Vous êtes sur la page 1sur 15

1519BECE30142

1519BECE30150
1519BECE30151
1519BECE30170

1. Introduction

1.1 Introduction:

Encryption is the process by which documents are protected with cryptographic keys (a
password, public key, token, etc.) so that only individuals with the corresponding decryption
keys (the same password, private key, token, etc.) can open them. It is used to protect
documents in transit (i.e. sent via email) and at rest (i.e. stored on a disk or in the cloud) from
being accessed by unauthorized users.Data reliability is a state that exists when data is
sufficiently complete and error free to be convincing for its purpose and context. In addition to
being reliable, data must also meet other tests for evidence.

1.2 Scope:
The aim of this project is to encrypt data and provide data reliability along with
it. Encryption is often applied in two different forms, a symmetric key or an asymmetric
key. A symmetric key, or secret key, uses one key to both encode and decode the
information. This is best used for one to one sharing and smaller data sets. Asymmetric,
or public key cryptography, uses two linked keys – one private and one public.

o Time Efficiency: To reduce the time to encrypt independent of file size.

o Provides Security: To encrypt the data in a way that it cannot be intercepted and
prone to attacks like Ciphertext Only Attacks, Known Plaintext Attack, Chosen
Plaintext Attack, Brute Force Attack, Power Analysis Attacks.

o Data Reliability: Application provides the functionality of uploading the registration


requirement and apply for the positions for a company.

1.3 Project Summary and Purpose:

1.3.1 Project Summary:

In this project we use cryptography techniques for encryption and decryption of message.
While transmitting packet from source to destination we encrypt packet and transmit the
packet at the receiving side decryption is done using a key that is only available to the
user. When there is any data hacking at the middle of the network it is not possible to
decrypt the packet.
1519BECE30142
1519BECE30150
1519BECE30151
1519BECE30170

1.3.2 Purpose:

o The purpose of this project to provide the data secrecy and data reliability both
together. Where the fill is encrypted and is stored in 6 parts and saved to the cloud.
And to get the original file we can take combination of any of these files and can
retrieve the original file.

1.4 Advantages and Limitations:

1.4.1 Advantages:

 Encryption helps move to the cloud. Everyone is concerned about moving


sensitive data to the cloud, and most organizations believe the cloud is not
as safe as their own data center. If your data is in the cloud, it's not only
possible that strangers might see it, but your data could be sitting on the
same storage as your competitor's.

 In virtualized cloud environments, multi-tenancy is what drives costs


down and increases flexibility.

 Encryption key services prevent service providers from accessing your


data.If the service provider has both your encrypted data and your
encryption keys, it is able to access your data. To avoid this problem,
encrypting your data in the cloud and holding your own keys just makes
sense.

1.4.2 Limitations:

 Cryptanalysis, or the process of attempting to read the encrypted message


without the key, is very much easier with modern computers than it has
ever been before. Modern computers are fast enough to allow for 'brute
force' methods of cryptanalysis - or using every possible key in turn until
the 'plain text' version of the message is found.

 The longer the key, the longer it takes to use the 'brute force' method of
cryptanalysis - but it also makes the process of encrypting and decrypting
the message slower. Key length is very important to the security of the
encryption method - but the 'safe' key length changes every time CPU
manufacturers bring out a new processor.
1519BECE30142
1519BECE30150
1519BECE30151
1519BECE30170

1.5 Problem Definition:

Reliability is chiefly concerned with making sure the methods of data gathering leads to
consistent results. For some types of research this can be measured by having different
researchers follow the same methods to see if results can be duplicated. If results are
similar then it is likely the method of data gathering is reliable. Assuring research can be
replicated and can produce similar results is an important element of the scientific
research method.

Implementation of regenerating codes in multiple cloud storage:

• Can we eliminate encoding/decoding operations in storage nodes (clouds)?


• Only standard read/write interfaces would suffice
• Can we support basic upload/download operations with regenerating codes?

There are so many techniques which implements the data encryption perfectly and
they cant be cracked. But for the data reliability we need to implement different method.
So we need algorithm which provides both data reliability and encryption in limited
amount of time using optimum amount of memory.
1519BECE30142
1519BECE30150
1519BECE30151
1519BECE30170

2. Technology and Literature Reviews:

2.1 About Tools and Technology:

In our project we are basically using Java Technology as a backend


technology. And concepts of matrix to implement data encryption and retieve it
back. Files are stored in the S3 sevice provided by amazon web services.

2.2 Brief History of Work Done:


Recent advances in Software Engineering have reduced the cost of coding
programs at the expense of increasing the complexity of program synthesis, i.e.
the process of coming up with the final program. Model Driven Development and
Software Product Lines (SPL) are two cases in point. SPL provides a means for
composing software products that match the requirements of different application
scenarios from a single code base and can be developed using a variety of
implementation techniques.

 Encoding process:
Pi = ECVi × [A,B,C,D]T
ECVi : encoding coefficient vector of Pi
Arithmetic operations in GF(28)
EM = [ECV1,ECV2,…,ECVn]T
EM: encoding matrix is replicated to all nodes as metadata

 Decoding process:
[A,B,C,D]T = EM -1× [P1,P2, P3, P4]T
Download all the chunks from any k of n clouds
Multiply inverted encoding matrix with downloaded chunks

The well-known concepts in this area are Generative Programming, pre-


processor definitions, components, Aspect Oriented Programming, Feature-
Oriented Programming (FOP), Aspectual Feature C Modules (AFMs) and frames
like XVCL. Using SPL helps to increase the software making productivity, by
producing it in a way comparable to industrial production. By using concepts of
Generative Programming (GP), SPL can be fully automated, which is an
important characteristic of IMSCG.

Reliability does not mean that computer-processed data is errorfree. It


means that any errors found were within a tolerable range - that you have assessed
1519BECE30142
1519BECE30150
1519BECE30151
1519BECE30170

the associated risk and found the errors are not significant enough to cause a
reasonable person, aware of the errors, to doubt a finding, conclusion, or
recommendation based on the data. Data can refer to either information that is
entered into a system or information generated as a result of computer processing.

Randomly combination of 3 files are taken and keys are extracted from
them. The key matrix and data matrix are made and then the inverse of key matrix
is calculated. Now this inverted key matrix and encoded data matrix are
multiplied to get the decoded data matrix. Then this encoded matrix is linearized
to get the data in desired form.
1519BECE30142
1519BECE30150
1519BECE30151
1519BECE30170

3. Technology and Literature Reviews:

3.1 User Characteristics:


Analyzing user characteristics is an important aspect of any project. It allows us to
clearly define and focus on who the end users are for the project. Also, it allows
checking the progress of the project to ensure that we are still developing the
system for the end users. The user must have following characteristics:

 User must have basic matrices and web services.


 User should have the AWS account to upload files on S3.
 Bucket configuration for create, read, update, delete operations with IAM
user(aws secret keys).

3.2 Software and Hardware Requirements:

Software and Hardware Requirements are used to describe the minimum


hardware and software requirements to run the Software. These requirements are
described below.

3.2.1 Software Requirements


Server:
 Storage Server: AWS S3, Google firebase or other storage service.
 Technologies: Java

3.2.2 Hardware Requirements

Client:

 Processor: 1.4 GHz


 RAM: 2 GB
 S3 account
 IAM user

3.2.3 Functional Requirements:


1519BECE30142
1519BECE30150
1519BECE30151
1519BECE30170

The basic features available in the system are as follows:

 Data is stored in 6 different encrypted file.


 Original data can be retrieved by any 3 parts.

3.2.4 Non-Functional Requirements:

Since, there are many attributes of software that can serve as requirements; the
following items provide a partial list. These are also known as non-functional
requirements or quality attributes.

 Availability: The system should be available always, meaning the user can
access it by just an configured camera.

 Security: Passwords will be saved encrypted in the database’s in order to


ensure the user's privacy. The user's IP will be logged.

 Portability: The end-user part is fully portable and any system using any web
browser should be able to use the features of the application, including any
hardware platform that is available or will be available in future.

3.3 Constraints:

3.3.1 Storage Overhead

The data stored on the cloud is of double size than original file. Ie if file is
of 5MB then this will store 10MB.

3.3.3 Parallel Operations


The project is on basis of multi-user. This is used for carrying out updating
as well as entry by preventing the redundancy of the data.

3.3.2 Reliability Requirements


Reliability requirements of the system are one of the prime ones in the list.
The system is needed to be highly reliable in terms of performance and
capable of delivering robust performance.
1519BECE30142
1519BECE30150
1519BECE30151
1519BECE30170

3.3.3 Criticality of the application


The system can stop working on device with very low internet connection.
Other than that there won’t be any issues. Apart from these the system
should be able to make updates at regular time intervals.
3.3.4 Safety and Security Consideration

Safety and security too are other major concerns of any system. It is
necessary to provide safety and security as the system is mobile
application and might be intrude by security threats from the internet.
Thus, the code needs to be encrypted and any transaction needs to be done
securely.

3.3.5 Hardware Limitations

Hardware Limitations are other constraint of the system. Hardware


Limitations should be overcome for better performance of the system.
This can be achieved by using minimum and only necessary hardware.

3.3.6 Regulatory Policies

Regulatory policies about achieving organization’s objectives through the


use of regulations, laws, and other instruments to deliver better economic
and social outcomes and thus enhance the life of business. Thus, the
system should be developed by using these regulations to provide better
outcome to the company.
1519BECE30142
1519BECE30150
1519BECE30151
1519BECE30170

4. SYSTEM DESIGN:

4.1 Study of current system:

4.1.1 Functionalities:

Reed–Solomon code can detect any combination of up to and including t erroneous symbols, or
correct up to and including ⌊t/2⌋ symbols. As an erasure code, it can correct up to and
including t known erasures, or it can detect and correct combinations of errors and erasures.

Reed–Solomon coding is a key component of the compact disc. It was the first use of strong
error correction coding in a mass-produced consumer product, and DAT and DVD use similar
schemes. In the CD, two layers of Reed–Solomon coding separated by a 28-
way convolutional interleaver yields a scheme called Cross-Interleaved Reed–Solomon Coding
(CIRC). The first element of a CIRC decoder is a relatively weak inner (32,28) Reed–Solomon
code, shortened from a (255,251) code with 8-bit symbols. This code can correct up to 2 byte
errors per 32-byte block. More importantly, it flags as erasures any uncorrectable blocks, i.e.,
blocks with more than 2 byte errors.
1519BECE30142
1519BECE30150
1519BECE30151
1519BECE30170

4.1.2 Problems:
 It is very hard for developer to create an individual form.

 If somehow, they manage to make record and if they get lost then it would be a big
problem for them.

 Managing a small amount of modules which can be combined to form a project is easy
but managing a big amount of modules can become a tedious task.

4.2 Feasibility Study:

An important outcome of the preliminary investigation is the determination that the system
requested is feasible. The feasibility study is carried out to examine the likelihood that the system
will be useful to the organization.

There are four aspects in the feasibility study namely.

 Operational Feasibility
 Technical Feasibility
 Economic Feasibility

4.3.1 Technical Feasibility:

The main purpose of checking Technical Feasibility is to examine whether the current
technology is enough for the development of the system.

The outcomes of the technical feasibility are as follows:

 File is encrypted and stored in 6 different parts.


 The application is developed in java and can run on any system with high processing
power.
 We can use any storage service to store files.
 The result and delay is dependent on the system used for processing.
1519BECE30142
1519BECE30150
1519BECE30151
1519BECE30170

4.3.2 Operational Feasibility:

The main purpose of checking Operational Feasibility is to find out whether the system will be
functional after its development and installation or not.

The outcomes of the operational feasibility are as follows:

 This application is used to detect objects and raise alert if needed.


 The User can provide video from remote locations to process.

So, this app is operationally feasible.

4.4 Class Diagram:

A class diagram is a graph of classified elements connected by their various static


relationships. It is shown here for Client Support System. This includes the System and the End-
users as its main classes. Here are three different fields: Class, Attributes, and Operations.

Class shows the class name and they relate to each other through links and their
relationship with each other is shown through the numbers represented on the link; here *
indicates zero or more multiplicity. Attributes provide the details of the Class while Operations
show all possible operations respective class can do in the system.
1519BECE30142
1519BECE30150
1519BECE30151
1519BECE30170

Fig-4(a) Class Diagram for Data Encrption and reliability.

4.5 Activity Diagram

An activity diagram is a special case of a state diagram in which all (or at least most) of
the states are action states and in which all (or at least most) of the transitions are triggered by
completion of the actions in the source states.
Below are the activity diagrams for the actions performed by the end-user and the
response of the system.
1519BECE30142
1519BECE30150
1519BECE30151
1519BECE30170

Fig-4(c) Activity Diagram to Encrypt data.


1519BECE30142
1519BECE30150
1519BECE30151
1519BECE30170

Fig-4(d) Activity Diagram to Dencrypt data.


1519BECE30142
1519BECE30150
1519BECE30151
1519BECE30170

4.7 Sequence Diagram

A sequence diagram represents an Interaction, which is a set of messages exchanged among


objects within collaboration to affect a desired operation or result. Here are the sequence
diagrams for various interactions among the user, system and the data storage. It must be noted
that the rectangle box on the top of the diagram indicates the object or actor and dashed lines
beneath to it shows an object’s lifeline. Another rectangle following and followed by the dashed
lines in a vertical manner show the activation period of the object or actor when it performs some
actions. A solid arrow conveys a message while the dashed arrow gives return message. These
message names are written along with their respective arrows as shown further in the diagram.

Fig-4(e)-Sequence Diagram for Data encryption and Decryption

Vous aimerez peut-être aussi