99爱在线视频这里只有精品_窝窝午夜看片成人精品_日韩精品久久久毛片一区二区_亚洲一区二区久久

合肥生活安徽新聞合肥交通合肥房產生活服務合肥教育合肥招聘合肥旅游文化藝術合肥美食合肥地圖合肥社保合肥醫院企業服務合肥法律

代寫COMP3334、代做C/C++,Python編程
代寫COMP3334、代做C/C++,Python編程

時間:2025-03-07  來源:合肥網hfw.cc  作者:hfw.cc 我要糾錯



Redistributing this file (including partially) to 
CourseHero or other public websites is strictly prohibited.
COMP3334 - Project
Section 1: Overview
Online storage is a popular application in our daily life. With online storage, a user can 
upload its files to a server and access them when the user wants. The security of uploaded 
content is important because it may contain the sensitive information of users. 
In this project, you and your teammates should design a secure online storage system, 
which contains various functionalities, such as user authentication, access control, file 
encryption and activity auditing, etc.
Section 2: Deadlines
1. Team Registration: 11:59 PM, March 6th, 2025. 
2. Submission of required materials: 11:59 PM, April 6th, 2025.
a. The materials include your report, codes and demonstration video.
Section 3: Team Requirements
Students should participate in this project in teams. Each team should have a voluntary 
coordinator for administrative purposes. The coordinator should fill in a form 
(https://forms.office.com/r/c8VaKumiMG, needs PolyU Connect account) to register 
his/her team before 11:59 PM March 6th, 2025.
You may use the discussion board in Blackboard to find your teammates.
To avoid high workload and free riders, each team should contain 3 or 4 students (4 is 
recommended). 
If there are any students who are not in a team after the deadline, they will be organized as 
several teams randomly. We will try to keep the size of teams within 3~4 students. However, 
in extreme cases, it may not follow the regular guidelines. 
Section 4: Threat Models
Your application should contain two sub-programs, Client and Server. 
Client program helps a user upload its files and access them when the user wants. 
Server program receives the uploaded files and manages the users.
A user operates a Client program to use your application. 
Client and Server are communicated via network connections.
We assume that machine that runs Server is a passive adversary. It executes your program
honestly but monitors communication and the stored data from a Client and wants to 
decrypt this Client’s uploaded files. That means, the machine that runs Server does not 
perform active attacks, such as altering the messages, returning fake content, etc. It only 
READ the messages from a client program and wants to decrypt files based on the read 
messages. 
We also assume that there is a passive adversary who is an unauthorized user. This 
unauthorized adversary may use a legitimate user’s computer to try to access the online 
files of that legitimate user.
The security measures in your application should be able to prevent such adversaries. 
Section 5: Functionality
The CORE functionalities of your application are listed below:
1. User Management: 
a. Register a user by username and password.
i. The username must be unique.
ii. The password must be hashed by a proper algorithm. 
b. Log in
i. Check whether the password is identical to the password in 
registration.
c. A user should be able to reset its password.
2. Data Encryption:
a. Upload
i. When a user uploads a file, the client should encrypt the file using 
an appropriate cryptosystem, with the key securely generated and 
stored locally. 
ii. Server should not be able to read the file in plaintext. 
b. Download
i. When a user downloads a file, the client should decrypt the file and 
return the plaintext to the user.
3. Access Control
a. A user can only add/edit/delete its own files. 
b. A user can share its files with designated users. The designated users should 
be able to read the shared files via their Clients.
c. An unauthorized user should not be able to access the file content of other 
users. 
4. Log Auditing
a. The critical operations, such as logging in, logging out, uploading, deleting, 
sharing, should be recorded. 
i. A user should not be able to repudiate it.
b. The administrator account of your application should be able to read logs.
5. General Security Protection
a. File name must be valid. Some file names can be used to attack. For 
example, the file name “../file.txt” (without quotes) can be used to access 
file.txt in the parent folder.
b. Your application should also consider the security threats on accounts, e.g., 
SQL injections.
The EXTENDED functionalities of your application are listed below:
1. Multi-Factor Authentication (MFA): FIDO2, One-Time Password (OTP), 
email/phone verification code, etc.
2. Efficient update on files: Suppose you are editing a file that has already been saved
online. If you want to modify a part of this file, find a method that Client does not 
need to encrypt the entire file and submit it again. 
3. Other security designs that you think are necessary.
Your application should implement at least ALL of the CORE functionalities. 
Your application should implement at least ONE of the EXTENDED functionalities.
The implementations on EXTENDED functionalities will be considered in grading. 
(However, please do not add too many functionalities to your applications.)
To reduce your workload, your application does not need a Graphical User Interface (GUI). 
Running in command line is enough. However, you should at least provide a menu (in 
command line) to assist your user to use your application. 
Section 6: Programming Languages and Potential Needed Tools
You may use any programming languages you are familiar with. However, it is 
recommended to use Python due to its low difficulty. 
In the design of Server, you may need a database to host the user information. It is 
recommended to use SQLite, which is a lightweight database system. 
Python has already provided some cryptography libraries. You can refer to our Tutorial 1. 
If you are using C/C++, it is recommended to use OpenSSL, which is a popular and 
comprehensive cryptography library in C/C++.
It is recommended to use the existed cryptography libraries as building blocks, because 
your own implementation may not consider all security concerns.
However, you are not allowed to call all-in-one libraries to build your application.
Here is an example, which is simply called an existed library as your application.
import xxx_library
server = xxx_library.storage_server()
server.start()
As long as your implementation involves reasonable details for solving this problem, then 
it is fine. Unless it is too obvious, we will be very moderate when deciding if 
implementation is solely based on all-in-one libraries, i.e., let us see your efforts. 
Section 7: Report File
Your report should be within 10 pages. More pages do not lead to higher grades. 
• Include your team’s name, your names and student IDs in the report.
• A contribution table indicating your percentage of contributions, in total 100%. 
o Grades will be adjusted accordingly.
• Abstract
• Introduction
o Background
• Threat Models
o Who are adversaries?
o What are the abilities of adversaries?
o etc.
• Algorithms you designed to implement functionalities
o For each functionality requirement, what your theoretical design is.
▪ Which building blocks (algorithms, tools, etc.) you used.
▪ How you used them to design a workflow that meets the 
requirement.
o To implement your theoretical design, what the technical details are.
▪ Which libraries you used.
▪ Are there any technical challenges? If yes, how you encountered 
them.
• At least 2 Test Cases
o To verify whether your design can resist attacks.
o Examples: Whether the files uploaded by users can be read by 
unauthorized users or not, SQL Injection Attacks, and whether 
unauthorized users can get the secret keys or not, …
• Future Works
• Reference
Section 8: Demonstration Video
A team should record a 10-min demonstration video to demonstrate the designed 
functionalities with necessary description.
Section 9: Code
Your code must contain all the source codes, a file that can be imported to SQL database 
and a step-by-step document about how to deploy and use your application. 
This document must be able to guide a person to deploy and run your application from a 
clear Windows 11.0 OS (i.e., no assumptions on pre-installed software/libraries), i.e., your 
document should guide a person to install the needed software/libraries and use your 
application.
If you are using Python solely, it is recommended to export all your dependencies to a 
requirements.txt file when you are done. 
Your code should be well documented that is comprehensive comments and is readable. 
Section 10: Submission Guidelines
• Create a folder with the name TeamName
o Put all your code in a folder with the name code
o Rename your report with the name report (with the extension name, such as 
pdf)
o Rename your video with the name video (with the extension name, such as 
mp4)
o Put code, report and video in the folder TeamName
o You should replace TeamName with your actual team’s name, which will be 
released after registration period. 
• Compress this folder as one zip file. 
• Follow the example below to name your zip file by replacing TeamName with your 
actual team’s name:
o TeamName.zip
• Your submission should be submitted by your TEAM COORDINATOR before 
the deadline. 


請加QQ:99515681  郵箱:99515681@qq.com   WX:codinghelp

掃一掃在手機打開當前頁
  • 上一篇:代寫MS6711、代做Python語言程序
  • 下一篇:易分期全國客服電話-易分期24小時人工服務熱線
  • ·INT5051代做、代寫Python編程設計
  • ·代做ACCT 6142 、代寫Python編程語言
  • ·CS 189代做、Python編程語言代寫
  • ·代寫INT2067、代做Python編程語言
  • ·代寫0CCS0CSE、代做Python編程設計
  • ·代做DEV5005A、代寫Java/Python編程
  • ·DSCI 510代寫、代做Python編程語言
  • ·MATH2033代做、代寫Java,Python編程
  • ·代做DI11004、Java,Python編程代寫
  • ·03CIT4057代做、代寫c++,Python編程
  • 合肥生活資訊

    合肥圖文信息
    急尋熱仿真分析?代做熱仿真服務+熱設計優化
    急尋熱仿真分析?代做熱仿真服務+熱設計優化
    出評 開團工具
    出評 開團工具
    挖掘機濾芯提升發動機性能
    挖掘機濾芯提升發動機性能
    海信羅馬假日洗衣機亮相AWE  復古美學與現代科技完美結合
    海信羅馬假日洗衣機亮相AWE 復古美學與現代
    合肥機場巴士4號線
    合肥機場巴士4號線
    合肥機場巴士3號線
    合肥機場巴士3號線
    合肥機場巴士2號線
    合肥機場巴士2號線
    合肥機場巴士1號線
    合肥機場巴士1號線
  • 短信驗證碼 豆包 幣安下載 AI生圖 目錄網

    關于我們 | 打賞支持 | 廣告服務 | 聯系我們 | 網站地圖 | 免責聲明 | 幫助中心 | 友情鏈接 |

    Copyright © 2025 hfw.cc Inc. All Rights Reserved. 合肥網 版權所有
    ICP備06013414號-3 公安備 42010502001045

    99爱在线视频这里只有精品_窝窝午夜看片成人精品_日韩精品久久久毛片一区二区_亚洲一区二区久久

          9000px;">

                日韩国产精品久久久| 午夜成人免费电影| av成人免费在线| 日本aⅴ精品一区二区三区 | 欧美一级二级在线观看| 国产老妇另类xxxxx| 亚洲啪啪综合av一区二区三区| 欧美日韩精品一区二区| 国产91露脸合集magnet| 日本欧美久久久久免费播放网| 国产日韩视频一区二区三区| 欧美日韩久久久| 国产成人av自拍| 国产自产高清不卡| 亚洲精品欧美综合四区| 中文字幕精品一区二区三区精品| 91精品久久久久久久99蜜桃| 一本大道久久a久久综合| 国产91在线观看| 国产成人在线色| 国产69精品一区二区亚洲孕妇| 免费人成精品欧美精品| 日韩国产欧美一区二区三区| 亚洲一区二区三区四区中文字幕| 日韩美女啊v在线免费观看| 国产欧美日韩中文久久| 久久久亚洲午夜电影| 国产欧美一区二区精品性| 精品国产电影一区二区| 欧美日韩一区高清| 欧美美女一区二区在线观看| 欧美日韩亚洲国产综合| 欧美一卡二卡三卡四卡| 日韩欧美一区二区久久婷婷| 欧美大胆一级视频| 国产精品欧美综合在线| av一区二区三区| 色先锋aa成人| 欧美系列一区二区| 欧美zozo另类异族| 亚洲人成在线播放网站岛国| 一区二区三区四区av| 美女在线观看视频一区二区| 久久国产精品色| 51精品国自产在线| 亚洲国产美女搞黄色| 色94色欧美sute亚洲线路二| 国产精品美女久久久久aⅴ国产馆| 日本欧美一区二区| 欧美精品一区二区三区视频| 午夜精品福利一区二区蜜股av| 色综合欧美在线| 一区二区三区美女视频| 一本色道久久加勒比精品| 一区二区三区在线观看国产| 一本色道久久综合亚洲精品按摩| 综合欧美亚洲日本| 欧美四级电影在线观看| 亚洲国产一区二区视频| 欧美午夜精品久久久| 日韩成人精品在线| 日韩欧美国产小视频| 久草热8精品视频在线观看| 日韩一级大片在线| 国产麻豆成人传媒免费观看| 久久伊99综合婷婷久久伊| 高清不卡一区二区在线| 亚洲最快最全在线视频| 日韩欧美aaaaaa| 成人18精品视频| 亚洲午夜私人影院| 欧美精品一区二区精品网| jizzjizzjizz欧美| 婷婷综合久久一区二区三区| 久久久精品tv| 欧美日韩国产片| 国产福利不卡视频| 亚洲成人免费视频| 欧美激情中文字幕| 欧美电影免费观看高清完整版在线 | 日韩欧美亚洲一区二区| 国产69精品久久99不卡| 婷婷夜色潮精品综合在线| 国产精品久久久久久久久晋中| 欧美日韩亚洲综合一区二区三区| 国产精品一区二区在线观看网站 | 国产性天天综合网| 欧美日韩精品三区| 99re这里只有精品视频首页| 日本v片在线高清不卡在线观看| 综合欧美一区二区三区| 国产精品婷婷午夜在线观看| 日韩一区二区在线观看| 93久久精品日日躁夜夜躁欧美| 久久精工是国产品牌吗| 婷婷综合另类小说色区| 亚洲男人电影天堂| 日韩欧美亚洲国产精品字幕久久久| 欧美最新大片在线看| 一本大道av伊人久久综合| av网站免费线看精品| 成人永久aaa| jizz一区二区| 欧美午夜精品理论片a级按摩| 色综合天天视频在线观看| 欧美午夜一区二区| 欧美一区二区三区视频| 欧美电影免费观看高清完整版在 | 亚洲成人综合视频| 欧美精品vⅰdeose4hd| 成人欧美一区二区三区黑人麻豆| www.日韩精品| 亚洲制服丝袜av| 在线亚洲+欧美+日本专区| 91精品国产aⅴ一区二区| 91国产丝袜在线播放| 亚洲欧洲精品一区二区三区| 久久综合视频网| 国产乱子轮精品视频| 91小视频免费观看| 久久这里只有精品首页| 精品久久一区二区三区| 日韩中文字幕不卡| 国产成人免费视频 | 欧美日韩国产123区| 日韩一级二级三级| 中文字幕色av一区二区三区| 日日摸夜夜添夜夜添亚洲女人| 国产精品456露脸| 91麻豆精品久久久久蜜臀| 中文字幕中文在线不卡住| 久久精品人人爽人人爽| 亚洲天堂成人网| 中文字幕在线一区| 美女性感视频久久| 国内国产精品久久| 日韩欧美国产wwwww| 国产精品久久久久一区二区三区 | 日本不卡一区二区三区| 91在线porny国产在线看| 精品国精品国产尤物美女| 亚洲福利电影网| 91污在线观看| 中文字幕在线观看不卡| 黄一区二区三区| 2023国产精华国产精品| 日本中文字幕一区二区有限公司| 成人99免费视频| 日韩一区中文字幕| 国产精品中文字幕欧美| 国产欧美中文在线| 国产成人午夜片在线观看高清观看| 日韩欧美国产一区二区在线播放| 琪琪一区二区三区| 91精品久久久久久蜜臀| 六月丁香婷婷色狠狠久久| 91精品国产色综合久久| 日本午夜精品视频在线观看| 制服丝袜亚洲网站| 蜜臀av国产精品久久久久 | 亚洲一级二级在线| 欧美一级片在线观看| 国产91精品一区二区麻豆亚洲| 国产精品高潮呻吟久久| 色婷婷综合久久久| 婷婷成人激情在线网| 国产婷婷色一区二区三区四区 | 久久亚洲影视婷婷| 91丨porny丨国产入口| 亚洲一区免费视频| 国产色综合一区| 91麻豆精品国产91久久久久久| 国产不卡视频在线播放| 亚洲成a人v欧美综合天堂 | 成人黄色av网站在线| 亚洲狠狠爱一区二区三区| 制服丝袜成人动漫| 不卡视频在线看| 久久精品二区亚洲w码| 亚洲五月六月丁香激情| 国产精品色噜噜| 欧美电影免费观看高清完整版在| 91影视在线播放| 成人av在线影院| 蜜桃av噜噜一区| 亚洲一级片在线观看| 国产精品国产a| 中文乱码免费一区二区| 久久只精品国产| 精品奇米国产一区二区三区| 91成人在线观看喷潮| 在线观看不卡一区| 91免费版在线| 91亚洲国产成人精品一区二三| 国产成人久久精品77777最新版本| 日本va欧美va精品| 肉肉av福利一精品导航| 亚洲午夜精品一区二区三区他趣| 一区二区三区精品视频| 亚洲综合免费观看高清完整版 |