Adil Khan 9 months ago
AdiKhanOfficial #FYP Ideas

PEC Drive

In any organization, handling of sensitive data is of great concern because transferring it or sending it, from one place to another, requires a lot of security and care. Although such data is mostly shared over a network, a portable storage device should be present to transfer data from one locatio

Project Title

PEC Drive

Project Area of Specialization

Information & Communication Technology

Project Summary

In any organization, handling of sensitive data is of great concern because transferring it or sending it, from one place to another, requires a lot of security and care. Although such data is mostly shared over a network, a portable storage device should be present to transfer data from one location to another, if need be. The proposed project will provide users with the opportunity to compress their precious/sensitive data, in order to handle a large amount of data, and encrypt it by using RSA, an asymmetric encryption algorithm, to bring about the security of the data while it is being sent to another location. If the flash drive is lost or stolen while being transported from one place to another, there is no threat of the sensitive data being revealed due to the use of asymmetric encryption. This is because asymmetric encryption requires two keys, one for encryption and the other for decryption, of the data. Therefore, the attacker will not be able to access or decrypt the data easily. This will give time to the organization to become aware of the loss and take the necessary steps to prevent further loss of the data.

The Project, presented here, is to build a portable mass storage device such as a USB flash drive (16GB) or a Memory Card with installed software, which can compress large amounts of sensitive data and encrypt it by using asymmetric encryption. The compression is being done so data, of large size, can be carried easily from one place to another in our physical storage device. The asymmetric encryption algorithm, named RSA (Rivest, Shamir, and Adelman), is being used to guarantee the security of the data if it is lost or confiscated. After receiving the compressed and encrypted data, the receiver will be able to decrypt and decompress the data to get the original form, by using the same software, in the USB flash drive. Please note that the size of the flash drive, defined here, depends upon the needs of the consumer and further development and may vary.

This Project once developed properly, has a lot of potential in government organizations and intelligence agencies. This is because the need for tools and technology to handle and transport data, in a secure manner, is high in these organizations. Such organizations do have secure networks for transmitting data, but a network can also be compromised. As a result, the secure data, being transmitted, can fall into the hands of the attacker. A physical device, for transmitting data securely, will increase the options and the ease of sending data and receiving data to and from another location. As mentioned before, if the portable device falls into the wrong hands, the asymmetric encryption will make sure that the data will stay secure and be difficult to access.  

Project Objectives

  • To build a portable mass storage device such as a USB flash drive (16GB) or a Memory Card with installed software, which can compress large amounts of sensitive data and encrypt it by using asymmetric encryption.
  • The proposed project will solve a lot of problems as it provides dual functionality. It will compress data for efficient storage of large amounts of data and, encrypt the data with a high-end asymmetric encryption algorithm to ensure the secure storage of the data in a physical manner.

  • A physical device, for transmitting data securely, will increase the options and the ease of sending data and receiving data to and from another location. As mentioned before, if the portable device falls into the wrong hands, the asymmetric encryption will make sure that the data will stay secure and be difficult to access.

Project Implementation Method

Certain methods will be carried out in order to implement and finalize the working of the project:

  1. C#.NET, Python, Firmware/assembly languages for the development of the compression/encryption software and for programming the firmware of the mass storage device.
  2. IDE’s like Visual Studio (Enterprise), binaries, plugins and different other VS frameworks as the toolkits.

  3. A portable storage device, that is, a USB flash drive, of 4 GB, in order, to test and validate the working of the software. The size of the USB may vary accordingly during the execution.

  4. Arduino Uno R3 or Arduino Leonardo or STM32F103C8T6 ARM STM32 SYSTEM DEVELOPMENT BOARD MODULE to fully build a customized USB drive to program its firmware and store a stand-alone Encryption and Compression Software in it.

Benefits of the Project

This project once developed properly has a lot of potential for the intellectuals of government organizations and intelligence agencies. These kinds of individuals are very concerned about saving their precious and sensitive data in some offline portable drive or device.

A physical device, equipped with these kinds of features will increase the chances of data integrity and confidentiality.

As a result, the secure data, being transmitted, can fall into the hands of the attacker. A physical device, for transmitting data securely, will increase the options and the ease of sending data and receiving data to and from another location. As mentioned before, if the portable device falls into the wrong hands, the asymmetric encryption will make sure that the data will stay secure and be difficult to access.  

Technical Details of Final Deliverable

  • A portable mass storage device such as a USB flash drive or a memory card pre-installed with a standalone lossless compression software and embedded into the firmware of that device to compress double the amount of data in the limited size of the mass storage device.
  • After that encrypting it through asymmetric encryption software such as RSA and a biometric thumb scanner in order to guarantee the security of the data if it is lost or confiscated.

Final Deliverable of the Project

HW/SW integrated system

Core Industry

IT

Other Industries

Others , Security

Core Technology

Others

Other Technologies

Internet of Things (IoT)

Sustainable Development Goals

Industry, Innovation and Infrastructure

Required Resources

Item Name Type No. of Units Per Unit Cost (in Rs) Total (in Rs)
Arduino Uno R3 Equipment1680680
Arduino Leonardo Equipment1900900
STM32F103C8T6 ARM STM32 SYSTEM DEVELOPMENT BOARD MODULE Equipment1500500
Breadboard Equipment3300900
Vero board Equipment350150
Printed circuit board Equipment380240
220V 60W ADJUSTABLE TEMPERATURE ELECTRIC SOLDERING IRON WITH 5PCS TIPS Equipment115001500
USB device or Flash drive (32 GB) Equipment210002000
Sandisk memory SD card (16 - 32 GB) Equipment1700700
Printing sheets, ball points etc. Miscellaneous 104004000
Fingerprint Scanner - TTL (GT-511C3) Equipment175007500
Total in (Rs) 19070
If you need this project, please contact me on contact@adikhanofficial.com
MobileElection

In the world of smartphones and computer systems, we have almost everything automated with...

1675638330.png
Adil Khan
9 months ago
Electrical Vehicle charging station

This project will look into how to create an efficient electric vehicle charger. These sta...

1675638330.png
Adil Khan
9 months ago
Door automation through face Recognition

  Unlike other identification solutions such as passwords, verification by email, se...

1675638330.png
Adil Khan
9 months ago
Mechanic Bulao

Vehicle breakdowns are a common problem faced by people on almost daily basis and if they...

1675638330.png
Adil Khan
9 months ago
NETWORK INFRASTRUCTURE OF AN ORGANIZATION

Our project includes: Installation and configuration of Microsoft Server in this proj...

1675638330.png
Adil Khan
9 months ago