Professional Documents
Culture Documents
Major Project Report: Secure Cloud Simulation Using Ecc Algorithm
Major Project Report: Secure Cloud Simulation Using Ecc Algorithm
BATCH 2017-21
SESSION JAN-JULY 2021
Presented By: PRESENTATION DATE: 17-06-2021 Guided By:
SRIJAN TIWARI [ 303302217099 ] MRS. SUMITRA SAMAL
SURBHI TRIPATHY [ 303302217103 ] [ Asst. Professor, CSE Dept. ]
VINAY PANDEY [ 303302217115 ]
ABSTRACT
A hybrid model is proposed which is a mixture of elliptical curve cryptography and symmetric key
algorithm.
This scheme can make users assure of the security of data stored in the cloud.
Here, we will apply an ECC and ECDH algorithm that provides the same level of security as other public
key cryptosystems with less key size and strengthens the security of the algorithm.
The whole prototype of the proposed solution would benefit by enabling a proper access mechanism to
avoid un-authorized access to the information system and secure storage to allow access of data over the
cloud network.
06/13/2022 2
INTRODUCTION
Data is being transmitted between two clouds so in order to secure the data most of the systems use the
combination of techniques, including:
⁃ Encryption
⁃ Authentication
⁃ Separation of duties
These security parameters are achieved due to which the performance will gets increased and therefore the Security
is obtained up to higher extent.
Cloud Computing is mainly used for the improving the data handling capability where the services and the resources
will be delivered continuously when and where required due to which the Cloud Computing is in great demand.
06/13/2022 3
PROJECT REQUIREMENTS
User Interface
06/13/2022 4
PROJECT REQUIREMENTS
Software Requirement
06/13/2022 5
PROJECT REQUIREMENTS
Hardware Requirement
06/13/2022 6
S/W MODEL
Iterative Model
06/13/2022 7
FLOW DIAGRAM
06/13/2022 8
DATA FLOW DIAGRAM
Level-0 DFD
Level-1 DFD
06/13/2022 9
BACK END DETAILS
JavaServer Pages is still widely used to build dynamic web pages that connect to the Java backend and
our project is based on the same. While a relational database is used to link and keep the track of all the
real-time activity.
06/13/2022 10
FRONT END DETAILS
Our project provides a secure and complete simulation of cloud computing. So it consists varieties of
interface screens, from Login to Dashboard to Download.
06/13/2022 11
FRONT END DETAILS
06/13/2022 12
FRONT END DETAILS
06/13/2022 13
CONCLUSION
The Project simulates a model that is already quite common for consumer apps like email and photo
sharing, and for certain business applications.
We present a way to secure the data using different security techniques and efficient encryption
algorithms to secure the file along with its location from the users that stores and retrieves it.
The only difference is that the system for which project is targeted is an application-based system like
which will run on the client’s own system.
This application will allow users to upload file of different formats with security features including
Encryption, secure OTP verification, uploading and downloading over the cloud securely.
06/13/2022 14
REFERENCES
⁃ https://www.educative.io/blog/software-process-model-types
⁃ https://dzone.com/articles/how-does-elliptic-curve-cryptography-work
⁃ https://cryptobook.nakov.com/asymmetric-key-ciphers/ecdh-key-exchange
⁃ https://searchsecurity.techtarget.com/definition/Advanced-Encryption-Standard
⁃ N. A. Puri, A. R. Karare and R. C. Dharmik, "Deployment of application on Cloud and enhanced data
security in Cloud computing using ECC algorithm," 2014 IEEE International Conference on Advanced
Communications, Control and Computing Technologies, 2014, pp. 1667-1671
⁃ F. Sabahi, "Cloud computing security threats and responses," 2011 IEEE 3rd International Conference
on Communication Software and Networks, 2011, pp. 245-249
06/13/2022 15
THANKYOU!
06/13/2022 16