{"id":28454462,"url":"https://github.com/devv712/reasearch-paper-1","last_synced_at":"2026-01-28T21:35:15.888Z","repository":{"id":296728498,"uuid":"994260923","full_name":"devv712/Reasearch-paper-1","owner":"devv712","description":null,"archived":false,"fork":false,"pushed_at":"2025-06-01T16:23:04.000Z","size":1762,"stargazers_count":0,"open_issues_count":0,"forks_count":0,"subscribers_count":0,"default_branch":"main","last_synced_at":"2025-06-28T07:40:03.495Z","etag":null,"topics":[],"latest_commit_sha":null,"homepage":"https://doi.org/10.48175/IJARSCT-18707","language":null,"has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":null,"status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/devv712.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":null,"code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null,"zenodo":null}},"created_at":"2025-06-01T15:11:47.000Z","updated_at":"2025-06-01T16:23:36.000Z","dependencies_parsed_at":"2025-06-02T01:57:34.232Z","dependency_job_id":"565f25b6-3306-4dee-b49e-cc50617d6e1a","html_url":"https://github.com/devv712/Reasearch-paper-1","commit_stats":null,"previous_names":["devv712/reasearch-paper-1"],"tags_count":0,"template":false,"template_full_name":null,"purl":"pkg:github/devv712/Reasearch-paper-1","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/devv712%2FReasearch-paper-1","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/devv712%2FReasearch-paper-1/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/devv712%2FReasearch-paper-1/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/devv712%2FReasearch-paper-1/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/devv712","download_url":"https://codeload.github.com/devv712/Reasearch-paper-1/tar.gz/refs/heads/main","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/devv712%2FReasearch-paper-1/sbom","scorecard":null,"host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":286080680,"owners_count":28853018,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2026-01-28T15:15:36.453Z","status":"ssl_error","status_checked_at":"2026-01-28T15:15:13.020Z","response_time":57,"last_error":"SSL_read: unexpected eof while reading","robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":false,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":[],"created_at":"2025-06-06T19:14:20.521Z","updated_at":"2026-01-28T21:35:15.882Z","avatar_url":"https://github.com/devv712.png","language":null,"readme":"Secure Storage on Cloud using Hybrid Cryptography\n\nAbstract: The Evolving Landscape of Cloud Storage Security: A Focus on Hybrid Cryptography\nTechniques\nData security and privacy have become paramount concerns for small and medium-sized businesses\n(SMBs) contemplating the migration of their data from on-premises storage to cloud-based solutions. This\napprehension stems from the perceived lack of control over data stored with cloud service providers\n(CSPs). The concern lies in the potential for unfettered access by CSPs to a client's sensitive information.\nAdditionally, there is a prevailing sentiment that current safeguards are inadequate in preventing\nunauthorized access and data modification within cloud infrastructures. While some CSPs have\nimplemented symmetric and asymmetric cryptographic techniques to bolster security, this paper delves\ndeeper into the realm of emerging hybrid cryptography techniques, specifically in the context of cloud\nstorage security.\nCase Study: Secure Storage Web Application\nThis section details the \"Secure Storage\" web application, designed to provide users with a secure platform\nfor file management and storage. Developed using Python and the Flask framework, the application\nprioritizes user privacy by encrypting uploaded files with the Advanced Encryption Standard (AES)\nalgorithm before persisting them on the server. User authentication is meticulously handled, with\npasswords stored as irreversible hashes within a SQLite database, mitigating the risk of password exposure\nin the event of a security breach.\nUpon registering, users are granted the ability to upload files, which are subsequently encrypted using AES\nwith a pre-defined key. These encrypted files are then stored within a designated directory on the server.\nUsers can download their encrypted files at any time, with on-the-fly decryption occurring during the\ndownload process. The application demonstrably prioritizes user privacy and data security by leveraging\nindustry-standard encryption practices and robust user authentication mechanisms. Additionally, it offers\nan intuitive interface that facilitates the secure storage and retrieval of files.\n\n\nI. INTRODUCTION- The proliferation of digital information in the contemporary era necessitates the development of robust file storage\nsolutions that prioritize security. The \"Secure Storage\" web application emerges as a response to this exigency, offering\nusers a secure platform for managing and safeguarding their files. The application leverages the power of Python and\nthe Flask framework, while adhering to industry-standard encryption techniques to guarantee the confidentiality and\nintegrity of user data.\nCloud computing, a well-established paradigm, has revolutionized the delivery of services and information. It\ntranscends the boundaries of traditional computing by harnessing the ubiquitous nature of the internet to facilitate\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fdevv712%2Freasearch-paper-1","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fdevv712%2Freasearch-paper-1","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fdevv712%2Freasearch-paper-1/lists"}