加勒比久久综合,国产精品伦一区二区,66精品视频在线观看,一区二区电影

合肥生活安徽新聞合肥交通合肥房產生活服務合肥教育合肥招聘合肥旅游文化藝術合肥美食合肥地圖合肥社保合肥醫院企業服務合肥法律

代寫COMP3334、代做C/C++,Python編程
代寫COMP3334、代做C/C++,Python編程

時間:2025-03-07  來源:合肥網hfw.cc  作者:hfw.cc 我要糾錯



Redistributing this file (including partially) to 
CourseHero or other public websites is strictly prohibited.
COMP3334 - Project
Section 1: Overview
Online storage is a popular application in our daily life. With online storage, a user can 
upload its files to a server and access them when the user wants. The security of uploaded 
content is important because it may contain the sensitive information of users. 
In this project, you and your teammates should design a secure online storage system, 
which contains various functionalities, such as user authentication, access control, file 
encryption and activity auditing, etc.
Section 2: Deadlines
1. Team Registration: 11:59 PM, March 6th, 2025. 
2. Submission of required materials: 11:59 PM, April 6th, 2025.
a. The materials include your report, codes and demonstration video.
Section 3: Team Requirements
Students should participate in this project in teams. Each team should have a voluntary 
coordinator for administrative purposes. The coordinator should fill in a form 
(https://forms.office.com/r/c8VaKumiMG, needs PolyU Connect account) to register 
his/her team before 11:59 PM March 6th, 2025.
You may use the discussion board in Blackboard to find your teammates.
To avoid high workload and free riders, each team should contain 3 or 4 students (4 is 
recommended). 
If there are any students who are not in a team after the deadline, they will be organized as 
several teams randomly. We will try to keep the size of teams within 3~4 students. However, 
in extreme cases, it may not follow the regular guidelines. 
Section 4: Threat Models
Your application should contain two sub-programs, Client and Server. 
Client program helps a user upload its files and access them when the user wants. 
Server program receives the uploaded files and manages the users.
A user operates a Client program to use your application. 
Client and Server are communicated via network connections.
We assume that machine that runs Server is a passive adversary. It executes your program
honestly but monitors communication and the stored data from a Client and wants to 
decrypt this Client’s uploaded files. That means, the machine that runs Server does not 
perform active attacks, such as altering the messages, returning fake content, etc. It only 
READ the messages from a client program and wants to decrypt files based on the read 
messages. 
We also assume that there is a passive adversary who is an unauthorized user. This 
unauthorized adversary may use a legitimate user’s computer to try to access the online 
files of that legitimate user.
The security measures in your application should be able to prevent such adversaries. 
Section 5: Functionality
The CORE functionalities of your application are listed below:
1. User Management: 
a. Register a user by username and password.
i. The username must be unique.
ii. The password must be hashed by a proper algorithm. 
b. Log in
i. Check whether the password is identical to the password in 
registration.
c. A user should be able to reset its password.
2. Data Encryption:
a. Upload
i. When a user uploads a file, the client should encrypt the file using 
an appropriate cryptosystem, with the key securely generated and 
stored locally. 
ii. Server should not be able to read the file in plaintext. 
b. Download
i. When a user downloads a file, the client should decrypt the file and 
return the plaintext to the user.
3. Access Control
a. A user can only add/edit/delete its own files. 
b. A user can share its files with designated users. The designated users should 
be able to read the shared files via their Clients.
c. An unauthorized user should not be able to access the file content of other 
users. 
4. Log Auditing
a. The critical operations, such as logging in, logging out, uploading, deleting, 
sharing, should be recorded. 
i. A user should not be able to repudiate it.
b. The administrator account of your application should be able to read logs.
5. General Security Protection
a. File name must be valid. Some file names can be used to attack. For 
example, the file name “../file.txt” (without quotes) can be used to access 
file.txt in the parent folder.
b. Your application should also consider the security threats on accounts, e.g., 
SQL injections.
The EXTENDED functionalities of your application are listed below:
1. Multi-Factor Authentication (MFA): FIDO2, One-Time Password (OTP), 
email/phone verification code, etc.
2. Efficient update on files: Suppose you are editing a file that has already been saved
online. If you want to modify a part of this file, find a method that Client does not 
need to encrypt the entire file and submit it again. 
3. Other security designs that you think are necessary.
Your application should implement at least ALL of the CORE functionalities. 
Your application should implement at least ONE of the EXTENDED functionalities.
The implementations on EXTENDED functionalities will be considered in grading. 
(However, please do not add too many functionalities to your applications.)
To reduce your workload, your application does not need a Graphical User Interface (GUI). 
Running in command line is enough. However, you should at least provide a menu (in 
command line) to assist your user to use your application. 
Section 6: Programming Languages and Potential Needed Tools
You may use any programming languages you are familiar with. However, it is 
recommended to use Python due to its low difficulty. 
In the design of Server, you may need a database to host the user information. It is 
recommended to use SQLite, which is a lightweight database system. 
Python has already provided some cryptography libraries. You can refer to our Tutorial 1. 
If you are using C/C++, it is recommended to use OpenSSL, which is a popular and 
comprehensive cryptography library in C/C++.
It is recommended to use the existed cryptography libraries as building blocks, because 
your own implementation may not consider all security concerns.
However, you are not allowed to call all-in-one libraries to build your application.
Here is an example, which is simply called an existed library as your application.
import xxx_library
server = xxx_library.storage_server()
server.start()
As long as your implementation involves reasonable details for solving this problem, then 
it is fine. Unless it is too obvious, we will be very moderate when deciding if 
implementation is solely based on all-in-one libraries, i.e., let us see your efforts. 
Section 7: Report File
Your report should be within 10 pages. More pages do not lead to higher grades. 
• Include your team’s name, your names and student IDs in the report.
• A contribution table indicating your percentage of contributions, in total 100%. 
o Grades will be adjusted accordingly.
• Abstract
• Introduction
o Background
• Threat Models
o Who are adversaries?
o What are the abilities of adversaries?
o etc.
• Algorithms you designed to implement functionalities
o For each functionality requirement, what your theoretical design is.
▪ Which building blocks (algorithms, tools, etc.) you used.
▪ How you used them to design a workflow that meets the 
requirement.
o To implement your theoretical design, what the technical details are.
▪ Which libraries you used.
▪ Are there any technical challenges? If yes, how you encountered 
them.
• At least 2 Test Cases
o To verify whether your design can resist attacks.
o Examples: Whether the files uploaded by users can be read by 
unauthorized users or not, SQL Injection Attacks, and whether 
unauthorized users can get the secret keys or not, …
• Future Works
• Reference
Section 8: Demonstration Video
A team should record a 10-min demonstration video to demonstrate the designed 
functionalities with necessary description.
Section 9: Code
Your code must contain all the source codes, a file that can be imported to SQL database 
and a step-by-step document about how to deploy and use your application. 
This document must be able to guide a person to deploy and run your application from a 
clear Windows 11.0 OS (i.e., no assumptions on pre-installed software/libraries), i.e., your 
document should guide a person to install the needed software/libraries and use your 
application.
If you are using Python solely, it is recommended to export all your dependencies to a 
requirements.txt file when you are done. 
Your code should be well documented that is comprehensive comments and is readable. 
Section 10: Submission Guidelines
• Create a folder with the name TeamName
o Put all your code in a folder with the name code
o Rename your report with the name report (with the extension name, such as 
pdf)
o Rename your video with the name video (with the extension name, such as 
mp4)
o Put code, report and video in the folder TeamName
o You should replace TeamName with your actual team’s name, which will be 
released after registration period. 
• Compress this folder as one zip file. 
• Follow the example below to name your zip file by replacing TeamName with your 
actual team’s name:
o TeamName.zip
• Your submission should be submitted by your TEAM COORDINATOR before 
the deadline. 


請加QQ:99515681  郵箱:99515681@qq.com   WX:codinghelp

掃一掃在手機打開當前頁
  • 上一篇:代寫MS6711、代做Python語言程序
  • 下一篇:易分期全國客服電話-易分期24小時人工服務熱線
  • ·INT5051代做、代寫Python編程設計
  • ·代做ACCT 6142 、代寫Python編程語言
  • ·CS 189代做、Python編程語言代寫
  • ·代寫INT2067、代做Python編程語言
  • ·代寫0CCS0CSE、代做Python編程設計
  • ·代做DEV5005A、代寫Java/Python編程
  • ·DSCI 510代寫、代做Python編程語言
  • ·MATH2033代做、代寫Java,Python編程
  • ·代做DI11004、Java,Python編程代寫
  • ·03CIT4057代做、代寫c++,Python編程
  • 合肥生活資訊

    合肥圖文信息
    2025年10月份更新拼多多改銷助手小象助手多多出評軟件
    2025年10月份更新拼多多改銷助手小象助手多
    有限元分析 CAE仿真分析服務-企業/產品研發/客戶要求/設計優化
    有限元分析 CAE仿真分析服務-企業/產品研發
    急尋熱仿真分析?代做熱仿真服務+熱設計優化
    急尋熱仿真分析?代做熱仿真服務+熱設計優化
    出評 開團工具
    出評 開團工具
    挖掘機濾芯提升發動機性能
    挖掘機濾芯提升發動機性能
    海信羅馬假日洗衣機亮相AWE  復古美學與現代科技完美結合
    海信羅馬假日洗衣機亮相AWE 復古美學與現代
    合肥機場巴士4號線
    合肥機場巴士4號線
    合肥機場巴士3號線
    合肥機場巴士3號線
  • 短信驗證碼 目錄網 排行網

    關于我們 | 打賞支持 | 廣告服務 | 聯系我們 | 網站地圖 | 免責聲明 | 幫助中心 | 友情鏈接 |

    Copyright © 2025 hfw.cc Inc. All Rights Reserved. 合肥網 版權所有
    ICP備06013414號-3 公安備 42010502001045

    亚洲女优在线| 999精品视频在这里| 国产精品国产一区| 日本韩国欧美超级黄在线观看| 日韩综合在线视频| 日本一区二区免费高清| 色狠狠久久av综合| 国产一区不卡| 久久天堂影院| 国产免费拔擦拔擦8x高清在线人| 久久亚洲精品中文字幕蜜潮电影| 国精一区二区| 亚洲麻豆一区| 91九色综合| 欧美激情欧美| 国产农村妇女精品一二区| 久久97精品| 日韩黄色网络| 国产一区一区| 日本少妇一区二区| 日韩一区精品| 亚洲深夜视频| 欧美专区一区二区三区| 亚洲天堂黄色| 中文字幕av一区二区三区人| 色棕色天天综合网| 亚洲欧美综合久久久| av成人在线播放| 日韩精品1区| 免费一区二区视频| 99亚洲精品| 在线成人激情| 婷婷综合伊人| 国产中文一区| 亚洲香蕉网站| 1000部精品久久久久久久久| 9国产精品午夜| 日本一区二区三区电影免费观看| 国产成人视屏| 一区二区蜜桃| 久久久久久毛片免费看 | 日本va欧美va瓶| 欧美天堂一区二区| 精精国产xxx在线视频app| 激情黄产视频在线免费观看| 日韩a一区二区| 日韩av密桃| 91麻豆国产自产在线观看亚洲| 日韩制服丝袜av| 蜜臀久久99精品久久久久久9| 99热免费精品| 麻豆久久婷婷| 国产精品传媒精东影业在线| 米奇777在线欧美播放| 久久国产高清| 免费精品99久久国产综合精品| 一本色道久久综合亚洲精品高清 | 欧美在线亚洲| 最新亚洲视频| 视频一区二区欧美| 国产黄大片在线观看| 国产剧情av在线播放| 亚洲天堂av影院| 亚洲成人不卡| 久久在线精品| 成人污污视频| 精品中文字幕一区二区三区| 久久99成人| 蜜桃久久久久| 好看不卡的中文字幕| 亚洲一区亚洲| 中文字幕在线看片| 99热播精品免费| 亚洲精品女人| 理论片午夜视频在线观看| 99精品国产高清一区二区麻豆| 精品国产麻豆| 久久中文视频| 亚洲一区二区三区高清不卡| 欧美激情偷拍自拍| 成人国产精选| 电影一区中文字幕| 一区二区在线视频观看| 鲁大师精品99久久久| 婷婷综合亚洲| 91日韩欧美| 国产欧美在线| 久久av资源| 美女av一区| 宅男噜噜噜66一区二区 | 超碰高清在线| 久久精品天堂| 偷拍精品福利视频导航| 久久人人97超碰国产公开结果| 最新日韩av| 日本在线精品| 国产高清精品二区| 国产精品对白久久久久粗| 欧美另类综合| 69堂免费精品视频在线播放| 欧美日韩18| 精品国产一区二区三区不卡蜜臂| 伊人久久亚洲热| 国产综合色区在线观看| 国产成年精品| 亚洲小说欧美另类社区| 美女91在线看| 欧美日韩中文| 久久在线电影| 都市激情综合| 国产在线不卡一区二区三区| 日韩精品一区二区三区免费观看| 日韩中文字幕一区二区三区| 久久国产尿小便嘘嘘| 日本综合精品一区| 夜夜嗨一区二区| 欧美a一级片| 999国产精品一区| 麻豆九一精品爱看视频在线观看免费| 色999久久久精品人人澡69| 国产免费av国片精品草莓男男| 欧美日韩视频| 99精品欧美| 欧美阿v一级看视频| 日韩激情图片| 日韩免费成人| 免费一级欧美片在线观看| 亚洲三级视频| 亚洲午夜av| 卡一卡二国产精品| 青青草国产免费一区二区下载| 国产精品成人a在线观看| 成人污污视频| 亚洲欧美清纯在线制服| 欧美激情91| 欧美日韩免费观看一区=区三区| 美女久久久久久| 精品国产一区二区三区久久久蜜臀| 国产精品久久久久一区二区三区厕所| 亚洲色图国产| 亚洲激情欧美| 国产高清日韩| 久久成人国产| 天堂av一区二区三区在线播放| 国产一区成人| 欧美激情1区2区| 亚洲黄页一区| 亚洲一区导航| 亚洲一区日韩在线| 国产区精品区| 麻豆成全视频免费观看在线看| 日韩成人免费电影| 日韩pacopacomama| 精品国产精品国产偷麻豆| 日本国产欧美| 欧美性感美女一区二区| 日韩高清欧美激情| 亚洲激情国产| 国产一区2区| av综合电影网站| 日韩精品一区二区三区免费观看| 婷婷精品久久久久久久久久不卡| 久久精品官网| 亚洲日韩视频| 免费成人在线观看| 亚洲成人五区| 精品自拍视频| 天天天综合网| 欧美男gay| 日本综合字幕| 亚洲夜间福利| 国产精品羞羞答答在线观看 | 亚洲激精日韩激精欧美精品| 成人自拍视频| 女海盗2成人h版中文字幕| 欧美a级网站| 亚洲最新av| 国产剧情av在线播放| 亚洲h色精品| 亚洲色图国产| 中文在线а√在线8| 里番精品3d一二三区| 欧美人成在线| 亚洲人成午夜免电影费观看| 久久久影院免费| 精品一区二区三区中文字幕| 日韩欧美另类一区二区| 亚洲精品久久| 日韩高清在线观看一区二区| 久久精品99国产国产精| 香蕉久久国产| 日韩精品首页| 日韩母乳在线| 一本综合精品| 色婷婷热久久| 欧美午夜不卡| julia中文字幕一区二区99在线| 亚洲全部视频| 青娱乐极品盛宴一区二区| 一本色道久久综合|