You are on page 1of 24

MAHARASHTRA STATE BOARD OF TECHNICAL

EDUCATION, MUMBAI

JAYAWANTRAO SAWANT POLYTECHNIC


MICRO PROJECT REPORT
ON
Secure file sharing using Access Control

Academic year: 2021-22


Submitted By
1. Shaikh Sohel Mainoddin

2. Shaikh Umar Salim

3. Shelar Kiran Kailas

4. Shinde Gaurav Manohar

Guided By
Ms.K.S.Patil
DEPARTMENT OF COMPUTER ENGINEERING
MAHARASHTRA STATE
BOARD OF TECHNICAL EDUCATION
Certificate
This is to certify that Mr/Ms: Shaikh Sohel Mainoddin, Shaikh Umar Salim,
Shelar Kiran Kailas, Shinde Gaurav Manohar.

Roll No:109,110,112,113 of Semester Sixth of Diploma in Computer


Engineering of Institute, JS POLYTECHNIC (Code:0711) has completed the
Micro Project satisfactorily in Subject Network and Information Security for
the academic year 2021- 2022 as prescribed in the curriculum.

Place: Hadapsar, Pune Enrollment No: 1907110282

1907110247

1907110251

1907110190

Date: Exam Seat No:

Subject Teacher Head of the Department Principal


JSPM’s
JAYAWANTRAO SAWANT POLYTECHNIC,
Handewadi Road, Hadapsar, Pune-28
Department of Computer Engineering
Academic Year 2021-22
Teacher Evaluation Sheet

Name of student: Shaikh Sohel Mainoddin Enrollment No: 1907110225


Name of program: Computer Engineering Semester: Sixth
Course Title: Network and Information Security Code: 22620
Title of Micro Project: Secure file sharing using Access Control
Course Outcomes Achieved:
CO1: Identify risks related to Computer security and Information hazard in
varioussituations.
CO2: Apply user identification and authentication methods.

Evaluation as per suggested Rubric for Assessment of Micro Project


Sr. Characteristic to be Poor Average Good Excellent
No assessed (Marks1- 3) (Marks 4-5) (Marks6-8) (Marks 9-10)
1 Relevance to the course
2 Literature Survey /
Information collection
3 Project Proposal
4 Completion of the Target as
per Project Proposal
5 Analysis of data and
representation
6 Quality of Prototype/ Model
7 Report preparation
8 Presentation
9 Defense
Micro Project Evaluation Sheet
Process Assessment Product Assessment Total
Marks
Part A – Project Part B – Project Individual
Project Methodology Report/ working Presentation/ Viva 10
Proposal (2 Marks) Model (4 Marks)
(2 Marks) (2 Marks)

Note: Every course teacher is expected to assign marks for group evaluation in first 3
columns and individual evaluation 4th column

Comment/suggestion about team work/leadership/interpersonal communication (If any)


…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
Any other comment:
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………

Name and Designation of the Faculty Member: Ms.K.S.Patil (Lecturer)

Signature:
JSPM’s
JAYAWANTRAO SAWANT POLYTECHNIC,
Handewadi Road, Hadapsar, Pune-28
Department of Computer Engineering
Academic Year 2021-22
Teacher Evaluation Sheet

Name of student: Shaikh Umar Salim Enrollment No: 1907110271


Name of program: Computer Engineering Semester: Sixth
Course Title: Network and Information Security Code: 22620
Title of Micro Project: Secure file sharing using Access Control
Course Outcomes Achieved:
CO1: Identify risks related to Computer security and Information hazard in
varioussituations.
CO2: Apply user identification and authentication methods.

Evaluation as per suggested Rubric for Assessment of Micro Project


Sr. Characteristic to be Poor Average Good Excellent
No assessed (Marks1- 3) (Marks 4-5) (Marks6-8) (Marks 9-10)
1 Relevance to the course
2 Literature Survey /
Information collection
3 Project Proposal
4 Completion of the Target as
per Project Proposal
5 Analysis of data and
representation
6 Quality of Prototype/ Model
7 Report preparation
8 Presentation
9 Defense
Micro Project Evaluation Sheet
Process Assessment Product Assessment Total
Marks
Part A – Project Part B – Project Individual
Project Methodology Report/ working Presentation/ Viva 10
Proposal (2 Marks) Model (4 Marks)
(2 Marks) (2 Marks)

Note: Every course teacher is expected to assign marks for group evaluation in first 3
columns and individual evaluation 4th column

Comment/suggestion about team work/leadership/interpersonal communication (If any)


…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
Any other comment:
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………

Name and Designation of the Faculty Member: Ms.K.S.Patil (Lecturer)

Signature:
JSPM’s
JAYAWANTRAO SAWANT POLYTECHNIC,
Handewadi Road, Hadapsar, Pune-28
Department of Computer Engineering
Academic Year 2021-22
Teacher Evaluation Sheet

Name of student: Shelar Kiran Kailas Enrollment No: 1907110202


Name of program: Computer Engineering Semester: Sixth
Course Title: Network and Information Security Code: 22620
Title of Micro Project: Secure file sharing using Access Control
Course Outcomes Achieved:
CO1: Identify risks related to Computer security and Information hazard in
varioussituations.
CO2: Apply user identification and authentication methods.

Evaluation as per suggested Rubric for Assessment of Micro Project


Sr. Characteristic to be Poor Average Good Excellent
No assessed (Marks1- 3) (Marks 4-5) (Marks6-8) (Marks 9-10)
1 Relevance to the course
2 Literature Survey /
Information collection
3 Project Proposal
4 Completion of the Target as
per Project Proposal
5 Analysis of data and
representation
6 Quality of Prototype/ Model
7 Report preparation
8 Presentation
9 Defense
Micro Project Evaluation Sheet
Process Assessment Product Assessment Total
Marks
Part A - Project Part B - Project Individual
Project Methodology Report/ working Presentation/ Viva 10
Proposal Model
(2 Marks) (4 Marks)
(2 Marks) (2 Marks)

Note: Every course teacher is expected to assign marks for group evaluation in first 3
columns and individual evaluation 4th column

Comment/suggestion about team work/leadership/interpersonal communication (If any)


…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
Any other comment:
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………

Name and Designation of the Faculty Member: Ms.K.S.Patil (Lecturer)

Signature:
JSPM’s
JAYAWANTRAO SAWANT POLYTECHNIC,
Handewadi Road, Hadapsar, Pune-28
Department of Computer Engineering
Academic Year 2021-22
Teacher Evaluation Sheet

Name of student: Shinde Gaurav Manohar Enrollment No: 1907110275


Name of program: Computer Engineering Semester: Sixth
Course Title: Network and Information Security Code: 22620
Title of Micro Project: Secure file sharing using Access Control
Course Outcomes Achieved:
CO1: Identify risks related to Computer security and Information hazard in
varioussituations.
CO2: Apply user identification and authentication methods.

Evaluation as per suggested Rubric for Assessment of Micro Project


Sr. Characteristic to be Poor Average Good Excellent
No assessed (Marks1- 3) (Marks 4-5) (Marks6-8) (Marks 9-10)
1 Relevance to the course
2 Literature Survey /
Information collection
3 Project Proposal
4 Completion of the Target as
per Project Proposal
5 Analysis of data and
representation
6 Quality of Prototype/ Model
7 Report preparation
8 Presentation
9 Defense
Micro Project Evaluation Sheet
Process Assessment Product Assessment Total
Marks
Part A – Project Part B – Project Individual
Project Methodology Report/ working Presentation/ Viva 10
Proposal (2 Marks) Model (4 Marks)
(2 Marks) (2 Marks)

Note: Every course teacher is expected to assign marks for group evaluation in first 3
columns and individual evaluation 4th column

Comment/suggestion about team work/leadership/interpersonal communication (If any)


…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
Any other comment:
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………

Name and Designation of the Faculty Member: Ms.K.S.Patil (Lecturer)

Signature:
JAYAWANTRAO SAWANT POLYTECHNIC,
Handewadi Road, Hadapsar, Pune-28
Academic Year 2021-2022

INDEX

SR.NO. CONTENT PAGE NO.

Brief Description (Introduction) 1


1

2 Aim of Micro Project (Proposed System) 2

3 Course Outcome Integrated (Technology ) 3

4 Actual Procedure Followed (SDLC) 4

5 Output 7

6 Actual Resources Used 9

Skill Developed/ Learning out of this Micro project


7 (Advantages/ Disadvantages/ Conclusion/ References’)
10
Introduction:
 Cloud storage systems have been the source of attraction for the online users so as to
have easy access anywhere and anytime.
 Many online service providers have thrived to serve the individual users, industrialists
as well as the business people to have their data on cloud with reliability and security.
 The numbers of mobile users who need to use the resources or services on the go with
the help of their mobile devices from cloud-based systems are rapidly increasing.
 The process of utilizing the cloud resources for storage and transition of data by
mobile users is a challenging task.
 The cloud environment provided by the online service providers can be in the type of
public, private or hybrid cloud.
 The cloud user selects the type of cloud environment based on the users’ decision to
privacy or exposure policy.
 Many IT giants are using the cloud services to reduce the on-premises cost which is
greater than they provide for the online service providers.
 The cloud system provided by different vendors exhibits the heterogeneity with
respect to performance and pricing.
 The design techniques are varied to achieve competitive results in terms of
efficient service, reduced cost, secured data storage.
 The overall benefits of the cloud system are easy sharing, syncing, off-site data
storage, better remote accessibility, reduction of internal IT costs, reduced
requirement of resources and online data collaboration.

1
Aim of Micro Project:
 Data owner has to register in trusted third-party system for keeping the files in cloud
environment.
 Data owners create the login credentials for uploading files and those credentials are also
used to upload the user lists and their permissions.
 After receiving a particular file from the data owner, the TTP generates keys by using
asymmetric key encryption.
 Asymmetric key generation is not discussed in this paper and it is assumed that any
standard asymmetric key generation algorithm (APKI) is utilized for this purpose.

2
Course Outcome Integrated:

CO1: Identify risks related to Computer security and Information hazard in


varioussituations.

CO2: Apply user identification and authentication methods

3
Actual Procedure Followed:
● Install and run application on your mobile via debugger and login or register.

Fig. 1 Login with credentials


 Go to menu tray and open upload files

4
● Enter the file name to be uploaded or browse the file

Fig. 3 Progress of file being uploaded

● Uploaded files can be checked in the uploaded files section

Fig. 4 Uploaded files tab

5
● Enter the username of the person you want to share the files with.

Fig. 5 Sharing the file with desired user

● After entering the username share the files using share button

Fig. 6 In the above screenshot we can see that the file has been shared successfully

6
Output:
● To verify whether the file has been shared successfully login with John's
(Person whom we shared our fles with) credentials.

Fig. 7 Logged in John's credentials and opening shared files

● After opening the Shared files tab you'll be redirected to the page with the list
of shared files.

Fig. 8 List of shared files

7
● Download the shared file by pressing download and logout after completion.

Fig. 9 File is being downloaded

8
Actual Resources Used :-

Sr.
Name of resource / material Specification Quantity Remarks
NO

RAM 2 Gb
1 Computer 1
ROM 256 Gb

Windows
2 MS Word, Notepad 1
OS: 1.6 GHz

3 Internet IETF 1

2021.1.1 Patch
4 Android Studio 1
2 (Bumblebee)

9
Advantages and Disadvantages:

Advantages:

1. Saves Time
Employees don’t have to worry about sending files via email, uploading, or downloading the
files. Instead, they can quickly access the data they need when they need it.
2. Eliminates Multiple File Versions
Instead of having multiple versions of the same file with different information, all the
information is current and is always the most up-to-date version of the file.
3. Saves Money
You don’t have to worry about users having sufficient storage space on their workstations to
save files when you save data on a network server or cloud-based server.
4. Prevents Lost Data
If the event of a computer crash, data is not lost when it is saved on a server with nightly data
backups.
5. File Permissions Limits Access
You can configure network file structures so that only those employees who need access to
the data have it. Additionally, you can even control what they do with the files, such as read-
only, update, save, etc.

Disadvantages:

1. Potential Proprietary Data/Plagiarism Issues


If one employee takes another employee’s thoughts, ideas, etc., or proprietary data and uses it
themselves or sells it, they are breaking the law. Yet, catching them can be difficult if you
don’t have an application for file sharing and piracy monitoring.
2. Requires Sufficient Network/Bandwidth Speeds
File sharing does require sufficient speeds so that data can be accessed quickly and easily.
If you lack the necessary speed, then accessing files can be very tedious.
3. Higher Risk of Files Being Shared Publicly
When files are shared, there is a higher risk an employee or external hacker could attempt to
share company data in a public forum online.
4. Increased Risk of Files Being Infected
There is an increased risk of malware, ransomware, and viruses of infecting shared files.
For instance, the virus is on a workstation used to access the files and uploads itself onto
your server or to the other workstation where the files are located.

10
References:
[1] Bharat S. Rawal , S. Sree Vivek (2017) "Secure Cloud Storage and File Sharing".

[2] Kuo-Hsuan Huang , En-Chi Chang , Chen-Lin Chang (2014) "Secure File Sharing Scheme for
Mobile Devices".

[3] M. Malarvizhi , J. Angela Jennifa Sujana , T. Revathi (2014) "Secure File Sharing
Using Cryptographic Techniques in Cloud".

[4] Samaneh Navabpour, Negin F. Nejad Asl, Maghsoud Abbaspour, and Akbar Behzadi (2006)
"Secure Routing in Structured Peer to Peer File-Sharing Networks".

11
Future Scope:
 This Application provides users the ability to share data over cloud more securely.
 In current stage the data that can be shared is limited and can be increased with the
requirement of it.
 Various other encryption algorithms can be used with to meet specific needs from
the application Servers can be improved for better interaction with the shared files.
 Various databases can be used to store large amounts of data.

12
Conclusion:
 The application developed enable us to share files over cloud securely. This application
uses AES algorithm for encryption and decryption.
 A user has the ability to share the files only with the users they wish to.
 AES uses higher length key sizes such as 128, 192 and 256 bits for encryption.
 Hence it makes AES algorithm more robust against hacking.
 AES is mostly used for applications such as wireless communication, financial
transactions, e-business, encrypted data storage etc.
 Reason for choosing AES is it is fast and unlike DES, the number of rounds in AES
is variable and depends on the length of the key.

13

You might also like