Final - Project - Report - SECOND PAGE
Final - Project - Report - SECOND PAGE
The rapid technological advancement, security has become a major issue due to the
increase in malware activity that poses a serious threat to the security and safety of both
security, protecting the data from fraud ulent efforts is one of the most pressing
software that is designed to destroy intended computer systems and programs or mobile
and web applications is referred to as malware. According to a study, naive users are
Learning, and Deep Learning. In this study, we emphasize Artificial Intelligence (AI)
based techniques for detecting and preventing malware activity. We present a detailed
improve efficiency. Our study shows that adopting futuristic approaches for the
comprehen sion of this synthesis shall help researchers for further research on malware
V
TABLE OF THE CONTENT
CHAPTER
TITLE PAGE NO
ABSTRACT V
LIST OF FIGURES X
LIST OF ABBREVIATION XII
1 INTRODUCTION 1
1.1. OVERVIEW 1
1.1.1. CYBER SECURITY 2
1.2. PROBLEM IDENTIFICATION 4
1.2.1. Data Breaches in Cloud Computing 6
1.3. BLOCKCHAIN TECHNOLOGY 6
1.3.1. History of Blockchain 7
1.3.2. Key elements of a blockchain 7
1.3.3. Types of Blockchain 8
1.3.4. Benefits of blockchain 9
1.3.5. Top blockchain use cases for
cybersecurity 9
1.4. CRYPTOGRAPHY 9
2 LITERATURE SURVEY 11
2.1. Enhanced Security in Cloud Computing using
VI
Enhance Relational Database Security. 11
2.3. Block Chain Based Cloud Computing:
Architecture and Research Challenges 11
6 TESTING 53
6.1. CLOUD APPLICATION TESTING 53
6.1.1. Types of Testing Performed in the Cloud 53
7 APPENDIX 58
7.1. TABLE DESIGN 58
VIII
7.2. CODING 61
7.3. SCREENSHOTS 74
8 CONCLUSION AND FUTURE SCOPE 78
8.1. CONCLUSION 78
8.2. FUTURE SCOPE 78
REFERENCES 79
IX
LIST OF FIGURES
FIGURE. NO: FIGURE NAME PAGE. NO:
1.1 Data 1
1.2 Cloud Storage 2
1.3 Cloud Storage 3
1.4 Public Cloud Storage 3
1.5 Block Chain Technology 6
1.6 Three types of blockchain 8
1.7 Benefits of Blockchain 9
1.8 Cryptography 10
XI
LIST OF ABBREVIATIONS
ABBREVIATIONS EXPANSIONS
SAN Storage Area Network
PHI Personal Health Information
PII Personal Identifiable Information
DBMS Data Base Management System
RDBMS Relational Data Base Management System
SQL Structured Query Language
HE Homomorphic Encryption
FHE Fully Homomorphic Encryption
KGC Key Generation Center
VA Virtual Assistant
DO Data Owner
DU Data User
CSP Cloud Service Provider
MK Magic Key
SK Secret Key
XII