Implementation of Web-Based File Sharing Security System

##plugins.themes.academic_pro.article.main##

Mike Yuliana
* Corresponding author: mieke@pens.ac.id
Nuril Hidayah
Amang Sudarsono

Abstract

File-sharing activities become a bridge for communication in the form of data between one party and another party. File sharing allows users to share data with other users, by uploading data to the server computer and other users can download data from the server computer. A document security system is indispensable to keep document data safe until its destination. File Web Sharing will transmit data with cryptographic methodologies. The algorithm used is Advanced Encryption Standard (AES), Data Encryption Standard (DES), and Blowfish. This study aims to compare the performance of AES, DES, and Blowfish algorithms when implemented to secure file sharing. Performance research results show that the DES algorithm is on average 8.35% faster than AES and the Blowfish algorithm is 7.11% faster than AES. Memory usage capacity testing shows that the AES algorithm requires 4.82% greater memory capacity than Blowfish, and the DES requires 2.41% greater memory capacity than the Blowfish algorithm.


Kegiatan file sharing menjadi jembatan komunikasi data antara satu pihak dengan pihak lainnya. File sharing memberikan pengguna kemampuan untuk berbagi data dengan pengguna lain, dengan cara mengunggah data ke komputer server dan pengguna lain dapat mengunduh data dari komputer server. Sistem keamanan terhadap dokumen sangat diperlukan untuk menjaga data dokumen tetap aman sampai tujuannya. Web File Sharing akan mengirimkan data dengan metodologi kriptografi. Algoritma yang digunakan adalah Advanced Encryption Standard (AES), Data Encryption Standard (DES), dan Blowfish. Penelitian ini bertujuan untuk membandingkan kinerja algoritma AES, DES dan Blowfish saat diimplementasikan untuk mengamankan file sharing. Hasil pengujian kinerja menunjukkan bahwa algoritma DES rata-rata 8,35% lebih cepat dibandingkan AES sedangkan Blowfish 7,11% lebih cepat dibandingkan AES. Berdasarkan pengujian kapasitas penggunaan memori terlihat bahwa AES membutuhkan kapasitas memori 4,82% lebih besar dibandingkan Blowfish dan DES membutuhkan kapasitas memori 2,41% lebih besar dari Blowfish.

##plugins.themes.academic_pro.article.details##

How to Cite
Yuliana, M., Hidayah, N., & Sudarsono, A. (2024). Implementation of Web-Based File Sharing Security System. MOTIVECTION : Journal of Mechanical, Electrical and Industrial Engineering, 6(1), 41-52. https://doi.org/10.46574/motivection.v6i1.314

References

[1] M. Khairul and R. Jefril, “Analysis and Design of File Security System AES (Advanced Encryption Standard) Cryptography Based,” JAETS (Journal of Applied Engineering and Technological Science)., vol. 1, no. 2, pp. 113-123, 2020.
[2] S. Shuzhou, M. Hui, S. Zishuai, Z. Rui, “WebCloud: Web-Based Cloud Storage for Secure Data Sharing across Platforms,” IEEE Transactions on Dependable and Secure Computing., pp. 1545-5971, 2020.
[3] Sheeja, Bibin, Priya, and Nishanth, “Secure File Sharing System in Cloud Using AES and Time Stamping Algorithms,” IOP Conf. Ser., pp. 906, 2020, doi: 10.1088/1757-899X/906/1/012023.
[4] Esther, Prasad, and Kumar, “Analysis of Cryptography Encryption for Network Security,” IOP Conf. Ser., pp. 981, 2020, doi: 10.1088/1757-899X/981/2/022028.
[5] P. Kuntal, “Performance analysis of AES, DES, and Blowfish cryptographic algorithms on small and large data files,“ Int. J.Inf. Technol., 2020, doi: 10.1007/s41870-018-0271-4
[6] G. Archisman, “Comparison of Encryption Algorithms: AES, Blowfish and Twofish for Security of Wireless Networks,” IRJET., vol. 7, no. 6, pp. 4656-4659, 2020.
[7] H. Taufik and M. Rahutomo, “A Systematic Literature Review Method on AES Algorithm Data Sharing Encryption On Cloud Computing,” International Journal Of Artificial Intelegence Research., vol. 4, no. 1, pp. 49-57, 2020.
[8] V. Akshitha, R. Sai, N. Shaik, and Ravindra, “An Efficient Optimization and Secured Triple Data Encryption Standard Using Enhanced Key Scheduling Algorithm,” Elsevier B.V., 2020, doi: 10.1016/j.procs.2020.04.113.
[9] Y. Wang and Y. Li, “Improved Design of DES Algorithm Based on Symmetric Encryption Algorithm,” IEEE., 2021, doi: 10.1109/ICPECA51329.2021.9362619.
[10] D.G Jatin, K.S. Adarsh, and P.S. Nipun, “Comparative Study on Different Encryption and Decryption Algorithm,” ICACITE., 2021, doi: 10.1109/ICACITE51222.2021.9404734.
[11] A. Haneen and Alenezi, “Performance Evaluation of Cryptographic Algorithms: DES, 3DES, Blowfish, Twofish, and Threefish,” IJCNIS., vol. 14, no. 1, 2022.
[12] P. Pooja and B. Rajesh, “Performance Evaluation of Hybrid Cryptography Algorithm for Secure Sharing of Text and Images,” IRJET., vol. 7, pp. 3773-3778, 2020.
[13] Logunleko, Adeniji and A. Logunleko, “A Comparative Study of Symmetric Cryptography Mechanism on DES, AES and EB64 for Information Security,” IJSRCSE., vol. 8, pp. 45-51, 2020.
[14] L. Thomas and C. Codrin, “Contract cheating by STEM students through a file sharing website: a Covid-19 pandemic perspective,” International Journal for Educational Integrity., 2021, doi: 10.1007/s40979-021-00070-0.
[15] C. Daniel, G.K. Selorm and D.G. James, “Performance comparison of 3DES, AES, Blowfish and RSA for Dataset Classification and Encryption in Cloud Data Storage,” IJCA., vol. 177, no. 40, 2020.
[16] R. Lavanya and M. Karpagam, “Enhancing the security of AES through small scale confusion operations for data communication,” Elsevier B.V., 2020, doi: 0.1016/j.micpro.2020.103041.
[17] D. Roza and S. Mohsen, “Secure Socket Layer in the Network and Web Security,” International Journal of Computer and Information Engineering., vol. 14, no. 10, 2020.
[18] S. Bijeta, D. Surjeet, J. Vivek, L. Dac-Nhuong, M. Senthilkumar and S. Gautam, “Integrating encryption techniques for secure data storage in the cloud,” Trans Emerging Tel Tech., 2020, doi: 10.1002/ett.4108.