Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 16

Shri Shankaracharya Institute of Professional Management and Technology, Raipu

MAJOR PROJECT REPORT


ON
SECURE CLOUD SIMULATION
USING ECC ALGORITHM
CSE 8TH SEMESTER
DEPARTMENT OF COMPUTER SCIENCE
AND ENGINEERING

BATCH 2017-21
SESSION JAN-JULY 2021
Presented By: PRESENTATION DATE: 17-06-2021 Guided By:
SRIJAN TIWARI [ 303302217099 ] MRS. SUMITRA SAMAL
SURBHI TRIPATHY [ 303302217103 ] [ Asst. Professor, CSE Dept. ]
VINAY PANDEY [ 303302217115 ]
ABSTRACT

A hybrid model is proposed which is a mixture of elliptical curve cryptography and symmetric key
algorithm.

This scheme can make users assure of the security of data stored in the cloud.

Here, we will apply an ECC and ECDH algorithm that provides the same level of security as other public
key cryptosystems with less key size and strengthens the security of the algorithm.

The whole prototype of the proposed solution would benefit by enabling a proper access mechanism to
avoid un-authorized access to the information system and secure storage to allow access of data over the
cloud network.

06/13/2022 2
INTRODUCTION

Data is being transmitted between two clouds so in order to secure the data most of the systems use the
combination of techniques, including:
⁃ Encryption
⁃ Authentication
⁃ Separation of duties

These security parameters are achieved due to which the performance will gets increased and therefore the Security
is obtained up to higher extent.

Cloud Computing is mainly used for the improving the data handling capability where the services and the resources
will be delivered continuously when and where required due to which the Cloud Computing is in great demand.

06/13/2022 3
PROJECT REQUIREMENTS

User Interface

Platform – Desktop or Mobile browser

Display – 1024x768 or higher, 1366x768 recommended

Color – 16 million colored display

JavaScript enabled browser.

Latest Video and supported Graphics Drivers.

06/13/2022 4
PROJECT REQUIREMENTS

Software Requirement

Operating System: Linux / Windows OS, Ubuntu 16.04 Preferred

Packages: JDK 7 or above

Code Editor or IDE: NetBeans IDE

Relational Database Server: MYSQL Preferred

Web Server: Apache Tomcat Server

06/13/2022 5
PROJECT REQUIREMENTS

Hardware Requirement

Processor: Any appropriate 32 or 64 Bit 2 Ghz processor

Hard Disk: 8 GB + at least 2 GB for Relational Database System

Memory: 2 GB RAM minimum, 4 GB RAM recommended

Connection: LAN Connection with Ethernet

06/13/2022 6
S/W MODEL

Iterative Model

06/13/2022 7
FLOW DIAGRAM

06/13/2022 8
DATA FLOW DIAGRAM

Level-0 DFD

Level-1 DFD

06/13/2022 9
BACK END DETAILS

JavaServer Pages is still widely used to build dynamic web pages that connect to the Java backend and
our project is based on the same. While a relational database is used to link and keep the track of all the
real-time activity.

There are 4 tables used in the overall development of the project.


⁃ Table AUTO_ID
⁃ Table FILES
⁃ Table USER
⁃ Table USER_LOGIN

06/13/2022 10
FRONT END DETAILS
Our project provides a secure and complete simulation of cloud computing. So it consists varieties of
interface screens, from Login to Dashboard to Download.

Landing Page Registration Page

06/13/2022 11
FRONT END DETAILS

Key Exchange Page ECDH Key Agreement Page

06/13/2022 12
FRONT END DETAILS

Dashboard Page Account Profile Page

06/13/2022 13
CONCLUSION

The Project simulates a model that is already quite common for consumer apps like email and photo
sharing, and for certain business applications.

We present a way to secure the data using different security techniques and efficient encryption
algorithms to secure the file along with its location from the users that stores and retrieves it.

The only difference is that the system for which project is targeted is an application-based system like
which will run on the client’s own system.

This application will allow users to upload file of different formats with security features including
Encryption, secure OTP verification, uploading and downloading over the cloud securely.

06/13/2022 14
REFERENCES
⁃ https://www.educative.io/blog/software-process-model-types

⁃ https://dzone.com/articles/how-does-elliptic-curve-cryptography-work

⁃ https://cryptobook.nakov.com/asymmetric-key-ciphers/ecdh-key-exchange

⁃ https://searchsecurity.techtarget.com/definition/Advanced-Encryption-Standard

⁃ N. A. Puri, A. R. Karare and R. C. Dharmik, "Deployment of application on Cloud and enhanced data
security in Cloud computing using ECC algorithm," 2014 IEEE International Conference on Advanced
Communications, Control and Computing Technologies, 2014, pp. 1667-1671

⁃ F. Sabahi, "Cloud computing security threats and responses," 2011 IEEE 3rd International Conference
on Communication Software and Networks, 2011, pp. 245-249

06/13/2022 15
THANKYOU!

06/13/2022 16

You might also like