Secure File Storage System Using Cloud

Authors

  • Sudhanshu M. Wasu Student, Department of Computer Science and Engineering, BDCE, Sewagram, Wardha, Maharashtra, India Author
  • Dr. Sudhir W. Mohod Professor and Head, Department of Computer Science and Engineering, BDCE, Sewagram, Wardha, Maharashtra, India Author

DOI:

https://doi.org/10.32628/IJSRSET25122213

Keywords:

Cloud Computing, Security, Encryption, Decryption, AES, DES

Abstract

Cloud computing basically comes to focus on IT, a way to increase capacity or add potentiality on the fly without investing in new infrastructure, training new personnel, or licensing new software. It encompasses any subscription-based or pay-per-use service that, in real time over the Internet, extends its existing capabilities. It is often provided "as a service" over the Internet, typically in the form of infrastructure as a service (IaaS), platform as a service (PaaS), or software as a service (SaaS). Microsoft Azure and Google App Engine are the examples of platform as a service. The fast growth in field of "cloud computing" also increases rigorous security concerns. In today’s world most of the communication is done using electronic media. Data Security is widely used to ensure security in communication, data storage and transmission. We have Advanced Encryption Standard (AES) which is accepted as a symmetric cryptography standard for transferring block of data securely. The available AES algorithm is used for text data and it is also suitable for image encryption and decryption to protect the confidential image data from an unauthorized access. This project proposes a method in which the image data is an input to AES Encryption to obtain the encrypted image, and the encrypted image is the input to AES Decryption to get the original image.

Downloads

Download data is not yet available.

References

William Stallings, “Advance Encryption Standard,” in Cryptography and Network Security, 4th Ed., India : PEARSON , pp. 134–165.

Atul Kahate, “Computer-based symmetric key cryptographic algorithm”, in Cryptography and Network Security, 3th Ed. New Delhi : McGraw-Hill, pp. 130-141.

Manoj .B,Manjula N Harihar (2012, June). “Image Encryption and Decryption using AES”, International Journal of Engineering and Advance Technology (IJEAT) volume-1, issue-5, pp.290-294.

Elminaam, D. S. A., Kader, H. M. A., & Hadhoud, M. M. (2008). Performance evaluation of symmetric encryption algorithms. IJCSNS International Journal of Computer Science and Network Security, 8(12), 280-286.

Arora, P., Singh, A., & Tyagi, H. (2012). Evaluation and comparison of security issues on cloud computing environment. World of Computer Science and Information Technology Journal (WCSIT), 2(5), 179-183.

Alanazi, H., Zaidan, B. B., Zaidan, A. A., Jalab, H. A., Shabbir, M., & Al-Nabhani, Y. (2010). New comparative study between DES, 3DES and AES within nine factors. arXiv preprint arXiv:1003.4085.

Mandal, A. K., Parakash, C., & Tiwari, A. (2012, March). Performance evaluation of cryptographic algorithms: DES and AES. In 2012 IEEE Students' Conference on Electrical, Electronics and Computer Science (pp. 1-5). IEEE.

Kakkar, A., Singh, M. L., & Bansal, P. K. (2012). Comparison of Various Encryption Algorithms and Techniques for Secured Data Communication. In in Multinode Network”, International Journal of Engineering and Technology Volume.

Sutton, E. Latency, Packet Loss and Encryption using DES with a VPN.

S. Pavithra, E. Ramadevi,(2012), Performance Evaluation of Symmetric Algorithmns.

Downloads

Published

04-05-2025

Issue

Section

Research Articles

How to Cite

[1]
Sudhanshu M. Wasu and Dr. Sudhir W. Mohod, “Secure File Storage System Using Cloud ”, Int J Sci Res Sci Eng Technol, vol. 12, no. 3, pp. 25–29, May 2025, doi: 10.32628/IJSRSET25122213.

Similar Articles

1-10 of 98

You may also start an advanced similarity search for this article.