21
Decentralized File sharing Group Id: 02 Sponsored By : HarďiŶger “ysteŵs Internal Guide : Prof. M. R. Khodaskar. External Guide : Mr. Prashant Sachdev. Pune Institute Of Computer Technology ,Pune- 411043 Name Roll No. Jayashree Saraf B120058624 Pooja Patil B120058607 Sharayu Shinde B120058633

Decentrailzed File Sharing

Embed Size (px)

Citation preview

Decentralized File sharing

Group Id: 02

Sponsored By : Har i ger “yste s

Internal Guide : Prof. M. R. Khodaskar.

External Guide : Mr. Prashant Sachdev.

Pune Institute Of Computer

Technology ,Pune- 411043

Name Roll No.

Jayashree Saraf B120058624

Pooja Patil B120058607

Sharayu Shinde B120058633

• Presentation Overview -

lProblem Statement

lAbstract

lDetail design.

lExperimental Result

lPerformance evaluation

lTest cases

lResult analysis and conclusion

lFinal thesis

lProject Plan

Decentralized File Sharing

1 Group id:-2

• Problem Statement –

Developing Decentralized Distributed(P2P)

Responsive Web Application for sharing data like contact

list , files, messages, image, music etc .

2 Group id:-2

Decentralized File Sharing

• Abstract -

3

The process of distributing various terms like things,

powers or people rather than storing it on a central

location or authority is nothing but decentralization. To

avoid central point of failure, the appli atio ’s data

must be cryptographically stored.

To create a platform which allows the user’s to share or

store their data on network without the centralized

server and can be uploaded in distributed network.

Group id:-2

Decentralized File Sharing

• File Segmentation –

The file being distributed is divided into segments called

pieces.

4

Group id:-2

Fig 2:- File Segmentation and Encryption.

Decentralized File Sharing

• Hashing-[SHA-256]

SHA-256 algorithm generates an unique, fixed size256-bit (32-

byte) hash.

5

Fig 3:- SHA-1 Encryption Process

Group id:-2

Initialize

hash values Pre- processing Spilt and

Rotation XoR Rounding

K Message Digest

Message

W

Decentralized File Sharing

•File encryption and decryption is done in order to

provide security to the user data.

•The encryption algorithm used is AES which includes the

process of encryption which provides specially derived

keys also known as round keys.

•The round keys are applied to the array of data that

holds one lock of data that is to be encrypted.

• Encryption/Decryption

• AES

6 Group id:-2

Decentralized File Sharing

• Project Architecture-

7

Fig 7:- Project Architecture

Group id:-2

Encryptio

n

[AES]

Assemble

Splits

Decryption

[AES]

SHA256

SHA256

SHA256

File

File

Split1

Split2

Split n Node

Node

Node

Distributed

table

Distributed

table

Distributed

table

Decentralized File Sharing

8

Group id:-2 Decentralized File Sharing

lWelcome Page -

• User Log In -

9

Decentralized

File sharing Group id:-2

• Registration -

10 Group id:-2

Decentralized File Sharing

11 Group id:-2

• Upload File-

Decentralized File Sharing

• Uploaded Input File -

12 Decentralized File Sharing

Group id:-2

• Members -

13 Group id:-2 Decentralized File Sharing

Testing-

Case ID Test Case

Name

Inputs Expected

Output

Actual Output Remark

1. User

registration

validation.

Enter required

information.

User should

get

registered.

User

registration is

done.

Yes

2. Invalid user

registration.

Enter invalid

field while

registration.

Message pop

up of invalid

field.

Display

message pop

up.

No

3. User log in

validation.

Enter user name

and password.

Access to user

profile.

Gives access to

user profile.

Yes

4. Invalid user log

in.

Enter incorrect

user name/

password.

Message pop

up of invalid

user name/

password.

Display

message pop

up.

No

Test cases for Module 1: User account and maintenance.

14

Decentralized File Sharing

Test cases for Module 2: File Encryption/Decryption.

Case ID Test Case

Name

Inputs Expected

Output

Actual

Output

Remark

1. File

encryption.

Text file. File should

get

encrypted.

Encrypted

file.

Yes

2. File

decryption.

Encrypted

file.

File should

get

decrypted.

Original file. No

15 Group id:-2 Decentralized File Sharing

Test cases for Module 3: Segment Files into pieces.

Case ID Test Case

Name

Inputs Expected

Output

Actual Output Remar

k

1. File

segmentatio

n.

Encrypted

Text file.

Segment

file into

pieces of

1kb each.

Segmentation

is done.

Yes

Test cases for Module 4: Distributed hash table generation.

Case ID Test Case

Name

Inputs Expected

Output

Actual Output Remar

k

1. DHT

generation.

A Segment of

file.

Distributed

hash

generated

for each

hash.

Distributed

hash is

generated.

Yes

16

• Future Work-

1.Creating digital coins.

1.Maintaining Wallet for User’s Coin.

1.Convert Coins into User’s suitable currency.

17

Group id:-2 Decentralized File Sharing

B

Segment file

into piece of

size 16-bits

17.5

A

User account and

maintenance

10.33

C

Encryption/decryp

tion of pieces of

file

20

D

Distributed

hash table using

Pastry

22.83

E

Block-Chain

based network

for managing

transaction

records

22

Thank

You

Any

Questions