You are on page 1of 16

ABSTRACT

ABSTRACT

Benefiting from cloud computing and mobile devices, a huge number of media
contents such as videos are shared in mobile networks. Although scalable video
coding can be utilized to provide flexible adaptation, the cloud poses a serious threat
to media privacy. In this paper, we propose a privacy-preserving multi-dimensional
media sharing scheme named SMACD in mobile cloud computing. Firstly, each
media layer is encrypted with an access policy based on attribute-based encryption,
which guarantees media confidentiality as well as fine-grained access control. Then
we present a multi-level access policy construction with secret sharing scheme. It
ensures that the mobile consumers who obtain a media layer at a higher access level
must satisfy the access trees of its child layers at the lower access level, which is
compatible with the characteristics of multi-dimensional media and also reduces the
complexity of access policies. Moreover, we introduce decentralized key servers to
achieve both intra-server and inter-server deduplication by associating different
access policies into the same encrypted media. Finally, we conduct experimental
evaluation on mobile device and cloud platform with real-world datasets. The results
indicate that SMACD protects media privacy against cloud media center and
unauthorized parties, while incurring less computational and storage cost.
TABLE OF CONTENTS
S.NO CHAPTER NAME PAGE NO

1 INTRODUCTION 1

2 LITERATURE 5
SURVEY

3 SYSTEM ANALYSIS 8

3.1 EXISTING SYSTEM 8

3.2 PROPOSED SYSTEM 8

3.3 FEASABILITY 9
STUDY
3.4 MODULES 10

4 H/W AND S/W 11


REQUIRMENT
SPECIFICATIONS

4.1 HARDWARE 11
REQUIRMENTS

4,2 SOFTWARE 11
REQUIREMENTS
5 SYSTEM DESIGN 12

5.1 INTRODUCTION 12

5.2 SYSTEM DESIGN 12


ASPECTS
5.3 UML DIAGRAMS 15

5.3.1 USECASE DIAGRAM 23

5.3.2 CLASS DIAGRAMS 24

5.3.3 SEQUENCE 25
DIAGRAMS

5.3.4 ACTIVITY 26
DIAGRAM

6 IMPLEMENTATION 27

6.1 TECHNOLOGY 27
USED

7 SOURCE CODE 37

8 TESTING 51

8.1 INTRODUCTION 51

8.2 TYPES OF TESTS 51

9 SCREENS 56

10 CONCLUSION 70
INTRODUCTION
LITERATURE SURVEY
SYSTEM ANALYSIS
HARDWARE AND SOFTWARE
REQUIRMENT SPECIFICATIONS
SYSTEM DESIGN
IMPLEMENTATION
SOURCE CODE
TESTING
SCREENS
CONCLUSION
FUTURE ENHANCEMENTS
BIBLIOGRAPHY

You might also like