internship presentation on key-aggregate searchable ... filekey-aggregate searchable encryption...
TRANSCRIPT
KEY-AGGREGATE SEARCHABLE ENCRYPTION
(KASE) FOR GROUP DATA SHARING VIA CLOUD
STORAGE
CONTENTS
• About company
• Introduction
• Technical Activities
• Language
• Functional Requirement
• Security requirements
• Aggregate Key Searchable Encryption Scheme
• Advantages
• Hardware and Software Requirements
ABOUT COMPANY
• Founded in the Year 2015
• Head Office is in Sanforde Ave, Grandville, Michigan, USA.
• Its Aim to bridge the gap between High-quality Training and their
affordability.
• Provide high quality corporate training & internship to company
professionals.
• Indian sub branches
• Banashankari 3rd stage Giri Nagar, Bangalore.
• Ameerpet , Hyderabad.
• Website: www.skillcentrics.com
There are 3 departments in skillcentrics pvt limited Software
Company.
• Higher Management: They call all the shots, and pull all the
strings.
• Mid Management: They appear to call all the shots, but well the
truth is they are mean puppets of the higher management.
• Software Engineers: They are the ones who are shot at. They
usually do all the work and still are under paid in many
companies.
R AND D DEPARTMENT:
• New Product Research
• New Product Development
• Existing Product Updates
• Quality Checks
• Innovation
Operation and Services provided:
• ERP Solutions:
• It is having employee strength exceeding 500
• ERP Software solutions Bangaluru and Hydrabad are the
branches
ERP Integration solutions
ERP Software consist of following modules
• Personnel Administration.
• Payroll - management
• Timeware- Time & Attendance Management with Interface to Time Recorders.
• ITware – Organization wide Income Tax Planner, TDS Deduction &Monitoring System.
• AppraisalWare – Year round Performance Appraisal System.
• SkillWare – Organization wide Talent Pool Data Base &
Management System.
• TrainingWare- Training Scheduler & Management System.
• ExpenseWare- Reimbursement & tracking of Travel & Medical
Expense
• HRPortal – An employee access environment with predefined
privileges.
EDUErp - MODULES
• Students Management
• Employees/Teachers Management
• Time Table Management
• Course Management
• Learning Management
• Examination Management
• Human Resource
• News Management
• Messaging System
• Email Alerts
• Library Management
• Hotel Management
TASK ASSIGNED:
To implement Key Aggregate Searchable Encyption for Group Data Sharing via Cloud storage
MODULES:
• Data Owner
• Network Storage
• Encrypted Aggregate Key and Searchable Encryption Key Transfer
• Trapdoor Generation
• File User
CLOUD COMPUTING
• Cloud computing is the use of computing resources (hardware
and software) that are delivered as a service over a network
(typically the Internet)
• Cloud computing entrusts remote services with a user's data,
software and computation. Cloud computing consists of hardware
and software resources made available on the Internet as managed
third-party services
• The goal of cloud computing is to apply traditional
supercomputing or high-performance computing power, normally
used by military and research facilities, to perform tens of
trillions of computations per second.
CHARECTERISTICS OF CLOUD COMPUTING
• On-demand self-service:
• Broad network access:
• Resource pooling:
• Rapid elasticity:
• Measured service:
BENEFITS OF CLOUD COMPUTING
• Achieve economies of scale – increase volume output or productivity with
fewer people. Your cost per unit, project or product plummets.
• Reduce spending on technology infrastructure. Maintain easy access to your
information with minimal upfront spending. Pay as you go (weekly, quarterly
or yearly), based on demand.
• Globalize your workforce on the cheap. People worldwide can access the
cloud, provided they have an Internet connection.
• Streamline processes. Get more work done in less time with less people.
• Reduce capital costs. There’s no need to spend big money on hardware,
software or licensing fees.
• Improve accessibility. You have access anytime, anywhere, making your life
so much easier!
• Monitor projects more effectively. Stay within budget and ahead of
completion cycle times.
• The confidentiality of data is a major concern in cloud security.
To achieve the confidentiality, data is stored in encrypted form on
cloud storage. But, it is difficult to perform any operation on
encrypted data.
• Searching on encrypted data is a major issue in cloud. There are
several solutions present in literature for searching over encrypted
data.
• cryptographic cloud storage : To address data leaks , data
owner need to encrypt all the data before uploading them , such
that encrypted data may be retrieved and decrypted by those who
have the decryption keys.
• However , encryption of data makes it challenging for users to
search and then selectively retrieve only the data containing given
keywords
DROP BOX
• Dropbox is a home for all our photos, docs, videos, and files.
Anything we add to Dropbox will automatically show up on all
our computers, phones and even the Dropbox website — so we
can access our stuff from anywhere.
• Dropbox also makes it super easy to share with others, whether
we are a student or professional.
• Dropbox allows users to create a special folder on their
computers, which Dropbox then synchronizes so that it appears to
be the same folder
LANGUAGE: JAVA
ava is object oriented programming that provide a way of
modularizing programs. Java follows Bottom-up approach in
Program design i.e Emphasis is on data rather than procedure.
Basic Concept Of Object – Oriented Programming
• Objects and Classes
• Data Abstraction and Encapsulation
• Inheritance
• Polymorphism
• Dynamic Binding
NETBEANS
• NetBeans is a software development platform written in Java. The
NetBeans Platform allows applications to be developed from a set
of modular software components called modules. Applications
based on the NetBeans Platform, including the
NetBeans integrated development environment (IDE), can be
extended by third party developers.
• The NetBeans IDE is primarily intended for development in Java,
but also supports other languages, in
particular PHP, C/C++and HTML5.
• NetBeans is cross-platform and runs on Microsoft Windows, Mac
OS X, Linux, Solaris and other platforms supporting a
compatible JVM.
Why Use NetBeans IDE?
• Works out of the box
• Freely available
• Open source
• Support for Java standards &other popular platforms, such as HTML5
• Deeply integrated Maven support
• Extensible Java desktop framework
• Powerful, award winning GUI Builder
• Profiling and debugging tools
• Customizable and extensible
Increase Developer Productivity
MySQL
• MySQL is an open-source relational database management
system (RDBMS)
• Its name is a combination of "My", the name of co-founder
Michael Widenius' and "SQL", the abbreviation for Structured
Query Language
•
22
Querying with Statement
• The executeQuery method returns a ResultSet object
representing the query result.
•Will be discussed later…
String queryStr =
"SELECT * FROM employee " +
"WHERE lname = ‘Wong'";
Statement stmt = con.createStatement();
ResultSet rs = stmt.executeQuery(queryStr);
23
Introduction to JDBC
• JDBC is used for accessing databases from Java applications
• Information is transferred from relations to objects and vice-versa
• databases optimized for searching/indexing
• objects optimized for engineering/flexibility
Seven Steps
• Load the driver
• Define the connection URL
• Establish the connection
• Create a Statement object
• Execute a query using the Statement
• Process the result
• Close the connection
Interaction with the Database
• We use Statement objects in order to
• Query the database
• Update the database
• Three different interfaces are used:
• Statement, PreparedStatement, CallableStatement
• All are interfaces, hence cannot be instantiated
• They are created by the Connection
CLASS DIAGRAM
• In software engineering, a class diagram in the Unified Modeling
Language (UML)
• It is a type of static structure diagram that describes the structure
of a system by showing the system's classes, their attributes,
operations (or methods), and the relationships among the classes.
FLOW DIAGRAM
User
Key generates and
encrypts content
Upload to cloud
Download encrypt content
Decrypt content Using
Trapdoor Generated key
Upload Download
Aggregate Key and
master secret key
ADVANTAGES
• Preserving data privacy and confidentiality.
• Data is stored secure in cloud server.
• Data owner distributes a single key for sharing large number of
documents to the user.
• User needs to submit a single trapdoor for performing keyword
search over number of shared files.
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
Processor : Pentium IV 2.4 GHz.
Hard Disk : 40 GB.
Ram : 2 GB.
SOFTWARE REQUIREMENTS:
Operating system : Windows XP/7/8.1/10
Coding Language : J2EE
IDE : NetBeans
Data Base : MYSQL
THANK YOU