0% found this document useful (0 votes)
281 views103 pages

Accountable Privacy-Preserving Mechanism For Cloud Computing Based On Identity-Based Encryption

This document appears to be a thesis submitted by R. Sivanarayana to KMM Institute of Post Graduate Studies in partial fulfillment of the requirements for a Master of Computer Applications degree. The thesis proposes an accountable privacy-preserving mechanism for cloud computing based on identity-based encryption. It defines key privacy concepts, presents the system architecture, proposes an integrated accountability and auditing approach, analyzes potential security attacks, and discusses experimental results to demonstrate the efficiency of the proposed mechanism.

Uploaded by

tejkumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
281 views103 pages

Accountable Privacy-Preserving Mechanism For Cloud Computing Based On Identity-Based Encryption

This document appears to be a thesis submitted by R. Sivanarayana to KMM Institute of Post Graduate Studies in partial fulfillment of the requirements for a Master of Computer Applications degree. The thesis proposes an accountable privacy-preserving mechanism for cloud computing based on identity-based encryption. It defines key privacy concepts, presents the system architecture, proposes an integrated accountability and auditing approach, analyzes potential security attacks, and discusses experimental results to demonstrate the efficiency of the proposed mechanism.

Uploaded by

tejkumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 103

ACCOUNTABLE PRIVACY-PRESERVING

MECHANISM FOR CLOUD COMPUTING


BASED ON IDENTITY-BASED
ENCRYPTION
AT

TAKE OFF EDUCTIONAL GROUP.TIRUPATI

Submitted in partial fulfillment of the requirement for the award of Degree of

Master of Computer Applications


By

R.Sivanarayana
Regd. No: 2317268

Department of Computer Applications

KMM INSTITUTE OF POST GRADUATE STUDIES

(Affiliated to Sri Venkateswara University, Tirupati)

RamiReddiPalle, TIRUPATI-517 102

September, 2020
ACCOUNTABLE PRIVACY-PRESERVING
MECHANISM FOR CLOUD COMPUTING
BASED ON IDENTITY-BASED ON
ENCRYPTION
AT

TAKE OFF EDUCTIONAL GROUP,TIRUPATI


Submitted in partial fulfillment of the requirement for the award of Degree of

Master of Computer Applications

By

R.Sivanarayana

Regd. No: 2317268

Under the Guidance of : Dr.K.Purushotham


Department of Computer Applications

KMM INSTITUTE OF POST GRADUATE STUDIES


(Affiliated to Sri Venkateswara University, Tirupati)
RamiReddiPalle, TIRUPATI-517 102

September - 2020
KMM INSTITUTE OF POST GRADUATE STUDIES

(Affiliated to Sri Venkateswara University,Tirupati)

RamiReddiPalle, TIRUPATI – 517 102.

DEPARTMENT OF COMPUTER APPLICATIONS

C ERTIFICATE

REGISTERED NO: 2317268

This is to certify that the report entitled Accountable-privacy preserving mechanism for cloud
computing based on identity-based encryption submitted by R SIVANARAYANA in partial
fulfillment of the requirements for the award of the degree of Master of Computer
Applications under our supervision and guidance in the VI semester of course , during the
academic year 2019 - 2020.

HEAD Project Guide

Attended and submitted for the University Viva –Voce Examination.

Signature (s) of the Examiners: 1.

(External Examiner)

2.
(Internal Examiner)

3.
(Chairman)
Acknowledgments

“Task successful” makes everyone happy. But the happiness will be gold without glitter if we didn’t
state the persons who have supported us to make it a success. Success will be crowned to people
who made it a reality but the people whose constant guidance and encouragement made people
behind the screen who guided, inspired and helped me for the completion of our project work. I
consider myself lucky enough to get such a good project. This project would add as an asset to my
academic profile.

An endeavor over a long period can be successful only with the advice and support of many well it
possible will be crowned first on the eve of success. This acknowledgement transcends the reality of
formality when we would like to express deep gratitude and respect to all those wishes. We take this
opportunity to express our gratitude and appreciation all of them. Graduate Studies, Tirupati, for his
encouragement.

We would like to thank Mr R. Sivanarayana, for assisting us in the development of the system, and
her personal interest provided an unending encouragement and guidance that sustained us
throughout the project.

We would like to thank to all those who have been a support and an inspiration and especially the
staff in office and lab.

Our special thanks to Dr. K. VenkataRamana, Principal & HOD KMM Institute of Post

Mr. R Sivanarayana
Abstract
Considering the openness and cross-domains of cloud computing, the traditional privacy preserving
technology cannot be applied in cloud computing efficiently. In this paper, inspired by the
accountability idea, we proposed an accountable privacy-preserving mechanism based on Identity-
Based Encryption (IBE) for cloud computing, which focuses on constraining the illegal network
behavior by performing accountability to protect the privacy for cloud participants. Firstly, based
on the description logic, we defined the basic privacy concepts about the privacy guarantee(PG),
privacy request(PR), privacy attribute(PA), privacy exposure condition(PEC) for cloud system, at the
same time, the system architecture for the proposed accountable privacy-preserving mechanism is
presented; secondly, combining the proposed accounting and auditing approaches, the integrated
accountable privacy-preserving mechanism for cloud computing is proposed; and then, based on
the possible two kinds adversary attacks against the proposed mechanism, the detailed security
analysis and proof for the proposed mechanism are given finally, we provide extensive
experimental results and potential accountability implementation to demonstrate the efficiency of
the proposed mechanism.
List of Figures
Figure no Title Page no

4.3 Use case Diagram 21


4.5 Sequence Diagram 22
4.7 Activity Diagram 24
4.8 Component Diagram 26
List of Tables

Table NO Title Page NO

6.5.1 User 40
6.5.2 Owner 40
List of Screens

Name Page no

Home 77
Auditor 78
Data owner 78
View user 79
Auditor login 78
Data owner Login 81
View user Login 82
View 83
Response 84
List of Figures

Figure Number Figure Name Page Number

4.1 E-R Diagram 15

4.2 DFD 16

4.3 Use Case Diagram 21

4.4 Activity Diagram 24

4.5 Sequence Diagram 25

List of Tables
Table Number Table Name Page Number

4.6 Data Dictionary 33

6.3.2 Database Tables 40


Contents (all Headings monotype
corasiva)

Acknowledgements I

Abstract Ii

Contents Iii

List of Figures Iv

List of Tables

1. Introduction 01

1.1 Organization profile 01

1.2 Organization chart 02

1.3 Introduction to Cloud computing/ Security (which ever is ur project topic) Here
add introduction contents in two journal papers)

1.4 Project Layout 04

2. Genesis of the study 06

2.1 Aim 06

2.2 Problem Description 06

2.3 Description of Existing System 07

2.3.1 Literature Survey ( add relative study in 2 conference papers) 07

2.2.2 Bottlenecks of Existing System 08

2.4 Methodology 10

2.5 Proposed System 10

2.4.1 Objectives of Proposed System (proposed system in 2nd conference paper) 11

2.4.2 Advantages of Proposed System 11

2.4.3 Limitations of Proposed System 11


3. Feasibility Study 12

3.1 Operational Feasibility 12

3.2 Technica lFeasibility 13

3.3 Economical Feasibility 13

4. System Analysis 14

4.1 Entity-Relationship Diagrams 15

4.2 Data Flow Diagrams 16

4.3 Use-case Diagram 21

4.4 Activity Diagram 22

4.5 Sequence Diagram 24

4.6 Data Dictionary 26

5. System Requirements Analysis 28

5.1 Hardware Requirements 28

5.2 Software Requirements 28

5.3 Features of software 29

6. System Design

6.1 Introduction 41

6.2 Design principle 41

6.3 Database design 42

6.3.1 Normalization 42

6.3.2 Database Table 42

6.4 Hipo chart 43

6.4.1 Module Design 44


7. System Testing 45

7.1 White Box Testing 45

7.2 Black Box Testing 46

7.3 Unit Testing 47

7.4 Integration Testing 48

7.5 test case0073 48

8. Implementation 49

8.1 Algorithm implementation 50

8.2 Program code and output 50

9. Conclusion 75

APPENDICES 76

APPENDIX - A User Manual 77

APPENDIX - B Test screens 78

BIBLIOGRAPHY 91

APPENDIX - C Base Paper ..

APPENDIX - D Conference Paper-1 ..

APPENDIX - E Cover page and Conference Paper-2 ..


Accountable Privacy-Preserving Mechanism For Cloud Computing

1.introduction
KMMIPS is an educational society established in 2000 by a group of retired civil
servant. This is an educational society which serves for the betterment of the students.
Initially this college offers three major programs MCA, MBA and B.Ed.

Cloud computing is a latest technology which provides a flexible way to manipulate and
access data over internet by following pay-per-use model. So it is known as the pool of
services. Nowadays, secure load balancing is very popular due to protect the
computational resources; hence, the cloud environment. But to preserve the resources
remains a very challenging task for the CSPs because these are dynamically
changeable.

KMM Institute of Post Graduate Studies:

 Provide good higher-level educational services.


 Develop good communicational skills to students.
 Provide good managerial skills to MBA, MCA & B. ED Students.

This approach rests on:

 A strategy where we architect, integrate and manage technology services and


solutions.
 A robust offshore development methodology and reduced Manual works of
students.

They understand the importance of timing, getting details of necessary information as


well as storing the information. A rich portfolio of reusable, modular frameworks helps
jump start projects.

A full-service portfolio:

KMMIPS Page 1
Accountable Privacy-Preserving Mechanism For Cloud Computing

This offers Student and Administrator maintain, architect, integrate and manage through
the system.

Services:

This system provides its services to Educational institutions, which are in the field of
providing good helpful college Student information system.

1.1 Organization Profile:

“SathyamevaJayathi” – Truth always Triumph is the motto of our KMM Educational


Society, Tirupati.

Nothing is permanent except change. The ongoing advances in computer


communications technology continue to have profound effect on the way people work
and play. Both the technology itself and the expectations of the people who use it are
altering the features of the information system that analysis, design and the widespread
deployment of information systems in changing the very nature of the society in which
the systems are used. The development of the information economy.

KMM Institute of postgraduate studies very popularly known as KMMIPS has emerged
as a major Technological Institute managed by KMM SOCIAL AND EDUCATIONAL
DEVELOPMENT SOCIETY, Tirupati. The KMM Society has taken the lead role to
establish the institute in academic year 2001-2002. Sprawled over an area of 25 acres,
permanent infrastructural facilities are being developed near Tirupati-Madanapalli state
Highway at Ramireddypalle. KMMIPS has already secured the approval from the All
India Council of Technical Education (AICTE). New Delhi, and Government of Andhra
Pradesh and is affiliated to Sri Venkateswara University, Tirupati.

KMMIPS offers admission into the professional courses MCA and MBA with annual
intake of 180 and 180 seats each. The institution is governed by the chairman Sri S.
Srinivasulugaru, retired IRS (Indian Revenue Service) officer with the support of an
advisory body consisting of the eminent personalities form different fields.

Company: KMM Educational Institutions, Tirupathi.

KMMIPS Page 2
Accountable Privacy-Preserving Mechanism For Cloud Computing

Contact:Madanapalli Highway Road, Ramireddipalle, Tirupathi.

Operating Since: 2000

Managing Director: Sri S. SrinivasuluGaru

Legal Status: Educational Society

1.2 Organization Chart:

1.3 Introduction:

Cloud computing is a latest technology which provides a flexible way to manipulate and
access data over internet by following pay-per-use model. So it is known as the pool of
services. Nowadays, secure load balancing is very popular due to protect the
computational resources; hence, the cloud environment. But to preserve the resources
remains a very challenging task for the CSPs because these are dynamically
changeable. My proposed secure approach for load balancing is essentially based on
the elastic dynamic behaviour of the cloud environment. Hence, it maximizes the
required resource utilizations by controlling SLA violation. On the other hand, my
proposed approach can assign the available VMs to the incoming workload by equally
KMMIPS Page 3
Accountable Privacy-Preserving Mechanism For Cloud Computing

slotted the incoming workload, and the security of those resources is taken care with the
help of SRNN algorithm.

1.4 Project Report Layout:

This project consists of eight chapters with an overview of computerization of Staff


Information System.

Chapter 1 Introduction: It deals with the overview of the organization and its
administrative hierarchy.

Chapter 2 Genesis of the Study: It outlines the Existing problem, the solution
proposed, methodology used and looks at how the preliminary investigation carried out,
what are all its scope and objectives and limitations of existing manual system.

Chapter 3 Feasibility Study: It is used to test the feasibility of the project i.e.,
Operational, Technical and Economical feasibilities of the system.

Chapter 4 System Analysis: It deals with software requirement analysis. The various
entities and their requirements and their relationships are discussed using E-R
Diagrams.

Chapter 5 System requirements: It explains about the various hardware and software
requirements and their features.

Chapter 6 System Design: It contains the description of all the tables and its
attributes, design principles, HIPO charts and user interface design.

Chapter 7 System Testing: It presents software-testing strategies and techniques like


white box testing, back box testing.

Chapter 8 Implementation: It gives the software and hardware implementation details


of the system.

Chapter 9 Conclusion:

KMMIPS Page 4
Accountable Privacy-Preserving Mechanism For Cloud Computing

2.Genesis of
Study
This chapter deals with the study of the existing system and describes the need for the
proposed system to overcome the drawbacks in the existing system. It also specifies
the objectives, scope of the system and also the methodology for the system
development.

Hence the genesis of the study clearly depicts the factors regarding the beginning of the
existing system and its extension to the proposed system and it includes the following.

2.1 Aim:

An effective clustering for informational retrieval . As the number of users using the web
growing rapidly, so it creates many challenges of information retrieval which become the
current research topics. In general the search results returned using any searching
paradigm are not clustered automatically. But as the case is documents returned for a
keyword may be of different nature depending upon the different meanings of the
keyword. That is to say that the set of documents returned for a given keyword may
further be subdivided into subsets of documents conveying similar sense of the keyword

2.2 Problem Description:

The purpose of An effective clustering for informational retrieval on Weighting Approach


is to allow for storing details of a large number of files those are csv files. If one file
consists of different authors to write different books, in this manner we can find out the
probability of those authors by using uncertain graphs.

2.3 Description Existing System:

KMMIPS Page 5
Accountable Privacy-Preserving Mechanism For Cloud Computing

In existing system, in large datasets, the cost of calculating the distance between the
new point and each existing point is huge which degrades the performance of the
algorithm. The KNN algorithm doesn't work well with high dimensional data because
with large number of dimensions, it becomes difficult for the algorithm to calculate the
distance in each dimension. We need to do feature scaling (standardization and
normalization) before applying KNN algorithm to any dataset. If we don't do so, KNN
may generate wrong predictions.KNN is sensitive to noise in the dataset. We need to
manually imputemissing values and remove outliers.

2.3.1 Literature survey

Literature survey is the most important step in software development process. Before
developing the tool it is necessary to determine the time factor, economy n company
strength. Once these things r satisfied, ten next steps are to determine which operating
system and language can be used for developing the tool. Once the programmers start
building the tool the programmers need lot of external support. This support can be
obtained from senior programmers, from book or from websites. Before building the
system the above consideration are taken into account for developing the proposed
system.

Yan Z, Li X, Wang M, et al. Flexible Data Access Control based on Trust and
Reputation in Cloud Computing[J]. IEEE Transactions on Cloud Computing, 2017,
PP(99):1-1.
Cloud Computing provides many services among them storing data. Storing user’s data
at the cloud frees the burden of user’s devices and it leads to better access of data.
Due to distrust in cloud service providers data owners normally store their data in an
encrypted form. But in various conditions, data need to be accessed by other entities to
achieve an expected service, e.g., an eHealth service. By this control of personal data
access at the cloud is a vital issue. Various applications scenarios request for flexible,
fine-grained access control and better data confidentiality. Although the existing access
control mechanism does not find a suitable solution. Furthermore, trust plays a main
role in data sharing. Trust helps to control uncertainty and avoid the potential risks. But
literature still needs a solution to access control of data based on trust and reputation.
KMMIPS Page 6
Accountable Privacy-Preserving Mechanism For Cloud Computing

The proposed system provides an efficient access control mechanism which is applied
by the data owner and reputation center in a flexible manner by implementing Attribute-
Based Encryption and Proxy Re-Encryption.
Xia Z, Wang X, Zhang L, et al. A privacy-preserving and copy-deterrence content-
based image retrieval scheme in cloud computing [J]. IEEE Transactions on
Information Forensics and Security, 2016, 11(11): 2594-2608.
With the increasing importance of images in people’s daily life, Content-based Image
Retrieval (CBIR) has been widely studied. Compared with text documents, images
consume much more storage space. Hence, its maintenance is considered to be a
typical example for cloud storage outsourcing. For privacy-preserving purposes,
sensitive images, such as medical and personal images, need to be encrypted before
outsourcing, which makes the CBIR technologies in plaintext domain to be unusable. In
this paper, we propose a scheme that supports CBIR over encrypted images without
leaking the sensitive information to the cloud server. Firstly, feature vectors are
extracted to represent the corresponding images. After that, the pre-filter tables are
constructed by locality-sensitive hashing to increase search efficiency. Moreover, the
feature vectors are protected by the secure kNN algorithm, and image pixels are
encrypted by a standard stream cipher. In addition, considering the case that the
authorized query users may illegally copy and distribute the retrieved images to
someone unauthorized, we propose a watermark-based protocol to deter such illegal
distributions. In our watermark-based protocol, a unique watermark is directly
embedded into the encrypted images by the cloud server before images are sent to the
query user. Hence, when an illegal image copy is found, the unlawful query user who
distributed the image can be traced by the watermark extraction. The security analysis
and experiments show the security and efficiency of the proposed scheme.

Yuan J, Yu S. Privacy preserving back-propagation neural network learning made


practical with cloud computing [J]. IEEE Transactions on Parallel and Distributed
Systems, 2014, 25(1): 212-221.

Back-propagation is an effective method for neural network learning. To improve the


accuracy of the learning result, in practice multiple parties may want to collaborate by
jointly executing the back-propagation algorithm on the union of their respective data
KMMIPS Page 7
Accountable Privacy-Preserving Mechanism For Cloud Computing

sets. During this process no party wants to disclose her/his private data to others for
privacy concerns. Existing schemes supporting this kind of collaborative learning just
partially solve the problem by limiting the way of data partition or considering only two
parties. There still lacks a solution for more general and practical settings wherein two
or more parties, each with an arbitrarily partitioned data set, collaboratively conduct
learning. In this paper, by utilizing the power of cloud computing, we solve this open
problem with our proposed privacy preserving back-propagation algorithm, which is
tailored for the setting of multiparty and arbitrarily partitioned data. In our proposed
scheme, each party encrypts his/her private data locally and uploads the ciphertexts
into the cloud. The cloud then executes most of the operations pertaining to the learning
algorithms with ciphertexts but learns nothing about the original private data. By
securely offloading the expensive operations to the cloud, we keep the local
computation and communication costs on each party minimal and independent to the
number of participants. To support flexible operations over ciphertexts, we adopt and
tailor the BGN ‘doubly homomorphic’ encryption algorithm for the multiparty setting.
Thorough analysis shows that our proposed scheme is secure, efficient and scalable.

Yao X, Lin Y, Liu Q, et al. Privacy-preserving Search over Encrypted Personal


Health Record in Multi-Source Cloud [J]. IEEE Access, 2018, PP(99):45-53.

Cloud-based Personal Health Record systems (CB-PHR) have great potential in


facilitating the management of individual health records. Security and privacy concerns
are among the main obstacles for the wide adoption of CB-PHR systems. In this paper,
we consider a multi-source CB-PHR system in which multiple data providers such as
hospitals and physicians are authorized by individual data owners to upload their
personal health data to an untrusted public cloud. The health data are submitted in an
encrypted form to ensure data security, and each data provider also submits encrypted
data indexes to enable queries over the encrypted data. We propose a novel Multi-
Source Order-Preserving Symmetric Encryption (MOPSE) scheme whereby the cloud
can merge the encrypted data indexes from multiple data providers without knowing the
index content. MOPSE enables efficient and privacy-preserving query processing in
that a data user can submit a single data query the cloud can process over the
encrypted data from all related data providers without knowing the query content. We
KMMIPS Page 8
Accountable Privacy-Preserving Mechanism For Cloud Computing

also propose an enhanced scheme, MOPSE+, to more efficiently support the data
queries by hierarchical data providers. Extensive analysis and experiments over real
datasets demonstrate the efficacy and efficiency of MOPSE and MOPSE+.
2.4 Scope:

The system extends its scope from manual to computerize. The system provides scope
for the Efficient an effective informational retrieval

2.5 Methodology:

The source of information for developing the proposed system is gathered directly from
clients of end user who is going to use the package becomes the primary source to give
information.

A detailed study and understanding of the existing system is done either by


questionnaires or by conducting interviews before developing the proposed one.
Different inputs, process and output are well understood before designing the system.

Application software like JavaScript with HTML. So as to give the results as per the
requirements of the system. The concepts of software engineering have been
implemented successfully and uniformly throughout the system. The performance of
the integrated system will be uniform.Then by applying KMeans algorithm on it, we
found clusters having documents which are highly related and have similar features. We
used Gensim package to implement our approach because of its simplicity and robust
nature. Experimental results show that our approach is more efficient then the above
two combine approach and can handles more efficiently the serious limitation of
traditional K-Means algorithm, which is sensitive to initial centroid and the number of
clusters to be formed.

Existing System:
There is a tremendous growth of information on web. As the number of users using the
web growing rapidly, so it creates many challenges of information retrieval which
become the current research topics. In general the search results returned using any
searching paradigm are not clustered automatically. But as the case is documents

KMMIPS Page 9
Accountable Privacy-Preserving Mechanism For Cloud Computing

returned for a keyword may be of different nature depending upon the different
meanings of the keyword. That is to say that the set of documents returned for a given
keyword may further be subdivided into subsets of documents conveying similar sense
of the keyword. Clustering the set of results will do this further subdivision and will
present the results in a better way. It organizes the documents in such a way that the
documents belonging to a group (cluster) are more similar to each other than to the
ones which are a part of a different subgroup.
Disadvantages:
1. Identifying the same data is difficult process.
2. Search results are not accurate
3. Time consuming process
2.6 Proposed system:
In this paper we introduce a combine approach to cluster the web pages which first
finds the frequent sets and then clusters the documents. These frequent sets are
generated by using Frequent Pattern growth technique. Then by applying KMeans
algorithm on it, we found clusters having documents which are highly related and have
similar features. We used Gensim package to implement our approach because of its
simplicity and robust nature. Experimental results show that our approach is more
efficient then the above two combine approach and can handles more efficiently the
serious limitation of traditional K-Means algorithm, which is sensitive to initial centroid
and the number of clusters to be formed.
2.6.1 Advantages:
1. Identifying the same data is easy process
2. Time saving process.
2. High accuracy in search results.

KMMIPS Page 10
Accountable Privacy-Preserving Mechanism For Cloud Computing

3. Feasibility Study
System study:
This chapter deals with the study of the existing system and describes the need for the
proposed system to overcome the drawbacks in the existing system. It also specifies
the objectives, scope of the system and also the methodology for the system
development.

Hence the genesis of the study clearly depicts the factors regarding the beginning of the
existing system and its extension to the proposed system and it includes the following.

3.1 Feasibility study:

The feasibility of the project is analyzed in this phase and business proposal is put forth
with a very general plan for the project and some cost estimates. During system
analysis the feasibility study of the proposed system is to be carried out. This is to
ensure that the proposed system is not a burden to the company. For feasibility
analysis, some understanding of the major requirements for the system is essential.

Three key considerations involved in the feasibility analysis are

 ECONOMICAL FEASIBILITY
 TECHNICAL FEASIBILITY
 SOCIAL FEASIBILITY

3.2 Economical feasibility:

This study is carried out to check the economic impact that the system will have on the
organization. The amount of fund that the company can pour into the research and
development of the system is limited. The expenditures must be justified. Thus the
developed system as well within the budget and this was achieved because most of the

KMMIPS Page 11
Accountable Privacy-Preserving Mechanism For Cloud Computing

technologies used are freely available. Only the customized products had to be
purchased.

3.3Technical feasibility:

This study is carried out to check the technical feasibility, that is, the technical
requirements of the system. Any system developed must not have a high demand on
the available technical resources. This will lead to high demands on the available
technical resources. This will lead to high demands being placed on the client. The
developed system must have a modest requirement, as only minimal or null changes
are required for implementing this system.

3.4 Social feasibility:

The aspect of study is to check the level of acceptance of the system by the user. This
includes the process of training the user to use the system efficiently. The user must not
feel threatened by the system, instead must accept it as a necessity. The level of
acceptance by the users solely depends on the methods that are employed to educate
the user about the system and to make him familiar with it. His level of confidence must
be raised so that he is also able to make some constructive criticism, which is
welcomed, as he is the final user of the system.

KMMIPS Page 12
Accountable Privacy-Preserving Mechanism For Cloud Computing

4.System
analysis
Existing system:

In the existing system, privacy-preserving for cloud computing has been performed, but
most of the existing works are mainly focused on the traditional privacy preserving
technology. traditional web services, cloud computing are vulnerable to many types of
network attacks as well, such as distributed denial of service attacks, worm attack,
network sniffing and sinkhole attacks.

Disadvantages:

 Less efficiency.
 The traditional privacy preserving technology cannot be applied in cloud
computing efficiently.

Proposed system:

We proposed the responsible privacy-preserving mechanism IBE-AC for cloud


participants. In the proposed mechanism, each cloud participant registers in cloud
system using their identity information, and generates private key using his/her identity
information, then they can be authenticated by each other based on the Auth-Encrypt
and Auth-Decrypt procedures, which we redesigned from the corresponding procedure
of IBE.

Advantages:

 Each registered cloud tenant associates with his/her identity information.


 We implement potential accountability to demonstrate efficiency.

KMMIPS Page 13
Accountable Privacy-Preserving Mechanism For Cloud Computing

password

4.2 Data flow diagram

DFD level

DFD Diagram

Context Level: 0
0 level

User Accountable privacy


preservinghierarchicalmech ID DATABASE
asimincloudcomputing

KMMIPS Page 14
Accountable Privacy-Preserving Mechanism For Cloud Computing

Figure: DFD Level 0

Figure: DFD Level 1

2.0

Login

2.1

Viewuserrequest

2.2
Auditor View data
providers ID Database

2.3

View user

2.4

Logout

KMMIPS Page 15
Accountable Privacy-Preserving Mechanism For Cloud Computing

Figure: DFD Level 2

Data owner 3.0

Login

3.1

View user
request

Data owner
3.2
ID Database
View accepted
view data
provider

3.3

View user

3.4

Logout

KMMIPS Page 16
Accountable Privacy-Preserving Mechanism For Cloud Computing

Figure: DFD Level 4

Data provider 4.0

Registration

4.1

Login

Data provider
4.2
ID Database
View

Profile

4.3

Upload file

4.4

View file

KMMIPS Page 17
Accountable Privacy-Preserving Mechanism For Cloud Computing

Figure: DFD Level 5

User
5.0

Registration

5.1

Login

User
5.2
ID Database
View

Profile

5.3

Download

5.4

Logout

KMMIPS Page 18
Accountable Privacy-Preserving Mechanism For Cloud Computing

System design

Uml diagram

UML stands for Unified Modeling Language. UML is a standardized general-purpose


modeling language in the field of object-oriented software engineering. The standard is
managed, and was created by, the Object Management Group.
The goal is for UML to become a common language for creating models of object
oriented computer software. In its current form UML is comprised of two major
components: a Meta-model and a notation. In the future, some form of method or
process may also be added to; or associated with, UML.
The Unified Modeling Language is a standard language for specifying, Visualization,
Constructing and documenting the artifacts of software system, as well as for business
modeling and other non-software systems.
The UML represents a collection of best engineering practices that have proven
successful in the modeling of large and complex systems.
The UML is a very important part of developing objects oriented software and the
software development process. The UML uses mostly graphical notations to express
the design of software projects.

Goals:
The Primary goals in the design of the UML are as follows:
1. Provide users a ready-to-use, expressive visual modeling Language so that they
can develop and exchange meaningful models.
2. Provide extendibility and specialization mechanisms to extend the core concepts.
3. Be independent of particular programming languages and development process.

KMMIPS Page 19
Accountable Privacy-Preserving Mechanism For Cloud Computing

4. Provide a formal basis for understanding the modeling language.


5. Encourage the growth of OO tools market.
6. Support higher level development concepts such as collaborations, frameworks,
patterns and components.
7. Integrate best practices.

4.3 Use case diagram:

A use case diagram in the Unified Modeling Language (UML) is a type of behavioral
diagram defined by and created from a Use-case analysis. Its purpose is to present a
graphical overview of the functionality provided by a system in terms of actors, their
goals (represented as use cases), and any dependencies between those use cases.
The main purpose of a use case diagram is to show what system functions are
performed for which actor. Roles of the actors in the system can be depicted.

login registration registration


login
view user request login
login
view user request

view profile
view files
view accepted users

auditor data owner


view data providers data provider user
upload files
view profile
view data providers

view users
view files
download file
logout view users
logout
logout
logout

4.4 Class diagram:

In software engineering, a class diagram in the Unified Modeling Language (UML) is a


type of static structure diagram that describes the structure of a system by showing the
system's classes, their attributes, operations (or methods), and the relationships among
the classes. It explains which class contains information.

KMMIPS Page 20
Accountable Privacy-Preserving Mechanism For Cloud Computing

data provider user


auditor data owner name name
id name password password
password password email email
number number
login() login()
view user request() view user request() registration() registration()
view accepted users() view data providers() login() login()
view data providers() view users() view profile() view profile()
view users() view accpeted users() view files() view files()
logout() logout() upload files() download files()
logout() logout()

4.5 Sequence diagram:

A sequence diagram in Unified Modeling Language (UML) is a kind of interaction


diagram that shows how processes operate with one another and in what order. It is a
construct of a Message Sequence Chart. Sequence diagrams are sometimes called
event diagrams, event scenarios, and timing diagrams.

auditor data owner sys tem data provider us er

registration
registration
login

login
login

view providers

login
view providers
view users

view profile
view users

view profile

upload file

view files
view file

view file view files

request to file

view user reques ts

view us er reques t

view acc epted users

download file

logout

logout

logout

logout

KMMIPS Page 21
Accountable Privacy-Preserving Mechanism For Cloud Computing

4.6 Collaboration Diagram:

In collaboration diagram the method call sequence is indicated by some numbering


technique as shown below. The number indicates how the methods are called one after
another. We have taken the same order management system to describe the
collaboration diagram. The method calls are similar to that of a sequence diagram. But
the difference is that the sequence diagram does not describe the object organization
whereas the collaboration diagram shows the object organization.

auditor

5: login
8: view providers
11: view users
17: view file
20: view user request
23: logout

1: registration
4: login
10: view profile
13: upload file
15: view file
25: logout
system data
data owner
provider
3: login
6: view providers
9: view users
14: view files
19: view user requests
21: view accepted users
24: logout
2: registration
7: login
12: view profile
16: view files
18: request to file
22: download file
26: logout

user

4.7 Activity diagram

Activity diagrams are graphical representations of workflows of stepwise activities and


actions with support for choice, iteration and concurrency. In the Unified Modeling
Language, activity diagrams can be used to describe the business and operational step-
by-step workflows of components in a system. An activity diagram shows the overall
flow of control.

KMMIPS Page 22
Accountable Privacy-Preserving Mechanism For Cloud Computing

auditor data owner data provider user

login login registration registration

view user request login


view user request login

view accepted users upload files


view data providers
view files

view files
view users view data providers

view download files

view profile
view users

logout logout logout


logout

4.8 COMPONENT DIAGRAM

Component diagrams are used to describe the physical artifacts of a system. This
artifact includes files, executable, libraries etc. So the purpose of this diagram is
different, Component diagrams are used during the implementation phase of an
application. But it is prepared well in advance to visualize the implementation details.
Initially the system is designed using different UML diagrams and then when the
artifacts are ready component diagrams are used to get an idea of the implementation.

KMMIPS Page 23
Accountable Privacy-Preserving Mechanism For Cloud Computing

auditor

data owner
system

data
provider

user

4.9 DEPLOYMENT DIAGRAM

Deployment diagram represents the deployment view of a system. It is related to the


component diagram. Because the components are deployed using the deployment
diagrams. A deployment diagram consists of nodes. Nodes are nothing but physical
hard ware’s used to deploy the application.

auditor

data
owner data
base

data
provider

user

KMMIPS Page 24
Accountable Privacy-Preserving Mechanism For Cloud Computing

5.System
Requirements
System requirements gives the idea about what are the necessary things that are
needed for proposed system, which plays very important role in development of any
system. This chapter deals with what are hardware components that are needed for the
system, application software that are required for the development of the system.

The environment deals with the features of software. HTML, CSS and Javascript is
used as the front-end tool and JDBC is Server-side script as a backend. Front end tools
help to visualize the system through naked eyes while back end helps in activities which
are unseen to the end user.

SYSTEM REQUIREMENTS

5.1 Hardware requirements:-

Processor - Pentium –III


RAM - 4 gb (min)

Hard Disk - 20 GB

Key Board - Standard Windows Keyboard

Mouse - Two or Three Button Mouse

Monitor - SVGA

5.2 Software requirements:-


Operating System : Windows95/98/2000/XP
Application Server : Tomcat7
KMMIPS Page 25
Accountable Privacy-Preserving Mechanism For Cloud Computing

Front End : HTML, Jsp


Scripts : JavaScript, CSS
Server side Script : Java Server Pages.
Database : MySQL 6.0
Database Connectivity : JDBC

5.3 Software Environment

Java Technology
Java technology is both a programming language and a platform.

The Java Programming Language


The Java programming language is a high-level language that can be characterized by
all of the following buzzwords:
 Simple
 Architecture neutral
 Object oriented
 Portable
 Distributed
 High performance
 Interpreted
 Multithreaded
 Robust
 Dynamic
 Secure
With most programming languages, you either compile or interpret a program so that
you can run it on your computer. The Java programming language is unusual in that a
program is both compiled and interpreted. With the compiler, first you translate a
program into an intermediate language called Java byte codes —the platform-
independent codes interpreted by the interpreter on the Java platform. The interpreter
parses and runs each Java byte code instruction on the computer. Compilation happens

KMMIPS Page 26
Accountable Privacy-Preserving Mechanism For Cloud Computing

just once; interpretation occurs each time the program is executed. The following figure
illustrates how this works.

You can think of Java byte codes as the machine code instructions for the Java Virtual
Machine (Java VM). Every Java interpreter, whether it’s a development tool or a Web
browser that can run applets, is an implementation of the Java VM. Java byte codes
help make “write once, run anywhere” possible. You can compile your program into byte
codes on any platform that has a Java compiler. The byte codes can then be run on any
implementation of the Java VM. That means that as long as a computer has a Java VM,
the same program written in the Java programming language can run on Windows
2000, a Solaris workstation, or on an iMac.

The Java Platform


A platform is the hardware or software environment in which a program runs. We’ve
already mentioned some of the most popular platforms like Windows 2000, Linux,

KMMIPS Page 27
Accountable Privacy-Preserving Mechanism For Cloud Computing

Solaris, and MacOS. Most platforms can be described as a combination of the operating
system and hardware. The Java platform differs from most other platforms in that it’s a
software-only platform that runs on top of other hardware-based platforms.

The Java platform has two components:


 The Java Virtual Machine (Java VM)
 The Java Application Programming Interface (Java API)
You’ve already been introduced to the Java VM. It’s the base for the Java platform and
is ported onto various hardware-based platforms.

The Java API is a large collection of ready-made software components that provide
many useful capabilities, such as graphical user interface (GUI) widgets. The Java API
is grouped into libraries of related classes and interfaces; these libraries are known as
packages. The next section, What Can Java Technology Do? Highlights what
functionality some of the packages in the Java API provide.
The following figure depicts a program that’s running on the Java platform. As the figure
shows, the Java API and the virtual machine insulate the program from the hardware.

Native code is code that after you compile it, the compiled code runs on a specific
hardware platform. As a platform-independent environment, the Java platform can be a
bit slower than native code. However, smart compilers, well-tuned interpreters, and just-
in-time byte code compilers can bring performance close to that of native code without
threatening portability.

What Can Java Technology Do?


The most common types of programs written in the Java programming language are
applets and applications. If you’ve surfed the Web, you’re probably already familiar with
applets. An applet is a program that adheres to certain conventions that allow it to run
within a Java-enabled browser.

KMMIPS Page 28
Accountable Privacy-Preserving Mechanism For Cloud Computing

However, the Java programming language is not just for writing cute, entertaining
applets for the Web. The general-purpose, high-level Java programming language is
also a powerful software platform. Using the generous API, you can write many types of
programs.
An application is a standalone program that runs directly on the Java platform. A
special kind of application known as a server serves and supports clients on a network.
Examples of servers are Web servers, proxy servers, mail servers, and print servers.
Another specialized program is a servlet. A servlet can almost be thought of as an
applet that runs on the server side. Java Servlets are a popular choice for building
interactive web applications, replacing the use of CGI scripts. Servlets are similar to
applets in that they are runtime extensions of applications. Instead of working in
browsers, though, servlets run within Java Web servers, configuring or tailoring the
server.
How does the API support all these kinds of programs? It does so with packages of
software components that provides a wide range of functionality. Every full
implementation of the Java platform gives you the following features:
The essentials: Objects, strings, threads, numbers, input and output, data structures,
system properties, date and time, and so on.
Applets: The set of conventions used by applets.
Networking: URLs, TCP (Transmission Control Protocol), UDP (User Data gram
Protocol) sockets, and IP (Internet Protocol) addresses.
Internationalization: Help for writing programs that can be localized for users
worldwide. Programs can automatically adapt to specific locales and be displayed in the
appropriate language.
Security: Both low level and high level, including electronic signatures, public and
private key management, access control, and certificates.
Software components: Known as JavaBeansTM, can plug into existing component
architectures.
Object serialization: Allows lightweight persistence and communication via Remote
Method Invocation (RMI).

KMMIPS Page 29
Accountable Privacy-Preserving Mechanism For Cloud Computing

Java Database Connectivity (JDBC TM): Provides uniform access to a wide range of
relational databases.
The Java platform also has APIs for 2D and 3D graphics, accessibility, servers,
collaboration, telephony, speech, animation, and more. The following figure depicts
what is included in the Java 2 SDK.

How Will Java Technology Change My Life?

We can’t promise you fame, fortune, or even a job if you learn the Java programming
language. Still, it is likely to make your programs better and requires less effort than
other languages. We believe that Java technology will help you do the following:

Get started quickly: Although the Java programming language is a powerful object-
oriented language, it’s easy to learn, especially for programmers already familiar with C
or C++.
Write less code: Comparisons of program metrics (class counts, method counts, and
so on) suggest that a program written in the Java programming language can be four
times smaller than the same program in C++.
Write better code: The Java programming language encourages good coding
practices, and its garbage collection helps you avoid memory leaks. Its object
orientation, its JavaBeans component architecture, and its wide-ranging, easily
extendible API let you reuse other people’s tested code and introduce fewer bugs.
Develop programs more quickly: Your development time may be as much as twice as

KMMIPS Page 30
Accountable Privacy-Preserving Mechanism For Cloud Computing

fast versus writing the same program in C++. Why? You write fewer lines of code and it
is a simpler programming language than C++.
Avoid platform dependencies with 100% Pure Java: You can keep your program
portable by avoiding the use of libraries written in other languages. The 100% Pure
JavaTMProduct Certification Program has a repository of historical process manuals,
white papers, brochures, and similar materials online.
Write once, run anywhere: Because 100% Pure Java programs are compiled into
machine-independent byte codes, they run consistently on any Java platform.
Distribute software more easily: You can upgrade applets easily from a central
server. Applets take advantage of the feature of allowing new classes to be loaded “on
the fly,” without recompiling the entire program.
ODBC
Microsoft Open Database Connectivity (ODBC) is a standard programming interface for
application developers and database systems providers. Before ODBC became a de
facto standard for Windows programs to interface with database systems, programmers
had to use proprietary languages for each database they wanted to connect to. Now,
ODBC has made the choice of the database system almost irrelevant from a coding
perspective, which is as it should be. Application developers have much more important
things to worry about than the syntax that is needed to port their program from one
database to another when business needs suddenly change.
Through the ODBC Administrator in Control Panel, you can specify the particular
database that is associated with a data source that an ODBC application program is
written to use. Think of an ODBC data source as a door with a name on it. Each door
will lead you to a particular database. For example, the data source named Sales
Figures might be a SQL Server database, whereas the Accounts Payable data source
could refer to an Access database. The physical database referred to by a data source
can reside anywhere on the LAN.
The ODBC system files are not installed on your system by Windows 95. Rather, they
are installed when you setup a separate database application, such as SQL Server
Client or Visual Basic 4.0. When the ODBC icon is installed in Control Panel, it uses a
file called ODBCINST.DLL. It is also possible to administer your ODBC data sources

KMMIPS Page 31
Accountable Privacy-Preserving Mechanism For Cloud Computing

through a stand-alone program called ODBCADM.EXE. There is a 16-bit and a 32-bit


version of this program and each maintains a separate list of ODBC data sources.
From a programming perspective, the beauty of ODBC is that the application can be
written to use the same set of function calls to interface with any data source,
regardless of the database vendor. The source code of the application doesn’t change
whether it talks to Oracle or SQL Server. We only mention these two as an example.
There are ODBC drivers available for several dozen popular database systems. Even
Excel spreadsheets and plain text files can be turned into data sources. The operating
system uses the Registry information written by ODBC Administrator to determine which
low-level ODBC drivers are needed to talk to the data source (such as the interface to
Oracle or SQL Server). The loading of the ODBC drivers is transparent to the ODBC
application program. In a client/server environment, the ODBC API even handles many
of the network issues for the application programmer.

The advantages of this scheme are so numerous that you are probably thinking there
must be some catch. The only disadvantage of ODBC is that it isn’t as efficient as
talking directly to the native database interface. ODBC has had many detractors make
the charge that it is too slow. Microsoft has always claimed that the critical factor in
performance is the quality of the driver software that is used. In our humble opinion, this
is true. The availability of good ODBC drivers has improved a great deal recently. And
anyway, the criticism about performance is somewhat analogous to those who said that
compilers would never match the speed of pure assembly language. Maybe not, but the
compiler (or ODBC) gives you the opportunity to write cleaner programs, which means
you finish sooner. Meanwhile, computers get faster every year.
JDBC
In an effort to set an independent database standard API for Java; Sun Microsystems
developed Java Database Connectivity, or JDBC. JDBC offers a generic SQL database
access mechanism that provides a consistent interface to a variety of RDBMSs. This
consistent interface is achieved through the use of “plug-in” database connectivity
modules, or drivers. If a database vendor wishes to have JDBC support, he or she must
provide the driver for each platform that the database and Java run on.

KMMIPS Page 32
Accountable Privacy-Preserving Mechanism For Cloud Computing

To gain a wider acceptance of JDBC, Sun based JDBC’s framework on ODBC. As you
discovered earlier in this chapter, ODBC has widespread support on a variety of
platforms. Basing JDBC on ODBC will allow vendors to bring JDBC drivers to market
much faster than developing a completely new connectivity solution.
JDBC was announced in March of 1996. It was released for a 90 day public review that
ended June 8, 1996. Because of user input, the final JDBC v1.0 specification was
released soon after.
The remainder of this section will cover enough information about JDBC for you to know
what it is about and how to use it effectively. This is by no means a complete overview
of JDBC. That would fill an entire book.
JDBC Goals
Few software packages are designed without goals in mind. JDBC is one that, because
of its many goals, drove the development of the API. These goals, in conjunction with
early reviewer feedback, have finalized the JDBC class library into a solid framework for
building database applications in Java.
The goals that were set for JDBC are important. They will give you some insight as to
why certain classes and functionalities behave the way they do. The eight design goals
for JDBC are as follows:
1.SQL Level API
The designers felt that their main goal was to define a SQL interface for Java. Although
not the lowest database interface level possible, it is at a low enough level for higher-
level tools and APIs to be created. Conversely, it is at a high enough level for
application programmers to use it confidently. Attaining this goal allows for future tool
vendors to “generate” JDBC code and to hide many of JDBC’s complexities from the
end user.
1. SQL Conformance
SQL syntax varies as you move from database vendor to database vendor. In an
effort to support a wide variety of vendors, JDBC will allow any query statement to
be passed through it to the underlying database driver. This allows the connectivity
module to handle non-standard functionality in a manner that is suitable for its users.

2. JDBC must be implemental on top of common database interfaces

KMMIPS Page 33
Accountable Privacy-Preserving Mechanism For Cloud Computing

The JDBC SQL API must “sit” on top of other common SQL level APIs. This goal
allows JDBC to use existing ODBC level drivers by the use of a software
interface. This interface would translate JDBC calls to ODBC and vice versa.
3. Provide a Java interface that is consistent with the rest of the Java system
Because of Java’s acceptance in the user community thus far, the designers feel
that they should not stray from the current design of the core Java system.

4. Keep it simple
This goal probably appears in all software design goal listings. JDBC is no
exception. Sun felt that the design of JDBC should be very simple, allowing for only
one method of completing a task per mechanism. Allowing duplicate functionality
only serves to confuse the users of the API.

5. Use strong, static typing wherever possible


Strong typing allows for more error checking to be done at compile time; also, less
error appear at runtime.

6. Keep the common cases simple


Because more often than not, the usual SQL calls used by the programmer are simple
SELECT’s, INSERT’s, DELETE’s and UPDATE’s, these queries should be simple to
perform with JDBC. However, more complex SQL statements should also be possible.

Finally we decided to proceed the implementation using Java Networking.

And for dynamically updating the cache table we go for MS Access database.

Java ha two things: a programming language and a platform.

Java is a high-level programming language that is all of the following

Simple Architecture-neutral

Object-oriented Portable

Distributed High-performance

Interpreted multithreaded

KMMIPS Page 34
Accountable Privacy-Preserving Mechanism For Cloud Computing

Robust Dynamic

Secure

Java is also unusual in that each Java program is both compiled and
interpreted. With a compile you translate a Java program into an intermediate
language called Java byte codes the platform-independent code instruction is
passed and run on the computer.

Compilation happens just once; interpretation occurs each time the program is
executed. The figure illustrates how this works.

JavaProgram Interpreter

Compilers My Program

You can think of Java byte codes as the machine code instructions for the
Java Virtual Machine (Java VM). Every Java interpreter, whether it’s a Java
development tool or a Web browser that can run Java applets, is an
implementation of the Java VM. The Java VM can also be implemented in
hardware.

Java byte codes help make “write once, run anywhere” possible. You can
compile your Java program into byte codes on my platform that has a Java
compiler. The byte codes can then be run any implementation of the Java VM.
For example, the same Java program can run Windows NT, Solaris, and
Macintosh.

HTML

KMMIPS Page 35
Accountable Privacy-Preserving Mechanism For Cloud Computing

HTML stands for Hyper Text Markup Language, which is the most widely used


language on Web to develop web pages. HTML was created by Berners-Lee in late
1991 but "HTML 2.0" was the first standard HTML specification which was published in
1995. HTML 4.01 was a major version of HTML and it was published in late 1999.
Though HTML 4.01 version is widely used but currently we are having HTML-5 version
which is an extension to HTML 4.01, and this version was published in 2012.

 Hypertext refers to the way in which Web pages (HTML documents) are linked
together. Thus the link available on a webpage is called Hypertext.

 As its name suggests, HTML is a Markup Language which means you use


HTML to simply "mark up" a text document with tags that tell a Web browser
how to structure it to display.

Originally, HTML was developed with the intent of defining the structure of documents
like headings, paragraphs, lists, and so forth to facilitate the sharing of scientific
information between researchers.

These are some basic tags of html

Tag Description

<!DOCTYPE...> This tag defines the document type and HTML version.

<html> This tag encloses the complete HTML document and mainly
comprises of document header which is represented
by <head>...</head> and document body which is represented
by <body>...</body> tags.

<head> This tag represents the document's header which can keep
other HTML tags like <title>, <link> etc.

KMMIPS Page 36
Accountable Privacy-Preserving Mechanism For Cloud Computing

<title> The <title> tag is used inside the <head> tag to mention the


document title.

<body> This tag represents the document's body which keeps other
HTML tags like <h1>, <div>, <p> etc.

<h1> This tag represents the heading.

<p> This tag represents a paragraph.

KMMIPS Page 37
Accountable Privacy-Preserving Mechanism For Cloud Computing

6.System
Design
6.1 Introduction

Design is the first step in the development phase for any system. It may be defined as
the “Process of applying various techniques and principles for the purpose of designing
a device, a process, or a system”.

Software design is an iterative process through which requirements are translated into a
“Blue Print” for constructing the software. Preliminary design is concerned with the
transformation of requirements in to data and software architecture.

The design is a solution,how to approach to the creation of a new system. This is


composed of several steps. It provides the understanding and procedural details
necessary for implementing the system recommended.

The database design transforms the information domain model created during analysis
into the data structures that will be required to implement software.

The architectural design defines the relationship among major structural elements of the
program. The interface design describes how the software communicates within itself,
to systems that interoperate with it, and with humans who use it. An interface
implements flow of information.

6.2 Design Principles:

Basic design principles that enable the software engineer to navigate the design
process are:

 The design should be traceable to the analysis model

KMMIPS Page 38
Accountable Privacy-Preserving Mechanism For Cloud Computing

 The design should minimize the intellectual distance between the software and the
problem, as it exists in the real world.

6.3 Database Design:

The goal of database design is to generate a set of relation schemes that allow us to
store information without necessary redundancy and allows us to retrieve information
easily. We can achieve optimization, ease of use in which data is stored in the form of
tables and there exists a relation between or among tables.

The design objectives must be

 To reduce redundancy
 To arrive at loss-less join
 To reduce the time as compared to the present system.
 To reduce the number of errors.

Input design

The input design is the link between the information system and the user. It comprises
the developing specification and procedures for data preparation and those steps are
necessary to put transaction data in to a usable form for processing can be achieved by
inspecting the computer to read data from a written or printed document or it can occur
by having people keying the data directly into the system. The design of input focuses
on controlling the amount of input required, controlling the errors, avoiding delay,
avoiding extra steps and keeping the process simple. The input is designed in such a
way so that it provides security and ease of use with retaining the privacy. Input Design
considered the following things:

 What data should be given as input?


 How the data should be arranged or coded?
 The dialog to guide the operating personnel in providing input.
 Methods for preparing input validations and steps to follow when error occur.

KMMIPS Page 39
Accountable Privacy-Preserving Mechanism For Cloud Computing

Objectives:

1. Input Design is the process of converting a user-oriented description of the input into
a computer-based system. This design is important to avoid errors in the data input
process and show the correct direction to the management for getting correct
information from the computerized system.

2.It is achieved by creating user-friendly screens for the data entry to handle large
volume of data. The goal of designing input is to make data entry easier and to be free
from errors. The data entry screen is designed in such a way that all the data
manipulates can be performed. It also provides record viewing facilities.

3. When the data is entered it will check for its validity. Data can be entered with the
help of screens. Appropriate messages are provided as when needed so that the user
will not be in maize of instant. Thus the objective of input design is to create an input
layout that is easy to follow

Output design:

A quality output is one, which meets the requirements of the end user and presents the
information clearly. In any system results of processing are communicated to the users
and to other system through outputs. In output design it is determined how the
information is to be displaced for immediate need and also the hard copy output. It is
the most important and direct source information to the user. Efficient and intelligent
output design improves the system’s relationship to help user decision-making.

1. Designing computer output should proceed in an organized, well thought out manner;
the right output must be developed while ensuring that each output element is designed
so that people will find the system can use easily and effectively. When analysis design

KMMIPS Page 40
Accountable Privacy-Preserving Mechanism For Cloud Computing

computer output, they should Identify the specific output that is needed to meet the
requirements.

2. Select methods for presenting information.

3. Create document, report, or other formats that contain information produced by the
system.

The output form of an information system should accomplish one or more of the
following objectives.

 Convey information about past activities, current status or projections of the


 Future.
 Signal important events, opportunities, problems, or warnings.
 Trigger an action.
 Confirm an action.

KMMIPS Page 41
Accountable Privacy-Preserving Mechanism For Cloud Computing

7.Implementation
MODULES

We used three modules for implementation.

1. AUDITOR
2. DATA OWNER
3. DATA PROVIDER
4. USER

AUDITOR:-

Auditor gets login by valid id and password. Auditor can view the all users and data
providers. Auditor can view the all who are requested for data.Auditor module contains
the action of accept or rejected the users. Auditor can view accepted users also in this
cloud project.

DATA OWNER:-

Data owner gets login by valid name and password. Data owner can view the all users
and data providers. Auditor can view the all who are requested for data. Auditor module
contains the action of accept or rejected the users. Auditor can view accepted users
also in this cloud project. Data owner can provide the key to the users for download the
data.

DATA PROVIDER:-

KMMIPS Page 42
Accountable Privacy-Preserving Mechanism For Cloud Computing

Data provider gets register by the valid details and also login by valid email and
password. Data provider can view all the users and they can view profile and edit the
profile. Data provider can provide the data and also generate the key automatically.

USERS:

User is the main module in this app. User gets register by the valid details and gets
login by valid email and password. User can view all the files like what are data
available. And if they want data they can request to the data owner or auditor and after
accept the request they can download the data with enter the valid key.

Source code:

Package comm;

Index code;

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"


"http://www.w3.org/TR/html4/loose.dtd">

<html>

<head>

<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">

<title>Identity Based Encryption</title>

<h1 align="center">ACCOUNTABLE PRIVACY-PRESERVING MECHANISM FOR


CLOUD COMPUTING BASED ON IDENTITY-BASED ENCRYPTION</h1>

<link rel="stylesheet" href="cloud.css"/>

</head>

<body>

<section>

<nav>

KMMIPS Page 43
Accountable Privacy-Preserving Mechanism For Cloud Computing

<ul>

<div>

<li><a href="index.html">HOME</a></li>

</div>

<div>

<li><a href="auditor.jsp">AUDITOR</a></li></div>

<div><li><a href="dataowner.jsp">DATA OWNER</a></li></div>

<div><li><a href="dataprovider.jsp">DATA PROVIDER</a></li></div>

<div><li><a href="user.jsp">USER</a></li></div>

</ul>

</nav>

</section>

</body>

</html>

Auditor:

<%@ page language="java" contentType="text/html; charset=ISO-8859-1"

pageEncoding="ISO-8859-1"%>

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"


"http://www.w3.org/TR/html4/loose.dtd">

<html>

<head>

KMMIPS Page 44
Accountable Privacy-Preserving Mechanism For Cloud Computing

<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">

<title>auditor</title>

<h1 align="center">ACCOUNTABLE PRIVACY-PRESERVING MECHANISM FOR


CLOUD COMPUTING BASED ON IDENTITY-BASED ENCRYPTION</h1>

<link rel="stylesheet" href="cloud1.css"/>

</head>

<body>

<script type="text/javascript">

function clicked() {

if (confirm('Do you want to submit?')) {

yourformelement.submit();

} else {

return false;

</script>

<script>function target_popup(form) {

window.open('', 'formpopup', 'width=1350,height=650,resizeable,scrollbars');

form.target = 'formpopup';

}</script>

<section>

KMMIPS Page 45
Accountable Privacy-Preserving Mechanism For Cloud Computing

<nav>

<ul>

<div>

<li><a href="index.html">HOME</a></li>

</div>

<div>

<li><a href="auditor.jsp">AUDITOR</a></li></div>

<div><li><a href="dataowner.jsp">DATA OWNER</a></li></div>

<div><li><a href="dataprovider.jsp">DATA PROVIDER</a></li></div>

<div><li><a href="user.jsp">USER</a></li></div>

</ul>

</nav>

<form id="login" action="auditor1.jsp" method="post" onsubmit="target_popup(this)">

<h1 id="ff-proof" class="ribbon">&nbsp;&nbsp;&nbsp;AUDITOR LOGIN</h1>

<div class="apple">

<div class="top"><span></span></div>

<div class="butt"><span></span></div>

<div class="bite"></div>

</div>

<fieldset id="inputs">

<input type="text" name="id" placeholder="Enter ID" required/>

KMMIPS Page 46
Accountable Privacy-Preserving Mechanism For Cloud Computing

<input type="password" name="password" placeholder="Enter Password"


required/>

</fieldset>

<fieldset id="actions">

<input type="submit" id="submit" value="submit" onclick="return confirm('DO YOU


WANT SUBMIT ?')"/>

<!-<p>class="option"><a href="#">Mot de pass oubli&eacute;</a>&nbsp;&nbsp;|<a


href="#">Inscription</a></p>

</fieldset>

<%

String msg=null;

msg=request.getParameter("msg");

if(msg!=null){

%>

<h1 align="center" style="color:yellow">Enter Correct Details </h1>

<%} %>

</form>

</section>

</body>

</html>

<%@ page language="java" contentType="text/html; charset=ISO-8859-1"

pageEncoding="ISO-8859-1"%>

KMMIPS Page 47
Accountable Privacy-Preserving Mechanism For Cloud Computing

<%

String id=request.getParameter("id");

String password=request.getParameter("password");

if(id.equals("raghu123")&&password.equals("raghu123"))

response.sendRedirect("auditorhome.jsp?msg=login successfully");

else

response.sendRedirect("auditor.jsp?msg=please enter valid details");

%>

<%@ page language="java" contentType="text/html; charset=ISO-8859-1"

pageEncoding="ISO-8859-1"%>

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"


"http://www.w3.org/TR/html4/loose.dtd">

<html>

<head>

<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">

<title>Data Provider</title>

<h1 align="center">ACCOUNTABLE PRIVACY-PRESERVING MECHANISM FOR


CLOUD COMPUTING BASED ON IDENTITY-BASED ENCRYPTION</h1>

KMMIPS Page 48
Accountable Privacy-Preserving Mechanism For Cloud Computing

<link rel="stylesheet" href="cloud1.css"/>

</head>

<body>

<script type="text/javascript">

function clicked() {

if (confirm('Do you want to submit?')) {

yourformelement.submit();

} else {

return false;

}</script>

<script>

function target_popup(form) {

window.open('', 'formpopup', 'width=13500,height=650,resizeable,scrollbars');

form.target = 'formpopup';

}</script>

<section>

<nav>

<ul>

<div>

<li><a href="index.html">HOME</a></li>

KMMIPS Page 49
Accountable Privacy-Preserving Mechanism For Cloud Computing

</div>

<div>

<li><a href="auditor.jsp">AUDITOR</a></li></div>

<div><li><a href="dataowner.jsp">DATA OWNER</a></li></div>

<div><li><a href="dataprovider.jsp">DATA PROVIDER</a></li></div>

<div><li><a href="user.jsp">USER</a></li></div>

</ul>

</nav>

<formid="login"action="dataprovider1.jsp"method="post"onsubmit="target_popup(this)">

<h1 id="ff-proof" class="ribbon">&nbsp;&nbsp;&nbsp;DATA PROVIDER LOGIN</h1>

<div class="apple">

<div class="top"><span></span></div>

<div class="butt"><span></span></div>

<div class="bite"></div>

</div>

<fieldset id="inputs">

<input type="text" name="email" placeholder="Enter your Email" required/>

<input type="password" name="password" placeholder="Enter Password"


required/>

</fieldset>

<fieldset id="actions">

KMMIPS Page 50
Accountable Privacy-Preserving Mechanism For Cloud Computing

<input type="submit" id="submit" value="submit" onclick="return confirm('DO YOU


WANT SUBMIT ?')"/>

<pclass="option"><ahref="dregistration.jsp"style="color:yellow">New
Registration</a></p>

</fieldset>

<%

String msg=null;

msg=request.getParameter("msg");

if(msg!=null){

%>

<h1 align="center" style="color:yellow">Enter Correct Details </h1>

<%} %>

<%

String m=null;

String g="d";

m=request.getParameter("m");

if(m!=null){

%>

<h1 align="center" style="color:yellow;">Registered Successfully</h1>

<%} %>

</form>

</section>

KMMIPS Page 51
Accountable Privacy-Preserving Mechanism For Cloud Computing

</body>

</html>

<%@ page language="java" contentType="text/html; charset=ISO-8859-1"

pageEncoding="ISO-8859-1"%>

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"


"http://www.w3.org/TR/html4/loose.dtd">

<html>

<head>

<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">

<title>Data Owner</title>

<h1 align="center">ACCOUNTABLE PRIVACY-PRESERVING MECHANISM FOR


CLOUD COMPUTING BASED ON IDENTITY-BASED ENCRYPTION</h1>

<link rel="stylesheet" href="cloud1.css"/>

</head>

<body>

<script type="text/javascript">

function clicked() {

if (confirm('Do you want to submit?')) {

yourformelement.submit();

} else {

return false;

KMMIPS Page 52
Accountable Privacy-Preserving Mechanism For Cloud Computing

</script>

<script>function target_popup(form) {

window.open('', 'formpopup', 'width=1350,height=650,resizeable,scrollbars');

form.target = 'formpopup';

}</script>

<section>

<nav>

<ul>

<div>

<li><a href="index.html">HOME</a></li>

</div>

<div>

<li><a href="auditor.jsp">AUDITOR</a></li></div>

<div><li><a href="dataowner.jsp">DATA OWNER</a></li></div>

<div><li><a href="dataprovider.jsp">DATA PROVIDER</a></li></div>

<div><li><a href="user.jsp">USER</a></li></div>

</ul>

</nav>

<formid="login" action="dataowner1.jsp" method="post" onsubmit="target_popup(this)">

<h1 id="ff-proof" class="ribbon">&nbsp;&nbsp;&nbsp;DATA OWNER LOGIN</h1>

KMMIPS Page 53
Accountable Privacy-Preserving Mechanism For Cloud Computing

<div class="apple">

<div class="top"><span></span></div>

<div class="butt"><span></span></div>

<div class="bite"></div>

</div>

<fieldset id="inputs">

<input type="text" name="id" placeholder="Enter ID" required/>

<input type="password" name="password" placeholder="Enter Password"


required/>

</fieldset>

<fieldset id="actions">

<input type="submit" id="submit" value="submit" onclick="return confirm('DO YOU


WANT SUBMIT ?')"/>

<!--<p>class="option"><a href="#">Mot de pass oubli&eacute;</a>&nbsp;&nbsp;|<a


href="#">Inscription</a></p>

--> </fieldset>

<%

String msg=null;

msg=request.getParameter("msg");

if(msg!=null){

%>

<h1 align="center" style="color:yellow">Enter Correct Details </h1>

KMMIPS Page 54
Accountable Privacy-Preserving Mechanism For Cloud Computing

<%} %>

</form>

</section>

</body>

</html>

<%@ page language="java" contentType="text/html; charset=ISO-8859-1"

pageEncoding="ISO-8859-1"%>

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"


"http://www.w3.org/TR/html4/loose.dtd">

<html>

<head>

<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">

<title>Data Owner Home</title>

<h1 align="center">ACCOUNTABLE PRIVACY-PRESERVING MECHANISM FOR


CLOUD COMPUTING BASED ON IDENTITY-BASED ENCRYPTION</h1>

<h2 style="color:red"><center>Welcome Data Owner</center></h2>

<link rel="stylesheet" href="cloud1.css"/>

</head>

<body>

<script language="Javascript">

function redirectToFB(){

window.opener.location.href="dataowner.jsp";

KMMIPS Page 55
Accountable Privacy-Preserving Mechanism For Cloud Computing

self.close();

</script>

<section>

<nav>

<ul>

<div>

<li><a href="drequest.jsp">USER REQUESTS</a></li></div>

<div><li><a href="accepted.jsp">ACCEPTED USERS</a></li></div>

<div><li><a href="dfiles.jsp">FILES</a></li></div>

<div><li><a href="dviewusers.jsp">VIEW USERS</a></li></div>

<div><li><ahref="dviewdataproviders.jsp">VIEW DATA PROVIDERS</a></li></div>

<div><li><a href="" value="" OnClick="redirectToFB()">LOGOUT</a></li></div>

</ul>

</nav>

</body>

</html>

<%@ page language="java" contentType="text/html; charset=ISO-8859-1"

pageEncoding="ISO-8859-1"%>

<%@page import="java.sql.*" %>

KMMIPS Page 56
Accountable Privacy-Preserving Mechanism For Cloud Computing

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"


"http://www.w3.org/TR/html4/loose.dtd">

<html>

<head>

<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">

<title>data provider profile</title>

<h1 align="center">ACCOUNTABLE PRIVACY-PRESERVING MECHANISM FOR


CLOUD COMPUTING BASED ON IDENTITY-BASED ENCRYPTION</h1>

<link rel="stylesheet" href="cloud1.css"/>

</head>

<body>

<script language="Javascript">

function redirectToFB(){

window.opener.location.href="dataprovider.jsp";

self.close();

</script>

<section>

<nav>

<ul>

<div>

<li><a href="dprofile.jsp">PROFILE</a></li></div>

KMMIPS Page 57
Accountable Privacy-Preserving Mechanism For Cloud Computing

<div><li><a href="filesupload.jsp">FILES UPLOAD</a></li></div>

<div><li><a href="filestatus.jsp">FILE STATUS</a></li></div>

<div>

<li><a href="" value="" OnClick="redirectToFB()">LOGOUT</a></li></div>

</ul>

</nav>

<form id="login">

<h1 id="ff-proof" class="ribbon">&nbsp;&nbsp;&nbsp;PROFILE</h1>

<div class="apple">

<div class="top"><span></span></div>

<div class="butt"><span></span></div>

<div class="bite"></div>

</div>

<fieldset id="inputs">

<%

String aaa=session.getAttribute("email").toString();

try

Class.forName("com.mysql.jdbc.Driver");

Connection
con=DriverManager.getConnection("jdbc:mysql://localhost:3306/cloud1","root","root");

KMMIPS Page 58
Accountable Privacy-Preserving Mechanism For Cloud Computing

PreparedStatement ps1=con.prepareStatement("select * from dregistration where


email=?" );

ps1.setString(1,aaa);

ResultSet dpr=ps1.executeQuery();

while(dpr.next()){

%>

<div>

<center>

<br>

<table border="1" bordercolor="red">

<tr align="center">

<td>NAME</td>

<td>PASSWORD</td>

<td>EMAIL</td>

<td>NUMBER</td>

<td>UPDATE</td>

</center>

</tr>

<tr>

<td><%=dpr.getString(1) %></td>

<td><%=dpr.getString(2) %></td>

KMMIPS Page 59
Accountable Privacy-Preserving Mechanism For Cloud Computing

<td><%=dpr.getString(3) %></td>

<td><%=dpr.getString(4) %></td>

<td><a href="dupdate.jsp" style="color:blue">EDIT</a>

</tr>

<%} %></table>

</div>

<%

}catch(Exception e)

e.printStackTrace();

} %>

</body>

</html>

Package code:

<%@page import="java.sql.*" %>

<%

String id=request.getParameter("id");

String status="Accepted";

System.out.println(id);

try{

Class.forName("com.mysql.jdbc.Driver");

KMMIPS Page 60
Accountable Privacy-Preserving Mechanism For Cloud Computing

Connection conn=DriverManager.getConnection("jdbc:mysql://localhost:3306/cloud1",
"root", "root");

Statement st=conn.createStatement();

String sql="update file set status='"+status+"' where id='"+id+"' and status='Requested' "

PreparedStatement ps1=conn.prepareStatement(sql);

ps1.executeUpdate();

response.sendRedirect("request.jsp");

pr out.print("<br><center>Details successfully updated</center>");

catch(Exception e)

System.out.print(e);

e.printStackTrace();

%>

Auditor:

<%@ page language="java" contentType="text/html; charset=ISO-8859-1"


pageEncoding="ISO-8859-1"%>

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"


"http://www.w3.org/TR/html4/loose.dtd">

<html>

<head>

KMMIPS Page 61
Accountable Privacy-Preserving Mechanism For Cloud Computing

<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">

<title>auditor</title>

<h1 align="center">ACCOUNTABLE PRIVACY-PRESERVING MECHANISM FOR


CLOUD COMPUTING BASED ON IDENTITY-BASED ENCRYPTION</h1>

<link rel="stylesheet" href="cloud1.css"/>

</head>

<body>

<script type="text/javascript">

function clicked() {

if (confirm('Do you want to submit?')) {

yourformelement.submit();

} else {

return false;

</script>

<script>function target_popup(form) {

window.open('', 'formpopup', 'width=1350,height=650,resizeable,scrollbars');

form.target = 'formpopup';

}</script>

<section>

KMMIPS Page 62
Accountable Privacy-Preserving Mechanism For Cloud Computing

<nav>

<ul>

<div>

<li><a href="index.html">HOME</a></li>

</div>

<div>

<li><a href="auditor.jsp">AUDITOR</a></li></div>

<div><li><a href="dataowner.jsp">DATA OWNER</a></li></div>

<div><li><a href="dataprovider.jsp">DATA PROVIDER</a></li></div>

<div><li><a href="user.jsp">USER</a></li></div>

</ul>

</nav>

<form id="login" action="auditor1.jsp" method="post" onsubmit="target_popup(this)">

<h1 id="ff-proof" class="ribbon">&nbsp;&nbsp;&nbsp;AUDITOR LOGIN</h1>

<div class="apple">

<div class="top"><span></span></div>

<div class="butt"><span></span></div>

<div class="bite"></div>

</div>

<fieldset id="inputs">

<input type="text" name="id" placeholder="Enter ID" required/>

KMMIPS Page 63
Accountable Privacy-Preserving Mechanism For Cloud Computing

<input type="password" name="password" placeholder="Enter Password" required/>

</fieldset>

<fieldset id="actions">

input type="submit" id="submit" value="submit" onclick="return confirm('DO YOU


WANT SUBMIT ?')"/>

<p class="option"><a href="#">Mot de pass oubli&eacute;</a>&nbsp;&nbsp;|<a


href="#">Inscription</a></p>

</fieldset>

<%

String msg=null;

msg=request.getParameter("msg");

if(msg!=null){

%>

<h1 align="center" style="color:yellow">Enter Correct Details </h1>

<%} %>

</form>

</section>

</body>

</html>

Content type auditor:

<%@ page language="java" contentType="text/html; charset=ISO-8859-1"

pageEncoding="ISO-8859-1"%>

KMMIPS Page 64
Accountable Privacy-Preserving Mechanism For Cloud Computing

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"


"http://www.w3.org/TR/html4/loose.dtd">

<html>

<head>

<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">

<title>Data Owner</title>

<h1 align="center">ACCOUNTABLE PRIVACY-PRESERVING MECHANISM FOR


CLOUD COMPUTING BASED ON IDENTITY-BASED ENCRYPTION</h1>

<link rel="stylesheet" href="cloud1.css"/>

</head>

<body>

<script type="text/javascript">

function clicked() {

if (confirm('Do you want to submit?')) {

yourformelement.submit();

} else {

return false;

</script>

<script>function target_popup(form) {

window.open('', 'formpopup', 'width=1350,height=650,resizeable,scrollbars');

KMMIPS Page 65
Accountable Privacy-Preserving Mechanism For Cloud Computing

form.target = 'formpopup';

}</script>

<section>

<nav>

<ul>

<div>

<li><a href="index.html">HOME</a></li>

</div>

<div>

<li><a href="auditor.jsp">AUDITOR</a></li></div>

<div><li><a href="dataowner.jsp">DATA OWNER</a></li></div>

<div><li><a href="dataprovider.jsp">DATA PROVIDER</a></li></div>

<div><li><a href="user.jsp">USER</a></li></div>

</ul>

</nav>

<formid="login" action="dataowner1.jsp" method="post" onsubmit="target_popup(this)">

<h1 id="ff-proof" class="ribbon">&nbsp;&nbsp;&nbsp;DATA OWNER LOGIN</h1>

<div class="apple">

<div class="top"><span></span></div>

<div class="butt"><span></span></div>

<div class="bite"></div>

KMMIPS Page 66
Accountable Privacy-Preserving Mechanism For Cloud Computing

</div>

<fieldset id="inputs">

<input type="text" name="id" placeholder="Enter ID" required/>

<input type="password" name="password" placeholder="Enter Password" required/>

</fieldset>

<fieldset id="actions">

<input type="submit" id="submit" value="submit" onclick="return confirm('DO YOU


WANT SUBMIT ?')"/>

<pclass="option"><a href="#">Mot de pass oubli&eacute;</a>&nbsp;&nbsp;|<a


href="#">Inscription</a></p>

</fieldset>

<%

String msg=null;

msg=request.getParameter("msg");

if(msg!=null){

%>

<h1 align="center" style="color:yellow">Enter Correct Details </h1>

<%} %>

</form>

</section>

</body>

</html>

KMMIPS Page 67
Accountable Privacy-Preserving Mechanism For Cloud Computing

8.system
testing
The purpose of testing is to discover errors. Testing is the process of trying to discover
every conceivable fault or weakness in a work product. It provides a way to check the
functionality of components, sub assemblies, assemblies and/or a finished product It is
the process of exercising software with the intent of ensuring that the

Software system meets its requirements and user expectations and does not fail in an
unacceptable manner. There are various types of test. Each test type addresses a
specific testing requirement.

Types of tests
8.1 Unit testing
Unit testing involves the design of test cases that validate that the internal program logic
is functioning properly, and that program inputs produce valid outputs. All decision
branches and internal code flow should be validated. It is the testing of individual

KMMIPS Page 68
Accountable Privacy-Preserving Mechanism For Cloud Computing

software units of the application .it is done after the completion of an individual unit
before integration. This is a structural testing, that relies on knowledge of its
construction and is invasive. Unit tests perform basic tests at component level and test
a specific business process, application, and/or system configuration. Unit tests ensure
that each unique path of a business process performs accurately to the documented
specifications and contains clearly defined inputs and expected results.

8.2 Integration testing


Integration tests are designed to test integrated software components to determine if
they actually run as one program. Testing is event driven and is more concerned with
the basic outcome of screens or fields. Integration tests demonstrate that although the
components were individually satisfaction, as shown by successfully unit testing, the
combination of components is correct and consistent. Integration testing is specifically
aimed at exposing the problems that arise from the combination of components.

Functional test
Functional tests provide systematic demonstrations that functions tested are available
as specified by the business and technical requirements, system documentation, and
user manuals.

Functional testing is centered on the following items:

Valid Input : identified classes of valid input must be accepted.

Invalid Input : identified classes of invalid input must be rejected.

Functions : identified functions must be exercised.

Output : identified classes of application outputs must be exercised.

Systems/Procedures: interfacing systems or procedures must be invoked.

Organization and preparation of functional tests is focused on requirements, key


functions, or special test cases. In addition, systematic coverage pertaining to identify
Business process flows; data fields, predefined processes, and successive processes

KMMIPS Page 69
Accountable Privacy-Preserving Mechanism For Cloud Computing

must be considered for testing. Before functional testing is complete, additional tests are
identified and the effective value of current tests is determined.

System Test
System testing ensures that the entire integrated software system meets requirements.
It tests a configuration to ensure known and predictable results. An example of system
testing is the configuration oriented system integration test. System testing is based on
process descriptions and flows, emphasizing pre-driven process links and integration
points.

8.3 White Box Testing:


White Box Testing is a testing in which in which the software tester has knowledge of
the inner workings, structure and language of the software, or at least its purpose. It is
purpose. It is used to test areas that cannot be reached from a black box level.

8.4 Black Box Testing:


Black Box Testing is testing the software without any knowledge of the inner workings,
structure or language of the module being tested. Black box tests, as most other kinds
of tests, must be written from a definitive source document, such as specification or
requirements document, such as specification or requirements document. It is a testing
in which the software under test is treated, as a black box .you cannot “see” into it. The
test provides inputs and responds to outputs without considering how the software
works.

8.5 Unit Testing:

Unit testing is usually conducted as part of a combined code and unit test phase of the
software lifecycle, although it is not uncommon for coding and unit testing to be
conducted as two distinct phases.

Test strategy and approach


Field testing will be performed manually and functional tests will be written in detail.
Test objectives

KMMIPS Page 70
Accountable Privacy-Preserving Mechanism For Cloud Computing

 All field entries must work properly.


 Pages must be activated from the identified link.
 The entry screen, messages and responses must not be delayed.
Features to be tested
 Verify that the entries are of the correct format
 No duplicate entries should be allowed
 All links should take the user to the correct page.
Integration Testing
Software integration testing is the incremental integration testing of two or more
integrated software components on a single platform to produce failures caused by
interface defects.

The task of the integration test is to check that components or software applications,
e.g. components in a software system or – one step up – software applications at the
company level – interact without error.

Test Results: All the test cases mentioned above passed successfully. No defects
encountered.

7.6 Acceptance Testing


User Acceptance Testing is a critical phase of any project and requires significant
participation by the end user. It also ensures that the system meets the functional
requirements.

Test Results: All the test cases mentioned above passed successfully. No defects
encountered.

KMMIPS Page 71
Accountable Privacy-Preserving Mechanism For Cloud Computing

9.Conclusion
In this paper, focusing on the critical issue of cloud privacy preserving, we proposed an
accountable privacy-preserving mechanism based on IBE scheme. Firstly, we model
and define the detailed privacy attribute for cloud participants based on description
logic, and then introduced two algorithms to realize accountability combined with the
modified IBE scheme in the IBE-AC model. Furthermore, we consider the possible
adversary attacks to the proposed accountable privacy-preserving mechanism, we
describe the two types adversaries launched by the dishonest cloud participants, type-I
and type-II adversaries for the game story. From the theory level, we proved the
proposed mechanism is secure against the attacks launched by them. Finally, we
evaluated the proposed privacy-preserving mechanism through extensive simulation
and experimental test, at the same time, we discuss the potential implementation of the
proposed accountable privacy-preserving mechanism.

KMMIPS Page 72
Accountable Privacy-Preserving Mechanism For Cloud Computing

Appendices
Appendix-A: User Manual

User Manual is the guide to the Users of the system. It paves a path to the
Corresponding user to help him how to proceed further in the proper understanding of
the system. The interface of the system gets familiar to the user, based on this manual
only.

The first form is the user has to upload the CSV file by clicking the choose file then
submit. After the submission if it shows successful, then user have to go through pre-
processing module, then support and finally go throw the graph .In pre-processing form
the user can get the structured output data, after this by clicking support module then
user may get the average results of the CSV file.

Screen 1: Home Page

This is the Home Page for the user select dataset file.

KMMIPS Page 73
Accountable Privacy-Preserving Mechanism For Cloud Computing

Screen 2: Upload Csv File

In this Page the User can upload a csv file in it.

Screen 3: View Data:

In this Page the User can View the selected file dataset.

Screen 4: Preprocessing Page

In this Page the User can view the Preprocessing Dataset.

Screen 5: Graph Page

In this Show the final Values of the Graph.

APPENDIX-B: Test Screens

HOME PAGE:

KMMIPS Page 74
Accountable Privacy-Preserving Mechanism For Cloud Computing

AUDITOR LOGIN:

AUDITOR HOME PAGE:

KMMIPS Page 75
Accountable Privacy-Preserving Mechanism For Cloud Computing

VIEW USERS REQUEST

VIEW FILES

KMMIPS Page 76
Accountable Privacy-Preserving Mechanism For Cloud Computing

VIEW USERS

VIEW DATA PROVIDERS

KMMIPS Page 77
Accountable Privacy-Preserving Mechanism For Cloud Computing

DARA OWNER LOGIN PAGE

DATA OWNER HOME PAGE

KMMIPS Page 78
Accountable Privacy-Preserving Mechanism For Cloud Computing

VIEW USER REQUEST

VIEW ACCEPTED USERS

KMMIPS Page 79
Accountable Privacy-Preserving Mechanism For Cloud Computing

VIEW FILES

VIEW USERS

KMMIPS Page 80
Accountable Privacy-Preserving Mechanism For Cloud Computing

VIEW DATA PROVIDERS

VIEW DATA PROVIDER REGISTRATION

KMMIPS Page 81
Accountable Privacy-Preserving Mechanism For Cloud Computing

DATA PROVIDER LOGIN PAGE

DATA PROVIDER HOME PAGE

KMMIPS Page 82
Accountable Privacy-Preserving Mechanism For Cloud Computing

VIEW PROFILE

VIEW FILES UPLOAD

KMMIPS Page 83
Accountable Privacy-Preserving Mechanism For Cloud Computing

VIEW FILE STATUS

USER REGISTRATION

KMMIPS Page 84
Accountable Privacy-Preserving Mechanism For Cloud Computing

USER LOGIN PAGE

USER HOME PAGE

KMMIPS Page 85
Accountable Privacy-Preserving Mechanism For Cloud Computing

VIEW PROFILE

VIEW FILES

KMMIPS Page 86
Accountable Privacy-Preserving Mechanism For Cloud Computing

VIEW DOWNLOAD FILES

KMMIPS Page 87
Accountable Privacy-Preserving Mechanism For Cloud Computing

Bibliograph
y
Book Resources:

[1] Yan Z, Li X, Wang M, et al. Flexible Data Access Control based on Trust and
Reputation in Cloud Computing[J]. IEEE Transactions on Cloud Computing,
2017, PP(99):1-1.

[2] Xia Z, Wang X, Zhang L, et al. A privacy-preserving and copy-deterrence


content-based image retrieval scheme in cloud computing [J]. IEEE Transactions
on Information Forensics and Security, 2016, 11(11): 2594-2608.

[3] Yuan J, Yu S. Privacy preserving back-propagation neural network learning


made practical with cloud computing [J]. IEEE Transactions on Parallel and
Distributed Systems, 2014, 25(1): 212-221.

[4] Yao X, Lin Y, Liu Q, et al. Privacy-preserving Search over Encrypted Personal
Health Record in Multi-Source Cloud [J]. IEEE Access, 2018, PP(99):45-53.

[5] Prasad K, Poonam J, Gauri K, et al. Data sharing security and privacy
preservation in cloud computing[C]//Green Computing and Internet of Things
(ICGCIoT), 2015 International Conference on. IEEE, 2015: 1070- 1075.

[6] Zhuo G, Jia Q, Guo L, et al. Privacy-preserving verifiable data aggregation and
analysis for cloud-assisted mobile crowdsourcing[C]//Computer

KMMIPS Page 88
Accountable Privacy-Preserving Mechanism For Cloud Computing

Communications, IEEE INFOCOM 2016-The 35th Annual IEEE International


Conference on. IEEE, 2016: 1-9.

[7] Pasupuleti S K, Ramalingam S, Buyya R. An efficient and secure privacy


preserving approach for outsourced data of resource constrained mobile devices
in cloud computing[J]. Journal of Network and Computer Applications, 2016,
64(8): 12-22.

[8] Ma H, Zhang R, Wan Z, et al. Verifiable and Exculpable Outsourced Attribute-


Based Encryption for Access Control in Cloud Computing[J]. IEEE Transactions
on Dependable & Secure Computing, 2017, 14(6):679- 692.

[9] Feng B, Ma X, Guo C, et al. An Efficient Protocol with Bidirectional Verification


for Storage Security in Cloud Computing[J]. IEEE Access, 2017, PP(99):1-10.

[10] Zhang H, Jiang H, Li B, et al. A framework for truthful online auctions in cloud
computing with heterogeneous user demands [J]. IEEE Transactions on
Computers, 2016, 65(3): 805-818.

KMMIPS Page 89
Accountable Privacy-Preserving Mechanism For Cloud Computing

KMMIPS Page 90

You might also like