Ensuring Data Security in Cloud Computing Full Project

Cloud computing Java Project  has been envisioned as the next-generation architecture of IT enterprise. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy.

This unique attribute, however, poses many new security challenges which have not been well understood. In this article, we focus on cloud data storage security, which has always been an important aspect of quality of service.

Ensuring-Data-Security-in-Cloud-Computing

To ensure the correctness of users’ data in the cloud, we propose an effective and flexible distributed scheme with two salient features, opposing to its predecessors. By utilizing the homomorphic token with distributed verification of erasure-coded data, our scheme achieves the integration of storage correctness insurance and data error localization, i.e., the identification of misbehaving server (s).

Unlike most prior works, the new scheme further supports secure and efficient dynamic operations on data blocks, including: data update, delete and append. Extensive security and performance analysis shows that the proposed scheme is highly efficient and resilient against Byzantine failure, malicious data modification attack, and even server colluding attacks.

Existing System:

From the perspective of data security, which has always been an important aspect of quality of service, Cloud Computing inevitably poses new challenging security threats for number of reasons. 

1 . Firstly, traditional cryptographic primitives for the purpose of data security protection can not be directly adopted due to the users’ loss control of data under Cloud Computing.

Therefore, verification of correct data storage in the cloud must be conducted without explicit knowledge of the whole data. Considering various kinds of data for each user stored in the cloud and the demand of long term continuous assurance of their data safety, the problem of verifying correctness of data storage in the cloud becomes even more challenging. 

2 . Secondly, Cloud Computing is not just a third party data warehouse. The data stored in the cloud may be frequently updated by the users, including insertion, deletion, modification, appending, reordering, etc. To ensure storage correctness under dynamic data update is hence of paramount importance. 

These techniques, while can be useful to ensure the storage correctness without having users possessing data, can not address all the security threats in cloud data storage, since they are all focusing on single server scenario and most of them do not consider dynamic data operations.

As an complementary approach, researchers have also proposed distributed protocols  for ensuring storage correctness across multiple servers or peers. Again, none of these distributed schemes is aware of dynamic data operations. As a result, their applicability in cloud data storage can be drastically limited. 

Proposed System:

In this paper, we propose an effective and flexible distributed scheme with explicit dynamic data support to ensure the correctness of users’ data in the cloud. We rely on erasure correcting code in the file distribution preparation to provide redundancies and guarantee the data dependability.

This construction drastically reduces the communication and storage overhead as compared to the traditional replication-based file distribution techniques. By utilizing the homomorphic token with distributed verification of erasure-coded data, our scheme achieves the storage correctness insurance as well as data error localization: whenever data corruption has been detected during the storage correctness verification, our scheme can almost guarantee the simultaneous localization of data errors, i.e., the identification of the misbehaving server(s).

1. Compared to many of its predecessors, which only provide binary results about the storage state across the distributed servers, the challenge-response protocol in our work further provides the localization of data error. 

2. Unlike most prior works for ensuring remote data integrity, the new scheme supports secure and efficient dynamic operations on data blocks, including: update, delete and append. 

3. Extensive security and performance analysis shows that the proposed scheme is highly efficient and resilient against Byzantine failure, malicious data modification attack, and even server colluding attacks.

Network Sniffer VB.Net Project Report,Code and Paper Presentation

Network Sniffer VB.Net Project  is one of the most useful software tool for windows operating system. Sniffer software works as a windows analyzer and maintain system information like network status, drivers updates , running services ,running drivers and handles information of every feature in windows. which will be useful for administrator to easily monitor system status.

Network-Sniffer-VB-Net-Project-Report

This CSE Project is developed using  VB.Net which is one of the best tool available for developing these type of applications. Network sniffer software required manual work to configure required settings. Using this settings admin can analyze system details based on settings he configured.

This application uses inbuilt features on windows operating system like windows management instrumentation which is used to communicate with all lower level systems. Based on the configuration settings performance is depended.

This system has notification feature which will inform admin about the status of the system even if he is away from the system.

PURPOSE OF THE PROJECT 

  • Provide a Single environment from where an administrator can interact with the system resources with in the network.
  • Provides Info regarding the no of services running on the system.
  • To provide an upgrade support for the system resources.
  • Provides interface to interact with the system parameters like network settings, OS Settings, Services, and Process etc.
  • Provides means of reporting the system setting to a person through email. There by an administrator can know the status of a systems throughout the network

 SCOPE OF THE PROJECT 

Network Sniffer is an application which runs on a network. Current scope of the project is to check the state of the services and drivers, state of the processes, state of drivers the application doesn’t provide any method to work with these aspects of the management.  
Conclusion.
  • The project has been appreciated by all the users in the organization.
  • It is easy to use, since it uses the GUI provided in the user dialog.
  • User friendly screens are provided.
  • The usage of software increases the efficiency, decreases the effort.
  • It has been efficiently employed as a tool for Monitoring System resources and updating the system with latest software.
  • It also provides the user with variable options in settings.
  • It has been thoroughly tested and implemented.

Security System for DNS Using Cryptography Java Full Project

The mapping or binding of IP addresses to host names became a major problem in the rapidly growing Internet and the higher level binding effort went through different stages of development up to the currently used Domain Name System (DNS) Java project.

Security-for-Domain-Name-System-Java project

The DNS Security is designed by CSE Final year students using java programming to provide security by combining the concept of both the Digital Signature and Asymmetric key (Public key) Cryptography. Here the Public key is send instead of Private key.

The DNS security uses Message Digest Algorithm to compress the Message(text file) and PRNG(Pseudo Random Number Generator) Algorithm for generating Public and Private key. The message combines with the Private key to form a Signature using DSA Algorithm, which is send along with the Public key

The receiver uses the Public key and DSA Algorithm to form a Signature. If this Signature matches with the Signature of the message received, the message is Decrypted and read else discarded.

 

The DNS as an Internet standard to solve the issues of scalability surrounding the hosts.txt file. Since then, the widespread use of the DNS and its ability to resolve host names into IP addresses for both users and applications alike in a timely and fairly reliable manner, makes it a critical component of the Internet.

The distributed management of the DNS and support for redundancy of DNS zones across multiple servers promotes its robust characteristics. However, the original DNS protocol specifications did not include security. Without security, the DNS is vulnerable to attacks stemming from cache poisoning techniques, client flooding, dynamic update vulnerabilities, information leakage, and compromise of a DNS server’s authoritative files.

In order to add security to the DNS to address these threats, the IETF added security extensions to the DNS, collectively known as DNSSEC. DNSSEC provides authentication and integrity to the DNS. With the exception of information leakage, these extensions address the majority of problems that make such attacks possible. Cache poisoning and client flooding attacks are mitigated with the addition of data origin authentication for RRSets as signatures are computed on the RRSets to provide proof of authenticity.

Dynamic update vulnerabilities are mitigated with the addition of transaction and request authentication, providing the necessary assurance to DNS servers that the update is authentic. Even the threat from compromise of the DNS server’s authoritative files is almost eliminated as the SIG RR are created using a zone’s private key that is kept off-line as to assure key’s integrity which in turn protects the zone file from tampering. Keeping a copy of the zone’s master file off-line when the SIGs are generated takes that assurance one step further.

DNSSEC can not provide protection against threats from information leakage. This is more of an issue of controlling access, which is beyond the scope of coverage for DNSSEC. Adequate protection against information leakage is already provided through such things as split DNS configuration.

Conclusion.

DNSSEC demonstrates some promising capability to protect the Internet infrastructure from DNS based attacks. DNSSEC has some fairly complicated issues surrounding its development, configuration, and management. Although the discussion of these issues is beyond the scope of this survey, they are documented in RFC 2535 and RFC 2541 and give some interesting insight into the inner design and functions of DNSSEC.

In addition to keep the scope of this paper down, many topics such as secure zone transfer have been omitted but are part of the specifications in RFC 2535. The first official release of a DNSSEC implementation is available in BIND version 8.1.2.

Gated Communities Java Project,Code and Paper Presentation

Gated communities(java Project)  are neighborhoods enclosed by walls or fences, and providing services to members in that community. In those services we can provide online food services, marketing, travel agency…..etc. Some gated communities may even have their own places of worship.

Gated communities exist throughout the United States. Gated communities are designed to providing services and maintaining the database about the homes and apartments are located. There are a number of reasons that individuals from all walks of life may choose to live within the enclosures of a gated community.

Gated-Communities-Java-Project-Code

Gated communities are not reserved for the upper class and the wealthy or for the most affluent of cities. Gated communities can be found in many towns in every state. In USA Today, it was estimated that nearly seven million families lived in gated communities, and four million of these families lived in a community where it was impossible to gain access without some sort of security clearance.

Residents of gated communities may own their own home, or they may rent from someone else. Residents of gated communities represent all different racial groups.

Scope of the system 

This B.tech final year cse project can be used by any gated way community which wants to maintain the database and utilize the various services provided by the application. In order to reduce the manual work and view the services which are provided by our website. 

 

 Objective of the project 

  • The main aim of this Gated community computer science project is to create a web application which maintains the Database and the information about various services which can be useful for various gated way communities.
  • Vast information is maintained in this system so as to provide all the details of services.
  • Online service is purely an web application and lot of efforts is put to make it as user friendly.
  • Reduce the wastage and time of the users/visitors by going and enquiring manually.

Conclusion. 

As mentioned above, the existing system is facing the problems as the person needs approach the location to report his problem/complaint. So the GCS system can overcome this problem so that the users can post their queries and get them solved with in a quick time.

download Project Report, project Code and  paper presentation  of  Gated communities(java Project)  . 

Global Communication Java Project with Code and Paper Presentation

Global Communication java project is developed for N.E.C. Main idea for developing this application is to reduce communication problem between companies by developing a online conference application. This application will be a better choice to replace existing telephone communication through web by including new features is called Global Communication. 

Why to develop Global Communication Java Project.                                                   

Global-Communication-Java-Project-with-Code
As there is lot of improvement in technology,there is lot of scope for developing applications in business field which can reduce cost as well as time. This b.tech final year project is experiment to reduce that gap in business field. Normally companies follow manual procedures for transaction and dealings. But this application will be a good option for companies to communicate through online. This application will improve business standards of a company.

In present market each and every business are having branches all over the country so this application will help to communicate with different branches for faster services through online conferences.

PRESENT SYSTEM:

Conferences will take part a vital role for any of the national wide company. A company like National Engineering Corporation it takes part an important role. Because the company is having branches through out India, they need to conduct conferences between their employees and to conduct board of directors meeting among their directors, general managers. 

 

Normally conferences will be conducted in some place owned by company or in some conference hall. The person, who has to participate in the conference, has to travel all the way to participate in the conference. So it will be very risky to travel for the persons, and it is risky work for the company also to provide all the felicities to persons. Now a day wherever you see so many strikes are going. In that case to participate in any important conference or to conduct any conference will be very tedious. All this may lead to loss of company and time taking matters. So here the company is decided to develop their conferences on the net itself. 

PROPOSED SYSTEM 

The proposed system is to maintain the conferences, live meetings, general body meetings on the net. This system is to develop in a client/server environment. It aims to do the following. 

  • Grouping: Grouping of selected users
    •  Support of multi conference
    •  By selecting the single user from the list, Talk can be  achieved
    •  By selecting all the users in the list, Chat can be achieved.
download Project Report, project Code and  paper presentation  of  CSE Global Communication java project . 

Medicate Search Java Project Report,Paper Presentation and Code

Medicate search java projects main idea is to develop a application which can be easily operatable by users who are poor in computer and Medical knowledge can also search for medical information and users can communicate between different medical hubs for requesting medical help.

PROJECT SCOPE:

Medicate-Search-Java-Project As there are different medical branches which provide medical services like Allopathy, Ayurvedic, Homeopathy. Based on the users interest they can search for medical information and communicate with doctors for further help. Doctors can register with the system and share there information in the forum which will be visible to users.

    • It is web based application.
    • Users are free to search.
    • Doctors are Primary Stakeholders.
    • Feedback facility.
    • Registration/Login facility.
    • Open community like module is available 

EXISTING  SYSTEM: 

                                                                                                    

Presently there is no such system where people can find the information related to any medicine or medical related information and there is no such platform that provide all kinds of treatment at one base. 
The objective of this project is to develop a system which is useful in the above mentioned emergency situations effectively. This project involves the detailed study of the symptoms of the disease and its severity. This is not merely based on the theoretical knowledge of medicine but is performed under the esteem supervision of highly experience doctors from all the fields of medicine.

This includes the symptoms,  videos and also video chat between the doctor and the patients which help in diagnosing the disease.

This is mainly intended to provide first-aid for the persons before they could be taken to the doctor and also helps a lot during the natural calamities where its very difficult to provide direct medical assistance to the affected people.

This includes the names of the medicines for cure of common diseases.   The proposed system provides various means through which lot of information related to medical can be retrieved. This system not only benefits general public but also to medical professionals.

download Project Report,Code and  paper presentation  of  CSE Medicate search java projects . 

Intrusion Detection in Wireless Sensor Network Java Project With Code

Intrusion detection in Wireless Sensor Network Java Project is for computer science final year students.This project main idea is to trace moving objects which will be useful in fields like military and aviation.This application can be  useful in battle field in order to find out moving objects.

Data transfer is done using wireless sensor network. This application is implemented using two sensor detection models :single sensing and multiple sensing detection. This project will show advantages of multiple heterogeneous wireless networks.

Existing System:

1) In present existing system  single sensing detection is used where only one object is detected for a single time in wireless sensor  network.

2) Our Previous work was according to homogeneous and heterogeneous single sensor in wireless sensor network

Intrusion-detection-in-Wireless-Sensor-Network-Java-ProjectProposed System: 

1) In Heterogeneous wireless sensor ,Intruder detected anywhere in the network.

2) We are detecting the intruder in multiple sensor heterogeneous wireless sensor network.

Modules:

1) Constructing Sensor Network

2) Packet Creation

3) Find authorized and un authorized port

4) Constructing Inter-Domain Packet Filters

5) Receiving the valid packet 

Modules Descriptions:

Module-1:

In this module, we are going to connect the network .Each node is connected the neighboring node and it is independently deployed in network area. And also deploy the each port no is authorized in a node.

Module-2:

In this module, browse and select the source file. And selected data is converted into fixed size of packets. And the packet is send from source to detector.       

Module-3:

The intrusion detection is defined as a mechanism for a WSN to detect the existence of inappropriate, incorrect, or anomalous moving attackers.

In this module check whether the path is authorized or unauthorized. If path is authorized the packet is send to valid destination. Otherwise the packet will be deleted. According port no only we are going to find the path is authorized or Unauthorized.

Module-4:

If the packet is received from other than the port no it will be filtered   and discarded. This filter only removes the unauthorized packets and authorized packets send to destination.

Module-5:

In this module, after filtering the invalid packets all the valid   Packets will reach the destination.

CONCLUSION. 

This paper presented a novel highly automated approach for protecting Web applications from SQLIAs. Our approach consists of 

1) Identifying trusted data sources and marking data coming from these sources as trusted,

2) Using dynamic tainting to track trusted data at runtime, and

3) Allowing only trusted data to form the semantically relevant parts of queries such as SQL keywords and operators. 

 Unlike previous approaches based on dynamic tainting, our technique is based on positive tainting, which explicitly identifies trusted (rather than untrusted) data in a program. This way, we eliminate the problem of false negatives that may result from the incomplete identification of all untrusted data sources.

False positives, although possible in some cases, can typically be easily eliminated during testing. Our approach also provides practical advantages over the many existing techniques whose application requires customized and complex runtime environments: It is defined at the application level, requires no modification of the runtime system, and imposes a low execution overhead.

download Project Report,Code and  paper presentation  of  CSE Intrusion detection in Wireless Sensor Network Java Project . 

Effective Key Generation for Multimedia Java Project with Code

Effective Key Generation For Multimedia Java Project entitled Effective key Generation for Multimedia Application is the application developed to embed an video file in another video signal. It is concerned with embedding information in an innocuous cover Speech in a secure and robust manner. This system makes the Files more secure by using the concepts Steganography and Cryptography. 

Stenography, poor cousin of Cryptography is the art of hiding messages inside other messages such that the very existence of the message is unknown to third party. The goal of cryptography is to make data unreadable by a third party, the goal of Steganography is to hide the data from a third party Through the use of advanced computer software, authors of images and software can place a hidden trademark in their product, allowing them to keep a check on piracy.

This is commonly known as watermarking. Hiding serial numbers or a set of characters that distinguishes an object from a similar object is known as finger printing. Together, these two are intended to fight piracy. The latter is used to detect copyright violators and the former is used to prosecute them. But these are only examples of the much wider field of Stenography.
The cover data should not be significantly degraded by the embedded data, and the embedded data should be as imperceptible as possible. The embedded data should be as immune as possible to modifications from intelligent attacks or anticipated manipulations. Thus it is necessary that the hidden message should be encrypted.

Effective-Key-Generation-For-Multimedia-Java-Project

System Description:

The Effective key Generation for Multimedia Application system is designed basically in four different modules they are GUI module, Security System module, Stegnography Module, Connection Manager Module.

GUI Module basically deals with the design of the interface which include the service of providing the user with the flexibility of accessing the file system and selecting the required file for the transfer.

It should also provide the system to collect the information from the user to check the authorization in providing the access to the file system. The interface is also to consider the design, which include the services of sending and receiving of the files with encryption and decryption standards.

Existing System.

  • In the traditional the server was only a data base server that can only offer data. Therefore majority of the business logic i.e., validations etc. had to be placed on the clients system
  • The data has to be transported over the network to the client, which requires a secured format of the transfer method.
Proposed System.
  • In the proposed system we use both cryptography and stenography
  • First the information is encrypted and then it is embedded in to a video file.
  • In this way two levels of security is provided and it is difficult for the hacker to read the information

Software Requirements For Multimedia Java Project 

Operating System:

Windows NT/2000 (Client/Server).

Software requirements:

Front-end: Java J2SDK 1.5, Swings.

Hardware Requirements:

System Configuration:

Pentium III Processor with 700 MHz Clock Speed

256 MB RAM, 20 GB HDD, 32 Bit PCI Ethernet Card.

download Project Report and source code and paper presentation  of  CSE Effective Key Generation For Multimedia Java Project . 

Download Library Management C Project Code and Report

The project entitled LIBRARY MANAGEMENT SYSTEM A C PROJECT is developed as part of the VI Semester RDBMS package project for the partial fulfillment of the BE (Computer Science) degree.

The main objective of the application is to automate the existing system of manually maintain the records of the Book Issue, Book Return from the student, Stock Maintenance, Catalogue and Book Search to be computerized. So the Book Issue, Return, Searching will be a more refined and quicker process. 

It is a software application to maintain the records related to Book Purchase, Stock Maintenance, Book Search, Catalogue, Book Issue, Book Returns, Fine Collection, and all necessary requirements for the Library to manage the day to day operations. 

This application can be used by any Library to automate the process of manually maintaining the records related to the subject of maintaining the stock and Book Issues. 

It is seen that there is no loss of books and students don’t waste time to search for the book required. It is preferred in college libraries where management of books is slightly complicated where students are always referring and borrowing them.

Download Can Based Car Automation Microcontroller Project Report

The software written for embedded systems is often called firmware, and is stored in read-only memory or flash convector chips rather than a disk drive. It often runs with limited computer hardware resources: small or no keyboard, screen, and little memory. Can-Based-automation-microcontroller-project

Why this project? 

In the present Can Based automation microcontroller project we are demonstrating the applications of the CAN protocol in the Car Automation.

Here we are showing the Antilock Breaking System (ABS) and the Automatic Climate Control System. 

The ABS brake system is the greatest innovation in active safety for cars that has saved many lives. The Anti-lock Braking System is designed to help the driver maintain steering control during hard braking, especially in slippery conditions. 

How it works? 

Imagine, you are driving a car without ABS on a slippery road (e.g. after a rain or snow). Suddenly, you notice something on the road right in front of you. 

You hit the brakes, and try to turn aside, but the steering doesn’t work; the car just skids out of control. Why, because all the wheels are locked up while you are holding down the brake pedal. As a result, you lose the ability to steer the vehicle.

The four-wheel ABS can help in situations like this. It prevents the wheels from locking up, helping you maintain steering control during braking. In a similar situation, driving a car equipped with four-wheel ABS, it would be easier for you to steer your vehicle while braking.

Major components of the typical ABS system include speed sensors (one at each wheel), an electronic control unit (ABS computer) and a hydraulic control. The ABS computer constantly monitors the signal from each wheel speed sensor. 

When it senses that any of the wheels are approaching lock up during braking, the ABS computer sends the signal to the hydraulic control unit, which modulates the braking pressure for a corresponding wheel(s) preventing it from locking up. Today’s automatic climate control systems allow hands-free temperature regulator, whether hot or cold. Once you set a temperature on your car’s automatic climate control system, it should maintain that temperature regardless of what’s going on outside. 

Today’s automatic climate control systems allow hands-free temperature regulator, whether hot or cold. Once you set a temperature on your car’s automatic climate control system, it should maintain that temperature regardless of what’s going on outside. 

CAN is a multi-master broadcast serial bus standard for connecting electronic control units (ECUs).Each node is able to send and receive messages, but not simultaneously: a message (consisting primarily of an ID usually chosen to identify the message-type/sender and up to eight message bytes) is transmitted serially onto the bus, one bit after another  this signal pattern codes the message (in NRZ) and is sensed by all nodes. 

The devices that are connected by a CAN network are typically sensors, actuators and control devices. A CAN message never reaches these devices directly, but instead, a host processor and a CAN controller are needed between these devices and the bus.

If the bus is free, any node may begin to transmit. If two or more nodes begin sending messages at the same time, the message with the more dominant ID (which has more dominant bits, i.e., bit 0) will overwrite other nodes’ less dominant IDs, so that eventually (after this arbitration on the ID) only the dominant message remains and is received by all nodes.

Conclusion: 

The project “CAN BASED CAR AUTOMATION SYSTEM” has been successfully designed and tested. It has been developed by integrating features of all the hardware components used. Presence of every module has been reasoned out and placed carefully thus contributing to the best working of the unit.