Authors: Dr. N. Usha Rani, Shaik Danish Anjum, Kokkula Vishal, Narra Hemanth Reddy, Shaik Shahid Akram
Certificate: View Certificate
The use of the internet is continuously expanding. People exchange vast amount of digital data every day. Some information is critical and must be protected from unauthorised access. Encryption methods are critical for preventing unauthorised access to original data. To encrypt data, a variety of algorithms can be utilised. The Advanced Encryption Standard (AES) algorithm, which is extensively supported and used, is one of the most efficient algorithms available. The goal of this work is to demonstrate how to create secure file transfer using AES encryption and decryption techniques in a cloud environment. Hackers can intercept files as they are being sent from the source to the destination. If files are not wrapped, they can be easily exploited. Thus, AES algorithm is used to safeguard file transfer networks. If AES is employed in file sharing systems, it is claimed to dissuade thieves from attempting to steal data when sending files. According to the study\'s findings, AES offers more protection during data encryption and decryption during file transfers without interruption from hackers attempting to steal data intentionally.
In today's world, computers are used for various purposes like gaming, designing, web surfing, and transferring information or files. Internet connectivity plays a crucial role in transferring large amounts of data across different sectors. However, the security risks associated with transferring files across a network pose a significant threat. Therefore, encryption using the AES algorithm is a reliable method to secure the content of the file while it's being transferred, ensuring it reaches the intended destination safely.
Data is considered a vital asset for any organization as it forms the foundation of information, knowledge, and wisdom that can help make accurate decisions and achieve goals. As data continues to grow exponentially, organizations face challenges in storing and exploring the data due to limited resources. Cloud computing has emerged as a popular solution due to its many advantages such as scalability, reliability, and cost-effectiveness. Despite its numerous benefits, cloud computing also faces several obstacles, mainly related to security threats such as data privacy and sharing concerns. Users must trust cloud servers to store and manage their data, making it vulnerable to unauthorized access and misuse. Additionally, data sharing among different stakeholders can result in intentional or unintentional disclosure to unauthorized third parties. Therefore, it's crucial to address these issues effectively to ensure the fast growth of cloud computing technology. Many applications of cloud computing include: 1) Hybrid Cloud 2) Testing and Development 3) Recovery 4) Backup 5) Image Editing Applications 6) Antivirus Applications 7) URL Conversion Applications 8) Social Media Applications 9) Accounting Applications 10) Management Application.
II. LITERATURE STUDY
A comparison  was made between the encryption and decryption performance of three encryption algorithms: AES, DES, and RSA. The same text file was used in four trials, and it was found that AES took the least amount of time to encrypt and decrypt the file, followed by DES and RSA. The results of the simulation showed that the AES algorithm was faster than DES and RSA in terms of encryption and decryption speed. Kao et al. introduced a key management scheme called Cloud, which was designed to protect the cloud from security threats. In Cloud, users' data is indirectly encrypted through RSA using their public keys. The users' private keys are stored on their mobile devices instead of their PCs or servers. Additionally, two-dimensional barcode images are used to represent the users' private keys, which are then used for the decryption of their sensitive data.
The researchers in work proposed and evaluated two cryptographic algorithms  to ensure the confidentiality, integrity, and authenticity of data. The first algorithm uses a hash code and symmetric keys to protect the data's confidentiality and integrity. The second algorithm employs the elliptic curve digital signature algorithm to ensure the authenticity of the data. In addition, they also used the advanced encryption standard-Galois counter mode with the whirlpool hash function to provide both authenticity and confidentiality. Overall, their proposed algorithms aim to provide a secure and efficient solution for protecting sensitive data.
In the paper , various methods and schemes proposed to ensure secure data transfer and storage in cloud environments. The use of RSA algorithm, numerical conversions, digital encoding, and mathematical series are all important in the encryption and decryption of data. The Ciphertext-Policy Attribute-Based Proxy Re-Encryption Scheme and the file hierarchy attribute-based encryption scheme are also effective in providing access control and preventing attacks such as chosen plaintext attacks. However, it's important to note that some schemes may have increased computation costs, which could be a potential disadvantage. Overall, it's crucial for organizations to implement secure methods for data transfer and storage to prevent unauthorized access and ensure the confidentiality, integrity, and authenticity of their data.
The RSA method  may require more storage space and the decryption procedure may take longer due to the longer key bits. However, it is important to note that the RSA  method is still widely used for its security and reliability, especially in situations where confidentiality is of utmost importance. Regarding the fair data access control scheme proposed by Liu et al., the use of fake keys for obfuscation is an interesting approach to enhance security. However, the inefficiency of the authentication scheme should be addressed in future studies to improve the overall security of the proposed scheme.
A system  proposed a CP-ABE scheme that aimed to reduce the computation cost of heavy decryption by facilitating decryption outsourcing, revocation attributes, and policy updating. However, the scheme lacks in terms of privacy protection. The performance of the proposed scheme was analyzed through rigorous tests, which measured storage overhead and processing power.
III. EXISTING SYSTEM
Data protection is the primary concern in the area of information security and cloud computing. Numerous solutions have been developed to address this challenge. However, there is a lack of comprehensive analysis among the existing solutions and a necessity emerges to explore, classify, and analyze the significant existing work for investigating the applicability of these solutions to meet the requirements.
IV. REPOSITORY AND RETRIEVAL USING AES IN CLOUD ENVIRONMENT
A number of models for data protection in the cloud environment have been explored and developed for many applications. Typically, data protection is achieved through leakage prevention and leaker detection and this article concentrates on achieving efficient protection by preventing leakage and detecting 19 the malicious entity responsible for leakage as depicted. The major approaches for preventing data leakage are tailored by utilizing cryptography, access control mechanisms.
The AES  is a symmetric key encryption algorithm that is widely used to protect electronic data. It was selected by NIST in 2001 as a replacement for the older Data Encryption Standard (DES) and Triple DES encryption algorithms. AES uses a fixed block size of 128 bits and supports key sizes of 128, 192, or 256 bits. It uses a substitution-permutation network (SPN) structure to perform its encryption and decryption operations. AES is considered to be very secure and has become the de facto standard for encryption in a wide range of applications, including electronic communication, online transactions, and data storage.
While AES is harder to implement than DES and Triple DES, it has proven to be a more secure and efficient encryption algorithm. Its widespread adoption is due in large part to its strength and reliability, as well as its flexibility and ease of integration into existing systems.
Working of the cipher : AES performs operations on bytes of data rather than in bits. Since the block size is 128 bits, the cipher processes 128 bits (or 16 bytes) of the input data at a time.
The number of rounds depends on the key length as follows : 128 bit key – 10 rounds
192 bit key – 12 rounds
256 bit key – 14 rounds
Creation of Round keys : A Key Schedule algorithm is used to calculate all the round keys from the key. So the initial key is used to create many different round keys which will be used in the corresponding round of the encryption.
In the cloud environment, data protection is of paramount importance, and preventing data leakage is a critical aspect of it. Leakage prevention and leaker detection are two main strategies for achieving efficient data protection. Leakage prevention involves implementing measures that restrict access to data and ensure that only authorized individuals can access it. This can be achieved through various access control mechanisms such as role-based access control (RBAC), attribute-based access control (ABAC), and mandatory access control (MAC), among others.
Cryptography is another approach to preventing data leakage that involves the use of encryption techniques to protect data from unauthorized access.
Encryption can be used to ensure that data is only accessible to those who have the necessary keys to decrypt it. Additionally, encryption can help to ensure that data is not altered or tampered with during transmission or storage. Modern encryption techniques, such as homomorphic encryption, allow for computations to be performed on encrypted data without the need to decrypt it, making it an efficient way to protect sensitive information.
Leaker detection involves monitoring and identifying individuals or entities that are responsible for data leakage. This can involve the use of data loss prevention (DLP) solutions that analyze network traffic and identify patterns that indicate potential data leakage. Leaker detection can also involve the use of forensic analysis to identify the source of data breaches and track down the individuals responsible. In addition to DLP, machine learning algorithms can be utilized to detect anomalies in user behavior and identify potential leakers.
Overall, preventing data leakage is an essential aspect of data protection in the cloud environment. Access control mechanisms, cryptography, and leaker detection are three critical approaches that can be utilized to achieve efficient data protection. By implementing these strategies, organizations can ensure that their data is protected from unauthorized access, leakage, and misuse. It is important for businesses to understand the significance of data protection in the cloud environment and take proactive measures to secure their data.
The process of the work is divided into modules.
A. Cloud Service Provider
B. Data Owner
C. Data User
D. Data Owner Request For Login To Csp (Cloud Service Provider)
The data Owner registers for an account, if the data owner wants to go to the homepage they need to login, when trying to login it will be sent as a request to Cloud Service Provider.
E. Data User Request For Login To CSP
Data User also registers for an account, if the data user wants to go to their homepage first they need to login, when user trying to login it will be sent as request to the Cloud Service Provider.
F. Cloud Service Provider (CSP) Validates Login Access To Both Data Owners And Users
Cloud Service Provider receives the login requests from the both Data Owners and Data Users. CSP only able to validate their accounts. Then the OTP will be sent to that specific persons registered email.
G. Data Owner Upload Files
After enter the key from mail, Data owner can make login. And then data owner will upload the file or data. It will also be stored in cloud.
H. Data User Request For Files
Data users will also make login by entering the OTP key sent by the CSP. Then data user will request for the data owner’s file to an Admin.
I. Admin Approves User’s Request
Admin will receive the request sent by the data user. Admin can approve or reject the request. If the admin accepts the request, the key will be sent to the particular member.
J. Data User Download Files Using Key
Data user will receive the key, after admin accepts the file request. With the secret key, data users now able to download the file or able to view the file safely.
Below results are screenshots of Cloud computing using AES
The use of encryption technologies such as the AES algorithm is crucial to ensure the security of digital data transfers. With the rapid increase in internet usage and the exchange of massive amounts of data, it is essential to protect vital information from unauthorized access. The AES algorithm, which is widely endorsed and implemented, is considered one of the best encryption algorithms in terms of efficiency. Overall, encryption technologies such as the AES algorithm play a critical role in ensuring the security of digital data transfers. As technology advances, it is crucial to continue developing robust solutions to keep up with evolving threats and ensure the safety of vital information.
 Mohammad Ausaf Anwar, Durgaprasad Gangodkar, “Design and Implementation of Mobile Phones based Attendance Marking System”, Department of Computer Science Engineering, Graphic Era University, Dehradun, Uttarakhand, India, 2015.  Jun Lio, “Attendance Management System using a Mobile Device and a Web Application”, Department of Socio-informatics, Faculty of Letters Chuo University  Mahesh G, Jayahari KR, Kamal Bijlani, “A Smart Phone Integrated Smart Classroom”, Amrita e-Learning Research Lab (AERL) Amrita School of Engineering, Amritapuri, Amrita Vishwa Vidyapeetham, Amrita University, India, 2016.  Ekta Chhatar, Heeral Chauhan, Shubham Gokhale, Sompurna Mukherjee, Prof. Nikhil Jha, “Survey on Student Attendance Management System”, S.B. Jain Institute of Technology, Management and Research, Nagpur, 2016.  Singh, G. (2013). A study of encryption algorithms (RSA, DES, 3DES and AES) for information security. International Journal of Computer Applications, 67(19).  Md. Milon Islam, Md. Kamrul Hasan, Md Masum Billah, Md. Manik Uddin, “Development of Smartphone-based Student Attendance System”, Department of Computer Science and Engineering Khulna University of Engineering & Technology, Khulna-9203, Bangladesh, 2017.  Abdullah, Ako. (2017). Advanced Encryption Standard (AES) Algorithm to Encrypt and Decrypt Data.
Copyright © 2023 Dr. N. Usha Rani, Shaik Danish Anjum, Kokkula Vishal, Narra Hemanth Reddy, Shaik Shahid Akram. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.