You are on page 1of 16

MALLA REDDY COLLEGE OF

ENGINEERING FOR WOMEN


Approved By AICTE, New Delhi & Affiliated to JNTU Hyderabad 
JNTU Code : RG
(An ISO 9001:2015 Certified Institution)
ALL B.Tech Programs (CSE,ECE) Accredited by NBA
Maisammaguda, Gundlapochampally(V), Medchal, Hyderabad
500100,Telangana,India.
DESIGN OF SECURE AUTHENTICATED KEY
MANAGEMENT PROTOCOL FOR CLOUD
COMPUTING ENVIRONMENTS

PRESENTED BY:
V.Dilisha Reddy 19RG1A05P6 Under the guidance of
 K.Uma Maheshwari 19RG1A05K9 T.V.Seshukiran
 N.Sai Likitha Sri 19RG1A05M7 B.Tech,M.Tech(CSE)
 M.Ashwini 19RG1A05M3 Assistant Professor
CONTENTS:

Input design

Output design

Software Environment

Modules

System study

System testing

Results

Conclusion
INPUT DESIGN

• Input design is the process of converting the user created input into
computer-based format.
• The goals of the input design is to make the data entry logical and free
from errors.
• The errors in the input are controlled by the input design.
• Whenever a user enters an erroneous data, error message is displayed
& the user can move on to the subsequent pages after completing all the
entries in the current page.
OUTPUT DESIGN

 The output from the computer is required to mainly create an efficient


method of communication between administrator and the clients.
 A new user may be created by the administrator himself or a user can
himself register as a new user but the task of assigning projects and
validating a new user request with the administrator only.
 This will run on the local area network so the server mission will serve
as the administrator while the other connected system can act as the
clients.
SOFTWARE ENVIRONMENT

JAVA TECHNOLOGY:
• Java technology is both a programming language and a platform.

• It provides a run-time environment that communicates between the Java


Programs and the operating system for the programs to run correctly.

• J2EE is a specification for a collection of software components like


servlets, JSPs ..to enable development of multi-tiered web-based
applications.

JDBC:
• Connecting to the database.

• Send SQL Statements

• Process the results.


HTML:
• It produces web pages that include text,graphics and pointer to
other pages(hyperlinks).
• HTML provides tags to make the document look attractive.
• It uses graphics, fonts, different sizes,color etc.

APACHE TOMCAT SERVER:


• It is web container which is used as a HTTP server.
• It allows the users to run servlets and Java Server Pages(JSPs) that
are based on web applications.
MODULES
 DATA OWNER:
 In this module, initially, the data owner has to get register to the cloud
server (CS1,CS2,CS3,CS4) .
 Data owner will log in to the corresponding cloud server he got registered.
 Data owner will upload files to the cloud server and verifies the file.
 The Data owner can view the uploaded files to the cloud servers.
 Data owner will send the file to the trust manager to store the data
owner file to the corresponding cloud servers.

 CLOUD SERVER:

 The cloud server manages a cloud to provide data storage service.


 Data owners encrypt their data files and store them in the cloud for
sharing with cloud consumers.
 To access the shared data files, data consumers download encrypted data
files of their interest from the cloud and then decrypt them .
TRUST MANAGER:
 Trust manager provides login authorization for both data owner and the end user
 Trust manager can view all the cloud status & feedbacks given by end user.
 Trust manager lists no of users in cloud services.
 Trust managers can view the attackers in cloud servers and the no of times
attacked.

CLOUD CONSUMER:
 Cloud consumer first has to register to the cloud server which particular cloud
he has to use.
 Cloud consumer has to log in and give feedback about the data.

ATTACKER:
Attacker will view registered users and cloud files.

 Collusion Attacks - to mislead feedback about the cloud


 Sybil Attacks - When a user uses more transactions per day (Exceeds the
limit which is assigned by the Trust Manager).

Code link:
https://github.com/VadiyalaDilisha/miniproject/blob/main/SAMPLE%20CODE.docx
SYSTEM STUDY
FEASIBILITY STUDY:
• The feasibility of the project is analyzed in this phase and business
proposal is put forth with a very general plan for the project and some
cost estimates.
• For feasibility analysis, some understanding of the major requirements
for the system is essential.
• Three key consideration involved in the feasibility analysis are
1. Economical feasibility
2. Technical feasibility
3. Social feasibility
SYSTEM TESTING
• Testing is the process of trying to discover every conceivable fault or
weakness in a work product.
• It provides a way to check the functionality of components, sub-
assemblies, assemblies and a finished product.
• Types of tests
1. Unit testing
2. Integration testing
3. Functional testing
4. System testing
5. White box and Black box testing
6. Acceptance testing
RESULTS
CONCLUSION

To resist the exhaustion of password attack on the two-factor
MAKA protocols, a large number of three-factor MAKA protocols
have been proposed.

However, almost all three-factor MAKA protocols don’t provide
formal proofs and dynamic user management mechanism.

To achieve more flexible user management and higher security, a
proposed three-factor MAKA protocol supports dynamic revocation
and provides formal proof.

This protocol achieves the security properties of requirements from
multi-server environments.

Our protocol doesn’t sacrifice efficiency while improving the
function.

On the contrary, the proposed protocol has great advantages in
terms of the total computation time.

You might also like