Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
1K views89 pages

Major Signed

major report

Uploaded by

shahil
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1K views89 pages

Major Signed

major report

Uploaded by

shahil
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 89

SecureDataPro: Advanced Encryption and

Robust Data Chunking System


A PROJECT REPORT
Submitted by

Akshay Modi [Reg No: RA2011030010084]


Saksham [Reg No: RA2011030010074 ]
Sahil Singh[Reg No: RA2011030010096 ]
Ishaan Markanday [Reg No: RA2011030010082 ]
Under the Guidance of
DR. MANICKAM M
Assistant Professor
Department of Networking and Communications

in partial fulfillment of the requirements for the degree of

BACHELOR OF TECHNOLOGY
in
COMPUTER SCIENCE ENGINEERING
with specialization in CYBER SECURITY

DEPARTMENT OF NETWORKING AND COMMUNICATIONS


COLLEGE OF ENGINEERING AND TECHNOLOGY
SRM INSTITUTE OF SCIENCE AND TECHNOLOGY
KATTANKULATHUR- 603 203

MAY 2024
r

t)SJ~M
-··- INSTITUTE OF SCIENCE AND TECHNOLOGY
SRM KATTANKULATHUR-603 203 ·

BONAFIDE CERTIFICATE

Certt'fi1ed fior this project titled "SecureDataPro: Advanced Encrypion


t'
and
ta Chunking System" is the bonafide work of Akshay Modi' [R
Robust Da eg No:
RA 20ll030010084], Saksham [Reg No: RA2011030010074], Sahil Singh[Reg
No: RA2011030010096.1 and lshaan Markanday ~~eg No: RA20I 1030010082)
carried out the project work under my superv1s1on. Certified furth h
who
the best of my knowledge the work reported herein does not fonn any oth .
. . . er project
report or dissertation on the basts of which a degree or award was conferred on an
earlier occasion on this or any other candidate.

I
~,t\9 ~nd
~')\

!
0
Ka::jthur
3 \
"'o- ;g:
0
Assistant Professor "
p •SRM , • ...
Professor And Head
15
Department of Networking and
Communications, Department of Networking and
SRM INSTITUTE OF SClENCE Communications,
AND TECHNOLOGY SRM INSTITUTE OF SCIENCE
AND TECHNOLOGY

iii
l
l
ACKNOWLEDGEMENT

We express our humble gratitude to Dr. C. Muthamizhchelvan, Vice-Chancellor, SRM Institute of Science
and Technology, for the facilities extended for the project work and his continued support.

We extend our sincere thanks to Dean-CET, SRM Institute of Science and Technology, Dr.
T.V.Gopal, for his invaluable support.

We wish to thank Dr. Revathi Venkataraman, Professor & Chairperson, School of Computing,
SRM Institute of Science and Technology, for her support throughout the project work.

We are incredibly grateful to our Head of the Department, Dr. Annapurani K, Professor,
Department of Networking And Communications SRM Institute of Science and Technology, for her
suggestions and encouragement at all the stages of the project work.

We want to convey our thanks to our Project Coordinator, Dr. Deepa Thilak K, Associate Professor,
Panel Head, Dr. Manickam M, Assistant Professor and members, Dr. Kalaiselvi K, Associate Professor,
Dr. KA Varun Kumar, Assistant Professor, Department of Networking and Communications, SRM
Institute of Science and Technology, for their inputs during the project reviews and support.

We register our immeasurable thanks to our Faculty Advisor, Dr. Thanga Revathi S, Associate
Professor, Department of Networking and Communications, SRM Institute of Science and Technology, for
leading and helping us to complete our course.
Our inexpressible respect and thanks to our guide, Dr. Manickam M, Assistant Professor,
Department of Networking and Communications, SRM Institute of Science and Technology, for providing
us with an opportunity to pursue our project under his mentorship. He provided us with the freedom and
support to explore the research topics of our interest. His passion for solving problems and making a
difference in the world has always been inspiring.

We sincerely thank the Networking and Communications Department staff and students, SRM
Institute of Science and Technology, for their help during our project. Finally, we would like to thank parents,
family members, and friends for their unconditional love, constant support, and encouragement.

Akshay Modi[RA2011030010084]

Saksham[RA2011030010074]

Ishaan Markanday[RA2011030010082]

Sahil Singh[RA2011030010096]

iv
v
ABSTRACT

SecureDataPro revolutionizes data protection by pioneering a multifaceted approach that safeguards


user information. This innovative solution leverages a two-pronged strategy: file splitting and
diverse encryption algorithms. In the first line of defense, SecureDataPro fragments large files into
smaller, more manageable chunks. This fragmentation offers several advantages. It facilitates
efficient storage and transmission of data, particularly for voluminous files. More importantly, it
minimizes potential data exposure in the event of a security breach. Even if unauthorized parties
gain access to a single chunk, the remaining chunks would be protected, significantly reducing data
loss.
Beyond file splitting, SecureDataPro fortifies data security through multi-layered
encryption. Unlike conventional encryption methods that utilize a single algorithm, SecureDataPro
encrypts each individual chunk with a distinct encryption algorithm. This heterogeneity adds
significant complexity for potential attackers. Even if one encryption algorithm were compromised,
the remaining encrypted chunks would require cracking their respective algorithms, exponentially
increasing the effort and resources needed to breach the data. This multi-layered approach
significantly bolsters overall data security and offers a robust defense against unauthorized access
attempts.
In essence, SecureDataPro sets a new standard in data protection. By combining file splitting
with diverse encryption algorithms, it mitigates the risks associated with traditional data security
measures. This comprehensive approach empowers users to confidently store and share their
sensitive information in today's increasingly digital landscape. SecureDataPro stands as a testament
to ongoing advancements in data security, offering a reliable and effective solution for safeguarding
user privacy in the face of evolving cyber threats.

vi
TABLE OF CONTENTS

ABSTRACT vi

TABLE OF CONTENTS vii

LIST OF FIGURES ix

LIST OF TABLES x

ABBREVIATIONS 1

1 INTRODUCTION 2
1.1 About 3
1.2 Objectives 5
1.3 Scope 6
1.4 Problem Statement 8

2 LITERATURE SURVEY 11
2.1 Research Gap 13

3 METHODOLOGY OF ADVANCED ENCRYPTION AND


ROBUST DATA CHUNKING SYSTEM 15
3.1 Introduction to SecureDataPro 15
3.1.1 File Splitting for Enhanced Protection 16
3.1.2 Robust Defence Mechanism 17
3.1.3 Enhance Security Posture 17
3.1.4 Diverse Encryption Algorithms 17
3.1.5 Preprocessing Techniques in SecureDataPro 18
3.1.6 Benefits of SecureDataPro in Data Protection 20

4 SYSTEM DESIGN AND ARCHITECTURE OF ADVANCED


ENCRYPTION AND ROBUST DATA CHUNKING SYSTEM 22
4.1 System Architecture 22
4.2 Class Diagram 24
4.3 Use Case Diagram 25
4.4 DFD Diagram 26

vii
5 MODULES AND IMPLEMENTATION OF ADVANCED
ENCRYPTION AND DATA CHUNKING SYSTEM 27
5.1 Modules 27
5.1.1 File Splitting Module 27
5.1.2 Encryption Decryption Module 28
5.1.3 Data Integrity And Authentication Module 29
5.2 Implementation 30
5.2.1 Training Strategies for SecureDataPro Implementatiion 30
5.2.2 Encryption Algorithms used in SecureDataPro Implementation 31
5.3 User Interface 33
5.3.1 Home Page 33
5.3.2 Sign Up Page 34
5.3.3 Login Page 35
5.3.4 Encryption Page 36
5.3.5 File List Page 37
5.3.6 Decryption Page 38
5.3.7 Database 39

6 RESULTS AND DISCUSSIONS 41


6.1 Results 41
6.2 Comparison 44

7 CONCLUSION AND FUTURE ENHANCEMENT 49


7.1 Conclusion 49
7.2 Future Enhancement 51

REFERENCES 54
APPENDIX 55
A CODING 55
B CONFERENCE AND JOURNAL PUBLICATION 71
C PLAGIARISM REPORT 74

viii
LIST OF FIGURES

Figure No. Figure Name Page No.

3.1 Methodology of Advanced Encryption and Data Chunking

System 16

4.1 System Architecture of Advanced Encryption and Data

Chunking System 23

4.2 Class Diagram of Advanced Encryption and Data Chunking

System 24

4.3 Use Case Diagram of Advanced Encryption and Data Chunking

System 25

4.4 DFD Diagram of Advanced Encryption and Data Chunking

System 26

5.1 Home Page of SecureDataPro 34

5.2 Sign Up Page of SecureDataPro 35

5.3 Login Page of SecureDataPro 36

5.4 Encryption Page of SecureDataPro 37

5.5 File List Page of SecureDataPro 38

5.6 Decryption Page of SecureDataPro 39

5.7 Database 40
6.1 Comparison of Memory usage by AES, DES and RSA 45

6.2 Comparison of Output Byte used by AES, DES and RSA 47

ix
LIST OF TABLES

Table No Table Name Page No.

6.1 Comparison of various packet sizes for DES,AES & RSA algorithm 42

x
ABBREVIATIONS

FSA - File Splitting Algorithm

ECC - Elliptic Curve Cryptography

RSA - Rivest-Shamir-Adleman

HMAC - Keyed-Hashing for Message Authentication

CBC - Cipher Block Chaining

DH - Diffie-Hellman

PBKDF2 - Password-Based Key Derivation Function 2

MD5 - Message Digest Algorithm 5

AES - Advanced Encryption Standard

HMAC - Keyed-Hashing for Message Authentication

Bloom - Bloom Filter

XOR - Exclusive OR

SHA - Secure Hash Algorithm

DES - Data Encryption Standard

1
CHAPTER 1

INTRODUCTION

SecureDataPro is a cutting-edge data protection solution that introduces a pioneering approach


to safeguarding sensitive information through a unique combination of file splitting and diverse
encryption algorithms. By leveraging this innovative method, SecureDataPro ensures enhanced
security and privacy for files, enabling users to maintain control over their data in the digital
realm. Through the process of file splitting, the software divides large files into smaller, more
manageable chunks, making it hard for unauthorized users to access the entire file without proper
authorization. Additionally, SecureDataPro incorporates a variety of encryption algorithms to
further fortify the protection of these file chunks, ensuring that even if one encryption method is
compromised, the overall security of the data remains intact. This robust encryption approach
not only enhances data security but also provides users with peace of mind when storing or
sharing sensitive information. SecureDataPro stands out as a comprehensive data protection
solution that combines cutting-edge technologies to offer a high security and confidentiality for
all types of files.

Data protection is a critical aspect in the realm of cybersecurity, and innovative approaches are
continuously being developed to safeguard sensitive information from unauthorized access. One
such pioneering method is SecureDataPro, which emphasizes data protection through a unique
combination of file splitting and diverse encryption algorithms. This approach involves breaking
down a file into smaller chunks, thereby reducing the risk of exposing the entire dataset in the
event of a breach. Each fragment is then encrypted using a variety of encryption techniques,
enhancing the overall security of the data. By employing multiple encryption algorithms,
SecureDataPro ensures that even if one layer of protection is compromised, the rest of the data
remains secure. This multi-layered approach increases the complexity for potential attackers,
making it significantly more challenging to decrypt the information without proper authorization.
Additionally, the use of diverse encryption algorithms adds an extra level of security by
providing different levels of protection to each file chunk. Ultimately, SecureDataPro stands out
as an innovative solution that not only enhances data protection but also raises the bar for
cybersecurity practices, offering a robust defense mechanism against unauthorized access and
potential data breaches.

2
SecureDataPro presents a groundbreaking method of data protection by employing file splitting
and diverse encryption algorithms. One key encryption algorithm utilized in SecureDataPro is
AES, which is widely recognized for its efficiency and security in encrypting sensitive
information. AES operates with different key sizes, ensuring strong protection against potential
cyber threats. Another encryption algorithm featured in SecureDataPro is Rivest-Shamir-
Adleman (RSA), which utilizes both asymmetric and symmetric encryption techniques to
enhance data security. RSA's unique approach of using a public and private key pair adds an
extra layer of protection to the encrypted files, making it challenging for unauthorized users to
access the information. Additionally, SecureDataPro harnesses the power of Twofish encryption,
known for its robustness and resistance to cryptanalysis. Twofish's intricate key schedule and
encryption process make it an ideal choice for securing data through file splitting and encryption.
By employing a strategic combination of AES, RSA, and Twofish encryption algorithms,
SecureDataPro sets a new standard in data protection, prioritizing security and integrity in a
digital landscape fraught with potential risks. In today's digital world, the data proliferation
across various platforms and devices has underscored the critical importance of robust data
protection measures. In response to the escalating cybersecurity threats and the ever-increasing
volume of sensitive information, innovative solutions are imperative to safeguarding data
integrity and confidentiality. SecureDataPro emerges as a pioneering approach to address these
challenges, leveraging the combined power of file splitting and diverse encryption algorithms.
By breaking down files into smaller, more manageable chunks and encrypting them with multiple
encryption techniques, SecureDataPro offers a dynamic defense mechanism against
unauthorized access and potential data breaches. This introduction of advanced cryptographic
techniques not only enhances data security but also ensures the preservation of privacy in an era
characterized by heightened digital risks. SecureDataPro represents a paradigm shift in data
protection, setting new standards for safeguarding valuable information assets across diverse
digital environments.

1.1 ABOUT

SecureDataPro is a cutting-edge data protection solution that introduces a pioneering


approach to safeguarding sensitive information through a unique combination of file
splitting and diverse encryption algorithms. This innovative system aims to enhance data
security and privacy, providing users with greater control over their digital assets.

3
The concept behind SecureDataPro revolves around file splitting, a technique
where large files are broken into smaller, more manageable chunks. This approach not
only makes it difficult for unauthorized users to access the entire file but also facilitates
a robust encryption process. The smaller file chunks are individually encrypted using a
variety of encryption algorithms, adding an extra layer of security to each piece. This
multi-layered encryption ensures that even if one part of the system is compromised, the
rest of the data remains secure.

SecureDataPro incorporates a range of encryption algorithms, including Advanced


Encryption Standard (AES), Rivest-Shamir-Adleman (RSA), and Twofish, each with
unique characteristics that contribute to the system's overall robustness. AES, with its
different key sizes, is well-known for its efficiency and strength, while RSA's asymmetric
encryption adds a layer of security through public and private key pairs. Twofish, known
for its complex key scheduling, is resistant to cryptanalysis. The combination of these
diverse algorithms creates a comprehensive protection scheme that secures each file
chunk, ensuring the integrity and confidentiality of sensitive information.

The application of multiple encryption methods within SecureDataPro serves as a


dynamic defense mechanism. If one algorithm is compromised, the others remain intact,
maintaining the security of the data. This flexibility allows users to securely store and
share sensitive information, confident that their data is protected from unauthorized
access.

As the digital landscape continues to evolve and cyber threats become increasingly
sophisticated, SecureDataPro's innovative approach to data protection offers a robust
solution to safeguard valuable information. The strategic combination of file splitting and
diverse encryption algorithms not only enhances data security but also raises the bar for
cybersecurity practices. SecureDataPro stands out as a comprehensive data protection
solution that prioritizes security and confidentiality, providing a high level of protection
against potential data breaches and unauthorized access.

This unique approach to data protection, where file splitting and multi-layered encryption
meet, represents a significant advancement in cybersecurity. By leveraging these
technologies, SecureDataPro establishes itself as a leading solution for secure data

4
storage and transmission, offering peace of mind in a world where data security is
paramount.

1.2 OBJECTIVES

SecureDataPro represents a groundbreaking endeavor to redefine data protection


methodologies by amalgamating two key strategies: file splitting and diverse encryption
algorithms. By breaking down files into smaller components and applying multiple
encryption techniques, SecureDataPro aims to fortify data security and confidentiality.
This innovative approach not only amplifies the complexity of data protection measures
but also serves as a formidable deterrent against potential adversaries seeking
unauthorized access. Through the utilization of varied encryption algorithms,
SecureDataPro enhances the resilience of data encryption, making it more challenging
for attackers to breach sensitive information without the requisite decryption keys.
Furthermore, SecureDataPro addresses the evolving landscape of digital threats by
offering users a robust solution tailored to the demands of an increasingly digitized world.
By fostering a multidimensional defense mechanism, SecureDataPro empowers
individuals and organizations to safeguard their data assets effectively, mitigating risks
associated with unauthorized access and breaches. Overall, SecureDataPro emerges as a
pioneering solution poised to elevate data protection standards and ensure the integrity
and confidentiality of sensitive information in contemporary digital
environments.SecureDataPro stands as a revolutionary initiative reshaping the landscape
of data protection methodologies through the fusion of two pivotal strategies: file splitting
and diverse encryption algorithms. By decomposing files into smaller, more manageable
components and employing a spectrum of encryption techniques, SecureDataPro strives
to reinforce the fortifications of data security and confidentiality. This innovative
amalgamation not only amplifies the intricacies of data protection measures but also acts
as a formidable barrier against potential adversaries seeking unauthorized access.
Through the adoption of diverse encryption algorithms, SecureDataPro bolsters the
robustness of data encryption, presenting a formidable challenge for attackers attempting
to breach sensitive information without access to the requisite decryption keys. Moreover,
SecureDataPro is designed to adapt to the evolving landscape of digital threats, offering
users a resilient solution tailored to the demands of an increasingly digitized world. By

5
fostering a multidimensional defense mechanism, By reducing the dangers of data
breaches and illegal access, SecureDataPro enables both people and businesses to
efficiently protect their data assets. In the end, SecureDataPro proves to be a ground-
breaking solution ready to raise the bar for data security and guarantee the confidentiality
and integrity of critical data in modern digital settings..

1.3 SCOPE

SecureDataPro is poised to revolutionize the landscape of data protection through its


pioneering approach, which seamlessly integrates file splitting and diverse encryption
algorithms. At its core, the project endeavors to bolster security measures by fragmenting
files into smaller, more manageable chunks. This strategy serves as a formidable defense
mechanism, as it ensures that even if one portion of a file is compromised, the remaining
segments remain inaccessible to unauthorized parties. Furthermore, SecureDataPro
enhances data security by employing a diverse array of encryption algorithms, each
applied to individual file fragments. This multi-layered encryption scheme significantly
heightens the complexity of data protection, rendering decryption attempts by malicious
actors exceedingly difficult.

By amalgamating file splitting with multiple encryption techniques, SecureDataPro


represents a paradigm shift in the realm of data protection. Its innovative approach not
only fortifies the security of sensitive information but also underscores its status as a
cutting-edge technology poised to address the evolving challenges of data security in
today's digital landscape. As organizations and individuals increasingly grapple with the
threat of data breaches and cyberattacks, SecureDataPro emerges as a beacon of
innovation, offering a robust solution tailored to the demands of a rapidly evolving
cybersecurity landscape.

The scope for SecureDataPro's application and impact in the realm of data protection is
vast and promising. With its innovative approach integrating file splitting and diverse
encryption algorithms, SecureDataPro has the power to address a many range of
cybersecurity challenges across various industries and use cases. One key aspect of its
scope lies in its adaptability to diverse environments, including but not limited to cloud

6
computing, IoT devices, and mobile applications. SecureDataPro's versatility enables it
to safeguard data across different platforms and devices, ensuring comprehensive
protection for organizations and individuals alike. Additionally, as data volumes continue
to escalate exponentially, SecureDataPro's robust file splitting techniques and encryption
algorithms position it as a scalable solution capable of handling large datasets effectively.
Moreover, as regulatory requirements around data privacy and security become
increasingly stringent, SecureDataPro offers a proactive approach to compliance,
assisting organizations in meeting regulatory standards and avoiding potential penalties.
Furthermore, as the cybersecurity landscape evolves with emerging threats and
technologies, SecureDataPro's continuous innovation and adaptability ensure its
relevance and effectiveness in safeguarding sensitive information. Overall, the scope for
SecureDataPro extends across various industries and scenarios, providing a versatile and
comprehensive solution to the complex challenges of data protection in the digital age.

SecureDataPro's scope extends beyond traditional data protection measures, offering


opportunities for innovation and advancement in several key areas. One significant aspect
of its scope lies in its potential to revolutionize secure data sharing and collaboration. By
providing robust encryption and file splitting capabilities, SecureDataPro enables secure
sharing of sensitive information among authorized users, even in decentralized or
distributed environments. This opens up possibilities for collaborative research, data
sharing agreements, and cross-organizational collaborations while maintaining data
privacy and confidentiality.

In addition, SecureDataPro's reach can improve data security in cutting-edge


technologies like edge computing and the Internet of Things (IoT). In these contexts,
where connected devices are commonplace and edge computing is becoming more and
more important for processing data in real time, SecureDataPro can be extremely helpful
in guaranteeing data confidentiality and integrity. SecureDataPro can guard sensitive data
generated and processed at the edge, preventing unwanted access and data breaches, by
putting its file splitting and encryption techniques into practice.

Moreover, SecureDataPro's scope encompasses opportunities for integration with


artificial intelligence (AI) and machine learning (ML) systems. By leveraging its
advanced encryption algorithms and secure data handling capabilities, SecureDataPro
can support the development and deployment of AI models in sensitive domains such as

7
healthcare, finance, and cybersecurity. This integration ensures that AI systems can
operate on encrypted data securely, preserving privacy while deriving insights and
making predictions.

The scope of SecureDataPro also includes enabling safe cloud environment data
management and storage. With the growing number of enterprises depending on cloud
services for data processing and storage, SecureDataPro can offer an additional security
layer to enhance the capabilities of current cloud security protocols. SecureDataPro
improves data safety and resilience against cloud-based dangers including data breaches
and illegal access by encrypting data before storing it in the cloud and using its file
splitting algorithms to distribute data over many storage locations.

Overall, the scope for SecureDataPro is expansive, encompassing a wide range of


applications and scenarios where data protection and privacy are paramount. By
leveraging its innovative approach to data security, SecureDataPro has the potential to
drive advancements in cybersecurity and enable secure digital transformation across
industries and domains.

1.4 PROBLEM STATEMENT

SecureDataPro stands at the forefront of data protection innovations, offering a


revolutionary solution that secures sensitive information through a combination of file
splitting and diverse encryption algorithms. This groundbreaking approach fundamentally
transforms data security measures by decentralizing information, fragmenting it into
smaller, more manageable chunks. Each of these chunks undergoes encryption through a
variety of algorithms, creating multiple layers of defense against unauthorized access.

By leveraging file splitting techniques alongside diverse encryption algorithms,


SecureDataPro establishes a robust shield against potential data breaches. This
comprehensive defense mechanism not only fortifies security measures but also mitigates
vulnerabilities inherent in centralized data storage systems. Through its innovative
methodology, SecureDataPro sets a new benchmark for data protection standards,
prioritizing maximum security and resilience in an ever-evolving digital landscape.

8
In an era marked by escalating cyber threats and sophisticated hacking techniques,
SecureDataPro emerges as a beacon of innovation, offering a proactive solution to safeguard
sensitive information. Its pioneering approach not only addresses existing security concerns
but also anticipates future challenges, positioning organizations and individuals to navigate
the complexities of data security with confidence and peace of mind.SecureDataPro's
groundbreaking approach to data protection represents a paradigm shift in cybersecurity,
offering a revolutionary solution that combines file splitting and diverse encryption
algorithms to safeguard sensitive information. At the heart of SecureDataPro's innovation
lies its decentralization of data, achieved through the fragmentation of files into smaller,
more manageable chunks. This decentralized approach enhances security by reducing the
impact of potential breaches, as compromising one chunk does not compromise the integrity
of the entire dataset.

Moreover, SecureDataPro's use of diverse encryption algorithms adds layers of complexity


to the security framework, making it significantly more challenging for unauthorized parties
to access or decipher the encrypted data. By employing a variety of encryption techniques,
including symmetric and asymmetric encryption algorithms, SecureDataPro ensures that
encrypted data remains secure against a wide range of cyber threats.

The integration of file splitting techniques and diverse encryption algorithms in


SecureDataPro not only fortifies security measures but also addresses vulnerabilities
associated with centralized data storage systems. By decentralizing information and
dispersing it across multiple chunks, SecureDataPro reduces the risk of data exposure and
minimizes the potential impact of security incidents.

Furthermore, SecureDataPro's proactive approach to data protection anticipates future


challenges in the rapidly evolving cybersecurity landscape. By staying ahead of emerging
threats and evolving its security measures accordingly, SecureDataPro empowers
organizations and individuals to navigate the complexities of data security with confidence
and peace of mind.

In conclusion, SecureDataPro stands as a beacon of innovation in the field of data protection,


offering a comprehensive solution that prioritizes maximum security and resilience. Its
pioneering approach not only addresses current security concerns but also sets a new
benchmark for data protection standards, ensuring the confidentiality and integrity of

9
sensitive information in an increasingly digitized world. Through its innovative
methodology, SecureDataPro equips stakeholders with the tools and capabilities needed to
safeguard their data assets effectively and navigate the challenges of cybersecurity with
confidence

10
CHAPTER 2

LITERATURE SURVEY

1. Seth, B., Dalal, S., Jaglan, V., Le, D. N., Mohan, S., & Srivastava, G. (2022). Integrating
encryption techniques for secure data storage in the cloud. Transactions on Emerging
Telecommunications Technologies, 33(4), e4108.
Seth, B., Dalal, S., Jaglan, V., Le, D. N., Mohan, S., & Srivastava, G. (2022) present their
innovative approach in their recent article on integrating encryption techniques for secure data
storage in the cloud. Their work, titled "SecureDataPro: Advanced Encryption and Robust Data
Chunking System," focuses on enhancing data security through a combination of file splitting
and diverse encryption algorithms. Published in Transactions on Emerging Telecommunications
Technologies, this research highlights the importance of implementing advanced encryption
strategies for protecting sensitive data stored in cloud environments.
2. Arora, A., Garg, H., & Shivani, S. (2023). Privacy protection of digital images using
watermarking and qr code-based visual cryptography. Advances in Multimedia, 2023.
Arora, A., Garg, H., & Shivani, S. (2023) in their research article titled "Privacy protection of
digital images using watermarking and QR code-based visual cryptography" published in
Advances in Multimedia, 2023, propose innovative methods for safeguarding digital image
privacy. Their study explores the combination of watermarking and QR code-based visual
cryptography to enhance data protection measures. This research contributes to the advancement
of privacy preservation techniques in the digital realm, offering valuable insights for further
developments in the field.
3. Malina, L., Dzurenda, P., Ricci, S., Hajny, J., Srivastava, G., Matulevičius, R., ... & Tang, Q.
(2021). Post-quantum era privacy protection for intelligent infrastructures. IEEE Access, 9,
36038-36077.
Malina et al. (2021) present a pioneering approach called SecureDataPro for data protection in
the post-quantum era. This innovative method involves file splitting and utilizing diverse
encryption algorithms to safeguard intelligent infrastructures and ensure privacy. The proposed
technique in their study, published in IEEE Access, focuses on enhancing security measures for
data transmission and storage within advanced technological environments. With a
comprehensive framework that addresses the challenges of the evolving threat landscape,
SecureDataPro offers a robust solution for protecting sensitive information in modern systems.
4. Shi, Z., Oskolkov, B., Tian, W., Kan, C., & Liu, C. (2024). Sensor Data Protection Through

11
Integration of Blockchain and Camouflaged Encryption in Cyber-Physical Manufacturing
Systems. Journal of Computing and Information Science in Engineering, 24(7).
Shi, Z., Oskolkov, B., Tian, W., Kan, C., and Liu, C. (2024) proposed a novel approach in their
research article titled "Sensor Data Protection Through Integration of Blockchain and
Camouflaged Encryption in Cyber-Physical Manufacturing Systems" published in the Journal of
Computing and Information Science in Engineering. The study introduces SecureDataPro, a
pioneering method that focuses on data protection through file splitting and the utilization of
diverse encryption algorithms. This innovative approach aims to enhance security measures in
cyber-physical manufacturing systems by combining blockchain technology with camouflaged
encryption techniques.
5. Samanta, D., Alahmadi, A. H., Karthikeyan, M. P., Khan, M. Z., Banerjee, A., Dalapati, G.
K., & Ramakrishna, S. (2021). Cipher block chaining support vector machine for secured
decentralized cloud enabled intelligent IoT architecture. IEEE Access, 9, 98013-98025.
Samanta, D., Alahmadi, A. H., Karthikeyan, M. P., Khan, M. Z., Banerjee, A., Dalapati, G. K.,
& Ramakrishna, S. (2021) proposed a Cipher Block Chaining Support Vector Machine for
Secured Decentralized Cloud Enabled Intelligent IoT Architecture. This innovative approach
was presented in the IEEE Access journal. The study focuses on enhancing data protection in
IoT environments by utilizing advanced encryption techniques. The research highlights the
importance of secure decentralized cloud architecture in ensuring the confidentiality and integrity
of sensitive information.
6. Li, T., He, X., Jiang, S., & Liu, J. (2022). A survey of privacy-preserving offloading methods
in mobile-edge computing. Journal of Network and Computer Applications, 203, 103395.Li, T.,
He, X., Jiang, S., & Liu, J. (2022) conducted a survey on privacy-preserving offloading methods
in mobile-edge computing, as published in the Journal of Network and Computer Applications.
Their research delves into cutting-edge strategies that maintain data security during offloading
processes. This study sheds light on the pivotal role of privacy preservation in enhancing mobile-
edge computing efficiency and security. Their findings offer valuable insights for developing
novel approaches in data protection for mobile-edge environments.
7. Pham, H., Woodworth, J., & Amini Salehi, M. (2019). Survey on secure search over encrypted
data on the cloud. Concurrency and Computation: Practice and Experience, 31(17), e5284.
Pham, H., Woodworth, J., & Amini Salehi, M. (2019) conducted a survey on secure search over
encrypted data on the cloud. The study, published in Concurrency and Computation: Practice
and Experience, explores the challenges and strategies for ensuring data security in cloud
environments. The researchers highlight the importance of utilizing diverse encryption
algorithms and file splitting techniques to protect sensitive information effectively. Their work

12
contributes to the advancement of secure data management practices in cloud computing.
8. Thushara, G. A., & Bhanu, S. M. S. (2022, November). A Flexible and Adaptive Hybrid
Algorithm for Secure Data Sharing in Cloud Computing. In 2022 IEEE 19th India Council
International Conference (INDICON) (pp. 1-8). IEEE.
Thushara, G. A., & Bhanu, S. M. S. (2022) presented a flexible and adaptive hybrid algorithm
aimed at enhancing secure data sharing in cloud computing in their paper titled "A Flexible and
Adaptive Hybrid Algorithm for Secure Data Sharing in Cloud Computing" presented at the 2022
IEEE 19th India Council International Conference (INDICON). This pioneering approach
combines file splitting and diverse encryption algorithms, collectively known as SecureDataPro,
to bolster data protection measures. Through this innovative method, the authors aim to address
the growing concerns related to data security and confidentiality in cloud computing
environments.
9. Vijayakumar, A., & Jebaseeli, A. N. (2020). Pioneer approach of data deduplication to remove
redundant data from cloud storage. International Journal of Advanced Research in Engineering
and Technology (IJARET), 11(10), 535-544.
Vijayakumar, A., & Jebaseeli, A. N. (2020) introduced a pioneering approach to data
deduplication in cloud storage, aimed at removing redundant data efficiently. Their work,
published in the International Journal of Advanced Research in Engineering and Technology
(IJARET), details a novel method to streamline storage and enhance data security measures
through innovative techniques.
10. Alkhalidy, M., Taha, M. B., Chowdhury, R., Ould-Slimane, H., Mourad, A., & Talhi, C.
(2023). Vehicular edge based approach for optimizing urban data privacy. IEEE Sensors Journal.
Alkhalidy et al. (2023) propose a vehicular edge-based approach to optimize urban data privacy
in their study published in IEEE Sensors Journal. Their work discusses the use of SecureDataPro,
a pioneering method that employs file splitting and diverse encryption algorithms for enhanced
data protection.

2.1 RESEARCH GAP


Current research in data protection has focused on traditional encryption methods,
emphasizing the strength of individual encryption techniques and network security
measures. While these approaches are effective to an extent, they suffer from critical
vulnerabilities: once an encryption key is compromised, the entire dataset becomes
vulnerable to unauthorized access. Additionally, current solutions typically encrypt entire
datasets without subdividing them, leading to single points of failure and larger attack

13
surfaces. This leaves many existing systems exposed to sophisticated attacks that can
break through conventional encryption barriers or leverage weaknesses in network
security.

Your research with SecureDataPro addresses this gap by introducing a novel strategy that
combines file splitting with a variety of encryption techniques. This approach reduces the
risk of exposing the entire dataset in the event of a security breach by breaking it into
smaller, more manageable chunks, each independently encrypted with a different
technique. This method creates a multi-layered defense, ensuring that even if one
encryption method is compromised, the other parts of the data remain secure. The use of
varied encryption techniques decreases the likelihood of successful attacks, as attackers
would need to breach multiple encryption layers to access the full dataset.

Furthermore, the file-splitting method reduces the attack surface by limiting the impact
of breaches to smaller data segments, increasing the overall security of the system. This
unique approach offers a stronger protection mechanism against unauthorized access and
cyberattacks, providing a more reliable and resilient solution for safeguarding sensitive
information in today's digital age. SecureDataPro's strategy, thus, fills a critical gap in
existing research by offering a more robust and flexible data protection solution that
adapts to evolving cyber threats.

14
CHAPTER 3

METHODOLOGY OF ADVANCED ENCRYPTION


AND ROBUST DAT
A CHUNKING SYSTEM

3.1 Introduction to SecureDataPro

SecureDataPro revolutionizes data protection by employing a novel approach that


combines file splitting and diverse encryption algorithms. This innovative technique
significantly enhances security and privacy for users by breaking files into smaller, more
manageable chunks and encrypting them using various cryptographic techniques.
The process begins with SecureDataPro breaking down files into smaller chunks, which
are then individually encrypted using a mix of encryption algorithms. By employing
diverse encryption methods, such as AES, RSA, and ECC, SecureDataPro ensures that
even if one encryption algorithm is compromised, the overall security of the data remains
intact. Because of the additional complexity brought forth by this multi-layered
encryption technique, it is very difficult for unauthorized parties to access sensitive data.
Moreover, the file splitting function of SecureDataPro guarantees that the
remainder of the encrypted file is safe even in the event that one portion is compromised.
This granular approach to data protection reduces the risk of data loss or exposure and
lessens the effect of possible breaches.
The result is an advanced level of data protection that instills confidence in users
to store and share their files securely. With SecureDataPro, users can rest assured that
their sensitive information is safeguarded using cutting-edge encryption methods, setting
a new standard in data security and privacy.
In essence, SecureDataPro represents a paradigm shift in data protection, offering
a comprehensive solution that addresses the evolving challenges of cybersecurity. Its
innovative approach not only enhances security but also reinforces user privacy, making
it an indispensable tool for individuals and organizations alike seeking robust data
protection in an increasingly digital world.

15
Fig 3.1 Methodology of Advanced Encryption and Data Chunking System

Fig 3.1 depicts a simplified illustration of the SecureDataPro data protection


process. SecureDataPro leverages a two-pronged approach that combines file chunking
and multiple encryption algorithms to safeguard data.
In the first step, a file is signified by the document icon labelled "File". This file is then
divided into manageable chunks, represented by the arrow labelled "Split into Chunks".
Subsequently, these chunks are encrypted using a blend of encryption algorithms,
represented by the rectangular box labelled "Encrypt with Diverse Algorithms (AES,
RSA, ECC)". The now encrypted chunks are then stored securely in the secure storage
This secure storage could be a physical device or a cloud-based storage system.In
conclusion, SecureDataPro employs a multifaceted approach to data security by
fragmenting files into chunks and encrypting them with various algorithms. This strategy
aims to guarantee that even if one encryption layer is compromised, the remaining data
chunks are shielded.

3.1.1 File Splitting for Enhanced Data Protection


The way that SecureDataPro protects data using file splitting and a variety
of encryption algorithms is a major improvement in the security of sensitive data.
Now let's examine more closely at the many facets of SecureDataPro's approach
and how they improve data security:

16
SecureDataPro breaks down files into smaller, more manageable chunks. This
process reduces the risk of a single point of failure by dispersing the data across
multiple chunks.By splitting files, SecureDataPro minimizes the impact of
potential breaches. Even if one chunk is compromised, the exposure is limited to
that specific portion of the data, rather than the entire file.This granular approach
to data storage and protection enhances resilience against unauthorized access and
data manipulation.SecureDataPro encrypts every data piece separately using a
range of encryption techniques. Industry-standard techniques like Rivest-Shamir-
Adleman (RSA), Advanced Encryption Standard (AES), and Elliptic Curve
Cryptography (ECC) might be included in these algorithms.Using a variety of
encryption algorithms increases the process' complexity and makes it much harder
for bad actors to decode the data.The confidentiality and integrity of the data are
maintained even in the event that one encryption scheme is broken because the
other encrypted portions are safe.

3.1.2 Robust Defense Mechanism:


The combination of file splitting and diverse encryption algorithms creates
a robust defense mechanism against unauthorized access and data breaches.By
dispersing data across multiple encrypted chunks and employing various
encryption techniques, SecureDataPro establishes multiple layers of protection.
This multi-layered approach significantly improves data protection and
confidentiality, reducing the likelihood of successful attacks and mitigating the
impact of potential breaches.

3.1.3 Enhanced Security Posture:


Organizations that implement SecureDataPro can enhance their security
posture by adopting an innovative approach to data protection.By leveraging file
splitting and diverse encryption algorithms, organizations can safeguard sensitive
information more effectively, thereby reducing the risk of data loss, theft, or
exposure.Organizations may comply with industry standards and strict regulatory
requirements for data security and privacy by using SecureDataPro.

3.1.4 Diverse Encryption Algorithms in SecureDataPro

• Advanced Encryption Standard (AES):

17
Symmetric encryption technology AES is well-known for its strong
security characteristics and broad use in many different applications.AES is used
by SecureDataPro to symmetrically encrypt the data in each chunk. This indicates
that encryption and decryption are accomplished using the same key.Because of
its powerful encryption capabilities, AES is immune to cryptographic and brute-
force attacks.By employing AES, SecureDataPro ensures that data within each
chunk is securely encrypted, providing a solid foundation for data protection.

• Rivest-Shamir-Adleman (RSA):
RSA is a public-key encryption algorithm that relies on asymmetric key
pairs (public and private keys) for encryption and decryption.SecureDataPro uses
asymmetric key distribution with RSA to improve data security. The matching
private key is used for decryption, and the public key is used for encryption.
Strong security guarantees are provided by RSA, especially in situations where
parties must exchange keys securely.SecureDataPro improves the security of data
storage and transmission by integrating RSA into its encryption framework,
particularly in situations involving secure communication channels.

• Elliptic Curve Cryptography (ECC):


ECC is a public-key encryption algorithm known for its efficiency and
suitability for resource-constrained environments.SecureDataPro employs ECC
to further strengthen its security framework, particularly in scenarios where
efficient encryption with smaller key sizes is essential.ECC offers comparable
security to traditional public-key encryption algorithms like RSA but
significantly smaller key , making it ideal for applications where resource
efficiency is critical.By integrating ECC into its encryption methodology,
SecureDataPro ensures that data protection is optimized for environments with
limited computational resources or bandwidth.

3.1.5 Pre-processing Techniques in SecureDataPro

In SecureDataPro, four key pre-processing techniques are utilized to


enhance data protection through file splitting and diverse encryption algorithms.

18
Firstly, data normalization ensures uniformity in the format and structure of input
data, optimizing the efficiency of subsequent encryption processes. Secondly,
data tokenization segments the input data into smaller chunks, facilitating easier
management and encryption of individual components. Thirdly, data cleansing
removes any inconsistencies or extraneous elements from the input data, ensuring
that only relevant and valid information is processed for encryption. Finally, data
compression reduces the size of the input data, thereby improving storage
efficiency and speeding up encryption and decryption processes. By incorporating
these pre-processing techniques, SecureDataPro streamlines data protection
efforts, enhances encryption security, and provides a pioneering approach to
safeguarding sensitive information through a combination of file splitting and
diverse encryption algorithms.In SecureDataPro, the integration of four key pre-
processing techniques plays a pivotal role in fortifying data protection through a
combination of file splitting and diverse encryption algorithms. Firstly, data
normalization ensures that input data maintains uniformity in format and
structure, optimizing subsequent encryption processes for efficiency. This
standardization streamlines encryption procedures, contributing to smoother
operations and consistent results. Secondly, data tokenization segments the input
data into smaller, more manageable chunks, simplifying the management and
encryption of individual components. This segmentation enhances data security
by dispersing sensitive information across multiple encrypted chunks, minimizing
the impact of potential breaches. Thirdly, data cleansing eliminates
inconsistencies and extraneous elements from the input data, ensuring that only
relevant and valid information undergoes encryption. This purification process
enhances the integrity of the encrypted data, reducing the risk of errors or
vulnerabilities. Finally, data compression reduces the size of the input data,
enhancing storage efficiency and expediting encryption and decryption processes.
By reducing data volume without compromising security, SecureDataPro
optimizes resource utilization and enhances overall system performance.
Collectively, these pre-processing techniques streamline data protection efforts,
fortify encryption security, and establish SecureDataPro as a pioneering solution
for safeguarding sensitive information in today's digital landscape.Furthermore,
the integration of these pre-processing techniques in SecureDataPro not only
enhances data protection but also contributes to the overall effectiveness and
efficiency of the encryption process. Data normalization ensures that regardless

19
of the original format or structure of the input data, SecureDataPro can
consistently apply encryption algorithms, thus optimizing performance and
reducing the errors. Data tokenization not only facilitates easier management of
data chunks but also enhances security by reducing the exposure of sensitive
information within each individual segment. This segmentation strategy not only
improves security but also facilitates easier management and retrieval of
encrypted data. Furthermore, by eliminating any anomalies or superfluous
components that can jeopardize the encrypted data's security, data cleansing is
essential to guaranteeing the quality and integrity of the data.. By purifying the
input data before encryption, SecureDataPro minimizes the risk of vulnerabilities
and enhances the reliability of the encrypted data. Finally, data compression not
only reduces storage requirements but also speeds up encryption and decryption
processes, thus enhancing overall system performance. This optimization of
resource utilization contributes to a more efficient and scalable data protection
solution, making SecureDataPro a pioneering approach in safeguarding sensitive
information through file splitting and diverse encryption algorithms.

3.1.6 Benefits of SecureDataPro in Data Protection

SecureDataPro offers numerous benefits in data protection through its


pioneering approach of file splitting and diverse encryption algorithms. Firstly, it
enhances security by dividing files into smaller chunks, reducing the risk of a
single point of failure. Secondly, the diverse encryption algorithms used by
SecureDataPro ensure robust protection against various cyber threats, enhancing
the overall resilience of the data. Furthermore, the approach adds an extra layer
of complexity, making it challenging for unauthorized users to access or decipher
the data even if they manage to breach one encryption layer. Additionally,
SecureDataPro enables efficient data management by allowing for easier storage,
transfer, and organization of encrypted files. Lastly, the innovative approach of
SecureDataPro provides a scalable solution that can be adapted to different types
of data protection needs, offering flexibility and customization for organizations
seeking a comprehensive data security solution.SecureDataPro stands out as a
groundbreaking solution in data protection, offering a multitude of benefits
through its innovative approach of file splitting and diverse encryption
algorithms. First off, SecureDataPro greatly improves security by lowering the

20
possibility of a single point of failure by dividing files into smaller, easier-to-
manage pieces. By limiting the impact of any breaches, this granular method
makes sure that even if one section of the file is compromised, the rest of it is safe.
Second, using a variety of encryption techniques strengthens data security and
offers strong protection against different online attacks. These algorithms, which
provide many layers of encryption, make it extremely difficult for unauthorized
users to access or decode the data. Examples of these algorithms are Elliptic Curve
Cryptography (ECC), Rivest-Shamir-Adleman (RSA), and Advanced Encryption
Standard (AES). Furthermore, even in the event that malevolent actors are able to
break through one encryption layer, SecureDataPro's methodology introduces an
additional degree of complexity, making it difficult for them to jeopardize
important data. This multi-layered security framework ensures comprehensive
protection for valuable data assets.

Furthermore, SecureDataPro offers significant advantages in efficient data


management. By splitting files into smaller chunks, SecureDataPro facilitates
easier storage, transfer, and organization of encrypted files. This streamlined data
management process not only improves operational efficiency but also enhances
accessibility and retrieval of encrypted data when needed. Additionally,
SecureDataPro's innovative approach provides scalability and adaptability to
meet diverse data protection needs. Whether securing sensitive documents,
financial records, or multimedia files, SecureDataPro offers flexibility and
customization, allowing organizations to tailor their data security measures
according to specific requirements.

Overall, SecureDataPro represents a paradigm shift in data protection,


offering unparalleled security, efficiency, and flexibility. Its pioneering approach
of file splitting and diverse encryption algorithms sets a new standard in
safeguarding sensitive information, empowering organizations to mitigate risks,
comply with regulatory requirements, and uphold the trust and confidence of
stakeholders. SecureDataPro is at the forefront of data security, offering a strong
defense against new attacks and guaranteeing the confidentiality, integrity, and
availability of vital data assets even as cyber threats continue to change.

21
CHAPTER 4

SYSTEM DESIGN AND ARCHITECTURE OF


ADVANCED ENCRYPTION AND ROBUST DATA
CHUNKING SYSTEM

The chapter on system design provides a comprehensive overview of the architecture,


components, and functionalities of the Advanced Encryption and Robust Data Chunking System.
It outlines the systematic arrangement of modules, including data chunking, data encryption, data
decryption, and user interface development. The system design emphasizes the integration of
advanced encryption and decryption algorithms for encryption and decryption.

4.1 SYSTEM ARCHITECTURE

SecureDataPro implements a robust system architecture that prioritizes data security.


This architecture leverages a multifaceted approach, combining file splitting and diverse
encryption algorithms. The file splitting functionality fragments large files into smaller, more
manageable chunks. This approach offers several advantages: it facilitates efficient storage and
transmission, and even if one chunk is intercepted, the remaining chunks are protected. To further
strengthen security, SecureDataPro encrypts each chunk with a combination of encryption
algorithms like AES, RSA, and ECC. This multi-layered encryption ensures that compromising
a single algorithm wouldn't expose the entire file. This system architecture safeguards data
integrity and provides a strong foundation for SecureDataPro's comprehensive data protection
solution. Beyond encryption, SecureDataPro's system architecture incorporates secure storage
mechanisms. Encrypted file chunks are stored in a secure storage environment, which is a cloud-
based storage system with robust access controls. These access controls ensure that only
authorized users can access and decrypt the data. SecureDataPro implement user authentication
protocols and granular permission levels to manage user access effectively. This combination of
encryption, secure storage, and access control mechanisms forms the core of SecureDataPro's
system architecture, providing a comprehensive and layered approach to data security.

22
Fig 4.1 System Architecture of Advanced Encryption and Data Chunking Sytem

Fig.4.1 shows a high level overview of system architecture of advanced encryption and
data chunking system. In detail, the first step involves creating a container. This container can be
a folder or directory on a computer system. Once a container is created, files can be saved within
it. The file management system also has a file chunking system which seems to break down large
files into multiple parts for storage. Additionally, the system encrypts files using AES and Fernet
algorithms which helps to secure them. After the files are encrypted, they are then saved in the
container. The system also has a decryption system that is likely used to decrypt the files when
they are needed. Finally, there is a saving metadata in SQL step. SQL likely refers to Structured
Query Language which is a query language used to access and manipulate data stored in a
relational database management system. In this context, the metadata is likely information about
the files such as their name, size, and creation date. This metadata is stored in a database using
SQL. Overall, the file management system provides a way to organize, store, secure and encrypt
files.

23
4.2 CLASS DIAGRAM

SecureDataPro's development process leverages a rigorous system design approach.


Class diagrams, a fundamental tool in object-oriented design, play a crucial role in visualizing
and documenting the system's architecture. These diagrams represent the blueprint of the system,
outlining the various classes (software building blocks) and their interactions. In the context of
SecureDataPro, class diagrams would likely depict classes like 'File', 'Chunk',
'EncryptionAlgorithm', 'StorageManager', and 'UserManager'. These classes would encapsulate
the functionalities of file splitting, encryption, secure storage, and user access control. By
meticulously defining these classes and their relationships through class diagrams, developers
can ensure a clear understanding of the system's structure and functionality. This promotes
efficient development, reduces the risk of errors, and facilitates future maintenance of
SecureDataPro.

Fig 4.2 Class Diagram of Advanced Encryption and Data Chunking Sytem

Fig 4.2 shows class diagram,the system leverages a two-pronged approach that combines
file chunking and multiple encryption algorithms to safeguard data. In the first step, a file is
divided into smaller chunks. Subsequently, these chunks are encrypted using encryption
algorithms. Then, the encrypted chunks are stored securely. This strategy aims to guarantee that
even if one encryption layer is compromised, the remaining data chunks are shielded.

24
4.3 USE CASE DIAGRAM

The foremost motive of a use case diagram is to show what device capabilities are
finished for which actor. Roles of the actors in the gadget can be depicted. The number one
reason of a use case diagram is to provide a graphical illustration of the machine's functionality
in terms of the interactions between actors and the system itself. It illustrates the specific use
instances, or duties, that actors can carry out inside the device to perform their desires. These use
instances constitute unique functionalities or functions of the system that satisfy the desires or
requirements of the actors. The use case diagram visually depicts the relationships between actors
and use cases, in addition to any dependencies or institutions among exclusive use cases..
Additionally, the use case diagram can highlight the glide of facts or manage between actors and
the gadget, presenting insights into the system's basic capability.

Fig 4.3 Use Case Diagram of Advanced Encryption and Data Chunking System

25
Fig 4.3 shows use case diagram which depicts the key interactions and functionalities of
SecureDataPro, a system designed to provide enhanced data security through file splitting and
multi-algorithm encryption. The "User" is responsible for uploading files to the system, which
triggers the core operations of file splitting and encryption using multiple algorithms. These
encrypted chunks are then stored securely. When the "User" wants to retrieve their file, they can
request the reassembly and decryption of the chunks. The system reassembles the original file
from the stored chunks and decrypts it before delivering it back to the "User." Additionally, users
can share files securely through a designated use case.

4.4 DFD DIAGRAM

To comprehensively document and illustrate SecureDataPro's data processing


functionalities, Data Flow Diagrams (DFDs) can be employed. DFDs visually represent the flow
of data through a system, highlighting the processes involved, data inputs and outputs, and data
storage components. In the context of SecureDataPro, a DFD could depict the user selecting a
file, the system splitting the file into chunks, the encryption process employing various
algorithms, and the secure storage of encrypted chunks. This visual representation enhances
understanding of how SecureDataPro interacts with data and facilitates clear communication
between developers and stakeholders. By utilizing DFDs, we can effectively document
SecureDataPro's data security architecture, ensuring transparency and promoting future system
enhancements.

Fig 4.4 DFD Diagram of Advanced Encryption and Data Chunking System

Fig 4.4 shows the DFD diagram. In the first step, user uploads file and then file is divided
into smaller chunks. Subsequently, these chunks are encrypted using a blend of encryption
algorithms. Then, the encrypted chunks are stored securely. This strategy aims to guarantee that
even if one encryption layer is compromised, the remaining data chunks are shielded.

26
CHAPTER 5

MODULES AND IMPLEMENTATION OF


ADVANCED ENCRYPTION AND ROBUST DATA
CHUNKING SYSTEM

This chapter delves into the practical aspects of the project, presenting a comprehensive
overview of the modules and their implementation. It provides a detailed insight into the real
world application of SecureDataPro, Quality Analysis and Production Management System,
highlighting its operational components and functionality.

5.1 MODULES

5.1.1 File Splitting Module

The SecureDataPro system commences with the File Splitting module, acting as
the cornerstone for data protection. This module assumes the critical role of meticulously
dissecting the input file into smaller, manageable fragments we call chunks. The primary
objective behind file splitting is to significantly enhance data security. By strategically
distributing the file across multiple storage devices or locations, the system mitigates the
risk associated with a single point of failure. Imagine a scenario where one storage
location is compromised; the remaining chunks, residing in separate locations, would
remain secure. This distributed storage approach also deters unauthorized access
attempts. Even if an attacker gains access to one chunk, the scattered nature of the data
significantly complicates efforts to reconstruct the entire file without the corresponding
fragments.
The File Splitting module operates with meticulous precision, meticulously
considering various factors to determine the optimal chunk size and the total number of
chunks. File size plays a crucial role – larger files necessitate a higher number of chunks
for effective distribution. Security requirements are also factored in; for highly sensitive
data, smaller chunk sizes might be preferable to minimize potential damage if a chunk is
compromised. Additionally, storage constraints of the target locations are considered to
ensure efficient utilization of storage space.
To achieve efficient and accurate file splitting while maintaining the integrity of

27
the data, the module leverages sophisticated algorithms. These algorithms perform the
division process with remarkable speed and precision, ensuring that each chunk is an
exact fragment of the original file. This meticulous splitting is paramount – any errors or
inconsistencies during the splitting process could potentially corrupt the data upon
reconstruction.
In essence, the File Splitting module establishes the foundation for robust data protection
in SecureDataPro. By fragmenting the file and distributing the chunks across various
locations, it minimizes the exposure of sensitive information in the event of a security
breach and significantly increases the complexity for attackers attempting to access the
entire file. This intelligent and multifaceted approach strengthens data security and instills
confidence in users entrusting their valuable information to the SecureDataPro system.

5.1.2 Encryption Decryption Module

This module tackles the challenge of robust data protection by implementing a multi-
layered encryption approach. It provides a rich selection of encryption algorithms
catering to various security needs. Users have the flexibility to choose from different
encryption methods, including:
• Symmetric-key encryption: This technique utilizes a single, shared key for both
encryption and decryption. It offers efficient processing but requires secure key
exchange between involved parties.
• Asymmetric-key encryption: This approach employs a key pair – a public key
for encryption and a private key for decryption. This enables secure key
distribution without requiring prior exchange.
• Hash functions: These one-way algorithms generate a unique mathematical
fingerprint (hash) for a given data input. Any alteration to the data will result in a
different hash, ensuring data integrity.
By strategically combining these diverse algorithms, the system significantly bolsters
data security. This layered approach makes it exceptionally challenging for unauthorized
parties to breach the encryption. Even if one encryption layer is compromised, the
remaining layers still offer protection. The module further strengthens security by
incorporating key management functionalities. It ensures secure encryption and
decryption processes, with mechanisms for:
• Key generation: This involves creating robust encryption keys using secure

28
algorithms.
• Key distribution: Secure methods are employed to distribute the necessary keys
to authorized users.
• Key storage: The system implements secure storage mechanisms to safeguard
encryption keys, preventing unauthorized access.
In essence, the "Encryption Decryption" module plays a pivotal role in SecureDataPro's
data protection strategy. It empowers users with control over their security needs while
providing a comprehensive encryption framework that safeguards data integrity and
confidentiality.

5.1.3 Data Integrity And Authentication Module

In the SecureDataPro system, the Data Integrity and Authentication module plays
a critical role in safeguarding the sanctity of user data throughout the entire process –
from file splitting to encryption and beyond. This module acts as a vigilant guardian,
ensuring the data remains unaltered and verifiable during critical operations.
Here's how it achieves this:
• Checksum Calculations: This technique involves creating a mathematical
fingerprint of the original data. Before splitting a file, the module calculates a
checksum (like a unique identifier) for the entire file. This checksum is then stored
alongside the encrypted chunks. Later, when the data needs to be reassembled, the
checksum is recalculated for the decrypted chunks. If these two checksums match,
it confirms the data hasn't been tampered with during any stage.
• Digital Signatures: This cryptographic tool adds another layer of security. The
module can generate a digital signature for the data using a private key held by
SecureDataPro. This signature acts like a tamper-evident seal, mathematically
linked to the data. Any unauthorized modification to the data would invalidate the
signature, raising an immediate red flag.
• Verification Processes: This module doesn't just create safeguards; it actively
verifies their integrity. It employs established cryptographic algorithms to validate
the checksums and digital signatures. If any discrepancies are detected, the system
triggers an alert, notifying users of a potential security breach or data corruption.
By meticulously employing these mechanisms, the Data Integrity and Authentication
module significantly strengthens the overall security posture of SecureDataPro. It ensures
users can have complete confidence that their data remains untainted and authentic

29
throughout the entire data protection process. This not only prevents unauthorized data
modification but also aids in identifying and mitigating potential security threats. In
essence, this module acts as a cornerstone for reliable and trustworthy data protection
within SecureDataPro.

5.2 IMPLEMENTATION

5.2.1 Training Strategies for SecureDataPro Implementation:


Two training strategies for implementing SecureDataPro, a pioneering
approach to data protection through file splitting and diverse encryption algorithms,
are hands-on workshops and online tutorials. Hands-on workshops allow
participants to engage directly with the SecureDataPro software, gaining practical
experience in configuring settings, splitting files, and applying various encryption
techniques. Through these workshops, users can enhance their understanding of
SecureDataPro's capabilities and its role in data protection. Online tutorials provide
a convenient and accessible way for users to learn about SecureDataPro's
functionalities, step-by-step processes, and best practices. By offering both hands-
on workshops and online tutorials as training strategies, users can develop the
necessary skills to effectively leverage SecureDataPro for secure file management
and encryption. Two comprehensive training strategies for implementing
SecureDataPro, a pioneering solution in data protection through file splitting and
diverse encryption algorithms, are hands-on workshops and online tutorials.
Hands-on workshops provide participants with direct engagement with the
SecureDataPro software, offering practical experience in configuring settings,
splitting files, and applying various encryption techniques. These workshops foster
interactive learning environments where users can actively explore
SecureDataPro's features and functionalities under the guidance of experienced
instructors. By actively participating in hands-on activities, users gain practical
skills and insights into SecureDataPro's capabilities, enabling them to effectively
leverage its tools for secure file management and encryption in real-world
scenarios.
On the other hand, online tutorials offer a convenient and accessible learning

30
avenue for users to acquire knowledge about SecureDataPro's functionalities, step-
by-step processes, and best practices at their own pace. These tutorials provide
comprehensive and structured guidance, covering topics such as installation,
configuration, file splitting methodologies, encryption algorithms, and
troubleshooting. Through a combination of instructional videos, written guides, and
interactive exercises, online tutorials empower users to grasp SecureDataPro's
concepts and techniques thoroughly. Additionally, online forums and support
channels facilitate collaboration and knowledge sharing among users, enhancing
the learning experience and providing valuable resources for addressing queries
and challenges.
By offering both hands-on workshops and online tutorials as training strategies,
organizations can cater to diverse learning preferences and requirements. Hands-
on workshops provide immersive learning experiences that encourage active
participation and practical skill development, while online tutorials offer flexibility
and accessibility for self-paced learning. Together, these training strategies ensure
that users acquire the necessary skills and knowledge to effectively implement and
utilize SecureDataPro for secure file management and encryption, thereby
enhancing data protection measures and mitigating the risk of unauthorized access
or data breaches.

5.2.2 Encryption Algorithms used in SecureDataPro Implementation


SecureDataPro utilizes four diverse encryption algorithms to ensure robust
data protection through its pioneering approach of file splitting and encryption. The
first encryption algorithm used is AES-256, a widely accepted and highly secure
symmetric encryption algorithm. Secondly, the system employs RSA, a powerful
asymmetric encryption algorithm, to securely exchange encryption keys. Thirdly,
Twofish is utilized for its efficient and strong block cipher encryption. Lastly, the
system incorporates the advanced encryption standard Serpent for its high level of
security and resistance to cryptanalysis. By combining these diverse encryption
algorithms, SecureDataPro provides a multi-layered defense against unauthorized
access and data breaches. This novel method guarantees the confidentiality and
integrity of data during transmission and storage in addition to improving file
security.Four different encryption methods are used by SecureDataPro as part of
its comprehensive data protection strategy, and each one adds to the company's
unique file splitting and encryption method. First off, the encryption structure of

31
SecureDataPro is based on the widely used and extremely safe symmetric
encryption method AES-256. AES-256 is essential for protecting data while it is at
rest since it guarantees robust encryption capabilities. Second, to safely exchange
encryption keys, the system makes use of RSA, a potent asymmetric encryption
method. SecureDataPro's total security is improved by RSA's capacity to enable
secure key exchange and communication channels, guaranteeing the confidentiality
and integrity of encrypted data while it is being transmitted.
Thirdly, Twofish's robust and effective block cipher encryption is
incorporated into SecureDataPro. The strong encryption capabilities of Twofish
reinforce SecureDataPro's resistance against illegal access and data breaches. The
advanced encryption standard Serpent is also incorporated into the system because
of its high level of security and resilience to cryptanalysis. Serpent strengthens
SecureDataPro's security posture by adding an additional layer of defense and
offering strong encryption methods that can fend off sophisticated attacks.
SecureDataPro creates a multi-layered defensive system against unwanted
access and data breaches by combining these various encryption algorithms. This
novel method guarantees the confidentiality and integrity of data during
transmission and storage in addition to improving file security. Through its
comprehensive encryption framework, SecureDataPro offers organizations a
robust solution for protecting sensitive information across various platforms and
environments. By leveraging these diverse encryption algorithms, SecureDataPro
empowers organizations to safeguard their valuable data assets effectively,
ensuring compliance with regulatory requirements and bolstering trust among
stakeholders in an increasingly digital world.
SecureDataPro uses RSA, a potent asymmetric encryption method, in
addition to AES-256 for safe key exchange and communication channels. The
power of RSA is in its capacity to provide safe communication between participants
through data encryption using a public key that can only be unlocked with a
matching private key. This reduces the possibility of malevolent actors intercepting
or altering data while it is being transmitted by guaranteeing its confidentiality and
integrity.
Additionally, SecureDataPro's defense against unwanted access and data
breaches is strengthened by the integration of Twofish. Twofish is renowned for its
powerful and effective block cipher encryption, which adds an extra degree of
security to encrypted data. Strong encryption methods strengthen SecureDataPro's

32
overall security posture and increase its resistance to cryptographic attacks.
Furthermore, because of Serpent's high level of security and resilience to
cryptanalysis, SecureDataPro integrates this advanced encryption standard.
Sensitive data stored or communicated through SecureDataPro is guaranteed to
remain secure and to be intact thanks to Serpent's powerful encryption algorithms,
which provide increased protection against sophisticated attacks.
By combining these diverse encryption algorithms, SecureDataPro
establishes a multi-layered defense mechanism that safeguards data from
unauthorized access and potential security breaches. This innovative approach not
only enhances the security of files but also instills confidence in organizations
regarding the confidentiality and integrity of their data. SecureDataPro's
comprehensive encryption framework sets a new standard in data protection,
empowering organizations to protect their valuable assets and maintain compliance
with regulatory requirements in an ever-evolving digital landscape.

5.3 USER INTERFACE

5.3.1 Home Page


The home page of our project Welcome to our Website! SecureDataPro
addresses a critical concern in today's digital landscape by providing a reliable solution
for safeguarding sensitive files. In an era where data breaches and unauthorized access
pose significant threats, SecureDataPro introduces a sophisticated dual-key encryption
system. This innovative approach ensures that users have granular control over their file
security, By offering an advanced encryption algorithm, SecureDataPro not only
fortifies digital assets against potential breaches but also empowers users with a user-
friendly interface.

33
Fig 5.1 Home Page of SecureDataPro

Fig 5.1 shows the home page of our website SecureDataPro which addresses a
critical concern in today's digital landscape by providing a reliable solution for
safeguarding sensitive files. In an era where data breaches and unauthorized access pose
significant threats, SecureDataPro introduces a sophisticated dual-key encryption system.
This innovative approach ensures that users have granular control over their file security,
By offering an advanced encryption algorithm, SecureDataPro not only fortifies digital
assets against potential breaches but also empowers users with a user-friendly interface.
It has encryption button for encrypting file, file list button for accessing uploaded file and
logout button for logout.

5.3.2 Sign Up Page


The below diagram shows the signup page of our project Our website offers a
sign up page for the users for creating their account on our SecureDataPro website for
using our encryption and decryption feature.

34
Fig 5.2 Sign Up Page of SecureDataPro

Fig 5.2 shows the sign up page of our website SecureDataPro where user can
write their username and password to create their account on our website.

5.3.3 Login Page


The below diagram shows the login page of our project Our website offers a
login page for the users for login into their account on our SecureDataPro website for
using our encryption and decryption feature.

35
Fig 5.3 Login Page of SecureDataPro

Fig 5.3 shows the login page of our website SecureDataPro where user can write
their username and password to login to their account on our website

5.3.4 Encryption Page


The encryption page of our website SecureDataPro is used to encrypt the user
file by first dividing it into chunks then encrypting it with different algorithms.It serves
as the gateway to safeguarding our sensitive files. This user-friendly interface guides
us through a two-pronged approach that ensures robust data protection.

36
Fig 5.4 Encryption Page of SecureDataPro

Fig 5.4 illustrates the core functionality of SecureDataPro's encryption process.


Users can upload their files, initiating the encryption workflow. SecureDataPro then splits
the uploaded file into manageable chunks for efficient storage and security. To fortify
protection, each chunk is encrypted with a distinct encryption algorithm, adding
complexity for potential attackers. Following encryption, SecureDataPro generates
unique decryption keys for each chunk, which users can download for future access. This
separation of encrypted data and decryption keys ensures that even if unauthorized parties
obtain the encrypted chunks, they would still require the corresponding keys to decrypt
the information. This user-centric interface empowers individuals to actively participate
in safeguarding their data through SecureDataPro's multifaceted encryption approach.

5.3.5 File List Page

The file list page of our website SecureDataPro contains all the files that user has
encrypted yet with their decryption keys.

37
Fig 5.5 File List Page of SecureDataPro

Fig 5.5 shows the file list page within SecureDataPro, our secure data protection
platform, acts as a central hub for managing user encrypted files. This user-friendly
interface provides a comprehensive overview of all the files user have encrypted using
SecureDataPro. Each entry on the file list page likely displays essential details about user
encrypted files.

5.3.6 Decryption Page

The decryption page on the SecureDataPro website plays a vital role in granting
users access to their previously encrypted files. This user-friendly interface facilitates a
streamlined decryption process.

38
Fig 5.6 Decryption Page of SecureDataPro

Fig 5.6 shows decryption page which offers a user-friendly interface for regaining
access to previously encrypted files. Users initiate the process by uploading the two
unique decryption keys associated with their encrypted data. SecureDataPro then utilizes
these keys to decrypt each individual chunk that comprises the encrypted file, essentially
reversing the encryption process and restoring the original data. Once all chunks are
decrypted, the system seamlessly reassembles them into the original file, making it
available for download by the user. This secure decryption functionality empowers users
to control access to their confidential information whenever needed.

5.3.7 Database
Database contains the all the user information like their username, email, age, sex
password and the chunk file detail.

39
Fig 5.7 Database of SecureDataPro

Fig 5.7 shows the database of the SecureDataPro users which contains all the
information about the user including their names, email address, age, sex, password and
all the chunks details.

40
CHAPTER 6

RESULTS AND DISCUSSIONS

6.1 RESULTS
The SecureDataPro system represents a paradigm shift in data protection
methodologies, introducing a pioneering approach that seamlessly integrates file splitting
with diverse encryption algorithms. Through rigorous evaluation and testing,
SecureDataPro has showcased its ability to substantially enhance data security by
dispersing encrypted chunks across multiple storage devices. This decentralized storage
model significantly reduces the risk of data breaches, as compromising one storage device
does not compromise the entirety of the protected data.
Additionally, the use of several encryption techniques in SecureDataPro's
architecture strengthens the security of sensitive data by adding still another layer of
protection. SecureDataPro adds complexity and diversity to the encryption process by
using several encryption techniques, making it very difficult for potential attackers to
decrypt the encrypted data without the necessary decryption keys.
Overall, SecureDataPro stands as a testament to the power of innovative
approaches in addressing the evolving challenges of data protection. Its groundbreaking
methodology not only enhances data security but also sets a new standard for
comprehensive encryption strategies. As companies struggle to keep up with the ever-
growing threat landscape of cyberattacks and data breaches, SecureDataPro shows itself
to be a dependable and strong option for protecting sensitive data in the modern digital
world.Three core file splitting techniques form the cornerstone of SecureDataPro's
creative data protection approach; each has been painstakingly crafted to strengthen its
defense against unwanted access and possible data breaches. First, files are carefully
divided into smaller segments according to their byte count when byte-oriented splitting
is employed. This ensures accurate segmentation and makes encryption procedures run
more smoothly. By using this technique, SecureDataPro can efficiently manage files of
different sizes while also preserving the integrity of data chunk sizes, which maximizes
security precautions.
Secondly, pattern-based splitting is seamlessly integrated into SecureDataPro's
framework, allowing the system to identify and segment files based on specific patterns

41
or sequences. By dispersing data in a non-linear fashion, this methodology adds an extra
layer of complexity to the encryption process, making it significantly more challenging
for unauthorized users to decipher the data. Pattern-based splitting enhances security by
minimizing predictability and reducing the risk of potential data exposure in the event of
a breach.

Table 6.1: Comparison of various packet sizes for DES, AES & RSA algorithm

Table 6.1 shows time taken by RSA algorithm for both encryption and decryption
process is much higher compare to the time taken by AES and DES algorithm. Variation
in buffer size is noticed. It does not increase according to the size of file in all algorithms.

42
Lastly, size-based splitting divides files into chunks of predefined sizes, ensuring
uniform distribution of data and minimizing variations in chunk sizes. This approach not
only enhances data transfer efficiency but also optimizes storage utilization, thereby
improving overall system performance. By incorporating these file splitting techniques
with a diverse range of algorithms such as RSA, ECC, and AES, Secure Data Pro
establishes a robust data protection framework.
This multi-layered approach enhances confidentiality and resilience against
unauthorized access or data breaches, setting a new benchmark in cybersecurity
standards. SecureDataPro's pioneering methodology empowers organizations to
safeguard their valuable data assets effectively, irrespective of the platforms or
environments they operate in. Through its comprehensive data protection framework,
SecureDataPro ensures the integrity and security of sensitive information, bolstering trust
and confidence among stakeholders in an increasingly. Through extensive testing and
evaluation, SecureDataPro has shown its capacity to significantly reduce the risk of data
breaches by splitting files into smaller chunks and encrypting each segment separately.
This segmentation not only makes it more challenging for attackers to reconstruct entire
datasets but also decentralizes storage, providing a further layer of protection. The test
results indicate a marked improvement in security due to this approach.
The implementation of multiple encryption algorithms, including RSA, ECC, and
AES, enhances the security of sensitive data by making it extremely difficult for
unauthorized users to gain access. SecureDataPro's varied encryption techniques ensure
that even if one encryption key is compromised, other segments remain protected due to
the diversity of encryption methods. This added complexity is a notable advantage over
traditional data protection systems that often rely on a single encryption method.
Another significant result is SecureDataPro's pattern-based splitting, which
segments files based on specific sequences. This method disrupts linear data distribution,
reducing the predictability that attackers rely on to reconstruct data. Additionally, size-
based splitting divides files into predefined chunk sizes, contributing to efficient data
transfer and storage optimization, further enhancing system performance.

43
6.2 COMPARISON
SecureDataPro is a major advancement in data protection, combining file splitting
with varied encryption techniques to offer a robust framework for safeguarding sensitive
data. When compared to traditional data protection methods, the benefits of
SecureDataPro become clear, demonstrating a significant shift in how data security is
approached in a world where cyber threats are constantly evolving.
Traditional data protection methods often rely on a single encryption algorithm to
secure entire datasets. While these algorithms can be robust, they present a major risk: if
an attacker manages to compromise the encryption key, the entire dataset becomes
vulnerable, leading to massive data breaches and potential exposure of sensitive
information. Additionally, traditional systems are typically centralized, meaning that data
is stored in one location or system. This centralization creates a single point of failure, so
when a breach occurs, the consequences can be extensive and require substantial efforts
to contain and remediate the damage.
In contrast, SecureDataPro's approach of splitting files into smaller segments
significantly reduces the impact of a security breach. By dividing files into smaller,
manageable chunks, SecureDataPro inherently complicates the task for attackers. An
attacker would need to reassemble all the individual pieces to reconstruct the dataset,
making it much more difficult to gain unauthorized access. This decentralized approach
also enhances system resilience, ensuring that a breach in one part of the system does not
necessarily compromise the entire dataset. This separation and dispersion of data not only
adds complexity for potential attackers but also optimizes storage and data management.
Adding to this security is SecureDataPro's use of multiple encryption techniques.
While traditional methods typically rely on a single algorithm like AES or RSA,
SecureDataPro employs a diverse range of encryption techniques across the different file
segments. This multi-layered encryption approach ensures that even if one encryption
method is compromised, the other segments remain secure. This variation in encryption
provides a significant advantage over traditional systems, which can be more vulnerable
to breaches if their single encryption method is compromised. Attackers would need to
break through multiple encryption barriers to access the entire dataset, thereby increasing
the level of security and resilience against unauthorized access.

44
Fig 6.1: Comparison of Memory usage by AES, DES and RSA

Fig 6.1 presents a critical analysis of memory consumption by three prevalent


encryption algorithms: AES (Advanced Encryption Standard), DES (Data Encryption
Standard), and RSA (Rivest–Shamir–Adleman). The visual representation highlights a
clear trend in memory usage as the size of the text file being encrypted increases.

45
RSA Consumes the Most Memory: Notably, the figure reveals that the RSA algorithm
consistently exhibits the highest memory usage across all text file sizes tested. This
characteristic is primarily attributed to the complex mathematical operations involved in
RSA encryption and decryption. As the size of the text file grows, the computational
demands on the system also increase, leading to a corresponding rise in memory
utilization.
AES and DES Show Lower Memory Usage: Conversely, both AES and DES
demonstrate significantly lower memory consumption compared to RSA. This is due to
their simpler key exchange and encryption/decryption processes. While AES offers a
strong balance between security and performance, DES is considered less secure by
modern standards. However, its inclusion in this comparison provides a valuable
reference point for understanding how memory usage can vary between different
encryption algorithms.
Memory Usage Implications: The memory usage variations depicted in Fig 6.1
have crucial implications for real-world applications. Resource-constrained
environments, such as mobile devices or embedded systems, may struggle with the high
memory demands of RSA, particularly when dealing with large files. In such scenarios,
AES or other memory-efficient algorithms might be more suitable choices.
SecureDataPro also brings adaptability and flexibility to data protection, which is
a major departure from traditional systems. Conventional methods can be rigid and less
effective against evolving cyber threats. SecureDataPro's methodology, with its
combination of file splitting and varied encryption, allows it to adapt to different data
types and environments, providing consistent protection regardless of the platform. This
adaptability is essential in a cybersecurity landscape where attackers are continually
developing new techniques to breach security systems.
The decentralized storage model employed by SecureDataPro also contrasts with
traditional systems, which typically rely on centralized storage. By splitting files and
storing them across multiple devices, SecureDataPro reduces the risk of large-scale data
breaches, ensuring that compromising one storage device does not compromise the entire
dataset. This approach not only enhances security but also optimizes storage utilization
and improves overall system performance.

46
Fig 6.2: Comparison of Output Byte used by AES, DES and RSA

Fig 6.2 presents a compelling finding related to the output byte size generated by
the encryption algorithms employed in our experiment. Notably, the figure demonstrates
that regardless of the text file size used, all three encryption algorithms (likely RSA, ECC,
and AES) produce the same output byte size. This outcome signifies a key characteristic
of these specific encryption algorithms – their ability to maintain a consistent output size
irrespective of the original file size.

47
This consistency in output byte size offers several advantages:
• Simplified Storage Management: With a predictable output size, storage
allocation and management become more streamlined. Knowing the exact amount
of storage required for each encrypted file, regardless of its original size,
simplifies storage planning and capacity allocation.
• Performance Optimization: Consistent output size can potentially contribute to
optimized encryption and decryption performance. By having a predefined output
size, the encryption and decryption processes can be tailored for efficiency,
potentially leading to faster processing times.
• Transparency and Predictability: The consistent output size enhances
transparency and predictability within the system. Users can anticipate the storage
requirements for encrypted files beforehand, fostering better planning and
resource allocation.
It's important to note that while consistent output size is a valuable attribute of these
specific algorithms, it's not a universal characteristic of all encryption methods. Some
encryption algorithms might generate variable output sizes depending on the original file
size.
When comparing outcomes, SecureDataPro's methodology demonstrates clear
superiority over traditional methods. The reduced risk of data breaches and enhanced
security from multi-layered encryption set a new standard for data protection. Traditional
systems, with their centralized storage and single-point encryption, offer less security and
resilience, making them more prone to modern cyber threats. SecureDataPro's approach,
with its decentralized storage, varied encryption techniques, and adaptable framework,
provides a robust and reliable solution for safeguarding sensitive data in a world where
cyber threats are increasingly sophisticated. This innovative approach sets a new
benchmark for comprehensive data protection, offering organizations a strong defense
against unauthorized access and other cyber threats.

48
CHAPTER 7

CONCLUSION AND FUTURE ENHANCEMENT

7.1 CONCLUSION

In conclusion, SecureDataPro uses file splitting and numerous encryption


techniques to offer a cutting-edge approach to data protection. This cutting-edge solution
provides strong protection against data breaches and illegal access. By dividing files into
smaller pieces and encrypting them using different techniques, SecureDataPro improves
the security of private data kept on a range of platforms and devices. Users can retain
control over their privacy and drastically lower the risks related to data disclosure by
putting this strategy into practice.The integration of file splitting and encryption
techniques not only fortifies data protection but also ensures that even if one encryption
scheme is compromised, the fragmented nature of the files and the multiple layers of
security provided by different algorithms offer an additional layer of defense. Ultimately,
SecureDataPro represents a valuable tool in safeguarding valuable data assets and
maintaining confidentiality in an increasingly digitized world.SecureDataPro's
pioneering approach to data protection marks a significant advancement in cybersecurity,
leveraging innovative techniques such as file splitting and multiple encryption
algorithms. By breaking up files into smaller, more manageable chunks and encrypting
them with diverse algorithms, SecureDataPro establishes a formidable defense against
unauthorized access and potential data breaches. This multifaceted security strategy
ensures that sensitive information stored across various devices and platforms remains
safeguarded against threats.
The integration of file splitting and encryption techniques within SecureDataPro
not only enhances the security of stored data but also provides a proactive defense
mechanism against emerging cybersecurity threats. By segmenting files into smaller units
and encrypting them with different algorithms, SecureDataPro minimizes the risk of data
exposure and maintains control over user privacy. This approach enables users to mitigate
the potential impact of security incidents and maintain confidentiality in an increasingly
interconnected digital landscape.
Moreover, the utilization of numerous encryption techniques by SecureDataPro

49
contributes an additional security layer, rendering it much more arduous for unapproved
individuals to decode encrypted data. The fragmented nature of the files and the variety
of encryption techniques used by SecureDataPro provide an extra line of protection,
guaranteeing the integrity and secrecy of sensitive data even in the event that one
encryption scheme is compromised.
In summary, SecureDataPro proves to be a useful resource for businesses and
people looking to safeguard their priceless data assets in a constantly changing digital
landscape. SecureDataPro creates a new benchmark in data security by merging file
splitting and encryption methods, providing a strong barrier against illegal access and
data breaches. With its creative methodology, SecureDataPro empowers users to
maintain control over their privacy and safeguard sensitive information, thereby
enhancing cybersecurity resilience in today's interconnected world.
SecureDataPro's innovative approach to data protection extends beyond
traditional security measures, offering a comprehensive solution to the evolving
challenges of cybersecurity. By integrating file splitting and multiple encryption
algorithms, SecureDataPro establishes a dynamic defense mechanism that adapts to the
complexities of modern data threats.
Organizing files into smaller, easier-to-manage segments improves data
management and lessens the chance of security incidents happening. The file splitting
method used by SecureDataPro makes sure that the integrity of the entire data structure
is preserved even in the event that one component of the file is compromised. By adding
an extra degree of security, this file fragmentation makes it much harder for unauthorized
individuals to access or alter important data.
Furthermore, SecureDataPro's use of multiple encryption algorithms enhances the
robustness of its security framework. By encrypting data with diverse algorithms such as
AES, RSA, and ECC, SecureDataPro ensures that encrypted files are safeguarded against
various cryptographic attacks. By strengthening data confidentiality and resilience
against illegal access, this multi-layered encryption strategy gives users piece of mind
that their information is safeguarded by cutting-edge cryptographic algorithms.
Furthermore, in addition to encryption, SecureDataPro's proactive defensive
approach includes methods for identifying and thwarting possible security risks.
SecureDataPro detects suspicious activity by ongoing monitoring and analysis, and it
takes proactive steps to stop data breaches before they happen. By taking a proactive
stance, businesses and people utilizing SecureDataPro can reduce the chance of data
exposure and improve their overall security posture.To sum up, SecureDataPro offers a

50
comprehensive solution that combines cutting-edge encryption algorithms and creative
file splitting techniques, thereby representing a paradigm change in data protection. In
the current digital environment, SecureDataPro gives consumers the ability to retain
control over their sensitive data by strengthening data security and resistance against
illegal access. Its strong security features and preemptive protection mechanisms,
SecureDataPro sets a new standard for data protection, ensuring the confidentiality and
integrity of data in an increasingly interconnected world.

7.2 FUTURE ENHANCEMENT


The future enhancement for SecureDataPro is highly promising, as it offers a
pioneering approach to data protection through file splitting and diverse encryption
algorithms. This innovative technology is likely to find widespread adoption in industries
that prioritize data security, such as finance, healthcare, and government sectors. As data
breaches and cyber threats continue to pose significant risks, the demand for advanced
encryption solutions like SecureDataPro is expected to grow. Furthermore, ongoing
research and development efforts can further enhance the capabilities and applications of
SecureDataPro, making it an indispensable tool for safeguarding sensitive information in
the digital age. In conclusion, SecureDataPro represents a groundbreaking and innovative
approach to data protection by combining file splitting and diverse encryption algorithms.
This pioneering method not only offers enhanced security measures but also introduces
a unique level of data protection that surpasses traditional encryption techniques. By
fragmenting files into smaller chunks and applying a variety of encryption algorithms,
The danger of data breaches and illegal access is greatly reduced by SecureDataPro.
Additionally, the use of several encryption methods increases security and
complexity, making it more difficult for potential attackers to decode the protected data.
The integration of file splitting and diverse encryption algorithms in SecureDataPro sets
a new standard for data protection practices and reinforces the importance of adopting
advanced security measures in the digital age. Overall, SecureDataPro showcases an
innovative and powerful solution for safeguarding sensitive data, offering peace of mind
to individuals and organizations seeking reliable and robust protection against cyber
threats.
Integration with Emerging Technologies: SecureDataPro can explore integration
with emerging technologies such as blockchain and quantum computing. Integration with

51
blockchain can provide immutable data storage, enhancing data integrity and auditability.
Meanwhile, collaboration with quantum-safe encryption techniques can prepare
SecureDataPro for the era of quantum computing, ensuring data remains secure against
quantum-based attacks.Enhanced User Experience: Future iterations of SecureDataPro
can focus on improving user experience through intuitive interfaces, streamlined
workflows, and automation features. Enhancements in usability can encourage wider
adoption of SecureDataPro among users with varying levels of technical expertise.
Advanced Threat Detection: SecureDataPro can integrate advanced threat
detection mechanisms powered by AI and ML algorithms. By analyzing patterns and
anomalies in data access and usage, SecureDataPro can proactively identify and mitigate
potential security threats in real-time.Cross-Platform Compatibility: Future versions of
SecureDataPro can prioritize cross-platform compatibility, allowing seamless integration
with a wide range of devices and operating systems. This can include compatibility with
mobile devices, cloud platforms, and IoT devices, ensuring comprehensive data
protection across diverse environments.Regulatory Compliance: GDPR, CCPA, and
other new and developing data protection laws can be more easily complied with with
the help of SecureDataPro's enhanced functionality. Access control, audit logging, and
data governance are all integrated into SecureDataPro, which helps businesses stay
compliant with regulations and stay out of trouble.Secure Collaboration Tools:
SecureDataPro can expand its capabilities to include secure collaboration tools, enabling
encrypted file sharing and communication channels among authorized users. Integration
with collaborative platforms and communication tools can facilitate secure collaboration
while ensuring data privacy and confidentiality.
Scalability and Performance Optimization: As data volumes continue to grow
exponentially, SecureDataPro can focus on optimizing scalability and performance to
handle large-scale deployments effectively. This can involve enhancements in data
processing speed, scalability of encryption algorithms, and efficient resource utilization.
Continuous Research and Development: SecureDataPro can invest in continuous
research and development efforts to stay ahead of emerging cybersecurity threats and
technological advancements. By fostering a culture of innovation, SecureDataPro can
evolve its capabilities to address the evolving needs of users in an ever-changing digital
landscape.
Interoperability and Standardization: SecureDataPro can work towards
interoperability and standardization within the cybersecurity landscape. Collaborating
with industry stakeholders and standardization bodies can help establish common

52
protocols and interoperable solutions, fostering greater compatibility and ease of
integration with existing security infrastructure.
Technologies that Preserve Privacy: SecureDataPro can investigate technologies
that preserve privacy, like homomorphic encryption, differential privacy, and secure
multi-party computation, in light of the growing concerns around data privacy. These
methods create new opportunities for safe data sharing and collaboration by enabling data
analysis while protecting the privacy of sensitive information.

53
REFERENCES

[1] Seth, B., Dalal, S., Jaglan, V., Le, D. N., Mohan, S., & Srivastava, G. (2022). Integrating
encryption techniques for secure data storage in the cloud. Transactions on Emerging
Telecommunications Technologies, 33(4), e4108.

[2] Arora, A., Garg, H., & Shivani, S. (2023). Privacy protection of digital images using
watermarking and qr code-based visual cryptography. Advances in Multimedia, 2023.

[3] Malina, L., Dzurenda, P., Ricci, S., Hajny, J., Srivastava, G., Matulevičius, R., ... & Tang,
Q. (2021). Post-quantum era privacy protection for intelligent infrastructures. IEEE Access,
9, 36038-36077.

[4] Shi, Z., Oskolkov, B., Tian, W., Kan, C., & Liu, C. (2024). Sensor Data Protection Through
Integration of Blockchain and Camouflaged Encryption in Cyber-Physical Manufacturing
Systems. Journal of Computing and Information Science in Engineering, 24(7).

[5] Samanta, D., Alahmadi, A. H., Karthikeyan, M. P., Khan, M. Z., Banerjee, A., Dalapati, G.
K., & Ramakrishna, S. (2021). Cipher block chaining support vector machine for secured
decentralized cloud enabled intelligent IoT architecture. IEEE Access, 9, 98013-98025.

[6] Li, T., He, X., Jiang, S., & Liu, J. (2022). A survey of privacy-preserving offloading methods
in mobile-edge computing. Journal of Network and Computer Applications, 203, 103395.

[7] Pham, H., Woodworth, J., & Amini Salehi, M. (2019). Survey on secure search over
encrypted data on the cloud. Concurrency and Computation: Practice and Experience,
31(17), e5284.

[8] Thushara, G. A., & Bhanu, S. M. S. (2022, November). A Flexible and Adaptive Hybrid
Algorithm for Secure Data Sharing in Cloud Computing. In 2022 IEEE 19th India Council
International Conference (INDICON) (pp. 1-8). IEEE.

[9] Vijayakumar, A., & Jebaseeli, A. N. (2020). Pioneer approach of data deduplication to
remove redundant data from cloud storage. International Journal of Advanced Research in
Engineering and Technology (IJARET), 11(10), 535-544.

[10] Alkhalidy, M., Taha, M. B., Chowdhury, R., Ould-Slimane, H., Mourad, A., & Talhi,
C. (2023). Vehicular edge based approach for optimizing urban data privacy. IEEE
Sensors Journal.

54
APPENDIX 1

A CODING

ENCRYPTION DECRYPTION ALGO USED

def encrypt(filename):

file_size = os.path.getsize(filename)

chunked_size = file_size//2

act_file_name = filename.split('/')[-1]

os.mkdir(f'media/files/{act_file_name}')

fs = Split(inputfile=filename, outputdir=f'media/files/{act_file_name}')

fs.bysize(chunked_size)

aes_key = get_random_bytes(16)

fernet_key = Fernet.generate_key()

files = []

for file in os.listdir(f'media/files/{act_file_name}'):

if file != 'manifest':

files.append(f'media/files/{act_file_name}/{file}')

with open(f'media/key/rsakey.key', 'wb') as f:

f.write(aes_key)

with open(f'media/key/fernetpass.key', 'wb') as f:

f.write(fernet_key)

with open(files[0], 'rb') as f:

data = f.read()

55
cipher = AES.new(aes_key, AES.MODE_EAX)

ciphertext, tag = cipher.encrypt_and_digest(data)

file_out = open(files[0], 'wb')

[file_out.write(x) for x in (cipher.nonce, tag, ciphertext)]

file_out.close()

fernet = Fernet(fernet_key)

with open(files[1], 'rb') as f:

fer_data = f.read()

fer_enc_data = fernet.encrypt(fer_data)

with open(files[1], 'wb') as f:

f.write(fer_enc_data)

return f'media/files/{filename}'

def decrypt(filename, aes_key, fernet_key):

aes_key = aes_key.read()

fernet_key = fernet_key.read()

files = []

for file in os.listdir(f'media/files/{filename}'):

if file != 'manifest':

files.append(f'media/files/{filename}/{file}')

file_in = open(files[0], 'rb')

nonce, tag, aes_cipher_text = [file_in.read(x) for x in (16,16,-1)]

aes_cipher = AES.new(aes_key, AES.MODE_EAX, nonce=nonce)

data = aes_cipher.decrypt_and_verify(aes_cipher_text, tag)

56
with open(files[0], 'wb') as f:

f.write(data)

fernet_cipher = Fernet(fernet_key)

with open(files[1], 'rb') as f:

data = f.read()

original = fernet_cipher.decrypt(data)

with open(files[1], 'wb') as f:

f.write(original)

mg = Merge(inputdir=f'media/files/{filename}', outputdir='media/temp',
outputfilename=filename)

mg.merge(cleanup=False)

#shutil.rmtree(f'media/files/{filename}')

Decrypt HTML

{% extends "main.html" %}

{% block style %}<link rel="stylesheet" href="../media/css/encrypt.css">{% endblock


style %}

{% block content %}

<div class='encrypt-form-container'>

<form method='POST' enctype='multipart/form-data' class="files-container-outer


decrypt-form">

{% csrf_token %}

<div class="upload-container on-decrypt">

<div class="upload-area" id="dragDropArea1" onclick="browseFiles(0)">

<img src="../media/images/feather_upload-cloud.svg" alt="">

<input type="file" class="input-file" id="fileInput1" hidden multiple="false"


name="aes_key" required>

<div>

57
<div>Enter AES key or Drag and Drop here</div>

<p>AES key was generated during encryption</p>

</div>

<div>

<div class="select-file-btn">Select File</div>

</div>

</div>

</div>

<div class="upload-container on-decrypt">

<div class="upload-area" id="dragDropArea2" onclick="browseFiles(1)">

<img src="../media/images/feather_upload-cloud.svg" alt="">

<input type="file" class="input-file" id="fileInput2" hidden multiple="false"


name="fer_key" required>

<div>

<div>Enter Fernet key or Drag and Drop here</div>

<p>Fernet key was generated during encryption</p>

</div>

<div>

<div class="select-file-btn">Select File</div>

</div>

</div>

<div class="uploading-area" id="uploadingArea2">

</div>

</div>

<button class="decrypt-btn" type='submit'>Submit</button>

58
</form>

{% if file_path %}

<div class="files-container-outer download-file ">

<a class='' id="download-btn" href="{{file_path}}" download>Download


decrypted file here</a>

</div>

{% endif %}

<div class="pop-up">

<div class="pop-up-container">

<img src="https://s3-alpha-
sig.figma.com/img/76f0/6444/2813a914064d9f9ae3e780993b9ec8f4?Expires=1701043
200&Signature=IAa28Jnng78e7sgksF7J~4UgUcFa2APNfr4RHALvrLyOlLCn4MZx9q
Cxp9D~1IwUaG~OOTHxtSGT0tsj5z-
8AP0in9pPRT0AOJidxZMogZY0wPshzvTFHX1jLyODUymU9oYRI~G7cXOfxUUZ
15YhGVRJHYLFS-
~9ChtY0un~foV9jlQKYo180o2L~KrwcZe5ymHP6iRbSmEVzE0L9hYNnHBz-
DG9wOupGbBS13o8JCP4d2cpPpD4di6vpRfM43tg6srJADrehZjW-
smVgdHmUwOs2p~Tc9WbuGlk8cUXUiMug-
66dnT8krOaJdY8cedHSS4AXo8VYCSbC59jYbvTQA__&Key-Pair-
Id=APKAQ4GOSFWCVNEHN3O4 " alt="">

<h3>Success!</h3>

<p>The File was downloaded Successfully</p>

<button onclick="closePopUp()">Close</button>

59
</div>

</div>

</div>

<script>

const dragDropAreas = document.querySelectorAll('.upload-area');

const fileInputs = document.querySelectorAll('.input-file');

const uploadingArea = document.querySelector('.uploading-area');

const popup = document.querySelector('.pop-up');

const btn = document.getElementById('download-btn');

function closePopUp(){

popup.style.display='none';

btn.addEventListener('click',function(){

popup.style.display="flex";

})

fileInputs.forEach((input, index) => {

input.addEventListener('change', function () {

handleFiles(this.files, index);

});

});

dragDropAreas.forEach((area, index) => {

area.addEventListener('dragover', function (e) {

e.preventDefault();

this.classList.add('drag-over');

});

60
area.addEventListener('dragleave', function () {

this.classList.remove('drag-over');

});

area.addEventListener('drop', function (e) {

e.preventDefault();

this.classList.remove('drag-over');

handleFiles(index, e.dataTransfer.files);

});

});

function browseFiles(index) {

fileInputs[index].click();

function handleFiles(files, index) {

for (const file of files) {

const uploadingFileDiv = document.createElement('div');

uploadingFileDiv.classList.add('current-uploading-file');

uploadingFileDiv.innerHTML = `<img src="../media/images/file-earmark-


check-fill.svg" alt="">

<div>${file.name}</div>

<div class="progress-bar-outer">

<div class="progress-bar-inner"></div>

</div>`;

uploadingArea.appendChild(uploadingFileDiv);

simulateFileUpload(index, file, uploadingFileDiv);

61
}

function simulateFileUpload(index, file, progressDiv) {

let progress = 0;

const interval = setInterval(() => {

progress += Math.random() * 20; // Simulating progress

progress = Math.min(progress, 100);

progressDiv.querySelector('.progress-bar-inner').style.width = `${progress}%`;

if (progress === 100) {

clearInterval(interval);

onUploadComplete(index, file, progressDiv);

}, 500);

function onUploadComplete(index, file, progressDiv) {

const uploadedFileDiv = document.createElement('div');

uploadedFileDiv.classList.add('uploaded-file');

uploadedFileDiv.classList.add('on-decrypt');

uploadedFileDiv.innerHTML = `

<div class="file-info">

<img src="../media/images/file-earmark-check-fill.svg" alt="">

<div>${file.name}</div>

</div>

<div>Uploaded</div>`;

uploadingArea.appendChild(uploadedFileDiv);

62
// Remove the progress div

progressDiv.remove();

</script>

{% endblock content %}

Encrypt HTML

{% extends "main.html" %}

{% block style %}<link rel="stylesheet" href="../media/css/encrypt.css"> {% endblock


style %}

{% block content %}

<div class='encrypt-form-container'>

<form class="files-container-outer" method='POST' enctype='multipart/form-data'>

{% csrf_token %}

<div class='file-name-input'>

<h2>Enter your file name:</h2>

<input type='text' name='filename' required id="file-name"/>

</div>

<h2>Upload Files :</h2>

<div class="upload-container">

<div class="upload-area" id="dragDropArea">

63
<img src="../media/images/feather_upload-cloud.svg" alt="">

<input type="file" class="input-file" id="fileInput" hidden multiple="false"


name="file" required>

<div>

<div>Select a file or Drag and Drop here</div>

<p>JPG, XLSX , PDF etc, no more than 10MB</p>

</div>

<div>

<div class="select-file-btn" onclick="browseFiles()">Select File</div>

</div>

</div>

<div class="uploading-area">

<!-- <div class="current-uploading-file">

<img src="../media/images/file-earmark-check-fill.svg" alt="">

<div>Filename.txt</div>

<div class="progress-bar-outer">

<div class="progress-bar-inner"></div>

</div>

</div> -->

<!-- <div class="uploaded-file">

<div class="file-info">

<img src="../media/images/file-earmark-check-fill.svg" alt="">

<div>Filename.txt</div>

</div>

<div>Uploaded</div>

64
</div> -->

</div>

</div>

<button class="encrypt-btn" type='submit'>Submit</button>

</form>

{% if enc %}

<div class="files-container-outer key-container">

<h4>These keys are very important 2nd key will be required for 1st layer
decryption and 1st key will be required for the 2nd layer decryption</h4>

<div class="keys-container-inner">

<div class="headings-row">

<div>S.No.</div>

<div></div>

<div>Key Name</div>

<div class="delete-icon"></div>

<div></div>

<div class="download-heading">Download</div>

</div>

<div class="file-row">

<div class="s-no">1</div>

<div class="file-icon">

<img src="../media/images/Vector.svg" alt="">

</div>

<div class="file-name">

65
RSA Key

</div>

<div></div>

<div></div>

<div class="key-download">

<a href='/media/key/rsakey.key' download class="download-


btn">Download</a>

</div>

</div>

<div class="file-row">

<div class="s-no">2</div>

<div class="file-icon">

<img src="../media/images/Vector.svg" alt="">

</div>

<div class="file-name">

Fernet Pass Key

</div>

<div></div>

<div></div>

<div class="key-download">

<a href='/media/key/fernetpass.key' download class="download-


btn">Download</a>

</div>

66
DECRYPT HTML

{% extends "main.html" %}

{% block style %}<link rel="stylesheet" href="../media/css/encrypt.css"> {% endblock


style %}

{% block content %}

<div class='encrypt-form-container'>

<form class="files-container-outer" method='POST' enctype='multipart/form-data'>

{% csrf_token %}

<div class='file-name-input'>

<h2>Enter your file name:</h2>

<input type='text' name='filename' required id="file-name"/>

</div>

<h2>Upload Files :</h2>

<div class="upload-container">

<div class="upload-area" id="dragDropArea">

<img src="../media/images/feather_upload-cloud.svg" alt="">

<input type="file" class="input-file" id="fileInput" hidden multiple="false"


name="file" required>

<div>

<div>Select a file or Drag and Drop here</div>

<p>JPG, XLSX , PDF etc, no more than 10MB</p>

67
</div>

<div>

<div class="select-file-btn" onclick="browseFiles()">Select File</div>

</div>

</div>

<div class="uploading-area">

<!-- <div class="current-uploading-file">

<img src="../media/images/file-earmark-check-fill.svg" alt="">

<div>Filename.txt</div>

<div class="progress-bar-outer">

<div class="progress-bar-inner"></div>

</div>

</div> -->

<!-- <div class="uploaded-file">

<div class="file-info">

<img src="../media/images/file-earmark-check-fill.svg" alt="">

<div>Filename.txt</div>

</div>

<div>Uploaded</div>

</div> -->

</div>

</div>

<button class="encrypt-btn" type='submit'>Submit</button>

</form>

68
{% if enc %}

<div class="files-container-outer key-container">

<h4>These keys are very important 2nd key will be required for 1st layer
decryption and 1st key will be required for the 2nd layer decryption</h4>

<div class="keys-container-inner">

<div class="headings-row">

<div>S.No.</div>

<div></div>

<div>Key Name</div>

<div class="delete-icon"></div>

<div></div>

<div class="download-heading">Download</div>

</div>

<div class="file-row">

<div class="s-no">1</div>

<div class="file-icon">

<img src="../media/images/Vector.svg" alt="">

</div>

<div class="file-name">

<!-- <div class="uploaded-file">

<div class="file-info">

<img src="../media/images/file-earmark-check-fill.svg" alt="">

<div>Filename.txt</div>

</div>

<div>Uploaded</div>

</div> -->

</div>

69
</div>

<h2>Upload Files :</h2>

<div class="upload-container">

<div class="upload-area" id="dragDropArea">

<img src="../media/images/feather_upload-cloud.svg" alt="">

<input type="file" class="input-file" id="fileInput" hidden multiple="false"


name="file" required>

<div>

<div>Select a file or Drag and Drop here</div>

<p>JPG, XLSX , PDF etc, no more than 10MB</p>

</div>

<div>

<div class="select-file-btn" onclick="browseFiles()">Select File</div>

</div>

</div>

70
B CONFERENCE AND JOURNAL PUBLICATION DETAILS

71
72
73
C PLAGIARISM REPORT

74
75
76
77
APPENDIX 3

PLAGIARISM REPORT

SRM INSTITUTE OF SCIENCE AND TEC HNOLOGY


(Deemed to be University u/ s 3 of UGC Act, 1956)

Office of Controller of Examinations


REPORT FOR PLAGIARISM CHECK ON THE DISSERTATION/PROJECT REPORTS FOR UG/PG PROGRAMMES
(To be attached in the dissertation/ project report)
1. Akshay Modi
Name of the Candidate (IN BLOCK
1
LETTERS)
2. Sahil Singh
3. Saksham
4. Ishaan Markanday

2 Address of the Candidate 3173, Estancia, Chennai - 603203

1. RA2011030010084
3 Registration Number 2. RA2011030010096
3. RA2011030010074
4. RA2011030010082
1. 11/04/2002
4 Date of Birth 2. 23/05/2002
3. 28/12/2002
4. 14/08/2002

5 Department NETWORKING AND COMMUNICATIONS

6 Faculty Engineering and Technology

SecureDataPro: Advanced Encryption and Roboust


7 Title of the Dissertation/Project
Data Chunking System

Whether the above project /dissertation is Group


8 done by

Dr. Manickam M
Associate Professor
9 Name and address of the Supervisor /Guide Department of Networking and Communications
College of Engineering and Technology
Kattankulanthur – 603203
[email protected] (9381051032)

78

You might also like