SINCE 2004

  • 0

      0 Item in Bag


      Your Shopping bag is empty

      CHECKOUT
  • Notice

    • ALL COMPUTER, ELECTRONICS AND MECHANICAL COURSES AVAILABLE…. PROJECT GUIDANCE SINCE 2004. FOR FURTHER DETAILS CALL 9443117328

    Projects > COMPUTER > 2019 > NON IEEE > APPLICATION

    Nymble Management System


    Abstract

    File sharing is the public or private sharing of computer data or space in a network with various levels of access privilege. File data sharing is common in day to day life. The data Owner store the file in server, the particular file are requested by the third party. The requested third party user may corrupt the details. Thus the security of file accessing is still a complex for accessing the data. This is concerned and overcome in the proposed system. In proposed mechanism the data that used to process under the previous mechanism is not efficient. Thus a new mechanism is implemented in the proposed for checking and blocking the misbehaved user. Here the main use of the proposed system is used to identify the misbehaving user. There are two entities implemented here one is Pseudonym manager (PM) and another one is Nymble Manager (NM). The PM is used for the registration process. User first register under PM.PM share the registration file to the NM And the NM is used to deliver token for the registered user and to identify the Misbehaving user. Misbehavior users are revocated by nymble.The identified false user are then revoked and added to the Black List Thus the black list user are not allowed to access the server. The black list user are then send to the PM. This is used for further avoiding the unauthorized access. Thus this is the simple and efficient data accessing model. Provide High Security access permission and improved efficiency.


    Existing System

    In previous mechanism PM user is introduced for registering and verifying process. Here the PM is not efficient for checking the dual mechanism. Thus any fault occur while viewing the File, PM regret to conclude. Attribute-based credentials allow a user to prove properties about her anonymously. Revoking such credentials, which requires singling them out, is hard because it is at odds with anonymity. All revocation schemes proposed to date either sacrifice anonymity altogether, require the parties to be online, output high load on the user or the verifier. As a result, these schemes are either too complicated for low-powered devices like smart cards or they do not scale. a new revocation scheme that has a very low computational cost for users and verifiers, and does not require users to process updates. We trade only a limited, but well-defined, amount of anonymity to make the first practical revocation scheme that is efficient at large scales and fast enough for smart cards.


    Proposed System

    The main contribution of this project is to avoid misbehavior users. User first register under PM. PM verify the user details. Then user detail sends to NM. NM generate token that is transmitted to registered user. NM can verify the user token and permit to access specific file. If the user tries to access unauthorized file more than three times, then NM relocated the user. The relocated user can’t access their registered account NM send the relocated list to the PM for avoiding the Re-entry of the user who are relocated Here Nymble is used to manage the file security and uploading Here the user are allowed to check the file which is granted by the NM.


    Architecture


    ARCHITECTURE DIAGRAM


    FOR MORE INFORMATION CLICK HERE