0% found this document useful (0 votes)
191 views12 pages

Btech Project Report Intro

This document is a report submitted by Varun Dhall and Deepank Srivastava to fulfill the requirements for a Bachelor of Technology degree in Computer Science and Engineering from DIT University. The report details the development of a secure cloud simulation system under the guidance of Assistant Professor Prashant Kumar. The system aims to address security concerns in cloud computing such as data leakage and distributed denial of service attacks through features like authenticated user registration, one-time password based secure login, and AES encryption of files during upload and download. The report consists of chapters covering an introduction, overall system description, external interface requirements, key system features, non-functional requirements, and conclusions along with scope for future work.

Uploaded by

S. LAVANYA
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
191 views12 pages

Btech Project Report Intro

This document is a report submitted by Varun Dhall and Deepank Srivastava to fulfill the requirements for a Bachelor of Technology degree in Computer Science and Engineering from DIT University. The report details the development of a secure cloud simulation system under the guidance of Assistant Professor Prashant Kumar. The system aims to address security concerns in cloud computing such as data leakage and distributed denial of service attacks through features like authenticated user registration, one-time password based secure login, and AES encryption of files during upload and download. The report consists of chapters covering an introduction, overall system description, external interface requirements, key system features, non-functional requirements, and conclusions along with scope for future work.

Uploaded by

S. LAVANYA
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 12

Secure Cloud Simulation

A Report submitted

by

Varun Dhall (1301021173)


Deepank Srivastava (1301021048)

Under the Guidance of


Mr. Prashant Kumar
Assistant Professor
Computer Science & Engineering Department

In partial fulfilment of the requirements for the Degree of

BACHELOR OF TECHNOLOGY
in
COMPUTER SCIENCE & ENGINEERING,
DIT UNIVERSITY, DEHRADUN

(State Private University through State Legislature Act No. 10 of 2013 of Uttarakhand and approved by UGC)

Mussoorie Diversion Road, Dehradun, Uttarakhand – 248009


CERTIFICATE

This is to certify that the project report entitled “Secure Cloud Simulation” being submitted by
Varun Dhall and Deepank Srivastava in partial fulfillment for the award of the Degree of
Bachelor of Technology in Computer Science and Engineering to the DIT University (Established
vide Uttrakhand Act No. 10 of 2013 and recognized by UGC under section 2(f) of the UGC Act,
1956) is a record of bona fide work carried out by them under my guidance and supervision.

The results embodied in this project report have not been submitted to any other University or
Institute for the award of any Degree or Diploma.

Mr. Prashant Kumar Dr. Arvind Kumar Tiwari

Assistant Professor Head of Department

CSE Department CSE Department


CANDIDATE/S DECLARATION

I hereby certify that the work, which is being presented in the report/ project report, entitled
Secure Cloud Simulation, in partial fulfilment of the requirement for the award of the Degree
of Bachelor of Technology and submitted to the institution is an authentic record of my/our
own work carried out during the period September-2016 to April-2017 under the supervision of
Mr. Prashant Kumar, Assistant Professor - CSE Department.

Date: Signature of the


Candidates

This is to certify that the above statement made by the candidates is correct to the best of my /our
knowledge.

Date: Signature of the

Supervisor
TABLE OF CONTENTS
Title Page
No.

ABSTRACT ...................................................................................................................vi
ACKNOWLEDGEMENT .............................................................................................vi
i
LIST OF
TABLES ........................................................................................................viii
LIST OF FIGURES ........................................................................................................ix
ABBREVIATIONS .........................................................................................................x
NOTATION ....................................................................................................................x
i

CHAPTER 1 INTRODUCTION

1.1 Purpose...............................................................................................................1
1.2 Objective............................................................................................................3
1.3 Motivation..........................................................................................................3
1.4 Definition and Overview....................................................................................4

CHAPTER 2 OVERALL DESCRIPTION

2.1 Project Perspective ............................................................................................7


2.2 Project Functions ...............................................................................................8
2.3 Class Tables and DFD Diagrams .....................................................................10
2.4 Constraints and Assumptions ...........................................................................18

CHAPTER 3 EXTERNAL INTERFACE REQUIREMENTS

3.1 User
Interfaces .................................................................................................19
3.2 Hardware interface ..........................................................................................19
3.3 Software Interface ...........................................................................................19
3.4 Functional Requirements .................................................................................20
CHAPTER 4 SYSTEM FEATURES

4.1 Authentic registration of the users ...................................................................22


4.2 Preventing DDOS Attack using secure login via OTP ....................................27
4.3 File uploading and downloading with AES encryption....................................30

CHAPTER 5 OTHER NON-FUNCTIONAL REQUIREMENTS

5.1 Performance Requirements .............................................................................32


5.2 Safety Requirements .......................................................................................32
5.3 Security Requirements ....................................................................................32
5.4 Software Quality Attributes ............................................................................33

CHAPTER 6 CONCLUSION AND FUTURE WORK

6.1 Conclusions .....................................................................................................34


6.2 Scope for Future Work ....................................................................................35

REFERENCES ............................................................................................................36
ABSTRACT

Currently, data security and privacy policy has been regarded as one of the biggest concerns in
cloud computing. Data stored at remote storage is unsafe and susceptible to get hacked. Due to
this, users do not trust their data over the cloud. Cloud consumers wants an assurance that they
can access their data where ever they want and no one else is able to get it. Moreover,
authentication of users over the cloud is also an important concern to think about. After doing the
survey and studying the research papers it is found that the major security concerns of cloud
computing includes Data leakage, Distributed Denial of Service (DDOS). The data security can be
improved by implementing various symmetric key algorithms so that data on the server is stored
in a manner that even if a person gets access then also he can't open the original data. As it needs
to be decrypted. Apart from storage security, authorised access of users enable may help in
avoiding DDOS as only genuine users will have access to the cloud.

A hybrid model is proposed which is a mixture of elliptical curve cryptography and symmetric
key algorithm. ECC is used to achieve the process of user's verification and to keep the private
data secure. AES algorithm is used which allow the user to store and access their data securely to
the cloud by encrypting the data in the client side and decrypting the data after downloading from
the cloud. Since the private key is owned by the user of the data, no one can decrypt the data, even
though the hacker can get the data through some approaches. Moreover, user will securely
authenticate itself by using different input parameters at the time of login to the cloud server. This
scheme can make users assure about the security of data stored in the cloud. Here, we will apply
an ECC and ECDH algorithm that provide same level of security as of other public key crypto
systems with less key size and strengthens the security of the algorithm. The whole prototype of
the proposed solution would benefit by enabling a proper access mechanism to avoid unauthorised
access to the information system and a secure storage to allow access of data over the cloud
network.

vi
ACKNOWLEDGEMENT

We wish to express our deep sense of gratitude and indebtedness to Assistant Professor Prashant
Kumar, Department of Computer Science and Engineering, DIT University, for introducing the
present significant topic and for his inspiring guidance, constructive criticism and valuable
suggestion throughout this project work.

We also extend our sincere thanks to all our friends who have patiently helped us in
accomplishing this undertaking. We also thank Mr. Sarvesh Shukla, Assistant Professor,
Department of Computer Science and Engineering, DIT University for his constant support
throughout the project work.

We would also like to thank people like Qin Liu, Guojun Wang, Uma Somani, Kanika Lakhani,
Manish Mundra for conducting high level research and publishing such significant research
papers related to this topic.

vii
LIST OF TABLES

Table No. Title Page No.

2.3.2.1 Class Table for Auto IDs..............................................................................27

2.3.2.2 Class Table for File credential and keys.......................................................27

2.3.2.3 Class Table for User IDs and Credentials.....................................................28

viii
LIST OF FIGURES

Figure No. Title Page No.

3 Level 0 DFD…………………………………………………………….......12

4 Level 1 DFD…………………………………………………………….......13

5 Level 2 DFD…………………………………………………………….......14

6 Use- Case Diagram………………………………………………………….15


11 Landing Page ...………………………………………………………......22

12 Registration Page .....………………………………………………………..23

13 Key Exchange ……………………….……………………………………...24

14 OTP Validation ………………….………………………………………….25

15 User-ID Generation ...………………………………………………………26

16 Login Page ……………………......………………………………………...27

18 Dash Board Login ...……………...………………………………………....29

19 File Encryption…...…………………………………………………………30

20 Dash Board Navigation Page ……..………………………………………..31

ix
ABBREVIATIONS

SDK Software Development Kit

API Application Programming Interface

ECC Elliptic Curve Cryptography

DFD Data Flow Diagram

ER Entity Relationship

IMAP Internet Message Access Protocol

RAM Random Access Memory

KB Mega Byte

MB Mega Byte

GB Giga Byte

x
NOTATIONS

A<B A is less than B

A>B A is greater than B

A≤B A is less than or equal to B

A≥B B is greater than or Equal to B


EK Encryption Key
DK Decryption Key

Fn nth Fibonacci number

In the identity matrix of order n

N Set of Positive Integers

W Set of Whole Numbers

Z Set of Integers
+
Z Set of Positive Integers

Zn Set of non-negative integers less than n

xi

You might also like