国产人妻人伦精品_欧美一区二区三区图_亚洲欧洲久久_日韩美女av在线免费观看

合肥生活安徽新聞合肥交通合肥房產(chǎn)生活服務(wù)合肥教育合肥招聘合肥旅游文化藝術(shù)合肥美食合肥地圖合肥社保合肥醫(yī)院企業(yè)服務(wù)合肥法律

代寫COMP3334、代做C/C++,Python編程
代寫COMP3334、代做C/C++,Python編程

時(shí)間:2025-03-07  來源:合肥網(wǎng)hfw.cc  作者:hfw.cc 我要糾錯(cuò)



Redistributing this file (including partially) to 
CourseHero or other public websites is strictly prohibited.
COMP3334 - Project
Section 1: Overview
Online storage is a popular application in our daily life. With online storage, a user can 
upload its files to a server and access them when the user wants. The security of uploaded 
content is important because it may contain the sensitive information of users. 
In this project, you and your teammates should design a secure online storage system, 
which contains various functionalities, such as user authentication, access control, file 
encryption and activity auditing, etc.
Section 2: Deadlines
1. Team Registration: 11:59 PM, March 6th, 2025. 
2. Submission of required materials: 11:59 PM, April 6th, 2025.
a. The materials include your report, codes and demonstration video.
Section 3: Team Requirements
Students should participate in this project in teams. Each team should have a voluntary 
coordinator for administrative purposes. The coordinator should fill in a form 
(https://forms.office.com/r/c8VaKumiMG, needs PolyU Connect account) to register 
his/her team before 11:59 PM March 6th, 2025.
You may use the discussion board in Blackboard to find your teammates.
To avoid high workload and free riders, each team should contain 3 or 4 students (4 is 
recommended). 
If there are any students who are not in a team after the deadline, they will be organized as 
several teams randomly. We will try to keep the size of teams within 3~4 students. However, 
in extreme cases, it may not follow the regular guidelines. 
Section 4: Threat Models
Your application should contain two sub-programs, Client and Server. 
Client program helps a user upload its files and access them when the user wants. 
Server program receives the uploaded files and manages the users.
A user operates a Client program to use your application. 
Client and Server are communicated via network connections.
We assume that machine that runs Server is a passive adversary. It executes your program
honestly but monitors communication and the stored data from a Client and wants to 
decrypt this Client’s uploaded files. That means, the machine that runs Server does not 
perform active attacks, such as altering the messages, returning fake content, etc. It only 
READ the messages from a client program and wants to decrypt files based on the read 
messages. 
We also assume that there is a passive adversary who is an unauthorized user. This 
unauthorized adversary may use a legitimate user’s computer to try to access the online 
files of that legitimate user.
The security measures in your application should be able to prevent such adversaries. 
Section 5: Functionality
The CORE functionalities of your application are listed below:
1. User Management: 
a. Register a user by username and password.
i. The username must be unique.
ii. The password must be hashed by a proper algorithm. 
b. Log in
i. Check whether the password is identical to the password in 
registration.
c. A user should be able to reset its password.
2. Data Encryption:
a. Upload
i. When a user uploads a file, the client should encrypt the file using 
an appropriate cryptosystem, with the key securely generated and 
stored locally. 
ii. Server should not be able to read the file in plaintext. 
b. Download
i. When a user downloads a file, the client should decrypt the file and 
return the plaintext to the user.
3. Access Control
a. A user can only add/edit/delete its own files. 
b. A user can share its files with designated users. The designated users should 
be able to read the shared files via their Clients.
c. An unauthorized user should not be able to access the file content of other 
users. 
4. Log Auditing
a. The critical operations, such as logging in, logging out, uploading, deleting, 
sharing, should be recorded. 
i. A user should not be able to repudiate it.
b. The administrator account of your application should be able to read logs.
5. General Security Protection
a. File name must be valid. Some file names can be used to attack. For 
example, the file name “../file.txt” (without quotes) can be used to access 
file.txt in the parent folder.
b. Your application should also consider the security threats on accounts, e.g., 
SQL injections.
The EXTENDED functionalities of your application are listed below:
1. Multi-Factor Authentication (MFA): FIDO2, One-Time Password (OTP), 
email/phone verification code, etc.
2. Efficient update on files: Suppose you are editing a file that has already been saved
online. If you want to modify a part of this file, find a method that Client does not 
need to encrypt the entire file and submit it again. 
3. Other security designs that you think are necessary.
Your application should implement at least ALL of the CORE functionalities. 
Your application should implement at least ONE of the EXTENDED functionalities.
The implementations on EXTENDED functionalities will be considered in grading. 
(However, please do not add too many functionalities to your applications.)
To reduce your workload, your application does not need a Graphical User Interface (GUI). 
Running in command line is enough. However, you should at least provide a menu (in 
command line) to assist your user to use your application. 
Section 6: Programming Languages and Potential Needed Tools
You may use any programming languages you are familiar with. However, it is 
recommended to use Python due to its low difficulty. 
In the design of Server, you may need a database to host the user information. It is 
recommended to use SQLite, which is a lightweight database system. 
Python has already provided some cryptography libraries. You can refer to our Tutorial 1. 
If you are using C/C++, it is recommended to use OpenSSL, which is a popular and 
comprehensive cryptography library in C/C++.
It is recommended to use the existed cryptography libraries as building blocks, because 
your own implementation may not consider all security concerns.
However, you are not allowed to call all-in-one libraries to build your application.
Here is an example, which is simply called an existed library as your application.
import xxx_library
server = xxx_library.storage_server()
server.start()
As long as your implementation involves reasonable details for solving this problem, then 
it is fine. Unless it is too obvious, we will be very moderate when deciding if 
implementation is solely based on all-in-one libraries, i.e., let us see your efforts. 
Section 7: Report File
Your report should be within 10 pages. More pages do not lead to higher grades. 
• Include your team’s name, your names and student IDs in the report.
• A contribution table indicating your percentage of contributions, in total 100%. 
o Grades will be adjusted accordingly.
• Abstract
• Introduction
o Background
• Threat Models
o Who are adversaries?
o What are the abilities of adversaries?
o etc.
• Algorithms you designed to implement functionalities
o For each functionality requirement, what your theoretical design is.
▪ Which building blocks (algorithms, tools, etc.) you used.
▪ How you used them to design a workflow that meets the 
requirement.
o To implement your theoretical design, what the technical details are.
▪ Which libraries you used.
▪ Are there any technical challenges? If yes, how you encountered 
them.
• At least 2 Test Cases
o To verify whether your design can resist attacks.
o Examples: Whether the files uploaded by users can be read by 
unauthorized users or not, SQL Injection Attacks, and whether 
unauthorized users can get the secret keys or not, …
• Future Works
• Reference
Section 8: Demonstration Video
A team should record a 10-min demonstration video to demonstrate the designed 
functionalities with necessary description.
Section 9: Code
Your code must contain all the source codes, a file that can be imported to SQL database 
and a step-by-step document about how to deploy and use your application. 
This document must be able to guide a person to deploy and run your application from a 
clear Windows 11.0 OS (i.e., no assumptions on pre-installed software/libraries), i.e., your 
document should guide a person to install the needed software/libraries and use your 
application.
If you are using Python solely, it is recommended to export all your dependencies to a 
requirements.txt file when you are done. 
Your code should be well documented that is comprehensive comments and is readable. 
Section 10: Submission Guidelines
• Create a folder with the name TeamName
o Put all your code in a folder with the name code
o Rename your report with the name report (with the extension name, such as 
pdf)
o Rename your video with the name video (with the extension name, such as 
mp4)
o Put code, report and video in the folder TeamName
o You should replace TeamName with your actual team’s name, which will be 
released after registration period. 
• Compress this folder as one zip file. 
• Follow the example below to name your zip file by replacing TeamName with your 
actual team’s name:
o TeamName.zip
• Your submission should be submitted by your TEAM COORDINATOR before 
the deadline. 


請加QQ:99515681  郵箱:99515681@qq.com   WX:codinghelp

掃一掃在手機(jī)打開當(dāng)前頁
  • 上一篇:代寫MS6711、代做Python語言程序
  • 下一篇:易分期全國客服電話-易分期24小時(shí)人工服務(wù)熱線
  • ·INT5051代做、代寫Python編程設(shè)計(jì)
  • ·代做ACCT 6142 、代寫Python編程語言
  • ·CS 189代做、Python編程語言代寫
  • ·代寫INT2067、代做Python編程語言
  • ·代寫0CCS0CSE、代做Python編程設(shè)計(jì)
  • ·代做DEV5005A、代寫Java/Python編程
  • ·DSCI 510代寫、代做Python編程語言
  • ·MATH2033代做、代寫Java,Python編程
  • ·代做DI11004、Java,Python編程代寫
  • ·03CIT4057代做、代寫c++,Python編程
  • 合肥生活資訊

    合肥圖文信息
    流體仿真外包多少錢_專業(yè)CFD分析代做_友商科技CAE仿真
    流體仿真外包多少錢_專業(yè)CFD分析代做_友商科
    CAE仿真分析代做公司 CFD流體仿真服務(wù) 管路流場仿真外包
    CAE仿真分析代做公司 CFD流體仿真服務(wù) 管路
    流體CFD仿真分析_代做咨詢服務(wù)_Fluent 仿真技術(shù)服務(wù)
    流體CFD仿真分析_代做咨詢服務(wù)_Fluent 仿真
    結(jié)構(gòu)仿真分析服務(wù)_CAE代做咨詢外包_剛強(qiáng)度疲勞振動(dòng)
    結(jié)構(gòu)仿真分析服務(wù)_CAE代做咨詢外包_剛強(qiáng)度疲
    流體cfd仿真分析服務(wù) 7類仿真分析代做服務(wù)40個(gè)行業(yè)
    流體cfd仿真分析服務(wù) 7類仿真分析代做服務(wù)4
    超全面的拼多多電商運(yùn)營技巧,多多開團(tuán)助手,多多出評軟件徽y1698861
    超全面的拼多多電商運(yùn)營技巧,多多開團(tuán)助手
    CAE有限元仿真分析團(tuán)隊(duì),2026仿真代做咨詢服務(wù)平臺
    CAE有限元仿真分析團(tuán)隊(duì),2026仿真代做咨詢服
    釘釘簽到打卡位置修改神器,2026怎么修改定位在范圍內(nèi)
    釘釘簽到打卡位置修改神器,2026怎么修改定
  • 短信驗(yàn)證碼 寵物飼養(yǎng) 十大衛(wèi)浴品牌排行 suno 豆包網(wǎng)頁版入口 wps 目錄網(wǎng) 排行網(wǎng)

    關(guān)于我們 | 打賞支持 | 廣告服務(wù) | 聯(lián)系我們 | 網(wǎng)站地圖 | 免責(zé)聲明 | 幫助中心 | 友情鏈接 |

    Copyright © 2025 hfw.cc Inc. All Rights Reserved. 合肥網(wǎng) 版權(quán)所有
    ICP備06013414號-3 公安備 42010502001045

    国产人妻人伦精品_欧美一区二区三区图_亚洲欧洲久久_日韩美女av在线免费观看
    97精品国产91久久久久久| 亚洲欧美国产一区二区| 欧美一区二区三区在线免费观看 | 精品无码久久久久久久动漫| 欧美亚洲一区在线| 欧美激情专区| 国产一区二区视频免费在线观看 | 91黄在线观看| 91久久久久久久久| 欧美一区二视频在线免费观看| 日日噜噜夜夜狠狠久久丁香五月| 国产精品久久久久99| 国产精品第一区| 九九久久国产精品| 亚洲色图都市激情| 日韩高清国产一区在线观看| 欧美日韩在线观看一区| 熟女视频一区二区三区| 日本视频一区在线观看| 僵尸世界大战2 在线播放| 国产一区二区中文字幕免费看| 亚洲精品无人区| 日韩中文字幕在线免费| 欧美主播一区二区三区美女 久久精品人| 久久亚洲春色中文字幕| 精品中文字幕在线2019| 午夜久久久久久久久久久| 久久99精品视频一区97| 亚洲一区二区精品在线| 国产精品女人久久久久久| 国产二区不卡| 日韩午夜在线视频| 精品成在人线av无码免费看| 国产精品偷伦一区二区| 久久久99爱| 99在线观看视频网站| 国产一区玩具在线观看| yellow视频在线观看一区二区| 国产三区精品| 91.com在线| 国产精品久久久久久五月尺| 日韩在线精品一区| 久久99亚洲精品| 日本免费成人网| 国产日韩精品综合网站| 国产a级全部精品| 伊人久久av导航| 国内外免费激情视频| 久久精品在线免费视频| 欧美成人一二三| 久久夜精品va视频免费观看| 亚洲精品日产aⅴ| 亚洲国产成人不卡| 免费看污久久久| 久久天天东北熟女毛茸茸| 欧美精品日韩www.p站| 日本精品一区二区三区四区| 国产免费久久av| 成人动漫在线观看视频| 久久久久女教师免费一区| 综合色婷婷一区二区亚洲欧美国产| 在线观看av的网址| 今天免费高清在线观看国语| 国产在线一区二区三区欧美| 国产又黄又猛视频| 久久在线中文字幕| 一区二区三视频| 国产在线精品一区免费香蕉| 久久久久久久久久久99| 亚洲精品欧洲精品| 啊啊啊一区二区| 国产成人avxxxxx在线看| 91福利视频网| 久久久久久久久久久av| 亚洲一区二区在线播放| 欧美一区二区三区免费观看| 无码人妻aⅴ一区二区三区日本 | 僵尸世界大战2 在线播放| 99在线视频首页| 欧美精品一二区| 韩国福利视频一区| 国产欧美一区二区三区视频| 久久久极品av| 欧美日韩精品不卡| 高清国产一区| 欧美日韩成人在线播放| 日韩av日韩在线观看| 99热国产免费| 国产成人精品最新| 欧美激情图片区| 国产美女扒开尿口久久久| 欧美精品生活片| 国产麻豆一区二区三区在线观看 | 国产欧美综合精品一区二区| 不用播放器成人网| 国产亚洲精品自在久久 | 亚洲一区二区精品在线| 欧美专区在线播放| 日韩中文字幕视频| 亚洲图片欧洲图片日韩av| 色综合久久久久无码专区| 欧美国产日韩激情| 久久久久亚洲精品成人网小说| 日本国产在线播放| 日韩在线免费高清视频| 欧美性受xxxx黑人猛交| av片在线免费| 色999日韩欧美国产| 欧美成人久久久| 日本人成精品视频在线| 久久人妻无码一区二区| 欧美激情一级二级| 成人黄动漫网站免费| 午夜精品久久久久久久99热| 久久精品国产精品亚洲色婷婷| 欧美专区在线视频| 久久久免费观看| 日本精品久久久久影院| 日韩视频永久免费观看| 蜜臀久久99精品久久久酒店新书| 久久在线精品视频| 亚洲a在线播放| 国产又粗又爽又黄的视频| 欧美激情欧美激情在线五月| 欧美国产亚洲一区| 国产激情视频一区| 欧美精品国产精品日韩精品| 成人黄色中文字幕| 欧美成人在线免费| 97人人模人人爽人人喊38tv | 精品国产一区二区三区麻豆小说| 成人在线免费观看一区| 日本精品免费一区二区三区| 91精品在线影院| 国产99视频精品免视看7| 99精品免费在线观看| 欧美专区国产专区| 亚洲天堂第一区| av无码精品一区二区三区| 日韩欧美一区二| 国产高清自拍一区| 国内精品在线一区| 国产精品入口夜色视频大尺度| 日本国产高清不卡| 国产高清精品一区二区三区| 国内成+人亚洲| 亚洲人成77777| 91精品一区二区| 欧美变态另类刺激| 国产精品视频免费观看www| 日韩欧美精品一区二区三区经典 | 久久国产主播精品| 日韩午夜视频在线观看| 国产精品麻豆va在线播放| 国产精品18久久久久久首页狼| 亚洲欧美成人一区| 国产精品免费一区二区三区观看| 免费在线观看的毛片| 中文字幕综合在线观看| 久久精品青青大伊人av| 久久免费视频网| 欧洲中文字幕国产精品| 一区二区三区久久网| 91久久精品www人人做人人爽| 欧美精品二区三区四区免费看视频 | 综合色婷婷一区二区亚洲欧美国产| 久久久久久久有限公司| 99精品欧美一区二区三区| 欧美一级视频免费在线观看| 69精品丰满人妻无码视频a片| 午夜一区二区三区| 欧美精品在线免费播放| 国产成人精品视频免费看| 麻豆一区二区三区在线观看 | av在线亚洲男人的天堂| 国产日韩久久| 午夜精品一区二区三区在线视| 久久av中文字幕| av一区二区三区在线观看| 免费看成人午夜电影| 在线观看免费91| 国产v亚洲v天堂无码| 99热亚洲精品| 99热在线播放| 97欧美精品一区二区三区| 成人免费观看a| 白白操在线视频| 91免费版网站入口| 91精品国产综合久久香蕉最新版| 成人av.网址在线网站| 成人福利网站在线观看11| 国产精品自产拍高潮在线观看| 国产免费一区视频观看免费 | 久久超碰亚洲| 精品网站在线看| 欧美激情国产精品日韩| 欧美一区国产一区| 麻豆传媒一区二区| 国产精品夜夜夜爽张柏芝| 欧美中文字幕在线视频|