0% found this document useful (0 votes)
15 views8 pages

Final - Project - Report - SECOND PAGE

The document discusses cyber security issues related to cloud computing and proposes using blockchain technology to address them. It describes problems like data breaches and the need to protect stakeholder data. The document then reviews various blockchain-based approaches for enhancing cloud security and data integrity from literature. It focuses on using artificial intelligence techniques like homomorphic encryption with blockchain.

Uploaded by

20-24-Kesaav NA
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views8 pages

Final - Project - Report - SECOND PAGE

The document discusses cyber security issues related to cloud computing and proposes using blockchain technology to address them. It describes problems like data breaches and the need to protect stakeholder data. The document then reviews various blockchain-based approaches for enhancing cloud security and data integrity from literature. It focuses on using artificial intelligence techniques like homomorphic encryption with blockchain.

Uploaded by

20-24-Kesaav NA
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

ABSTRACT

The rapid technological advancement, security has become a major issue due to the

increase in malware activity that poses a serious threat to the security and safety of both

computer systems and stakeholders. To maintain stakeholder’s, particularly, end user’s

security, protecting the data from fraud ulent efforts is one of the most pressing

concerns. A set of malicious programming code, scripts, active content, or intrusive

software that is designed to destroy intended computer systems and programs or mobile

and web applications is referred to as malware. According to a study, naive users are

unable to distinguish between malicious and benign applications. Thus, computer

systems and mobile applications should be designed to detect malicious activities

towards protecting the stakeholders. A number of algorithms are available to detect

malware activities by utilizing novel concepts including Artificial Intelligence, Machine

Learning, and Deep Learning. In this study, we emphasize Artificial Intelligence (AI)

based techniques for detecting and preventing malware activity. We present a detailed

review of current malware detection technologies, their shortcomings, and ways to

improve efficiency. Our study shows that adopting futuristic approaches for the

development of malware detection applications shall provide significant advantages. The

comprehen sion of this synthesis shall help researchers for further research on malware

detection and prevention using AI.

Keywords: Artificial Intelligence, Malware, Detection System, Malware

Prevention Technology, Software Security

V
TABLE OF THE CONTENT
CHAPTER
TITLE PAGE NO

ABSTRACT V
LIST OF FIGURES X
LIST OF ABBREVIATION XII
1 INTRODUCTION 1
1.1. OVERVIEW 1
1.1.1. CYBER SECURITY 2
1.2. PROBLEM IDENTIFICATION 4
1.2.1. Data Breaches in Cloud Computing 6
1.3. BLOCKCHAIN TECHNOLOGY 6
1.3.1. History of Blockchain 7
1.3.2. Key elements of a blockchain 7
1.3.3. Types of Blockchain 8
1.3.4. Benefits of blockchain 9
1.3.5. Top blockchain use cases for
cybersecurity 9
1.4. CRYPTOGRAPHY 9

2 LITERATURE SURVEY 11
2.1. Enhanced Security in Cloud Computing using

Neural Network and Encryption 11


2.2. Using Block Chain in Cloud Computing to

VI
Enhance Relational Database Security. 11
2.3. Block Chain Based Cloud Computing:
Architecture and Research Challenges 11

2.4. Cloud Manufacturing Architecture Based on

Public Block chain Technology 12


2.5. Decentralized and Privacy-Preserving Public
Auditing for Cloud Storage based on Blockchain 12
2.6. A Secure Cloud Storage Framework with

Access Control Based on Blockchain 12

2.7. Analysis of Data Management in Blockchain-


Based Systems: From Architecture To
13
Governance
2.8. Blockchain Based Data Integrity Verification
13
for Large-Scale IoT Data
2.9. Blockchain-Based Mobile Edge Computing
13
Framework for Secure Therapy Applications
2.10. Medshare: Trust-Less Medical Data Sharing
Among Cloud Service Providers Via Blockchain 14

3 SOFTWARE DESCRIPTION AND


SPECIFICATION
3.1. HARDWARE SPECIFICATION 15
15
3.2. SOFTWARE SPECIFICATION
15
3.3. SOFTWARE DESCRIPTION
15
3.3.1. Front End
15
3.3.2. Back End
17
4 SYSTEM ANALYSIS 22
4.1. EXISTING SYSTEM 22
VII
4.1.1. Disadvantages 23
4.2. PROPOSED SYSTEM 24
4.2.1. Advantages 26
5 SYSTEM DESIGN 27
5.1. MODULES LIST 27
5.2. MODULES DESCRIPTION 27
5.3. DFD DIAGRAM 37
5.3.1. Level – 0 37
5.3.2. Level – 1 38
5.3.3. Level – 2 39
5.4. UML DIAGRAM 40
5.4.1. Class Diagram 40
5.4.2. Use case Diagram 41
5.4.3. Sequence Diagram 42
5.4.4. Component Diagram 43
5.5. ER DIAGRAM 44
5.6. SYSTEM FLOW 45
5.6.1. Homomorphic Encryption & Data user request
5.6.2. System Flow – Mimic Model, Homo.Decryption 45
& Block Verify
46
5.7. ALGORITHM
47

6 TESTING 53
6.1. CLOUD APPLICATION TESTING 53
6.1.1. Types of Testing Performed in the Cloud 53
7 APPENDIX 58
7.1. TABLE DESIGN 58

VIII
7.2. CODING 61

7.3. SCREENSHOTS 74
8 CONCLUSION AND FUTURE SCOPE 78
8.1. CONCLUSION 78
8.2. FUTURE SCOPE 78
REFERENCES 79

IX
LIST OF FIGURES
FIGURE. NO: FIGURE NAME PAGE. NO:
1.1 Data 1
1.2 Cloud Storage 2
1.3 Cloud Storage 3
1.4 Public Cloud Storage 3
1.5 Block Chain Technology 6
1.6 Three types of blockchain 8
1.7 Benefits of Blockchain 9
1.8 Cryptography 10

4.1 Homomorphic Encryption 25


5.1 Block cloud 29
5.2 IPFS Smart Contract Flow 30
5.3 Virtual Assistant Work Flow 34
5.4 DFD Level 0 37
5.5 DFD Level 1 38
5.6 DFD Level 2 39
5.7 Class Diagram 40
5.8 Use case Diagram 41
5.9 Sequence Diagram 42
5.10 Component Diagram 43
5.11 ER Diagram 44
5.12 Homomorphic Encryption & Data user
request 45
5.13 Mimic Model, Homo.Decryption &
X
Block Verify 46
6.1 Types of Cloud Testing 53
6.2 Model Based Testing 56
7.1 Home Page 74
7.2 Registration Page 74
7.3 Service Provider Login Page 75
7.4 User Login 75
7.5 Data Upload 76
7.6 Add New User 76
7.7 File Details 77

XI
LIST OF ABBREVIATIONS

ABBREVIATIONS EXPANSIONS
SAN Storage Area Network
PHI Personal Health Information
PII Personal Identifiable Information
DBMS Data Base Management System
RDBMS Relational Data Base Management System
SQL Structured Query Language
HE Homomorphic Encryption
FHE Fully Homomorphic Encryption
KGC Key Generation Center
VA Virtual Assistant
DO Data Owner
DU Data User
CSP Cloud Service Provider
MK Magic Key
SK Secret Key

XII

You might also like