catch(Exception e)
{
System.out.println("Exception : "+e);
}
Coding
File Retrieval Process
try
{
int bytesRead;
int current = 0;
ServerSocket serverSocket1 = new ServerSocket(4000);
while(true) {
Socket clientSocket = serverSocket1.accept();
InputStream in = clientSocket.getInputStream();
String op="D:/secure/server1/server1.zip";
OutputStream output = new FileOutputStream(op);
//jTextArea1.append("Received File Location from
Server1:"+output);
byte[] buffer = new byte[1024];
while ((bytesRead = in.read(buffer)) != -1) {
output.write(buffer, 0, bytesRead);
}
in.close();
output.close();
String ip2="192.168.1.2";
jTextArea1.append(" Server1 IP Address:"+ip2);
jTextArea1.append("Received File Location from Server
2:"+op);
String fr=" File can be Received from Server1.";
JOptionPane.showConfirmDialog(null,fr);
serverSocket1.close();
}
Client Sending Filename
Cipher
Cipher Cipher
try
{
Socket sock = new Socket("192.168.1.2",4000); //client IP address
jTextArea1.append("n Client IP :"+sock);
// sendfile
String fn= "D:"+reqfile1+".zip";
File myFile = new File(fn);
jTextArea1.append("n File location :"+myFile);
byte[] mybytearray = new byte[(int) myFile.length()];
jTextArea1.append("n File Length :"+mybytearray);
FileInputStream fis = new FileInputStream(myFile);
BufferedInputStream bis = new BufferedInputStream(fis);
bis.read(mybytearray, 0, mybytearray.length);
OutputStream os = sock.getOutputStream();
os.write(mybytearray, 0, mybytearray.length);
os.flush();
String sen="Files are forwarded to Client !!!";
JOptionPane.showMessageDialog(null,sen);
os.close();
sock.close();
}
Coding
Cipher
Server Sending Files to Client
try
{ Socket sock = new Socket("192.168.1.2",4000); //client IP address
jTextArea1.append("n Client IP :"+sock);
// sendfile
String fn= "D:"+reqfile1+".zip";
File myFile = new File(fn);
jTextArea1.append("n File location :"+myFile);
byte[] mybytearray = new byte[(int) myFile.length()];
jTextArea1.append("n File Length :"+mybytearray);
FileInputStream fis = new FileInputStream(myFile);
BufferedInputStream bis = new BufferedInputStream(fis);
bis.read(mybytearray, 0, mybytearray.length);
OutputStream os = sock.getOutputStream();
os.write(mybytearray, 0, mybytearray.length);
os.flush();
String sen="Files are forwarded to Client !!!";
JOptionPane.showMessageDialog(null,sen);
os.close();
sock.close();
}
catch(Exception e)
{
System.out.println("Exception : "+e);
}
Coding
try {
String sourcefile = "D:/secure/server1/server1.zip";
File sf=new File(sourcefile);
if (!sourcefile.endsWith(".zip")) {
System.out.println("Invalid file name!");
System.exit(0);
} else if (!new File(sourcefile).exists()) {
System.out.println("File not exist!");
System.exit(0);
}
ZipInputStream in =new ZipInputStream(new FileInputStream(sourcefile));
ZipFile zf = new ZipFile(sourcefile);
int a = 0;
for (Enumeration em = zf.entries(); em.hasMoreElements();) {
String targetfile = em.nextElement().toString();
ZipEntry ze = in.getNextEntry();
out = new FileOutputStream("D:/secure/EXTRACT/" + targetfile);
byte[] buf = new byte[1024];
int len;
while ((len = in.read(buf)) > 0) {
out.write(buf, 0, len);
} a = a + 1;
}
if (a > 0) {
JOptionPane.showMessageDialog(null, "Files are unzipped, click NEXT");
jTextArea1.append("nServer1 Files can be Extractedn");
jTextArea1.append("ZipFile Name:"+sf.getName()+"n");
jTextArea1.append("ZipFile size :"+sf.length()+"n");
String fol="D:/secure/EXTRACT";
File folder=new File(fol);
jTextArea1.append("n Files in the Path:n"+folder.getAbsolutePath());
}
out.close();
in.close();
}
try { String p=a;
String s11="plaintxt"+l;
String s12="des"+l;
String key1 ="AbCd124"+l;
l++;
File kkk=new File(p);
BufferedReader br=new BufferedReader(new FileReader(kkk));
jTextArea1.append("nnGiven File Name is:"+kkk.getName()+"n");
System.out.println("Given File Name is:"+kkk.getName()+"n");
jTextArea1.append("Given File size is:"+kkk.length()+"n");
System.out.println("Given File size is:"+kkk.length()+"n");
File dec= new File("D:/secure/firstDEcryption/"+s11+".txt");
FileInputStream fis = new FileInputStream(p);
FileOutputStream fos = new FileOutputStream(dec);
CipherOutputStream cos = null;
jTextArea1.append("Decrypted File Name is:"+dec.getName()+"n");
System.out.println("Decrypted File Name is:"+dec.getName()+"n");
jTextArea1.append("Decrypted File Path is:"+dec.getAbsolutePath()+"n");
jTextArea1.append("Key To Decrypt the cipher Text:"+key1);
System.out.println("Decrypted File Path is:"+dec.getAbsolutePath()+"n");
// Creation of Secret key
byte key[] = "abcdEFUH".getBytes();
SecretKeySpec secretKey = new SecretKeySpec(key,”Blowfish");
// Creation of plain objects
Cipher decrypt = Cipher.getInstance("DES");
decrypt.init(Cipher.DECRYPT_MODE, secretKey);
// Open the ciphert file
CipherInputStream cis=new CipherInputStream(fis, decrypt);
// Write to the decrypted file
byte[] b = new byte[1024];
int i = cis.read(b);
while (i != -1) {
fos.write(b, 0, i);
i = cis.read(b);
}
fos.flush();
fos.close();
cos.close();
fis.close();
}
try{
int j;
/** Takes all files in a specified directory and merge them
together...*/
File firstDEcryption = new File("D:/secure/firstDEcryption/");
listOfFiles = firstDEcryption.listFiles();
for( j=0; j<listOfFiles.length; j++){
String lines;
String srcFile = listOfFiles[j].getPath();
outFile = "D:/secure/merging.txt";
of=new File(outFile);
BufferedReader inFile=new BufferedReader(new FileReader(new
File(srcFile)));
BufferedWriter outPut=new BufferedWriter(new
FileWriter(outFile, true));
String fil=listOfFiles.toString();
jTextArea1.append("Files to be Merged:"+fil);
jTextArea1.append("Merged File Path:"+outFile);
while((lines=inFile.readLine()) != null) {
outPut.write(lines);
outPut.newLine();
}
String fenc=" Files can be Merged ";
JOptionPane.showMessageDialog(null, fenc);
outPut.flush();
outPut.close();
inFile.close();
} }
Re-Decryption Process
 Integrated a newly proposed threshold proxy re-encryption
scheme and erasure codes over exponents.
 The threshold proxy Re-encryption scheme supports encoding,
forwarding, and partial decryption operations in a distributed
way.
 By using the threshold proxy re-encryption scheme, we
present a secure cloud storage system that provides secure data
storage and secure data forwarding functionality in a
decentralized structure.
 key servers act as access nodes for providing a front-end layer
such as a traditional file system interface.
Conclusion
References
 IEEE 2012 paper on Distributed and Parallel systems, “A secure
Erasure code based Cloud storage System with Secure Data
forwarding”.
 Swings (second Edition) By Matthew robinson and Pavel
vorobiev.
 www.youtube.com
 Fast Software Encryption, Cambridge Security Workshop
Proceedings (December 1993), Springer-Verlag, 1994, pp. 191-
204. IEEE Paper.
Secure erasure code based cloud storage system with secure data forwarding
Secure erasure code based cloud storage system with secure data forwarding

More Related Content

What's hot

Android Operating System
Android Operating SystemAndroid Operating System
Android Operating System
Bilal Mirza
 
Android summer training report
Android summer training reportAndroid summer training report
Android summer training report
Shashendra Singh
 
Android technology- Advantages & Limitations
Android technology- Advantages & LimitationsAndroid technology- Advantages & Limitations
Android technology- Advantages & LimitationsVaibhav Dixit
 
Android vs Others Operating System
Android vs Others Operating SystemAndroid vs Others Operating System
Android vs Others Operating System
Shemul Hossain
 
Geoscience satellite image processing
Geoscience satellite image processingGeoscience satellite image processing
Geoscience satellite image processing
gaurav jain
 
Design of Secure Hash Algorithm(SHA)
Design of Secure Hash Algorithm(SHA)Design of Secure Hash Algorithm(SHA)
Design of Secure Hash Algorithm(SHA)
Saravanan T.M
 
Android studio ppt
Android studio pptAndroid studio ppt
Android studio ppt
Swapanpreet Kaur
 
android-tutorial-for-beginner
android-tutorial-for-beginnerandroid-tutorial-for-beginner
android-tutorial-for-beginnerAjailal Parackal
 
Deauthentication Attack with Node MCU & Esp8266
Deauthentication Attack with Node MCU & Esp8266Deauthentication Attack with Node MCU & Esp8266
Deauthentication Attack with Node MCU & Esp8266
Akash Thakur
 
Sistemas distribuidos
Sistemas distribuidosSistemas distribuidos
Sistemas distribuidos
Asis Matos
 
Fuchsia operating system by google document
Fuchsia operating system by google documentFuchsia operating system by google document
Fuchsia operating system by google document
PRUTHVI RAJ BANDA
 
Ds objects and models
Ds objects and modelsDs objects and models
Ds objects and modelsMayank Jain
 
Collaborating Using Cloud Services
Collaborating Using Cloud ServicesCollaborating Using Cloud Services
Collaborating Using Cloud Services
Dr. Sunil Kr. Pandey
 
2. Distributed Systems Hardware & Software concepts
2. Distributed Systems Hardware & Software concepts2. Distributed Systems Hardware & Software concepts
2. Distributed Systems Hardware & Software concepts
Prajakta Rane
 
Rc6 algorithm
Rc6 algorithmRc6 algorithm
Rc6 algorithm
Chethan Chetu
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
Pachipulusu Giridhar
 
2D Graphics animation - Bouncing ball(Python).pptx
2D Graphics animation - Bouncing ball(Python).pptx2D Graphics animation - Bouncing ball(Python).pptx
2D Graphics animation - Bouncing ball(Python).pptx
Aishwarya SenthilNathan
 
Android ui layout
Android ui layoutAndroid ui layout
Android ui layoutKrazy Koder
 

What's hot (20)

Android Operating System
Android Operating SystemAndroid Operating System
Android Operating System
 
Cloud Service Models
Cloud Service ModelsCloud Service Models
Cloud Service Models
 
Android summer training report
Android summer training reportAndroid summer training report
Android summer training report
 
Android technology- Advantages & Limitations
Android technology- Advantages & LimitationsAndroid technology- Advantages & Limitations
Android technology- Advantages & Limitations
 
Android vs Others Operating System
Android vs Others Operating SystemAndroid vs Others Operating System
Android vs Others Operating System
 
Geoscience satellite image processing
Geoscience satellite image processingGeoscience satellite image processing
Geoscience satellite image processing
 
Design of Secure Hash Algorithm(SHA)
Design of Secure Hash Algorithm(SHA)Design of Secure Hash Algorithm(SHA)
Design of Secure Hash Algorithm(SHA)
 
Android studio ppt
Android studio pptAndroid studio ppt
Android studio ppt
 
android-tutorial-for-beginner
android-tutorial-for-beginnerandroid-tutorial-for-beginner
android-tutorial-for-beginner
 
Deauthentication Attack with Node MCU & Esp8266
Deauthentication Attack with Node MCU & Esp8266Deauthentication Attack with Node MCU & Esp8266
Deauthentication Attack with Node MCU & Esp8266
 
Sistemas distribuidos
Sistemas distribuidosSistemas distribuidos
Sistemas distribuidos
 
Cloud operating systems
Cloud operating systemsCloud operating systems
Cloud operating systems
 
Fuchsia operating system by google document
Fuchsia operating system by google documentFuchsia operating system by google document
Fuchsia operating system by google document
 
Ds objects and models
Ds objects and modelsDs objects and models
Ds objects and models
 
Collaborating Using Cloud Services
Collaborating Using Cloud ServicesCollaborating Using Cloud Services
Collaborating Using Cloud Services
 
2. Distributed Systems Hardware & Software concepts
2. Distributed Systems Hardware & Software concepts2. Distributed Systems Hardware & Software concepts
2. Distributed Systems Hardware & Software concepts
 
Rc6 algorithm
Rc6 algorithmRc6 algorithm
Rc6 algorithm
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
2D Graphics animation - Bouncing ball(Python).pptx
2D Graphics animation - Bouncing ball(Python).pptx2D Graphics animation - Bouncing ball(Python).pptx
2D Graphics animation - Bouncing ball(Python).pptx
 
Android ui layout
Android ui layoutAndroid ui layout
Android ui layout
 

Viewers also liked

cloud computing preservity
cloud computing preservitycloud computing preservity
cloud computing preservity
chennuruvishnu
 
A secure erasure code based cloud storage
A secure erasure code based cloud storageA secure erasure code based cloud storage
A secure erasure code based cloud storage
IMPULSE_TECHNOLOGY
 
Secureerasurecodebasedcloudstoragesystemwithsecuredataforwarding
Secureerasurecodebasedcloudstoragesystemwithsecuredataforwarding Secureerasurecodebasedcloudstoragesystemwithsecuredataforwarding
Secureerasurecodebasedcloudstoragesystemwithsecuredataforwarding
kadalisrikanth
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computingPrince Chandu
 
Psdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storagePsdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storageZTech Proje
 
Syed Ubaid Ali Jafri - Cryptography Techniques
Syed Ubaid Ali Jafri - Cryptography TechniquesSyed Ubaid Ali Jafri - Cryptography Techniques
Syed Ubaid Ali Jafri - Cryptography Techniques
Syed Ubaid Ali Jafri
 
Network Coding for Distributed Storage Systems(Group Meeting Talk)
Network Coding for Distributed Storage Systems(Group Meeting Talk)Network Coding for Distributed Storage Systems(Group Meeting Talk)
Network Coding for Distributed Storage Systems(Group Meeting Talk)
Jayant Apte, PhD
 
Secure erasure code based distributed storage system with secure data forwarding
Secure erasure code based distributed storage system with secure data forwardingSecure erasure code based distributed storage system with secure data forwarding
Secure erasure code based distributed storage system with secure data forwardingAli Habeeb
 
Cloud Data Integration Best Practices
Cloud Data Integration Best PracticesCloud Data Integration Best Practices
Cloud Data Integration Best Practices
Darren Cunningham
 
C3 bringing the_power_of_the_public_cloud_to_your_secure_data_center
C3 bringing the_power_of_the_public_cloud_to_your_secure_data_centerC3 bringing the_power_of_the_public_cloud_to_your_secure_data_center
C3 bringing the_power_of_the_public_cloud_to_your_secure_data_center
Dr. Wilfred Lin (Ph.D.)
 
Attribute based encryption in cloud with significant reduction reviw2
Attribute based encryption in cloud with significant reduction reviw2Attribute based encryption in cloud with significant reduction reviw2
Attribute based encryption in cloud with significant reduction reviw2
Naveena N
 
Cloud Encryption
Cloud EncryptionCloud Encryption
Cloud Encryption
RituparnaNag
 
Web based Peripheral trouble shooting management system
Web based Peripheral trouble shooting management systemWeb based Peripheral trouble shooting management system
Web based Peripheral trouble shooting management system
FAKHRUN NISHA
 
Real-time data integration to the cloud
Real-time data integration to the cloudReal-time data integration to the cloud
Real-time data integration to the cloud
Sankar Nagarajan
 
Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing
Adz91 Digital Ads Pvt Ltd
 
Privacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storagePrivacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storage
Nagamalleswararao Tadikonda
 
Ensuring Distributed Accountability in the Cloud
Ensuring Distributed Accountability in the CloudEnsuring Distributed Accountability in the Cloud
Ensuring Distributed Accountability in the Cloud
Suraj Mehta
 
Ppt on low power wireless sensor network 5th sem
Ppt on low power wireless sensor network 5th semPpt on low power wireless sensor network 5th sem
Ppt on low power wireless sensor network 5th sem
shikhathegreat
 
Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud
Girish Chandra
 

Viewers also liked (20)

cloud computing preservity
cloud computing preservitycloud computing preservity
cloud computing preservity
 
A secure erasure code based cloud storage
A secure erasure code based cloud storageA secure erasure code based cloud storage
A secure erasure code based cloud storage
 
Secureerasurecodebasedcloudstoragesystemwithsecuredataforwarding
Secureerasurecodebasedcloudstoragesystemwithsecuredataforwarding Secureerasurecodebasedcloudstoragesystemwithsecuredataforwarding
Secureerasurecodebasedcloudstoragesystemwithsecuredataforwarding
 
Final review presentation
Final review presentationFinal review presentation
Final review presentation
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
 
Psdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storagePsdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storage
 
Syed Ubaid Ali Jafri - Cryptography Techniques
Syed Ubaid Ali Jafri - Cryptography TechniquesSyed Ubaid Ali Jafri - Cryptography Techniques
Syed Ubaid Ali Jafri - Cryptography Techniques
 
Network Coding for Distributed Storage Systems(Group Meeting Talk)
Network Coding for Distributed Storage Systems(Group Meeting Talk)Network Coding for Distributed Storage Systems(Group Meeting Talk)
Network Coding for Distributed Storage Systems(Group Meeting Talk)
 
Secure erasure code based distributed storage system with secure data forwarding
Secure erasure code based distributed storage system with secure data forwardingSecure erasure code based distributed storage system with secure data forwarding
Secure erasure code based distributed storage system with secure data forwarding
 
Cloud Data Integration Best Practices
Cloud Data Integration Best PracticesCloud Data Integration Best Practices
Cloud Data Integration Best Practices
 
C3 bringing the_power_of_the_public_cloud_to_your_secure_data_center
C3 bringing the_power_of_the_public_cloud_to_your_secure_data_centerC3 bringing the_power_of_the_public_cloud_to_your_secure_data_center
C3 bringing the_power_of_the_public_cloud_to_your_secure_data_center
 
Attribute based encryption in cloud with significant reduction reviw2
Attribute based encryption in cloud with significant reduction reviw2Attribute based encryption in cloud with significant reduction reviw2
Attribute based encryption in cloud with significant reduction reviw2
 
Cloud Encryption
Cloud EncryptionCloud Encryption
Cloud Encryption
 
Web based Peripheral trouble shooting management system
Web based Peripheral trouble shooting management systemWeb based Peripheral trouble shooting management system
Web based Peripheral trouble shooting management system
 
Real-time data integration to the cloud
Real-time data integration to the cloudReal-time data integration to the cloud
Real-time data integration to the cloud
 
Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing
 
Privacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storagePrivacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storage
 
Ensuring Distributed Accountability in the Cloud
Ensuring Distributed Accountability in the CloudEnsuring Distributed Accountability in the Cloud
Ensuring Distributed Accountability in the Cloud
 
Ppt on low power wireless sensor network 5th sem
Ppt on low power wireless sensor network 5th semPpt on low power wireless sensor network 5th sem
Ppt on low power wireless sensor network 5th sem
 
Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud
 

Similar to Secure erasure code based cloud storage system with secure data forwarding

Java Input Output and File Handling
Java Input Output and File HandlingJava Input Output and File Handling
Java Input Output and File Handling
Sunil OS
 
Secure .NET programming
Secure .NET programmingSecure .NET programming
Secure .NET programmingAnte Gulam
 
Containers: The What, Why, and How
Containers: The What, Why, and HowContainers: The What, Why, and How
Containers: The What, Why, and How
Sneha Inguva
 
working with files
working with filesworking with files
working with files
SangeethaSasi1
 
Java IO Streams V4
Java IO Streams V4Java IO Streams V4
Java IO Streams V4
Sunil OS
 
DEF CON 27 - ALVARO MUNOZ / OLEKSANDR MIROSH - sso wars the token menace
DEF CON 27 - ALVARO MUNOZ / OLEKSANDR MIROSH - sso wars the token menaceDEF CON 27 - ALVARO MUNOZ / OLEKSANDR MIROSH - sso wars the token menace
DEF CON 27 - ALVARO MUNOZ / OLEKSANDR MIROSH - sso wars the token menace
Felipe Prado
 
Develop an encryption and decryption algorithm Your program should a.pdf
Develop an encryption and decryption algorithm  Your program should a.pdfDevelop an encryption and decryption algorithm  Your program should a.pdf
Develop an encryption and decryption algorithm Your program should a.pdf
deepaksatrker
 
file handling c++
file handling c++file handling c++
file handling c++Guddu Spy
 
File Handling in Java.pdf
File Handling in Java.pdfFile Handling in Java.pdf
File Handling in Java.pdf
SudhanshiBakre1
 
Python for Penetration testers
Python for Penetration testersPython for Penetration testers
Python for Penetration testers
Christian Martorella
 
Application-Specific Models and Pointcuts using a Logic Meta Language
Application-Specific Models and Pointcuts using a Logic Meta LanguageApplication-Specific Models and Pointcuts using a Logic Meta Language
Application-Specific Models and Pointcuts using a Logic Meta Language
ESUG
 
OpenSSL Basic Function Call Flow
OpenSSL Basic Function Call FlowOpenSSL Basic Function Call Flow
OpenSSL Basic Function Call Flow
William Lee
 
ExtraFileIO.pptx
ExtraFileIO.pptxExtraFileIO.pptx
ExtraFileIO.pptx
NguynThiThanhTho
 
Files and streams
Files and streamsFiles and streams
Files and streams
Pranali Chaudhari
 
DEF CON 23: Stick That In Your (root)Pipe & Smoke It
DEF CON 23: Stick That In Your (root)Pipe & Smoke ItDEF CON 23: Stick That In Your (root)Pipe & Smoke It
DEF CON 23: Stick That In Your (root)Pipe & Smoke It
Synack
 
PCI Security Requirements - secure coding
PCI Security Requirements - secure codingPCI Security Requirements - secure coding
PCI Security Requirements - secure codingHaitham Raik
 
Understanding java streams
Understanding java streamsUnderstanding java streams
Understanding java streamsShahjahan Samoon
 
Lessons Learned: Running InfluxDB Cloud and Other Cloud Services at Scale | T...
Lessons Learned: Running InfluxDB Cloud and Other Cloud Services at Scale | T...Lessons Learned: Running InfluxDB Cloud and Other Cloud Services at Scale | T...
Lessons Learned: Running InfluxDB Cloud and Other Cloud Services at Scale | T...
InfluxData
 

Similar to Secure erasure code based cloud storage system with secure data forwarding (20)

Java Input Output and File Handling
Java Input Output and File HandlingJava Input Output and File Handling
Java Input Output and File Handling
 
Secure .NET programming
Secure .NET programmingSecure .NET programming
Secure .NET programming
 
Containers: The What, Why, and How
Containers: The What, Why, and HowContainers: The What, Why, and How
Containers: The What, Why, and How
 
working with files
working with filesworking with files
working with files
 
Java IO Streams V4
Java IO Streams V4Java IO Streams V4
Java IO Streams V4
 
DEF CON 27 - ALVARO MUNOZ / OLEKSANDR MIROSH - sso wars the token menace
DEF CON 27 - ALVARO MUNOZ / OLEKSANDR MIROSH - sso wars the token menaceDEF CON 27 - ALVARO MUNOZ / OLEKSANDR MIROSH - sso wars the token menace
DEF CON 27 - ALVARO MUNOZ / OLEKSANDR MIROSH - sso wars the token menace
 
Java sockets
Java socketsJava sockets
Java sockets
 
Develop an encryption and decryption algorithm Your program should a.pdf
Develop an encryption and decryption algorithm  Your program should a.pdfDevelop an encryption and decryption algorithm  Your program should a.pdf
Develop an encryption and decryption algorithm Your program should a.pdf
 
file handling c++
file handling c++file handling c++
file handling c++
 
File Handling in Java.pdf
File Handling in Java.pdfFile Handling in Java.pdf
File Handling in Java.pdf
 
Python for Penetration testers
Python for Penetration testersPython for Penetration testers
Python for Penetration testers
 
Application-Specific Models and Pointcuts using a Logic Meta Language
Application-Specific Models and Pointcuts using a Logic Meta LanguageApplication-Specific Models and Pointcuts using a Logic Meta Language
Application-Specific Models and Pointcuts using a Logic Meta Language
 
OpenSSL Basic Function Call Flow
OpenSSL Basic Function Call FlowOpenSSL Basic Function Call Flow
OpenSSL Basic Function Call Flow
 
ExtraFileIO.pptx
ExtraFileIO.pptxExtraFileIO.pptx
ExtraFileIO.pptx
 
Files and streams
Files and streamsFiles and streams
Files and streams
 
DEF CON 23: Stick That In Your (root)Pipe & Smoke It
DEF CON 23: Stick That In Your (root)Pipe & Smoke ItDEF CON 23: Stick That In Your (root)Pipe & Smoke It
DEF CON 23: Stick That In Your (root)Pipe & Smoke It
 
PCI Security Requirements - secure coding
PCI Security Requirements - secure codingPCI Security Requirements - secure coding
PCI Security Requirements - secure coding
 
Understanding java streams
Understanding java streamsUnderstanding java streams
Understanding java streams
 
Rails Security
Rails SecurityRails Security
Rails Security
 
Lessons Learned: Running InfluxDB Cloud and Other Cloud Services at Scale | T...
Lessons Learned: Running InfluxDB Cloud and Other Cloud Services at Scale | T...Lessons Learned: Running InfluxDB Cloud and Other Cloud Services at Scale | T...
Lessons Learned: Running InfluxDB Cloud and Other Cloud Services at Scale | T...
 

Recently uploaded

The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 

Recently uploaded (20)

The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 

Secure erasure code based cloud storage system with secure data forwarding

  • 1. Presentation By Rupera Priyank Anilkumar 1AM09IS052 Vineet Kumar 1AM09IS074 Ajay Kumar Yadav 1AM09IS004 Krishna Kumar 1AM06IS029 Under the Guidance of Mrs. V . Rose Priyanka Asst.Prof, Dept of ISE
  • 2. Content  Abstract  Existing System  Demerits  Proposed System  Architecture  Merits  Functional Requirements  Non Functional Requirements  System Design  Screen Shots  References
  • 3. Abstract  Implementing threshold proxy re-encryption and decentralized erasure code.  Distributed storage System used for distribution purpose, and it depends on the secure storage system.  Storage server and key server are used.  Parameters are more flexible adjustment between servers(storage and key).
  • 4. Existing System  General encryption scheme for storing data.  DES algorithm is used for key generation.  For the storage data ,user has to manage his keys .  Single storage server for whole file.
  • 5. Demerits  Communication traffic between the user and storage servers.  User’s device of storing the keys is lost.  Storing and retrieving, it is hard for storage servers .  Only one time encryption using general encryption schemes.
  • 6. Proposed System  The method of threshold proxy re-encryption.  Decentralized erasure code method can be used for distributed storage system.  Distributed storage system depends on the secure cloud storage.  Storage server and key server those two systems used for storage system.  Encryption using Blowfish algorithm.
  • 8. Merits  Data is more confidential.  Highly protected by an security mechanism of the Server  Easy distribution and data forwarding.  Less Time consuming.
  • 9. Functional Requirement  Encryption  Re-encryption  Storage  Decryption
  • 10. Non Functional Requirement  Privacy  Reliability  Scalability  Performance  Security
  • 11. System Design  Workflow Diagram A workflow diagram visually represents the movement and transfer of resources, documents, data and tasks through the entire work process for a given product or service.  Use case Diagram Use case diagrams are used to describe a set of actions use cases that some system or systems subject should or can perform in collaboration with one or more external users of the system actors.  Sequence Diagram A sequence diagram is a kind of interaction diagram that shows how processes operate with one another and in what order.
  • 14. Sequence Diagram Login Register Home File select jButtonActionPerformed Register to cloud jButtonActionPerformed Select file for encryption Encryption jButtonActionPerformed jButtonActionPerformed jButtonActionPerformed
  • 15. Continue… Re-encryptionSplitting Select No. of tokens jButtonActionPerformed Upload file jButtonActionPerformed Select VM1 and VM2 Retrieve jButtonActionPerformed Receiving from VM1 and VM2 Decryption jButtonActionPerformed
  • 16. Modules  Process Encryption  Threshold-Proxy Function  Secure Cloud Storage  Data Forwarding
  • 19.
  • 20. // Creation of Secret key byte key[] = "HUFEdcba".getBytes(); String k = key.toString(); SecretKeySpec secretKey = new SecretKeySpec(key, "Blowfish"); // Creation of Cipher objects Cipher encrypt = Cipher.getInstance("Blowfish"); encrypt.init(Cipher.ENCRYPT_MODE, secretKey); // Open the Plaintext file cis = new CipherInputStream(fis, encrypt); // Write to the Encrypted file byte[] b = new byte[1024]; int i = cis.read(b); while (i != -1) { fos.write(b, 0, i); i = cis.read(b); } fos.flush(); fos.close(); cis.close(); fis.close(); String fenc = " File Encrypted "; JOptionPane.showMessageDialog(null, fenc); count++; Coding
  • 22. Threshold Proxy Re-encryption Scheme // Creation of Secret key byte key[] = "abcdEFUH".getBytes(); SecretKeySpec secretKey = new SecretKeySpec(key,"Blowfish"); // Creation of Cipher objects Cipher encrypt = Cipher.getInstance("Blowfish"); encrypt.init(Cipher.ENCRYPT_MODE, secretKey);
  • 25. Server Side File Receiving
  • 26. int bytesRead; int current = 0; ServerSocket serverSocket = null; serverSocket = new ServerSocket(7777); while(true) { Socket clientSocket = null; clientSocket = serverSocket.accept(); InputStream in = clientSocket.getInputStream(); OutputStream output = new FileOutputStream("C:/"+filename+".zip"); byte[] buffer = new byte[1024]; while ((bytesRead = in.read(buffer)) != -1) { output.write(buffer, 0, bytesRead); } Coding
  • 27.
  • 28. try { Socket sock1 = new Socket("192.168.0.154", 7777); // sendfile File myFile = zipFile1; System.out.println(zipFile1); byte[] mybytearray = new byte[(int) myFile.length()]; FileInputStream fis = new FileInputStream(myFile); BufferedInputStream bis = new BufferedInputStream(fis); bis.read(mybytearray, 0, mybytearray.length); OutputStream os = sock1.getOutputStream(); os.write(mybytearray, 0, mybytearray.length); os.flush(); sock1.close(); String sen="Files are forwarded to cloud Storage server 1 !!!"; JOptionPane.showMessageDialog(null,sen); jTextArea1.append("Sending File:"+z1); jTextArea1.append("Files are forwarded to cloud Storage server 1 !!!"); } catch(Exception e) { System.out.println("Exception : "+e); } Coding
  • 30. try { int bytesRead; int current = 0; ServerSocket serverSocket1 = new ServerSocket(4000); while(true) { Socket clientSocket = serverSocket1.accept(); InputStream in = clientSocket.getInputStream(); String op="D:/secure/server1/server1.zip"; OutputStream output = new FileOutputStream(op); //jTextArea1.append("Received File Location from Server1:"+output); byte[] buffer = new byte[1024]; while ((bytesRead = in.read(buffer)) != -1) { output.write(buffer, 0, bytesRead); } in.close(); output.close(); String ip2="192.168.1.2"; jTextArea1.append(" Server1 IP Address:"+ip2); jTextArea1.append("Received File Location from Server 2:"+op); String fr=" File can be Received from Server1."; JOptionPane.showConfirmDialog(null,fr); serverSocket1.close(); } Client Sending Filename Cipher
  • 32. try { Socket sock = new Socket("192.168.1.2",4000); //client IP address jTextArea1.append("n Client IP :"+sock); // sendfile String fn= "D:"+reqfile1+".zip"; File myFile = new File(fn); jTextArea1.append("n File location :"+myFile); byte[] mybytearray = new byte[(int) myFile.length()]; jTextArea1.append("n File Length :"+mybytearray); FileInputStream fis = new FileInputStream(myFile); BufferedInputStream bis = new BufferedInputStream(fis); bis.read(mybytearray, 0, mybytearray.length); OutputStream os = sock.getOutputStream(); os.write(mybytearray, 0, mybytearray.length); os.flush(); String sen="Files are forwarded to Client !!!"; JOptionPane.showMessageDialog(null,sen); os.close(); sock.close(); } Coding
  • 34. try { Socket sock = new Socket("192.168.1.2",4000); //client IP address jTextArea1.append("n Client IP :"+sock); // sendfile String fn= "D:"+reqfile1+".zip"; File myFile = new File(fn); jTextArea1.append("n File location :"+myFile); byte[] mybytearray = new byte[(int) myFile.length()]; jTextArea1.append("n File Length :"+mybytearray); FileInputStream fis = new FileInputStream(myFile); BufferedInputStream bis = new BufferedInputStream(fis); bis.read(mybytearray, 0, mybytearray.length); OutputStream os = sock.getOutputStream(); os.write(mybytearray, 0, mybytearray.length); os.flush(); String sen="Files are forwarded to Client !!!"; JOptionPane.showMessageDialog(null,sen); os.close(); sock.close(); } catch(Exception e) { System.out.println("Exception : "+e); } Coding
  • 35.
  • 36. try { String sourcefile = "D:/secure/server1/server1.zip"; File sf=new File(sourcefile); if (!sourcefile.endsWith(".zip")) { System.out.println("Invalid file name!"); System.exit(0); } else if (!new File(sourcefile).exists()) { System.out.println("File not exist!"); System.exit(0); } ZipInputStream in =new ZipInputStream(new FileInputStream(sourcefile)); ZipFile zf = new ZipFile(sourcefile); int a = 0; for (Enumeration em = zf.entries(); em.hasMoreElements();) { String targetfile = em.nextElement().toString(); ZipEntry ze = in.getNextEntry(); out = new FileOutputStream("D:/secure/EXTRACT/" + targetfile); byte[] buf = new byte[1024]; int len; while ((len = in.read(buf)) > 0) { out.write(buf, 0, len); } a = a + 1; } if (a > 0) { JOptionPane.showMessageDialog(null, "Files are unzipped, click NEXT"); jTextArea1.append("nServer1 Files can be Extractedn"); jTextArea1.append("ZipFile Name:"+sf.getName()+"n"); jTextArea1.append("ZipFile size :"+sf.length()+"n"); String fol="D:/secure/EXTRACT"; File folder=new File(fol); jTextArea1.append("n Files in the Path:n"+folder.getAbsolutePath()); } out.close(); in.close(); }
  • 37. try { String p=a; String s11="plaintxt"+l; String s12="des"+l; String key1 ="AbCd124"+l; l++; File kkk=new File(p); BufferedReader br=new BufferedReader(new FileReader(kkk)); jTextArea1.append("nnGiven File Name is:"+kkk.getName()+"n"); System.out.println("Given File Name is:"+kkk.getName()+"n"); jTextArea1.append("Given File size is:"+kkk.length()+"n"); System.out.println("Given File size is:"+kkk.length()+"n"); File dec= new File("D:/secure/firstDEcryption/"+s11+".txt"); FileInputStream fis = new FileInputStream(p); FileOutputStream fos = new FileOutputStream(dec); CipherOutputStream cos = null; jTextArea1.append("Decrypted File Name is:"+dec.getName()+"n"); System.out.println("Decrypted File Name is:"+dec.getName()+"n"); jTextArea1.append("Decrypted File Path is:"+dec.getAbsolutePath()+"n"); jTextArea1.append("Key To Decrypt the cipher Text:"+key1); System.out.println("Decrypted File Path is:"+dec.getAbsolutePath()+"n"); // Creation of Secret key byte key[] = "abcdEFUH".getBytes(); SecretKeySpec secretKey = new SecretKeySpec(key,”Blowfish"); // Creation of plain objects Cipher decrypt = Cipher.getInstance("DES"); decrypt.init(Cipher.DECRYPT_MODE, secretKey); // Open the ciphert file CipherInputStream cis=new CipherInputStream(fis, decrypt); // Write to the decrypted file byte[] b = new byte[1024]; int i = cis.read(b); while (i != -1) { fos.write(b, 0, i); i = cis.read(b); } fos.flush(); fos.close(); cos.close(); fis.close(); }
  • 38. try{ int j; /** Takes all files in a specified directory and merge them together...*/ File firstDEcryption = new File("D:/secure/firstDEcryption/"); listOfFiles = firstDEcryption.listFiles(); for( j=0; j<listOfFiles.length; j++){ String lines; String srcFile = listOfFiles[j].getPath(); outFile = "D:/secure/merging.txt"; of=new File(outFile); BufferedReader inFile=new BufferedReader(new FileReader(new File(srcFile))); BufferedWriter outPut=new BufferedWriter(new FileWriter(outFile, true)); String fil=listOfFiles.toString(); jTextArea1.append("Files to be Merged:"+fil); jTextArea1.append("Merged File Path:"+outFile); while((lines=inFile.readLine()) != null) { outPut.write(lines); outPut.newLine(); } String fenc=" Files can be Merged "; JOptionPane.showMessageDialog(null, fenc); outPut.flush(); outPut.close(); inFile.close(); } }
  • 40.  Integrated a newly proposed threshold proxy re-encryption scheme and erasure codes over exponents.  The threshold proxy Re-encryption scheme supports encoding, forwarding, and partial decryption operations in a distributed way.  By using the threshold proxy re-encryption scheme, we present a secure cloud storage system that provides secure data storage and secure data forwarding functionality in a decentralized structure.  key servers act as access nodes for providing a front-end layer such as a traditional file system interface. Conclusion
  • 41. References  IEEE 2012 paper on Distributed and Parallel systems, “A secure Erasure code based Cloud storage System with Secure Data forwarding”.  Swings (second Edition) By Matthew robinson and Pavel vorobiev.  www.youtube.com  Fast Software Encryption, Cambridge Security Workshop Proceedings (December 1993), Springer-Verlag, 1994, pp. 191- 204. IEEE Paper.