ANNA UNIVERSITY SAMPLE REPORT FORMAT FOR FINAL YEAR UG BE/B.TECH STUDENTS - Anna University Internal marks 2018

ANNA UNIVERSITY SAMPLE REPORT FORMAT FOR FINAL YEAR UG BE/B.TECH STUDENTS

SAV TECHNIQUE FOR SECURELY SHARING DEFENCE DATA IN INTERNET USING AHE METHOD

A PROJECT REPORT


Submitted by

ESHIN JOZER. R (960311205008)
LORDSON ROY. M (960311205010)
SUBEESH. P (960311205022)


in partial fulfillment for the award of the degree
of
BACHELOR OF TECHNOLOGY
IN
INFORMATION TECHNOLOGY



BETHLAHEM INSTITUTE OF ENGINEERING, KARUNGAL

ANNA UNIVERSITY : CHENNAI 600 025

APRIL 2015

ANNA UNIVERSITY : CHENNAI 600 025

BONAFIDE CERTIFICATE
Certified that this project report “SAV TECHNIQUE FOR SECURELY SHARING DEFENCE DATA IN INTERNET USING ADDITIVE HOMOMORPHIC ENCRYPTION METHOD” is the bonafide work of “Eshin Jozer R, Lordson Roy M, Subeesh P” who carried out the project work under my supervision.

SIGNATURE                                                      SIGNATURE
Mr. G.Borgia Crusu Venthan, M.Tech                 Mrs. R.P.Shyni Vinse, M.Tech
HEAD OF THE DEPARTMENT                     SUPERVISOR
Associate Professor                                              Assistant Professor
Information Technology                                      Information Technology
Bethlahem Institute of Engineering                     Bethlahem Institute of Engineering Karungal.                                                              Karungal.                                         



Submitted for the B.Tech Degree viva voce held on ……………………



Signature of Internal Examiner                   Signature of External Examiner

ABSTRACT
.
.
.
.
.
.


TABLE OF CONTENTS

CHAPTER NO
TITLE
PAGE NO




ABSTRACT
iv

LIST OF FIGURES
viii

LIST OF ABBREVIATIONS
ix
1
INTRODUCTION
1

       1.1 The Cloud Computing Services
3

              1.1.1 Software as a Service
4

              1.1.2 Platform as a Service
4

              1.1.3 Infrastructure as a Service
5
2
SYSTEM SPECIFICATION
6

       2.1 Hardware Requirements
6

       2.2 Software Requirements
6
3
LANGUAGE SPECIFICATION   
7

       3.1  Hypertext Preprocessor
7

              3.1.1 Implementations
8

              3.1.2 Licensing
9

              3.1.3 Use
9

       3.2  MySQL
10

       3.3  XAMPP
11
4
LITERATURE REVIEW
12

       4.1  Authorized Private Keyword Search                      over Encrypted Personal Health                            Records in Cloud Computing
12

       4.2  Achieving Secure, Scalable, and Fine  
              grained Data  Access Control in Cloud
              Computing
12

       4.3  Personal Health Records to Improve
              Health Information Exchange and                          Patient Safety
14

       4.4  Patient Controlled Encryption: Ensuring
              Privacy of Electronic Medical Records
14

       4.5  Exploring the Feasibility of Fully
              Homomorphic Encryption
15
5
EXISTING SYSTEM
16

       5.1 Attribute Based Encryption
16

       5.2 Personal health record
18

       5.3 Accessing Data
       19
6
PROPOSED SYSTEM
21

       6.1 SAV Model
22

              6.1.1 Key Generation Module
22

              6.1.2 Transitional Encapsulation Module
23

              6.1.3 Alternate Decryption Module
23

       6.2 Additive Homomorphic Encryption
24

              6.2.1 Algorithm
24

       6.3 SAV Process
25

       6.4 Modules
27

              6.4.1 Home Page
28

              6.4.2 Admin Module
28

                     6.4.2.1 Admin Login
29

                     6.4.2.2 Change password
29

                     6.4.2.3 Register data owner
30

                     6.4.2.4 View data owners
30

                     6.4.2.5 Authenticate data owner
31

                     6.4.2.6 Register file domain
31

                     6.4.2.7 View data consumers
32

                     6.4.2.8 Logout
32

              6.4.3 Data Owner Module
33

                     6.4.3.1 Key generation
33

                     6.4.3.2 File upload
34

              6.4.4 Data Consumer Module
35

                     6.4.4.1 View Domain Files
36

                     6.4.4.2 Send Request
36

                     6.4.4.3 Inbox
37

                     6.4.4.4 Download Files
37

              6.4.5 Register Data Consumer Module
38
7
CONCLUSION
39

APPENDIX
40

REFERENCES
56


LIST OF FIGURES

FIGURE NO
FIGURE NAME
PAGE NO

1.1
Cloud Computing
2
1.2
Cloud Computing Services
3
6.1
Block diagram of SAV model
22
6.2
SAV model Logic
25
6.3
Home Page of SAV
28
6.4
Admin Login page
29
6.5
Admin Change Password
29
6.6
Register Data Owner
30
6.7
View data owners
30
6.8
Authenticate data owner
31
6.9
Registering and viewing file domains
31
6.10
View data consumers
32
6.11
Admin Logout
32
6.12
Key generation form
33
6.13
Generated Keys
34
6.14
File Upload
35
6.15
View Domain Files
36
6.16
View Domain Files
36
6.17
One Time Pin
37
6.18
File Download
37
6.19
Data consumer registration form
38







LIST OF ABBREVATIONS

SaaS
-
Software as a Service
PaaS
-
Platform as a Service
IaaS
-
Infrastructure as a Service
PHP
-
Hypertext Pre-processor
OTP
-
One Time Pin
PHR
-
Personal Health Records
ABE
-
Attribute Based Encryption
SAV
-
Secure Alternate Viable
AHE
-
Additive Homomorphic Encryption
ADM
-
Alternate Decryption Module
TEM
-
Transitional Encapsulation Module




UG REPORT FORMAT DOWNLOAD --> CLICK HERE

No comments:

Post a Comment