Sie sind auf Seite 1von 10

SOTERIA

B.Tech
Mid Semester Report on Core Project

Submitted by

Shobhit Mangla Nimish Latiyan Vamsidhar Reddy


1600144C203 1600285C203 1600277C203
CSE CSE CSE

Under the guidance


Of
Dr. Ashish Bhardwaj

SCHOOL OF ENGINEERING AND TECHNOLOGY


BML MUNJAL UNIVERSITY, GURGAON-122413, INDIA

i|Page
TABLE OF CONTENTS

S. no. Topic Page number

1 Introduction iii

2 Problem Definition iv

3 Objective v

4 Literature Review vi

5 Methodology vii

6 Deliverables viii

7 References ix

8 Comments x

ii | P a g e
INTRODUCTION

Our project title is “SOTERIA” which means goddess of spirit of safety and salvation in Greek
mythology. Basically it is about security and in our project we are working on securing
information on cloud.

The information over internet is becoming a critical issue due to security problems. We have
proposed a system for securing the important data from a file. Cryptography algorithms
provides an effective way for protecting sensitive information. It is a method for storing and
transmitting data in a form that is only readable by intended users.

When the file is being added on the server, the file gets converted into byte array. The byte
array will further divide into three different parts and each part is encrypted into respective
techniques namely, AES, DES and RC2.

iii | P a g e
PROBLEM DEFINITION

Cloud computing presents many unique security issues and challenges. In the cloud, data is
stored with a third-party provider and accessed over the internet. This means visibility and
control over that data is limited. It also raises the question of how it can be properly secured.
It is imperative everyone understands their respective role and the security issues inherent in
cloud computing.
Most cloud computing security risks are related to data security. Whether a lack of visibility
to data, inability to control data, or theft of data in the cloud, most issues come back to the
data customers put in the cloud.

iv | P a g e
OBJECTIVE

To achieve a secure platform for storing files on cloud using hybrid cryptography. The stored
image file is completely secured, as the file is being encrypted not just by using one but three
encryption algorithm which are Advanced Encryption Standard (AES), Data Encryption
Standard (DES) and Rivest Cipher2(RC2). The key is also safe as it embeds the key in an
image using LSB Image Steganography.
Sender and receiver both will be having a public key and private key. Sender will use both
keys to encrypt the file and then send the public key to receiver using LSB. Receiver will
combine its private key and public key and then decrypt the file.

v|Page
LITERATURE REVIEW

The research papers claim that there is a large number of researches, even though, the
indication is that there is lack of reliability in cloud computing by users.

The importance of Cloud Computing is increasing and it is receiving a growing attention in


the scientific and industrial communities. A study by Gartner considered Cloud Computing
as the first among the top 10 most important technologies and with a better prospect in
successive years by companies and organizations.

We have carried out a systematic review of the existing literature regarding security in Cloud
Computing, not only in order to summarize the existing vulnerabilities and threats concerning
this topic but also to identify and analyze the current state and the most important security
issues for Cloud Computing.

Therefore, the questions in our research was the following: What security vulnerabilities and
threats are the most important in Cloud Computing which have to be studied in depth with
the purpose of handling them?

Based on the literature review, we are going to discuss some security solution in the cloud
computing which had great impact in our proposed model.

vi | P a g e
PROPOSED METHODOLOGY

To achieve the above goal, the following methodology needs to be followed:

1. Load the file on the server.


2. Dividing the uploaded file into 3 parts.
3. Encrypting all the parts of the file using AES, DES and RC-2 algorithm
respectively.
4. The keys for cryptography algorithms is then secured using a LSB Image
Steganography and the key for this algorithm is provided to the user as public key.

After the above 4 steps you will have a N files which are in encrypted form which are stored
on the server and a key which is downloaded as public key for decrypting the file and
downloading it.

To restore the file, follow the following steps:

1. Load the public key on the server.


2. Combine the private key which receiver would already be having and public key
which sender will send.
3. Decrypt the keys of the algorithms.
4. Decrypt all the 3 parts of the file using the same algorithms which were used to
encrypt them.
5. Combine all the 3 parts to form the original file and provide it to the user for
downloading.

vii | P a g e
DELIVERABLES

In the end semester, we will be able to deliver a file which is encrypted by AES, DES and
RC-2 and its public key would be embedded in image using LSB. The encrypted file would
be uploaded on cloud. The decryption would happen using public key and private key which
receiver would be having. And our file would be secured from end to end.

viii | P a g e
REFERENCES

• https://www.researchgate.net/
• https://scholar.google.co.in/scholar?q=cloud+security+using+encryption+algori
thm+literature+review&hl=en&as_sdt=0&as_vis=1&oi=scholart
• https://www.mcafee.com/enterprise/en-in/security-awareness/cloud/security-
issues-in-cloud-computing.html
• https://searchsecurity.techtarget.com/definition/Advanced-Encryption-
Standard
• https://searchsecurity.techtarget.com/definition/Data-Encryption-Standard
• http://www.crypto-it.net/eng/symmetric/rc2.html?tab=0

ix | P a g e
COMMENTS

x|Page

Das könnte Ihnen auch gefallen