Professional Documents
Culture Documents
Presentation Vijay K
Presentation Vijay K
Presentation Vijay K
By
VIJAY KUMAR K
INTRODUCTION
Cloud computing is a practice of using remote servers to store,
manipulate and process data rather than a local computer. Cloud
computing has become more popular because of its flexibility and
availability of data at anytime, anywhere. Ensuring the security of
cloud computing is a major factor in the cloud computing
environment, as users often store sensitive information with cloud
storage providers but these providers may be untrusted. The
traditional solution to ensure data confidentiality by data
encryption is not sufficient due to the fact that the user’s data
needs to be manipulated in the virtual machines of cloud providers
which cannot happen if the data has been encrypted
OVERALL DESCRIPTION OF THE PROJECT
We have in mind a hybrid model proposed which is a mixture of
Elliptical Curve Cryptography and a symmetric key algorithm.
ECC is used to achieve the process of user’s verification and
to keep the private data secure. AES (or whichever gives best
results) algorithm is used which allows the user to store and
access their data securely in the cloud by encrypting the data
in the client side and decrypting the data after downloading
from the cloud.
USECASE DIAGRAM
SOFTWARE AND HARDWARE SPECIFICATION
Hardware Interface
Processor – i3/i5/i7 x64 Bit Minimum 2 Ghz.
Hard Disk – 8 GB + at least 2 GB for Relational Database
System
Memory – 2 GB RAM minimum, 4 GB RAM recommended
High Speed Internet Access
LAN Connection with Ethernet.
SOFTWARE REQUIREMENTS
Linux / Windows OS, Ubuntu 16.04 Preferred
JDK 7 or above
NetBeans IDE
Relational Database Server, MYSQL Preferred
Apache Tomcat Server
Spring tool
FUNCTIONAL REQUIREMENTS
The functional requirement part discusses the functional
behaviour that should be possessed by the system. Each
requirement maps to a higher-level function that transforms
the given set of input data into output data. The functional
requirements can be identified as the modules involved.
These modules perform separate functions based on the
given input and return output data for the next level. Each
module acts as an independent entity acting on its own but
the output collected is just an intermediate data for other
modules.
FUNCTIONAL REQUIREMENTS POSSED BY SYSTEM
ARE
Introduction Module
Registration Module
Key Exchange Module
ID Generation Module
Login Module
Introduction Module
(Registration Screen).
Registration Module
Request.
Outputs – Random user ID is generated. OTP verification and
credentials match.
SYSTEM FEATURES
Registration
Key Exchange
Generate user ID
User ID Log In
Login
Encryption
THANK YOU