Site icon Premium Researchers

DESIGN AND IMPLEMENTATION OF A SECURE FILE STORAGE ON CLOUD USING HYBRID CRYPTOGRAPHY

DESIGN AND IMPLEMENTATION OF A SECURE FILE STORAGE ON CLOUD USING HYBRID CRYPTOGRAPHY

Need help with a related project topic or New topic? Send Us Your Topic 

DOWNLOAD THE COMPLETE PROJECT MATERIAL

DESIGN AND IMPLEMENTATION OF A SECURE FILE STORAGE ON CLOUD USING HYBRID CRYPTOGRAPHY

Chapter One: Introduction

Background of the study

This work draws inspiration from the ever-changing field of cloud computing and hybrid cryptography.

Cloud computing is a data storage strategy that makes advantage of complex resources such as storage and processing power. The term “cloud” refers to a network of data centres that are accessible via the internet.

Clouds can be limited to a single organisation, known as enterprise clouds, or they can be broadened to include numerous organisations, known as public clouds. Cloud hosting of web applications is a type of cloud computing that would be used in this project.

File storage in a cloud must be safe and secure, which takes us to hybrid cryptography.

Cryptography is a means of securing information by using codes to ensure that only authorised individuals have access to it. Cryptography uses a set of rule-based methods to encrypt and decrypt data and information. In cryptography, we aim to do the following:

Confidentiality
Integrity
Features include non-repudiation and authentication.
To do this, we employ either the symmetric key or the asymmetric key techniques.

Hybrid cryptography is the combination of several encryption techniques in order to profit from the strengths of each. It is a secure encryption method because the public and private keys are completely secure.

Statement of the Problem

This work aims to combine the hybrid cryptography algorithm with files stored in cloud services. We want to build a system that can store files in the formats of text, photos, audio, and video.

This project’s major concept is to take security seriously. To ensure security, the files would be stored and encrypted before being recovered using the decryption key.

MOTIVATION FOR THE STUDY

The study is prompted by data and information security concerns that afflict internet use. This paper then proposes a straightforward solution to such concerns.

Aims of the Study
This study aims to develop a web application that can securely store and encrypt files in a cloud database.

Test the web application on a cloud provider for hosting and data storage.

Deploy the web application and develop ways to improve it.

GOALS OF THE STUDY
The study’s aims include:

Examining prior research in the fields of hybrid cryptography and cloud computing.

Extensive research of various encryption mechanisms.

Developing a system that can efficiently store, encrypt, and decode data utilising encryption keys.

OUTLINE OF METHODOLOGY

This idea and project were implemented using the server-side programming language PHP and the MySQL database querying language. These languages were chosen based on their server-side compatibility, high level of security, and overall web compatibility. Front-end technologies employed include HTML, CSS, and JavaScript. This will also be served as a web application through an online domain.

SCOPE OF THE STUDY:
The study’s scope would be confined to relatively smaller file formats such as texts, photos, and small-sized audio and video files. These constraints are in place to guarantee that the small cloud space budgeted is not depleted during testing and deployment. Large amounts of cloud storage space are also associated with high cloud service fees.

Significance of the Study
This study incorporates the academic and theoretical aspects of data encryption and confidentiality into real-world functional software. This project would result in the creation of software that can be utilised for future research purposes aimed at improving data security.

OPERATIONAL DEFINITION OF TERMS “The cloud” refers to Internet-accessible servers, including software and databases.

CRYPTOGRAPHY: Cryptography is a set of secure information and communication systems that use mathematical ideas and a set of rule-based calculations known as algorithms to transform communications into difficult-to-decipher formats.

ENCRYPTION: Data encryption converts data into another form, or code, that only those with access to a secret key (technically known as a decryption key) or password can decipher. Encrypted data is generally referred to as cypher text, whereas unencrypted data is known as plaintext.

SYMMETRIC ENCRYPTION: Symmetric encryption, also known as symmetric key cryptography, uses a single key to encrypt and decrypt data. You must provide this key with the receiver in order for them to interpret the data.

ASYMMETRIC ENCRYPTION: Asymmetric encryption employs two unique but related keys. The public key is used for encryption, whereas the private key is utilised for decryption. As the name implies, the Private Key is designed to be private, allowing only the authenticated recipient to decrypt the message.

HYBRID ENCRYPTION: Hybrid encryption combines two or more encryption techniques. It uses both asymmetric and symmetric encryption to take advantage of the strengths of each. These strengths are classified as speed and security.

PUBLIC KEY: This is a cryptographic key that may be obtained and used by anybody to encrypt messages intended for a specific recipient, so that the encrypted messages can be decrypted only by using a second key (the private key) that is known only to the recipient.

PRIVATE KEY: A private key, also known as a secret key, is a cryptographic variable used in conjunction with an algorithm to encrypt and decode data. Private keys are only shared with the key generator, ensuring excellent security.

Organisation of the Project

The project is structured so that Chapter One provides a brief introduction in the form of the Background of the Study, which provides a basic review of the notion of cloud computing and the field of cryptography, specifically a hybrid implementation of algorithms.

Chapter Two takes a thorough look at the various implementations of hybrid cryptography systems. The third chapter looks at the system architecture, design, and analysis.

Chapter Four describes the project’s implementation utilising the relevant programming languages and development models. It also displays the results of the tests that were conducted. Chapter Five concludes the project work with a summary, findings, and recommendations for future projects.

Need help with a related project topic or New topic? Send Us Your Topic 

DOWNLOAD THE COMPLETE PROJECT MATERIAL

Exit mobile version