Вы находитесь на странице: 1из 9

A Project Report On

“Multi Point Cloud Data Access Control Mechanism”

A Dissertation Submitted in partial fulfilment of requirement


For the award of the degree of

MASTER OF COMPUTER APPLICATIONS

Of

Visvesvaraya Technological University


BELGAUM-KARNATAKA

By

MANASA K
(1MJ12MCA17)

Under the Guidance of

Mrs. SUPRIYA N.S

Department of Master of Computer Applications


MVJ College of Engineering
Near ITPB, Whitefield, Bangalore-560067
Ph. No: 080-42991000
Website: www.mvjce.edu.in
2014-2015
A Project Report On

“Multi Point Cloud Data Access Control Mechanism”


A Dissertation Submitted in partial fulfilment of requirement
For the award of the degree of

MASTER OF COMPUTER APPLICATIONS


Of

Visvesvaraya Technological University


BELGAUM-KARNATAKA

By

MANASA K
(1MJ12MCA17)

Under the Guidance of

Internal Guide: External Guide:


Mrs.Supriya N.S Mr.Raghavendra
Asst.Professor, Team Leader
MCA Dept Tusker IT Solutions
MVJ College of Engineering Bangalore 560100
Bangalore-560067

MVJ College of Engineering


Near ITPB, Whitefield, Bangalore-560067
Ph. No: 080-42991000
Website: www.mvjce.edu.in
2014-2015
ACKNOWLEDGEMENT

It is my pleasure in bringing for this project report of “Multi Point Cloud Data Access
Control Mechanism” Which has been made as part of our curriculum in the Master of
Computer Application, master degree course.

Determination to succeed is a vital and essential factor in achieving success. I thank all those
who either directly or indirectly helped as in achieving this success.

I would like to express my appreciation to the Principal of M.V.J College of Engineering for
the provision of facilities and support.

I am deeply indebted to my external guide, Mr. Raghavendra (Team Leader), for giving
me permission to commence this project in the first instance, to do the necessary research
work and to use the organizational data.

My sincere gratitude to my internal guide, Mrs.Supriya N.S(Asst.Professor) Department of


MCA for her valuable suggestion and her ever-flowing encouragement towards the
completion of the project.

I would like to record my profound gratitude to Dr. Latha Shanmugam, HOD of MCA
Department and all Lecture of MCA departments who were always willing to help me in this
project.

Ultimately, I thank our Parents for their dedication and faith shown towards and the kind of
financial support I received from them.

I also express my apparition to the staff member at Tusker IT Solution and Department of
MCA, MVJ College of Engineering for their timely helps and support.

I think the almighty for helping us to attain good knowledge, intense concentration and
successful completion of the project.
ABSTRACT

The proposed system is based on cloud technology, which is gaining a lot of interest by each
academics and business worlds. Cloud allows individuals to store their data into sever by
maintaining the security of the data, and also privacy of the user. In this proposed system, we
make use of decentralized servers which makes use of multiple KDC’s that does not allow
single point failure affect the system. In case of any single point failure, the decentralized
servers make use of other available KDCs and help the system to work properly.
We propose a whole new decentralized gain access to control structure for risk-free data safe-
keeping in confuses, that sustains anonymous authentication. From the proposed structure,
the cloud verifies your authenticity in the server without knowing the user’s individuality
before saving data. Our scheme has the included feature associated with access control
through which only legitimate users can easily decrypt the stored information. The structure
prevents replay episodes and sustains creation, customization, and examining data stored in
the cloud. Most of us also handle user revocation. Also, our authentication in addition to
access manage scheme will be decentralized in addition to robust, unlike different access
manage schemes designed for clouds that happen to be centralized. The communication,
working out, and safe-keeping overheads are similar to centralized strategies.
We have presented a decentralized access control technique with anonymous authentication,
which provides user revocation and prevents replay attacks. The cloud does not know the
identity of the user who stores information, but only verifies the user’s credentials. Key
distribution is done in a decentralized way.
CONTENTS

1. INTRODUCTION…………………………………………………………..1

1.1 PROJECT DESCRIPTION

1.2 COMPANY PROFILE

2. LITERATURE SURVEY…………………………………………………...7

2.1 EXISTING AND PROPOSED SYSTEM


2.2 FEASIBILITY STUDY
2.3 TOOLS AND TECHNOLOGIES USED
2.4 HARDWARE AND SOFTWARE REQUIREMENTS

3. SOFTWARE REQUIREMENTS SPECIFICATION …………………… 14

3.1 USER
3.2 FUNCTIONAL REQUIREMENTS
3.3 NON FUNCTIONAL REQUIREMENTS

4. SYSTEM DESIGN ………………………………………………………… 17


4.1 SYSTEM PERSPECTIVE

5. DETAILED DESIGN…………………………………………………..……20
5.1 USE CASE DIAGRAM
5.2 SEQUENCE DIAGRAM
5.3 ACTIVITY DIAGRAM
5.4 DATABASE DESIGN

6. IMPLEMENTATION………………………………………………….…….27

6.1 CODE SNIPPET


6.2 SNAPSHOTS
7. SOFTWARE TESTING…………………………………………………….. 41
7.1 INTRODUCTION
7.2 TESTING STRATEGY
7.3 TEST CASES AND RESULT

8. CONCLUSION…………………………………………………….………….46

9. FUTURE ENHANCEMENTS…………………………………….…………47

Appendix A BIBLIOGRAPHY…………………………….………48

Appendix B USER MANUAL…………………………….……......49

Вам также может понравиться