(project code no. 18) sesphr: a methodology for secure

16
Regional Telecom Training Centre, BSNL-Hyderabad B.Tech CSE/IT Mini Project Abstracts 2019 Page 1 of 16 continued… ABSTRACT (Project Code No. 18) SeSPHR: A Methodology for Secure Sharing of Personal Health Records in the Cloud The widespread acceptance of cloud-based services in healthcare sector has resulted in cost effective and convenient exchange of Personal Health Records (PHRs) among several participating entities of the e-Health systems. Nevertheless, storing confidential health information to cloud servers is susceptible to revelation or theft and calls for the development of methodologies that ensure the privacy of the PHRs. Therefore, we propose a methodology called SeSPHR for secure sharing of the PHRs in the cloud. The SeSPHR scheme ensures patient-centric control on the PHRs and preserves the confidentiality of the PHRs. The patients store the encrypted PHRs on the un-trusted cloud servers and selectively grant access to different types of users on different portions of the PHRs. A semi-trusted proxy called Setup and Re-encryption Server (SRS) is introduced to set up the public/private key pairs and to produce the re-encryption keys. Moreover, the methodology is secure against insider threats and also enforces a forward and backward access control. Furthermore, we formally analyze and verify the working of SeSPHR methodology through High Level Petri Nets (HLPN). Performance evaluation with regard to time consumption indicates that the SeSPHR methodology has potential to be employed for securely sharing the PHRs in the cloud. Furthermore, the cloud computing also integrates various important entities of healthcare domains, such as patients, hospital staff including the doctors, nursing staff, pharmacies, and clinical laboratory personnel, insurance providers, and the service providers. Therefore, the integration of forementioned entities results in the evolution of a cost effective and collaborative health ecosystem where the patients can easily create and manage their Personal Health Records (PHRs). Generally, the PHRs contain information, such as: (a) demographic information, (b) patients’ medical history including the diagnosis, allergies, past surgeries, and treatments, (c) laboratory reports, (d) data about health insurance claims, and (e) private notes of the patients about certain important observed health conditions. Existing System: Numerous methods have been employed to ensure the privacy of the PHRs stored on the cloud servers. The privacy preserving approaches make sure confidentiality, integrity, authenticity, accountability, and audit trial. Confidentiality ensures that the health information is entirely concealed to the unsanctioned parties, whereas integrity deals with maintaining the originality of the data, whether in transit or in cloud storage. Authenticity guarantees that the health-data is accessed by authorized entities only, whereas accountability refers to the fact that the data access policies must comply with the agreed upon procedures. Monitoring the utilization of health-data, even after access to that has been granted is called audit trial. Proposed System:

Upload: others

Post on 02-Nov-2021

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: (Project Code No. 18) SeSPHR: A Methodology for Secure

Regional Telecom Training Centre, BSNL-Hyderabad B.Tech CSE/IT Mini Project Abstracts 2019

Page 1 of 16 continued…

ABSTRACT (Project Code No. 18)

SeSPHR: A Methodology for Secure Sharing of

Personal Health Records in the Cloud

The widespread acceptance of cloud-based services in healthcare sector has resulted

in cost effective and convenient exchange of Personal Health Records (PHRs) among

several participating entities of the e-Health systems. Nevertheless, storing confidential health

information to cloud servers is susceptible to revelation or theft and calls for the

development of methodologies that ensure the privacy of the PHRs. Therefore, we propose

a methodology called SeSPHR for secure sharing of the PHRs in the cloud. The SeSPHR

scheme ensures patient-centric control on the PHRs and preserves the confidentiality of the

PHRs. The patients store the encrypted PHRs on the un-trusted cloud servers and

selectively grant access to different types of users on different portions of the PHRs. A

semi-trusted proxy called Setup and Re-encryption Server (SRS) is introduced to set up

the public/private key pairs and to produce the re-encryption keys. Moreover, the

methodology is secure against insider threats and also enforces a forward and backward

access control. Furthermore, we formally analyze and verify the working of SeSPHR

methodology through High Level Petri Nets (HLPN). Performance evaluation with regard to

time consumption indicates that the SeSPHR methodology has potential to be employed for

securely sharing the PHRs in the cloud.

Furthermore, the cloud computing also integrates various important entities of

healthcare domains, such as patients, hospital staff including the doctors, nursing staff,

pharmacies, and clinical laboratory personnel, insurance providers, and the service providers.

Therefore, the integration of forementioned entities results in the evolution of a cost effective

and collaborative health ecosystem where the patients can easily create and manage their

Personal Health Records (PHRs). Generally, the PHRs contain information, such as: (a)

demographic information, (b) patients’ medical history including the diagnosis, allergies, past

surgeries, and treatments, (c) laboratory reports, (d) data about health insurance claims,

and (e) private notes of the patients about certain important observed health conditions.

Existing System: � Numerous methods have been employed to ensure the privacy of the PHRs stored on

the cloud servers. The privacy preserving approaches make sure confidentiality, integrity,

authenticity, accountability, and audit trial. Confidentiality ensures that the health

information is entirely concealed to the unsanctioned parties, whereas integrity deals with

maintaining the originality of the data, whether in transit or in cloud storage.

� Authenticity guarantees that the health-data is accessed by authorized entities only,

whereas accountability refers to the fact that the data access policies must comply with

the agreed upon procedures. Monitoring the utilization of health-data, even after access

to that has been granted is called audit trial.

Proposed System:

Page 2: (Project Code No. 18) SeSPHR: A Methodology for Secure

Regional Telecom Training Centre, BSNL-Hyderabad B.Tech CSE/IT Mini Project Abstracts 2019

Page 2 of 16 continued…

� We present a methodology called SeSPHR that permits patients to administer the sharing

of their own PHRs in the cloud.

� The SeSPHR methodology employs the El-Gamal encryption and proxy re-encryption to

ensure the PHR confidentiality.

� The methodology allows the PHR owners to selectively grant access to users over the

portions of PHRs based on the access level specified in the ACL for different groups of

users.

� A semi-trusted proxy called SRS is deployed to ensure the access control and to

generate the re-encryption keys for different groups of users thereby eliminating the key

management overhead at the PHR owner’s end.

� The forward and backward access control is also implemented in the proposed

methodology

� Formal analysis and verification of the proposed methodology is performed to validate its

working according to the specifications.

Architecture:

Literature Survey: Privacy-preserving multi-channel communication in Edge-of-Things

In this paper, we present a comprehensive analysis of the data security and privacy

threats, protection technologies, and countermeasures inherent in edge computing. Specifically,

we first make an overview of edge computing, including forming factors, definition,

architecture, and several essential applications. Next, a detailed analysis of data security and

privacy requirements, challenges, and mechanisms in edge computing are presented. Then,

the cryptography-based technologies for solving data security and privacy issues are

summarized. The state-of-the-art data security and privacy solutions in edge-related

paradigms are also surveyed. Finally, we propose several open research directions of data

security in the field of edge computing. A cloud based health insurance plan recommendation system: A user centered approach

Page 3: (Project Code No. 18) SeSPHR: A Methodology for Secure

Regional Telecom Training Centre, BSNL-Hyderabad B.Tech CSE/IT Mini Project Abstracts 2019

Page 3 of 16 continued…

This paper describes a collaborative project between the University of Sheffield's

iSchool and OCLC (an international library cooperative), the aim of which is to develop a

prototype recommender system for WorldCat.org, the aggregated catalogue of OCLC's

member libraries. This paper describes a user-centered approach, utilizing both qualitative

and quantitative methods, which aims to establish how and why users engage with library

catalogues and WorldCat.org in particular, whether there is a need for recommendations in

the library domain, and if so what type of recommendations best support the information

seeking needs of users. An outline of the proposed methodology is provided, along with a

report on work completed to date. An analysis of UK library catalogues shows the

prevalence of recommender systems to be very low, while initial results from focus group

interviews and a pop-up survey show a significant demand for recommendations from two

key user-groups (students and academics).

“Incremental proxy re-encryption scheme for mobile cloud computing environment,”

In this paper, we have proposed an incremental version of proxy re-encryption

scheme for improving the file modification operation and compared with the original version

of the proxy re-encryption scheme on the basis of turnaround time, energy consumption,

CPU utilization, and memory consumption while executing the security operations on mobile

device. The incremental version of proxy re-encryption scheme shows significant improvement

in results while performing file modification operations using limited processing capability of

mobile devices.

Software Requirements: Coding Language: JAVA, J2EE

Database: MySQL

OS: Windows 7

Tool: Netbeans 7.4

Hardware Requirements: CPU: Pentium Dual Core or above

RAM: 1 GB or above

HDD: 120GB or above

Refenrences:

� K. Gai, M. Qiu, Z. Xiong, and M. Liu, “Privacy-preserving multi-channel communication

in Edge-of-Things,” Future Generation Computer Systems, 85, 2018, pp. 190-200.

� K. Gai, M. Qiu, and X. Sun, “A survey on FinTech,” Journal of Network and Computer

Applications, 2017, pp. 1-12.

� A. Abbas, K. Bilal, L. Zhang, and S. U. Khan, “A cloud based health insurance plan

recommendation system: A user centered approach, “Future Generation Computer Systems,

vols. 43-44, pp. 99-109, 2015.

� A. N. Khan, ML M. Kiah, S. A. Madani, M. Ali, and S. Shamshirband, “Incremental

proxy re-encryption scheme for mobile cloud computing environment,” The Journal of

Supercomputing, Vol. 68, No. 2, 2014, pp. 624-651.

Page 4: (Project Code No. 18) SeSPHR: A Methodology for Secure

Regional Telecom Training Centre, BSNL-Hyderabad B.Tech CSE/IT Mini Project Abstracts 2019

Page 4 of 16 continued…

ABSTRACT (Project Code No. 19)

FaaSeC: Enabling Forensics-as-a-Service for Cloud Computing

Systems

Recent attacks on the cloud environment highlight the necessity for conducting

forensic investigations. But performing forensics in the cloud is different from traditional

environment. Conforming the same, National Institute of Standards and Technology (NIST)

listed more than 65 challenges for cloud forensics. Even though cloud is a XaaS

provider, Forensics-as-a-Service was not included in that list. There are various

technical, organizational and legal reasons for it. But, performing investigation in the cloud

environment is practically possible only if support from the Cloud Service Provider (CSP)

is made available. Our proposed model-FaaSeC can extend the forensic support from

CSP and make CSP to provide Forensics-as-a-Service (FaaS) to the investigator.

Index Terms— Cloud Computing; Digital Forensics; Log analysis; Event Reconstruction.

Existing System: For performing traditional digital forensics, the investigator may follow various

phases- Identification, Preservation, Collection, Examination, Analysis and Presentation. The

process involved in each phase cannot be directly applied to the cloud environment due

to the multi-tenancy, lack of transparency and rapid elasticity properties of cloud.

The investigator can be trustworthy and uses CFT for performing all the healthy

activities. The investigator can be untrusted and performs suspicious activities using CFT.

Here, an activity can be classified as healthy/suspicious based on the access control

policies given to the investigator. If he/she violates those policies then it comes in the

category of suspicious else it is treated as healthy activity. For example, if the

investigator accessed the data of a tenant for which he/she does not have permissions

then it falls in to the category of suspicious. Since the investigator is given the access

for the cloud infrastructure during the forensic process, he/she can exploit the opportunity

to perform any suspicious activity.

Disadvantages: � Since the investigator is given the access for the cloud infrastructure during the forensic

process, he/she can exploit the opportunity to perform any suspicious activity.

� The CSP is unaware of the activities being performed by the investigator when using

any CFT.

Proposed System: We designed a comprehensive forensic process such that the chances of CSP

providing forensic services to the investigator would increase (ii) the transparency in the

cloud forensic process is improved by creating forensic logs at the cloud end. (iii) We

propose two approaches namely SeMS and CoPS, which can automate the detection of

suspicious events/processes from forensic logs at the cloud end. Using SEMS and Cops

we can find suspicious sequences from cloud forensic application.

Page 5: (Project Code No. 18) SeSPHR: A Methodology for Secure

Regional Telecom Training Centre, BSNL-Hyderabad B.Tech CSE/IT Mini Project Abstracts 2019

Page 5 of 16 continued…

Advantages: � SeMS and CoPS are designed in such a way that, they can be applied to detect

suspicious sequences in any application log.

� FaaSeC Model gives the complete process of providing forensic as a service starting

from the investigator registration to report generation.

� The suspicious events from the CFI log were identified automatically without much

human effort.

Modules:

� Data User: In the first module, we develop the Data Owner Module. Owner Will Signup and

upload data to cloud server with private key and encryption. After Getting key Owner can

authenticate data using key, and upload any data related to users to cloud.

In this module, data owner will check the progress status of the file upload by

him/her. It has large data needed to be stored and shared in cloud system. In our

scheme, the entity is in charge of viewing his own data and executing Encrypt and key

generation operation. After the completion, owner logout the session

� Investigator Module: We develop Investigator Module. Investigator will register with application and

request for registration is sent to CSP for verification. After CSP accepts investigator

request then only he can login in to application.

Investigator can view data of any owner, which are uploaded by respective owner,

but he can’t view data directly without verification from data owner.

Investigator will send data view request to data owner who will respond to request

and authenticate by sending key, which is used to decrypt data.

� CSP: We develop cloud service provider module, which will handle authentication

and verification of investigator.

CSP can view all uploads of different users. CSP can’t view user data as it is in

encrypted state. He doesn’t have permission to view user data.

CSP will view investigator log files with time and owner name. Taking this data as

input for both algorithms (sems and cops) CSP will analyze which investigator is attacker.

Based on the output of algorithms he will finalize attackers and normal investigator and

unauthorized attackers.

� COPS and SEMS Model: We use TKS to initially get the top-k frequent item sequences. Then SEMS is

applied to get the suspicious sequences. Say, the CSP is interested to know the

suspicious sequences in CFI log, then each new sequence in the log during Time

Window T is compared with the frequent item sequences (freq seq). If a

mismatch occurs, the percentage of fraction left (per fractionLeft) will increase and if it is

more than the user threshold (thseq) value then it is considered as suspicious sequence.

We can also get the suspicious sequences of a cloud forensic application using

conditional probability. In COPS we use two methods for conditional probability

1. Threshold value checks

2. Key mismanagement.

Page 6: (Project Code No. 18) SeSPHR: A Methodology for Secure

Regional Telecom Training Centre, BSNL-Hyderabad B.Tech CSE/IT Mini Project Abstracts 2019

Page 6 of 16 continued…

System Architecture:

Software Requirements: Tool: Net beans 7.2.1

Coding Languages: Java / J2EE

Database: MySQL

OS: Windows 7

Hardware Requirements: Processor: Min Pentium-Dual core

RAM: Minimum 1 GB or above

HDD: Minimum 120GB

Conclusion: Recent attacks in the cloud systems show the importance of performing forensic

investigation in such environments. Forensics in the cloud environment is at a nascent

stage and requires the cloud provider support for facilitating FaaS. We proposed a new

Cloud Forensic Service model called FaaSeC. This model creates the forensic application

log in the cloud from which the CSP can know the activities performed by the third party

investigator. For forensic analysis, identifying the suspicious events plays a significant role

and we find those events from the cloud forensic application log using SeMS and CoPS.

We also compared both the approaches in terms of execution time and memory

consumption.

References: � BKSP Kumar, G. Meera, and G. Geethakumari. Cloud forensic investigation: A sneak-peek into

acquisition. 2015 International Conference on Computing and Network Communications (CoCoNet).

IEEE, 2015.

� Lee, Jooyoung, and Sungyong Un. Digital forensics as a service: A case study of forensic

indexed search. ICT Convergence (ICTC), 2012 International Conference on. IEEE, 2012.

� Grispos, George, Tim Storer, and William Bradley Glisson. Calm before the storm: the challenges

of cloud. Emerging digital forensics applications for crime detection, prevention, and security 4

(2013): 28-48.

� Van Baar, R. B., H. M. A. van Beek, and E. J. van Eijk. Digital Forensics as a Service: A

game changer. Digital Investigation 11 (2014): S54-S62.

Page 7: (Project Code No. 18) SeSPHR: A Methodology for Secure

Regional Telecom Training Centre, BSNL-Hyderabad B.Tech CSE/IT Mini Project Abstracts 2019

Page 7 of 16 continued…

ABSTRACT (Project Code No. 20)

A Three-Layer Privacy Preserving Cloud Storage Scheme Based on

Computational Intelligence in Fog Computing

Recent years witness the development of cloud computing technology. With the explosive

growth of unstructured data, cloud storage technology gets more attention and better development.

However, in current storage schema, user’s data is totally stored in cloud servers. In other words,

users lose their right of control on data and face privacy leakage risk. Traditional privacy protection

schemes are usually based on encryption technology, but these kinds of methods cannot effectively

resist attack from the inside of cloud server. In order to solve this problem, we propose a three-

layer storage framework based on fog computing. The proposed framework can both take full

advantage of cloud storage and protect the privacy of data. Besides, Hash-Solomon code algorithm

is designed to divide data into different parts. Then, we can put a small part of data in local

machine and fog server in order to protect the privacy. Moreover, based on computational

intelligence, this algorithm can compute the distribution proportion stored in cloud, fog, and local

machine, respectively. Through the theoretical safety analysis and experimental evaluation, the

feasibility of our scheme has been validated, which is really a powerful supplement to existing cloud

storage scheme.

Existing System: � User uploads data to the cloud server directly. Subsequently, the Cloud Server Provider

(CSP) will take place of user to manage the data. In consequence, users do not actually

control the physical storage of their data, which results in the separation of ownership and

management of data.

� In order to solve the privacy issue in cloud computing, previous researches proposed a

privacy-preserving and copy-deterrence CBIR scheme using encryption and watermarking

techniques. This scheme can protect the image content and image features well from the

semi-honest cloud server, and deter the image user from illegally distributing the retrieved

images.

� Previous works consider that in traditional situation, user’s data is stored through CSP, even if

CSP is trustworthy, attackers can still get user’s data if they control the cloud storage

management node. To avoid this problem, they propose an encrypted index structure based on

an asymmetric challenge-response authentication mechanism. When user requests data from

cloud server, the user sends a password to the server for identification. Taking it into

consideration that the password may be intercepted, the structure uses asymmetric response

mode.

Disadvantages: The CSP can freely access and search the data stored in the cloud. Meanwhile the

attackers can also attack the CSP server to obtain the user’s data. The above two cases both

make users fell into the danger of information leakage and data loss. Traditional secure cloud

storage solutions for the above problems are usually focusing on access restrictions or data

encryption.

Proposed System: However, all of these solutions cannot solve the internal attack well, no matter how the

algorithm improves. There fore, we propose a TLS scheme based on fog computing model. Fog

computing is an extended computing model based on cloud computing which is composed of a lot

of fog nodes. These nodes have a certain storage capacity and processing capability. In our

Page 8: (Project Code No. 18) SeSPHR: A Methodology for Secure

Regional Telecom Training Centre, BSNL-Hyderabad B.Tech CSE/IT Mini Project Abstracts 2019

Page 8 of 16 continued…

scheme, we split user’s data into three parts and separately save them in the cloud server, the fog

server and the user’s local machine.

We propose a new secure cloud storage scheme in this paper. By dividing file with specific

code and combining with TLS framework based on fog computing model, we can achieve high

degree privacy protection of data. It does not mean that we abandon the encryption technology. In

our scheme encryption also help us to protect fine-grained secure of the data.

Advantages: � Compared with traditional methods, our scheme can provide a higher privacy protection from

interior, especially from the CSPs.

� From a business perspective, company with high security degree will attract more users.

Therefore improving security is a crucial goal no matter in academia or business. In this

section, we will elaborate in detail, how the TLS framework protects the data privacy, the

implementation details of workflow and the theoretical safety and efficiency analysis of the

storage scheme.

Architecture:

Software Requirements: Language: JAVA / J2EE

Tool: Netbeans 7.4

Database: My SQL

OS: Windows 7

Hardware Requirements: CPU: Pentium- Dual core or above

RAM: 1 GB or above

HDD: 120 GB or above

References: � P. Mell and T. Grance, “The NIST definition of cloud computing,” Nat.Inst. Stand. Technol., vol. 53, no.

6, pp. 50–50, 2009.

� H. T. Dinh, C. Lee, D. Niyato, and P. Wang, “A survey of mobile cloud computing: Architecture,

applications, and approaches,” Wireless Commun. Mobile Comput., vol. 13, no. 18, pp. 1587–1611, 2013.

� J. Chase, R. Kaewpuang, W. Yonggang, and D. Niyato, “Joint virtual machine and bandwidth allocation

in software defined network (sdn) and cloud computing environments,” in Proc. IEEE Int. Conf.

Commun., 2014, pp. 2969–2974.

� H. Li, W. Sun, F. Li, and B. Wang, “Secure and privacy-preserving data storage service in public

cloud,” J. Comput. Res. Develop., vol. 51, no. 7, pp. 1397–1409, 2014.

� Y. Li, T.Wang, G.Wang, J. Liang, and H. Chen, “Efficient data collection in sensor-cloud system with

multiple mobile sinks,” in Proc. Adv. Serv. Comput., 10th Asia-Pac. Serv. Comput. Conf., 2016, pp.

130–143.

Page 9: (Project Code No. 18) SeSPHR: A Methodology for Secure

Regional Telecom Training Centre, BSNL-Hyderabad B.Tech CSE/IT Mini Project Abstracts 2019

Page 9 of 16 continued…

ABSTRACT (Project Code No. 21)

Encrypted Video Steganography – JSP Web application This application project is a data security application for hiding sensitive textual

information inside a video in an encrypted format. When information is hidden inside video

in program or person hiding the information using DES algorithm .The Data Encryption

Standard (DES) is a symmetric-key block cipher published by the National Institute of

Standards and Technology (NIST). Steganography in videos is similar to that of

steganography in images, apart from information is hidden in each frame of video. White

space and tabs occur naturally in documents, so there is not really any possible way using

method of steganography would cause someone to be suspicious.

Existing System: The existing system is an Image steganogarphy but this has a limitation of amount of

data that could be stored particularly if the size of the data after encryption is enormous.

Disadvantages: Size of data to hide is a limitation Image is to be large in size More number of

image bits are to be used for steganographic hiding using algorithms like LSB.

Proposed System: The proposed system is more robust and can hide enormous data in it as it is a

video file that hides the actual data unlike images.

Modules: 1) Sending Message:

The sender can send a message to the destination more securely. This can be

done by attaching a video file to the message. So the third party can be unaware the

secret message. They think that a video file is sending and they not at all know about

this secret sending of the message.

2) Encryption Module:

In this a sender can encrypt a file by entering a key. The same key must be

entered during the decryption process

3) Decryption Module:

This process can be done by entering the key that previously entered during the

Encryption process. If the entered key is wrong the message won’t be received correctly

4) Receiving Message Module:

In this the Receiver can receive the hidden message by the decryption process.

In this the user enter the same key as the sender sends. The receiver can receive the

message by correctly entering the key.

Software Requirements: Front-end: JAVA/JSP, JDK 1.7 Web server: APACHE TOMCAT

Tool (IDE): Netbeans

OS: Windows XP/Vista/8/8.1

Hardware Requirements: CPU: Pentium-IV, 1GHz or above

RAM: 1 GB or above

HDD: 80 GB or above

Page 10: (Project Code No. 18) SeSPHR: A Methodology for Secure

Regional Telecom Training Centre, BSNL-Hyderabad B.Tech CSE/IT Mini Project Abstracts 2019

Page 10 of 16 continued…

ABSTRACT (Project Code No. 22)

Automated File Transfer and Folder synchronization in

Network Based Systems – JAVA

This project is a novel idea of implementing preliminary Robotic Conversations

between computers based entirely on Java Technology, thereby setting a new trend of

creating speaking devices (to start with computers), that exchange a formal conversation

between them, when initiated to make a conversation by the user. The project is based on

network programming and shall include socket based reception of voice conversation

converted to text and text converted to voice between any two computers that start a formal

talk with each other and finally end up with synchronizing any changes in a particular folder

in one of the systems with that in another system so that the latest files are transferred

automatically to the receiving system periodically.

Existing System: The existing system has computers that only can interact with a text based data

transfer between systems with human intervention and thus cannot speak or communicate

with each other and automatically synchronize file transfers periodically.

Disadvantage: 1. This type of a system is not very useful in Robotics

2. Often Robotic systems should understand voice-based commands and respond

to them. This is not existing in the current or existing system

Proposed System: The proposed system is a preliminary Voice conversation system between computers

that exchanges text between two computers for the equivalent voice generated by any of

the two system that are talking to each other for periodic synchronization of a particular

shared folder for automatic synchronization of files between sender system and receiving

system.

Advantage: 1. Particularly very useful in Robotics.

2. Efficient voice based Interaction is very useful in Robotics where the

background exchange is through socket programming.

Modules:

• Socket Based Data Exchange Module:

This module is particularly useful for exchanging data between the two

computers for efficient voice based interaction

• Text to Voice Conversion Module:

The text data received in the network is verified and a suitable text to voice

conversion is done for the reply text that has to be spoken out by each computer at

their respective ends.

Page 11: (Project Code No. 18) SeSPHR: A Methodology for Secure

Regional Telecom Training Centre, BSNL-Hyderabad B.Tech CSE/IT Mini Project Abstracts 2019

Page 11 of 16 continued…

• Folder Synchronization Module:

This module is required to start a formal conversation between any two

computers for starting voice based conversation that in the background uses socket

programming to automate the file transfer mechanism from sender to receiver from a

particular synchronized folder

• Database Module:

This module is for selecting question-based interaction between sender and

receiver for speech conversation and automatic file transfer from a synchronized folder

in the sender.

Software Requirements:

FrontEnd: JDK 1.7, JAVA Network Programming

Back End: My SQL Server 5.1 or DerbyDB

OS: Windows XP/Vista/7/8/8.1 or Linux

APIs: Free TTS

Audio: Realtek or High definition Audio Drivers

Hardware Requirements: CPU: Pentium-IV or above with 1 GHz

RAM: 1 GB or above

HDD: 80GB or above

Speakers: Creative or any other

standard (Not required for Laptop)

Page 12: (Project Code No. 18) SeSPHR: A Methodology for Secure

Regional Telecom Training Centre, BSNL-Hyderabad B.Tech CSE/IT Mini Project Abstracts 2019

Page 12 of 16 continued…

ABSTRACT (Project Code No. 23)

Encrypted Audio Steganography – For security against Audio Piracy

This application project is a data security application for hiding sensitive Audio

information inside a video in an encrypted format. When information is hidden inside video

in program or person hiding the information will usually use the discrete cosine transform

(DCT) method. DCT works by slightly changing the each of the images in the video, only

so much so it is not noticeable by the human eye. To be more precise about how DCT

works, DCT alters values of certain parts of the images, it usually rounds them up. For

example if part of an image has a value of 6.667 it will round up to 7. Steganography in

videos is similar to that of steganography in images, apart from information is hidden in

each frame of video. White space and tabs occur naturally in documents, so there is not

really any possible way using method of steganography would cause someone to be

suspicious

Existing System: The existing system is an Image steganogarphy but this has a limitation of amount of

data that could be stored particularly if the size of the data after encryption is enormous.

Disadvantages: 1) Size of data to hide is a limitation

2) Image is to be large in size 3) More number of image bits are to be used for steganographic hiding using algorithms like LSB

Proposed System: The proposed system is more robust and can hide enormous data in it as it is a

video file that hides the actual data unlike images.

Advantages: 1) Large data could be hidden in a video file

2) Video file is usually large and hence no suspicion about the file would arise

3) Only rounding off certain parts of the video frames is done by DCT and thus enormous

encrypted data could be stored in a video.

Modules: 1) Sending message: The sender can send a message to the destination more securely.

This can be done by attaching a video file to the message. So the third party can be

unaware the secret message. They think that a video file is sending and they not at all

know about this secret sending of the message.

2) Encryption module: In this a sender can encrypt a file by entering a key. The same

key must be entered during the decryption process.

Page 13: (Project Code No. 18) SeSPHR: A Methodology for Secure

Regional Telecom Training Centre, BSNL-Hyderabad B.Tech CSE/IT Mini Project Abstracts 2019

Page 13 of 16 continued…

3) Decryption Module: This process can be done by entering the key that previously

entered during the Encryption process. If the entered key is wrong the message won’t

be received correctly.

4) Receiving Message: In this the Receiver can receive the hidden message by the

decryption process. In this the user enter the same key as the sender sends. The

receiver can receive the message by correctly entering the key.

Software Requirements: Front End: JAVA, JDK1.7

OS: Windows XP/7/8/8.1 or Linux

APIs: freeTTS

Hardware Requirements: CPU: Pentium-IV or above with 1 GHz

RAM: 1 GB or above

HDD: 80GB or above

Page 14: (Project Code No. 18) SeSPHR: A Methodology for Secure

Regional Telecom Training Centre, BSNL-Hyderabad B.Tech CSE/IT Mini Project Abstracts 2019

Page 14 of 16 continued…

ABSTRACT (Project Code No. 24)

An XML Database System for storing web data in a secure manner - Java

This project is a novel idea of implementing Encrypted XML as database for secure

storage of data in a web application with features to retrieve this data in a decrypted format

and process it for use in the web application for retrieving various files or data in the web

application.

This would prove to be a secure and license free database for the development of any

web application based on XML storage. A powerful MD5 Algorithm has to be used in this

project for secure web transactions and XML data storage in an encrypted format.

Existing System: 1. The existing system uses traditional databases for any web application.

Examples: Oracle, MySQL Server, MS SQL Server etc..

2. Licensing Issues arise when using some of these databases.

3. Security is preliminary only.

Proposed System: 1. The proposed system uses XML in an Encrypted format as database for any web

application to be designed.

2. No Licensing Issues as XML is absolutely free.

3. Security is enhanced with the usage of powerful MD5 algorithm for encrypting the

stored data.

Modules: 1. Login Module: This module authenticates the web application by using a secure encrypted

list of authentic users along with their encrypted passwords respectively for entering into

the application.

2. File Upload Module: This module uploads files into the web server for their retrieval later

by the authenticated users. It stores the encrypted paths of the files in XML Database

using MD5 algorithm.

3. File Download Module: This module uses the decryption of MD5 algorithm for getting the

exact path stored as encrypted path in the XML Database for displaying or downloading

files form the Web Application.

4. Change Password: This module is useful for changing the existing passwords of users

in an encrypted format and storing them in XML Database.

5. Admin Module: This module is for performing admin operations like managing existing

users & managing files uploaded etc. This module also contains an encrypted admin

password for admin login. This also could be stored in separate or same XML file.

Software Requirements: Front End: Java Server Pages, JDK1.7, Apache Tomcat 7.0

Languages: Java, HTML, JQuery, Java Script

Back End: MySQL Server 5.1

Data Source: My SQL ODBC Driver 5.1

Hardware Requirements: Processor: Pentium-IV or above

RAM: Minimum 1 GB

HDD: Minimum 40GB

Page 15: (Project Code No. 18) SeSPHR: A Methodology for Secure

Regional Telecom Training Centre, BSNL-Hyderabad B.Tech CSE/IT Mini Project Abstracts 2019

Page 15 of 16 continued…

ABSTRACT (Project Code No. 25)

A Server based Android SDP Video Call

This is a boot-strap based Android App for making a Video Call using SDP

(Session Description Protocol) protocol in a Wi-Fi network. The call initiates from an

Android Mobile and the other Android Mobile willing to connect to this Video Call should

access this call through its app again. The app is to be installed in both the server and

client phones for connecting to the video call.

Existing System: The existing system is a audio call like in whatsapp. This feature of video call

doesn't exist in this app.

Proposed System: The proposed system is to develop an app for making video call from IP network

using a server based SDP call.

Advantages: 1) GSM Network need not be used always for a video call.

2) Sender and receiver can observe their live videos streaming from their phone cameras.

Modules: 1) Server Module: In this module, the code for handling live video streaming is to be

developed for establishing a video call between the two user android mobiles from their

respective android apps. This is to be done using HTML5, SDP (Session Description

Protocol) and JSP.

2) Client Module: In this the code is to be developed in android for connecting to the

Server in a Wi-Fi environment (which could be a LAN/WAN) depending on whether

server is having a public or private IP Address.

3) Server Login Module: This is a login required for the client to login to the server before

making or receiving a video call.

Software Requirements: Front-End: HTML5, Jquery, JSP,

Javascript-Angular.js OS: Server - Windows / Linux / MAC

Mobile – Android

Coding Languages: JAVA 1.7, JSP, Servlets,

Android SDK programming

Web server: Apache Tomcat 7.0

Hardware Requirements: CPU: Pentium-IV or above with 2.4 GHz

RAM: 1 GB or above

HDD: 160 GB or above

Page 16: (Project Code No. 18) SeSPHR: A Methodology for Secure

Regional Telecom Training Centre, BSNL-Hyderabad B.Tech CSE/IT Mini Project Abstracts 2019

Page 16 of 16 continued…

ABSTRACT (Project Code No. 26)

Task schedule Server SMS App This is an android app for scraping the Tasks of employees on the Task

Scheduler website to send SMS messages to these employees every day at 09:30 AM,

the information about their official tasks load on that day. It’s a scheduled app that runs

everyday automatically to show the task load to the respective employees who have

specific tasks on that particular day. It runs as an automated thread in the admin

android mobile to send SMS to the employees from it.

Existing System: In the existing system, there is no such app to automatically schedule and send

SMS of task to employees from an android mobile everyday.

Disadvantages of Existing System: � Every day employee has to visit the website for knowing his task.

� No Co-ordination and possibility of missing lecture schedule sometimes.

Proposed System: In the proposed system, an automated thread runs once daily in the android

mobile of admin to scrape that day's task schedule and send messages to only

respective employee who have load that same day well before the first hour (say 09:30

AM)

Advantages of Proposed System: � Good and Convenient Co-ordination between Admin and Employees.

� No need to manually verify lecture load daily in the website.

Module & description:

� Scheduling Thread Module: This module is for running a thread everyday in the

android mobile of admin to start scraping process.

� Web Scraping Module: This module is for getting the contents of a particular day

timetable once the thread has started.

� Filter Module: This is for filtering those mobile numbers of employees who have tasks

on that particular day

� SMS Sender Module: This automatically selects the filtered mobile numbers and sends

the task load respectively to these numbers on that day.

� WebServer Module: This is for entering daily task load occasionally by the admin

once in 15 days.

Software Requirements: Front-End: JSON, Java, Android SDK

Webserver: Apache Tomcat 7.0

Back-End: MySQL Server 5.1 or above

IDE: Android Studio

OS: Windows 7/8/8.1/10 or Linux or MAC

Hardware Requirements: Processor: Intel i3 or above

RAM: Minimum 4 GB