Professional Documents
Culture Documents
PRESENTED BY:
V.Dilisha Reddy 19RG1A05P6 Under the guidance of
K.Uma Maheshwari 19RG1A05K9 T.V.Seshukiran
N.Sai Likitha Sri 19RG1A05M7 B.Tech,M.Tech(CSE)
M.Ashwini 19RG1A05M3 Assistant Professor
CONTENTS:
Input design
Output design
Software Environment
Modules
System study
System testing
Results
Conclusion
INPUT DESIGN
• Input design is the process of converting the user created input into
computer-based format.
• The goals of the input design is to make the data entry logical and free
from errors.
• The errors in the input are controlled by the input design.
• Whenever a user enters an erroneous data, error message is displayed
& the user can move on to the subsequent pages after completing all the
entries in the current page.
OUTPUT DESIGN
JAVA TECHNOLOGY:
• Java technology is both a programming language and a platform.
JDBC:
• Connecting to the database.
CLOUD SERVER:
CLOUD CONSUMER:
Cloud consumer first has to register to the cloud server which particular cloud
he has to use.
Cloud consumer has to log in and give feedback about the data.
ATTACKER:
Attacker will view registered users and cloud files.
Code link:
https://github.com/VadiyalaDilisha/miniproject/blob/main/SAMPLE%20CODE.docx
SYSTEM STUDY
FEASIBILITY STUDY:
• The feasibility of the project is analyzed in this phase and business
proposal is put forth with a very general plan for the project and some
cost estimates.
• For feasibility analysis, some understanding of the major requirements
for the system is essential.
• Three key consideration involved in the feasibility analysis are
1. Economical feasibility
2. Technical feasibility
3. Social feasibility
SYSTEM TESTING
• Testing is the process of trying to discover every conceivable fault or
weakness in a work product.
• It provides a way to check the functionality of components, sub-
assemblies, assemblies and a finished product.
• Types of tests
1. Unit testing
2. Integration testing
3. Functional testing
4. System testing
5. White box and Black box testing
6. Acceptance testing
RESULTS
CONCLUSION
To resist the exhaustion of password attack on the two-factor
MAKA protocols, a large number of three-factor MAKA protocols
have been proposed.
However, almost all three-factor MAKA protocols don’t provide
formal proofs and dynamic user management mechanism.
To achieve more flexible user management and higher security, a
proposed three-factor MAKA protocol supports dynamic revocation
and provides formal proof.
This protocol achieves the security properties of requirements from
multi-server environments.
Our protocol doesn’t sacrifice efficiency while improving the
function.
On the contrary, the proposed protocol has great advantages in
terms of the total computation time.