Git Product home page Git Product logo

aggregate-key-algorithm's Introduction

Aggregate-Key-Algorithm

Aggregate Key Based Algorithm Cloud

Steps of Installation

  1. Install Visual Studio 2015
  2. Open Project as Website
  3. Run the project Index.aspx in Chrome

#Project Screenshots

This framework was designed to have a secure data sharing where multiple user is able to securely store and share their data.

image8

Screenshot 4.1.1: Home page. Screenshot 4.1.1 illustrates the home page of the proposed system.

image9

Screenshot 4.1.2: Registration form for account creation. Screenshot 4.1.2 illustrates registration form for account creation. When the application starts, the main part is to register an account on untrusted server. The registration form consists of user credentials i.e. Name, password, email address, mobile number.

image10

Screenshot 4.1.3: Owner Login page Screenshot 4.1.3 illustrates Owner login page Once account is created user can login through email address or mobile number and password.

4.1.1 Admin Screenshots

image11

Screenshot 4.1.4: Admin Login Page. Screenshot 4.1.4 illustrates the Admin Login Email ID and Password authentication user interface

image12

Screenshot 4.1.5: Admin Home Page Screenshot 4.1.5 illustrates Admin data verification step. Admin verify the data for security purpose, if he finds any malicious code then admin will not upload the document. Without Admin acceptance file will not get uploaded to the server.

image13

Screenshot 4.1.6: Cloud Admin Document Verification The above screenshot illustrates the cloud admin document verification for encrypted document and GetKey button to generate the keys for the document.

image14

Screenshot 4.1.7: Cloud Admin Document Decryption The above screenshot illustrates the public key and master key generation for the file so as to decrypt the data and verify the file.  

image15

Screenshot 4.1.8: Cloud Admin Document Upload with Time Taken The above screenshot illustrates the verification of file by admin and the time taken in milli seconds to decrypt the data

image16

Screenshot 4.1.9: Cloud Admin Verified Files The above screenshot illustrated the verified files on the server by the admin in the previous step. The status of the files is set as verified in the previous screenshot is shown here.   #4.2.2 User Screenshots

image17

Screenshot 4.1.10: User Home The above screenshots show the user homepage and personal data provided during signup

image18

Screenshot 4.1.11: User Info Edit The above screenshot shows the page for editing the user personal data  

image19

Screenshot 4.1.12: Another User Info Edit The above screenshot shows the another page for editing the user personal data and updating the information.

image20

Screenshot 4.1.13: User Upload File The above screenshot shows the uploaded files by the user, the file being uploaded onto the server and the public and master being generated for the uploaded file and also the time taken to encrypt and upload the file. Admin verify data using public and master key of that document if it contains any malicious code or not. After that admin upload document to cloud.

image21

Screenshot 4.1.14: User Request File The above screenshot shows the request being carried for the other user to download the file

image22

Screenshot 4.1.15: User Verified File The above screenshot shows the verified files for the user by the administrator of the server.

image23

Screenshot 4.1.16: User Requested File The above screenshot shows the user requests and the link to respond to the request made by another user.

image24

Screenshot 4.1.17: User Verified File Key Send The above screenshot shows the KAC being send to the file requested user via email medium and the time taken to send the key over the network is also illustrated here.

image25

Screenshot 4.1.18: User Owner Response The above screenshot shows the response of the requested file by me in the previous step

image26

Screenshot 4.1.19: User Decryption The above screenshot shows the user decryption with the help of KAC sent to the user via email with the time required to decrypt the data. The file encrypted content with the file information is shown in the above screenshot. When user clicks the download button the decrypted file is downloaded.  

image27

Screenshot 4.1.20: User History The above screenshot shows the user history of requested and decrypted file.

image28

Screenshot 4.1.21: User Block The above screenshot shows the user that can be block for sending the malicious files on the server by selecting the block link in front of the filename.  

image29

Screenshot 4.1.22: Delete Account The above screenshot shows the account can be deleted permanently form the server by clicking delete in front of the account.

image30 Screenshot 4.1.23: Contact Page The above screenshot shows the account contact page to contact the administrator for any issues in the account

aggregate-key-algorithm's People

Contributors

ajinkyabijwe avatar

Watchers

 avatar sitarrr avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.