Académique Documents
Professionnel Documents
Culture Documents
1519BECE30150
1519BECE30151
1519BECE30170
1. Introduction
1.1 Introduction:
Encryption is the process by which documents are protected with cryptographic keys (a
password, public key, token, etc.) so that only individuals with the corresponding decryption
keys (the same password, private key, token, etc.) can open them. It is used to protect
documents in transit (i.e. sent via email) and at rest (i.e. stored on a disk or in the cloud) from
being accessed by unauthorized users.Data reliability is a state that exists when data is
sufficiently complete and error free to be convincing for its purpose and context. In addition to
being reliable, data must also meet other tests for evidence.
1.2 Scope:
The aim of this project is to encrypt data and provide data reliability along with
it. Encryption is often applied in two different forms, a symmetric key or an asymmetric
key. A symmetric key, or secret key, uses one key to both encode and decode the
information. This is best used for one to one sharing and smaller data sets. Asymmetric,
or public key cryptography, uses two linked keys – one private and one public.
o Provides Security: To encrypt the data in a way that it cannot be intercepted and
prone to attacks like Ciphertext Only Attacks, Known Plaintext Attack, Chosen
Plaintext Attack, Brute Force Attack, Power Analysis Attacks.
In this project we use cryptography techniques for encryption and decryption of message.
While transmitting packet from source to destination we encrypt packet and transmit the
packet at the receiving side decryption is done using a key that is only available to the
user. When there is any data hacking at the middle of the network it is not possible to
decrypt the packet.
1519BECE30142
1519BECE30150
1519BECE30151
1519BECE30170
1.3.2 Purpose:
o The purpose of this project to provide the data secrecy and data reliability both
together. Where the fill is encrypted and is stored in 6 parts and saved to the cloud.
And to get the original file we can take combination of any of these files and can
retrieve the original file.
1.4.1 Advantages:
1.4.2 Limitations:
The longer the key, the longer it takes to use the 'brute force' method of
cryptanalysis - but it also makes the process of encrypting and decrypting
the message slower. Key length is very important to the security of the
encryption method - but the 'safe' key length changes every time CPU
manufacturers bring out a new processor.
1519BECE30142
1519BECE30150
1519BECE30151
1519BECE30170
Reliability is chiefly concerned with making sure the methods of data gathering leads to
consistent results. For some types of research this can be measured by having different
researchers follow the same methods to see if results can be duplicated. If results are
similar then it is likely the method of data gathering is reliable. Assuring research can be
replicated and can produce similar results is an important element of the scientific
research method.
There are so many techniques which implements the data encryption perfectly and
they cant be cracked. But for the data reliability we need to implement different method.
So we need algorithm which provides both data reliability and encryption in limited
amount of time using optimum amount of memory.
1519BECE30142
1519BECE30150
1519BECE30151
1519BECE30170
Encoding process:
Pi = ECVi × [A,B,C,D]T
ECVi : encoding coefficient vector of Pi
Arithmetic operations in GF(28)
EM = [ECV1,ECV2,…,ECVn]T
EM: encoding matrix is replicated to all nodes as metadata
Decoding process:
[A,B,C,D]T = EM -1× [P1,P2, P3, P4]T
Download all the chunks from any k of n clouds
Multiply inverted encoding matrix with downloaded chunks
the associated risk and found the errors are not significant enough to cause a
reasonable person, aware of the errors, to doubt a finding, conclusion, or
recommendation based on the data. Data can refer to either information that is
entered into a system or information generated as a result of computer processing.
Randomly combination of 3 files are taken and keys are extracted from
them. The key matrix and data matrix are made and then the inverse of key matrix
is calculated. Now this inverted key matrix and encoded data matrix are
multiplied to get the decoded data matrix. Then this encoded matrix is linearized
to get the data in desired form.
1519BECE30142
1519BECE30150
1519BECE30151
1519BECE30170
Client:
Since, there are many attributes of software that can serve as requirements; the
following items provide a partial list. These are also known as non-functional
requirements or quality attributes.
Availability: The system should be available always, meaning the user can
access it by just an configured camera.
Portability: The end-user part is fully portable and any system using any web
browser should be able to use the features of the application, including any
hardware platform that is available or will be available in future.
3.3 Constraints:
The data stored on the cloud is of double size than original file. Ie if file is
of 5MB then this will store 10MB.
Safety and security too are other major concerns of any system. It is
necessary to provide safety and security as the system is mobile
application and might be intrude by security threats from the internet.
Thus, the code needs to be encrypted and any transaction needs to be done
securely.
4. SYSTEM DESIGN:
4.1.1 Functionalities:
Reed–Solomon code can detect any combination of up to and including t erroneous symbols, or
correct up to and including ⌊t/2⌋ symbols. As an erasure code, it can correct up to and
including t known erasures, or it can detect and correct combinations of errors and erasures.
Reed–Solomon coding is a key component of the compact disc. It was the first use of strong
error correction coding in a mass-produced consumer product, and DAT and DVD use similar
schemes. In the CD, two layers of Reed–Solomon coding separated by a 28-
way convolutional interleaver yields a scheme called Cross-Interleaved Reed–Solomon Coding
(CIRC). The first element of a CIRC decoder is a relatively weak inner (32,28) Reed–Solomon
code, shortened from a (255,251) code with 8-bit symbols. This code can correct up to 2 byte
errors per 32-byte block. More importantly, it flags as erasures any uncorrectable blocks, i.e.,
blocks with more than 2 byte errors.
1519BECE30142
1519BECE30150
1519BECE30151
1519BECE30170
4.1.2 Problems:
It is very hard for developer to create an individual form.
If somehow, they manage to make record and if they get lost then it would be a big
problem for them.
Managing a small amount of modules which can be combined to form a project is easy
but managing a big amount of modules can become a tedious task.
An important outcome of the preliminary investigation is the determination that the system
requested is feasible. The feasibility study is carried out to examine the likelihood that the system
will be useful to the organization.
Operational Feasibility
Technical Feasibility
Economic Feasibility
The main purpose of checking Technical Feasibility is to examine whether the current
technology is enough for the development of the system.
The main purpose of checking Operational Feasibility is to find out whether the system will be
functional after its development and installation or not.
Class shows the class name and they relate to each other through links and their
relationship with each other is shown through the numbers represented on the link; here *
indicates zero or more multiplicity. Attributes provide the details of the Class while Operations
show all possible operations respective class can do in the system.
1519BECE30142
1519BECE30150
1519BECE30151
1519BECE30170
An activity diagram is a special case of a state diagram in which all (or at least most) of
the states are action states and in which all (or at least most) of the transitions are triggered by
completion of the actions in the source states.
Below are the activity diagrams for the actions performed by the end-user and the
response of the system.
1519BECE30142
1519BECE30150
1519BECE30151
1519BECE30170