First Review PPT Template

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 16

SRM INSTITUTE OF SCIENCE AND TECHNOLOGY

Ramapuram, Chennai – 600 089


DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

18CSP109L-MAJOR PROJECT
Title of the Project
BATCH NUMBER :
Team Members Supervisor
Rajiv Reddy Yedula (RA2011003020012) NAME: Dr. M. Selvaganapathy
Gopi Krishna T (RA2011003020052)
Jaswanth Gajula(RA2011003020595)

Date Slide Number


Agenda
• Abstract
• Scope and Motivation
• Introduction
• Literature Survey
• Objective
• Problem Statement
• Proposed Work
o Architecture Diagram/Flow Diagram/Block Diagram
o Modules
o Module Description

• Software & Hardware Requirements


• References (Base paper hard copy to be submitted to the supervisor.)
• Way forward towards Outcome (Research Paper/Patent)

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING


ABSTRACT
Ø In the world of cloud computing, it's really important to keep data safe and make sure
it's shared securely. This project is all about finding ways to make sure that data stored and
shared in the cloud is protected. We'll look at the problems and risks that come with storing
and sharing data in the cloud, like people getting into the data when they shouldn't or losing
it. We'll also check out the rules and things we have to follow to keep data safe in the cloud.
Ø We're going to come up with ways to keep data safe and make sure it's shared in a good
way. This means using secret codes to lock up the data, controlling who can get to it, and
making the data anonymous so it's hard to figure out who it belongs to. We'll also look at how
to share data in a way that's safe and can be checked later.
Ø This project is really important because it can help make sure that data in the cloud is safe
and can be trusted. We hope that what we find out will help make rules for keeping data safe
and sharing it in the cloud, so people can feel good about using cloud services.

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING


Scope and Motivation
• Scope:
Ø This project is all about finding ways to keep data safe and make sure it's shared securely in
the cloud.
Ø We'll look at different ways to lock up the data, control who can get to it, and make the data
anonymous.
• Motivation:
Ø We're doing this project because we want to make sure that data in the cloud is safe and can be
trusted.
Ø Lots of people use the cloud to store and share their stuff, but sometimes bad things can
happen, like people getting into the data when they shouldn't.
Ø We want to figure out how to stop these bad things from happening and make rules for
keeping data safe in the cloud.

DEPARTMENT OF COMPUTER SCIENCE AND


ENGINEERING - INTERNET OF THINGS
Introduction
• In today's interconnected digital landscape, the importance of securing data storage and
sharing techniques cannot be overstated.
• This abstract presents an overview of key techniques and strategies for securing data storage
and facilitating secure data sharing within a collaborative environment.
• The first aspect addressed is secure data storage. Traditional methods such as encryption,
access controls, and regular data backups remain fundamental in protecting data at rest.
• Advanced encryption algorithms, including AES (Advanced Encryption Standard) and RSA
(Rivest-Shamir-Adleman), are employed to encrypt data, rendering it unreadable to
unauthorized users. Access controls enforce granular permissions, ensuring that only
authorized individuals can access specific data.
• Additionally, regular data backups serve as a failsafe mechanism, allowing organizations to
restore lost or compromised data. In the context of data sharing, several techniques are
employed to facilitate secure collaboration while maintaining data integrity and
confidentiality.
• One such technique is the use of secure communication protocols such as SSL/TLS (Secure
Sockets Layer/Transport Layer Security) for encrypting data during transit.
• Secure file transfer protocols like SFTP (SSH File Transfer Protocol) and HTTPS (Hypertext
Transfer Protocol Secure) ensure that data exchanged between parties remains encrypted and
protected from interception.

DEPARTMENT OF COMPUTER SCIENCE AND


ENGINEERING - INTERNET OF THINGS
Literature Survey
S.No. Title of the Paper Year Journal/ Inferences
Conference
Name
1 A Lightweight Secure 2019 Journal of Limited
Auditing Scheme for Engineering Security
Shared Data in Cloud Storage Sciences guarantees

2 Efficient Identity-Based Public 2021 IEEE Complexity of


Integrity Implementation
Auditing of Shared Data in
Cloud
Storage With User Privacy
Preserving

3 Privacy-Preserving Public 2022 IEEE Performance


Auditing for Shared Overhead
Cloud Data With Secure
Group Management

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING


Literature Survey
S.No. Title of the Paper Year Journal/ Inferences
Conference
Name
4 Shared Dynamic Data Audit 2019 IEEE Scalability
Supporting Concern
Anonymous User Revocation
in Cloud Storage

5 Stateless Cloud Auditing 2020 IEEE Managing


Scheme for cryptographic
Non-Manager Dynamic Group keys securely is
Data With crucial
Privacy Preservation

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING


Objective
Ø Identify and analyze the existing challenges and vulnerabilities associated with data storage
and sharing in cloud environments.
Ø Develop and implement advanced security measures, including encryption techniques, access
control mechanisms, and data anonymization methods, to ensure the confidentiality, integrity,
and availability of data.
Ø Investigate and propose secure data sharing protocols to facilitate controlled and auditable
sharing of information within a cloud environment.
Ø Evaluate the effectiveness of the proposed security measures through practical
implementations or simulations.
Ø Contribute to the establishment of best practices for secure data storage and sharing in cloud
computing, thereby enhancing trust and confidence in cloud-based services.

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING - INTERNET OF THINGS


Problem Statement
• In our digital age, safeguarding sensitive data is imperative for organizational integrity and
resilience.
• "Secured Data Storage and Sharing Techniques" addresses challenges in securing data
effectively.
• Ensure confidentiality, integrity, and availability of data, while facilitating controlled,
authorized access.
• Explore robust techniques amid an interconnected world, balancing security and seamless
collaboration.
• Data breaches necessitate advanced measures—our project delves into strategies for effective
data protection.
• Employing encryption, access controls, and secure protocols, our project builds a multi-
layered security infrastructure.
• The project aims to mitigate data breaches, ensure compliance, and maintain stakeholder trust
in the digital landscape.

DEPARTMENT OF COMPUTER SCIENCE AND


ENGINEERING - INTERNET OF THINGS
Proposed Work

• Utilizes encryption techniques to secure data both at rest and in transit.


• This includes encrypting data before storing it and decrypting it only when accessed by
authorized users.
• Implements strong encryption algorithms such as AES (Advanced Encryption Standard) for
securing data. Implements robust authentication mechanisms to verify the identity of users
accessing the system.
• Utilizes multi-factor authentication (MFA) to add an extra layer of security, requiring users to
provide multiple forms of verification (e.g., password, biometric data, security tokens).
• Uses secure communication protocols such as SSL/TLS (Secure Sockets Layer/Transport
Layer Security) for data transfer between users and the storage system. Implements secure file
transfer protocols like SFTP (SSH File Transfer Protocol) or SCP (Secure Copy Protocol) for
transferring files securely over a network.

DEPARTMENT OF COMPUTER SCIENCE AND


ENGINEERING - INTERNET OF THINGS
Proposed Work
Block Diagram:

DEPARTMENT OF COMPUTER SCIENCE AND


ENGINEERING - INTERNET OF THINGS
Proposed Work
Modules:

• Landing Page
• Login
• File Upload
• Share
• 2FA

DEPARTMENT OF COMPUTER SCIENCE AND


ENGINEERING - INTERNET OF THINGS
Software & Hardware Requirements
Hardware Requirements:

• Processor - Intel i5-8250 CPU @1.60GHz 1.80GHz


• 512 GB SSD
• NVIDIA GEFORCE RTX
• CPU QUAD CORES

Software Requirements:

• PHP
• MySQL
• Security
• Scalability

DEPARTMENT OF COMPUTER SCIENCE AND


ENGINEERING - INTERNET OF THINGS
References
• [1] A. K. Singh and I. Gupta, ‘‘Online information leaker identification scheme for secure data
sharing,’’ Multimedia Tools Appl., vol. 79, no. 41, pp. 31165–31182, Nov. 2020.
• [2] E. Zaghloul, K. Zhou, and J. Ren, ‘‘P-MOD: Secure privilege-based multilevel
organizational data-sharing in cloud computing,’’ IEEE Trans. Big Data, vol. 6, no. 4, pp.
804–815, Dec. 2020.
• [3] I. Gupta and A. K. Singh, ‘‘GUIM-SMD: Guilty user identification model using
summation matrix-based distribution,’’ IET Inf. Secur., vol. 14, no. 6, pp. 773–782, Nov. 2020.
• [4] W. Shen, J. Qin, J. Yu, R. Hao, and J. Hu, ‘‘Enabling identity-based integrity auditing and
data sharing with sensitive information hiding for secure cloud storage,’’ IEEE Trans. Inf.
Forensics Security, vol. 14, no. 2, pp. 331–346, Feb. 2019.
• [5] I. Gupta and A. K. Singh, ‘‘An integrated approach for data leaker detection in cloud
environment,’’ J. Inf. Sci. Eng., vol. 36, no. 5, pp. 993–1005, Sep. 2020.
• [6] R. Li, C. Shen, H. He, X. Gu, Z. Xu, and C.-Z. Xu, ‘‘A lightweight secure data sharing
scheme for mobile cloud computing,’’ IEEE Trans. Cloud Comput., vol. 6, no. 2, pp. 344–357,
Apr. 2018.

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING - INTERNET OF THINGS


References

• [7] I. Gupta, N. Singh, and A. K. Singh, ‘‘Layer-based privacy and security architecture
for cloud data sharing,’’ J. Commun. Softw. Syst., vol. 15, no. 2, pp. 173–185, Apr. 2019.
• [8] J. Li, S. Wang, Y. Li, H. Wang, H. Wang, H. Wang, J. Chen, and Z. You, ‘‘An
efficient attribute-based encryption scheme with policy update and file update in cloud
computing,’’ IEEE Trans. Ind. Informat., vol. 15, no. 12, pp. 6500–6509, Dec. 2019.
• [9] C. Suisse. (2017). 2018 Data Center Market Drivers: Enablers Boosting Enterprise
Cloud Growth. Accessed: May 19, 2019. [Online]. Available:
• https://cloudscene.com/news/2017/12/2018-data-center-predictions/
• [10] I. Gupta and A. K. Singh, ‘‘A framework for malicious agent detection in
cloud computing environment,’’ Int. J. Adv. Sci. Technol., vol. 135, pp. 49–62, Feb. 2020.

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING - INTERNET OF THINGS


Outcome
• Research paper will be submited

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING - INTERNET OF THINGS

You might also like