SlideShare a Scribd company logo
Name: R.Bhargavi
Email:abiramibhargavi6@gmail.com
Twitter ID: abiramibhargavi
University : Pondicherry
Year/Semester : III/VI
Branch : Information Technology
Problem Area
๏‚— In this document we tried to overcome the security
issue faced by cloud during file transfer. Despite of vast
researches made to overcome these issues, there is no
perfect solution till determined. We took this as a
problem and proposed a simple solution to overcome
the issues through DYNAMIC ENCRYPTION
algorithms. Here we use two algorithms namely:
1. AES(Advanced Encryption Standard)
2. RSA(Rivest Shamir Adleman)
Problem Area(Cont..)
๏‚— Where AES is a symmetric algorithm used in server
side for dynamic encryption and RSA is a asymmetric
algorithm used in client side for one time encryption.
This document includes same existing procedure for
easy request and respond from client and server. While
client request for the particular file or data first the file
is decrypted with AES and again it is decrypted with
RSA algorithm in client side.
Solution
๏‚— The topic SCUDE briefly explains Storing and
transferring data in Cloud securely Using Dynamic
Encryption. The encrypted data in cloud server is
again dynamically encrypted with respect to time.
๏‚— Symmetric key algorithms are used to encrypt the data
which rest on cloud, while transferring the data
asymmetric key algorithms are used.
๏‚— The Dynamic Encryption involves two cryptographic
algorithms namely RSA(Asymmetric algorithm) and
AES(Symmetric algorithm).
Working
Solution(Cont...)
๏‚— And for decryption the same algorithm is used in
reverse process.
๏‚— The goal of our project is to provide more security for
data, even though it has some drawbacks and
constraints which we will solve in the upcoming
modules.
๏‚— The main aim of SCUDE is to overcome the Data
Insecurity (During File Transfer).
Impacts
๏‚— This document overcomes five main issues:
1. Data protection in motion
2. Encryption key management
3. Access controls
4. Long-term resiliency of the encryption system
5. Robust Security
๏‚— Through this project we can avoid data insecurity and
data loss using cryptographic algorithms.
Conclusion
๏‚— The main advantage is preventing hacking and
cracking of data from unauthorized source.
๏‚— Reliability and scalability can be improved.
๏‚— This algorithm provides high security with firewalls.
๏‚— Data breach and data loss is the major drawback in the
existing system which has been overcome in SCUDE.
Storage on cloud using dynamic encryption
Ad

Recommended

PPTX
Encryption 2021
JoeOrlando16
ย 
PPTX
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Mahmuda Rahman
ย 
PPTX
Data encryption in database management system
Rabin BK
ย 
PPTX
multiple encryption in clouud computing
Rauf Wani
ย 
PDF
FinalCode-At-A-Glance-Webcopy-Optimized
Phillip Stalnaker
ย 
PDF
Network Security - Defense Through Layered Information Security
Eryk Budi Pratama
ย 
PDF
Multi-part Dynamic Key Generation For Secure Data Encryption
CSCJournals
ย 
PDF
SafeNet DataSecure vs. Native SQL Server Encryption
SafeNet
ย 
PPT
Database Security & Encryption
Tech Sanhita
ย 
PPTX
PCI Compliance Evolved
SafeNet
ย 
PPTX
Information and network security ins
Astha Parihar
ย 
PPTX
E-commerce- Security & Encryption
Biroja
ย 
PPTX
Security services
Gayan Geethanjana
ย 
PDF
Network security chapter 1
osama elfar
ย 
PDF
Network security - OSI Security Architecture
BharathiKrishna6
ย 
PPTX
Security Mechanisms
priya_trehan
ย 
PPT
Network Security 1st Lecture
babak danyal
ย 
PPTX
Ppt.1
veeresh35
ย 
PDF
20171106 - Privacy Design Lab - LINDDUN
Brussels Legal Hackers
ย 
PPT
Technical seminar on Security
STS
ย 
PDF
Computer Security Lecture 1: Overview
Mohamed Loey
ย 
PPTX
Data Network Security
Atif Rehmat
ย 
PDF
Network Security Fundamentals
Fat-Thing Gabriel-Culley
ย 
PPT
Ch01
Joe Christensen
ย 
PPT
Information System Security introduction
Shu Shin
ย 
PPTX
02 introduction to network security
Joe McCarthy
ย 
PDF
Security by Design: An Introduction to Drupal Security
Tara Arnold
ย 
PDF
Classification of secure encrypted relationaldata in cloud computing
eSAT Journals
ย 
PPTX
Cloud computing and security final
Akash Kamble
ย 
PDF
Secure Computing in Enterprise Cloud Environments
Shaun Thomas
ย 

More Related Content

What's hot (19)

PPT
Database Security & Encryption
Tech Sanhita
ย 
PPTX
PCI Compliance Evolved
SafeNet
ย 
PPTX
Information and network security ins
Astha Parihar
ย 
PPTX
E-commerce- Security & Encryption
Biroja
ย 
PPTX
Security services
Gayan Geethanjana
ย 
PDF
Network security chapter 1
osama elfar
ย 
PDF
Network security - OSI Security Architecture
BharathiKrishna6
ย 
PPTX
Security Mechanisms
priya_trehan
ย 
PPT
Network Security 1st Lecture
babak danyal
ย 
PPTX
Ppt.1
veeresh35
ย 
PDF
20171106 - Privacy Design Lab - LINDDUN
Brussels Legal Hackers
ย 
PPT
Technical seminar on Security
STS
ย 
PDF
Computer Security Lecture 1: Overview
Mohamed Loey
ย 
PPTX
Data Network Security
Atif Rehmat
ย 
PDF
Network Security Fundamentals
Fat-Thing Gabriel-Culley
ย 
PPT
Ch01
Joe Christensen
ย 
PPT
Information System Security introduction
Shu Shin
ย 
PPTX
02 introduction to network security
Joe McCarthy
ย 
PDF
Security by Design: An Introduction to Drupal Security
Tara Arnold
ย 
Database Security & Encryption
Tech Sanhita
ย 
PCI Compliance Evolved
SafeNet
ย 
Information and network security ins
Astha Parihar
ย 
E-commerce- Security & Encryption
Biroja
ย 
Security services
Gayan Geethanjana
ย 
Network security chapter 1
osama elfar
ย 
Network security - OSI Security Architecture
BharathiKrishna6
ย 
Security Mechanisms
priya_trehan
ย 
Network Security 1st Lecture
babak danyal
ย 
Ppt.1
veeresh35
ย 
20171106 - Privacy Design Lab - LINDDUN
Brussels Legal Hackers
ย 
Technical seminar on Security
STS
ย 
Computer Security Lecture 1: Overview
Mohamed Loey
ย 
Data Network Security
Atif Rehmat
ย 
Network Security Fundamentals
Fat-Thing Gabriel-Culley
ย 
Information System Security introduction
Shu Shin
ย 
02 introduction to network security
Joe McCarthy
ย 
Security by Design: An Introduction to Drupal Security
Tara Arnold
ย 

Viewers also liked (20)

PDF
Classification of secure encrypted relationaldata in cloud computing
eSAT Journals
ย 
PPTX
Cloud computing and security final
Akash Kamble
ย 
PDF
Secure Computing in Enterprise Cloud Environments
Shaun Thomas
ย 
PPTX
Cryptography
Techprahlad
ย 
PPTX
Cloud Encryption
RituparnaNag
ย 
PPTX
Analysis of-security-algorithms-in-cloud-computing [autosaved]
Md. Fazla Rabbi
ย 
PPTX
Privacy preserving public auditing
vmshimavm
ย 
PPTX
Cloud computing and security 03
Akash Kamble
ย 
PPTX
Security Issues in Cloud Computing
Jyotika Pandey
ย 
PDF
TWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEM
Nexgen Technology
ย 
PPTX
Cryptography - 101
n|u - The Open Security Community
ย 
PPTX
A hybrid cloud approach for secure authorized deduplication.
prudhvikumar madithati
ย 
PPT
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Girish Chandra
ย 
PPT
Security Issues of Cloud Computing
Falgun Rathod
ย 
PPTX
Cryptography
Deepak Kumar
ย 
PDF
AES-Advanced Encryption Standard
Prince Rachit
ย 
PPTX
Aes (advance encryption standard)
Sina Manavi
ย 
PPT
Public Key Cryptography and RSA algorithm
Indra97065
ย 
PPT
Ch11 Basic Cryptography
Information Technology
ย 
PPTX
Cloud security ppt
Venkatesh Chary
ย 
Classification of secure encrypted relationaldata in cloud computing
eSAT Journals
ย 
Cloud computing and security final
Akash Kamble
ย 
Secure Computing in Enterprise Cloud Environments
Shaun Thomas
ย 
Cryptography
Techprahlad
ย 
Cloud Encryption
RituparnaNag
ย 
Analysis of-security-algorithms-in-cloud-computing [autosaved]
Md. Fazla Rabbi
ย 
Privacy preserving public auditing
vmshimavm
ย 
Cloud computing and security 03
Akash Kamble
ย 
Security Issues in Cloud Computing
Jyotika Pandey
ย 
TWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEM
Nexgen Technology
ย 
Cryptography - 101
n|u - The Open Security Community
ย 
A hybrid cloud approach for secure authorized deduplication.
prudhvikumar madithati
ย 
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Girish Chandra
ย 
Security Issues of Cloud Computing
Falgun Rathod
ย 
Cryptography
Deepak Kumar
ย 
AES-Advanced Encryption Standard
Prince Rachit
ย 
Aes (advance encryption standard)
Sina Manavi
ย 
Public Key Cryptography and RSA algorithm
Indra97065
ย 
Ch11 Basic Cryptography
Information Technology
ย 
Cloud security ppt
Venkatesh Chary
ย 
Ad

Similar to Storage on cloud using dynamic encryption (20)

PPTX
Encryption Algorithms for Cloud
Mphasis
ย 
PPT
Attaining data security in cloud computing
Gopinath Muthusamy
ย 
PDF
Efficient two-stage cryptography scheme for secure distributed data storage i...
IJECEIAES
ย 
PDF
The Time-Consuming Task Of Preparing A Data Set For...
Kimberly Thomas
ย 
PDF
IRJET- Data Transmission using RSA Algorithm
IRJET Journal
ย 
PDF
Big data security_issues_research_paper
Luisa Francisco
ย 
PDF
ijrrest_vol-2_issue-2_015
Ashish Gupta
ย 
PDF
A Novel Approach for Data Security in Cloud Environment
SHREYASSRINATH94
ย 
PDF
IRJET- Secure File Storage on Cloud using Cryptography
IRJET Journal
ย 
PDF
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
Naseem nisar
ย 
PDF
Cloud security: literature survey
IJECEIAES
ย 
PDF
Improving Data Storage Security in Cloud using Hadoop
IJERA Editor
ย 
DOCX
SECURE FILE TRANSFER USING AES & RSA ALGORITHMS.docx
spub1985
ย 
PDF
262 265
Editor IJARCET
ย 
PDF
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
IJECEIAES
ย 
PDF
Providing Secure Cloud for College Campus
vivatechijri
ย 
PDF
Cloud computing and a new approach in data encryption technique
Mahmuda Rahman
ย 
PDF
Secure Data Storage on Cloud System for Privacy Preserving
IRJET Journal
ย 
PDF
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
IRJET Journal
ย 
PDF
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET Journal
ย 
Encryption Algorithms for Cloud
Mphasis
ย 
Attaining data security in cloud computing
Gopinath Muthusamy
ย 
Efficient two-stage cryptography scheme for secure distributed data storage i...
IJECEIAES
ย 
The Time-Consuming Task Of Preparing A Data Set For...
Kimberly Thomas
ย 
IRJET- Data Transmission using RSA Algorithm
IRJET Journal
ย 
Big data security_issues_research_paper
Luisa Francisco
ย 
ijrrest_vol-2_issue-2_015
Ashish Gupta
ย 
A Novel Approach for Data Security in Cloud Environment
SHREYASSRINATH94
ย 
IRJET- Secure File Storage on Cloud using Cryptography
IRJET Journal
ย 
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
Naseem nisar
ย 
Cloud security: literature survey
IJECEIAES
ย 
Improving Data Storage Security in Cloud using Hadoop
IJERA Editor
ย 
SECURE FILE TRANSFER USING AES & RSA ALGORITHMS.docx
spub1985
ย 
262 265
Editor IJARCET
ย 
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
IJECEIAES
ย 
Providing Secure Cloud for College Campus
vivatechijri
ย 
Cloud computing and a new approach in data encryption technique
Mahmuda Rahman
ย 
Secure Data Storage on Cloud System for Privacy Preserving
IRJET Journal
ย 
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
IRJET Journal
ย 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET Journal
ย 
Ad

More from Mphasis (20)

PPTX
SMAC
Mphasis
ย 
PDF
Internet of Things
Mphasis
ย 
PDF
Automation
Mphasis
ย 
PPTX
IoT
Mphasis
ย 
PPTX
Home Automation System
Mphasis
ย 
PPTX
IoT
Mphasis
ย 
PPTX
SMAC
Mphasis
ย 
PPTX
Internet of Things
Mphasis
ย 
PPTX
Mphasis kushagra
Mphasis
ย 
PPTX
Internet of Things
Mphasis
ย 
PPTX
SMAC
Mphasis
ย 
PPTX
Io t 22
Mphasis
ย 
PPTX
IoT
Mphasis
ย 
PPTX
IoT
Mphasis
ย 
PPTX
IoT
Mphasis
ย 
PPTX
IoT
Mphasis
ย 
PPTX
Internet of Things
Mphasis
ย 
PPTX
SMAC
Mphasis
ย 
PPTX
IoT
Mphasis
ย 
PPTX
Automation
Mphasis
ย 
SMAC
Mphasis
ย 
Internet of Things
Mphasis
ย 
Automation
Mphasis
ย 
IoT
Mphasis
ย 
Home Automation System
Mphasis
ย 
IoT
Mphasis
ย 
SMAC
Mphasis
ย 
Internet of Things
Mphasis
ย 
Mphasis kushagra
Mphasis
ย 
Internet of Things
Mphasis
ย 
SMAC
Mphasis
ย 
Io t 22
Mphasis
ย 
IoT
Mphasis
ย 
IoT
Mphasis
ย 
IoT
Mphasis
ย 
IoT
Mphasis
ย 
Internet of Things
Mphasis
ย 
SMAC
Mphasis
ย 
IoT
Mphasis
ย 
Automation
Mphasis
ย 

Recently uploaded (20)

PDF
Why Edge Computing Matters in Mobile Application Tech.pdf
IMG Global Infotech
ย 
PDF
CodeCleaner: Mitigating Data Contamination for LLM Benchmarking
arabelatso
ย 
PPTX
IObit Driver Booster Pro Crack Download Latest Version
chaudhryakashoo065
ย 
PDF
Telemedicine App Development_ Key Factors to Consider for Your Healthcare Ven...
Mobilityinfotech
ย 
PPTX
IDM Crack with Internet Download Manager 6.42 [Latest 2025]
HyperPc soft
ย 
PPTX
Iobit Driver Booster Pro 12 Crack Free Download
chaudhryakashoo065
ย 
PDF
What Is an Internal Quality Audit and Why It Matters for Your QMS
BizPortals365
ย 
PPTX
IObit Driver Booster Pro 12 Crack Latest Version Download
pcprocore
ย 
PPTX
Threat Modeling a Batch Job Framework - Teri Radichel - AWS re:Inforce 2025
2nd Sight Lab
ย 
PPTX
IObit Driver Booster Pro 12.4-12.5 license keys 2025-2026
chaudhryakashoo065
ย 
PDF
Azure AI Foundry: The AI app and agent factory
Maxim Salnikov
ย 
PDF
Automated Test Case Repair Using Language Models
Lionel Briand
ย 
PPTX
IDM Crack with Internet Download Manager 6.42 Build 41 [Latest 2025]
pcprocore
ย 
PDF
Automated Testing and Safety Analysis of Deep Neural Networks
Lionel Briand
ย 
PDF
CodeCleaner: Mitigating Data Contamination for LLM Benchmarking
arabelatso
ย 
PDF
Humans vs AI Call Agents - Qcall.ai's Special Report
Udit Goenka
ย 
PDF
IObit Uninstaller Pro 14.3.1.8 Crack for Windows Latest
utfefguu
ย 
PDF
Designing Accessible Content Blocks (1).pdf
jaclynmennie1
ย 
PPTX
Android Notifications-A Guide to User-Facing Alerts in Android .pptx
Nabin Dhakal
ย 
PDF
Which Hiring Management Tools Offer the Best ROI?
HireME
ย 
Why Edge Computing Matters in Mobile Application Tech.pdf
IMG Global Infotech
ย 
CodeCleaner: Mitigating Data Contamination for LLM Benchmarking
arabelatso
ย 
IObit Driver Booster Pro Crack Download Latest Version
chaudhryakashoo065
ย 
Telemedicine App Development_ Key Factors to Consider for Your Healthcare Ven...
Mobilityinfotech
ย 
IDM Crack with Internet Download Manager 6.42 [Latest 2025]
HyperPc soft
ย 
Iobit Driver Booster Pro 12 Crack Free Download
chaudhryakashoo065
ย 
What Is an Internal Quality Audit and Why It Matters for Your QMS
BizPortals365
ย 
IObit Driver Booster Pro 12 Crack Latest Version Download
pcprocore
ย 
Threat Modeling a Batch Job Framework - Teri Radichel - AWS re:Inforce 2025
2nd Sight Lab
ย 
IObit Driver Booster Pro 12.4-12.5 license keys 2025-2026
chaudhryakashoo065
ย 
Azure AI Foundry: The AI app and agent factory
Maxim Salnikov
ย 
Automated Test Case Repair Using Language Models
Lionel Briand
ย 
IDM Crack with Internet Download Manager 6.42 Build 41 [Latest 2025]
pcprocore
ย 
Automated Testing and Safety Analysis of Deep Neural Networks
Lionel Briand
ย 
CodeCleaner: Mitigating Data Contamination for LLM Benchmarking
arabelatso
ย 
Humans vs AI Call Agents - Qcall.ai's Special Report
Udit Goenka
ย 
IObit Uninstaller Pro 14.3.1.8 Crack for Windows Latest
utfefguu
ย 
Designing Accessible Content Blocks (1).pdf
jaclynmennie1
ย 
Android Notifications-A Guide to User-Facing Alerts in Android .pptx
Nabin Dhakal
ย 
Which Hiring Management Tools Offer the Best ROI?
HireME
ย 

Storage on cloud using dynamic encryption

  • 1. Name: R.Bhargavi Email:[email protected] Twitter ID: abiramibhargavi University : Pondicherry Year/Semester : III/VI Branch : Information Technology
  • 2. Problem Area ๏‚— In this document we tried to overcome the security issue faced by cloud during file transfer. Despite of vast researches made to overcome these issues, there is no perfect solution till determined. We took this as a problem and proposed a simple solution to overcome the issues through DYNAMIC ENCRYPTION algorithms. Here we use two algorithms namely: 1. AES(Advanced Encryption Standard) 2. RSA(Rivest Shamir Adleman)
  • 3. Problem Area(Cont..) ๏‚— Where AES is a symmetric algorithm used in server side for dynamic encryption and RSA is a asymmetric algorithm used in client side for one time encryption. This document includes same existing procedure for easy request and respond from client and server. While client request for the particular file or data first the file is decrypted with AES and again it is decrypted with RSA algorithm in client side.
  • 4. Solution ๏‚— The topic SCUDE briefly explains Storing and transferring data in Cloud securely Using Dynamic Encryption. The encrypted data in cloud server is again dynamically encrypted with respect to time. ๏‚— Symmetric key algorithms are used to encrypt the data which rest on cloud, while transferring the data asymmetric key algorithms are used. ๏‚— The Dynamic Encryption involves two cryptographic algorithms namely RSA(Asymmetric algorithm) and AES(Symmetric algorithm).
  • 6. Solution(Cont...) ๏‚— And for decryption the same algorithm is used in reverse process. ๏‚— The goal of our project is to provide more security for data, even though it has some drawbacks and constraints which we will solve in the upcoming modules. ๏‚— The main aim of SCUDE is to overcome the Data Insecurity (During File Transfer).
  • 7. Impacts ๏‚— This document overcomes five main issues: 1. Data protection in motion 2. Encryption key management 3. Access controls 4. Long-term resiliency of the encryption system 5. Robust Security ๏‚— Through this project we can avoid data insecurity and data loss using cryptographic algorithms.
  • 8. Conclusion ๏‚— The main advantage is preventing hacking and cracking of data from unauthorized source. ๏‚— Reliability and scalability can be improved. ๏‚— This algorithm provides high security with firewalls. ๏‚— Data breach and data loss is the major drawback in the existing system which has been overcome in SCUDE.