K-RSA: Secure data storage technique for multimedia in cloud data server (original) (raw)

File Storage on Cloud Using Cryptography

International Journal for Research in Applied Science & Engineering Technology (IJRASET), 2022

Hybrid cryptography is implemented to provide the multilevel of encryption and decryption at both sender and receiver side which increase the security of the cloud storage. This security model gives the transparency to the cloud user. The hybrid encryption algorithm combines the advantages of fast encryption speed of AES algorithm, easy management of RSA algorithm key, and digital signature to ensure the secure transmission of confidential documents. Data/information is the most valuable asset for the modern electronic communication system. Securing data or information has become a challenge in this competitive world. There are many techniques for securing data/information such as cryptography, stenography etc. In this paper, hybrid cryptography has been applied using AES and RSA.AES and RSA algorithms are implemented to provide the multilevel of encryption and decryption at both sender and receiver side which increase the security of the cloud storage. This approach provides transparency to the cloud user as well as cloud service provider in order to reduce the security threats. The proposed model is implemented in C and .NET. Data security is increased up to a maximum extent and it takes less time in uploading and downloading the text file as compare to existing system. [1]

Secure File Storage & Sharing on Cloud Using Cryptography

2021

In today’s world, simply having the capacity to transfer a file from one location to another isn’t enough. Businesses today face multiple security threats and a highly competitive environment. So they need a secure file transfer system to protect and reliably transfer their sensitive, business-critical data. Secure file transfer is a method of data sharing via a secure, reliable delivery method. Also, we use this between a client and a server. Cryptography is a technique that we use for securing information and communication in the presence of third parties. We use this technique to ensure that only those persons to whom the information is intended can read this. By using cryptography, we can prevent unauthorized users from accessing the information which is shared privately. In this paper, the plan proposed is to overcome the issues regarding the data that are being stored by the users on the cloud should be encrypted rather than storing them in a plain form such that the data will...

An efficient and secure data storage in cloud computing using modified RSA public key cryptosystem

International Journal of Electrical and Computer Engineering (IJECE), 2020

Cloud Computing is the ability to improve the utility or train new human resources without investing in new infrastructure, or add capabilities to existence without the latest software licensing. It expanded the capabilities of Information Technology (IT). From the past few years, cloud computing has developed from a good business concept in the best rising sectors of the IT industry. But more information on individuals and companies was put in the cloud, and concerns began to think about how secure the cloud environment was. Despite cloud surrounding structures, enterprise users still do not want to expand their business in the cloud. Security reduces the growth of cloud computing and continues to spread the market with complexity with data privacy and data protection. The security of cloud computing has constantly been an significant aspect of improved quality of service from cloud service providers. Data storage in the cloud has a problem related to data security. However, cloud...

Secure File Storage on Cloud Using Cryptography

International Journal for Research in Applied Science & Engineering Technology (IJRASET), 2022

Hacking became a serious drawback lately. Transference of secure knowledge or communication through the web turns out to be difficult because of security considerations. to anticipate these security hurdles, we tend to use Cryptography, and Image Steganography. Day's cloud computing is currently employed in several areas like business, colleges, and Universities to store a great amount of knowledge. We will extract knowledge from the cloud for the asking of users. To store knowledge on the cloud we've to face several errors and issues. Cryptography and steganography techniques area unit well-liked currently a day's for knowledge security. using one algorithmic rule isn't effective for prime-level security to knowledge in cloud computing. during this paper, we initiated a new security mechanism using symmetrical key cryptography algorithmic rules and steganography. during this projected system AES, blowfish, RC6, and 3DES algorithms area units were used to supply blockwise security to knowledge. All algorithms have a key size of 128 bits. Key data contains that a part of the file is encrypted using that algorithmic rule and key. The file is split into eight components. every part of the file is encrypted using different algorithmic rules. All components of the file area unit are encrypted at the same time with the assistance of the multithreading technique. encoding Keys area unit inserted into cowl image using LSB technique. Steganography image is sent to a valid receiver using email. For file secret writing purposes reverse method of cryptography is applied.

STUDYING AND ANALYZING DATA SECURITY IN PUBLIC CLOUD STORAGE USING AES WITH RSA ALGORITHM

STUDYING AND ANALYZING DATA SECURITY IN PUBLIC CLOUD STORAGE USING AES WITH RSA ALGORITHM, 2022

ABSTRACT Nowadays, every technology starts a journey to cloud computing, cloud computing provides different services and frameworks. Because of the behavior of the cloud, it gets higher acceptance in today's technology. Cloud storage is one of the cloud computing services. It provides storage for different file sizes and file formats for different companies or organizations. Moreover, Network safety has become an important issue in recent years. Encryption has been developed as a solution and plays an important role in the security of information systems. Many methods are required to secure the shared data. The advanced internet, networking firms, health information and the cloud applications have significantly increased our data every minute. The current work focuses on cryptography to provide the protection for sensitive data that exchanged between personal users, companies, organizations, or in the cloud applications and others during the transfer of data across the network. Firstly, Data sent from sender to network receiver must be encrypted using the cryptographic algorithm. Secondly, the recipient shows the original data using the decryption technique. This paper presents in two encrypting algorithms such as AES and RSA, and their efficiency is compared based on the analysis of the time. The paper presents a file security model which is the AES-RSA encryption method to meet security needs. This paper ensures the encryption is accurate in every type of format and file size and it proposes for which data size and data format the algorithm is suitable.

Study and improved data storage in cloud computing using cryptography

2021

Cloud computing is becoming a powerful network architecture to perform computing that is both large and complex. We present a cloud computing survey which outlines its core concepts, architectural principles, state-ofthe art deployment and research challenges. Due to security issues, information over the Internet is becoming important. We have suggested a method to protect critical file data. Cryptography algorithms are an efficient way to encrypt sensitive data. It is a retrieval and transmission system that is readable only by intended users. The low cost and data usability of cloud computing is advantageous. Cloud storage has many advantages at low cost and data connectivity through the Internet. Ensured cloud data protection is an important part of the cloud computing environment because customers often store sensitive information with cloud storage services but they are not secure services. So, it remains a challenge to exchange data in a safe way while storing data from an unc...

2273 |P a g e An Enhanced Security Technique for Storage of Multimedia Content over Cloud Server

Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services of the internet. Cloud computing allows consumers and businesses to use applications without installation and access their personal files at any computer with internet access. With the development Internet multimedia computing has emerged as a technology to generate, edit, process, and search media contents, such as images, video, audio, graphics, and so on. Multimedia cloud computing has the potential for tremendous benefits, but wide scale adoption has a range of challenges like Multimedia and service heterogeneity, QoS heterogeneity, Network heterogeneity, Device heterogeneity ,Security, Power Consumption that must be met. But data security and access control is the main challenge when users outsource sensitive data for sharing on cloud servers which is not within the same trusted domain as data owners. To keep sensitive user data confidential against untrusted servers, various methods have been proposed in the literature. This paper explores a new method which is a combination of roll based access control with advanced encryption algorithm (a combination of RSA and two fish),signature verification to enhance security when storing text, image ,audio ,video files onto cloud server.

Secure Data Storage in Cloud Computing using RSA Algorithm

2019

Cloud Computing is a way to enhance the facility or add capabilities with liveliness without investing in new infrastructure, training new human resources, or licensing latest software. It extends Information Technology’s (IT) existing capabilities. In the preceding few years, cloud computing has full-grown from being a promising business concept to one of the fast growing sector of the IT industry. But as more and more information on individuals and companies are placed in the cloud, concerns are beginning to raise about just how secure cloud environment it is. Despite of all the build-up surrounding the cloud, enterprise customers are still unwilling to deploy their business in the cloud. Security is one of the major issues which reduces the growth of cloud computing and complications with data privacy and data protection continue to outbreak the market. Due to storing data on cloud there is an issue of data security. To ensure the correctness of user’s data in the cloud, we recom...

Secure the File Storage on Cloud Computing Using Hybrid Cryptography Algorithm

International Journal for Research in Applied Science & Engineering Technology (IJRASET), 2022

The proposed of this paper is for the security needs of the cloud data center. Blowfish is used to convert encrypt file cuts, takes the minimum amount of time, and has the extreme throughput for encryption and decryption from other compatible algorithms. The idea of spreading and mixing meets the principle of information security. The hybrid approach makes the remote servers more secure when deployed in a cloud environment and, thus helps cloud providers gain more trust from their users. Used for data safety and privacy issues, the basic challenge of separating sensitive data and access control has been met. Cryptography techniques translate original data into an unreadable format. The encryption technique is divided into private key encryption and public-key encryption. Here we will use AES 128-algorithm, DES, RC, and LSB encryption techniques. This technique uses keys to translate data into an unreadable format. Therefore only authorized persons can access data from the cloud server. Ciphertext data is visible to all.

Secure File Storage on Cloud using Hybrid Cryptography

International Journal of Computer Sciences and Engineering, 2019

In this era cloud computing is used in various fields like industry, military, college, etc. for various services and storage of huge amount of data. Data stored in this cloud can be accessed or retrieved on the users request without direct access to the server computer. But the major concern regarding storage of data online that is on the cloud is the Security. This Security concern can be solved using various ways, the most commonly used techniques are cryptography and steganography. But sometimes a single technique or algorithm alone cannot provide high-level security. So we have introduces a new security mechanism that uses a combination of multiple cryptographic algorithms of symmetric key and steganography. In this proposed system 3DES (Triple Data Encryption Standard), RC6 (Rivest Cipher 6) and AES (Advanced Encryption Standard) algorithms are used to provide security to data. All the algorithms use 128-bit keys. LSB steganography technique is used to securely store the key information. Key information will contain the information regarding the encrypted part of the file, the algorithm and the key for the algorithm. File during encryption is split into three parts. These individual parts of the file will be encrypted using different encryption algorithm simultaneously with the help of multithreading technique. The key information is inserted into an image using the LSB technique. Our methodology guarantees better security and protection of customer data by storing encrypted data on a single cloud server, using AES, 3DES and RC6 algorithm.