0% found this document useful (0 votes)
25 views11 pages

Om Patil

Uploaded by

karbharigughe123
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views11 pages

Om Patil

Uploaded by

karbharigughe123
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 11

Annexure – I

Micro-Project Proposal

“User Authentication System”

1.0. Aims/Benefits of the Micro-Project

a) User Identity Verification: Understand how to verify user identities securely.


b) Secure Session Management: Learn to implement session handling, cookies, or token-based systems
like JWT.
c) Database Interaction: Handle user data with care, ensuring sensitive data (e.g., passwords) is stored
securely.
d) Error Handling and Validation: Properly handle failed logins, registration errors, and form validation.
e) Integration with Third-party Services: Implement OAuth-based authentication (e.g., Google login) or
other third-party integrations.
2.0. Course Outcomes Addressed
a) Install operating system and configure it. Not Addressed

b) Use operating system tools to perform various functions. Not Addressed

c) Execute process commands for performing process Addressed


management operations.

d) Apply scheduling algorithms to calculate turnaround time Addressed


and average waiting time.
e) Calculate efficiency of different memory management Not Addressed
techniques.
f) Apply file management techniques. Not Addressed

3.0Project Methodology
a) Identify the core functionality and requirements for the user authentication system..
b) Design the system architecture and components of the authentication system.
c) Implement the system’s core features and functionality.
d) Ensure the system is working as expected and is secure.
e) Make the system live and accessible to users..
f) Provide documentation for end-users, developers, and administrators.
4.0 Action Plan (Sequence and time required for major activity)

Planned
Sr. Planned Name of
Details of activity Finish
No. Start Date Responsible
Date Team Member
Information Gathering and Topic
1 Om Patil
Finalization
Preparing Project Proposal Om Patil
2
and Approval
3 Implementing Project Om Patil

4 Preparing Project Report Om Patil

5 Presenting Project Om Patil

6 Submission of Project and Report Om Patil

5.0 Resource Required (Major resources such as raw material, some machining facility,
software etc.

Sr. Name of Specifications Qty. Remarks


No. Resource/Material
1 www.javatpoint.com Online website 1

2 www.geeksforgeeks.org Online website 1

3 Operating systems
Book 1

Roll No Enrollment No Name of Member


73 23611470241 Om Sharad Patil

Prof. D.J.Ugale
OSY-22415, Subject In-
chargeName and
Signature of Staff
Annexure –II
Micro-Project Report

“operating system in services.”

1.0 Rationale:-

The **User Authentication System** micro-project is essential because it addresses a core functionality that
is fundamental to the security and usability of almost all modern web applications. By implementing this
system, developers gain hands-on experience in designing secure user authentication processes, including
password hashing, session management, and token-based authentication. It reinforces critical skills in both
**frontend and backend development**, offering practical knowledge in user data handling, database
management, and secure communication. Additionally, this project provides valuable exposure to
**cybersecurity best practices**, preparing developers to build more resilient applications and protect
sensitive user information from common vulnerabilities and attacks.

1.0 Aims/Benefits of the Micro-Project

1 User Identity Verification: Understand how to verify user identities securely.


2 Secure Session Management: Learn to implement session handling, cookies, or token-based systems
like JWT..
3 Database Interaction: Handle user data with care, ensuring sensitive data (e.g., passwords) is stored
securely..
4 Integration with Third-party Services: Implement OAuth-based authentication (e.g., Google login) or
other third-party integrations. Implement robust access control and data protection measures.
5 To Easily expand or shrink services based on demand.
6 Simplify updates and ensure system reliability.
7 Optimize system performance for responsive services.
2.0 Course Outcomes Addressed
 Understand and Apply Core Programming Languages and Frameworks
 Understand Web Application Security and Best Practices.
 Understand and Apply Software Development
Methodologies
 Understand and Implement User Interface Design.

3.0. Literature Review


A User Authentication System is a cornerstone of modern web applications, ensuring that only authorized
users can access certain resources and services. This system involves several key techniques, including
password hashing, session management, multi-factor authentication, and role-based access control. Over the
years, the development and implementation of authentication systems have evolved significantly, as
researchers and practitioners seek to balance usability, security, and scalability. Below is a review of the
existing literature related to user authentication systems, focusing on their evolution, techniques, challenges,
and best practices.

4.0. Actual Procedure followed


 Defined core functionalities: user registration, login, password recovery, secure session
management, and user roles..

 Chose a relational database for storing user credentials and session information..

 Planned authentication flow and security measures (e.g., password hashing, JWT tokens)...

 Developed user interfaces for registration, login, and password recovery..

 Created endpoints for user registration, login, and password recovery..

 Implemented bcrypt for password hashing and JWT for session management.

 Created users table for storing hashed passwords and other user data..

 Applied bcrypt for password hashing and salting..

 Implemented input validation and protection against common vulnerabilities (SQL


injection, XSS)...

 Performed security testing to ensure robustness against attacks.

 Conducted unit testing and integration testing for API functionality.

 Deployed the frontend on platforms like Netlify and backend on Heroku or AWS...

 Configured SSL/TLS encryption for secure data transmission.


 Prepared technical documentation detailing system architecture, API endpoints, and setup
instructions.
 Fixed bugs, added features like 2FA and OAuth integration..
 Applied security patches and kept dependencies updated

Explanation :
• The development of the **User Authentication System** began with a clear
understanding of the core requirements, including user registration, login,
password recovery, and secure session management. The system was designed
with a **client-server architecture**, where the frontend (built with HTML, CSS,
and JavaScript) communicates with the backend (using **Node.js** and
**Express.js**) via RESTful APIs. User credentials were securely stored in a
**MySQL** (or **PostgreSQL**) database, with passwords hashed using
**bcrypt** and sessions managed through **JWT tokens**. Security was
prioritized throughout, including the use of input validation to prevent
vulnerabilities such as **SQL injection**, and ensuring session tokens were stored
securely using **HTTP-only cookies**.

• Once the frontend and backend were implemented, the system underwent
rigorous **unit and integration testing** to ensure functional correctness and
security. Testing tools like **Jest** and **Mocha** were used to verify user flows,
while **security testing** helped identify vulnerabilities like **XSS** and
**session hijacking**. After successful testing, the system was deployed to cloud
platforms such as **Heroku** for the backend and **Netlify** for the frontend,
with **SSL/TLS encryption** applied for secure communication. Comprehensive
documentation was created, covering the technical architecture, API details, and a
user guide. The system was maintained and enhanced post-deployment, with
features like **two-factor authentication (2FA)** and **OAuth integration**
added to improve security..
Advantages of User Authentication System
 Enhanced Security
 Scalable and Flexible
 User-Friendly Interface
 Support for Role-Based Access Control
 Easy Deployment:
 Future Enhancements:
 Scalability
 Efficient Session Management:
 Comprehensive Security Testing
 Maintenance and updates
Disadvantages of User Authentication System
 Security Vulnerabilities :Even with advanced encryption and hashing mechanisms,
authentication systems can still be vulnerable to attacks such as brute-force attacks,
credential stuffing, or social engineering..

 User Experience and Convenience: Strong authentication methods (e.g., multi-factor


authentication, complex passwords) can create friction for users, leading to
frustration and decreased usability.

 esource Intensive:Managing authentication systems requires resources such as memory,


processing power, and storage, especially for systems with large numbers of users or
complex authentication methods (e.g., biometric systems or multi-factor authentication)..
Flowchart:
Working of User Authentication System
Diagram:-

+-------------------------+
| User Requests Login |
+-------------------------+
|
v
+-------------------------+
| Enter Username & |
| Password |
+-------------------------+
|
v
+-------------------------+
| Validate Credentials | -----> Check username and password
+-------------------------+
|
+---------+---------+
| |
v v
+--------------------+ +---------------------+
| Valid Credentials | | Invalid Credentials |
| Generate Token | | Display Error |
| & Start Session | | Prompt to Retry |
+--------------------+ +---------------------+
| |
v v
+------------------------+ +-----------------------+
| Grant Access to System| | End (Retry/Exit) |
| (Login Successful) | +-----------------------+
+------------------------+ |
| |
v v
+-----------------------------+ +--------------------+
| Session Timeout/Expiry | | User Logs Out |
| Logout (End Session) | | (Manual Logout) |
+-----------------------------+ +--------------------+
|
v
+---------------------------+
| End (Exit System) |
+---------------------------+
5.0 Actual Methodology Followed

Planned
Sr. Planned Name of
Details of activity Finish
No. Start Responsible Team
Date
Date Member
Information Gathering and Topic
1 Om Patil
Finalization
Preparing Project Proposal Om Patil
2
and Approval
3 Implementing Project Om Patil

4 Preparing Project Report Om Patil

5 Presenting Project Om Patil

6 Submission of Project and Report Om Patil

6.0 Actual Resources Used

Sr.
Name of Resource/Material Specifications Qty. Remarks
No.
1 www.javatpoint.com Online website 1

2 www.geeksforgeeks.org Online website 1

3 Operating Systems
Book 1

7.0 Skill Developed/Learning outcomes of this Micro-Project


From this we learnt about Round Robin CPU scheduling in operating system.

Also, we got to know about finding average waiting time and averageturnaround for
Round Robin Scheduling Algorithtime each process executing in operating system.
Round Robin scheduling is an algorithm mainly used by operating systemsand
applications thatserve multiple clients that request to use resources.

8.0 Application of this Micro-Project

Round-Robin is a useful tool for having your team generate ideas, without being influenced unduly by
others in the group. This method also used to ensures that everyone on your team gets an equal say in the
ideas that you generate. We can use either the written and verbal variations of this technique.

Annexure IV
Micro-Project Evaluation Sheet
Name of Student : Om Sharad Patil Enrollment No:23611470241 Name of
Programme : Computer Engineering Semester: Fifth
Course Title: operating systems Code: 22415
Title of the Micro-Project: User Authentication System
Course Outcomes Achieved:-
a) Install operating system and configure it. Not Addressed

b) Use operating system tools to perform various functions. Not Addressed

c) Execute process commands for performing process management Addressed


operations.

d) Apply scheduling algorithms to calculate turnaround time and Addressed


average waiting time.
e) Calculate efficiency of different memory management techniques. Not Addressed

f) Apply file management techniques. Not Addressed

Sr. Characteristics to be Poor Average Good Excellent Sub-


No. assessed (Marks 1- (Marks 4- (Marks 6- (Marks 9- Total
3) 5) 8) 10)

(A) Process and Product Assessment (Convert above total marks out of 6 Marks)
1 Relevance to the course
Literature Review/
2
Information Collection

Completion of the
3
Targetas per
Project Proposal
Analysis of Data and
4
Representation

Quality of
5
Prototype/Model

6 Report Preparation
(B) Individual Presentation/Viva (Convert above total marks out of 4 Marks)
7 Presentation
8 Viva

(A) Process and Product Assessment (B) Individual Presentation/Viva Total Marks
(6 Marks) (4 Marks) (10 Marks)

Comments/Suggestions about team work/leadership/inter-personal communication (if any)

Name and Designation of the Teacher: Prof. D.J.Ugale

Dated Signature:

You might also like