UGC Approved Journal no 63975(19)
New UGC Peer-Reviewed Rules

ISSN: 2349-5162 | ESTD Year : 2014
Volume 12 | Issue 9 | September 2025

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 10 Issue 5
May-2023
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR2305431


Registration ID:
515256

Page Number

e205-e207

Share This Article


Jetir RMS

Title

Secure Data Transfer Using Cryptography

Abstract

Nowadays clouds have become a very common plot form in the internet world. Cloud computing provides many services in that storage as a service is one. When you are storing your data in a public cloud, securing your data becomes a big challenge. Our data will be stored in remote cloud servers. We can access our cloud remotely. In this case, we have obeyed the provider license agreements. We need to trust providers blindly. So it is very important to secure our data with encryption. We are implementing a secure cloud storage system with AES, Triple DES, and Blowfish algorithms by applying fragmentation. Secret agencies can use our systems to share information. In our project, we have modules named Administrator, Data Owner, Data User, and Cloud Server. The administrator will manage the data owner accounts, data user accounts, and file access permissions. The administrator can monitor uploads and downloads. The data owner will upload the files into the system. We are applying double encryption on the file. The generated cipher text is going to be divided into seven fragments. These fragments will upload into the Firebase cloud. The user can download the files by requesting the file key. The user will receive the key through email after a request is processed by the data owner. If the key is valid the file will download. while downloading the seven fragments will combine as a single fragment and a double description will apply to the file. The plain text will download as a text file. The cloud can track the upload and downloads, the cloud can view data owners' and data users' details.

Key Words

Encryption, AES Algorithm, DES Algorithm, Blowfish Algorithm, Cloud

Cite This Article

"Secure Data Transfer Using Cryptography", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.10, Issue 5, page no.e205-e207, May-2023, Available :http://www.jetir.org/papers/JETIR2305431.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"Secure Data Transfer Using Cryptography", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.10, Issue 5, page no. ppe205-e207, May-2023, Available at : http://www.jetir.org/papers/JETIR2305431.pdf

Publication Details

Published Paper ID: JETIR2305431
Registration ID: 515256
Published In: Volume 10 | Issue 5 | Year May-2023
DOI (Digital Object Identifier):
Page No: e205-e207
Country: Bangalore, Karnataka, India .
Area: Engineering
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

000184

Print This Page

Current Call For Paper

Jetir RMS