国产人妻人伦精品_欧美一区二区三区图_亚洲欧洲久久_日韩美女av在线免费观看

合肥生活安徽新聞合肥交通合肥房產生活服務合肥教育合肥招聘合肥旅游文化藝術合肥美食合肥地圖合肥社保合肥醫院企業服務合肥法律

代寫COMP3334、代做C/C++,Python編程
代寫COMP3334、代做C/C++,Python編程

時間:2025-03-07  來源:合肥網hfw.cc  作者:hfw.cc 我要糾錯



Redistributing this file (including partially) to 
CourseHero or other public websites is strictly prohibited.
COMP3334 - Project
Section 1: Overview
Online storage is a popular application in our daily life. With online storage, a user can 
upload its files to a server and access them when the user wants. The security of uploaded 
content is important because it may contain the sensitive information of users. 
In this project, you and your teammates should design a secure online storage system, 
which contains various functionalities, such as user authentication, access control, file 
encryption and activity auditing, etc.
Section 2: Deadlines
1. Team Registration: 11:59 PM, March 6th, 2025. 
2. Submission of required materials: 11:59 PM, April 6th, 2025.
a. The materials include your report, codes and demonstration video.
Section 3: Team Requirements
Students should participate in this project in teams. Each team should have a voluntary 
coordinator for administrative purposes. The coordinator should fill in a form 
(https://forms.office.com/r/c8VaKumiMG, needs PolyU Connect account) to register 
his/her team before 11:59 PM March 6th, 2025.
You may use the discussion board in Blackboard to find your teammates.
To avoid high workload and free riders, each team should contain 3 or 4 students (4 is 
recommended). 
If there are any students who are not in a team after the deadline, they will be organized as 
several teams randomly. We will try to keep the size of teams within 3~4 students. However, 
in extreme cases, it may not follow the regular guidelines. 
Section 4: Threat Models
Your application should contain two sub-programs, Client and Server. 
Client program helps a user upload its files and access them when the user wants. 
Server program receives the uploaded files and manages the users.
A user operates a Client program to use your application. 
Client and Server are communicated via network connections.
We assume that machine that runs Server is a passive adversary. It executes your program
honestly but monitors communication and the stored data from a Client and wants to 
decrypt this Client’s uploaded files. That means, the machine that runs Server does not 
perform active attacks, such as altering the messages, returning fake content, etc. It only 
READ the messages from a client program and wants to decrypt files based on the read 
messages. 
We also assume that there is a passive adversary who is an unauthorized user. This 
unauthorized adversary may use a legitimate user’s computer to try to access the online 
files of that legitimate user.
The security measures in your application should be able to prevent such adversaries. 
Section 5: Functionality
The CORE functionalities of your application are listed below:
1. User Management: 
a. Register a user by username and password.
i. The username must be unique.
ii. The password must be hashed by a proper algorithm. 
b. Log in
i. Check whether the password is identical to the password in 
registration.
c. A user should be able to reset its password.
2. Data Encryption:
a. Upload
i. When a user uploads a file, the client should encrypt the file using 
an appropriate cryptosystem, with the key securely generated and 
stored locally. 
ii. Server should not be able to read the file in plaintext. 
b. Download
i. When a user downloads a file, the client should decrypt the file and 
return the plaintext to the user.
3. Access Control
a. A user can only add/edit/delete its own files. 
b. A user can share its files with designated users. The designated users should 
be able to read the shared files via their Clients.
c. An unauthorized user should not be able to access the file content of other 
users. 
4. Log Auditing
a. The critical operations, such as logging in, logging out, uploading, deleting, 
sharing, should be recorded. 
i. A user should not be able to repudiate it.
b. The administrator account of your application should be able to read logs.
5. General Security Protection
a. File name must be valid. Some file names can be used to attack. For 
example, the file name “../file.txt” (without quotes) can be used to access 
file.txt in the parent folder.
b. Your application should also consider the security threats on accounts, e.g., 
SQL injections.
The EXTENDED functionalities of your application are listed below:
1. Multi-Factor Authentication (MFA): FIDO2, One-Time Password (OTP), 
email/phone verification code, etc.
2. Efficient update on files: Suppose you are editing a file that has already been saved
online. If you want to modify a part of this file, find a method that Client does not 
need to encrypt the entire file and submit it again. 
3. Other security designs that you think are necessary.
Your application should implement at least ALL of the CORE functionalities. 
Your application should implement at least ONE of the EXTENDED functionalities.
The implementations on EXTENDED functionalities will be considered in grading. 
(However, please do not add too many functionalities to your applications.)
To reduce your workload, your application does not need a Graphical User Interface (GUI). 
Running in command line is enough. However, you should at least provide a menu (in 
command line) to assist your user to use your application. 
Section 6: Programming Languages and Potential Needed Tools
You may use any programming languages you are familiar with. However, it is 
recommended to use Python due to its low difficulty. 
In the design of Server, you may need a database to host the user information. It is 
recommended to use SQLite, which is a lightweight database system. 
Python has already provided some cryptography libraries. You can refer to our Tutorial 1. 
If you are using C/C++, it is recommended to use OpenSSL, which is a popular and 
comprehensive cryptography library in C/C++.
It is recommended to use the existed cryptography libraries as building blocks, because 
your own implementation may not consider all security concerns.
However, you are not allowed to call all-in-one libraries to build your application.
Here is an example, which is simply called an existed library as your application.
import xxx_library
server = xxx_library.storage_server()
server.start()
As long as your implementation involves reasonable details for solving this problem, then 
it is fine. Unless it is too obvious, we will be very moderate when deciding if 
implementation is solely based on all-in-one libraries, i.e., let us see your efforts. 
Section 7: Report File
Your report should be within 10 pages. More pages do not lead to higher grades. 
• Include your team’s name, your names and student IDs in the report.
• A contribution table indicating your percentage of contributions, in total 100%. 
o Grades will be adjusted accordingly.
• Abstract
• Introduction
o Background
• Threat Models
o Who are adversaries?
o What are the abilities of adversaries?
o etc.
• Algorithms you designed to implement functionalities
o For each functionality requirement, what your theoretical design is.
▪ Which building blocks (algorithms, tools, etc.) you used.
▪ How you used them to design a workflow that meets the 
requirement.
o To implement your theoretical design, what the technical details are.
▪ Which libraries you used.
▪ Are there any technical challenges? If yes, how you encountered 
them.
• At least 2 Test Cases
o To verify whether your design can resist attacks.
o Examples: Whether the files uploaded by users can be read by 
unauthorized users or not, SQL Injection Attacks, and whether 
unauthorized users can get the secret keys or not, …
• Future Works
• Reference
Section 8: Demonstration Video
A team should record a 10-min demonstration video to demonstrate the designed 
functionalities with necessary description.
Section 9: Code
Your code must contain all the source codes, a file that can be imported to SQL database 
and a step-by-step document about how to deploy and use your application. 
This document must be able to guide a person to deploy and run your application from a 
clear Windows 11.0 OS (i.e., no assumptions on pre-installed software/libraries), i.e., your 
document should guide a person to install the needed software/libraries and use your 
application.
If you are using Python solely, it is recommended to export all your dependencies to a 
requirements.txt file when you are done. 
Your code should be well documented that is comprehensive comments and is readable. 
Section 10: Submission Guidelines
• Create a folder with the name TeamName
o Put all your code in a folder with the name code
o Rename your report with the name report (with the extension name, such as 
pdf)
o Rename your video with the name video (with the extension name, such as 
mp4)
o Put code, report and video in the folder TeamName
o You should replace TeamName with your actual team’s name, which will be 
released after registration period. 
• Compress this folder as one zip file. 
• Follow the example below to name your zip file by replacing TeamName with your 
actual team’s name:
o TeamName.zip
• Your submission should be submitted by your TEAM COORDINATOR before 
the deadline. 


請加QQ:99515681  郵箱:99515681@qq.com   WX:codinghelp

掃一掃在手機打開當前頁
  • 上一篇:代寫MS6711、代做Python語言程序
  • 下一篇:易分期全國客服電話-易分期24小時人工服務熱線
  • ·INT5051代做、代寫Python編程設計
  • ·代做ACCT 6142 、代寫Python編程語言
  • ·CS 189代做、Python編程語言代寫
  • ·代寫INT2067、代做Python編程語言
  • ·代寫0CCS0CSE、代做Python編程設計
  • ·代做DEV5005A、代寫Java/Python編程
  • ·DSCI 510代寫、代做Python編程語言
  • ·MATH2033代做、代寫Java,Python編程
  • ·代做DI11004、Java,Python編程代寫
  • ·03CIT4057代做、代寫c++,Python編程
  • 合肥生活資訊

    合肥圖文信息
    流體仿真外包多少錢_專業CFD分析代做_友商科技CAE仿真
    流體仿真外包多少錢_專業CFD分析代做_友商科
    CAE仿真分析代做公司 CFD流體仿真服務 管路流場仿真外包
    CAE仿真分析代做公司 CFD流體仿真服務 管路
    流體CFD仿真分析_代做咨詢服務_Fluent 仿真技術服務
    流體CFD仿真分析_代做咨詢服務_Fluent 仿真
    結構仿真分析服務_CAE代做咨詢外包_剛強度疲勞振動
    結構仿真分析服務_CAE代做咨詢外包_剛強度疲
    流體cfd仿真分析服務 7類仿真分析代做服務40個行業
    流體cfd仿真分析服務 7類仿真分析代做服務4
    超全面的拼多多電商運營技巧,多多開團助手,多多出評軟件徽y1698861
    超全面的拼多多電商運營技巧,多多開團助手
    CAE有限元仿真分析團隊,2026仿真代做咨詢服務平臺
    CAE有限元仿真分析團隊,2026仿真代做咨詢服
    釘釘簽到打卡位置修改神器,2026怎么修改定位在范圍內
    釘釘簽到打卡位置修改神器,2026怎么修改定
  • 短信驗證碼 寵物飼養 十大衛浴品牌排行 suno 豆包網頁版入口 wps 目錄網 排行網

    關于我們 | 打賞支持 | 廣告服務 | 聯系我們 | 網站地圖 | 免責聲明 | 幫助中心 | 友情鏈接 |

    Copyright © 2025 hfw.cc Inc. All Rights Reserved. 合肥網 版權所有
    ICP備06013414號-3 公安備 42010502001045

    国产人妻人伦精品_欧美一区二区三区图_亚洲欧洲久久_日韩美女av在线免费观看
    欧美一区二区高清在线观看| 日韩av影视| 99re在线视频上| 国产九九精品视频| 国产日韩欧美大片| 国产视频一区二区不卡| 国产天堂在线播放| 国产综合av一区二区三区| 免费亚洲一区二区| 国产日韩在线看| 成人久久18免费网站图片| 91久久久久久久一区二区| 99国产在线| 久久人人97超碰精品888| 久久婷婷人人澡人人喊人人爽 | 国产精品又粗又长| 成人精品视频久久久久| 97久久伊人激情网| 国产成人亚洲综合| www.亚洲成人| 精品久久sese| 日韩av电影免费播放| 欧美成人精品欧美一级乱| 国产精品中文字幕久久久| 久久久一本精品99久久精品66| 久久久久久久久91| 九九热精品在线| 日韩av不卡在线| 免费看又黄又无码的网站| 国产啪精品视频| 国产福利一区二区三区在线观看| 国产成人免费av| 欧美日韩电影在线观看| 日韩欧美亚洲区| 国产午夜福利视频在线观看| 久久免费成人精品视频| 国产精品美女主播在线观看纯欲| 在线播放 亚洲| 青青青免费在线| 国产精品夜色7777狼人| 久久久久久久一区二区| 欧美精品久久一区二区| 欧美中在线观看| 91久久精品久久国产性色也91| 日韩视频永久免费观看| 一区视频二区视频| 欧美亚洲另类在线一区二区三区| 99在线观看视频免费| 国产精品日韩欧美大师| 午夜精品久久久久久久无码| 麻豆av福利av久久av| 国产激情片在线观看| 欧美久久精品一级黑人c片 | 国产日产久久高清欧美一区| 国产国语刺激对白av不卡| 久久国产精品久久国产精品| 日韩国产欧美一区| av资源站久久亚洲| 国产精品精品视频一区二区三区| 欧美一区二区三区图| 国产免费黄色av| 国产精品日韩欧美一区二区| 亚洲精品免费网站| 国产欧美日韩最新| 亚洲激情电影在线| 国产裸体免费无遮挡| 久久久精品久久久| 日韩国产精品一区二区三区| 99久久伊人精品影院| 久久99久久久久久久噜噜| 美女黄色丝袜一区| 欧美二区三区在线| www.亚洲免费视频| 色哺乳xxxxhd奶水米仓惠香| www日韩在线观看| 久久6免费高清热精品| 国模吧一区二区三区| 久久久久久久久久久av| 日产精品久久久一区二区| 91精品国产91久久久久| 亚洲高清资源综合久久精品| 国产精品一区二区三区久久久| 精品视频9999| 国产精选久久久久久| 欧美午夜视频在线| 久久九九国产精品怡红院| 欧美日韩亚洲免费| 国产精品久久久久影院日本| 欧美 国产 精品| 国产精品视频免费一区| 黄页网站大全在线观看| 久久精品视频播放| 欧美精品色婷婷五月综合| 国产精品视频免费一区二区三区| 精品免费一区二区三区蜜桃| 国产精品日韩欧美综合| 黄页免费在线观看视频| 国产精品久久久久91| 国产日韩精品推荐| 一本久道综合色婷婷五月| 99国产盗摄| 日本免费成人网| 国产精品视频永久免费播放| 国产一区二区三区色淫影院| 在线观看欧美亚洲| 国产精品1区2区在线观看| 日av在线播放中文不卡| 久久好看免费视频| 黄色99视频| 中文字幕av久久| 国产不卡一区二区在线播放| 欧美中文字幕在线| 国产精品成人国产乱一区| 国产伦精品一区二区三区视频孕妇| 亚洲综合视频一区| 久久www视频| 国产自产精品| 亚洲欧美一区二区原创| 色婷婷综合久久久久中文字幕1| 好吊色欧美一区二区三区四区| 欧美激情国产高清| 国产高清av在线播放| 欧美在线观看网址综合| 国产精品高潮呻吟久久av黑人| 成人精品视频99在线观看免费| 日韩avxxx| 国产精品国产三级国产aⅴ浪潮| 国产精品亚洲自拍| 日本在线观看一区二区| 国产精品色悠悠| 99国产在线观看| 欧美精品尤物在线| 九九精品在线观看| 国产成人精品视| 国产欧美韩日| 欧美wwwxxxx| 久艹视频在线免费观看| 免费看日b视频| 日日碰狠狠躁久久躁婷婷| 国产精品成人在线| 久久观看最新视频| 成人欧美一区二区三区黑人免费| 日韩免费毛片视频| 在线播放豆国产99亚洲| 国产精品视频资源| 久久久亚洲综合网站| 国产日韩欧美亚洲一区| 欧美性受xxx| 欧美一区二区视频17c| 欧美成年人在线观看| www.久久撸.com| 久无码久无码av无码| 国产又大又硬又粗| 色综合影院在线观看| 精品国产一区二区三区久久久久久| 日韩有码在线观看| 日韩成人在线资源| 亚洲欧洲精品一区二区三区波多野1战4 | 欧美日韩福利在线观看| 久久久久久久久久码影片| 国产精品伊人日日| 国产又粗又长又爽视频| 欧美日韩不卡在线视频| 日韩在线综合网| 久久久久久18| 欧美另类第一页| 国产精品视频最多的网站| 久久国产精品-国产精品| 99在线观看视频网站| 国产一区二区丝袜高跟鞋图片| 日韩精品不卡| 日本精品视频在线播放| 亚州精品天堂中文字幕| 欧美激情视频一区二区三区不卡| 久久亚洲影音av资源网| 国产精品久久久久免费| 国产精品视频最多的网站| www.亚洲一区| 视频在线观看99| 久久久久久精| 视频在线观看99| 色噜噜狠狠狠综合曰曰曰| 久久国产精品-国产精品| 国产大尺度在线观看| 国产精品27p| 久久视频这里有精品| 久久综合狠狠综合久久综青草| 国产精品999| 91精品久久久久久久久久久久久| 国产精品影院在线观看| 成人国产精品日本在线| 不卡一区二区三区视频| 国产精品一区视频| 国产毛片久久久久久国产毛片| 免费观看亚洲视频| 国产啪精品视频| 成人精品一区二区三区| 91精品一区二区| 国产成人精品日本亚洲11| 久久久久久久一|