Beruflich Dokumente
Kultur Dokumente
B.Tech
Mid Semester Report on Core Project
Submitted by
i|Page
TABLE OF CONTENTS
1 Introduction iii
2 Problem Definition iv
3 Objective v
4 Literature Review vi
5 Methodology vii
6 Deliverables viii
7 References ix
8 Comments x
ii | P a g e
INTRODUCTION
Our project title is “SOTERIA” which means goddess of spirit of safety and salvation in Greek
mythology. Basically it is about security and in our project we are working on securing
information on cloud.
The information over internet is becoming a critical issue due to security problems. We have
proposed a system for securing the important data from a file. Cryptography algorithms
provides an effective way for protecting sensitive information. It is a method for storing and
transmitting data in a form that is only readable by intended users.
When the file is being added on the server, the file gets converted into byte array. The byte
array will further divide into three different parts and each part is encrypted into respective
techniques namely, AES, DES and RC2.
iii | P a g e
PROBLEM DEFINITION
Cloud computing presents many unique security issues and challenges. In the cloud, data is
stored with a third-party provider and accessed over the internet. This means visibility and
control over that data is limited. It also raises the question of how it can be properly secured.
It is imperative everyone understands their respective role and the security issues inherent in
cloud computing.
Most cloud computing security risks are related to data security. Whether a lack of visibility
to data, inability to control data, or theft of data in the cloud, most issues come back to the
data customers put in the cloud.
iv | P a g e
OBJECTIVE
To achieve a secure platform for storing files on cloud using hybrid cryptography. The stored
image file is completely secured, as the file is being encrypted not just by using one but three
encryption algorithm which are Advanced Encryption Standard (AES), Data Encryption
Standard (DES) and Rivest Cipher2(RC2). The key is also safe as it embeds the key in an
image using LSB Image Steganography.
Sender and receiver both will be having a public key and private key. Sender will use both
keys to encrypt the file and then send the public key to receiver using LSB. Receiver will
combine its private key and public key and then decrypt the file.
v|Page
LITERATURE REVIEW
The research papers claim that there is a large number of researches, even though, the
indication is that there is lack of reliability in cloud computing by users.
We have carried out a systematic review of the existing literature regarding security in Cloud
Computing, not only in order to summarize the existing vulnerabilities and threats concerning
this topic but also to identify and analyze the current state and the most important security
issues for Cloud Computing.
Therefore, the questions in our research was the following: What security vulnerabilities and
threats are the most important in Cloud Computing which have to be studied in depth with
the purpose of handling them?
Based on the literature review, we are going to discuss some security solution in the cloud
computing which had great impact in our proposed model.
vi | P a g e
PROPOSED METHODOLOGY
After the above 4 steps you will have a N files which are in encrypted form which are stored
on the server and a key which is downloaded as public key for decrypting the file and
downloading it.
vii | P a g e
DELIVERABLES
In the end semester, we will be able to deliver a file which is encrypted by AES, DES and
RC-2 and its public key would be embedded in image using LSB. The encrypted file would
be uploaded on cloud. The decryption would happen using public key and private key which
receiver would be having. And our file would be secured from end to end.
viii | P a g e
REFERENCES
• https://www.researchgate.net/
• https://scholar.google.co.in/scholar?q=cloud+security+using+encryption+algori
thm+literature+review&hl=en&as_sdt=0&as_vis=1&oi=scholart
• https://www.mcafee.com/enterprise/en-in/security-awareness/cloud/security-
issues-in-cloud-computing.html
• https://searchsecurity.techtarget.com/definition/Advanced-Encryption-
Standard
• https://searchsecurity.techtarget.com/definition/Data-Encryption-Standard
• http://www.crypto-it.net/eng/symmetric/rc2.html?tab=0
ix | P a g e
COMMENTS
x|Page