Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
108 views2 pages

S283

The document proposes a hybrid cryptography model for secure file storage on cloud. It uses Blowfish encryption which has high throughput and minimal time compared to other symmetric algorithms. File slices are encrypted and split, then merged to meet security principles. The hybrid approach makes remote servers more secure and gives cloud providers more user trust. It fulfills the challenges of separating sensitive data and access control through cryptography techniques that encrypt data into unreadable ciphertext only authorized users can access from the cloud server.

Uploaded by

msc cs
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
108 views2 pages

S283

The document proposes a hybrid cryptography model for secure file storage on cloud. It uses Blowfish encryption which has high throughput and minimal time compared to other symmetric algorithms. File slices are encrypted and split, then merged to meet security principles. The hybrid approach makes remote servers more secure and gives cloud providers more user trust. It fulfills the challenges of separating sensitive data and access control through cryptography techniques that encrypt data into unreadable ciphertext only authorized users can access from the cloud server.

Uploaded by

msc cs
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 2

Secure File Storage On Cloud

Using Hybrid Cryptography


The proposed model is liable to meet the required security
needs of data center of cloud. Blowfish used for the encryption of
file slices takes minimum time and has maximum throughput for
encryption and decryption from other symmetric algorithms. The
idea of splitting and merging adds on to meet the principle of
data security. The hybrid approach when deployed in cloud
environment makes the remote server more secure and thus,
helps the cloud providers to fetch more trust of their users. For
data security and privacy protection issues, the fundamental
challenge of separation of sensitive data and access control is
fulfilled. Cryptography technique translates original data into
unreadable form. Cryptography technique is divided into
symmetric key cryptography and public key cryptography. This
technique uses keys for translate data into unreadable form. So
only authorized person can access data from cloud server. Cipher
text data is visible for all people.

 Software Requirements:

 Windows 7 or above
 SQL Server 2008
 Visual Studio 2010

 Hardware Components:
 Processor – Core i3
 Hard Disk – 160 GB
 Memory – 2GB
 Internet Connection

 Advantages:

 The stored image file is completely secured, as the file is


being encrypted not by just using one but three
encryption algorithm which are AES, DES and RC6.
 The key is also safe as it embeds the key in image using
LSB.
 The system is very secure and robust in nature.
 Data is kept secured on cloud server which avoids
unauthorized access.

 Disadvantages:

 Requires an active internet connection to connect with


cloud server.

 Application:

Data security is a major priority. This system can be


implemented into banking and corporate sectors to securely
transfer confidential data.

 Reference:

 http://ieeexplore.ieee.org/document/7566416/

You might also like