Btech Project Report Intro
Btech Project Report Intro
A Report submitted
by
BACHELOR OF TECHNOLOGY
in
COMPUTER SCIENCE & ENGINEERING,
DIT UNIVERSITY, DEHRADUN
(State Private University through State Legislature Act No. 10 of 2013 of Uttarakhand and approved by UGC)
This is to certify that the project report entitled “Secure Cloud Simulation” being submitted by
Varun Dhall and Deepank Srivastava in partial fulfillment for the award of the Degree of
Bachelor of Technology in Computer Science and Engineering to the DIT University (Established
vide Uttrakhand Act No. 10 of 2013 and recognized by UGC under section 2(f) of the UGC Act,
1956) is a record of bona fide work carried out by them under my guidance and supervision.
The results embodied in this project report have not been submitted to any other University or
Institute for the award of any Degree or Diploma.
I hereby certify that the work, which is being presented in the report/ project report, entitled
Secure Cloud Simulation, in partial fulfilment of the requirement for the award of the Degree
of Bachelor of Technology and submitted to the institution is an authentic record of my/our
own work carried out during the period September-2016 to April-2017 under the supervision of
Mr. Prashant Kumar, Assistant Professor - CSE Department.
This is to certify that the above statement made by the candidates is correct to the best of my /our
knowledge.
Supervisor
TABLE OF CONTENTS
Title Page
No.
ABSTRACT ...................................................................................................................vi
ACKNOWLEDGEMENT .............................................................................................vi
i
LIST OF
TABLES ........................................................................................................viii
LIST OF FIGURES ........................................................................................................ix
ABBREVIATIONS .........................................................................................................x
NOTATION ....................................................................................................................x
i
CHAPTER 1 INTRODUCTION
1.1 Purpose...............................................................................................................1
1.2 Objective............................................................................................................3
1.3 Motivation..........................................................................................................3
1.4 Definition and Overview....................................................................................4
3.1 User
Interfaces .................................................................................................19
3.2 Hardware interface ..........................................................................................19
3.3 Software Interface ...........................................................................................19
3.4 Functional Requirements .................................................................................20
CHAPTER 4 SYSTEM FEATURES
REFERENCES ............................................................................................................36
ABSTRACT
Currently, data security and privacy policy has been regarded as one of the biggest concerns in
cloud computing. Data stored at remote storage is unsafe and susceptible to get hacked. Due to
this, users do not trust their data over the cloud. Cloud consumers wants an assurance that they
can access their data where ever they want and no one else is able to get it. Moreover,
authentication of users over the cloud is also an important concern to think about. After doing the
survey and studying the research papers it is found that the major security concerns of cloud
computing includes Data leakage, Distributed Denial of Service (DDOS). The data security can be
improved by implementing various symmetric key algorithms so that data on the server is stored
in a manner that even if a person gets access then also he can't open the original data. As it needs
to be decrypted. Apart from storage security, authorised access of users enable may help in
avoiding DDOS as only genuine users will have access to the cloud.
A hybrid model is proposed which is a mixture of elliptical curve cryptography and symmetric
key algorithm. ECC is used to achieve the process of user's verification and to keep the private
data secure. AES algorithm is used which allow the user to store and access their data securely to
the cloud by encrypting the data in the client side and decrypting the data after downloading from
the cloud. Since the private key is owned by the user of the data, no one can decrypt the data, even
though the hacker can get the data through some approaches. Moreover, user will securely
authenticate itself by using different input parameters at the time of login to the cloud server. This
scheme can make users assure about the security of data stored in the cloud. Here, we will apply
an ECC and ECDH algorithm that provide same level of security as of other public key crypto
systems with less key size and strengthens the security of the algorithm. The whole prototype of
the proposed solution would benefit by enabling a proper access mechanism to avoid unauthorised
access to the information system and a secure storage to allow access of data over the cloud
network.
vi
ACKNOWLEDGEMENT
We wish to express our deep sense of gratitude and indebtedness to Assistant Professor Prashant
Kumar, Department of Computer Science and Engineering, DIT University, for introducing the
present significant topic and for his inspiring guidance, constructive criticism and valuable
suggestion throughout this project work.
We also extend our sincere thanks to all our friends who have patiently helped us in
accomplishing this undertaking. We also thank Mr. Sarvesh Shukla, Assistant Professor,
Department of Computer Science and Engineering, DIT University for his constant support
throughout the project work.
We would also like to thank people like Qin Liu, Guojun Wang, Uma Somani, Kanika Lakhani,
Manish Mundra for conducting high level research and publishing such significant research
papers related to this topic.
vii
LIST OF TABLES
viii
LIST OF FIGURES
3 Level 0 DFD…………………………………………………………….......12
4 Level 1 DFD…………………………………………………………….......13
5 Level 2 DFD…………………………………………………………….......14
19 File Encryption…...…………………………………………………………30
ix
ABBREVIATIONS
ER Entity Relationship
KB Mega Byte
MB Mega Byte
GB Giga Byte
x
NOTATIONS
Z Set of Integers
+
Z Set of Positive Integers
xi