Professional Documents
Culture Documents
Group I NIS
Group I NIS
EDUCATION, MUMBAI
Guided By
Ms.K.S.Patil
DEPARTMENT OF COMPUTER ENGINEERING
MAHARASHTRA STATE
BOARD OF TECHNICAL EDUCATION
Certificate
This is to certify that Mr/Ms: Shaikh Sohel Mainoddin, Shaikh Umar Salim,
Shelar Kiran Kailas, Shinde Gaurav Manohar.
1907110247
1907110251
1907110190
Note: Every course teacher is expected to assign marks for group evaluation in first 3
columns and individual evaluation 4th column
Signature:
JSPM’s
JAYAWANTRAO SAWANT POLYTECHNIC,
Handewadi Road, Hadapsar, Pune-28
Department of Computer Engineering
Academic Year 2021-22
Teacher Evaluation Sheet
Note: Every course teacher is expected to assign marks for group evaluation in first 3
columns and individual evaluation 4th column
Signature:
JSPM’s
JAYAWANTRAO SAWANT POLYTECHNIC,
Handewadi Road, Hadapsar, Pune-28
Department of Computer Engineering
Academic Year 2021-22
Teacher Evaluation Sheet
Note: Every course teacher is expected to assign marks for group evaluation in first 3
columns and individual evaluation 4th column
Signature:
JSPM’s
JAYAWANTRAO SAWANT POLYTECHNIC,
Handewadi Road, Hadapsar, Pune-28
Department of Computer Engineering
Academic Year 2021-22
Teacher Evaluation Sheet
Note: Every course teacher is expected to assign marks for group evaluation in first 3
columns and individual evaluation 4th column
Signature:
JAYAWANTRAO SAWANT POLYTECHNIC,
Handewadi Road, Hadapsar, Pune-28
Academic Year 2021-2022
INDEX
5 Output 7
1
Aim of Micro Project:
Data owner has to register in trusted third-party system for keeping the files in cloud
environment.
Data owners create the login credentials for uploading files and those credentials are also
used to upload the user lists and their permissions.
After receiving a particular file from the data owner, the TTP generates keys by using
asymmetric key encryption.
Asymmetric key generation is not discussed in this paper and it is assumed that any
standard asymmetric key generation algorithm (APKI) is utilized for this purpose.
2
Course Outcome Integrated:
3
Actual Procedure Followed:
● Install and run application on your mobile via debugger and login or register.
4
● Enter the file name to be uploaded or browse the file
5
● Enter the username of the person you want to share the files with.
● After entering the username share the files using share button
Fig. 6 In the above screenshot we can see that the file has been shared successfully
6
Output:
● To verify whether the file has been shared successfully login with John's
(Person whom we shared our fles with) credentials.
● After opening the Shared files tab you'll be redirected to the page with the list
of shared files.
7
● Download the shared file by pressing download and logout after completion.
8
Actual Resources Used :-
Sr.
Name of resource / material Specification Quantity Remarks
NO
RAM 2 Gb
1 Computer 1
ROM 256 Gb
Windows
2 MS Word, Notepad 1
OS: 1.6 GHz
3 Internet IETF 1
2021.1.1 Patch
4 Android Studio 1
2 (Bumblebee)
9
Advantages and Disadvantages:
Advantages:
1. Saves Time
Employees don’t have to worry about sending files via email, uploading, or downloading the
files. Instead, they can quickly access the data they need when they need it.
2. Eliminates Multiple File Versions
Instead of having multiple versions of the same file with different information, all the
information is current and is always the most up-to-date version of the file.
3. Saves Money
You don’t have to worry about users having sufficient storage space on their workstations to
save files when you save data on a network server or cloud-based server.
4. Prevents Lost Data
If the event of a computer crash, data is not lost when it is saved on a server with nightly data
backups.
5. File Permissions Limits Access
You can configure network file structures so that only those employees who need access to
the data have it. Additionally, you can even control what they do with the files, such as read-
only, update, save, etc.
Disadvantages:
10
References:
[1] Bharat S. Rawal , S. Sree Vivek (2017) "Secure Cloud Storage and File Sharing".
[2] Kuo-Hsuan Huang , En-Chi Chang , Chen-Lin Chang (2014) "Secure File Sharing Scheme for
Mobile Devices".
[3] M. Malarvizhi , J. Angela Jennifa Sujana , T. Revathi (2014) "Secure File Sharing
Using Cryptographic Techniques in Cloud".
[4] Samaneh Navabpour, Negin F. Nejad Asl, Maghsoud Abbaspour, and Akbar Behzadi (2006)
"Secure Routing in Structured Peer to Peer File-Sharing Networks".
11
Future Scope:
This Application provides users the ability to share data over cloud more securely.
In current stage the data that can be shared is limited and can be increased with the
requirement of it.
Various other encryption algorithms can be used with to meet specific needs from
the application Servers can be improved for better interaction with the shared files.
Various databases can be used to store large amounts of data.
12
Conclusion:
The application developed enable us to share files over cloud securely. This application
uses AES algorithm for encryption and decryption.
A user has the ability to share the files only with the users they wish to.
AES uses higher length key sizes such as 128, 192 and 256 bits for encryption.
Hence it makes AES algorithm more robust against hacking.
AES is mostly used for applications such as wireless communication, financial
transactions, e-business, encrypted data storage etc.
Reason for choosing AES is it is fast and unlike DES, the number of rounds in AES
is variable and depends on the length of the key.
13