Aggregate Key Based Algorithm Cloud
Steps of Installation
- Install Visual Studio 2015
- Open Project as Website
- Run the project Index.aspx in Chrome
#Project Screenshots
This framework was designed to have a secure data sharing where multiple user is able to securely store and share their data.
Screenshot 4.1.1: Home page. Screenshot 4.1.1 illustrates the home page of the proposed system.
Screenshot 4.1.2: Registration form for account creation. Screenshot 4.1.2 illustrates registration form for account creation. When the application starts, the main part is to register an account on untrusted server. The registration form consists of user credentials i.e. Name, password, email address, mobile number.
Screenshot 4.1.3: Owner Login page Screenshot 4.1.3 illustrates Owner login page Once account is created user can login through email address or mobile number and password.
Screenshot 4.1.4: Admin Login Page. Screenshot 4.1.4 illustrates the Admin Login Email ID and Password authentication user interface
Screenshot 4.1.5: Admin Home Page Screenshot 4.1.5 illustrates Admin data verification step. Admin verify the data for security purpose, if he finds any malicious code then admin will not upload the document. Without Admin acceptance file will not get uploaded to the server.
Screenshot 4.1.6: Cloud Admin Document Verification The above screenshot illustrates the cloud admin document verification for encrypted document and GetKey button to generate the keys for the document.
Screenshot 4.1.7: Cloud Admin Document Decryption The above screenshot illustrates the public key and master key generation for the file so as to decrypt the data and verify the file.
Screenshot 4.1.8: Cloud Admin Document Upload with Time Taken The above screenshot illustrates the verification of file by admin and the time taken in milli seconds to decrypt the data
Screenshot 4.1.9: Cloud Admin Verified Files The above screenshot illustrated the verified files on the server by the admin in the previous step. The status of the files is set as verified in the previous screenshot is shown here. #4.2.2 User Screenshots
Screenshot 4.1.10: User Home The above screenshots show the user homepage and personal data provided during signup
Screenshot 4.1.11: User Info Edit The above screenshot shows the page for editing the user personal data
Screenshot 4.1.12: Another User Info Edit The above screenshot shows the another page for editing the user personal data and updating the information.
Screenshot 4.1.13: User Upload File The above screenshot shows the uploaded files by the user, the file being uploaded onto the server and the public and master being generated for the uploaded file and also the time taken to encrypt and upload the file. Admin verify data using public and master key of that document if it contains any malicious code or not. After that admin upload document to cloud.
Screenshot 4.1.14: User Request File The above screenshot shows the request being carried for the other user to download the file
Screenshot 4.1.15: User Verified File The above screenshot shows the verified files for the user by the administrator of the server.
Screenshot 4.1.16: User Requested File The above screenshot shows the user requests and the link to respond to the request made by another user.
Screenshot 4.1.17: User Verified File Key Send The above screenshot shows the KAC being send to the file requested user via email medium and the time taken to send the key over the network is also illustrated here.
Screenshot 4.1.18: User Owner Response The above screenshot shows the response of the requested file by me in the previous step
Screenshot 4.1.19: User Decryption The above screenshot shows the user decryption with the help of KAC sent to the user via email with the time required to decrypt the data. The file encrypted content with the file information is shown in the above screenshot. When user clicks the download button the decrypted file is downloaded.
Screenshot 4.1.20: User History The above screenshot shows the user history of requested and decrypted file.
Screenshot 4.1.21: User Block The above screenshot shows the user that can be block for sending the malicious files on the server by selecting the block link in front of the filename.
Screenshot 4.1.22: Delete Account The above screenshot shows the account can be deleted permanently form the server by clicking delete in front of the account.
Screenshot 4.1.23: Contact Page The above screenshot shows the account contact page to contact the administrator for any issues in the account