Académique Documents
Professionnel Documents
Culture Documents
SYSTEM
ABSTRACT
2
With the development of storage, more There are various searchable encryption
data owners are inclined to outsource schemes to ensure data availability. However,
their data to file services. For privacy the existing search schemes pay little
concerns, sensitive data should be attention to the efficiency of data users’
encrypted before outsourcing. You have queries, especially for the multi-owner
to be signed in to your Google account. scenario. In this study, we proposed a keyword
search scheme for multiple data providers.
▸ To enable the servers to perform a secure search without knowing any sensitive data (e.g. keywords and
trapdoors), we upload the file in encrypted format with individual file key. Data users can download the file
using this file key, before users get the permission to access the file to data providers. Finally the key is
matched user can able to download the files, otherwise not able to download the file.
3
INTRODUCTION
▸ The File intrusion detection and prevention
system (FIDS) is used to give notification to us
when any attackers attempts to hack our
system. It also monitors for potential
extrusions in which your system will be used as
a source of attack. These type of potential
intrusion and extrusion are logged as intrusion
monitors audit records in the security audit
journal and it is displayed as intrusion events in
the Intrusion Detection System graphical user
Interface(GUI).
4
We can configure IDS to prevent intrusion and extrusion from
occurring. This File Intrusion Detection gather the information
about arrival of the attackers over TCP/IP network. It includes
many adverse activities, such as information theft and denial of
service attacks.
Project Overview:
Project Scope
Project Scope
LITERATURE REVIEW
Title: A host based intrusion detection system for cloud
computing environment
Author: Prachi Deshpande, S. C. Sharma S. K. Peddoju ,S. Junaid
Abstract:
9
Abstract:
There are two key issues in distributed intrusion detection system, that is, maintaining
load balance of system and protecting data integrity. To address these issues, this paper
proposes a new distributed intrusion detection model for big data based on
nondestructive partitioning and balanced allocation. A data allocation strategy based on
capacity and workload is introduced to achieve local load balance, and a dynamic load
adjustment strategy is adopted to maintain global load balance of cluster. Moreover, data
integrity is protected by using session reassemble and session partitioning. The
simulation results show that the new model enjoys favorable advantages such as good
load balance, higher detection rate and detection efficiency.
Author: Hervé Debar, Marc Dacier, Andreas Wespi
11
A Distributed Intrusion Detection Model via Nondestructive
Partitioning and Balanced Allocation for Big Data
Abstract:
▸ There are two key issues in distributed intrusion detection system, that is, maintaining
load balance of system and protecting data integrity. To address these issues, this
paper proposes a new distributed intrusion detection model for big data based on
nondestructive partitioning and balanced allocation. A data allocation strategy based
on capacity and workload is introduced to achieve local load balance, and a dynamic
load adjustment strategy is adopted to maintain global load balance of cluster.
Moreover, data integrity is protected by using session reassemble and session
partitioning. The simulation results show that the new model enjoys favorable
advantages such as good load balance, higher detection rate and detection efficiency.
12
EXISTING SYSTEM
▸ In the Existing project the files are not safe since it used Md5 password for security.
This Md5 passwords can be easily hacked by the hackers since it is available in online.
It can be broken easily and is no longer suitable for use in secure system. And we
cannot notice that our password have been hacked since it does not alert us in anyway.
DISADVANTAGES
• Lack of Security
• Lack of Alertness
13
PROPOSED SYSTEM
▸ The addition of this proposed File intrusion web-based facilitates the features like it
gives notification in the email to the data owner if any unauthorized users try to login the
system. We used DDD algorithm which is very secure and it will not get easily hacked by
the hackers. A security key has been created by the admin which is unknown to others.
So if users want to download particular file then a request will be send to the required
owner and if the owner accept the request then the admin will send the security key for
downloading the file to the accepted user.
MODULES
• ADMIN
• USER
• DATA OWNER
14
ADMIN
▸ The admin has the full control of the system. He will create a security key for every file
that has been uploaded in the system. He will send the security key for the accepted
user. He will have the full details of the registered users and the data owner. The new
users and data owners must get permission from the admin and then can register in the
system.
USER
▸ The registered user will get login with the username and the password. The new user
will register only after getting approval from the admin. He can view all the files in the
system and if the user want to download the files then he should give a request to the
data owner and if he accept the request then the admin will send the required security
key to the user to download that file.
15
DATA OWNER
▸ The registered data owner will get login with the username and password. The new data
owner will register only after getting approval from the admin. The data owner can
upload his files in the system and he will also receive the request from the user to
download his file and the user can download that file only after he is accepted by the
data owner. If the data owner reject the request then the user cannot download the file.
16
SYSTEM REQUIREMENTS
HARDWARE SPECIFICATION
Processor : Intel Core i3, 2.70 GHz
RAM : 2 GB
System Type : 34-Bit Operating System
Hard Disk : 150 GB
SOFTWARE SPECIFICATION
Operating System : Windows 8.1 Pro
Front End : PHP5, HTML5, CSS3, jQuery, Bootstrap
Back End : MySql
IDE : Dreamweaver CS5.5
17
SYSTEM REQUIREMENTS
HARDWARE SPECIFICATION
Processor : Intel Core i3, 2.70 GHz
RAM : 2 GB
System Type : 34-Bit Operating System
Hard Disk : 150 GB
SOFTWARE SPECIFICATION
Operating System : Windows 8.1 Pro
Front End : PHP5, HTML5, CSS3, jQuery, Bootstrap
Back End : MySql
IDE : Dreamweaver CS5.5
18
• ECONOMICAL FEASIBILITY
• TECHNICAL FEASIBILITY
• SOCIAL FEASIBILITY
ECONOMICAL FEASIBILITY
▸ The Economic feasibility is carried out to check the economic impact that the system will
have on the organization. The amount of fund that the company can pour into the research
and development of the system is limited. The expenditures must be justified. Thus the
developed system as well within the budget and this was achieved because most of the
technologies used are freely available. Only the customized products had to be purchased.
20
TECHNICAL FEASIBILITY
▸ The Technical feasibility is carried out to check the technical feasibility, that is, the technical
requirements of the system. Any system developed must not have a high demand on the
available technical resources. This will lead to high demands on the available technical
resources. and it will also lead to high demands being placed on the client. The developed
system must have a modest requirement, as only minimal or null changes are required for
implementing this system. We provide Ieee 2018 Mobile Computing projects in chennai.
SOCIAL FEASIBILITY
▸ The aspect of study is to check the level of acceptance of the system by the user. This
includes the process of training the user to use the system efficiently. The user must not feel
threatened by the system, instead must accept it as a necessity. The level of acceptance by
the users solely depends on the methods that are employed to educate the user about the
system and to make him familiar with it. His level of confidence must be raised so that he is
also able to make some constructive criticism, which is welcomed, as he is the final user of
the system.
21
COMPLETED & WORKING PROPOSED SOFTWARE/SYSTEM:
Dreamweaver CS5.5
▸ Dreamweaver CS5.5 is a web editor (a type of computer program) meant for both
newcomers as well as experienced professionals to design websites. It has a visual Interface,
often called a "What You See Is What You Get" ("WYSIWYG") interface, that lets you see what
your web page looks like even as you create it. The editor sports numerous features that are
meant to make your job of creating and maintaining a site easier and more efficient.
MySql:
▸ MySQL is an open source relational database management system. Information in a MySQL
database is stored in the form of related tables. MySQL databases are typically used for web
application development (often accessed using PHP).
24
Features of MySql:
▸ Mysql is released under an open-source license. So you have nothing to pay to use it.
▸ Mysql is a very powerful program in its own right. It handles a large subset of the
functionality of the most expensive and powerful database packages.
▸ Mysql works on many operating systems and with many languages including PHP, PERL, C,
C++, JAVA, etc.
▸ Mysql supports large databases, up to 50 million rows or more in a table. The default file size
limit for a table is 4GB.
25
THANKS!
Any questions?
You can find me at 1croreprojects@gmail.com