You are on page 1of 9

PROJECT REPORT

Submitted in partial fulfillment for the award of the

DIPLOMA IN
COMPUTER ENGINEERING

Submitted by

NIVETHA.G (18581518)
RENISHA.R (18505679)
KALAIYARASI.B (18581517)

Guided by

Mrs. M. JHANSIRANI., B.Tech., LECTURER

MASS POLYTECHNIC COLLEGE, KUMBAKONAM DEPARTMENT OF


COMPUTER SCIENCE AND ENGINEERING DOTE :: CHENNAI 600 025
APRIL 2020

I
DOTE :: CHENNAI 600 025

BONAFIDE CERTIFICATE

Certified this Report titled “A MODIFIED HIERARCHICAL


ATTRIBUTE” is the bonafide work of NIVETHA.G (18581518),
RENISHA.R (18505679) and KALAIYARASI.B (18581517) who carried out
the project work under my supervision. Certified further that to the best of my
knowledge the work reported here in does not form part of any other thesis or
dissertation on the basis of which a degree or award was conferred on an earlier
occasion on this or any other candidate.

SIGNATURE
Mrs. M. JHANSIRANI., B.Tech.,
LECTURER

Computer Engineering,
MASS Polytechnic College,
Kumbakonam – 612 501

Submitted for the project viva-voice Examined on:

INTERNAL EXAMINER EXTERNAL EXAMINER

II
DECLARATION

We declare that the work entitled “AUTHENTICATION BY ENCRYPTED


NEGATIVE PASSWORD ” is submitted in partial fulfillment of the requirement for
the award of the DOTE Chennai, is a record of my own work carried out by us
during the academic year 2019-2020 under the supervision and guidance of
Mrs.M.JHANSIRANI B.Tech. Lecturer in Department of Computer Science and
Engineering, Mass Polytechnic College. The extent and source of information are
derived from the existing literature and have been indicated through the dissertation
at the appropriate places. The matter embodied in this work is original and has not
been submitted for the award of any other degree or diploma, either in this or any
other University.
Name Register Number Signature
NIVETHA.G 18581518
RENISHA. R 18505679
KALAIYARASI. B 18581517

I certify that the declaration made above by the candidate is true.

Signature of Guide,
Mrs.M.Jhansirani B.Tech..

Lecturer in CSE

III
ACKNOWLEDGEMENT

I thank the Almighty for giving me an opportunity to study in a prestigious


Instruction and grace to complete this project successfully.

At the outset, we wish to express my sincere gratitude to our beloved


PARENT who are solely responsible for the successful completion of our diploma
course.

We are also express my gratitude to our Chairman


Mr.S.VIJAYAKUMAR, Mrs. V.MALINI VIJAYAKUMAR, Secretary Mass
Group of Institutions for their endeavor to provide all the facilities we require and
the interest they showed in the welfare of the students.

We convey our sincere thanks to Prof. Mr. A.CHANDRASOODAN M.Tech.,


the Principal of our college for providing the necessary infrastructure facilities.

I also express my sincere gratitude to our Head of the Department CSE,


Asst.Prof. Mrs. S.JENIFAR B.Tech., M.E., for his kind patronage in doing this
project, for her guidance and providing valuable suggestions, encouragement and
painstaking efforts at every stage of my work.

We also extend our deep sense of reverence and express my heart-felt


gratitude to our Guide Mrs.M. Jhansirani B.Tech.. Lecturer in cse for her
valuable guidance and thought-provoking questioning, comments and suggestion
throughout the project.

I also express my sincere thanks to our Project coordinator of Mrs.S.JANCI


RANI B.Tech., Lecture in Department of Computer Science and Engineering, for
her guidance and providing valuable suggestion and all necessary facilities at the
right time for doing this project.

I would also like to thanks our department staff’s members and class advisor
project.

We also extend our hearty thanks to all the friends in our college who
encouraged us to do this project successfully.

IV
TABLE OF CONTENT

CHAPTER NO TITLE
PAGE NO

ABSTRACT v
LIST OF FIGURES vi
LIST OF ABBREVATIONS vii
1 INTRODUCTION 01
2 DOMAIN OVERVIEW 03
3 SYSTEM ANALYSIS 11
3.1 Existing system 11
3.1.1 Disadvantages of Existing system 11
3.2 Proposed system 11
3.2.1 Advantages of proposed system 12
4 SYSTEM STUDY 13
4.1 Feasibility study 13
4.1.1 Economical feasibility 14
4.1.2 Technical feasibility 14
4.1.3 Social feasibility 14
4.2 Input Design 14
4.2.1 Objectives 15
4.3 Output Design 15
5 SYSTEM REQUIREMENTS 17
5.1 Hardware Requirement 17
5.2 Software Requirement 17
6 SOFTWARE ENVIRONMENT 18
6.1 .Net 18
6.2 MYSQL 24
7 SYSTEM DESIGN 27
7.1 Architecture diagram 28
7.2 DataFlow Diagram 29
7.3 UML Diagram 31
7.4 Class Diagram 32
7.5 Sequence Diagram 33
8 SYSTEM IMPLEMENTATION 34
9 SOURCE CODE 37

10 SYSTEM TESTING 50

10.1 Types Of Tests 50

10.1.1 Unit Testing 50

10.1.2 Integration Testing 50

10.1.3 Functional Test 51

10.1.4 System Test 51

10.1.5 White Box Testing 52

10.1.6 Black Box Testing 52

10.2 Unit Testing 52

10.3 Integration Testing 53

10.4 Acceptance Testing 53


11 SCREEN SHOTS 54
12 CONCLUSION & FUTURE EMHANCEMENT 56

REFERENCES 57
ABSTRACT

Cloud computing is an Internet-based computing pattern through which shared


resources are provided to devices on demand. It’s an emerging but promising paradigm
to integrating mobile devices into cloud computing, and the integration performs in the
cloud based hierarchical multi-user data-shared environment. With integrating into cloud
computing, security issues such as data confidentiality and user authority may arise in
the mobile cloud computing system, and it is concerned as the main constraints to the
developments of mobile cloud computing. In order to provide safe and secure operation,
a hierarchical access control method using modified hierarchical attribute-based
encryption (M-HABE) and a modified three-layer structure is proposed in this paper. In
a specific mobile cloud computing model, enormous data which may be from all kinds of
mobile devices, such as smart phones, functioned phones and PDAs and so on can be
controlled and monitored by the system, and the data can be sensitive to unauthorized
third party and constraint to legal users as well. The novel scheme mainly focuses on the
data processing, storing and accessing, which is designed to ensure the users with legal
authorities to get corresponding classified data and to restrict illegal users and
unauthorized legal users get access to the data, which makes it extremely suitable for the
mobile cloud computing paradigms.

V
LIST OF FIGURES

FIGURE NO TITLE PAGE NO

6.1 .Net Frame Work 22

7.1 Architecture Diagram 28

7.2 Dataflow Diagram 29

7.3 Use Case Diagram 31

7.4 Class Diagram 32

7.5 Sequence Diagram 33

VI

LIST OF ABBREVIATIONS
M- BABE Modified hierarchical attribute-based encryption

IT Information technology

DAC Data Access control

DSA Digital signature scheme

ECC Elliptiv curbe cryptosystems

FIPS Federal information Processing Standard

DL Discrete Logarithm

ECDLP Elliptic curve discrete logarithm problem

ABE Attribute base encryption

ABE Aspect Base Encryption

KP – ABE Key course of action feature based encryption

CPABE Cipher text-Policy ABE

DEK Data encryption key

MK Master Key

VII

You might also like