Professional Documents
Culture Documents
Master of Technology
In
Computer Science
By
Hyderabad-500085 2019
Department of Computer Science and Engineering Jawaharlal Nehru
Hyderabad-500085
I, SALAM SAI PRASAD, bearing Roll no. 18011D0511, hereby declare that the
major project report entitled “SWEET (Serving The Web By Exploiting Email
Tunnels” carried out by me under the guidance of Mr. B. Rama Mohan, Assistant
Professor, CSE Department is submitted for the award of the degree of Master of
Technology in Computer Science. This is a record of bonafide work carried out by me
and the results embodied in this project have not been reproduced or copied from any
source. The results embodied in this project report have not been submitted to any other
University or Institute for the award of any other degree or diploma.
Hyderabad-500085
This is to certify that the major project report entitled “SWEET(Serving The Web
By Exploiting Email Tunnels” being submitted by SALAM SAI PRASAD, bearing
Roll No: 18011D0511, in partial fulfilment of the requirements for the award of the
degree of Master of Technology in Computer Science, is a record of bonafide work
carried out by him. The results are verified and found satisfactory.
Hyderabad-500085
This is to certify that the project report entitled “SWEET(Serving The Web By
Exploiting Email Tunnels”, being submitted by SALAM SAI PRASAD, bearing Roll
No : 18011D0511, in partial fulfilment of the requirements for the award of the degree of
Master of Technology in Computer Science, is a record of bonafide work carried out
by him. The results are verified and found satisfactory.
Dr. R. Sridevi,
Professor and Head,
Department of Computer Science and Engineering,
Date: JNTUH College of Engineering Hyderabad.
ACKNOWLEDGEMENT
The satisfaction that accompanies the successful completion of the task would be
incomplete without the mention of the people who made it possible, whose constant
guidance and encouragement crown all efforts with success.
I am thankful to my Guide Mr. B. Rama Mohan, Assistant Professor of the
Department of Computer Science and Engineering, JNTUHCEH, for her sustained
inspiring guidance throughout the process of this project and for her kind consideration
and encouragement in carrying out this project successfully. Her wise counsel and
suggestions were invaluable.
I would like to thank our project coordinators Dr. D. Vasumathi, Professor of
CSE Dept. and Mr. B. Rama Mohan, Assistant Professor, CSE Dept. for their sincere
directions imparted and cooperation in connection with the project.
Finally, I would like to express deep sense of gratitude to the staff members of the
department of Computer Science and Engineering for their cooperation, which has
given in the congruency to build up this project.
1.ABSTRACT
2.EXISTING SYSTEM
4.PROPOSED SYSTEM
6.SYSTEM ARCHITECTURE
7.HARDWARE REQUIREMENTS
8.SOFTWARE REQUIREMENTS
9.OVERALL ARCHITECTURE
10.CONCLUSION
11.REFERENCE
.
1.Abstract:
Open communication over the Internet poses a serious threat to
countries with repressive regimes, leading them to develop and
deploy censorship mechanisms within their networks.
Unfortunately, existing censor-ship circumvention systems do not
provide high availability guarantees to their users, as censors can
identify, hence disrupt, the traffic belonging to these systems
using today’s advanced censorship technologies. In this paper we
propose SWEET, a highly available censorship-resistant
infrastructure. SWEET works by encapsulating a censored user’s
traffic to a proxy server inside email messages that are carried
over by public email service providers, like Gmail and Yahoo
Mail. As the operation of SWEET is not bound to specific email
providers, we argue that a censor will need to block All email
communications in order to disrupt SWEET, which is infeasible as
email constitutes an important part of today’s Internet. Through
experiments with a prototype of our system we find that SWEET’s
performance is sufficient for web traffic. Regular websites are
downloaded within couple of seconds.
1.1. INTRODUCTION
Finally, the proxy processes the received packet as required, e.g., sends
the packet to the requested destination. Similarly, for any tunneled packet
received from the proxied destinations, the proxy agent sends it to the
converter agent.