Secure-Data

Secure Data

Live Link: https://secure-data-yogendradevil.onrender.com/

About

Our project aims to provide a secure data storage solution by utilizing an innovative technique called Split Shield. With this technique, we can ensure the confidentiality and integrity of users’ text data while storing it in a secure manner.

Split Shield works by dividing the user’s text data into two random parts and storing each part separately in different databases. Before storage, the data undergoes a robust encryption process, which further enhances its security. By splitting and distributing the data, we create an additional layer of protection, making it extremely challenging for hackers to gain access to the complete information even if they manage to breach one of the databases.

The key features of our secure data storage project include:

By implementing Split Shield, our project ensures that users’ text data remains confidential and safe from unauthorized access. Its innovative approach to data storage significantly reduces the risk of data breaches and offers a robust solution for safeguarding sensitive information.

Demo:

https://github.com/yogendradevil/Secure-Data/assets/81254268/86f15a74-6c8c-4de0-ad04-f2c331906fdb

API

The project aims to develop a Spring Boot API that provides secure data encryption and decryption services. The API allows clients to encrypt sensitive information using the AES encryption algorithm and also provides functionality to decrypt the encrypted data.

Endpoint 1: https://split-shild-api.onrender.com/process-string

The /process-string endpoint of the Spring Boot API accepts a string of sensitive data and performs encryption using the AES encryption algorithm. It provides a secure way to protect sensitive information by converting it into an encrypted form.

image

Endpoint 2: https://split-shild-api.onrender.com/process-two-strings

The /process-two-strings endpoint of the Spring Boot API is designed to merge and encrypt two strings of sensitive data using the AES encryption algorithm. It provides a secure way to combine and protect multiple pieces of sensitive information into a single encrypted form.

image

live demo:

Endpoint 1: /process-string

image

Endpoint 2: /process-two-strings

image