Nothing Special   »   [go: up one dir, main page]

Secure File Storage On Cloud Using Hybrid Cryptography

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 2

Secure File Storage On Cloud Using Hybrid

Cryptography
The proposed model is liable to meet the required security needs of data
center of cloud. Blowfish used for the encryption of file slices takes minimum time
and has maximum throughput for encryption and decryption from other symmetric
algorithms. The idea of splitting and merging adds on to meet the principle of data
security. The hybrid approach when deployed in cloud environment makes the
remote server more secure and thus, helps the cloud providers to fetch more trust
of their users. For data security and privacy protection issues, the fundamental
challenge of separation of sensitive data and access control is fulfilled.
Cryptography technique translates original data into unreadable form.
Cryptography technique is divided into symmetric key cryptography and public
key cryptography. This technique uses keys for translate data into unreadable form.
So only authorized person can access data from cloud server. Cipher text data is
visible for all people.

 Software Requirements:

 Windows 7 or above
 SQL Server 2008
 Visual Studio 2010

 Hardware Components:
 Processor – Core i3
 Hard Disk – 160 GB
 Memory – 2GB
 Internet Connection
 Advantages:

 The stored image file is completely secured, as the file is being encrypted
not by just using one but three encryption algorithm which are AES, DES
and RC6.
 The key is also safe as it embeds the key in image using LSB.
 The system is very secure and robust in nature.
 Data is kept secured on cloud server which avoids unauthorized access.

 Disadvantages:

 Requires an active internet connection to connect with cloud server.

 Application:

Data security is a major priority. This system can be implemented into


banking and corporate sectors to securely transfer confidential data.

 Reference:

 http://ieeexplore.ieee.org/document/7566416/

You might also like