Project Title in Bold

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 19

A

Major Project (Times New Roman 14)


on

PROJECT TITLE IN BOLD (Times New Roman 16- BOLD CAPITAL)


(Submitted in partial fulfilment of the requirements for the award of Degree)

Bachelor of Technology
in

COMPUTER SCIENCE & ENGINEERING (DATA SCIENCE)


(Times New Roman 14- BOLD CAPITAL)

By
XXXXXXXXX (207R1A6xxx)
XXXXXXXXX (207R1A6xxx)
XXXXXXXXX (207R1A6xxx)

Under the guidance of

GUIDE NAME IN BOLD


(Times New Roman 14- BOLD CAPITAL)

Guide Designation

Department of Computer Science & Engineering (Data Science)


CMR TECHNICAL CAMPUS
UGC AUTONOMOUS
Accredited by NBA & NAAC with 'A' Grade
Approved by AICTE, New Delhi and JNTU, Hyderabad.

2020-2024

i
Department of Computer Science & Engineering
(Data Science)

CERTIFICATE

This is to certify that the project entitled “Title of the project” being
submitted by XXXXXXXXX (207R1A6xxx), XXXXXXXXX (207R1A6xxx),
XXXXXXXXX (207R1A6xxx) in partial fulfillment of the requirements for the
award of the degree of B.Tech in Computer Science and Engineering (Data Science)
to the Jawaharlal Nehru Technological University Hyderabad, is a record of bonafide
work carried out by them under our guidance and supervision during the year 2023-
24.

The results embodied in this thesis have not been submitted to any other
University or Institute for the award of any degree or diploma.

Guide Name Dr. K. Srinivas


Designation Professor & HoD
Internal Guide

External Examiner

ii
Submitted for viva voice Examination held on: ________________
ACKNOWLEDGMENT
Apart from the efforts of us, the success of any project depends largely on the
encouragement and guidelines of many others. We take this opportunity to express our
gratitude to the people who have been instrumental in the successful completion of
this project.
We take this opportunity to express my profound gratitude and deep regard to
my guide “Guide Name in Bold”, Designation for “his/her” exemplary guidance,
monitoring and constant encouragement throughout the project work. The blessing,
help and guidance given by him shall carry us a long way in the journey of life on
which we are about to embark.
We also take this opportunity to express a deep sense of gratitude to the
Project Review Committee (PRC) Dr A. Mahendar, Dr K. Murali, Dr. B. Shankar
Nayak, Dr. M. Kishore Kumar for their cordial support, valuable information and
guidance, which helped us in completing this task through various stages.
We are also thankful to Dr. K. Srinivas, Head, Department of Computer
Science and Engineering (DATA SCIENCE) for providing encouragement and
support for completing this project successfully.
We are obliged to Dr. A. Raji Reddy, Director for being cooperative
throughout the course of this project. We also express our sincere gratitude to Sri. Ch.
Gopal Reddy, Chairman for providing excellent infrastructure and a nice atmosphere
throughout the course of this project.
The guidance and support received from all the members of CMR Technical
Campus who contributed to the completion of the project. We are grateful for their
constant support and help.
Finally, we would like to take this opportunity to thank our family for their
constant encouragement, without which this assignment would not be completed. We
sincerely acknowledge and thank all those who gave support directly and indirectly in
the completion of this project.

XXXXXXXXX (207R1A6xxx)
XXXXXXXXX (207R1A6xxx)
XXXXXXXXX (207R1A6xxx)

iii
ABSTRACT

Write abstract in single page, one of the most difficult aspects of cloud computing
is ensuring the safety of virtual machines.

MINIMUM 300 W0RDS

iv
TABLE OF CONTENTS
Certificates ii
Acknowledgement iv
Abstract vi
Table of Contents x
List of Tables xii
List of Figures xiii
List of Screenshots
List of Abbreviations xiv
CHAPTER – 1 INTRODUCTION 1

1.1 INTRODUCTION 1

1.2 PROJECT SCOPE 3

1.3 PROJECT PURPOSE 12

1.4 PROJECT FEATURES 13

1.5 14

1.6 14

CHAPTER – 2 SYSTEM ANALYSIS 16

2.1 PROBLEM DEFINITION 16

2.2 EXISTING SYSTEM 19

2.2.1 LIMITATIONS OF THE EXISTING SYSTEM

2.3 PROPOSED SYSTEM 22

2.3.1 ADVANTAGES OF PROPOSED SYSTEM

2.4 FEASIBILITY STUDY 28

2.4.1 ECONOMICAL FEASIBILITY

2.4.2 TECHNICAL FEASIBILITY

2.4.3 SOCIAL FEASIBILITY

2.5 HARDWARE & SOFTWARE REQUIREMENTS 33

v
2.5.1 HARDWARE REQUIREMENTS

2.5.2 SOFTWARE REQUIREMENTS

2.6 PROGRAMMING LANGUAGE(S) USED 36

2.6.1. JAVA /PYTHON/ANY OTHER FRONT END (1 PAGE MIN)

2.6.3 SQL/ANY OTHER BACK END (1 PAGE MIN)

2.6.3. ANY OTHER SOFTWARE (1 PAGE MIN)

2.6.4. ANY OTHER SOFTWARE (1 PAGE MIN)

CHAPTER – 3 ARCHITECTURE 38

3.1 PROJECT ARCHITECTURE 38

3.2 USE CASE DIAGRAM 40

3.3 CLASS DIAGRAM 43

3.4 SEQUENCE DIAGRAM 43

3.5 ACTIVITY DIAGRAM

3.5.1 REMOTE USER

3.5.2 SERVICE PROVIDER

CHAPTER – 4 IMPLEMENTATION 46

4.1 MACHINE LEARNING ALGORITHMS 46

4.2 DATA SET DESCRIPTION 48

4.3 SAMPLE CODE 56

4.4 56

4.5 57

CHAPTER – 5 SCREENSHOTS 59

5.1 INTRODUCTION 59

CHAPTER – 6 TESTING 113

6.1 INTRODUCTION TO TESTING 113

6.2 TYPES OF TESTING 116

vi
6.2.1 UNIT TESTING

6.2.2 INTEGRATION TESTING

6.2.3 FUNCTIONAL TESTING

6.3 TEST CASES

CHAPTER – 7 CONCLUSION & FUTURE SCOPE 113

7.1 PROJECT CONCLUSION 113

7.2 FUTURE SCOPE 116

REFERENCES 113

GITHUB LINK 116

LIST OF TABLES

vii
TABLE NO DESCRIPTION Page No
Table 6.1 73
Table 6.2 75
Table 6.3 77
Table 6.4 93
Table 6.5 95
Table 6.6 96
Table 6.7 98
Table 6.8. 100
Table 6.9 102
Table 6.10 104
Table 6.11 105
Table 6.12 106
Table 6.13 107
Table 6.14 108
Table 7.1 110

viii
LIST OF FIGURES

FIGURE NO DESCRIPTION Page no

Fig: 1.1 12
Fig: 1.2 13
Fig: 1.3 13
Fig: 1.4 14
Fig: 6.1 74
Fig: 6.2 77
Fig: 6.3 78
Fig: 6.4 94
Fig: 6.5 97
Fig: 6.6 99
Fig: 6.7 101
Fig: 6.8 103
Fig: 6.9 104
Fig 6.10 107
Fig 7.1 110
Fig 7.2 111

ix
LIST OF SCREENSHOTS

SCREENSHO DESCRIPTION Page no


T NUMBER

Screenshot 5.1 12
Screenshot 5.2 13
13

x
LIST OF ABBREVIATIONS

i. ML Machine Learning

ii.

iii.

iv.

v.

vi.

vii.

viii.

ix.

x.

xi.

xii.

xiii.

xiv.

xv.

xvi.

xvii.

xviii.

xi
Chapter 1
INTRODUCTION
1.1 Introduction
The dedicated industry for application development is always prioritized the
application performance and deployment effectiveness for the customers. These non-
functional requirements have accelerated the adaptation of cloud computing and
application hosting on cloud-based data centres. In cloud data centres, the physical
infrastructure is shared between multiple consumers, and isolation is achieved using
virtualization.
1.2 Project Scope
Evaluating and quantitatively measuring threats is crucial for optimizing and
improving cloud security. There are several approaches to evaluating and quantifying
cloud security threats, including risk assessment, threat modeling, and vulnerability
scanning.
1.3 Project Scope
1.4 Project Features

1
Chapter 2
SYSTEM ANALYSIS
2.1 Problem Definition
When it comes to dealing with attribute revocation, Yang et al. claim that their
suggested multi-authority cipher text-policy attribute-based encryption-based data
access control for cloud storage may provide both forward and backward security.
Unfortunately, our in-depth research has revealed that their project uses a
bidirectional re-encryption technique while changing the cipher text, which introduces
a security hole. Our suggested attack approach shows that even after a user's access
has been revoked, the user may still decrypt fresh cipher texts that are said to need the
new-version secret keys.
2.2 Existing System
2.2.1 Limitations of The Existing System
2.3 Proposed System
2.3.1 Advantages of Proposed System
2.4 Feasibility Study
2.4.1 Economical Feasibility
2.4.2 Technical Feasibility
2.4.3 Social Feasibility
2.5 Hardware & Software Requirements
2.5.1 Hardware Requirements
2.5.2 Software Requirements
2.6 Programming Language(S) Used
2.6.1. Java /Python/Any Other Front End
2.6.3 SQL/Any Other Back End
2.6.3. Any Other Software
2.6.4. Any Other Software

2
Chapter 3
ARCHITECTURE
3.1 Project Architecture
Security risks to organizations’ information assets are hindering the development
of cloud computing services. A comprehensive security governance process is needed
to foster the massive adoption of cloud services and to facilitate the deployment of a
security culture within any company.
. The suggested technique [60] is the first identity-based PDP strategy that can
handle data stored in many copies across several cloud servers [60].
3.2 Use Case Diagram
3.3 Class Diagram
3.4 Sequence Diagram
3.5 Activity Diagram
3.5.1 Remote User
3.5.2 Service Provider

3
Chapter 4
IMPLEMENTATION
4.1 Machine Learning Algorithms
One of the biggest challenges for customers is figuring out how to move their
cloud data from one provider's cloud to another when they switch mobile service
providers. However, users may find it challenging to transfer all of their data from the
old cloud servers to their mobile devices, and then upload the downloaded data to the
new cloud provider, due to the limited local storage and processing power of
smartphones.
Finally, we explore and identify potential future research areas, including hurdles
and unanswered questions. [70].
4.2 Data Set Description
Introduction: Introduction about data as per internet source
Source of Data: from which URL the data is downloaded
Nature of Data:
• Describe the type of data (e.g., numerical, categorical, textual).
• Discuss the format of the data (e.g., raw, processed, structured, unstructured).
• Explain any preprocessing steps performed on the data (e.g., cleaning,
normalization, transformation).
Characteristics of Data:
• Provide details on the size of the dataset (e.g., number of records, variables).
• Describe the temporal or spatial coverage of the data.
• Discuss any missing values, outliers, or data quality issues encountered.
Variables and Attributes:
• List and define the variables or attributes present in the dataset.
• Explain the meaning and significance of each variable in the context of the
research.
• Discuss the units of measurement and any relevant metadata associated with
the variables.

4.3 Sample Code

4
Chapter 5
SCREENSHOTS
5.1 Introduction
Write something about screenshots use

Screenshot 5.1: name of screen


Describe this screen shot in detail

Screenshot 5.2: name of screen

5
Describe this screen shot in detail

Chapter 6
TESTING
6.1 Introduction to Testing
While cloud computing has reduced the complexity and cost of utilizing IT resources,
it has also introduced several security risks that may harm any component of the cloud.
In this research, we focus on a unique danger to VMs: the co-resident attack, in which
malicious users can steal data from other VMs on the same physical server by creating
multiple side channels.
6.2 Types of Testing
6.2.1 Unit Testing
6.2.2 Integration Testing
6.2.3 Functional Testing
6.3 Test Cases

6
Chapter 7
CONCLUSION & FUTURE SCOPE
7.1. Conclusion
However, there is still room for improvement in the average time it takes to shut
down a host system and choose a new virtual machine for migration.
7.2 Future Scope
In today's world, businesses must take precautions to protect their data in the
cloud. Keeping sensitive information safe in the age of widespread cloud computing
is more critical than ever. Strong cloud security measures may assist to guard against
internal dangers as well as external ones, such as dishonest workers or contractors
who may try to access or compromise important data.

7
REFERENCES
1. S. An, A. Leung, J. B. Hong, T. Eom and J. S. Park, "Toward Automated Security Analysis and
Enforcement for Cloud Computing Using Graphical Models for Security," in IEEE Access, vol. 10, pp.
75117-75134, 2022.
2. J. Luna, A. Taha, R. Trapero and N. Suri, "Quantitative Reasoning about Cloud Security Using Service
Level Agreements," in IEEE Transactions on Cloud Computing, vol. 5, no. 3, pp. 457-471, 1 July-Sept.
2017.

You might also like