International Research Journal of Engineering and Technology (IRJET)
e-ISSN: 2395-0056
Volume: 08 Issue: 03 | Mar 2021
p-ISSN: 2395-0072
www.irjet.net
Secure File Storage on Cloud using Enhanced Hybrid Cryptography Reece B. D’Souza1, Dr. Ruby D.2 1Student, 2Assistant
School of Computer Science & Engineering, Vellore Institute of Technology, Tamil Nadu, India Professor, School of Computer Science & Engineering, Vellore Institute of Technology, Tamil Nadu, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Service following the PaaS architecture imposed by several providers [1].
Abstract - In recent years ‘cloud’ has taken over the world,
offering a new and dynamic form for computation and storage. Several corporations offer cloud services, for example, Amazon Web Services (AWS), Google Cloud Platform (GCP), Microsoft Azure, etc. These cloud services are cheaper in the long run and their services are highly efficient. But a lot of small-scale corporations do not switch to the cloud due to the lack of security associated with the cloud. Therefore, the paper presents a method of storing files in the cloud securely. With the use of modified hybrid encryption, the files stored in the cloud are secure. Accessing any files leaked from the cloud would be futile without the keys and real-time authentication service offered by the model presented in the paper. The model uses the AES algorithm enhanced by threads and RSA Signing and Verification algorithm, along with a real-time OTP generation service to provide high security. While encrypting the file using AES, a key is entered and the file is split into eight pieces and encrypted simultaneously stored in a zip folder on the cloud. While requesting to download a file, the necessary key needs to be entered and an OTP will be emailed to the registered email which needs to be entered. Decryption works in the exact reverse of encryption. Thus, the model offers safe and secure encryption of files and storage in the cloud.
Several companies in the world offer these cloud services. They are called ‘Cloud Service Providers’ or ‘CSPs’ in short. These companies offer network services, business applications, or even infrastructure in the cloud. The large benefit of using these services via these companies is it is highly efficient when used economically. Rather than maintaining the individual infrastructure of the company, outsourcing these services to third parties for a reasonable price is highly efficient. The focus of this paper is one of these services, namely storage and more importantly its security. With the introduction of cloud computing, the use of traditional storage devices is declining. This is because, with the help of the cloud, information is stored in a centralized environment accessible from any part of the world having a viable internet connection. Cloud storage is useful because it eliminates the need for carrying physical storage devices and provides safe backups, while physical devices can be corrupted in some form, leading to loss of the entire data. Even though cloud storage has a higher form of safety over physical devices, it is not completely invulnerable. There have been several cases of data leakage from the cloud through the means of hacking or breaking into the cloud to steal valuable confidential company data for the benefit of the hacker. Even with the availability of data in the cloud, exposing them to applications that may already have security loopholes in them is extremely dangerous [2].
Key Words: CSPs (Cloud Service Providers), Encryption, Decryption, AES (Advanced Encryption Standard), RSA (Rivest–Shamir–Adleman), OTP (One Time Passwords).
1. INTRODUCTION Cloud computing is a subscription-based or pay-per-use service that extends an IT company’s capability, especially when used in real-time. With the introduction of cloud computing in the early 2000s, there was a significant change in not only the software but other fields as well. Hardware and software are generally used for heavy computation, but now with cloud computing, this load is lifted as the cloud handles it instead.
Therefore, storing information on the cloud will simply not suffice. Most businesses have avoided the use of CSPs for the very same reason. There are several methods for securing rough data sets such as the Genetic Algorithm (GA), K Mean Algorithm, KNN (K-Nearest Neighbour) Algorithm, and even Native Bayesian Technique [3]. But since data can be stored in any format in the cloud the use of cryptography would be beneficial. Through the use of cryptography, data can be safely stored. Even though the files are leaked, the files cannot be used as they are encrypted. Cryptography adds another layer to the security of the cloud.
Cloud computing can be defined as a type of computing that shares computing resources over a network rather than having local or personal servers to handle computation. In a more technical aspect, it is the use of remote servers to store, manage, and process data rather than achieve the same on a local server or a personal computer [1]. Cloud computing offers a variety of different services – such as servers, storage, and computations – which are delivered to the client over the internet. Cloud applications are developed in Platforms as a
© 2021, IRJET
|
Impact Factor value: 7.529
Earlier cryptography was only used for military or diplomatic communication up until the development of public-key cryptography. Cryptography can be defined as a system that through the use of some mathematical algorithm, transforms a sequence of characters that are fed to it [4]. This system is based on the value of a secret key, which is a parameter in the encryption as well as the decryption
|
ISO 9001:2008 Certified Journal
|
Page 294