Hybrid Cryptography Algorithm Based Secured Storage Android App

Page 1

International Research Journal of Engineering and Technology (IRJET)

e-ISSN: 2395-0056

Volume: 09 Issue: 06 | June 2022

p-ISSN: 2395-0072

www.irjet.net

Hybrid Cryptography Algorithm Based Secured Storage Android App Prathamesh Jagtap1, Harshal Patil2 1,2IT

Engineer, Savitribai Phule Pune University, Pune, Maharashtra India ---------------------------------------------------------------------***---------------------------------------------------------------------

Abstract - Currently the ever-increasing usage of portable

2. Decryption Phase

gadgets and advancement in networking technology is directing us to secure file storage over the internet. Cryptography is the most popularized technology employed for all sorts of data protection. This paper is a broad review of the diverse approaches which are used for securely storing files, and sharing it over the internet. This suggested scheme will also assure the entire system to have confidentiality, integrity, and accessibility mechanisms to be executed in it. In Cloud computing files and software aren't completely held on the user’s system. Files are stored on cloud providers system. The cloud provider can provide a solution to this security problem by encrypting the files by employing encryption algorithm. This paper presents a file security system to give an effective result for the underlying problem of security in cloud systems. In this model, hybrid encryption is employed where files are ciphered by file splitting and RSA is used for the secured communication between users and the servers.

The key is first decrypted and is then used to decrypt the file stored on the cloud server.

2. LITERATURE SURVEY “Secure Storage of Data in Cloud Computing” [1] - Cloud storage brings accessible repository of data, at the same moment there are also hidden security consequences. Data storage security includes authentic access to the data stored in the cloud, namely access authorization and authentication security data sharing and the encryption of stored data to guarantee data confidentiality, cohering of the attainability to effective cryptographic data and inaccessibility to the deleted cryptographic data, using tamper- proof technology to guarantee the verity of the data, as well as using tracking technology to guarantee data traceability. This paper aims secure data deletion in the file system. Here they have designed a file system which supports secure deletion of data that uses CP- ABE which supports fine-coarse access policy to cipher files.

Key Words: Hybrid Cryptography, Storage, Android App, Cloud Server, Integrity, Confidentiality.

1. INTRODUCTION

“Secure File Storage in Cloud Computing Using Hybrid Cryptography Algorithm” [2] - The paper focuses on how files are securely reposited on a cloud platform. Also, it discusses the problem of using only a single algorithm to cipher the file and how inefficient it'll be on the cloud. This paper splits the file into slices and each slice is ciphered using AES, blowfish, RC6algorithm. The key information about which file uses which algorithm is transferred to the receiver utilizing steganography modern approach to file system integrity checking.

The idea of the system is to develop an encoded and protected file depository system to transfer files within users in a remote locality. This system will need an input that's successfully ciphered using any of the algorithm methodologies and store them anywhere. The uploaded files and folders can be downloaded by other users through the same app, but to read the data present in it, they've to decipher the file using the decryption algorithm and the data provided about the file within the users by the possessor. The system uses public-key cryptographic approaches like RSA and AES. Hashing methodologies like static hashing and dynamic hashing are used for achieving integrity. Due to the encryption of data, confidentiality is also attained in the course. The project is also open to new challenges and upcoming changes to other advanced technologies in keeping the data protected.

3. SYSTEM ARCHITECTURE & FLOW DIAGRAMS

The hybrid cryptographic systems usually have two phases as discussed below: 1. Encryption Phase Both file and the key generated are encrypted in this phase. The file is then stored to cloud server either fully or as slices. In case of slices, each slice will have hash data.

© 2022, IRJET

|

Impact Factor value: 7.529

Fig -1: System Architecture

|

ISO 9001:2008 Certified Journal

|

Page 266


Turn static files into dynamic content formats.

Create a flipbook