SlideShare a Scribd company logo
1 of 21
Download to read offline
Decentralized File sharing
Group Id: 02
Sponsored By : Har i ger “yste s
Internal Guide : Prof. M. R. Khodaskar.
External Guide : Mr. Prashant Sachdev.
Pune Institute Of Computer
Technology ,Pune- 411043
Name Roll No.
Jayashree Saraf B120058624
Pooja Patil B120058607
Sharayu Shinde B120058633
• Presentation Overview -
lProblem Statement
lAbstract
lDetail design.
lExperimental Result
lPerformance evaluation
lTest cases
lResult analysis and conclusion
lFinal thesis
lProject Plan
Decentralized File Sharing
1Group id:-2
• Problem Statement –
Developing Decentralized Distributed(P2P)
Responsive Web Application for sharing data like contact
list , files, messages, image, music etc .
2Group id:-2
Decentralized File Sharing
• Abstract -
3
The process of distributing various terms like things,
powers or people rather than storing it on a central
location or authority is nothing but decentralization. To
avoid central point of failure, the appli atio ’s data
must be cryptographically stored.
To create a platform which allows the user’s to share or
store their data on network without the centralized
server and can be uploaded in distributed network.
Group id:-2
Decentralized File Sharing
• File Segmentation –
The file being distributed is divided into segments called
pieces.
4Group id:-2
Fig 2:- File Segmentation and Encryption.
Decentralized File Sharing
• Hashing-[SHA-256]
SHA-256 algorithm generates an unique, fixed size256-bit (32-
byte) hash.
5
Fig 3:- SHA-1 Encryption Process
Group id:-2
Initialize
hash values Pre- processing
Spilt and
Rotation
XoR Rounding
K
Message Digest
Message
W
Decentralized File Sharing
•File encryption and decryption is done in order to
provide security to the user data.
•The encryption algorithm used is AES which includes the
process of encryption which provides specially derived
keys also known as round keys.
•The round keys are applied to the array of data that
holds one lock of data that is to be encrypted.
• Encryption/Decryption
• AES
6Group id:-2
Decentralized File Sharing
• Project Architecture-
7
Fig 7:- Project Architecture
Group id:-2
Encryptio
n
[AES]
Assemble
Splits
Decryption
[AES]
SHA256
SHA256
SHA256
File
File
Split1
Split2
Split n Node
Node
Node
Distributed
table
Distributed
table
Distributed
table
Decentralized File Sharing
8
Group id:-2 Decentralized File Sharing
lWelcome Page -
• User Log In -
9
Decentralized
File sharingGroup id:-2
• Registration -
10
Group id:-2
Decentralized File Sharing
11Group id:-2
• Upload File-
Decentralized File Sharing
• Uploaded Input File -
12Decentralized File SharingGroup id:-2
• Members -
13Group id:-2
Decentralized File Sharing
Testing-
Case ID Test Case
Name
Inputs Expected
Output
Actual Output Remark
1. User
registration
validation.
Enter required
information.
User should
get
registered.
User
registration is
done.
Yes
2. Invalid user
registration.
Enter invalid
field while
registration.
Message pop
up of invalid
field.
Display
message pop
up.
No
3. User log in
validation.
Enter user name
and password.
Access to user
profile.
Gives access to
user profile.
Yes
4. Invalid user log
in.
Enter incorrect
user name/
password.
Message pop
up of invalid
user name/
password.
Display
message pop
up.
No
Test cases for Module 1: User account and maintenance.
14
Decentralized File Sharing
Test cases for Module 2: File Encryption/Decryption.
Case ID Test Case
Name
Inputs Expected
Output
Actual
Output
Remark
1. File
encryption.
Text file. File should
get
encrypted.
Encrypted
file.
Yes
2. File
decryption.
Encrypted
file.
File should
get
decrypted.
Original file. No
15Group id:-2 Decentralized File Sharing
Test cases for Module 3: Segment Files into pieces.
Case ID Test Case
Name
Inputs Expected
Output
Actual Output Remar
k
1. File
segmentatio
n.
Encrypted
Text file.
Segment
file into
pieces of
1kb each.
Segmentation
is done.
Yes
Test cases for Module 4: Distributed hash table generation.
Case ID Test Case
Name
Inputs Expected
Output
Actual Output Remar
k
1. DHT
generation.
A Segment of
file.
Distributed
hash
generated
for each
hash.
Distributed
hash is
generated.
Yes
16
• Future Work-
1.Creating digital coins.
1.Maintaining Wallet for User’s Coin.
1.Convert Coins into User’s suitable currency.
17
Group id:-2 Decentralized File Sharing
B
Segment file
into piece of
size 16-bits
17.5
A
User account and
maintenance
10.33
C
Encryption/decryp
tion of pieces of
file
20
D
Distributed
hash table using
Pastry
22.83
E
Block-Chain
based network
for managing
transaction
records
22
Thank
You
Any
Questions

More Related Content

Similar to Decentrailzed File Sharing

IRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET-Using Downtoken Secure Group Data Sharing on CloudIRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET-Using Downtoken Secure Group Data Sharing on CloudIRJET Journal
 
ISSC340_Presentation_Ronald_Averion.pptxNAME Ronald Averi.docx
ISSC340_Presentation_Ronald_Averion.pptxNAME Ronald Averi.docxISSC340_Presentation_Ronald_Averion.pptxNAME Ronald Averi.docx
ISSC340_Presentation_Ronald_Averion.pptxNAME Ronald Averi.docxchristiandean12115
 
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud MembersAn Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud MembersIRJET Journal
 
IRJET- Document Management System, Open Source and Secure
IRJET-  	  Document Management System, Open Source and SecureIRJET-  	  Document Management System, Open Source and Secure
IRJET- Document Management System, Open Source and SecureIRJET Journal
 
Changing the Curation Equation: A Data Lifecycle Approach to Lowering Costs a...
Changing the Curation Equation: A Data Lifecycle Approach to Lowering Costs a...Changing the Curation Equation: A Data Lifecycle Approach to Lowering Costs a...
Changing the Curation Equation: A Data Lifecycle Approach to Lowering Costs a...SEAD
 
SEAD Datanet and Sustainability Science
SEAD Datanet and Sustainability Science SEAD Datanet and Sustainability Science
SEAD Datanet and Sustainability Science Robert H. McDonald
 
Managing data in computational edge clouds
Managing data in computational edge cloudsManaging data in computational edge clouds
Managing data in computational edge cloudsNitinder Mohan
 
Virtual Knowledge Graphs for Federated Log Analysis
Virtual Knowledge Graphs for Federated Log AnalysisVirtual Knowledge Graphs for Federated Log Analysis
Virtual Knowledge Graphs for Federated Log AnalysisKabul Kurniawan
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET Journal
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET Journal
 
Research Data Management Fundamentals for MSU Engineering Students
Research Data Management Fundamentals for MSU Engineering StudentsResearch Data Management Fundamentals for MSU Engineering Students
Research Data Management Fundamentals for MSU Engineering StudentsAaron Collie
 
A self destruction system for dynamic group data sharing in cloud
A self destruction system for dynamic group data sharing in cloudA self destruction system for dynamic group data sharing in cloud
A self destruction system for dynamic group data sharing in cloudeSAT Publishing House
 
Data management for TA's
Data management for TA'sData management for TA's
Data management for TA'saaroncollie
 
IRJET- A Survey on File Storage and Retrieval using Blockchain Technology
IRJET- A Survey on File Storage and Retrieval using Blockchain TechnologyIRJET- A Survey on File Storage and Retrieval using Blockchain Technology
IRJET- A Survey on File Storage and Retrieval using Blockchain TechnologyIRJET Journal
 
Methodology for Optimizing Storage on Cloud Using Authorized De-Duplication –...
Methodology for Optimizing Storage on Cloud Using Authorized De-Duplication –...Methodology for Optimizing Storage on Cloud Using Authorized De-Duplication –...
Methodology for Optimizing Storage on Cloud Using Authorized De-Duplication –...IRJET Journal
 
Mona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudMona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudAvinash K S
 
IRJET- Multiple Keyword Search for Encrypted Cloud Storage
IRJET- Multiple Keyword Search for Encrypted Cloud StorageIRJET- Multiple Keyword Search for Encrypted Cloud Storage
IRJET- Multiple Keyword Search for Encrypted Cloud StorageIRJET Journal
 
Overview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyOverview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyLiwei Ren任力偉
 

Similar to Decentrailzed File Sharing (20)

IRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET-Using Downtoken Secure Group Data Sharing on CloudIRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET-Using Downtoken Secure Group Data Sharing on Cloud
 
ISSC340_Presentation_Ronald_Averion.pptxNAME Ronald Averi.docx
ISSC340_Presentation_Ronald_Averion.pptxNAME Ronald Averi.docxISSC340_Presentation_Ronald_Averion.pptxNAME Ronald Averi.docx
ISSC340_Presentation_Ronald_Averion.pptxNAME Ronald Averi.docx
 
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud MembersAn Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
 
IRJET- Document Management System, Open Source and Secure
IRJET-  	  Document Management System, Open Source and SecureIRJET-  	  Document Management System, Open Source and Secure
IRJET- Document Management System, Open Source and Secure
 
Changing the Curation Equation: A Data Lifecycle Approach to Lowering Costs a...
Changing the Curation Equation: A Data Lifecycle Approach to Lowering Costs a...Changing the Curation Equation: A Data Lifecycle Approach to Lowering Costs a...
Changing the Curation Equation: A Data Lifecycle Approach to Lowering Costs a...
 
SEAD Datanet and Sustainability Science
SEAD Datanet and Sustainability Science SEAD Datanet and Sustainability Science
SEAD Datanet and Sustainability Science
 
Managing data in computational edge clouds
Managing data in computational edge cloudsManaging data in computational edge clouds
Managing data in computational edge clouds
 
Organising and Documenting Data
Organising and Documenting DataOrganising and Documenting Data
Organising and Documenting Data
 
Virtual Knowledge Graphs for Federated Log Analysis
Virtual Knowledge Graphs for Federated Log AnalysisVirtual Knowledge Graphs for Federated Log Analysis
Virtual Knowledge Graphs for Federated Log Analysis
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
 
Research Data Management Fundamentals for MSU Engineering Students
Research Data Management Fundamentals for MSU Engineering StudentsResearch Data Management Fundamentals for MSU Engineering Students
Research Data Management Fundamentals for MSU Engineering Students
 
A self destruction system for dynamic group data sharing in cloud
A self destruction system for dynamic group data sharing in cloudA self destruction system for dynamic group data sharing in cloud
A self destruction system for dynamic group data sharing in cloud
 
Forensics Analysis and Validation
Forensics Analysis and Validation  Forensics Analysis and Validation
Forensics Analysis and Validation
 
Data management for TA's
Data management for TA'sData management for TA's
Data management for TA's
 
IRJET- A Survey on File Storage and Retrieval using Blockchain Technology
IRJET- A Survey on File Storage and Retrieval using Blockchain TechnologyIRJET- A Survey on File Storage and Retrieval using Blockchain Technology
IRJET- A Survey on File Storage and Retrieval using Blockchain Technology
 
Methodology for Optimizing Storage on Cloud Using Authorized De-Duplication –...
Methodology for Optimizing Storage on Cloud Using Authorized De-Duplication –...Methodology for Optimizing Storage on Cloud Using Authorized De-Duplication –...
Methodology for Optimizing Storage on Cloud Using Authorized De-Duplication –...
 
Mona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudMona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloud
 
IRJET- Multiple Keyword Search for Encrypted Cloud Storage
IRJET- Multiple Keyword Search for Encrypted Cloud StorageIRJET- Multiple Keyword Search for Encrypted Cloud Storage
IRJET- Multiple Keyword Search for Encrypted Cloud Storage
 
Overview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyOverview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) Technology
 

Recently uploaded

(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendArshad QA
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
Clustering techniques data mining book ....
Clustering techniques data mining book ....Clustering techniques data mining book ....
Clustering techniques data mining book ....ShaimaaMohamedGalal
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 

Recently uploaded (20)

(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and Backend
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Clustering techniques data mining book ....
Clustering techniques data mining book ....Clustering techniques data mining book ....
Clustering techniques data mining book ....
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Exploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the ProcessExploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the Process
 

Decentrailzed File Sharing

  • 1. Decentralized File sharing Group Id: 02 Sponsored By : Har i ger “yste s Internal Guide : Prof. M. R. Khodaskar. External Guide : Mr. Prashant Sachdev. Pune Institute Of Computer Technology ,Pune- 411043 Name Roll No. Jayashree Saraf B120058624 Pooja Patil B120058607 Sharayu Shinde B120058633
  • 2. • Presentation Overview - lProblem Statement lAbstract lDetail design. lExperimental Result lPerformance evaluation lTest cases lResult analysis and conclusion lFinal thesis lProject Plan Decentralized File Sharing 1Group id:-2
  • 3. • Problem Statement – Developing Decentralized Distributed(P2P) Responsive Web Application for sharing data like contact list , files, messages, image, music etc . 2Group id:-2 Decentralized File Sharing
  • 4. • Abstract - 3 The process of distributing various terms like things, powers or people rather than storing it on a central location or authority is nothing but decentralization. To avoid central point of failure, the appli atio ’s data must be cryptographically stored. To create a platform which allows the user’s to share or store their data on network without the centralized server and can be uploaded in distributed network. Group id:-2 Decentralized File Sharing
  • 5. • File Segmentation – The file being distributed is divided into segments called pieces. 4Group id:-2 Fig 2:- File Segmentation and Encryption. Decentralized File Sharing
  • 6. • Hashing-[SHA-256] SHA-256 algorithm generates an unique, fixed size256-bit (32- byte) hash. 5 Fig 3:- SHA-1 Encryption Process Group id:-2 Initialize hash values Pre- processing Spilt and Rotation XoR Rounding K Message Digest Message W Decentralized File Sharing
  • 7. •File encryption and decryption is done in order to provide security to the user data. •The encryption algorithm used is AES which includes the process of encryption which provides specially derived keys also known as round keys. •The round keys are applied to the array of data that holds one lock of data that is to be encrypted. • Encryption/Decryption • AES 6Group id:-2 Decentralized File Sharing
  • 8. • Project Architecture- 7 Fig 7:- Project Architecture Group id:-2 Encryptio n [AES] Assemble Splits Decryption [AES] SHA256 SHA256 SHA256 File File Split1 Split2 Split n Node Node Node Distributed table Distributed table Distributed table Decentralized File Sharing
  • 9. 8 Group id:-2 Decentralized File Sharing lWelcome Page -
  • 10. • User Log In - 9 Decentralized File sharingGroup id:-2
  • 11. • Registration - 10 Group id:-2 Decentralized File Sharing
  • 12. 11Group id:-2 • Upload File- Decentralized File Sharing
  • 13. • Uploaded Input File - 12Decentralized File SharingGroup id:-2
  • 14. • Members - 13Group id:-2 Decentralized File Sharing
  • 15. Testing- Case ID Test Case Name Inputs Expected Output Actual Output Remark 1. User registration validation. Enter required information. User should get registered. User registration is done. Yes 2. Invalid user registration. Enter invalid field while registration. Message pop up of invalid field. Display message pop up. No 3. User log in validation. Enter user name and password. Access to user profile. Gives access to user profile. Yes 4. Invalid user log in. Enter incorrect user name/ password. Message pop up of invalid user name/ password. Display message pop up. No Test cases for Module 1: User account and maintenance. 14 Decentralized File Sharing
  • 16. Test cases for Module 2: File Encryption/Decryption. Case ID Test Case Name Inputs Expected Output Actual Output Remark 1. File encryption. Text file. File should get encrypted. Encrypted file. Yes 2. File decryption. Encrypted file. File should get decrypted. Original file. No 15Group id:-2 Decentralized File Sharing
  • 17. Test cases for Module 3: Segment Files into pieces. Case ID Test Case Name Inputs Expected Output Actual Output Remar k 1. File segmentatio n. Encrypted Text file. Segment file into pieces of 1kb each. Segmentation is done. Yes Test cases for Module 4: Distributed hash table generation. Case ID Test Case Name Inputs Expected Output Actual Output Remar k 1. DHT generation. A Segment of file. Distributed hash generated for each hash. Distributed hash is generated. Yes 16
  • 18. • Future Work- 1.Creating digital coins. 1.Maintaining Wallet for User’s Coin. 1.Convert Coins into User’s suitable currency. 17 Group id:-2 Decentralized File Sharing
  • 19. B Segment file into piece of size 16-bits 17.5 A User account and maintenance 10.33 C Encryption/decryp tion of pieces of file 20 D Distributed hash table using Pastry 22.83 E Block-Chain based network for managing transaction records 22