You are on page 1of 9

A Project Report On

“Multi Point Cloud Data Access Control Mechanism”

A Dissertation Submitted in partial fulfilment of requirement
For the award of the degree of

MASTER OF COMPUTER APPLICATIONS

Of

Visvesvaraya Technological University
BELGAUM-KARNATAKA

By

MANASA K
(1MJ12MCA17)

Under the Guidance of

Mrs. SUPRIYA N.S

Department of Master of Computer Applications
MVJ College of Engineering
Near ITPB, Whitefield, Bangalore-560067
Ph. No: 080-42991000
Website: www.mvjce.edu.in
2014-2015

in 2014-2015 . Team Leader MCA Dept Tusker IT Solutions MVJ College of Engineering Bangalore 560100 Bangalore-560067 MVJ College of Engineering Near ITPB.mvjce.Professor.edu.Supriya N. No: 080-42991000 Website: www. Whitefield. A Project Report On “Multi Point Cloud Data Access Control Mechanism” A Dissertation Submitted in partial fulfilment of requirement For the award of the degree of MASTER OF COMPUTER APPLICATIONS Of Visvesvaraya Technological University BELGAUM-KARNATAKA By MANASA K (1MJ12MCA17) Under the Guidance of Internal Guide: External Guide: Mrs.S Mr.Raghavendra Asst. Bangalore-560067 Ph.

.

.

.

J College of Engineering for the provision of facilities and support. I think the almighty for helping us to attain good knowledge.Supriya N. . I would like to record my profound gratitude to Dr. for giving me permission to commence this project in the first instance. My sincere gratitude to my internal guide. Latha Shanmugam. to do the necessary research work and to use the organizational data. I also express my apparition to the staff member at Tusker IT Solution and Department of MCA. ACKNOWLEDGEMENT It is my pleasure in bringing for this project report of “Multi Point Cloud Data Access Control Mechanism” Which has been made as part of our curriculum in the Master of Computer Application. master degree course. I would like to express my appreciation to the Principal of M.V.Professor) Department of MCA for her valuable suggestion and her ever-flowing encouragement towards the completion of the project. Mrs.S(Asst. Determination to succeed is a vital and essential factor in achieving success. Mr. Ultimately. I thank our Parents for their dedication and faith shown towards and the kind of financial support I received from them. intense concentration and successful completion of the project. HOD of MCA Department and all Lecture of MCA departments who were always willing to help me in this project. I am deeply indebted to my external guide. MVJ College of Engineering for their timely helps and support. I thank all those who either directly or indirectly helped as in achieving this success. Raghavendra (Team Leader).

and safe-keeping overheads are similar to centralized strategies. Also. the decentralized servers make use of other available KDCs and help the system to work properly. we make use of decentralized servers which makes use of multiple KDC’s that does not allow single point failure affect the system. The cloud does not know the identity of the user who stores information. Our scheme has the included feature associated with access control through which only legitimate users can easily decrypt the stored information. which is gaining a lot of interest by each academics and business worlds. which provides user revocation and prevents replay attacks. ABSTRACT The proposed system is based on cloud technology. working out. customization. In case of any single point failure. unlike different access manage schemes designed for clouds that happen to be centralized. and examining data stored in the cloud. From the proposed structure. The communication. Cloud allows individuals to store their data into sever by maintaining the security of the data. that sustains anonymous authentication. but only verifies the user’s credentials. and also privacy of the user. We have presented a decentralized access control technique with anonymous authentication. Key distribution is done in a decentralized way. Most of us also handle user revocation. . We propose a whole new decentralized gain access to control structure for risk-free data safe- keeping in confuses. In this proposed system. our authentication in addition to access manage scheme will be decentralized in addition to robust. the cloud verifies your authenticity in the server without knowing the user’s individuality before saving data. The structure prevents replay episodes and sustains creation.

3 NON FUNCTIONAL REQUIREMENTS 4.4 HARDWARE AND SOFTWARE REQUIREMENTS 3.7 2. LITERATURE SURVEY………………………………………………….3 ACTIVITY DIAGRAM 5.1 EXISTING AND PROPOSED SYSTEM 2.. SYSTEM DESIGN ………………………………………………………… 17 4. CONTENTS 1..2 FEASIBILITY STUDY 2.2 COMPANY PROFILE 2.4 DATABASE DESIGN 6.1 USER 3. INTRODUCTION………………………………………………………….27 6.3 TOOLS AND TECHNOLOGIES USED 2.……20 5. SOFTWARE REQUIREMENTS SPECIFICATION …………………… 14 3.. DETAILED DESIGN………………………………………………….1 USE CASE DIAGRAM 5.2 SEQUENCE DIAGRAM 5.1 PROJECT DESCRIPTION 1. IMPLEMENTATION…………………………………………………..…….1 SYSTEM PERSPECTIVE 5.1 CODE SNIPPET 6.2 FUNCTIONAL REQUIREMENTS 3.2 SNAPSHOTS .1 1.

CONCLUSION……………………………………………………..1 INTRODUCTION 7.. FUTURE ENHANCEMENTS…………………………………….2 TESTING STRATEGY 7.3 TEST CASES AND RESULT 8. 41 7.…………47 Appendix A BIBLIOGRAPHY…………………………….46 9...7.………….. SOFTWARE TESTING…………………………………………………….…….49 ..………48 Appendix B USER MANUAL…………………………….