1A.Anandita Iyer, 2Preeti,
3B. Bharathi

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!

order now

1,2 Student,  3Professor

Department of
Computer Science & Engineering,

Institute of Science and Technology, Chennai-119

[email protected]
, [email protected]
, [email protected]



The easiest way to store data and to achieve
portability of data, pen drive is widely used. Different forms of data can be
stored in the pen drive i.e., whether the data is in the form of document or in
the form of images anything can be stored. The data stored in it can be
confidential and there may be chances that the owner of pen drive doesn’t what
to share it with anybody else.


Moreover pen drives are very small in size. There
are chances that they are lost easily or easily be stolen. Its needed to make
the data secure and have some authentication in the pen drive so that even when
the pen drive is lost/stolen the access to pen drive is prohibited. The main
focus of this project is to secure the data present in the pen drive.



      Log Files, Encryption, RSA, AES, RF ID, GPS





(audio, video, text, etc.) can be transferred to and from computer quickly with
the help of Pen drives. Data can easily be read and written on the Pen Drive,
just by plugging it into the computer. Because of  the compact as well as portable nature of the
pen drives, it is been used worldwide and also doesn’t need  any power supply externally. Pen drives have
replaced previous storage device like Floppy disks and CD’s because of its numerous
benefits as, like fast file access and transfer as well as larger data storage capacity.

Drive’s storage capacity can vary from few megabytes to over 100 GB. Nowadays
even external hard drives are also available with huge storage capacity, which can
be connected as Pen Drive to computer’s USB port. As it is an external storage
device, chances are that it may get lost easily. Sometimes the data which we
store in our external storage device(Pen drive in our case) can be really
confidential, so if it gets lost it can have various consequences. So the aim of
this project is to provide security to the data, that even if somebody gets the
pen drive, they are unable to misuse it. After securing the data it’s necessary
to get our pen drive back. To do so we need to track the location of the Pen




When compared
to fixed Winmax, mobile networks have high security architecture9,12, because
it is wireless and also very secured as it implements various protocols.
Protocols like, Privacy and key management protocol version 2, X.509
certificate, Security Associations etc and also different encryption methods.
Other ECC techniques with mobile networks can be also used so as to ensure
strong authentication. This along with RSA techniques ensure secure


Uses RSA key encryption
technique. Splits the data into smaller encryption key.  Hence encryption process is faster and easier
to execute.


are two Cryptographic techniques mostly used, Secret-Key Cryptography and
public key cryptography13,5. Secret-Key Cryptography, also known as single-key
or private-key or symmetric key or one-key 
encryption technique. It uses one and same key for both encryption and
decryption side. If we use this technique, its cost is very less but has many
drawbacks like, shared secret key requirement, distribution of same key on both
sides, authentication and non-repudiation.


public-key cryptography which is also referred to as public key encryption,
makes use of two different key on both encryption side and decryption side,
i.e. public key and private key respectively. Here, the public key is available
to all and is used in encrypting the messages. Whereas the private key is more
like a hidden key or a secret key, and is used to decrypt the message. RSA
algorithm uses multiple keys to perform encryption and decryption and hence it
helps in a very secure transmission of data and message. RSA algorithm works better
if the key value is large, because it will be difficult to find the factor of


mentioned above, large key size helps better authentication. But it also
consumes space and wont be easy and user friendly. So to overcome this problem
a hybrid cryptographic technique 18,15 has been prepared. It includes, RSA,
DES and SHA1 algorithms. This is done majorly to enhance the encryption process
and provide more security in key generation. This also helps in reducing key
size considerably and improving the key complexity. This encryption technique
is used in the JAVA environment. And the performance of hybrid encryption is
assessed on the basis of encryption and decryption time and space complexity.


studies has shown that AES algorithm6 works faster as compared to other
encrypting and decrypting algorithms. 
The encryption time of AES is very less compared to the encryption time
take by RSA. AES is more secured than RSA or DES or Tipple DES. AES is more
better, secure and faster algorithm to work with.


data encryption techniques 2,3 is based on file matching technique. It makes
indexes of the stored file and supports a secure environment for user search.
Further the file matching the keyword in the various searches and ranked based
on the relevant frequency and file length. This also helps in solving the
problems of multi-keyword search on cloud data, and sets of different privacy
requirements. Among different multi-keyword semantics, by choosing the
principle of coordinate matching to effectively represent similarity between
query keywords and outsourced documents, and using inner product similarity,
the principle of similarity measurement. Studying some further enhancements of
the ranked search mechanism, supports more search semantics, i.e., TF _ IDF,
and dynamic data operations. Access control for the different users has been
achieved and the integrity check of data which is been outsourced to the cloud
has examined efficiently. It provides virtualized security to the data. It
majorly concentrates on data indexing and extracting.



Scanning 8,16,17 helps in locating the pen drive. This can be implemented
with the help of a circuit which will be on the pen drive. The circuit is
implemented on Matlab Simulink as it gives an accurate result. And there is a
GPS (in our phones) used with the barcode so that it becomes easy to track the
pen drive. It is an added functionality that provides better result.


circuit attached to the pen drive contains a set of micro chip and micro
controller for data   transmission and a
separate data logger to store pen drive information, i.e. its longitudinal
latitude information.  Hence making its
easy to track the pen drive. The only drawback to the arrangement is that the
pen drive should be properly charged. The circuit should have enough charge to
transfer information to mobile gps                              


Fig 1. Block Diagram


The  figure1 is explained as;


ATmega644:  We use ATmega644
to transfer data between hardware components present in the



2472: We
use Max2472  to 
trace the location and  to find
out the latitude and longitude position of the device.


logger: We
use Data logger for storing all the data
that is collected in the form of co-ordinates. The data will be sent to a data
logger and it will save that data.


unit: To supply power to the circuit,
we use a rechargeable unit. This rechargeable unit supplies the power to the
circuit. It will charge the USB device, when it will be connected to the


ID 1,4,14 can also be used for device tracking. It is a small chip which
sends the location of the device within a specified range. The drawback with RF
ID is that, its perimeter range for device location is very small, i.e. 30-40


GPS vehicle
tracking System 7,10,11. This system makes use of the latitude and longitude
of the location of a vehicle which is to be tracked. Google maps are being
used. The user makes the request for tracking the vehicle and the device
responds via SMS. The SMS contains of the latitude and longitude information
about the vehicle and thus using it we can locate the vehicle on google maps.
In addition to tracking, we can also perform various functions remotely on the
vehicle, like switching ON ignition system, switching it off too, locking the
doors of the vehicle and remotely unlocking the doors. Firstly, a signal is
sent by the user to the tracking system. As soon as the signal is received, the
system tracks the vehicle and a SMS is sent to the user that contains the exact




encryption algorithms are being compared on based of attributes like: key size,
execution time, security level, block size etc.


Table 1:  Encryption algorithm comparison


Input Key Size

Execution Time(ms)

Security Level

Block Size





Medium Level


Diffie-Hellman Key Exachage




High Security


RSAAsymmetric  Algorithm




High Security






Medium Level






Very High Security



Proposed Method





The extra cost
apart from buying the pen drive is that of the GPS (micro GPS) which costs
nearly about 600 rupees. Though it is more than the cost of pen drive but we
can compromise few bucks for it as it provides us the facility to locate our
lost pen drive. If our pen drive is lost then definitely we will buy a new one.
So despite of buying a new pen drive we can spend some money to buy a pen drive
with inbuilt GPS system.



In order to
encrypt the data present in the pen drive we are going to use RSA
encryption-decryption algorithm. It occupies space of nearly about 0.5-0.6 GB
in the pen drive which is approximately negligible.



In order to make
the pen drive to be used by everyone different security measures are provided.

If the pen drive
is going to be used by corporate then in that case they can make use of the
.EXE & LOG file security measure. But if pen drive is going to be used by
some common people like students etc. then they can follow the
username-password security followed by encryption-decryption algorithm which
makes the pen drive feasible.      



Hence after
referring various papers it can be concluded that, in the proposed project, the
pen drive can be devised with a MINI GPS
for easy TRACKING of the pen drive. And
for DATA SECURITY in pen drive, it
can be done in two ways:

the data is vulnerable and cannot be compromised at any cost, then .EXE FILE & LOG FILE approach is
used. That is, the system will have the exe files installed, and the pen drive
will be having the IP address of the system saved in the log file. If the IP
address is matched then only the system can access the data in the pen drive,
or else a mail is sent to the owner and the drivers of the pen drive are


the USB is to be used among a group of people, then USERNAME-PASSWORD authentication will be provided. Then the data
will be encrypted and decrypted
using a KEY. If the key is entered
wrong more than the specified number of times, then again information regarding
unauthorized access is sent to the owner and the USB drivers are blocked.


to the survey, it is found that the AES
Encryption Technique is the most suitable technique to encrypt data.




1.      Ajinkya C Bapat,  Sonali U Nimbhorkar  ” RFID Based Object Tracking System
Using Collaborative Security Protocol” DOI 10.4010/2016.943 ISSN 2321 3361 ©
2016 IJESC   


MS , Renita Tellis “Cloud Data Encryption Using RSA,Enabling Multi-Keyword
Ranked Search and Achieving Privacy Requirements” International Journal of
Advanced Research in Computer and Communication Engineering Vol. 5, Issue 5,
May 2016


Symmetric encryption:improved definition and efficient
constructions”.In:proceedings of the 13th ACM conference on computer and         communications security, pp.79-88


4.      Darshankumar Dalwadi*,
Insiya Guriwala, Shiwangi Chaudhary, Miloni Kapadia & Megha Savalia  “Implementation of Attendance System based on
RFID and GSM with respect to Power Saving Concept” International Journal
of Current Engineering and Technology E-ISSN 2277 – 4106, P-ISSN 2347 – 5161
©2016 INPRESSCO®, All Rights
Reserved Available at


Pugila, Harsh Chitrala, Salpesh Lunawat, P.M.Durai Raj Vincent “An efficeient
encrpytion        algorithm based on public key
cryptography”,IJET ,Vol 5 No 3 Jun-Jul 2013, pp. 3064-3067


Prerna Mahajan & Abhishek Sachdeva, IITM, India,  Global Journal of Computer Science and
Technology, Network, Web & Security, Volume 13 Issue 15 Version 1.0 Year


N. Alkhalil, E. Ahmad and R. Jodeh, “Ubiquitous GPS vehicle tracking and
management system,” in IEEE Jordan Conference on Applied Electrical
Engineering and Computing Technologies (AEECT), Amman , December 2011.


8.      K.Lakshmi Sudha, Shirish Shinde, Titus Thomas “Barcode based Student Attendance System” International Journal of Computer
Applications (0975 – 8887) Volume 119 – No.2, June 2015


R Chandrasekhara Pillai and M P Sebastian,” Elliptic Curve basedAuthenticated
Session         KeyEstablishment Protocol
for High Security Applications in Constrained Network          Environment”,International Journal of
Network Security & Its Applications (IJNSA),Vol.2, No.3, July           2010


10.  M. Parvez, K. Ahmed, Q. Mahfuz and M. Rahman, “A
theoretical model of GSM network based vehicle tracking system,” in
International Conference on Electrical and Computer Engineering (ICECE), Dhaka,


11.  Mashood Mukhtar “GPS based Advanced Vehicle Tracking
and Vehicle Control System” International Journal of  Intelligent Systems and Applications, 2015,
03, 1-12 Published Online February 2015 in MECS        ( DOI:


12.  Rajesh Yadav, S.Srinivasan, Sunil
Gupta “Security Analysis of RSA and ECC in Mobile Wimax”         International conference on Signal
Processing, Communication, Power and Embedded System, 2016 


13.  Sarthak R Patel,  Prof. Khushbu Shah,  Gaurav R Patel “Study on Improvements in RSA
Algorithm” Study on Improvements in RSA Algorithm| ISSN: 2321-9939


14.  Saravanan Sundaresan, Robin Doss
“Secure Ownership Transfer in Multi-tag/Multi-owner Passive RFID Systems”
Globecom 2013 – Symposium on Selected Areas in Communications


15.  Seyed Mohammad Seyedzadeh,Sattar
Mirzakuchaki,”A fast color image encryption algorithm  based on coupled two-dimensional piecewise
chaotic map”, & 2011 Elsevier B.V.


16.  Suhas Machhindra Gaikwad, Rahul Joshi, Shishir
Machhindra Gaikwad “Find Out Pen Drive
Location with the Help of Mobile GPS” International Journal of Computer Applications (0975 – 8887) Volume 135
– No.2, February 2016


17.  Suhas Gaikwad: “Cohort
Intelligence and Genetic Algorithm along with AHP to recommend an Ice Cream to
a Diabetic Patient”. Lecture Notes In Computer Science, 12/2015: chapter
Cohort Intelligence and Genetic Algorithm along with AHP to recommend an Ice
Cream to a Diabetic Patient:  pages 1-9;
SEMCCO 2015.


18.  V. Kapoor Dept,  Rahul Yadav “A Hybrid Cryptography Technique
for Improving Network Security” International Journal of Computer Applications
(0975 – 8887) Volume 141 – No.11, May 2016