Вы находитесь на странице: 1из 60

A PRELIMINARY REPORT ON

“AUTHENTICATION OF USER AND PERFORMING


DEDUPLICATION OF DATA IN CLOUD”

SUBMITTED TO THE SAVITRIBAI PHULE PUNE UNIVERSITY, PUNE


IN THE PARTIAL FULFILLMENT OF THE REQUIREMENTS
FOR THE AWARD OF THE DEGREE

OF

BACHELOR OF ENGINEERING (COMPUTER


ENGINEERING)

SUBMITTED BY

STUDENT NAME EXAM NO:


TONGRAO KISHAN B150374315

PATIL VAISHNAVI B150374317

SHINDE SAYALI B150374314

SHAIKH GULNARBANU B150374296


DEPARTMENT OF COMPUTER ENGINEERING

JSPM’s RAJARSHI SHAHU COLLEGE OF ENGINEERING TATHAWADE,


PUNE 411033

SAVITRIBAI PHULE PUNE UNIVERSITY 2018 -2019

CERTIFICATE

This is to certify that the project report entitles

“AUTHENTICATION OF USER AND PERFORMING DEDUPLICATION OF


DATA IN CLOUD”

“RSCOE, Department of Computer Engineering 2018-19”

1
Submitted by

NAME Exam Seat Number

TONGRAO KISHAN B150374315

PATIL VAISHNAVI B150374317

SHINDE SAYALI B150374314

SHAIKH GULNARBANU B150374296

is a bonafide student of this institute and the work has been carried out by him/her under the
supervision of Prof Ms. K .V. Deshpande and it is approved for the partial fulfillment of the
requirement of Savitribai Phule Pune University, for the award of the degree of Bachelor of
Engineering (Computer Engineering).

Prof. Vaishali Shinde Dr. S. V.Kedar

Guide H. O. D.

Dept. of Computer Engg. Dept. of Computer Engg

Dr. R. K. Jain

Principal,

JSPM’s RSCOE, Tathawade, Pune - 33

Place: Pune

Date:

“RSCOE, Department of Computer Engineering 2018-19”

2
Acknowledgement

This is our great pleasure & immense satisfaction to express our deepest sense of
gratitude & thanks to everyone who has directly or indirectly helped us in completing our
project work successfully.

We express our gratitude towards project guide Prof Ms. K. V. Deshpande who
guided & encouraged us in completing the project work in scheduled time.

No words are sufficient to express our gratitude to our parents for their
unwavering encouragement. We also thank all our friends for being a constant source of
support.

We sincerely thank our Head of Department (Computer) Dr. S. V. Kedar for her
reassuring encouragement throughout the preparation of our project.

We are also grateful to our respected Principal Dr. R. K. Jain for his cooperation despite
his busy schedule.

“RSCOE, Department of Computer Engineering 2018-19”

3
Abstract

Authentication is identifying the user, on the basis of its valid username and password.
Honeyword mechanism provides more enhanced way of authetication. This mechanism
generates honeywords (decoy passwords) which is combination of existing user
passwords. These honeywords are used to confuse the attacker ,making him believe that
the honeyword found is the actual password.

Hence, when an adversary tries to enter into the system with a honey word, an alarm is
triggered to notify the administrator about a password leakage.

After Authentication when user logins successfully ,while storing the data we perform
deduplication .Deduplication will check for depulicate files .The duplicated file will then
be not stored in cloud.This deduplication will help in reducing the redundancy which is
crucial in order to save storage space and network bandwidth.

“RSCOE, Department of Computer Engineering 2018-19”

4
TABLE OF CONTENTS

LIST OF ABBREVIATIONS i

LIST OF FIGURES ii

LIST OF TABLES iii

CHAPTER TITLE
PAGE NO.

Sr. No. Title No. Page no

01 Introduction 7

1.1 Motivation,Challenges 8

1.2 Problem Statement 9

1.3 Scope and limitation 10

1.4 Methodology 11

02 Literature Survey 12

2.1 Reference papers 12

03 Software requirements and specification 21

3.1 Functional Requirements 22

3.2 External Interface Requirements 23

3.3 Non functional requirements 24

3.4 System Requirements 25

“RSCOE, Department of Computer Engineering 2018-19”

5
3.5 System design 26

04 System dig 27

4.1 Data flow dig 28

4.2 UML dig 29

05 Project Estimate: 30

06 Project implementation 33

6.1 Modules 34

6.2 Tools and technologies used 36

07 Software Testing 38

08 Results 39

8.1 Screenshots 40

9 Conclusion 42

9.1 Future work 43

9.2 Application 44

9.3 References 45

“RSCOE, Department of Computer Engineering 2018-19”

6
Introduction

We know how important authentication is in each and every field now-a-days. Here in
this project we are putting forward a honey word mechanism for authentication along
with a deduplication mechanism performed for storing the data file on cloud after
checking it is not the same amongst already present files on cloud .

The honey word mechanism is used to watch a hacker who endeavors to login with
cracked passwords. In Honeyword mechanism we have three main terms i. Sweet-word
(sweet word is the actual main password of username login) , ii.sugarword (sugar words
are three extra words entered by user other than the sweet word) , iii.honeywords ( our
mechanism would now create n number of honeywords by mixing the existing
sugarwords using various techniques).These honeywords are nothing but the fakewords
to confuse the attacker and keep him away from the actual password.Also all these i.e
sweet word , sugarwords and honeywords are stored using a key which adds the XOR bit
to it and then stores it into database.Which then makes the attacker more difficult to make
out the actual honeyword too. So here for every username there is only one sweet word
which will give successful login and others are decoy passwords(honeywords).Hence,
whenever any attacker tries to enter into the system using a honeyword , an alarm is
triggered via gmail to notify the administrator relating the password leakage.

In addition to this, after successful login of authentic user , we perform a duplication


check to the file which we need to upload on cloud. The deduplication mechanism would
first generate a digestcode (using MD5 algorithm) of the file and using a java code we
will search if the digest code matches with already existing digestcodes of other files on
cloud.If it matches then the current file is not stored on cloud. We just store the same
address of matched digestcode already existing file instead.

“RSCOE, Department of Computer Engineering 2018-19”

7
MOTIVATION

 Looking on for security of any system, we first try to authenticate the


system. In any system, there are two issues that should be considered to
overcome the security problems: First passwords must be protected by
taking appropriate precautions and storing with their hash values
computed through salting or some other complex mechanisms. Hence, for
an adversary it must be hard to invert hashes to acquire plaintext
passwords.

 The second point is that a secure system should detect whether a


password file disclosure incident happened or not to take appropriate
actions.

 In this study, we focus on the same issue and deal with fake passwords as
a simple and cost effective solution to detect compromise of passwords.

 As number of copy data uploaded which take huge amount of space to


overcome from this problem. We implement a system in which only
unique file gets uploaded, if file is duplicate then the system won’t allow it
to store.

“RSCOE, Department of Computer Engineering 2018-19”

8
PROBLEM STATEMENT

We aim to develop a system which would enhance the authentication on both


sides i.e. client side authentication as well as server side by using Honey word
mechanism. Also to overcome redundancy problem and utilize the storage well we
perform deduplication of the file before storing it.

Objectives:

1.To provide authentication to the system using Honeyword mechanism.

2.To perform Deduplication of file.

3.While storing the file we split into many parts and store to provide more
security.

“RSCOE, Department of Computer Engineering 2018-19”

9
PROJECT SCOPE AND LIMITATION

1] It can be used in small organization to increase the security constraints.

2] Only valid users of the system can access the information.

3] There is continuous Internet connection is required to access the information.

4] Cloud management must be needed whenever required.

“RSCOE, Department of Computer Engineering 2018-19”

10
METHODOLOGY

Our product is cloud base so it is very important to acquire the cloud services
from the vendor which provide the same requirement as needed. Initially we are choosing
GoDaddy cloud or AWS.

For initially we are going to start with the best IDE known so far that is Eclipse
to build the various modules and for the testing purpose because the time period for the
cloud service should be limited so no waste.

We are going to use the open source platform to host the website for the testing
purpose and after installing done the proper checking of main target i.e. security is
checking by attacking or hacking. The proper notification and feedback is testing then
afterward it is ready for open world.

“RSCOE, Department of Computer Engineering 2018-19”

11
LITERATURE SURVEY

In essence, a literature review identifies, evaluates and synthesizes the relevant literature
within a particular year of research. It illuminates how knowledge has evolved within the
year, highlighting what has already been done, what is generally accepted, what is
emerging and what is the current state of thinking on the topic. In addition, within
research-based texts such as a Doctoral thesis, a literature review identifies a research gap
and articulates how a particular research project addresses this gap.

Literature Survey Papers:

REFERENCE PAPER 1

Title:

Password Cracking Using Probabilistic Context-Free Grammars.

Year of publication:

January 2018

Abstract:

Choosing the most effective word-mangling rules to use when performing a dictionary-
based password cracking attack can be a difficult task. In this paper we discuss a new

“RSCOE, Department of Computer Engineering 2018-19”

12
method that generates password structures in highest probability order. We first
automatically create a probabilistic context-free grammar based upon a training set of
previously disclosed passwords. This grammar then allows us to generate word-mangling
rules, and from them, password guesses to be used in password cracking. We will also
show that this approach seems to provide a more effective way to crack passwords as
compared to traditional methods by testing our tools and techniques on real password
sets. In one series of experiments, training on a set of disclosed passwords, our approach
was able to crack 28% to 129% more passwords than John the Ripper, a publicly
available standard password cracking program.

REFERENCE PAPER 2

Title:

Examination of a new defense mechanism: Honey words.

Year of publication:

June 2018

Abstract:

Past experiences show us that password breach is still one of the main methods of
attackers to obtain personal or sensitive user data. Basically, assuming they have access
to list of hashed passwords, they apply guessing attacks, i.e., attempt to guess a password
by trying a large number of possibilities. We certainly need to change our way of
thinking and use a novel and creative approach in order to protect our passwords. In fact,
there are already novel attempts to provide password protection. The Honeywords system
of Juels and Rivest is one of them which provides a detection mechanism for password
breaches. Roughly speaking, they propose a method for password-based authentication
systems where fake passwords, i.e., “honeywords” are added into a password file, in
“RSCOE, Department of Computer Engineering 2018-19”

13
order to detect impersonation. Their solution includes an auxiliary secure server called
“honeychecker” which can distinguish a user’s real password among her honeywords and
immediately sets off an alarm whenever a honeyword is used. However, they also pointed
out that their system needs to be improved in various ways by highlighting some open
problems. In this paper, after revisiting the security of their proposal, we specifically
focus on and aim to solve a highlighted open problem, i.e., active attacks where the
adversary modifies the code running on either the login server or the honeychecker.

REFERENCE PAPER 3

Title:

Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud

Year of publication:January 2018

Abstract:

Attribute-based encryption (ABE) has been widely used in cloud computing where a
data provider outsources his/her encrypted data to a cloud service provider, and can share
the data with users possessing specific credentials (or attributes). However, the standard
ABE system does not support secure deduplication, which is crucial for eliminating
duplicate copies of identical data in order to save storage space and network bandwidth.
In this paper, we present an attribute-based storage system with secure deduplication in a
hybrid cloud setting, where a private cloud is responsible for duplicate detection and a
public cloud manages the storage. Compared with the prior data deduplication systems,
our system has two advantages. Firstly, it can be used to confidentially share data with
users by specifying access policies rather than sharing decryption keys. Secondly, it
achieves the standard notion of semantic security for data confidentiality while existing
systems only achieve it by defining a weaker security notion. In addition, we put forth a

“RSCOE, Department of Computer Engineering 2018-19”

14
methodology to modify a ciphertext over one access policy into ciphertexts of the same
plaintext but under other access policies without revealing the underlying plaintext.

REFERENCE PAPER 4

Title:

Cloud Threat Defense – A Threat Protection and Security Compliance Solution

Year of publication: November 2018

Abstract:

According to Cloud Security Alliance (CSA), over 70 percent of the world's businesses
now operate on the cloud. However, like any new technology adoption, cloud computing
adoption opens new forms of security risks. This paper explores security issues related to
cloud computing and proposes a cloud-native scalable security solution for the cloud. The
paper investigates some of the key research challenges of cloud security solutions to
secure the dynamic cloud environment and provides a practical solution to overcome the
challenges that the cloud providers and consumers face securing their data and valuable
assets.

REFERENCE PAPER 5:

Title:

Critical Security Issues in Cloud Computing: A Survey

“RSCOE, Department of Computer Engineering 2018-19”

15
Year of publication: May 2018

Abstract:

An exponential growth of cloud computing is dramatically changing contemporary


network service manners. A large scope of cloud-based service offerings, X-as-a-Service
(XaaS), are empowering flexible adoptions with on-demand provisions. However, cloud
computing also introduces a series of security concerns, even though there are numerous
advantages of using cloud computing. Understanding security concerns in cloud
computing is a fundamental requirement for successfully adopting cloud solutions. This
paper focuses on a variety of security issues in cloud computing and accomplishes a
survey that addresses three major security dimensions of cloud security, including
computer security, network security, and information security. Literature review provides
a holistic view of cloud security as well as converges recent achievements in the field.
The main findings of this work can provide future research in the field of cloud security
with theoretical supports and evidence.

REFERENCE PAPER 6:

Title:

Data Recovery and Security in Cloud

Year of publication: July 2018

Abstract :

Cloud computing has been evolving with an increasing popularity, which leads to the
rapid adaption of cloud services for various reasons among the individuals and
“RSCOE, Department of Computer Engineering 2018-19”

16
organizations. The main reason for this shift is because of the numerous benefits provided
by cloud services such as low costs, computational power, and storage services over the
Internet. Data recovery is one of the important concepts while dealing with storage
devices which are basically the backbone of the cloud infrastructure. Someone with
access to these servers or devices can use data recovery techniques to reconstruct the
confidential data of customers once the customers have deleted their confidential or
private data from the cloud. Reconstruction of such data leads to a security problem and
privacy concerns for users. Even after some gains access to their data users are not aware
that someone else has access to their data even though it has already deleted in their point
of view from the cloud. In this paper, we look into the security problem which can arise
based on the usage of data recovery tools on cloud infrastructure, once the users have
deleted their data. To address this problem, we have proposed a simple method using
Rename.

“RSCOE, Department of Computer Engineering 2018-19”

17
SOFTWARE REQUIREMENTS SPECIFICATION:

A Software Requirements Specification (SRS) is a document that describes the


nature of a project, software or application. In simple words, SRS document is a manual
of a project provided it is prepared before you kick-start a project/application.

Ubuntu 18.04 LTS / Windows 10:

An OS is need to perform the operation and match with the project requirement.
Here Linux and Windows both can be used to develop this project because both contains
the Eclipse IDE. But when it comes to performance and speed we choose Linux.

Eclipse:

Eclipse is an integrated development environment (IDE) used in computer


programming, and is the most widely used Java IDE. It contains a base workspace and an
extensible plug-in system for customizing the environment.

Apache Tomcat:

Apache tomcat is an open source web container. It is not an application server like
JBoss, Glassfish, etc. which are basically required for enterprise web applications.
Typically consisting of EJBs and other heavy J2EE components.

“RSCOE, Department of Computer Engineering 2018-19”

18
PhpMyAdmin:

phpMyAdmin is a free web application that provides a convenient GUI for


working with the MySQL database management system. It is the most popular MySQL
administration tool that is used by millions of users worldwide and has won numerous
awards and honors.

XAMPP :

XAMPP stands for Cross-Platform (X), Apache (A), MySQL (M), PHP (P) and
Perl (P). It is a simple, lightweight Apache distribution that makes it extremely easy for
developers to create a local web server for testing purposes.

“RSCOE, Department of Computer Engineering 2018-19”

19
HARDWARE REQUIREMENTS:

● System : Windows 10 OS or Linux Ubuntu 18.04 OS

● Mouse : Any

● Keyboard : Any

● Hard Disk : Any

● Monitor : Any

● RAM : 4 GB

“RSCOE, Department of Computer Engineering 2018-19”

20
SOFTWARE REQUIREMENTS:

● XAMPP

● Apache Tomcat

● PhpMyAdmin

● Eclipse

● Any active browser

“RSCOE, Department of Computer Engineering 2018-19”

21
NON FUNCTIONAL REQUIREMENTS:

Performance:

High amount of physical memory

Powerful CPU

High internet speed.

Safety:

Use of capacitor in circuit to avoid voltage fluctuations

Security:

User authentication facility

Use of https on website

“RSCOE, Department of Computer Engineering 2018-19”

22
SOFTWARE QUALITY ATTRIBUTES:

● Performance

● User friendly GUI

● File successful upload

● File successful accessed

“RSCOE, Department of Computer Engineering 2018-19”

23
SYSTEM DESIGN:

Systems design is the process of defining the architecture, modules, interfaces,


and data for a system to satisfy specified requirements. Systems design could be seen as
the application of systems theory to product development.

“RSCOE, Department of Computer Engineering 2018-19”

24
ANALYSIS MODEL: SDLC MODEL TO BE APPLIED

SDLC MODEL:

A software development life cycle (SDLC) model is a conceptual framework


describing all activities in a software development project from planning to maintenance.
This process is associated with several models, each including a variety of tasks and
activities.

“RSCOE, Department of Computer Engineering 2018-19”

25
AGILE METHODOLOGY:

Agile SDLC model is a combination of iterative and incremental process models


with focus on process adaptability and customer satisfaction by rapid delivery of working
software product. Agile Methods break the product into small incremental builds. These
builds are provided in iterations. Each iteration typically lasts from about one to three
weeks.

Agile is based on the adaptive software development methods, whereas the


traditional SDLC models like the waterfall model is based on a predictive approach.
Predictive teams in the traditional SDLC models usually work with detailed planning and
have a complete forecast of the exact tasks and features to be delivered in the next few
months or during the product life cycle.

“RSCOE, Department of Computer Engineering 2018-19”

26
SYSTEM IMPLEMENTATION PLAN:
Planning is the process of thinking about the activities required to achieve a desired goal.

Objective Output Task Activity Who?

Registration User Interface for Use programming Registration portal Team


Portal employee language and
create portal

Login Portal Actual Login portal Create login portal Employee login Team
using web portal
language
Database Handle Database connectivity Database for user Database for Team
authentication employee

User Interface Successful login Successful login Complete login Team


window page with result

Security algorithm Implementation of Security algorithm Honey word Team


implementation security algorithm

Cloud storage Buy cloud storage Cloud for storage Cloud storage for Team
module file of employee

File handling File upload module Text and pdf file File handling Team
module upload portal
Dedeplication Dedeplication Dedeplication File is already on Team
module successful check cloud or not

Admin permission Send request to admin Admin permission File authorization Team
for file authorized from admin

Deploy on cloud Applications deploying Cloud base Application Team


on cloud application deployment
deployment
Maintenance User handling Database handling User and database Team
handling

“RSCOE, Department of Computer Engineering 2018-19”

27
SYSTEM DIAGRAM

DATA FLOW DIAGRAM:

“RSCOE, Department of Computer Engineering 2018-19”

28
UML DIAGRAM:

ER DIAGRAM:

“RSCOE, Department of Computer Engineering 2018-19”

29
“RSCOE, Department of Computer Engineering 2018-19”

30
CLASS DIAGRAM:

“RSCOE, Department of Computer Engineering 2018-19”

31
COMPONENT DIAGRAM:

“RSCOE, Department of Computer Engineering 2018-19”

32
SEQUENCE DIAGRAM:

“RSCOE, Department of Computer Engineering 2018-19”

33
USE CASE DIAGRAM:

“RSCOE, Department of Computer Engineering 2018-19”

34
STATE DIAGRAM

“RSCOE, Department of Computer Engineering 2018-19”

35
PACKAGE DIAGRAM:

“RSCOE, Department of Computer Engineering 2018-19”

36
MODULES:

★ Module 1: Login Portal

★ Module 2: Honey Word Generation

★ Module 3: File Upload

★ Module 4: Deduplication of files

“RSCOE, Department of Computer Engineering 2018-19”

37
ALGORITHMS:

“RSCOE, Department of Computer Engineering 2018-19”

38
MODULE 1:

LOGIN PORTAL

▪ Using scripting languages create the login portal.

▪ Process it in proper format at upload it to the web server

MODULE 2:

HONEY WORD GENERATION

▪ Use the Chaffing By Tweaking, Chaffing with a Password Model


,Chaffing by tai to generate Honey words.

▪ 90 Honey words + 3 Sugar words + 1 Sweet word

MODULE 3:

FILE UPLOAD

▪ Displaying data on Mobile phone

▪ Operating systems : Android or iOS

“RSCOE, Department of Computer Engineering 2018-19”

39
▪ Create portal for file upload

▪ Data transfer from server to application

MODULE 4:

DEDUPLICATION OF FILE

▪ Check for duplicate files.

▪ Give the proper access to new user for existing file.

“RSCOE, Department of Computer Engineering 2018-19”

40
SOFTWARE TESTING

SOFTWARE PERFORMANCE TESTING:

In software quality assurance, performance testing is in general, a testing practice


performed to determine how a system performs in terms of responsiveness and stability
under a particular workload. It can also serve to investigate, measure, validate or verify
other quality attributes of the system, such as scalability, reliability and resource usage.

Performance testing, a subset of performance engineering, is a computer science


practice which strives to build performance standards into the implementation, design and
architecture of a system

“RSCOE, Department of Computer Engineering 2018-19”

41
MANUAL TESTING:

Manual testing is the process of using the functions and features of an application
as an end-user would in order to verify the software is working as required. With manual
testing, a tester manually conducts tests on the software by following a set of predefined
test cases. Let's take a close look at how this is done.

Manual testing requires a lot of effort. It’s easy to just say “let's skip it” or “let’s
automate it”. But the truth is, it is imperative to building software because automated
testing can’t cover everything.

After all, humans will be using your software, therefore humans should be
involved in testing your software. Manual testing is more likely to find and solve real
usability issues than automated testing. It allows the tester to be flexible during the test
and try different things on the fly.

This isn’t to say automated testing is useless. Automated testing has its own
benefits and provides value in some areas where manual testing does not. But we’ll save
that for another post.

“RSCOE, Department of Computer Engineering 2018-19”

42
RESULTS

SCREENSHOT:

Figure: GUI Application

“RSCOE, Department of Computer Engineering 2018-19”

43
Figure: User Registration

“RSCOE, Department of Computer Engineering 2018-19”

44
Figure: User Login

“RSCOE, Department of Computer Engineering 2018-19”

45
Figure: Admin Login

“RSCOE, Department of Computer Engineering 2018-19”

46
Figure: Honeword Generation

“RSCOE, Department of Computer Engineering 2018-19”

47
Figure: Password Protection

“RSCOE, Department of Computer Engineering 2018-19”

48
Figure: Activation Of Blocked User

“RSCOE, Department of Computer Engineering 2018-19”

49
Figure: Request for User Activation

“RSCOE, Department of Computer Engineering 2018-19”

50
Figure: Login Successfully

“RSCOE, Department of Computer Engineering 2018-19”

51
Figure: Upload File

“RSCOE, Department of Computer Engineering 2018-19”

52
Figure: Dublication of File

“RSCOE, Department of Computer Engineering 2018-19”

53
Figure: Login Information Sent On Mail

“RSCOE, Department of Computer Engineering 2018-19”

54
CONCLUSION AND FUTURE WORK:

Hence we have studied the Honeyword mechanism and various techniques like chaffing
with toughnut, chaffing with tail, chaffing with password model to generate the
honeywords. And then performed Authentication of user with the help of these
honeywords generated. If any malpractice found or any kind of attack detected then
system would notify the user regarding the same. If there is no attack or authentic user
tries to login with correct username and correct password then, he would be able to
successfully login to the system. After successful login we would now allow the user to
access the cloud . When user wants to upload a file to cloud the file is checked if
duplicate.We know if same files, same data is stored again and again on cloud it would
ultimately increase the redundancy. To avoid redundancy, deduplication is performed.
File is first split and then stored. This splitting provides more security as the file contents
are not present at one loctaion, but at various so if any non-authorised person tries to
fetch a specific file he won’t get the complete file, neither at one location. So overall idea
is to provide security. Security while login, security while storing.

In future we can apply the same system and try login with QR codes.

Also the dublication of file can be checked on content maching above 70%.

“RSCOE, Department of Computer Engineering 2018-19”

55
APPLICATIONS:

1. System is useful for small organization where we can apply authentication.

2. Organizations can use this system to avoid duplicate file

3. To save memory and redundancy.

“RSCOE, Department of Computer Engineering 2018-19”

56
REFERENCES:

• D. Mirante and C. Justin, “Understanding password database compromises,”


Dept. of Comput. Sci. Eng. Polytechnic Inst. of NYU, New York, NY, USA:
Tech. Rep. TR-CSE-2013-02, 2013.

• A. Vance, “If your password is 123456, just make it hackme,” New York Times,
Jan. 2010.

• K. Brown, “The dangers of weak hashes,” SANS Institute InfoSec Reading


Room, Maryland US, pp. 1–22, Nov. 2013,[Online]. Available:
http://www.sans.org/reading-room/ whitepapers/authentication/dangers-weak-
hashes-34412.

• M. Weir, S. Aggarwal, B. de Medeiros, and B. Glodek, “Password cracking using


probabilistic context-free grammars,” in Proc. 30th IEEE Symp. Security Privacy,
2009, pp. 391–405.

• D. Quick, B. Martini, and K. R. Choo, Cloud Storage Forensics. Syngress


Publishing / Elsevier, 2014. [Online]. Available:
http://www.elsevier.com/books/cloud-storageforensics/quick/978-0-12-419970-5

• K. R. Choo, J. Domingo-Ferrer, and L. Zhang, “Cloud cryptography: Theory,


practice and future research directions,” Future Generation Comp. Syst., vol. 62,
pp. 51–53, 2016.

• K. R. Choo, M. Herman, M. Iorga, and B. Martini, “Cloud forensics: State-of-


the-art and future directions,” Digital Investigation, vol. 18, pp. 77–78, 2016.

“RSCOE, Department of Computer Engineering 2018-19”

57
“RSCOE, Department of Computer Engineering 2018-19”

58
“RSCOE, Department of Computer Engineering 2018-19”

59

Вам также может понравиться