Nt1330 Unit 3 Problem Analysis Paper

Words: 339
Pages: 2

Once successfully login, the data owner will select the file he or she want to store on the cloud server. The file selected by user will be split into number of blocks. In order to carry out the splitting of the required file into blocks a FileSplitter algorithm is used. In this algorithm, we check if the file exist or not. If exist then the file is split into user specific size based upon the file size. For example if the file is of size 23kb then it will be split into 20kb and 3kb. Here in the example the size specified to split a file is 20kb. This file splitting algorithm is used to provide extra security to user’s data. As the data is split into parts so if any attacker gets successful in accessing the data, will get data in parts and not the entire data. This algorithm is used to split files of any type such as .txt, .docx, .pdf, .jpg, .png, .zip etc. This file splitting technique is simple and easy to use. It quickly split large files into small chunks. …show more content…
So we have also used AES to provide confidentiality to the data. The blocks which are split now encrypted using AES algorithm by the data owner. Each blocks of file is encrypted and stored on the client. A copy of the encrypted file is transferred to cloud server for storage purpose. AES encryption algorithm uses same keys for encryption and decryption purpose. It supports three keys with different key lengths that is 128, 192 and 256 bits. Longer key provides the strongest encryption. But in terms of performance, shorter keys results in faster encryption time compared to the longer keys. So 128 bit AES is faster as compared to others. Therefore we encrypts data blocks of 128 bits using symmetric keys of size 128 bits. Some other factors which make it effective to use are given in Table