Seminar Report PDF
Seminar Report PDF
Seminar Report PDF
On
Submitted for partial fulfillment of the requirement for degree (VII sem)
of
BACHELOR OF ENGINEERING
in
Computer Science and Engineering
From Rashtrasant Tukadoji Maharaj Nagpur University, Nagpur
Submitted By
Yogeshwari Shiwankar
Renuka Wadekar Shayari Chandak
Anuja Bhande Somesh Kohurke
2019-2020
1
CERTIFICATE
This is to certify that the seminar entitled
By
Yogeshwari Shiwankar
Renuka Wadekar Shayari Chandak
Anuja Bhande Somesh Kohurke
ii
ACKNOWLEDGEMENT
This project arose in part out of months of efforts that have been done
since we came to final year. By that time, we have worked with a great number
of people whose contributions in different ways to the research and the making
of this Report deserved special mention. It is our great pleasure to convey
gratitude to them all in our humble acknowledgment.
In the first place we would like to record my gratitude to our guide, Prof.
V. R. Palekar, Department of Computer Science & Engineering DMIETR,
Sawangi(M), Wardha for his supervision, advice, and guidance from the very
early stage of this research as well as giving me extraordinary patience,
throughout the work. Above all and the most needed, he provided us unflinching
encouragement and support in various ways.
At times it is not so easy to capture feelings in words. That is the great sense of
thankfulness we harbour to Prof. P.D. Mude, Department of Computer Science
& Engineering,DMIETR, Sawangi(M), Wardha for his truly scientist intuition,
support and dynamic supervision, which has made him as a constant oasis of
ideas and passions in science, which exceptionally inspire and enrich our growth
as a student. We are indebted to him more than he knows.
Submitted By
Miss.Yogeshwari Shiwankar
Miss.Renuka Wadekar
Miss.Shayari Chandak
Miss.Anuja Bhande
Mr.Somesh Kohurke
iii
CONTENTS
Page
Chapters No
Title Page i.
Certificate of Approval ii.
Acknowledgement iii.
Table of Contents iv.
List of Figures v.
List of Screen-shots vi.
Abstract vii.
Chapter 1 Introduction 1
Chapter 2 Literature Review
Chapter 4 Objective
Chapter 7 Output/Result 10
Chapter 8 Further plan of the project 16
Chapter 9 Conclusion
Future Scope
References 18
iv
LIST OF FIGURE
v
List Of Screenshots
vi
ABSTRACT
vii
Chapter 1
Introduction
The idea for designing the security system came from Cloud storage is
gaining popularity recently. In enterprise settings, we see the rise in demand for
data outsourcing, which assists in the strategic management of corporate data. It
is also used as a core technology behind many online services for personal
applications. Nowadays, it is easy to apply for free accounts for email, photo
album, file sharing and/or remote access, with storage size more than 25GB (or
a few dollars for more than 1TB). Together with the current wireless technology,
users can access almost all of their files and emails by a mobile phone in any
corner of the world.
1.1 Overview
1
numbers, passwords, notes, and other important information that could be used
and misused by a miscreant, a competitor, or a court of law. These data are
cached, copied, and archived by Cloud Service Providers, often without user’s
authorization and control. The system proposed consist of the key generation
logic for cloud server which helps random key generation security. In addition,
our system secures the data and generates the key for each transaction.
1. Authentication
Our System is a Web Based Application it provides a Single Platform where admin/user
can Share and download the file in secured manner this will done by using ECC .
2
Chapter 2
Review Of Literature
2.1 Overview
3
and beneficiary, for such a method just the mark stockpiling is accommodated
the client's open key. Anyhow as the quantity of clients builds, it’s turned into a
testing occupation to have such a declaration stockpiling and also key
conveyance, to defeat this Identity Based Encryption (IBE) was proposed, yet
again it had made the tedious environment as it was supporting just to
coordinated correspondence. After IBE Attribute Based encryption (ABE) made
probability to give multicast correspondence between clients however it was
constrained to just key approach-based encryption and additionally couldn't give
the repudiation sensation to keys. So, this paper means to create a current
framework utilizing MAMM (Multiple Authority Multiple Mediator) with the
utilization of disseminated CP-ABE (Cipher Policy ABE) which upgrades the
disavowal and enhances the execution.
4
paper we define the first ABGS plan, and security thoughts, for example, secrecy
and traceability. We then build the plan and demonstrate it.
Recently, lots of institutes outsource data storage to the cloud such that
a member (owner) of an organization can easily share data with other members
(users). Just due to presence of security concerns in the cloud, both owners and
users are suggested to verify the integrity of cloud data with Provable Data
Possession (PDP) before further utilization on data. However, previous methods
either unnecessarily reveal the identity of a data owner to the untrusted cloud or
any public verifiers, or introduce significant overheads on verification metadata
to preserve anonymity. In this paper, we propose a simple and efficient publicly
verifiable approach to ensure cloud data integrity without sacrificing the
anonymity of data owners nor requiring significant verification metadata. Our
purpose, decouples the anonymity protection mechanism from the PDP. So that
institutes can employ its own anonymous authentication mechanism, and the
cloud is oblivious to that since it only deals with typical PDP-metadata,
consequently, there is no extra storage overhead when compared with existing
non-anonymous PDP solutions. Security analyses prove our scheme is secure,
and experiment results demonstrate our scheme is efficient [4].
5
Chapter 3
Problem Statement
6
Fig.3 1. Alice shares files with identifiers 2, 3, 6 and 8 with Bob by sending
him a single aggregate key.
Assume that Alice puts all her private photos on Dropbox, and she does not want
to expose her photos to everyone. Due to various data leakage possibility Alice
cannot feel relieved by just relying on the privacy protection mechanisms
provided by Dropbox, so she encrypts all the photos using her own keys before
uploading. One day, Alice’s friend, Bob, asks her to share the photos
7
keys is as many as the number of the shared photos, say, a thousand. Transferring
these secret keys inherently requires a secure channel, and storing these keys
requires rather expensive secure storage. The costs and complexities involved
generally increase with the number of the decryption keys to be shared. In short,
it is very heavy and costly to do that. Encryption keys also come with two flavors
— symmetric key or asymmetric (public) key. Using symmetric encryption,
when Alice wants the data to be originated from a third party, she has to give the
encryptor her secret key; obviously, this is not always desirable. By contrast, the
encryption key and decryption key are different in public-key encryption. The
use of public-key encryption gives more flexibility for our applications. For
example, in enterprise settings, every employee can upload encrypted data on
the cloud storage server without the knowledge of the company’s master-secret
key. Therefore, the best solution for the above problem is that Alice encrypts
files with distinct public-keys, but only sends Bob a single (constant-size)
decryption key. Since the decryption key should be sent via a secure channel and
kept secret, small key size is always desirable. For example, we can not expect
large storage for decryption keys in the resource-constraint devices like smart
phones, smart cards or wireless sensor nodes. Especially, these secret keys are
usually stored in the tamper-proof memory, which is relatively expensive. The
present research efforts mainly focus on minimizing the communication
requirements (such as bandwidth, rounds of communication) like aggregate
signature.
8
Chapter 4
Objective
9
Chapter 5
System Architecture
USER AUTHENTICATION:-
Basically whenever a user wants to use the system he/she is required to register
onto the system if not registered. After registration the email is verified by sending the
temporary password on mail itself. Ones the user has id and password he can login into
the system and use system services.
Fig5.1:System Architecture
1. Setup(1 λ , n): the cloud server will use this algorithm to initialize system
parameters as follows: • Generate a bilinear map group system B=(p, G, G1,
e(·, ·)), where p is the order of G and 2 λ ≤ p ≤ 2 λ+1 .
10
• Select a one-way hash function H: {0, 1} ∗ → G. Finally, cloud server
publishes the system parameters params = (B, P ubK, H), where P ubK = (g,
g1, · · ·, gn, gn+2, ..., g2n) ∈ G2n+1 .
2. Keygen: data owner uses this algorithm to generate his/her key pair. It picks a
random γ ∈ Zp, and outputs: pk = v = g γ , msk = γ.
3. Encrypt(pk, i): data owner uses this algorithm to encrypt data and generate its
keyword ciphertexts when uploading the i-th document. To generate the
keyword ciphertexts, this algorithm takes as input the file index i ∈ {1, ..., n},
and:
System Flowchart
At first, we have to visit our website/system, after that if the user is already
register then he can directly login otherwise user must have to register first then
login.
File Upload
File Download
File Share
File Delete
LOGOUT
11
Fig 5.2: System Flow
Figure 5.3 shows the data flow diagram of the system of level 0. First upload a file or
video on cloud after upload the Meta data server for image key to random key
generation.
Pname
User User
Data Data
12
Fig.5.4: Data Flow Diagram-Level 1
13
Chapter 6
Methodology/Algorithm Description
• Key assignment schemes aim to minimize the expense in storing and managing
secret keys for general cryptographic use.
• Utilizing a tree structure, a key for a given branch can be used to derive the
keys of its descendant nodes (but not the other way round).
• Just granting the parent key implicitly grants all he keys of its descendant
nodes. Sandhu proposed a method to generate a tree hierarchy of symmetric keys
by using repeated evaluations of pseudorandom function/blockcipher on a fixed
secret.
14
Mathematical Model
Set S = I, P, R, O
Where I = set of all inputs given to the system. (User name, password, encryption
key)
R= Set of rules.
O= Set of Output.
I= α, β, γ, δ α = login (id,password)
• login successful
• login successful
• x L = XL XOR Pi
• xR = F(XL) XOR xR
• Swap XL and xR
15
• xR = xR XOR P17
• xL = xL XOR P18
Recombine xL and xR
P3=Decrypt (Ef)
O=O1, O2, O3
O2= Ak aggregate key pair (pk,msk) where pk-public key and msk-master key
O3= Df Decrypted file
16
Chapter 7
Output/Result
First have to visit our website/system, after that the following screen will
be display.in that you have to log in.
17
After successfully Login following screen will be display.
18
Chapter 8
Sharing data flexibly and securely is the main issue in cloud computing.
Users prefer cloud to upload their data with different users. Uploading of data to
server may lead to leakage of private data of user to everyone. Encryption is the
best solution, which is provided to share selected data with desired users.
19
Chapter 9
Conclusion
The proposed system provides security using Key Aggregation and ECC
encryption algorithm. This project servers an alternative to key management
systems. The security provided is improvise using a random key generator which
uses a key aggregation function. The proposed system can be used in any
application which includes data sharing between users (either one to one or many
to many) approach.
The main concept of key aggregation will be done for all types of filesw can be
shared through cloud storage.
Key sharing is made secured using key aggregation and file sharing is extended
to 1 to many manner.
Future Scope
In future we can extend following functionalities in this project:
20
References
21
[9] D. Chaum and E. van Heyst. Group signatures. In EUROCRYPT, pages
257–265, 1991
[10] B. Wang, S. S. M. Chow, M. Li, and H. Li, "Storing Shared Data on the Cloud via
Security-Mediator," in International Conference on Distributed Computing
Systems - ICDCS 2013. IEEE, 2013
[11] S. S. M. Chow, C.-K. Chu, X. Huang, J. Zhou, and R. H. Deng, "Dynamic Secure
Cloud Storage with Provenance," in Cryptography and Security: From Theory to
Applications - Essays Dedicated to JeanJacques Quisquater on the Occasion of His
65th Birthday, ser. LNCS, vol. 6805. Springer, 2012, pp. 442-464
[12] S. S. M. Chow, Y. J. He, L. C. K. Hui, and S.-M. Yiu, "SPICE - Simple Privacy-
Preserving IdentityManagement for Cloud Environment," in Applied Cryptography
and Network Security - ACNS 2012, ser. LNCS, vol. 7341. Springer, 2012, pp. 526-
543
[13] S. Kamara, C. Papamanthou, T. Roeder. “Dynamic searchable symmetric
encryption”, Proceedings of the 2012 ACM conference on Computer and
communications security (CCS), ACM, pp. 965- 976, 2012.
[14] Y. Hwang, P. Lee. “Public Key Encryption with Conjunctive Keyword Search and
Its Extension to a Multi-user System”, In:Pairing-Based Cryptography C Pairing
2007, LNCS, pp. 2-22, 2007.
22
Mapping with PO’s and CO’s
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO 10 PO 11 PO 12
PSO 1 PSO 2
23