Cloud Merged

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 49

PROXY RE-ENCRYPTION METHOD FOR

SECURE DATA SHARING IN BLOCKCHAIN


USING INTERNET OF THINGS

PHASE I REPORT

Submitted
by

AMUTHA.C
(620822405003)

in partial fulfillment for the award of the

degree of

MASTER OF ENGINEERING

IN

COMPUTER SCIENCE AND


ENGINEERING

GNANAMANI COLLEGE OF
TECHNOLOGY NAMAKKAL–
637018

DECEMBER 2023
i
ANNA UNIVERSITY: CHENNAI 600025

DECEMBER 2023
ii
PROXY RE-ENCRYPTION METHOD FOR
SECURE DATA SHARING IN BLOCKCHAIN
USING INTERNET OF THINGS

PHASE I REPORT

Submitted
by

AMUTHA.C
(620822405003)

in partial fulfillment for the award of the

degree of

MASTER OF ENGINEERING

IN

COMPUTER SCIENCE AND


ENGINEERING

GNANAMANI COLLEGE OF
TECHNOLOGY NAMAKKAL–
637018

ANNA UNIVERSITY: CHENNAI 600025


DECEMBER 2023
ii
i
ANNAUNIVERSITY: CHENNAI 600025

BONAFIDE CETIFICATE

Certified that this project report “PROXY RE-ENCRYPTION METHOD FOR


SECURE DATA SHARING IN BLOCKCHAIN USING INTERNET OF THINGS” is
the bonafide work of AMUTHA.C (620822405003) who carried out the work under my
supervision.

SIGNATURE SIGNATURE

Dr.R.UMAMAHESWARI.,M.E.,Ph.D. Mr. R.KRISHNAKUMAR., M.E.


HEAD OF THE DEPARTMENT
Professor Asst.Professor
Computer Science and Computer Science and
Engineering Gnanamani College Engineering Gnanamani College
of Technology Namakkal- of Technology Namakkal–
637018 637018

Submitted to Project Phase-I Viva-Voce Examination held on

INTERNAL EXAMINER EXTERNAL EXAMINER

iii
GNANAMANI COLLEGE OF TECHNOLOGY,
NAMAKKAL -637 018

INSTITUT E
VISION
Emerging as a technical institution of high standard and excellence to produce quality Engineers,
Researchers, Administrators and Entrepreneurs with ethical and moral values to contribute the
sustainable development of the society.

MISSION

analytical and practical skills in cutting edge technologies by imparting quality technical education.
sonalities to transfer technology to industries and rural areas by creating interests among students in Research

DEPARTMENT
VISION
To evolve as a Centre of Excellence to produce the most competent software professionals, researchers, e

MISSION
Imparting quality education through latest technologies to prepare Students as software developer an
Inculcating the technological transformations for the sustainable development of society.

• Promotingexcellencetowards highereducation,research, employability and


Entrepreneurship.

iv
ABSTRACT (ENGLISH)

The evolution of the Internet of Things has seen data sharing as one of its most
useful applications in cloud computing. As eye-catching as this technology has been,
data security remains one of the obstacles it faces since the wrongful use of data leads
to several damages. In this article, we propose a proxy re-encryption approach to
secure data sharing in cloud environments. Data owners can outsource their encrypted
data to the cloud using identity-based encryption, while proxy re-encryption
construction will grant legitimate users access to the data. It uses proxy authorization
and verification to upload medical data over cloud-based M-CPS. the best method is
Advanced Encryption Standard method (AES). There are many types of AES that can
be used but the most effective is AES-128. So, the aim of this study is to design image
cryptographic application using the AES-128 method. Process of design applications
with this method is through several stages, such as process of encryption, decryption,
key generation and testing of the methods used. The attacks test is given by cropping,
blurring, and enhancing the ciphertext image. To reduce the storage problem in Cloud
we have split the image and file into different block and get stored, so storage problem
get rectified. The proposed scheme needs to reduce the computation cost on the end-
user as much as possible.

v
ABSTRACT (TAMIL)

இன்டர்நெட் ஆஃப் திங்ஸின் பரிணாமம் கிளவுட் கம்ப்யூட்டிங்கில் அதன் மிகவும்


பயனுள்ள பயன்பாடுகளில் ஒன்றாக தரவுப் பகிர்வைக் கண்டுள்ளது. இந்தத்
நதாழில்நுட்பம் கண்வணக் கைரும் ைவகயில், தரவு பாதுகாப்பு என்பது அது
எதிர்நகாள்ளும் தவடகளில் ஒன்றாக உள்ளது, ஏநெனில் தரவின் தைறாெ பயன்பாடு பல
சேதங்களுக்கு ைழிைகுக்கிறது. இந்தக் கட்டுவரயில், கிளவுட் சூழல்களில் பாதுகாப்பாெ
தரவுப் பகிர்வுக்கு ப்ராக்ஸி மறு-குறியாக்க அணுகுமுவறவய ொங்கள் முன்நமாழிகிசறாம். தரவு
உரிவமயாளர்கள் அவடயாள அடிப்பவடயிலாெ குறியாக்கத்வதப் பயன்படுத்தி சமகக்கணிக்கு
தங்கள் மவறகுறியாக்கப்பட்ட தரவை அவுட்சோர்ஸ் நேய்யலாம், அசத
ேமயம் ப்ராக்ஸி மறு-குறியாக்க கட்டுமாெம் முவறயாெ பயெர்களுக்கு தரவுக்காெ
அணுகவல ைழங்கும். கிளவுட்-அடிப்பவடயிலாெ M-CPS மூலம் மருத்துைத் தரவைப்
பதிசைற்ற இது ப்ராக்ஸி அங்கீகாரம் மற்றும் ேரிபார்ப்வபப் பயன்படுத்துகிறது. சிறந்த
முவற சமம்பட்ட குறியாக்க தரநிவல முவற (AES). பல ைவகயாெ AES
பயன்படுத்தப்படலாம் ஆொல் மிகவும் பயனுள்ளது AES-128 ஆகும். எெசை, இந்த
ஆய்வின் சொக்கம் AES-128 முவறவயப் பயன்படுத்தி பட கிரிப்சடாகிராஃபிக்
பயன்பாட்வட ைடிைவமப்பதாகும். இந்த முவறயுடன் ைடிைவமப்பு பயன்பாடுகளின்
நேயல்முவற குறியாக்கம், மவறகுறியாக்கம், முக்கிய உருைாக்கம் மற்றும்
பயன்படுத்தப முவறகளின் சோதவெ சபான்ற பல நிவலகளில் உள்ளது. வேஃபர்
்படும்
நடக்ஸ்ட் படத்வத நேதுக்குதல், மங்கலாக்குதல் மற்றும் சமம்படுத்துதல் மூலம் தாக்குதல்
சோதவெ ை ழங்கப்படுகிறது. கிளவுட்டில் சேமிப்பகச் சிக்கவலக் குவறக்க, படத்வதயும்
சகாப்வபயும் நைவ்சைறு நதாகுதிகளாகப் பிரித்துச் சேமித்து வைத்திருக்கிசறாம், எெசை
சேமிப்பகச் சிக்கல் ேரிநேய்யப்படும். முன்நமாழியப்பட்ட திட்டம் குவறக்கப்பட
சைண்டும். முடிந்தைவர இறுதி பயெரின் கணக்கீட்டு நேலவு.

vi
ACKNOWLEDGEMENT

At the outset, I express my heartfelt gratitude to PARENTS and GOD, who


has been my strength to bring this project to light.
At this pleasing moment of having successfully completed my project, I wish to
convey my sincere thanks and gratitude to our honorable Chairman
Dr.T.ARANGANNAL, beloved Chairperson Smt.P.MALALEENA, and Vice Chairman
Ms.MADHUVANTHINIE ARANGANNAL, GNYANAMANI EDUCATIONAL
INSTITUTIONS who have provided all the facilities to me.
I would like to express my sincere thanks to our Chief Administrative Officer
Dr.P.PREMKUMAR for their support to bring the best in myself.
I would like to convey my sincere thanks to our Principal
Dr.T.K.KANNAN, GNANAMANI COLLEGE OF TECHNOLOGY for
Forwarding me to do my project and offering adequate duration to complete my
project.
I would like to convey my sincere thanks to our Academic
Director Dr.B.SANJAY GANDHI, GNANAMANI COLLEGE TECHNOLOGY
for his encouragement during our project work successfully.
I expand sincere thanks to my Head of the Department of Computer Science and
Engineering, Dr.R.UMAMAHESWARI, GNANAMANI COLLEGE OF
TECHNOLOGY with deep sense of gratitude.

I extend earnest & sincere thanks to my Project Coordinator and my guide


Mr. R. KRISHNAKUMAR., M.E., Professor Department of Computer Science
and Engineering for her kind guidance and encouragement during this project.
I would also like to express my thanks to all staff members of my department,
friends who helped me directly and indirectly in all aspects of the project work to
get completed successfully.

AMUTHA.C
vii
TABLE OF CONTENTS

CHAPTER TITLE PAGE


NO NO
ABSTRACT v
LIST OF FIGURES x

1 INTRODUCTION 1
1.1 INTRODUCTION 1
2 LITERATURE SURVEY 2
3 SYSTEM STUDY 5
3.1 Existing System 5
3.1.1 Limitation Of Existing System 6
3.2 Proposed System 6
3.2.1 Advantages Of Proposed System 7
3.3 AES-based encryption algorithms 8
4 SYSTEM MODULES 9
4.1 Modules 9
4.1.1 Data Owner 9
4.1.2 Private Key Generator 10
4.1.3 Proxy Server 10
4.1.4 Trusted Auditor 10
4.1.5 Advanced Encryption Standard 11
4.1.6 Block Storage 12
4.2 System Specifications 12
4.2.1 Software Requirements 12
4.2.2 Hardware Requirements 12

vii
i
5 SYSTEM DESIGN AND DEVELOPMENT 13
5.1 Data Flow Diagram 13
5.2 UML Diagrams 15
5.3 Use Case Diagram 16
5.4 Class Diagram 17
5.5 Sequence Diagram 18
5.6 Activity Diagram 19
5.7 Input And Output Design 20
5.7.1 Input Design 20
5.7.2 Output Design 21
5.8 Software Environment 22
5.8.1 Java Technology 22
5.8.2 Software Model 25
5.8.3 Validation And Verification Model –V-Model 26
5.8.4 Cloud Computing 28
6 CONCLUSION 32
REFERENCE 33

ix
LIST OF FIGURES
FIGURE TITLE PAGE NO
NO
3.1 Proposed System 8
5.1 Data Flow Diagram 14
5.2 Use Case Diagram 16
5.3 Class Diagram 17
5.4 Sequence Diagram 18
5.5 Activity Diagram 19

x
CHAPTER 1

INTRODUCTION

1.1 INTRODUCTION

With the rapid development of communication technology and computing


power, people are facing increasing amounts of data. Maintaining this data requires
large amounts of storage space and powerful computing power, which has become
a challenge for DO. Fortunately, cloud computing technology has also evolved
rapidly in the past few years to provide flexible computing and storage resources
for DO. Therefore, more and more individuals/organizations tend to store their data
in cloud server (CS) to reduce the overhead of local computing and storage
resources.

However, once DO deletes the local copies of the files after uploading the
files to CS, he/she will not control the files. In this case, it's difficult for DO to
confirm the integrity of outsourced data by using traditional data integrity checking
schemes. In addition, due to the particularity of the cloud environment, CS is not
only subject to malicious attacks from external adversaries, but also suffers from
internal software errors or hardware failures. In these cases, DO's files are
vulnerable to tampering, corruption, and loss. Besides, CS is an semi-trusted entity
which may deliberately delete files that DO never or rarely accesses and conceals
data errors caused by unexpected events. In summary, although cloud computing
technology brings a lot of convenience, it also raises many security issues [3], [4].
Hence, many experts and scholars have made plenty of efforts to tackle these
security problems.

1
CHAPTER 2

LITERATURE

SURVEY

Industry 5.0 is regarded as the next industrial evolution[1], its objective is to


leverage the creativity of human experts in collaboration with efficient, intelligent
and accurate machines, in order to obtain resource-efficient and user-preferred
manufacturing solutions compared to Industry 4.0. Numerous promising
technologies and applications are expected to assist Industry 5.0 in order to
increase production and deliver customized products in a spontaneous manner. To
provide a very first discussion of Industry 5.0, in this paper, we aim to provide a
survey-based tutorial on potential applications and supporting technologies of
Industry 5.0. We first introduce several new concepts and definitions of Industry
5.0 from the perspective of different industry practitioners and researchers. We
then elaborately discuss the potential applications of Industry 5.0, such as
intelligent healthcare, cloud manufacturing, supply chain management and
manufacturing production. Subsequently, we discuss about some supporting
technologies for Industry 5.0, such as edge computing, digital twins,
collaborative robots, Internet of every things, blockchain, and 6G and beyond
networks. Finally, we highlight several research challenges and open issues that
should be further developed to realize Industry 5.0.

Internet of Things (IoT) and cyber-physical systems demand proper real-


time data processing and analysis to fulfill the essential characteristics of seamless
computing services such as less processing time, dynamic network management,
and location awareness[2]. With the evolution of mobile edge computing,

2
numerous security and privacy issues have been addressed including policy
management,

3
authentication, access control, and confidentiality. The technologies such as big-
data, Internet of Things, and cloud have improved the development of modern
healthcare systems to improve the quality of medical services. It is nowadays
integrating the computing methods and communication technologies such as
wireless sensor networks, radio frequency identification, smartphones, and location
awareness to collect and analyze the physiological data of the patient. The e-Health
entities such as medical device, client, and server rely on analytical models to carry
out early diagnosis and remote monitoring.
A Secure and Anonymous Biometric Based User Authentication Scheme
(SAB-UAS) is proposed to ensure secure communication in healthcare
applications[3]. This paper also proves that an adversary cannot impersonate as a
legitimate user to illegally access or revoke the smart handheld card. A formal
analysis based on the random-oracle model and resource analysis is provided to
show security and resource efficiencies in medical application systems. In addition,
the proposed scheme takes a part of the performance analysis to show that it has
high-security features to build smart healthcare application systems in the IoM. To
this end, experimental analysis has been conducted for the analysis of network
parameters using NS3 simulator.

In the current work, the infrastructure of the cyber-physical systems


(CPS) are reviewed and discussed[4]. This article enriched the researches of
the networked Medical Device (MD) systems to increase the efficiency and
safety of the healthcare. It also can assist the specialists of medical device to
overcome crucial issues related to medical devices, and the challenges facing
the design of the medical device’s network. The concept of the social
networking and its security along with the concept of the wireless sensor
networks (WSNs) are addressed.

4
Afterward, the CPS systems and platforms have been established, where
more focus was directed toward CPS-based healthcare. The big data
framework of CPSs is also included. Data collaboration in cloud computing is
more and more popular nowadays, and proxy deployment schemes are employed to
realize cross- cloud data collaboration[5]. However, data security and privacy are
the most serious issues that would raise great concerns from users when they adopt
cloud systems to handle data collaboration. Different cryptographic techniques are
deployed in different cloud service providers, which makes cross-cloud data
collaboration to be a deeper challenge.
In this paper, we propose an adaptive secure cross-cloud data collaboration
scheme with identity-based cryptography (IBC) and proxy re-encryption (PRE)
techniques. We first present a secure cross-cloud data collaboration framework,
which protects data confidentiality with IBC technique and transfers the
collaborated data in an encrypted form by deploying a proxy close to the clouds.
We then provide an adaptive conditional PRE protocol with the designed full
identity-based broadcast conditional PRE algorithm, which can achieve flexible
and conditional data re- encryption among ciphertexts encrypted in identity-based
encryption manner and ciphertexts encrypted in identity-based broadcast
encryption manner. The extensive analysis and experimental evaluations
demonstrate the well security and performance of our scheme, which meets the
secure data collaboration requirements in cross-cloud scenarios.

5
CHAPTER 3

SYSTEM STUDY

3.1 EXISTING SYSTEM

In data sharing, any information must be encrypted from the source and only
decrypted by authorized users in order to preserve its protection. Conventional
encryption techniques can be used, where the decryption key is shared among all
the data users designated by the data owner. The use of symmetric encryption
implies that the same key is shared between the data owner and users, or at least
the participants agree on a key. This solution is very inefficient. Furthermore, the
data owners do not know in advance who the intended data users are, and,
therefore, the encrypted data needs to be decrypted and subsequently encrypted
with a key known to both the data owner and the users. This decrypt-and-encrypt
solution means the data owner has to be online all the time, which is practically not
feasible.
The problem becomes increasingly complex when there are multiple pieces
of data and diverse data owners and users A proxy runs the re-encryption algorithm
with the key and revamps the ciphertext before sending the new ciphertext to the
user. An intrinsic trait of a PRE scheme is that the proxy is not fully trusted (it has
no idea of the data owner’s secret key). This is seen as a prime candidate for
delegating access to encrypted data in a secured manner, which is a crucial
component in any data-sharing scenario. In addition, PRE allows for encrypted
data in the cloud to be shared to authorized users while maintaining its
confidentiality from illegitimate parties.

6
3.1.1 LIMITATION OF EXISTING SYSTEM

 The problem becomes increasingly complex when there are multiple pieces
of data and diverse data owners and users.
 Existing schemes adopt the conventional ciphertext policy proxy re
encryption to encrypt which inevitably expose the access policy to the cloud.
 The data attributes while preserving the statistical data of the role attributes
is a challenging problem.
 Attract can they have chance to attack the file form cloud
 The existing techniques have limitations and are not applicable to the
healthcare industry’s medical imaging problem.
 Image overloaded problem because all images are stored in same location

3.2 PROPOSED SYSTEM

We measure the privacy disclosure of our scheme by the attacker’s


confidence in the success of an attack. Our proposed scheme, and show that the
security and privacy goals have been achieved. Provided a proxy re-encryption
functionality for cloud-data storage services. Unfortunately, this storage feature
consumes more computation cost, and thus cannot be applied in the use of M-CPS.
However, it consumes more computation costs for cloud-based M-CPS. the
protection of the decryption key and reduces the burden on data owners. t the
algorithm proposed by Ahn et al. can simultaneously ensure both efficiency and
accuracy. Based on this algorithm, we present an efficient scheme. our proposed
scheme obviously meets the security requirements. It protects the secrecy and
privacy of data as well as the user’s input query while simultaneously hiding data
access patterns. the best method is Advanced Encryption Standard method (AES).

7
There are many types of AES that can be used but the most effective is AES-
128. So, the aim of this study is to design image cryptographic application using
the AES-128 method. it was found that this method is resistant to cropping attacks,
but not resistant to blurring and enhancement attacks. Improve the efficiency if
image storage function.

3.2.1 ADVANTAGES OF PROPOSED SYSTEM

 Our proposed scheme, and show that the security and privacy goals have
been achieved. We first prove that the three-layer encryption scheme is
secure.
 We provide rigorous security analyses and conduct extensive experiments to
confirm the efficacy and efficiency of our proposed scheme blowfish
enryption.
 Uses attributes of the users to provide access to data. Time enabled method
specifies time for every attribute of a user which is termed as access time of
the attribute.
 Using this algorithm, many data points are eliminated in constant time rather
than linear time. When the elements are high-dimensional data, the
computational cost reduction will be significant.
 Advanced Encryption Standard (AES) is a cryptographic algorithm that can
be used rightly to secure data.
 AES (Advanced Encryption Standard) is the development of the standard
DES (Data Encryption Standard) encryption algorithm of which validity
period deemed to be over due to security.

8
Fig 3.1 Proposed system

3.3 AES-based encryption algorithms

In this method, multi-step bitwise permutation operations are performed with


a round of propagation to obtain better cryptographic results. The main purpose of
the method introduced in is to design a dynamic S-box to achieve nonlinear
properties and low automatic correlation. In this study, they introduced a dynamic
sub-key-dependent S-box to overcome the stagnant S-box weaknesses. In the
image encryption by AES, which is a block encryption approach, since the adjacent
pixels have high correlation, a shadow of the original image is left in the encrypted
image after the encryption. To overcome this problem, in a key stream generator
has been introduced in [12]. There are two kinds of the stream generators including
the A5/1 and W7 key stream generators. These generators are made of some
register shifts and a series of functions, and W7 shows a better encryption
performance rather than A5/1.The chaotic AES encryption algorithm is explained
in , in which a chaotic S- box is used which is highly random and sensitive to the
initial conditions. Sensitivity to the initial conditions enables the algorithm to use
the initial conditions as another key to provide more security and confidentiality.

9
CHAPTER 4
SYSTEM MODULES

4.1 MODULES

 Data Owner

 Private Key Generator

 Proxy Server

 Trusy Authorizer

 AES

 Block storage

4.1.1 Data Owner

It usually sends a massive amount of medical data to store and collect in


cloud- based M-CPS that may later outsource by the proxy authorizer. the proxy
processed the medical data to outsource it to cloud M-CPS, i.e., in place of data
owner. Moreover, a trusted auditor was employed to perform integrity verification
of the data owner not including the entire medical file. The proposed to
demonstrate that it can guarantee security properties such as unforgeability and
privacy preservation. , the integral system may not control delegable outsourcing to
verify whether the proxy has its own trustworthiness to fulfill the patients’
requirements to gain data access. On the other hand, the data owner may no longer
have physical control over the outsourcing of medical data. As an instance, to
achieve a better reputation, the cloud server may conceal the occurrence of data
corruption.

10
4.1.2 Private Key Generator

It generates a public–private key pair between the data owner and proxy
authorizer to offer a reliable connection and key distribution. Data owner IDDO is
capable to generate the signature warrant sw that designates the signature as a
delegate to the proxy PID. Finally, PID generates the signed private-key Spk based
on sw. Considering a medical file MF with an index tag IT , public parameters,
signed private-key Spk, and symmetric-key τ , PID generates the output
parameters, such as signature set κ and encrypted medical file MF . Finally, PID
uploads the system parameters {MF , κ, IT }, and signature warrant sw to cloud
M-CPS.

4.1.3 Proxy server

It may gain the authorized access to process and upload the medical data in
cloud-based M-CPS that maintains better authorization and data management.
Upon verification, the proxy authorizer deletes the accessed data from the local
storage. In practice, this system is lacking the outsource controller to validate
whether the medical authority is honest or not to process the data uploading.
Alongside the common drawbacks of CPS are timing and concurrency control. In
other words, cloud-based data storage provides basic medical diagnoses to
highlight the integrity of clinical data; however, slight modification may lead to
severe medical threats such as death. Therefore, users including patients and
doctors should authorize a medical authority to process and upload the medical
data to cloud-data storage.

4.1.4 Trusted Auditor

It can validate the integrity of medical data stored in cloud server upon the
request of the data ownerAt first, a trusted auditor validates the authorization
11
access that considers the challenge message to audit the information to return the
response

12
as true. Otherwise, it returns the message as false. trusted auditors and medical
cloud-server have a powerful computation capability to reduce the device
workload. Hence, it does not incur any excessive computation in the process of a
cloud storage system referring to the computation and communication cost of the
computing devices. Since the proposed ID-PAOPA is based on pairing-free, it can
easily reduce the computing resource. The third quality metric is batch auditing
which can concurrently process the cost presents the efficiency rate of batch
auditing over the number of audit tasks multiple auditing tasks of the trusted
auditors. It can analyze the batch auditing to verify the process of different
computing tasks. Moreover, it can greatly save the consumption time of auditing
tasks to improve system efficiency The comparison of timing

4.1.5 Advanced Encryption Standard (AES)


Advanced Encryption Standard (AES) is a cryptographic algorithm that can
be used rightly to secure data. This AES algorithm works on data blocks in the
form of 4 x 4 matrix. Symmetrical ciphertext blocks can encrypt (encipher) and
decrypt (decipher) information. AES algorithm uses clicking the cryptographic
keys 128, 192, and 256 bits to encrypt and decrypt the data. Therefore, this
algorithm is known as AES-128, AES-192, and AES-256. This algorithm also has
another name that is Rijndael algorithm. It is because this algorithm was made by
Rijndael, which is combined from Vincent Rijmen dan John Daemen. AES
(Advanced Encryption Standard) is the development of the standard DES (Data
Encryption Standard) encryption algorithm of which validity period deemed to be
over due to security. the process stages of this algorithm, there are 3 main
processes, namely encryption, decryption, and key expansion.

13
4.1.6 Block storage
` Block storage chops data into blocks get it and stores them as separate pieces.
Each block of data is given a unique identifier, which allows a storage system to
place the smaller pieces of data wherever is most convenient. Block storage is
often configured to decouple the data from the user’s environment and spread it
across multiple environments that can better serve the data. And then, when data is
requested, the underlying storage software reassembles the blocks of data from
these environments and presents them back to the user.

4.2 SYSTEM SPECIFICATIONS

4.2.1 SOFTWARE REQUIREMENTS:


Operating system : Windows XP/7.
Coding Language : Java .
Front end : Html/css
Back end : J2se,J2ee.
Database : Mysql.
Tools : NetBeans IDE 7.2.1

4.2.2 HARDWARE REQUIREMENTS:


System : Pentoium IV 2.4 GHz.
Hard disk : 40 GB.
Floopy driver : 1.44 Mb.
Monitor : 15 VGA colour.
Mouse : DELL.
Ram : 512 Mb.

14
CHAPTER 5
SYSTEM DESIGN AND DEVELOPMENT

5.1 Data Flow Diagram

1. The DFD is also called as bubble chart. It is a simple graphical formalism


that can be used to represent a system in terms of input data to the system,
various processing carried out on this data, and the output data is generated
by this system.
2. The data flow diagram (DFD) is one of the most important modeling tools. It
is used to model the system components. These components are the system
process, the data used by the process, an external entity that interacts with
the system and the information flows in the system.
3. DFD shows how the information moves through the system and how it is
modified by a series of transformations. It is a graphical technique that
depicts information flow and the transformations that are applied as data
moves from input to output.
4. DFD is also known as bubble chart. A DFD may be used to represent a
system at any level of abstraction. DFD may be partitioned into levels that
represent increasing information flow and functional detail

15
Data Owner Register Log File upload
in

Image and
text file

Proxy authority login owner and user


Private key gen
Cloud Login
Log View files
Stored files Key generate
Encrypt
in and
Proxy encrypt owner

User Sear Key verification


ch
Activation

Request file View file

Fig 5.1 Data flow diagram

File view

16
5.2 UML Diagrams
UML stands for Unified Modeling Language. UML is a standardized
general- purpose modeling language in the field of object-oriented software
engineering. The standard is managed, and was created by, the Object Management
Group. The goal is for UML to become a common language for creating models of
object oriented computer software. In its current form UML is comprised of two
major components: a Meta-model and a notation. In the future, some form of
method or process may also be added to; or associated with, UML.

The Unified Modeling Language is a standard language for specifying,


Visualization, Constructing and documenting the artifacts of software system, as
well as for business modeling and other non-software systems.

The UML represents a collection of best engineering practices that have


proven successful in the modeling of large and complex systems.

The UML is a very important part of developing objects oriented software


and the software development process. The UML uses mostly graphical notations
to express the design of software projects.

GOALS:

The Primary goals in the design of the UML are as follows:


1. Provide users a ready-to-use, expressive visual modeling Language so that
they can develop and exchange meaningful models.
2. Provide extendibility and specialization mechanisms to extend the core
concepts.
3. Be independent of particular programming languages and development
process.
4. Provide a formal basis for understanding the modeling language.
17
5. Encourage the growth of OO tools market.
6. Support higher level development concepts such as collaborations,
frameworks, patterns and components.
7. Integrate best practices.

5.3 Use Case Diagram


A use case diagram in the Unified Modeling Language (UML) is a type of
behavioral diagram defined by and created from a Use-case analysis. Its purpose is
to present a graphical overview of the functionality provided by a system in terms
of actors, their goals (represented as use cases), and any dependencies between
those use cases. The main purpose of a use case diagram is to show what system
functions are performed for which actor. Roles of the actors in the system can be
depic

18
Fig 5.2 Use case Diagram

19
5.4 Class Diagram
In software engineering, a class diagram in the Unified Modeling Language
(UML) is a type of static structure diagram that describes the structure of a system
by showing the system's classes, their attributes, operations (or methods), and the
relationships among the classes. It explains which class contains information.

User
Owner Registraion
Registraion
Login Login Approval () Search ()
Patient details () View users()
Upload ()
File and images()
Key check down ()
Encrypt ()

Authority Key generate


Registraion Login
Login User detail
Owner approval Owner details()
User approval() File details()
Block users() Key geneation()
User()

Fig 5.3 Class diagram

20
5.5 Sequence Diagram
A sequence diagram in Unified Modeling Language (UML) is a kind of
interaction diagram that shows how processes operate with one another and in
what order. It is a construct of a Message Sequence Chart. Sequence diagrams are
sometimes called event diagrams, event scenarios, and timing diagrams

Owner Owner Author key Data basee

Login

Key send

File Upload

File enrypt

File Request

File search

Request & resp

Decrypt

View files

Fig 5.4 Sequence diagram

21
5.6 Activity Diagram
Activity diagrams are graphical representations of workflows of stepwise
activities and actions with support for choice, iteration and concurrency. In the
Unified Modeling Language, activity diagrams can be used to describe the
business and operational step-by-step workflows of components in a system. An
activity diagram shows the overall flow of control.

Start Logout

Login No

Yes

User Owner authority key

Key verfication Key verfication View file


Owner
Fig 5.5 Activity Diagram
User details Key generate
File request File Upload

Approval Block user


Download Public key

End

22
5.7 INPUT AND OUTPUT DESIGN
5.7.1 INPUT DESIGN
The input design is the link between the information system and the user. It
comprises the developing specification and procedures for data preparation and
those steps are necessary to put transaction data in to a usable form for processing
can be achieved by inspecting the computer to read data from a written or printed
document or it can occur by having people keying the data directly into the system.
The design of input focuses on controlling the amount of input required,
controlling the errors, avoiding delay, avoiding extra steps and keeping the process
simple. The input is designed in such a way so that it provides security and ease of
use with retaining the privacy.

Input Design considered the following things:


 What data should be given as input?
 How the data should be arranged or coded?
 The dialog to guide the operating personnel in providing input.
 Methods for preparing input validations and steps to follow when error
occur.

OBJECTIVES
1. Input Design is the process of converting a user-oriented description of the input
into a computer-based system. This design is important to avoid errors in the data
input process and show the correct direction to the management for getting correct
information from the computerized system.
2. It is achieved by creating user-friendly screens for the data entry to handle large
volume of data. The goal of designing input is to make data entry easier and to be
free from errors. The data entry screen is designed in such a way that all the data
23
manipulates can be performed. It also provides record viewing facilities.
3. When the data is entered it will check for its validity.
Data can be entered with the help of screens. Appropriate messages are
provided as when needed so that the user will not be in maize of instant. Thus the
objective of input design is to create an input layout that is easy to follow

5.7.2 OUTPUT DESIGN


A quality output is one, which meets the requirements of the end user and
presents the information clearly. In any system results of processing are
communicated to the users and to other system through outputs.
In output design it is determined how the information is to be displaced for
immediate need and also the hard copy output. It is the most important and direct
source information to the user. Efficient and intelligent output design improves the
system’s relationship to help user decision-making.
1. Designing computer output should proceed in an organized, well thought out
manner; the right output must be developed while ensuring that each output
element is designed so that people will find the system can use easily and
effectively. When analysis design computer output, they should Identify the
specific output that is needed to meet the requirements.
2. Select methods for presenting information.
3. Create document, report, or other formats that contain information produced by
the system.
The output form of an information system should accomplish one or more of the
following objectives.
 Convey information about past activities, current status or projections of the
Future.
 Signal important events, opportunities, problems, or warnings.

24
 Trigger an action.
 Confirm an action.

5.8 SOFTWARE ENVIRONMENT


5.8.1 Java Technology
Java technology is both a programming language and a platform.

The Java Programming Language


The Java programming language is a high-level language that can be
characterized by all of the following buzzwords:

 Simple
 Architecture neutral
 Object oriented
 Portable
 Distributed
 High performance
 Interpreted
 Multithreaded
 Robust
 Dynamic
 Secure

With most programming languages, you either compile or interpret a


program so that you can run it on your computer. The Java programming language
is unusual in that a program is both compiled and interpreted. With the
compiler, first you
25
translate a program into an intermediate language called Java byte codes —the
platform-independent codes interpreted by the interpreter on the Java platform. The
interpreter parses and runs each Java byte code instruction on the computer.
Compilation happens just once; interpretation occurs each time the program is
executed. The following figure illustrates how this works.

You can think of Java byte codes as the machine code instructions for the
Java Virtual Machine (Java VM). Every Java interpreter, whether it’s a
development tool or a Web browser that can run applets, is an implementation of
the Java VM. Java byte codes help make “write once, run anywhere” possible. You
can compile your program into byte codes on any platform that has a Java
compiler. The byte codes can then be run on any implementation of the Java VM.
That means that as long as a computer has a Java VM, the same program written in
the Java programming language can run on Windows 2000, a Solaris workstation,
or on an iMac.

26
The Java Platform
A platform is the hardware or software environment in which a program
runs. We’ve already mentioned some of the most popular platforms like Windows
2000, Linux, Solaris, and MacOS. Most platforms can be described as a
combination of the operating system and hardware.
The Java platform differs from most other platforms in that it’s a software-
only platform that runs on top of other hardware-based platforms.
The Java platform has two components:
 The Java Virtual Machine (Java VM)
 The Java Application Programming Interface (Java API)
You’ve already been introduced to the Java VM. It’s the base for the Java
platform and is ported onto various hardware-based platforms.
The Java API is a large collection of ready-made software components that
provide many useful capabilities, such as graphical user interface (GUI) widgets.
The Java API is grouped into libraries of related classes and interfaces; these
libraries are known as packages. The next section, What Can Java Technology Do?
Highlights what functionality some of the packages in the Java API provide.
The following figure depicts a program that’s running on the Java platform.
As the figure shows, the Java API and the virtual machine insulate the program
from the hardware.

Native code is code that after you compile it, the compiled code runs on a
specific hardware platform. As a platform-independent environment, the Java
platform can be a bit slower than native code.
27
However, smart compilers, well-tuned interpreters, and just-in-time byte
code compilers can bring performance close to that of native code without
threatening portability.

5.8.2 Software Model


Waterfall Mode:
The Waterfall Model is a linear sequential flow. In which progress is seen as
flowing steadily downwards (like a waterfall) through the phases of software
implementation. This means that any phase in the development process begins only
if the previous phase is complete. The waterfall approach does not define the
process to go back to the previous phase to handle changes in requirement.
In this article, we will discuss the advantages and disadvantages of the waterfall,
should we avoid it? when to use it? and the waterfall model pitfall, and why I see it
as the father of the SDLC models.

Waterfall Model Phases


Waterfall Model contains the main phases similarly to other process models,
you can read this article for more information about phases definitions.

Use of Waterfall Model


Due to the nature of the waterfall model, it is hard to get back to the
previous phase once completed. Although, this is can be very rigid in some
software projects which need some flexibility, while, this model can be essential or
the most suitable model for other software projects’ contexts.
The usage of the waterfall model can fall under the projects which do not focus on
changing the requirements, for example:

28
1. Projects initiated from a request for proposal (RFP), the customer has a very
clear documented requirements

2. Mission Critical projects, for example, in a Space shuttle

3. Embedded systems.

We can notice some similarities of these types of projects that they cannot be
delivered in iterative, incremental, or agile manner, for example, in embedded
systems for the elevator, you cannot deliver an elevator who can go up only
without going down, or handling only users requests from inside and ignore
outside calls for the elevator.

5.8.3 Validation and Verification Model –V-Model

V-Model is mostly known as the validation and verification software


development process model (The Vee Model), and It is one of the most
know software development methodology. Although it is considered as an
improvement to the waterfall model and it has some similarities as the process also
based on sequential steps moving down in a linear way, it differs from the waterfall
model as the steps move upwards after the coding phase to form the typical V
shape. This V shape demonstrates the relationships between each phase of the
development life cycle and its associated phase of testing.
This means that any phase in the development process begins only if the
previous phase is complete and has a correspondence related testing phase which is
performed against this phase completion. Similar to the Waterfall model, the V-
Model does not define the process to go back to the previous phase to handle
changes in requirement.

29
The technical aspect of the project cycle is considered as a V shape starting
with the business needs on the upper left and ending with the user acceptance
testing on the upper right.

V-Model Model Phases


The V-Model Model contains the main phases similarly to other process
models, you can read this article for more information about SDLC phases
definitions. Moreover, it breaks down the testing phase into detailed steps to ensure
the validation and verification process. So, it contains the below testing phases:
Unit Testing
The Unit testing is the testing at the code level and helps eliminate issues at
an early stage, mainly the developer is responsible to perform the unit test for his
code while not all the defects cannot be discovered at the unit testing.
Functional Testing
Functional testing is associated with the low-level design phase which
ensures that collections of codes and units are working together probably to
execute new function or service.
Integration Testing
Integration testing is associated with the high-level design phase. Integration
testing ensures the integration between all system modules after adding any new
functions or updates.

System Testing
System testing is associated with the system requirements and design phase.
It combines the software, hardware, and the integration of this system with the
other external systems.

30
User Acceptance Testing
User Acceptance testing is associated with the business and operations
analysis phase. The customer users are the main performers of this testing based on
test cases and scenarios that cover the business requirements to ensure that they
have delivered the right software as per the specifications.

5.8.4 CLOUD COMPUTING :

Cloud computing means that instead of all the computer hardware and
software you're using sitting on your desktop, or somewhere inside your company's
network, it's provided for you as a service by another company and accessed over
the Internet, usually in a completely seamless way. Exactly where the hardware
and software is located and how it all works doesn't matter to you, the user—it's
just somewhere up in the nebulous "cloud" that the Internet represents.

DATA SECURITY
Data security has consistently been a major issue in information technology.
In the cloud computing environment, it becomes particularly serious because the
data is located in different places even in all the globe. Data security and privacy
protection are the two main factors of user's concerns about the cloud technology.
Though many techniques on the topics in cloud computing have been investigated
in both academics and industries, data security and privacy protection are
becoming more important for the future development of cloud computing
technology in government, industry, and business. Data security and privacy
protection issues are relevant to both hardware and software in the cloud
architecture.
Cloud computing has been envisioned as the next generation paradigm in

31
computation. In the cloud computing environment, both applications and resources

32
are delivered on demand over the Internet as services. Cloud is an environment of
the hardware and software resources in the data centers that provide diverse
services over the network or the Internet to satisfy user's requirements
Cloud computing can be considered as a new computing archetype that can
provide services on demand at a minimal cost. The three well-known and
commonly used service models in the cloud paradigm are software as a service
(SaaS), platform as a service (PaaS), and infrastructure as a service (IaaS). In SaaS,
software with the related data is deployed by a cloud service provider, and users
can use it through the web browsers. In PaaS, a service provider facilitates services
to the users with a set of software programs that can solve the specific tasks. In
IaaS, the cloud service provider facilitates services to the users with virtual
machines and storage to improve their business capabilities.

CLOUD SERVICES
Cloud computing will enable services to be consumed easily on demand.
Cloud computing has the characteristics such as on-demand self-service,
ubiquitous network access, location independent resource pooling, rapid resource
elasticity, usage-based pricing, and transference of risk. These merits of cloud
computing have attracted substantial interests from both the industrial world and
the academic research world. Cloud computing technology is currently changing
the way to do business in the world.Data security has consistently been a major
issue in IT.
Data security becomes particularly serious in the cloud computing
environment, because data are scattered in different machines and storage devices
including servers, PCs, and various mobile devices such as wireless sensor
networks and smart phones. Data security in the cloud computing is more
complicated than data security in the traditional information systems.
33
To make the cloud computing be adopted by users and enterprise, the
security concerns of users should be rectified first to make cloud environment
trustworthy. The trustworthy environment is the basic prerequisite to win
confidence of users to adopt such a technology. Latif et al. discussed the
assessment of cloud computing risks

Data Confidentiality

Data confidentiality is important for users to store their private or


confidential data in the cloud. Authentication and access control strategies are used
to ensure data confidentiality. The data confidentiality, authentication, and access
control issues in cloud computing could be addressed by increasing the cloud
reliability and trustworthiness .

Because the users do not trust the cloud providers and cloud storage service
providers are virtually impossible to eliminate potential insider threat, it is very
dangerous for users to store their sensitive data in cloud storage directly. Simple
encryption is faced with the key management problem and cannot support complex
requirements such as query, parallel modification, and fine-grained authorization.

Hybrid Technique

A hybrid technique is proposed for data confidentiality and integrity , which


uses both key sharing and authentication techniques. The connectivity between the
user and the cloud service provider can be made more secure by utilizing powerful
key sharing and authentication processes. RSA public key algorithm can be used
for secure distribution of the keys between the user and cloud service providers.

34
Data Availability

Data availability means the following: when accidents such as hard disk
damage, IDC fire, and network failures occur, the extent that user's data can be
used or recovered and how the users verify their data by techniques rather than
depending on the credit guarantee by the cloud service provider alone.

Data Privacy

Privacy is the ability of an individual or group to seclude themselves or


information about themselves and thereby reveal them selectively. Privacy has the
following elements.

(i) When: a subject may be more concerned about the current or future
information being revealed than information from the past.
(ii) How: a user may be comfortable if his/her friends can manually request
his/her information, but the user may not like alerts to be sent
automatically and frequently.
(iii) Extent: a user may rather have his/her information reported as an
ambiguous region rather than a precise point.

35
CHAPTER 6
CONCLUSION

In this project propose to define a specialized access policy for each data
attribute in the Company, generate a secret share for every distinct role attribute,
and reconstruct the secret to encrypt each data attribute. To preserve the access
pattern of the data attributes in the, we construct a blind data retrieving protocol
based on the Paillier encryption. provides the encryption module for the re-
encryption and also time privileges for accessing particular file. we present a
blockchain-based system model that allows for flexible authorization on encrypted
data.When the pixel value of the encrypted image is changed, the decryption
process have been successful, but it cannot restore the plaintext imagewe presented
a secure and efficient scheme to locate the exact nearest neighbor over encrypted
medical images stored.To over come storage problem we split storage space into
different way we have created multiple folders. The Advanced Encryption
Standard (AES) algorithm was successfully applied to encrypt an image. In the
decryption process, this method can restore plaintext as clear as before. Attack test
is given on the ciphertext by cropping, blurring, and enhancing. It is found that this
method can recognize plaintext clearly for cropping attacks. The performance of
our scheme is evaluated using real-world medical images.

36
REFERENCES
[1] P. K. R. Maddikunta et al., “Industry 5.0: A survey on enabling technologies
and potential applications,” J. Ind. Inf. Integr., 2021, Art. no. 100257, doi:
10.1016/j.jii.2021.100257.
[2] R. Vinuesa et al., “The role of artificial intelligence in achieving the sustainable
development goals,” Nature Commun., vol. 11, no. 1, pp. 1–10, 2020.
[3] S. Š. Žižek, Z. Nedelko, M. Mulej, and Ž. V. Ciˇ ˇ c, “Key performance
indicators and industry 4.0 – A socially responsible perspective,” Naše
Gospodarstvo/Our Economy, vol. 66, no. 3, pp. 22–35, 2020.
[4] D. B. Deebak and F. Al-Turjman, “Lightweight privacy-aware secure
authentication scheme for cyber-physical systems in the edge intelligence era,” in
Concurrency Comput., Pract. Experience, 2021, Art. no. e6510, doi:
10.1002/cpe.6510.
[5] B. D. Deebak, F. Al-Turjman, M. Aloqaily, and O. Alfandi, “An
authenticbased privacy preservation protocol for smart e-healthcare systems in
IoT,” IEEE Access, vol. 7, pp. 135632–135649, 2019.
[6] N. Dey, A. S. Ashour, F. Shi, S. J. Fong, and J. M. R. Tavares, “Medical cyber-
physical systems: A survey,” J. Med. Syst., vol. 42, no. 4, pp. 1–13, 2018.
[7] S. Chen, M. Ma, and Z. Luo, “An authentication scheme with identitybased
cryptography for M2M security in cyber-physical systems,” Secur. Commun.
Netw., vol. 9, no. 10, pp. 1146–1157, 2016.
[8] Q. Huang, Y. He, W. Yue, and Y. Yang, “Adaptive secure crosscloud data
collaboration with identity-based cryptography and conditional proxy re-
encryption,” Secur. Commun. Netw., vol. 2018, 2018, Art. no. 8932325.
[9] C. Wang, S. S. Chow, Q. Wang, K. Ren, and W. Lou, “Privacy-preserving
public auditing for secure cloud storage,” IEEE Trans. Comput., vol. 62, no. 2, pp.
362– 375, Feb. 2013.
37
[10] Z. Xu, D. He, H.Wang, P. Vijayakumar, and K. K. R. Choo, “A novel
proxyoriented public auditing scheme for cloud-based medical cyber physical
systems,” J. Inf. Secur. Appl., vol. 51, 2020, Art. no. 102453.
[11] Y. Zhang, C. Xu, H. Li, K. Yang, J. Zhou, and X. Lin, “HealthDep: An
efficient and secure deduplication scheme for cloud-assisted eHealth systems,”
IEEE Trans. Ind. Informat., vol. 14, no. 9, pp. 4101–4112, Sep. 2018. [12] Z. Xu,
L. Wu, M. K. Khan, K.-K. R. Choo, and D. He, “A secure and efficient public
auditing scheme using rsa algorithm for cloud storage,” J. Supercomput., vol. 73,
no. 12, pp. 5285– 309, 2017.
[13] X. Zhang, J. Zhao, C. Xu, H. Wang, and Y. Zhang, “DOPIV: Postquantum
secure Identity-based data outsourcing with public integrity verification in cloud
storage,” IEEE Trans. Serv. Comput., to be published, doi:
10.1109/TSC.2019.2942297.
[14] P. Shabisha, A. Braeken, A. Touhafi, and K. Steenhaut, “Elliptic curve Qu-
VanStone based signcryption schemes with proxy re-encryption for secure cloud
data storage,” in Proc. Int. Conf. Cloud Comput. Technol. Appl., 2017, pp. 1–18.
[15] Q. Chen, Z. Huang, Y. Ding, Y. Zhou, and H. Huang, “A new provably secure
identity-based multi-proxy signature scheme,” in Proc. Int. Symp. Cybersp. Saf.
Secur., 2019, pp. 230–242

38

You might also like