Major Signed
Major Signed
BACHELOR OF TECHNOLOGY
in
COMPUTER SCIENCE ENGINEERING
with specialization in CYBER SECURITY
MAY 2024
r
t)SJ~M
-··- INSTITUTE OF SCIENCE AND TECHNOLOGY
SRM KATTANKULATHUR-603 203 ·
BONAFIDE CERTIFICATE
I
~,t\9 ~nd
~')\
!
0
Ka::jthur
3 \
"'o- ;g:
0
Assistant Professor "
p •SRM , • ...
Professor And Head
15
Department of Networking and
Communications, Department of Networking and
SRM INSTITUTE OF SClENCE Communications,
AND TECHNOLOGY SRM INSTITUTE OF SCIENCE
AND TECHNOLOGY
iii
l
l
ACKNOWLEDGEMENT
We express our humble gratitude to Dr. C. Muthamizhchelvan, Vice-Chancellor, SRM Institute of Science
and Technology, for the facilities extended for the project work and his continued support.
We extend our sincere thanks to Dean-CET, SRM Institute of Science and Technology, Dr.
T.V.Gopal, for his invaluable support.
We wish to thank Dr. Revathi Venkataraman, Professor & Chairperson, School of Computing,
SRM Institute of Science and Technology, for her support throughout the project work.
We are incredibly grateful to our Head of the Department, Dr. Annapurani K, Professor,
Department of Networking And Communications SRM Institute of Science and Technology, for her
suggestions and encouragement at all the stages of the project work.
We want to convey our thanks to our Project Coordinator, Dr. Deepa Thilak K, Associate Professor,
Panel Head, Dr. Manickam M, Assistant Professor and members, Dr. Kalaiselvi K, Associate Professor,
Dr. KA Varun Kumar, Assistant Professor, Department of Networking and Communications, SRM
Institute of Science and Technology, for their inputs during the project reviews and support.
We register our immeasurable thanks to our Faculty Advisor, Dr. Thanga Revathi S, Associate
Professor, Department of Networking and Communications, SRM Institute of Science and Technology, for
leading and helping us to complete our course.
Our inexpressible respect and thanks to our guide, Dr. Manickam M, Assistant Professor,
Department of Networking and Communications, SRM Institute of Science and Technology, for providing
us with an opportunity to pursue our project under his mentorship. He provided us with the freedom and
support to explore the research topics of our interest. His passion for solving problems and making a
difference in the world has always been inspiring.
We sincerely thank the Networking and Communications Department staff and students, SRM
Institute of Science and Technology, for their help during our project. Finally, we would like to thank parents,
family members, and friends for their unconditional love, constant support, and encouragement.
Akshay Modi[RA2011030010084]
Saksham[RA2011030010074]
Ishaan Markanday[RA2011030010082]
Sahil Singh[RA2011030010096]
iv
v
ABSTRACT
vi
TABLE OF CONTENTS
ABSTRACT vi
LIST OF FIGURES ix
LIST OF TABLES x
ABBREVIATIONS 1
1 INTRODUCTION 2
1.1 About 3
1.2 Objectives 5
1.3 Scope 6
1.4 Problem Statement 8
2 LITERATURE SURVEY 11
2.1 Research Gap 13
vii
5 MODULES AND IMPLEMENTATION OF ADVANCED
ENCRYPTION AND DATA CHUNKING SYSTEM 27
5.1 Modules 27
5.1.1 File Splitting Module 27
5.1.2 Encryption Decryption Module 28
5.1.3 Data Integrity And Authentication Module 29
5.2 Implementation 30
5.2.1 Training Strategies for SecureDataPro Implementatiion 30
5.2.2 Encryption Algorithms used in SecureDataPro Implementation 31
5.3 User Interface 33
5.3.1 Home Page 33
5.3.2 Sign Up Page 34
5.3.3 Login Page 35
5.3.4 Encryption Page 36
5.3.5 File List Page 37
5.3.6 Decryption Page 38
5.3.7 Database 39
REFERENCES 54
APPENDIX 55
A CODING 55
B CONFERENCE AND JOURNAL PUBLICATION 71
C PLAGIARISM REPORT 74
viii
LIST OF FIGURES
System 16
Chunking System 23
System 24
System 25
System 26
5.7 Database 40
6.1 Comparison of Memory usage by AES, DES and RSA 45
ix
LIST OF TABLES
6.1 Comparison of various packet sizes for DES,AES & RSA algorithm 42
x
ABBREVIATIONS
RSA - Rivest-Shamir-Adleman
DH - Diffie-Hellman
XOR - Exclusive OR
1
CHAPTER 1
INTRODUCTION
Data protection is a critical aspect in the realm of cybersecurity, and innovative approaches are
continuously being developed to safeguard sensitive information from unauthorized access. One
such pioneering method is SecureDataPro, which emphasizes data protection through a unique
combination of file splitting and diverse encryption algorithms. This approach involves breaking
down a file into smaller chunks, thereby reducing the risk of exposing the entire dataset in the
event of a breach. Each fragment is then encrypted using a variety of encryption techniques,
enhancing the overall security of the data. By employing multiple encryption algorithms,
SecureDataPro ensures that even if one layer of protection is compromised, the rest of the data
remains secure. This multi-layered approach increases the complexity for potential attackers,
making it significantly more challenging to decrypt the information without proper authorization.
Additionally, the use of diverse encryption algorithms adds an extra level of security by
providing different levels of protection to each file chunk. Ultimately, SecureDataPro stands out
as an innovative solution that not only enhances data protection but also raises the bar for
cybersecurity practices, offering a robust defense mechanism against unauthorized access and
potential data breaches.
2
SecureDataPro presents a groundbreaking method of data protection by employing file splitting
and diverse encryption algorithms. One key encryption algorithm utilized in SecureDataPro is
AES, which is widely recognized for its efficiency and security in encrypting sensitive
information. AES operates with different key sizes, ensuring strong protection against potential
cyber threats. Another encryption algorithm featured in SecureDataPro is Rivest-Shamir-
Adleman (RSA), which utilizes both asymmetric and symmetric encryption techniques to
enhance data security. RSA's unique approach of using a public and private key pair adds an
extra layer of protection to the encrypted files, making it challenging for unauthorized users to
access the information. Additionally, SecureDataPro harnesses the power of Twofish encryption,
known for its robustness and resistance to cryptanalysis. Twofish's intricate key schedule and
encryption process make it an ideal choice for securing data through file splitting and encryption.
By employing a strategic combination of AES, RSA, and Twofish encryption algorithms,
SecureDataPro sets a new standard in data protection, prioritizing security and integrity in a
digital landscape fraught with potential risks. In today's digital world, the data proliferation
across various platforms and devices has underscored the critical importance of robust data
protection measures. In response to the escalating cybersecurity threats and the ever-increasing
volume of sensitive information, innovative solutions are imperative to safeguarding data
integrity and confidentiality. SecureDataPro emerges as a pioneering approach to address these
challenges, leveraging the combined power of file splitting and diverse encryption algorithms.
By breaking down files into smaller, more manageable chunks and encrypting them with multiple
encryption techniques, SecureDataPro offers a dynamic defense mechanism against
unauthorized access and potential data breaches. This introduction of advanced cryptographic
techniques not only enhances data security but also ensures the preservation of privacy in an era
characterized by heightened digital risks. SecureDataPro represents a paradigm shift in data
protection, setting new standards for safeguarding valuable information assets across diverse
digital environments.
1.1 ABOUT
3
The concept behind SecureDataPro revolves around file splitting, a technique
where large files are broken into smaller, more manageable chunks. This approach not
only makes it difficult for unauthorized users to access the entire file but also facilitates
a robust encryption process. The smaller file chunks are individually encrypted using a
variety of encryption algorithms, adding an extra layer of security to each piece. This
multi-layered encryption ensures that even if one part of the system is compromised, the
rest of the data remains secure.
As the digital landscape continues to evolve and cyber threats become increasingly
sophisticated, SecureDataPro's innovative approach to data protection offers a robust
solution to safeguard valuable information. The strategic combination of file splitting and
diverse encryption algorithms not only enhances data security but also raises the bar for
cybersecurity practices. SecureDataPro stands out as a comprehensive data protection
solution that prioritizes security and confidentiality, providing a high level of protection
against potential data breaches and unauthorized access.
This unique approach to data protection, where file splitting and multi-layered encryption
meet, represents a significant advancement in cybersecurity. By leveraging these
technologies, SecureDataPro establishes itself as a leading solution for secure data
4
storage and transmission, offering peace of mind in a world where data security is
paramount.
1.2 OBJECTIVES
5
fostering a multidimensional defense mechanism, By reducing the dangers of data
breaches and illegal access, SecureDataPro enables both people and businesses to
efficiently protect their data assets. In the end, SecureDataPro proves to be a ground-
breaking solution ready to raise the bar for data security and guarantee the confidentiality
and integrity of critical data in modern digital settings..
1.3 SCOPE
The scope for SecureDataPro's application and impact in the realm of data protection is
vast and promising. With its innovative approach integrating file splitting and diverse
encryption algorithms, SecureDataPro has the power to address a many range of
cybersecurity challenges across various industries and use cases. One key aspect of its
scope lies in its adaptability to diverse environments, including but not limited to cloud
6
computing, IoT devices, and mobile applications. SecureDataPro's versatility enables it
to safeguard data across different platforms and devices, ensuring comprehensive
protection for organizations and individuals alike. Additionally, as data volumes continue
to escalate exponentially, SecureDataPro's robust file splitting techniques and encryption
algorithms position it as a scalable solution capable of handling large datasets effectively.
Moreover, as regulatory requirements around data privacy and security become
increasingly stringent, SecureDataPro offers a proactive approach to compliance,
assisting organizations in meeting regulatory standards and avoiding potential penalties.
Furthermore, as the cybersecurity landscape evolves with emerging threats and
technologies, SecureDataPro's continuous innovation and adaptability ensure its
relevance and effectiveness in safeguarding sensitive information. Overall, the scope for
SecureDataPro extends across various industries and scenarios, providing a versatile and
comprehensive solution to the complex challenges of data protection in the digital age.
7
healthcare, finance, and cybersecurity. This integration ensures that AI systems can
operate on encrypted data securely, preserving privacy while deriving insights and
making predictions.
The scope of SecureDataPro also includes enabling safe cloud environment data
management and storage. With the growing number of enterprises depending on cloud
services for data processing and storage, SecureDataPro can offer an additional security
layer to enhance the capabilities of current cloud security protocols. SecureDataPro
improves data safety and resilience against cloud-based dangers including data breaches
and illegal access by encrypting data before storing it in the cloud and using its file
splitting algorithms to distribute data over many storage locations.
8
In an era marked by escalating cyber threats and sophisticated hacking techniques,
SecureDataPro emerges as a beacon of innovation, offering a proactive solution to safeguard
sensitive information. Its pioneering approach not only addresses existing security concerns
but also anticipates future challenges, positioning organizations and individuals to navigate
the complexities of data security with confidence and peace of mind.SecureDataPro's
groundbreaking approach to data protection represents a paradigm shift in cybersecurity,
offering a revolutionary solution that combines file splitting and diverse encryption
algorithms to safeguard sensitive information. At the heart of SecureDataPro's innovation
lies its decentralization of data, achieved through the fragmentation of files into smaller,
more manageable chunks. This decentralized approach enhances security by reducing the
impact of potential breaches, as compromising one chunk does not compromise the integrity
of the entire dataset.
9
sensitive information in an increasingly digitized world. Through its innovative
methodology, SecureDataPro equips stakeholders with the tools and capabilities needed to
safeguard their data assets effectively and navigate the challenges of cybersecurity with
confidence
10
CHAPTER 2
LITERATURE SURVEY
1. Seth, B., Dalal, S., Jaglan, V., Le, D. N., Mohan, S., & Srivastava, G. (2022). Integrating
encryption techniques for secure data storage in the cloud. Transactions on Emerging
Telecommunications Technologies, 33(4), e4108.
Seth, B., Dalal, S., Jaglan, V., Le, D. N., Mohan, S., & Srivastava, G. (2022) present their
innovative approach in their recent article on integrating encryption techniques for secure data
storage in the cloud. Their work, titled "SecureDataPro: Advanced Encryption and Robust Data
Chunking System," focuses on enhancing data security through a combination of file splitting
and diverse encryption algorithms. Published in Transactions on Emerging Telecommunications
Technologies, this research highlights the importance of implementing advanced encryption
strategies for protecting sensitive data stored in cloud environments.
2. Arora, A., Garg, H., & Shivani, S. (2023). Privacy protection of digital images using
watermarking and qr code-based visual cryptography. Advances in Multimedia, 2023.
Arora, A., Garg, H., & Shivani, S. (2023) in their research article titled "Privacy protection of
digital images using watermarking and QR code-based visual cryptography" published in
Advances in Multimedia, 2023, propose innovative methods for safeguarding digital image
privacy. Their study explores the combination of watermarking and QR code-based visual
cryptography to enhance data protection measures. This research contributes to the advancement
of privacy preservation techniques in the digital realm, offering valuable insights for further
developments in the field.
3. Malina, L., Dzurenda, P., Ricci, S., Hajny, J., Srivastava, G., Matulevičius, R., ... & Tang, Q.
(2021). Post-quantum era privacy protection for intelligent infrastructures. IEEE Access, 9,
36038-36077.
Malina et al. (2021) present a pioneering approach called SecureDataPro for data protection in
the post-quantum era. This innovative method involves file splitting and utilizing diverse
encryption algorithms to safeguard intelligent infrastructures and ensure privacy. The proposed
technique in their study, published in IEEE Access, focuses on enhancing security measures for
data transmission and storage within advanced technological environments. With a
comprehensive framework that addresses the challenges of the evolving threat landscape,
SecureDataPro offers a robust solution for protecting sensitive information in modern systems.
4. Shi, Z., Oskolkov, B., Tian, W., Kan, C., & Liu, C. (2024). Sensor Data Protection Through
11
Integration of Blockchain and Camouflaged Encryption in Cyber-Physical Manufacturing
Systems. Journal of Computing and Information Science in Engineering, 24(7).
Shi, Z., Oskolkov, B., Tian, W., Kan, C., and Liu, C. (2024) proposed a novel approach in their
research article titled "Sensor Data Protection Through Integration of Blockchain and
Camouflaged Encryption in Cyber-Physical Manufacturing Systems" published in the Journal of
Computing and Information Science in Engineering. The study introduces SecureDataPro, a
pioneering method that focuses on data protection through file splitting and the utilization of
diverse encryption algorithms. This innovative approach aims to enhance security measures in
cyber-physical manufacturing systems by combining blockchain technology with camouflaged
encryption techniques.
5. Samanta, D., Alahmadi, A. H., Karthikeyan, M. P., Khan, M. Z., Banerjee, A., Dalapati, G.
K., & Ramakrishna, S. (2021). Cipher block chaining support vector machine for secured
decentralized cloud enabled intelligent IoT architecture. IEEE Access, 9, 98013-98025.
Samanta, D., Alahmadi, A. H., Karthikeyan, M. P., Khan, M. Z., Banerjee, A., Dalapati, G. K.,
& Ramakrishna, S. (2021) proposed a Cipher Block Chaining Support Vector Machine for
Secured Decentralized Cloud Enabled Intelligent IoT Architecture. This innovative approach
was presented in the IEEE Access journal. The study focuses on enhancing data protection in
IoT environments by utilizing advanced encryption techniques. The research highlights the
importance of secure decentralized cloud architecture in ensuring the confidentiality and integrity
of sensitive information.
6. Li, T., He, X., Jiang, S., & Liu, J. (2022). A survey of privacy-preserving offloading methods
in mobile-edge computing. Journal of Network and Computer Applications, 203, 103395.Li, T.,
He, X., Jiang, S., & Liu, J. (2022) conducted a survey on privacy-preserving offloading methods
in mobile-edge computing, as published in the Journal of Network and Computer Applications.
Their research delves into cutting-edge strategies that maintain data security during offloading
processes. This study sheds light on the pivotal role of privacy preservation in enhancing mobile-
edge computing efficiency and security. Their findings offer valuable insights for developing
novel approaches in data protection for mobile-edge environments.
7. Pham, H., Woodworth, J., & Amini Salehi, M. (2019). Survey on secure search over encrypted
data on the cloud. Concurrency and Computation: Practice and Experience, 31(17), e5284.
Pham, H., Woodworth, J., & Amini Salehi, M. (2019) conducted a survey on secure search over
encrypted data on the cloud. The study, published in Concurrency and Computation: Practice
and Experience, explores the challenges and strategies for ensuring data security in cloud
environments. The researchers highlight the importance of utilizing diverse encryption
algorithms and file splitting techniques to protect sensitive information effectively. Their work
12
contributes to the advancement of secure data management practices in cloud computing.
8. Thushara, G. A., & Bhanu, S. M. S. (2022, November). A Flexible and Adaptive Hybrid
Algorithm for Secure Data Sharing in Cloud Computing. In 2022 IEEE 19th India Council
International Conference (INDICON) (pp. 1-8). IEEE.
Thushara, G. A., & Bhanu, S. M. S. (2022) presented a flexible and adaptive hybrid algorithm
aimed at enhancing secure data sharing in cloud computing in their paper titled "A Flexible and
Adaptive Hybrid Algorithm for Secure Data Sharing in Cloud Computing" presented at the 2022
IEEE 19th India Council International Conference (INDICON). This pioneering approach
combines file splitting and diverse encryption algorithms, collectively known as SecureDataPro,
to bolster data protection measures. Through this innovative method, the authors aim to address
the growing concerns related to data security and confidentiality in cloud computing
environments.
9. Vijayakumar, A., & Jebaseeli, A. N. (2020). Pioneer approach of data deduplication to remove
redundant data from cloud storage. International Journal of Advanced Research in Engineering
and Technology (IJARET), 11(10), 535-544.
Vijayakumar, A., & Jebaseeli, A. N. (2020) introduced a pioneering approach to data
deduplication in cloud storage, aimed at removing redundant data efficiently. Their work,
published in the International Journal of Advanced Research in Engineering and Technology
(IJARET), details a novel method to streamline storage and enhance data security measures
through innovative techniques.
10. Alkhalidy, M., Taha, M. B., Chowdhury, R., Ould-Slimane, H., Mourad, A., & Talhi, C.
(2023). Vehicular edge based approach for optimizing urban data privacy. IEEE Sensors Journal.
Alkhalidy et al. (2023) propose a vehicular edge-based approach to optimize urban data privacy
in their study published in IEEE Sensors Journal. Their work discusses the use of SecureDataPro,
a pioneering method that employs file splitting and diverse encryption algorithms for enhanced
data protection.
13
surfaces. This leaves many existing systems exposed to sophisticated attacks that can
break through conventional encryption barriers or leverage weaknesses in network
security.
Your research with SecureDataPro addresses this gap by introducing a novel strategy that
combines file splitting with a variety of encryption techniques. This approach reduces the
risk of exposing the entire dataset in the event of a security breach by breaking it into
smaller, more manageable chunks, each independently encrypted with a different
technique. This method creates a multi-layered defense, ensuring that even if one
encryption method is compromised, the other parts of the data remain secure. The use of
varied encryption techniques decreases the likelihood of successful attacks, as attackers
would need to breach multiple encryption layers to access the full dataset.
Furthermore, the file-splitting method reduces the attack surface by limiting the impact
of breaches to smaller data segments, increasing the overall security of the system. This
unique approach offers a stronger protection mechanism against unauthorized access and
cyberattacks, providing a more reliable and resilient solution for safeguarding sensitive
information in today's digital age. SecureDataPro's strategy, thus, fills a critical gap in
existing research by offering a more robust and flexible data protection solution that
adapts to evolving cyber threats.
14
CHAPTER 3
15
Fig 3.1 Methodology of Advanced Encryption and Data Chunking System
16
SecureDataPro breaks down files into smaller, more manageable chunks. This
process reduces the risk of a single point of failure by dispersing the data across
multiple chunks.By splitting files, SecureDataPro minimizes the impact of
potential breaches. Even if one chunk is compromised, the exposure is limited to
that specific portion of the data, rather than the entire file.This granular approach
to data storage and protection enhances resilience against unauthorized access and
data manipulation.SecureDataPro encrypts every data piece separately using a
range of encryption techniques. Industry-standard techniques like Rivest-Shamir-
Adleman (RSA), Advanced Encryption Standard (AES), and Elliptic Curve
Cryptography (ECC) might be included in these algorithms.Using a variety of
encryption algorithms increases the process' complexity and makes it much harder
for bad actors to decode the data.The confidentiality and integrity of the data are
maintained even in the event that one encryption scheme is broken because the
other encrypted portions are safe.
17
Symmetric encryption technology AES is well-known for its strong
security characteristics and broad use in many different applications.AES is used
by SecureDataPro to symmetrically encrypt the data in each chunk. This indicates
that encryption and decryption are accomplished using the same key.Because of
its powerful encryption capabilities, AES is immune to cryptographic and brute-
force attacks.By employing AES, SecureDataPro ensures that data within each
chunk is securely encrypted, providing a solid foundation for data protection.
• Rivest-Shamir-Adleman (RSA):
RSA is a public-key encryption algorithm that relies on asymmetric key
pairs (public and private keys) for encryption and decryption.SecureDataPro uses
asymmetric key distribution with RSA to improve data security. The matching
private key is used for decryption, and the public key is used for encryption.
Strong security guarantees are provided by RSA, especially in situations where
parties must exchange keys securely.SecureDataPro improves the security of data
storage and transmission by integrating RSA into its encryption framework,
particularly in situations involving secure communication channels.
18
Firstly, data normalization ensures uniformity in the format and structure of input
data, optimizing the efficiency of subsequent encryption processes. Secondly,
data tokenization segments the input data into smaller chunks, facilitating easier
management and encryption of individual components. Thirdly, data cleansing
removes any inconsistencies or extraneous elements from the input data, ensuring
that only relevant and valid information is processed for encryption. Finally, data
compression reduces the size of the input data, thereby improving storage
efficiency and speeding up encryption and decryption processes. By incorporating
these pre-processing techniques, SecureDataPro streamlines data protection
efforts, enhances encryption security, and provides a pioneering approach to
safeguarding sensitive information through a combination of file splitting and
diverse encryption algorithms.In SecureDataPro, the integration of four key pre-
processing techniques plays a pivotal role in fortifying data protection through a
combination of file splitting and diverse encryption algorithms. Firstly, data
normalization ensures that input data maintains uniformity in format and
structure, optimizing subsequent encryption processes for efficiency. This
standardization streamlines encryption procedures, contributing to smoother
operations and consistent results. Secondly, data tokenization segments the input
data into smaller, more manageable chunks, simplifying the management and
encryption of individual components. This segmentation enhances data security
by dispersing sensitive information across multiple encrypted chunks, minimizing
the impact of potential breaches. Thirdly, data cleansing eliminates
inconsistencies and extraneous elements from the input data, ensuring that only
relevant and valid information undergoes encryption. This purification process
enhances the integrity of the encrypted data, reducing the risk of errors or
vulnerabilities. Finally, data compression reduces the size of the input data,
enhancing storage efficiency and expediting encryption and decryption processes.
By reducing data volume without compromising security, SecureDataPro
optimizes resource utilization and enhances overall system performance.
Collectively, these pre-processing techniques streamline data protection efforts,
fortify encryption security, and establish SecureDataPro as a pioneering solution
for safeguarding sensitive information in today's digital landscape.Furthermore,
the integration of these pre-processing techniques in SecureDataPro not only
enhances data protection but also contributes to the overall effectiveness and
efficiency of the encryption process. Data normalization ensures that regardless
19
of the original format or structure of the input data, SecureDataPro can
consistently apply encryption algorithms, thus optimizing performance and
reducing the errors. Data tokenization not only facilitates easier management of
data chunks but also enhances security by reducing the exposure of sensitive
information within each individual segment. This segmentation strategy not only
improves security but also facilitates easier management and retrieval of
encrypted data. Furthermore, by eliminating any anomalies or superfluous
components that can jeopardize the encrypted data's security, data cleansing is
essential to guaranteeing the quality and integrity of the data.. By purifying the
input data before encryption, SecureDataPro minimizes the risk of vulnerabilities
and enhances the reliability of the encrypted data. Finally, data compression not
only reduces storage requirements but also speeds up encryption and decryption
processes, thus enhancing overall system performance. This optimization of
resource utilization contributes to a more efficient and scalable data protection
solution, making SecureDataPro a pioneering approach in safeguarding sensitive
information through file splitting and diverse encryption algorithms.
20
possibility of a single point of failure by dividing files into smaller, easier-to-
manage pieces. By limiting the impact of any breaches, this granular method
makes sure that even if one section of the file is compromised, the rest of it is safe.
Second, using a variety of encryption techniques strengthens data security and
offers strong protection against different online attacks. These algorithms, which
provide many layers of encryption, make it extremely difficult for unauthorized
users to access or decode the data. Examples of these algorithms are Elliptic Curve
Cryptography (ECC), Rivest-Shamir-Adleman (RSA), and Advanced Encryption
Standard (AES). Furthermore, even in the event that malevolent actors are able to
break through one encryption layer, SecureDataPro's methodology introduces an
additional degree of complexity, making it difficult for them to jeopardize
important data. This multi-layered security framework ensures comprehensive
protection for valuable data assets.
21
CHAPTER 4
22
Fig 4.1 System Architecture of Advanced Encryption and Data Chunking Sytem
Fig.4.1 shows a high level overview of system architecture of advanced encryption and
data chunking system. In detail, the first step involves creating a container. This container can be
a folder or directory on a computer system. Once a container is created, files can be saved within
it. The file management system also has a file chunking system which seems to break down large
files into multiple parts for storage. Additionally, the system encrypts files using AES and Fernet
algorithms which helps to secure them. After the files are encrypted, they are then saved in the
container. The system also has a decryption system that is likely used to decrypt the files when
they are needed. Finally, there is a saving metadata in SQL step. SQL likely refers to Structured
Query Language which is a query language used to access and manipulate data stored in a
relational database management system. In this context, the metadata is likely information about
the files such as their name, size, and creation date. This metadata is stored in a database using
SQL. Overall, the file management system provides a way to organize, store, secure and encrypt
files.
23
4.2 CLASS DIAGRAM
Fig 4.2 Class Diagram of Advanced Encryption and Data Chunking Sytem
Fig 4.2 shows class diagram,the system leverages a two-pronged approach that combines
file chunking and multiple encryption algorithms to safeguard data. In the first step, a file is
divided into smaller chunks. Subsequently, these chunks are encrypted using encryption
algorithms. Then, the encrypted chunks are stored securely. This strategy aims to guarantee that
even if one encryption layer is compromised, the remaining data chunks are shielded.
24
4.3 USE CASE DIAGRAM
The foremost motive of a use case diagram is to show what device capabilities are
finished for which actor. Roles of the actors in the gadget can be depicted. The number one
reason of a use case diagram is to provide a graphical illustration of the machine's functionality
in terms of the interactions between actors and the system itself. It illustrates the specific use
instances, or duties, that actors can carry out inside the device to perform their desires. These use
instances constitute unique functionalities or functions of the system that satisfy the desires or
requirements of the actors. The use case diagram visually depicts the relationships between actors
and use cases, in addition to any dependencies or institutions among exclusive use cases..
Additionally, the use case diagram can highlight the glide of facts or manage between actors and
the gadget, presenting insights into the system's basic capability.
Fig 4.3 Use Case Diagram of Advanced Encryption and Data Chunking System
25
Fig 4.3 shows use case diagram which depicts the key interactions and functionalities of
SecureDataPro, a system designed to provide enhanced data security through file splitting and
multi-algorithm encryption. The "User" is responsible for uploading files to the system, which
triggers the core operations of file splitting and encryption using multiple algorithms. These
encrypted chunks are then stored securely. When the "User" wants to retrieve their file, they can
request the reassembly and decryption of the chunks. The system reassembles the original file
from the stored chunks and decrypts it before delivering it back to the "User." Additionally, users
can share files securely through a designated use case.
Fig 4.4 DFD Diagram of Advanced Encryption and Data Chunking System
Fig 4.4 shows the DFD diagram. In the first step, user uploads file and then file is divided
into smaller chunks. Subsequently, these chunks are encrypted using a blend of encryption
algorithms. Then, the encrypted chunks are stored securely. This strategy aims to guarantee that
even if one encryption layer is compromised, the remaining data chunks are shielded.
26
CHAPTER 5
This chapter delves into the practical aspects of the project, presenting a comprehensive
overview of the modules and their implementation. It provides a detailed insight into the real
world application of SecureDataPro, Quality Analysis and Production Management System,
highlighting its operational components and functionality.
5.1 MODULES
The SecureDataPro system commences with the File Splitting module, acting as
the cornerstone for data protection. This module assumes the critical role of meticulously
dissecting the input file into smaller, manageable fragments we call chunks. The primary
objective behind file splitting is to significantly enhance data security. By strategically
distributing the file across multiple storage devices or locations, the system mitigates the
risk associated with a single point of failure. Imagine a scenario where one storage
location is compromised; the remaining chunks, residing in separate locations, would
remain secure. This distributed storage approach also deters unauthorized access
attempts. Even if an attacker gains access to one chunk, the scattered nature of the data
significantly complicates efforts to reconstruct the entire file without the corresponding
fragments.
The File Splitting module operates with meticulous precision, meticulously
considering various factors to determine the optimal chunk size and the total number of
chunks. File size plays a crucial role – larger files necessitate a higher number of chunks
for effective distribution. Security requirements are also factored in; for highly sensitive
data, smaller chunk sizes might be preferable to minimize potential damage if a chunk is
compromised. Additionally, storage constraints of the target locations are considered to
ensure efficient utilization of storage space.
To achieve efficient and accurate file splitting while maintaining the integrity of
27
the data, the module leverages sophisticated algorithms. These algorithms perform the
division process with remarkable speed and precision, ensuring that each chunk is an
exact fragment of the original file. This meticulous splitting is paramount – any errors or
inconsistencies during the splitting process could potentially corrupt the data upon
reconstruction.
In essence, the File Splitting module establishes the foundation for robust data protection
in SecureDataPro. By fragmenting the file and distributing the chunks across various
locations, it minimizes the exposure of sensitive information in the event of a security
breach and significantly increases the complexity for attackers attempting to access the
entire file. This intelligent and multifaceted approach strengthens data security and instills
confidence in users entrusting their valuable information to the SecureDataPro system.
This module tackles the challenge of robust data protection by implementing a multi-
layered encryption approach. It provides a rich selection of encryption algorithms
catering to various security needs. Users have the flexibility to choose from different
encryption methods, including:
• Symmetric-key encryption: This technique utilizes a single, shared key for both
encryption and decryption. It offers efficient processing but requires secure key
exchange between involved parties.
• Asymmetric-key encryption: This approach employs a key pair – a public key
for encryption and a private key for decryption. This enables secure key
distribution without requiring prior exchange.
• Hash functions: These one-way algorithms generate a unique mathematical
fingerprint (hash) for a given data input. Any alteration to the data will result in a
different hash, ensuring data integrity.
By strategically combining these diverse algorithms, the system significantly bolsters
data security. This layered approach makes it exceptionally challenging for unauthorized
parties to breach the encryption. Even if one encryption layer is compromised, the
remaining layers still offer protection. The module further strengthens security by
incorporating key management functionalities. It ensures secure encryption and
decryption processes, with mechanisms for:
• Key generation: This involves creating robust encryption keys using secure
28
algorithms.
• Key distribution: Secure methods are employed to distribute the necessary keys
to authorized users.
• Key storage: The system implements secure storage mechanisms to safeguard
encryption keys, preventing unauthorized access.
In essence, the "Encryption Decryption" module plays a pivotal role in SecureDataPro's
data protection strategy. It empowers users with control over their security needs while
providing a comprehensive encryption framework that safeguards data integrity and
confidentiality.
In the SecureDataPro system, the Data Integrity and Authentication module plays
a critical role in safeguarding the sanctity of user data throughout the entire process –
from file splitting to encryption and beyond. This module acts as a vigilant guardian,
ensuring the data remains unaltered and verifiable during critical operations.
Here's how it achieves this:
• Checksum Calculations: This technique involves creating a mathematical
fingerprint of the original data. Before splitting a file, the module calculates a
checksum (like a unique identifier) for the entire file. This checksum is then stored
alongside the encrypted chunks. Later, when the data needs to be reassembled, the
checksum is recalculated for the decrypted chunks. If these two checksums match,
it confirms the data hasn't been tampered with during any stage.
• Digital Signatures: This cryptographic tool adds another layer of security. The
module can generate a digital signature for the data using a private key held by
SecureDataPro. This signature acts like a tamper-evident seal, mathematically
linked to the data. Any unauthorized modification to the data would invalidate the
signature, raising an immediate red flag.
• Verification Processes: This module doesn't just create safeguards; it actively
verifies their integrity. It employs established cryptographic algorithms to validate
the checksums and digital signatures. If any discrepancies are detected, the system
triggers an alert, notifying users of a potential security breach or data corruption.
By meticulously employing these mechanisms, the Data Integrity and Authentication
module significantly strengthens the overall security posture of SecureDataPro. It ensures
users can have complete confidence that their data remains untainted and authentic
29
throughout the entire data protection process. This not only prevents unauthorized data
modification but also aids in identifying and mitigating potential security threats. In
essence, this module acts as a cornerstone for reliable and trustworthy data protection
within SecureDataPro.
5.2 IMPLEMENTATION
30
avenue for users to acquire knowledge about SecureDataPro's functionalities, step-
by-step processes, and best practices at their own pace. These tutorials provide
comprehensive and structured guidance, covering topics such as installation,
configuration, file splitting methodologies, encryption algorithms, and
troubleshooting. Through a combination of instructional videos, written guides, and
interactive exercises, online tutorials empower users to grasp SecureDataPro's
concepts and techniques thoroughly. Additionally, online forums and support
channels facilitate collaboration and knowledge sharing among users, enhancing
the learning experience and providing valuable resources for addressing queries
and challenges.
By offering both hands-on workshops and online tutorials as training strategies,
organizations can cater to diverse learning preferences and requirements. Hands-
on workshops provide immersive learning experiences that encourage active
participation and practical skill development, while online tutorials offer flexibility
and accessibility for self-paced learning. Together, these training strategies ensure
that users acquire the necessary skills and knowledge to effectively implement and
utilize SecureDataPro for secure file management and encryption, thereby
enhancing data protection measures and mitigating the risk of unauthorized access
or data breaches.
31
SecureDataPro is based on the widely used and extremely safe symmetric
encryption method AES-256. AES-256 is essential for protecting data while it is at
rest since it guarantees robust encryption capabilities. Second, to safely exchange
encryption keys, the system makes use of RSA, a potent asymmetric encryption
method. SecureDataPro's total security is improved by RSA's capacity to enable
secure key exchange and communication channels, guaranteeing the confidentiality
and integrity of encrypted data while it is being transmitted.
Thirdly, Twofish's robust and effective block cipher encryption is
incorporated into SecureDataPro. The strong encryption capabilities of Twofish
reinforce SecureDataPro's resistance against illegal access and data breaches. The
advanced encryption standard Serpent is also incorporated into the system because
of its high level of security and resilience to cryptanalysis. Serpent strengthens
SecureDataPro's security posture by adding an additional layer of defense and
offering strong encryption methods that can fend off sophisticated attacks.
SecureDataPro creates a multi-layered defensive system against unwanted
access and data breaches by combining these various encryption algorithms. This
novel method guarantees the confidentiality and integrity of data during
transmission and storage in addition to improving file security. Through its
comprehensive encryption framework, SecureDataPro offers organizations a
robust solution for protecting sensitive information across various platforms and
environments. By leveraging these diverse encryption algorithms, SecureDataPro
empowers organizations to safeguard their valuable data assets effectively,
ensuring compliance with regulatory requirements and bolstering trust among
stakeholders in an increasingly digital world.
SecureDataPro uses RSA, a potent asymmetric encryption method, in
addition to AES-256 for safe key exchange and communication channels. The
power of RSA is in its capacity to provide safe communication between participants
through data encryption using a public key that can only be unlocked with a
matching private key. This reduces the possibility of malevolent actors intercepting
or altering data while it is being transmitted by guaranteeing its confidentiality and
integrity.
Additionally, SecureDataPro's defense against unwanted access and data
breaches is strengthened by the integration of Twofish. Twofish is renowned for its
powerful and effective block cipher encryption, which adds an extra degree of
security to encrypted data. Strong encryption methods strengthen SecureDataPro's
32
overall security posture and increase its resistance to cryptographic attacks.
Furthermore, because of Serpent's high level of security and resilience to
cryptanalysis, SecureDataPro integrates this advanced encryption standard.
Sensitive data stored or communicated through SecureDataPro is guaranteed to
remain secure and to be intact thanks to Serpent's powerful encryption algorithms,
which provide increased protection against sophisticated attacks.
By combining these diverse encryption algorithms, SecureDataPro
establishes a multi-layered defense mechanism that safeguards data from
unauthorized access and potential security breaches. This innovative approach not
only enhances the security of files but also instills confidence in organizations
regarding the confidentiality and integrity of their data. SecureDataPro's
comprehensive encryption framework sets a new standard in data protection,
empowering organizations to protect their valuable assets and maintain compliance
with regulatory requirements in an ever-evolving digital landscape.
33
Fig 5.1 Home Page of SecureDataPro
Fig 5.1 shows the home page of our website SecureDataPro which addresses a
critical concern in today's digital landscape by providing a reliable solution for
safeguarding sensitive files. In an era where data breaches and unauthorized access pose
significant threats, SecureDataPro introduces a sophisticated dual-key encryption system.
This innovative approach ensures that users have granular control over their file security,
By offering an advanced encryption algorithm, SecureDataPro not only fortifies digital
assets against potential breaches but also empowers users with a user-friendly interface.
It has encryption button for encrypting file, file list button for accessing uploaded file and
logout button for logout.
34
Fig 5.2 Sign Up Page of SecureDataPro
Fig 5.2 shows the sign up page of our website SecureDataPro where user can
write their username and password to create their account on our website.
35
Fig 5.3 Login Page of SecureDataPro
Fig 5.3 shows the login page of our website SecureDataPro where user can write
their username and password to login to their account on our website
36
Fig 5.4 Encryption Page of SecureDataPro
The file list page of our website SecureDataPro contains all the files that user has
encrypted yet with their decryption keys.
37
Fig 5.5 File List Page of SecureDataPro
Fig 5.5 shows the file list page within SecureDataPro, our secure data protection
platform, acts as a central hub for managing user encrypted files. This user-friendly
interface provides a comprehensive overview of all the files user have encrypted using
SecureDataPro. Each entry on the file list page likely displays essential details about user
encrypted files.
The decryption page on the SecureDataPro website plays a vital role in granting
users access to their previously encrypted files. This user-friendly interface facilitates a
streamlined decryption process.
38
Fig 5.6 Decryption Page of SecureDataPro
Fig 5.6 shows decryption page which offers a user-friendly interface for regaining
access to previously encrypted files. Users initiate the process by uploading the two
unique decryption keys associated with their encrypted data. SecureDataPro then utilizes
these keys to decrypt each individual chunk that comprises the encrypted file, essentially
reversing the encryption process and restoring the original data. Once all chunks are
decrypted, the system seamlessly reassembles them into the original file, making it
available for download by the user. This secure decryption functionality empowers users
to control access to their confidential information whenever needed.
5.3.7 Database
Database contains the all the user information like their username, email, age, sex
password and the chunk file detail.
39
Fig 5.7 Database of SecureDataPro
Fig 5.7 shows the database of the SecureDataPro users which contains all the
information about the user including their names, email address, age, sex, password and
all the chunks details.
40
CHAPTER 6
6.1 RESULTS
The SecureDataPro system represents a paradigm shift in data protection
methodologies, introducing a pioneering approach that seamlessly integrates file splitting
with diverse encryption algorithms. Through rigorous evaluation and testing,
SecureDataPro has showcased its ability to substantially enhance data security by
dispersing encrypted chunks across multiple storage devices. This decentralized storage
model significantly reduces the risk of data breaches, as compromising one storage device
does not compromise the entirety of the protected data.
Additionally, the use of several encryption techniques in SecureDataPro's
architecture strengthens the security of sensitive data by adding still another layer of
protection. SecureDataPro adds complexity and diversity to the encryption process by
using several encryption techniques, making it very difficult for potential attackers to
decrypt the encrypted data without the necessary decryption keys.
Overall, SecureDataPro stands as a testament to the power of innovative
approaches in addressing the evolving challenges of data protection. Its groundbreaking
methodology not only enhances data security but also sets a new standard for
comprehensive encryption strategies. As companies struggle to keep up with the ever-
growing threat landscape of cyberattacks and data breaches, SecureDataPro shows itself
to be a dependable and strong option for protecting sensitive data in the modern digital
world.Three core file splitting techniques form the cornerstone of SecureDataPro's
creative data protection approach; each has been painstakingly crafted to strengthen its
defense against unwanted access and possible data breaches. First, files are carefully
divided into smaller segments according to their byte count when byte-oriented splitting
is employed. This ensures accurate segmentation and makes encryption procedures run
more smoothly. By using this technique, SecureDataPro can efficiently manage files of
different sizes while also preserving the integrity of data chunk sizes, which maximizes
security precautions.
Secondly, pattern-based splitting is seamlessly integrated into SecureDataPro's
framework, allowing the system to identify and segment files based on specific patterns
41
or sequences. By dispersing data in a non-linear fashion, this methodology adds an extra
layer of complexity to the encryption process, making it significantly more challenging
for unauthorized users to decipher the data. Pattern-based splitting enhances security by
minimizing predictability and reducing the risk of potential data exposure in the event of
a breach.
Table 6.1: Comparison of various packet sizes for DES, AES & RSA algorithm
Table 6.1 shows time taken by RSA algorithm for both encryption and decryption
process is much higher compare to the time taken by AES and DES algorithm. Variation
in buffer size is noticed. It does not increase according to the size of file in all algorithms.
42
Lastly, size-based splitting divides files into chunks of predefined sizes, ensuring
uniform distribution of data and minimizing variations in chunk sizes. This approach not
only enhances data transfer efficiency but also optimizes storage utilization, thereby
improving overall system performance. By incorporating these file splitting techniques
with a diverse range of algorithms such as RSA, ECC, and AES, Secure Data Pro
establishes a robust data protection framework.
This multi-layered approach enhances confidentiality and resilience against
unauthorized access or data breaches, setting a new benchmark in cybersecurity
standards. SecureDataPro's pioneering methodology empowers organizations to
safeguard their valuable data assets effectively, irrespective of the platforms or
environments they operate in. Through its comprehensive data protection framework,
SecureDataPro ensures the integrity and security of sensitive information, bolstering trust
and confidence among stakeholders in an increasingly. Through extensive testing and
evaluation, SecureDataPro has shown its capacity to significantly reduce the risk of data
breaches by splitting files into smaller chunks and encrypting each segment separately.
This segmentation not only makes it more challenging for attackers to reconstruct entire
datasets but also decentralizes storage, providing a further layer of protection. The test
results indicate a marked improvement in security due to this approach.
The implementation of multiple encryption algorithms, including RSA, ECC, and
AES, enhances the security of sensitive data by making it extremely difficult for
unauthorized users to gain access. SecureDataPro's varied encryption techniques ensure
that even if one encryption key is compromised, other segments remain protected due to
the diversity of encryption methods. This added complexity is a notable advantage over
traditional data protection systems that often rely on a single encryption method.
Another significant result is SecureDataPro's pattern-based splitting, which
segments files based on specific sequences. This method disrupts linear data distribution,
reducing the predictability that attackers rely on to reconstruct data. Additionally, size-
based splitting divides files into predefined chunk sizes, contributing to efficient data
transfer and storage optimization, further enhancing system performance.
43
6.2 COMPARISON
SecureDataPro is a major advancement in data protection, combining file splitting
with varied encryption techniques to offer a robust framework for safeguarding sensitive
data. When compared to traditional data protection methods, the benefits of
SecureDataPro become clear, demonstrating a significant shift in how data security is
approached in a world where cyber threats are constantly evolving.
Traditional data protection methods often rely on a single encryption algorithm to
secure entire datasets. While these algorithms can be robust, they present a major risk: if
an attacker manages to compromise the encryption key, the entire dataset becomes
vulnerable, leading to massive data breaches and potential exposure of sensitive
information. Additionally, traditional systems are typically centralized, meaning that data
is stored in one location or system. This centralization creates a single point of failure, so
when a breach occurs, the consequences can be extensive and require substantial efforts
to contain and remediate the damage.
In contrast, SecureDataPro's approach of splitting files into smaller segments
significantly reduces the impact of a security breach. By dividing files into smaller,
manageable chunks, SecureDataPro inherently complicates the task for attackers. An
attacker would need to reassemble all the individual pieces to reconstruct the dataset,
making it much more difficult to gain unauthorized access. This decentralized approach
also enhances system resilience, ensuring that a breach in one part of the system does not
necessarily compromise the entire dataset. This separation and dispersion of data not only
adds complexity for potential attackers but also optimizes storage and data management.
Adding to this security is SecureDataPro's use of multiple encryption techniques.
While traditional methods typically rely on a single algorithm like AES or RSA,
SecureDataPro employs a diverse range of encryption techniques across the different file
segments. This multi-layered encryption approach ensures that even if one encryption
method is compromised, the other segments remain secure. This variation in encryption
provides a significant advantage over traditional systems, which can be more vulnerable
to breaches if their single encryption method is compromised. Attackers would need to
break through multiple encryption barriers to access the entire dataset, thereby increasing
the level of security and resilience against unauthorized access.
44
Fig 6.1: Comparison of Memory usage by AES, DES and RSA
45
RSA Consumes the Most Memory: Notably, the figure reveals that the RSA algorithm
consistently exhibits the highest memory usage across all text file sizes tested. This
characteristic is primarily attributed to the complex mathematical operations involved in
RSA encryption and decryption. As the size of the text file grows, the computational
demands on the system also increase, leading to a corresponding rise in memory
utilization.
AES and DES Show Lower Memory Usage: Conversely, both AES and DES
demonstrate significantly lower memory consumption compared to RSA. This is due to
their simpler key exchange and encryption/decryption processes. While AES offers a
strong balance between security and performance, DES is considered less secure by
modern standards. However, its inclusion in this comparison provides a valuable
reference point for understanding how memory usage can vary between different
encryption algorithms.
Memory Usage Implications: The memory usage variations depicted in Fig 6.1
have crucial implications for real-world applications. Resource-constrained
environments, such as mobile devices or embedded systems, may struggle with the high
memory demands of RSA, particularly when dealing with large files. In such scenarios,
AES or other memory-efficient algorithms might be more suitable choices.
SecureDataPro also brings adaptability and flexibility to data protection, which is
a major departure from traditional systems. Conventional methods can be rigid and less
effective against evolving cyber threats. SecureDataPro's methodology, with its
combination of file splitting and varied encryption, allows it to adapt to different data
types and environments, providing consistent protection regardless of the platform. This
adaptability is essential in a cybersecurity landscape where attackers are continually
developing new techniques to breach security systems.
The decentralized storage model employed by SecureDataPro also contrasts with
traditional systems, which typically rely on centralized storage. By splitting files and
storing them across multiple devices, SecureDataPro reduces the risk of large-scale data
breaches, ensuring that compromising one storage device does not compromise the entire
dataset. This approach not only enhances security but also optimizes storage utilization
and improves overall system performance.
46
Fig 6.2: Comparison of Output Byte used by AES, DES and RSA
Fig 6.2 presents a compelling finding related to the output byte size generated by
the encryption algorithms employed in our experiment. Notably, the figure demonstrates
that regardless of the text file size used, all three encryption algorithms (likely RSA, ECC,
and AES) produce the same output byte size. This outcome signifies a key characteristic
of these specific encryption algorithms – their ability to maintain a consistent output size
irrespective of the original file size.
47
This consistency in output byte size offers several advantages:
• Simplified Storage Management: With a predictable output size, storage
allocation and management become more streamlined. Knowing the exact amount
of storage required for each encrypted file, regardless of its original size,
simplifies storage planning and capacity allocation.
• Performance Optimization: Consistent output size can potentially contribute to
optimized encryption and decryption performance. By having a predefined output
size, the encryption and decryption processes can be tailored for efficiency,
potentially leading to faster processing times.
• Transparency and Predictability: The consistent output size enhances
transparency and predictability within the system. Users can anticipate the storage
requirements for encrypted files beforehand, fostering better planning and
resource allocation.
It's important to note that while consistent output size is a valuable attribute of these
specific algorithms, it's not a universal characteristic of all encryption methods. Some
encryption algorithms might generate variable output sizes depending on the original file
size.
When comparing outcomes, SecureDataPro's methodology demonstrates clear
superiority over traditional methods. The reduced risk of data breaches and enhanced
security from multi-layered encryption set a new standard for data protection. Traditional
systems, with their centralized storage and single-point encryption, offer less security and
resilience, making them more prone to modern cyber threats. SecureDataPro's approach,
with its decentralized storage, varied encryption techniques, and adaptable framework,
provides a robust and reliable solution for safeguarding sensitive data in a world where
cyber threats are increasingly sophisticated. This innovative approach sets a new
benchmark for comprehensive data protection, offering organizations a strong defense
against unauthorized access and other cyber threats.
48
CHAPTER 7
7.1 CONCLUSION
49
contributes an additional security layer, rendering it much more arduous for unapproved
individuals to decode encrypted data. The fragmented nature of the files and the variety
of encryption techniques used by SecureDataPro provide an extra line of protection,
guaranteeing the integrity and secrecy of sensitive data even in the event that one
encryption scheme is compromised.
In summary, SecureDataPro proves to be a useful resource for businesses and
people looking to safeguard their priceless data assets in a constantly changing digital
landscape. SecureDataPro creates a new benchmark in data security by merging file
splitting and encryption methods, providing a strong barrier against illegal access and
data breaches. With its creative methodology, SecureDataPro empowers users to
maintain control over their privacy and safeguard sensitive information, thereby
enhancing cybersecurity resilience in today's interconnected world.
SecureDataPro's innovative approach to data protection extends beyond
traditional security measures, offering a comprehensive solution to the evolving
challenges of cybersecurity. By integrating file splitting and multiple encryption
algorithms, SecureDataPro establishes a dynamic defense mechanism that adapts to the
complexities of modern data threats.
Organizing files into smaller, easier-to-manage segments improves data
management and lessens the chance of security incidents happening. The file splitting
method used by SecureDataPro makes sure that the integrity of the entire data structure
is preserved even in the event that one component of the file is compromised. By adding
an extra degree of security, this file fragmentation makes it much harder for unauthorized
individuals to access or alter important data.
Furthermore, SecureDataPro's use of multiple encryption algorithms enhances the
robustness of its security framework. By encrypting data with diverse algorithms such as
AES, RSA, and ECC, SecureDataPro ensures that encrypted files are safeguarded against
various cryptographic attacks. By strengthening data confidentiality and resilience
against illegal access, this multi-layered encryption strategy gives users piece of mind
that their information is safeguarded by cutting-edge cryptographic algorithms.
Furthermore, in addition to encryption, SecureDataPro's proactive defensive
approach includes methods for identifying and thwarting possible security risks.
SecureDataPro detects suspicious activity by ongoing monitoring and analysis, and it
takes proactive steps to stop data breaches before they happen. By taking a proactive
stance, businesses and people utilizing SecureDataPro can reduce the chance of data
exposure and improve their overall security posture.To sum up, SecureDataPro offers a
50
comprehensive solution that combines cutting-edge encryption algorithms and creative
file splitting techniques, thereby representing a paradigm change in data protection. In
the current digital environment, SecureDataPro gives consumers the ability to retain
control over their sensitive data by strengthening data security and resistance against
illegal access. Its strong security features and preemptive protection mechanisms,
SecureDataPro sets a new standard for data protection, ensuring the confidentiality and
integrity of data in an increasingly interconnected world.
51
blockchain can provide immutable data storage, enhancing data integrity and auditability.
Meanwhile, collaboration with quantum-safe encryption techniques can prepare
SecureDataPro for the era of quantum computing, ensuring data remains secure against
quantum-based attacks.Enhanced User Experience: Future iterations of SecureDataPro
can focus on improving user experience through intuitive interfaces, streamlined
workflows, and automation features. Enhancements in usability can encourage wider
adoption of SecureDataPro among users with varying levels of technical expertise.
Advanced Threat Detection: SecureDataPro can integrate advanced threat
detection mechanisms powered by AI and ML algorithms. By analyzing patterns and
anomalies in data access and usage, SecureDataPro can proactively identify and mitigate
potential security threats in real-time.Cross-Platform Compatibility: Future versions of
SecureDataPro can prioritize cross-platform compatibility, allowing seamless integration
with a wide range of devices and operating systems. This can include compatibility with
mobile devices, cloud platforms, and IoT devices, ensuring comprehensive data
protection across diverse environments.Regulatory Compliance: GDPR, CCPA, and
other new and developing data protection laws can be more easily complied with with
the help of SecureDataPro's enhanced functionality. Access control, audit logging, and
data governance are all integrated into SecureDataPro, which helps businesses stay
compliant with regulations and stay out of trouble.Secure Collaboration Tools:
SecureDataPro can expand its capabilities to include secure collaboration tools, enabling
encrypted file sharing and communication channels among authorized users. Integration
with collaborative platforms and communication tools can facilitate secure collaboration
while ensuring data privacy and confidentiality.
Scalability and Performance Optimization: As data volumes continue to grow
exponentially, SecureDataPro can focus on optimizing scalability and performance to
handle large-scale deployments effectively. This can involve enhancements in data
processing speed, scalability of encryption algorithms, and efficient resource utilization.
Continuous Research and Development: SecureDataPro can invest in continuous
research and development efforts to stay ahead of emerging cybersecurity threats and
technological advancements. By fostering a culture of innovation, SecureDataPro can
evolve its capabilities to address the evolving needs of users in an ever-changing digital
landscape.
Interoperability and Standardization: SecureDataPro can work towards
interoperability and standardization within the cybersecurity landscape. Collaborating
with industry stakeholders and standardization bodies can help establish common
52
protocols and interoperable solutions, fostering greater compatibility and ease of
integration with existing security infrastructure.
Technologies that Preserve Privacy: SecureDataPro can investigate technologies
that preserve privacy, like homomorphic encryption, differential privacy, and secure
multi-party computation, in light of the growing concerns around data privacy. These
methods create new opportunities for safe data sharing and collaboration by enabling data
analysis while protecting the privacy of sensitive information.
53
REFERENCES
[1] Seth, B., Dalal, S., Jaglan, V., Le, D. N., Mohan, S., & Srivastava, G. (2022). Integrating
encryption techniques for secure data storage in the cloud. Transactions on Emerging
Telecommunications Technologies, 33(4), e4108.
[2] Arora, A., Garg, H., & Shivani, S. (2023). Privacy protection of digital images using
watermarking and qr code-based visual cryptography. Advances in Multimedia, 2023.
[3] Malina, L., Dzurenda, P., Ricci, S., Hajny, J., Srivastava, G., Matulevičius, R., ... & Tang,
Q. (2021). Post-quantum era privacy protection for intelligent infrastructures. IEEE Access,
9, 36038-36077.
[4] Shi, Z., Oskolkov, B., Tian, W., Kan, C., & Liu, C. (2024). Sensor Data Protection Through
Integration of Blockchain and Camouflaged Encryption in Cyber-Physical Manufacturing
Systems. Journal of Computing and Information Science in Engineering, 24(7).
[5] Samanta, D., Alahmadi, A. H., Karthikeyan, M. P., Khan, M. Z., Banerjee, A., Dalapati, G.
K., & Ramakrishna, S. (2021). Cipher block chaining support vector machine for secured
decentralized cloud enabled intelligent IoT architecture. IEEE Access, 9, 98013-98025.
[6] Li, T., He, X., Jiang, S., & Liu, J. (2022). A survey of privacy-preserving offloading methods
in mobile-edge computing. Journal of Network and Computer Applications, 203, 103395.
[7] Pham, H., Woodworth, J., & Amini Salehi, M. (2019). Survey on secure search over
encrypted data on the cloud. Concurrency and Computation: Practice and Experience,
31(17), e5284.
[8] Thushara, G. A., & Bhanu, S. M. S. (2022, November). A Flexible and Adaptive Hybrid
Algorithm for Secure Data Sharing in Cloud Computing. In 2022 IEEE 19th India Council
International Conference (INDICON) (pp. 1-8). IEEE.
[9] Vijayakumar, A., & Jebaseeli, A. N. (2020). Pioneer approach of data deduplication to
remove redundant data from cloud storage. International Journal of Advanced Research in
Engineering and Technology (IJARET), 11(10), 535-544.
[10] Alkhalidy, M., Taha, M. B., Chowdhury, R., Ould-Slimane, H., Mourad, A., & Talhi,
C. (2023). Vehicular edge based approach for optimizing urban data privacy. IEEE
Sensors Journal.
54
APPENDIX 1
A CODING
def encrypt(filename):
file_size = os.path.getsize(filename)
chunked_size = file_size//2
act_file_name = filename.split('/')[-1]
os.mkdir(f'media/files/{act_file_name}')
fs = Split(inputfile=filename, outputdir=f'media/files/{act_file_name}')
fs.bysize(chunked_size)
aes_key = get_random_bytes(16)
fernet_key = Fernet.generate_key()
files = []
if file != 'manifest':
files.append(f'media/files/{act_file_name}/{file}')
f.write(aes_key)
f.write(fernet_key)
data = f.read()
55
cipher = AES.new(aes_key, AES.MODE_EAX)
file_out.close()
fernet = Fernet(fernet_key)
fer_data = f.read()
fer_enc_data = fernet.encrypt(fer_data)
f.write(fer_enc_data)
return f'media/files/{filename}'
aes_key = aes_key.read()
fernet_key = fernet_key.read()
files = []
if file != 'manifest':
files.append(f'media/files/{filename}/{file}')
56
with open(files[0], 'wb') as f:
f.write(data)
fernet_cipher = Fernet(fernet_key)
data = f.read()
original = fernet_cipher.decrypt(data)
f.write(original)
mg = Merge(inputdir=f'media/files/{filename}', outputdir='media/temp',
outputfilename=filename)
mg.merge(cleanup=False)
#shutil.rmtree(f'media/files/{filename}')
Decrypt HTML
{% extends "main.html" %}
{% block content %}
<div class='encrypt-form-container'>
{% csrf_token %}
<div>
57
<div>Enter AES key or Drag and Drop here</div>
</div>
<div>
</div>
</div>
</div>
<div>
</div>
<div>
</div>
</div>
</div>
</div>
58
</form>
{% if file_path %}
</div>
{% endif %}
<div class="pop-up">
<div class="pop-up-container">
<img src="https://s3-alpha-
sig.figma.com/img/76f0/6444/2813a914064d9f9ae3e780993b9ec8f4?Expires=1701043
200&Signature=IAa28Jnng78e7sgksF7J~4UgUcFa2APNfr4RHALvrLyOlLCn4MZx9q
Cxp9D~1IwUaG~OOTHxtSGT0tsj5z-
8AP0in9pPRT0AOJidxZMogZY0wPshzvTFHX1jLyODUymU9oYRI~G7cXOfxUUZ
15YhGVRJHYLFS-
~9ChtY0un~foV9jlQKYo180o2L~KrwcZe5ymHP6iRbSmEVzE0L9hYNnHBz-
DG9wOupGbBS13o8JCP4d2cpPpD4di6vpRfM43tg6srJADrehZjW-
smVgdHmUwOs2p~Tc9WbuGlk8cUXUiMug-
66dnT8krOaJdY8cedHSS4AXo8VYCSbC59jYbvTQA__&Key-Pair-
Id=APKAQ4GOSFWCVNEHN3O4 " alt="">
<h3>Success!</h3>
<button onclick="closePopUp()">Close</button>
59
</div>
</div>
</div>
<script>
function closePopUp(){
popup.style.display='none';
btn.addEventListener('click',function(){
popup.style.display="flex";
})
input.addEventListener('change', function () {
handleFiles(this.files, index);
});
});
e.preventDefault();
this.classList.add('drag-over');
});
60
area.addEventListener('dragleave', function () {
this.classList.remove('drag-over');
});
e.preventDefault();
this.classList.remove('drag-over');
handleFiles(index, e.dataTransfer.files);
});
});
function browseFiles(index) {
fileInputs[index].click();
uploadingFileDiv.classList.add('current-uploading-file');
<div>${file.name}</div>
<div class="progress-bar-outer">
<div class="progress-bar-inner"></div>
</div>`;
uploadingArea.appendChild(uploadingFileDiv);
61
}
let progress = 0;
progressDiv.querySelector('.progress-bar-inner').style.width = `${progress}%`;
clearInterval(interval);
}, 500);
uploadedFileDiv.classList.add('uploaded-file');
uploadedFileDiv.classList.add('on-decrypt');
uploadedFileDiv.innerHTML = `
<div class="file-info">
<div>${file.name}</div>
</div>
<div>Uploaded</div>`;
uploadingArea.appendChild(uploadedFileDiv);
62
// Remove the progress div
progressDiv.remove();
</script>
{% endblock content %}
Encrypt HTML
{% extends "main.html" %}
{% block content %}
<div class='encrypt-form-container'>
{% csrf_token %}
<div class='file-name-input'>
</div>
<div class="upload-container">
63
<img src="../media/images/feather_upload-cloud.svg" alt="">
<div>
</div>
<div>
</div>
</div>
<div class="uploading-area">
<div>Filename.txt</div>
<div class="progress-bar-outer">
<div class="progress-bar-inner"></div>
</div>
</div> -->
<div class="file-info">
<div>Filename.txt</div>
</div>
<div>Uploaded</div>
64
</div> -->
</div>
</div>
</form>
{% if enc %}
<h4>These keys are very important 2nd key will be required for 1st layer
decryption and 1st key will be required for the 2nd layer decryption</h4>
<div class="keys-container-inner">
<div class="headings-row">
<div>S.No.</div>
<div></div>
<div>Key Name</div>
<div class="delete-icon"></div>
<div></div>
<div class="download-heading">Download</div>
</div>
<div class="file-row">
<div class="s-no">1</div>
<div class="file-icon">
</div>
<div class="file-name">
65
RSA Key
</div>
<div></div>
<div></div>
<div class="key-download">
</div>
</div>
<div class="file-row">
<div class="s-no">2</div>
<div class="file-icon">
</div>
<div class="file-name">
</div>
<div></div>
<div></div>
<div class="key-download">
</div>
66
DECRYPT HTML
{% extends "main.html" %}
{% block content %}
<div class='encrypt-form-container'>
{% csrf_token %}
<div class='file-name-input'>
</div>
<div class="upload-container">
<div>
67
</div>
<div>
</div>
</div>
<div class="uploading-area">
<div>Filename.txt</div>
<div class="progress-bar-outer">
<div class="progress-bar-inner"></div>
</div>
</div> -->
<div class="file-info">
<div>Filename.txt</div>
</div>
<div>Uploaded</div>
</div> -->
</div>
</div>
</form>
68
{% if enc %}
<h4>These keys are very important 2nd key will be required for 1st layer
decryption and 1st key will be required for the 2nd layer decryption</h4>
<div class="keys-container-inner">
<div class="headings-row">
<div>S.No.</div>
<div></div>
<div>Key Name</div>
<div class="delete-icon"></div>
<div></div>
<div class="download-heading">Download</div>
</div>
<div class="file-row">
<div class="s-no">1</div>
<div class="file-icon">
</div>
<div class="file-name">
<div class="file-info">
<div>Filename.txt</div>
</div>
<div>Uploaded</div>
</div> -->
</div>
69
</div>
<div class="upload-container">
<div>
</div>
<div>
</div>
</div>
70
B CONFERENCE AND JOURNAL PUBLICATION DETAILS
71
72
73
C PLAGIARISM REPORT
74
75
76
77
APPENDIX 3
PLAGIARISM REPORT
1. RA2011030010084
3 Registration Number 2. RA2011030010096
3. RA2011030010074
4. RA2011030010082
1. 11/04/2002
4 Date of Birth 2. 23/05/2002
3. 28/12/2002
4. 14/08/2002
Dr. Manickam M
Associate Professor
9 Name and address of the Supervisor /Guide Department of Networking and Communications
College of Engineering and Technology
Kattankulanthur – 603203
[email protected] (9381051032)
78