Accountable Privacy-Preserving Mechanism For Cloud Computing Based On Identity-Based Encryption
Accountable Privacy-Preserving Mechanism For Cloud Computing Based On Identity-Based Encryption
R.Sivanarayana
Regd. No: 2317268
September, 2020
ACCOUNTABLE PRIVACY-PRESERVING
MECHANISM FOR CLOUD COMPUTING
BASED ON IDENTITY-BASED ON
ENCRYPTION
AT
By
R.Sivanarayana
September - 2020
KMM INSTITUTE OF POST GRADUATE STUDIES
C ERTIFICATE
This is to certify that the report entitled Accountable-privacy preserving mechanism for cloud
computing based on identity-based encryption submitted by R SIVANARAYANA in partial
fulfillment of the requirements for the award of the degree of Master of Computer
Applications under our supervision and guidance in the VI semester of course , during the
academic year 2019 - 2020.
(External Examiner)
2.
(Internal Examiner)
3.
(Chairman)
Acknowledgments
“Task successful” makes everyone happy. But the happiness will be gold without glitter if we didn’t
state the persons who have supported us to make it a success. Success will be crowned to people
who made it a reality but the people whose constant guidance and encouragement made people
behind the screen who guided, inspired and helped me for the completion of our project work. I
consider myself lucky enough to get such a good project. This project would add as an asset to my
academic profile.
An endeavor over a long period can be successful only with the advice and support of many well it
possible will be crowned first on the eve of success. This acknowledgement transcends the reality of
formality when we would like to express deep gratitude and respect to all those wishes. We take this
opportunity to express our gratitude and appreciation all of them. Graduate Studies, Tirupati, for his
encouragement.
We would like to thank Mr R. Sivanarayana, for assisting us in the development of the system, and
her personal interest provided an unending encouragement and guidance that sustained us
throughout the project.
We would like to thank to all those who have been a support and an inspiration and especially the
staff in office and lab.
Our special thanks to Dr. K. VenkataRamana, Principal & HOD KMM Institute of Post
Mr. R Sivanarayana
Abstract
Considering the openness and cross-domains of cloud computing, the traditional privacy preserving
technology cannot be applied in cloud computing efficiently. In this paper, inspired by the
accountability idea, we proposed an accountable privacy-preserving mechanism based on Identity-
Based Encryption (IBE) for cloud computing, which focuses on constraining the illegal network
behavior by performing accountability to protect the privacy for cloud participants. Firstly, based
on the description logic, we defined the basic privacy concepts about the privacy guarantee(PG),
privacy request(PR), privacy attribute(PA), privacy exposure condition(PEC) for cloud system, at the
same time, the system architecture for the proposed accountable privacy-preserving mechanism is
presented; secondly, combining the proposed accounting and auditing approaches, the integrated
accountable privacy-preserving mechanism for cloud computing is proposed; and then, based on
the possible two kinds adversary attacks against the proposed mechanism, the detailed security
analysis and proof for the proposed mechanism are given finally, we provide extensive
experimental results and potential accountability implementation to demonstrate the efficiency of
the proposed mechanism.
List of Figures
Figure no Title Page no
6.5.1 User 40
6.5.2 Owner 40
List of Screens
Name Page no
Home 77
Auditor 78
Data owner 78
View user 79
Auditor login 78
Data owner Login 81
View user Login 82
View 83
Response 84
List of Figures
4.2 DFD 16
List of Tables
Table Number Table Name Page Number
Acknowledgements I
Abstract Ii
Contents Iii
List of Figures Iv
List of Tables
1. Introduction 01
1.3 Introduction to Cloud computing/ Security (which ever is ur project topic) Here
add introduction contents in two journal papers)
2.1 Aim 06
2.4 Methodology 10
4. System Analysis 14
6. System Design
6.1 Introduction 41
6.3.1 Normalization 42
8. Implementation 49
9. Conclusion 75
APPENDICES 76
BIBLIOGRAPHY 91
1.introduction
KMMIPS is an educational society established in 2000 by a group of retired civil
servant. This is an educational society which serves for the betterment of the students.
Initially this college offers three major programs MCA, MBA and B.Ed.
Cloud computing is a latest technology which provides a flexible way to manipulate and
access data over internet by following pay-per-use model. So it is known as the pool of
services. Nowadays, secure load balancing is very popular due to protect the
computational resources; hence, the cloud environment. But to preserve the resources
remains a very challenging task for the CSPs because these are dynamically
changeable.
A full-service portfolio:
KMMIPS Page 1
Accountable Privacy-Preserving Mechanism For Cloud Computing
This offers Student and Administrator maintain, architect, integrate and manage through
the system.
Services:
This system provides its services to Educational institutions, which are in the field of
providing good helpful college Student information system.
KMM Institute of postgraduate studies very popularly known as KMMIPS has emerged
as a major Technological Institute managed by KMM SOCIAL AND EDUCATIONAL
DEVELOPMENT SOCIETY, Tirupati. The KMM Society has taken the lead role to
establish the institute in academic year 2001-2002. Sprawled over an area of 25 acres,
permanent infrastructural facilities are being developed near Tirupati-Madanapalli state
Highway at Ramireddypalle. KMMIPS has already secured the approval from the All
India Council of Technical Education (AICTE). New Delhi, and Government of Andhra
Pradesh and is affiliated to Sri Venkateswara University, Tirupati.
KMMIPS offers admission into the professional courses MCA and MBA with annual
intake of 180 and 180 seats each. The institution is governed by the chairman Sri S.
Srinivasulugaru, retired IRS (Indian Revenue Service) officer with the support of an
advisory body consisting of the eminent personalities form different fields.
KMMIPS Page 2
Accountable Privacy-Preserving Mechanism For Cloud Computing
1.3 Introduction:
Cloud computing is a latest technology which provides a flexible way to manipulate and
access data over internet by following pay-per-use model. So it is known as the pool of
services. Nowadays, secure load balancing is very popular due to protect the
computational resources; hence, the cloud environment. But to preserve the resources
remains a very challenging task for the CSPs because these are dynamically
changeable. My proposed secure approach for load balancing is essentially based on
the elastic dynamic behaviour of the cloud environment. Hence, it maximizes the
required resource utilizations by controlling SLA violation. On the other hand, my
proposed approach can assign the available VMs to the incoming workload by equally
KMMIPS Page 3
Accountable Privacy-Preserving Mechanism For Cloud Computing
slotted the incoming workload, and the security of those resources is taken care with the
help of SRNN algorithm.
Chapter 1 Introduction: It deals with the overview of the organization and its
administrative hierarchy.
Chapter 2 Genesis of the Study: It outlines the Existing problem, the solution
proposed, methodology used and looks at how the preliminary investigation carried out,
what are all its scope and objectives and limitations of existing manual system.
Chapter 3 Feasibility Study: It is used to test the feasibility of the project i.e.,
Operational, Technical and Economical feasibilities of the system.
Chapter 4 System Analysis: It deals with software requirement analysis. The various
entities and their requirements and their relationships are discussed using E-R
Diagrams.
Chapter 5 System requirements: It explains about the various hardware and software
requirements and their features.
Chapter 6 System Design: It contains the description of all the tables and its
attributes, design principles, HIPO charts and user interface design.
Chapter 9 Conclusion:
KMMIPS Page 4
Accountable Privacy-Preserving Mechanism For Cloud Computing
2.Genesis of
Study
This chapter deals with the study of the existing system and describes the need for the
proposed system to overcome the drawbacks in the existing system. It also specifies
the objectives, scope of the system and also the methodology for the system
development.
Hence the genesis of the study clearly depicts the factors regarding the beginning of the
existing system and its extension to the proposed system and it includes the following.
2.1 Aim:
An effective clustering for informational retrieval . As the number of users using the web
growing rapidly, so it creates many challenges of information retrieval which become the
current research topics. In general the search results returned using any searching
paradigm are not clustered automatically. But as the case is documents returned for a
keyword may be of different nature depending upon the different meanings of the
keyword. That is to say that the set of documents returned for a given keyword may
further be subdivided into subsets of documents conveying similar sense of the keyword
KMMIPS Page 5
Accountable Privacy-Preserving Mechanism For Cloud Computing
In existing system, in large datasets, the cost of calculating the distance between the
new point and each existing point is huge which degrades the performance of the
algorithm. The KNN algorithm doesn't work well with high dimensional data because
with large number of dimensions, it becomes difficult for the algorithm to calculate the
distance in each dimension. We need to do feature scaling (standardization and
normalization) before applying KNN algorithm to any dataset. If we don't do so, KNN
may generate wrong predictions.KNN is sensitive to noise in the dataset. We need to
manually imputemissing values and remove outliers.
Literature survey is the most important step in software development process. Before
developing the tool it is necessary to determine the time factor, economy n company
strength. Once these things r satisfied, ten next steps are to determine which operating
system and language can be used for developing the tool. Once the programmers start
building the tool the programmers need lot of external support. This support can be
obtained from senior programmers, from book or from websites. Before building the
system the above consideration are taken into account for developing the proposed
system.
Yan Z, Li X, Wang M, et al. Flexible Data Access Control based on Trust and
Reputation in Cloud Computing[J]. IEEE Transactions on Cloud Computing, 2017,
PP(99):1-1.
Cloud Computing provides many services among them storing data. Storing user’s data
at the cloud frees the burden of user’s devices and it leads to better access of data.
Due to distrust in cloud service providers data owners normally store their data in an
encrypted form. But in various conditions, data need to be accessed by other entities to
achieve an expected service, e.g., an eHealth service. By this control of personal data
access at the cloud is a vital issue. Various applications scenarios request for flexible,
fine-grained access control and better data confidentiality. Although the existing access
control mechanism does not find a suitable solution. Furthermore, trust plays a main
role in data sharing. Trust helps to control uncertainty and avoid the potential risks. But
literature still needs a solution to access control of data based on trust and reputation.
KMMIPS Page 6
Accountable Privacy-Preserving Mechanism For Cloud Computing
The proposed system provides an efficient access control mechanism which is applied
by the data owner and reputation center in a flexible manner by implementing Attribute-
Based Encryption and Proxy Re-Encryption.
Xia Z, Wang X, Zhang L, et al. A privacy-preserving and copy-deterrence content-
based image retrieval scheme in cloud computing [J]. IEEE Transactions on
Information Forensics and Security, 2016, 11(11): 2594-2608.
With the increasing importance of images in people’s daily life, Content-based Image
Retrieval (CBIR) has been widely studied. Compared with text documents, images
consume much more storage space. Hence, its maintenance is considered to be a
typical example for cloud storage outsourcing. For privacy-preserving purposes,
sensitive images, such as medical and personal images, need to be encrypted before
outsourcing, which makes the CBIR technologies in plaintext domain to be unusable. In
this paper, we propose a scheme that supports CBIR over encrypted images without
leaking the sensitive information to the cloud server. Firstly, feature vectors are
extracted to represent the corresponding images. After that, the pre-filter tables are
constructed by locality-sensitive hashing to increase search efficiency. Moreover, the
feature vectors are protected by the secure kNN algorithm, and image pixels are
encrypted by a standard stream cipher. In addition, considering the case that the
authorized query users may illegally copy and distribute the retrieved images to
someone unauthorized, we propose a watermark-based protocol to deter such illegal
distributions. In our watermark-based protocol, a unique watermark is directly
embedded into the encrypted images by the cloud server before images are sent to the
query user. Hence, when an illegal image copy is found, the unlawful query user who
distributed the image can be traced by the watermark extraction. The security analysis
and experiments show the security and efficiency of the proposed scheme.
sets. During this process no party wants to disclose her/his private data to others for
privacy concerns. Existing schemes supporting this kind of collaborative learning just
partially solve the problem by limiting the way of data partition or considering only two
parties. There still lacks a solution for more general and practical settings wherein two
or more parties, each with an arbitrarily partitioned data set, collaboratively conduct
learning. In this paper, by utilizing the power of cloud computing, we solve this open
problem with our proposed privacy preserving back-propagation algorithm, which is
tailored for the setting of multiparty and arbitrarily partitioned data. In our proposed
scheme, each party encrypts his/her private data locally and uploads the ciphertexts
into the cloud. The cloud then executes most of the operations pertaining to the learning
algorithms with ciphertexts but learns nothing about the original private data. By
securely offloading the expensive operations to the cloud, we keep the local
computation and communication costs on each party minimal and independent to the
number of participants. To support flexible operations over ciphertexts, we adopt and
tailor the BGN ‘doubly homomorphic’ encryption algorithm for the multiparty setting.
Thorough analysis shows that our proposed scheme is secure, efficient and scalable.
also propose an enhanced scheme, MOPSE+, to more efficiently support the data
queries by hierarchical data providers. Extensive analysis and experiments over real
datasets demonstrate the efficacy and efficiency of MOPSE and MOPSE+.
2.4 Scope:
The system extends its scope from manual to computerize. The system provides scope
for the Efficient an effective informational retrieval
2.5 Methodology:
The source of information for developing the proposed system is gathered directly from
clients of end user who is going to use the package becomes the primary source to give
information.
Application software like JavaScript with HTML. So as to give the results as per the
requirements of the system. The concepts of software engineering have been
implemented successfully and uniformly throughout the system. The performance of
the integrated system will be uniform.Then by applying KMeans algorithm on it, we
found clusters having documents which are highly related and have similar features. We
used Gensim package to implement our approach because of its simplicity and robust
nature. Experimental results show that our approach is more efficient then the above
two combine approach and can handles more efficiently the serious limitation of
traditional K-Means algorithm, which is sensitive to initial centroid and the number of
clusters to be formed.
Existing System:
There is a tremendous growth of information on web. As the number of users using the
web growing rapidly, so it creates many challenges of information retrieval which
become the current research topics. In general the search results returned using any
searching paradigm are not clustered automatically. But as the case is documents
KMMIPS Page 9
Accountable Privacy-Preserving Mechanism For Cloud Computing
returned for a keyword may be of different nature depending upon the different
meanings of the keyword. That is to say that the set of documents returned for a given
keyword may further be subdivided into subsets of documents conveying similar sense
of the keyword. Clustering the set of results will do this further subdivision and will
present the results in a better way. It organizes the documents in such a way that the
documents belonging to a group (cluster) are more similar to each other than to the
ones which are a part of a different subgroup.
Disadvantages:
1. Identifying the same data is difficult process.
2. Search results are not accurate
3. Time consuming process
2.6 Proposed system:
In this paper we introduce a combine approach to cluster the web pages which first
finds the frequent sets and then clusters the documents. These frequent sets are
generated by using Frequent Pattern growth technique. Then by applying KMeans
algorithm on it, we found clusters having documents which are highly related and have
similar features. We used Gensim package to implement our approach because of its
simplicity and robust nature. Experimental results show that our approach is more
efficient then the above two combine approach and can handles more efficiently the
serious limitation of traditional K-Means algorithm, which is sensitive to initial centroid
and the number of clusters to be formed.
2.6.1 Advantages:
1. Identifying the same data is easy process
2. Time saving process.
2. High accuracy in search results.
KMMIPS Page 10
Accountable Privacy-Preserving Mechanism For Cloud Computing
3. Feasibility Study
System study:
This chapter deals with the study of the existing system and describes the need for the
proposed system to overcome the drawbacks in the existing system. It also specifies
the objectives, scope of the system and also the methodology for the system
development.
Hence the genesis of the study clearly depicts the factors regarding the beginning of the
existing system and its extension to the proposed system and it includes the following.
The feasibility of the project is analyzed in this phase and business proposal is put forth
with a very general plan for the project and some cost estimates. During system
analysis the feasibility study of the proposed system is to be carried out. This is to
ensure that the proposed system is not a burden to the company. For feasibility
analysis, some understanding of the major requirements for the system is essential.
ECONOMICAL FEASIBILITY
TECHNICAL FEASIBILITY
SOCIAL FEASIBILITY
This study is carried out to check the economic impact that the system will have on the
organization. The amount of fund that the company can pour into the research and
development of the system is limited. The expenditures must be justified. Thus the
developed system as well within the budget and this was achieved because most of the
KMMIPS Page 11
Accountable Privacy-Preserving Mechanism For Cloud Computing
technologies used are freely available. Only the customized products had to be
purchased.
3.3Technical feasibility:
This study is carried out to check the technical feasibility, that is, the technical
requirements of the system. Any system developed must not have a high demand on
the available technical resources. This will lead to high demands on the available
technical resources. This will lead to high demands being placed on the client. The
developed system must have a modest requirement, as only minimal or null changes
are required for implementing this system.
The aspect of study is to check the level of acceptance of the system by the user. This
includes the process of training the user to use the system efficiently. The user must not
feel threatened by the system, instead must accept it as a necessity. The level of
acceptance by the users solely depends on the methods that are employed to educate
the user about the system and to make him familiar with it. His level of confidence must
be raised so that he is also able to make some constructive criticism, which is
welcomed, as he is the final user of the system.
KMMIPS Page 12
Accountable Privacy-Preserving Mechanism For Cloud Computing
4.System
analysis
Existing system:
In the existing system, privacy-preserving for cloud computing has been performed, but
most of the existing works are mainly focused on the traditional privacy preserving
technology. traditional web services, cloud computing are vulnerable to many types of
network attacks as well, such as distributed denial of service attacks, worm attack,
network sniffing and sinkhole attacks.
Disadvantages:
Less efficiency.
The traditional privacy preserving technology cannot be applied in cloud
computing efficiently.
Proposed system:
Advantages:
KMMIPS Page 13
Accountable Privacy-Preserving Mechanism For Cloud Computing
password
DFD level
DFD Diagram
Context Level: 0
0 level
KMMIPS Page 14
Accountable Privacy-Preserving Mechanism For Cloud Computing
2.0
Login
2.1
Viewuserrequest
2.2
Auditor View data
providers ID Database
2.3
View user
2.4
Logout
KMMIPS Page 15
Accountable Privacy-Preserving Mechanism For Cloud Computing
Login
3.1
View user
request
Data owner
3.2
ID Database
View accepted
view data
provider
3.3
View user
3.4
Logout
KMMIPS Page 16
Accountable Privacy-Preserving Mechanism For Cloud Computing
Registration
4.1
Login
Data provider
4.2
ID Database
View
Profile
4.3
Upload file
4.4
View file
KMMIPS Page 17
Accountable Privacy-Preserving Mechanism For Cloud Computing
User
5.0
Registration
5.1
Login
User
5.2
ID Database
View
Profile
5.3
Download
5.4
Logout
KMMIPS Page 18
Accountable Privacy-Preserving Mechanism For Cloud Computing
System design
Uml diagram
Goals:
The Primary goals in the design of the UML are as follows:
1. Provide users a ready-to-use, expressive visual modeling Language so that they
can develop and exchange meaningful models.
2. Provide extendibility and specialization mechanisms to extend the core concepts.
3. Be independent of particular programming languages and development process.
KMMIPS Page 19
Accountable Privacy-Preserving Mechanism For Cloud Computing
A use case diagram in the Unified Modeling Language (UML) is a type of behavioral
diagram defined by and created from a Use-case analysis. Its purpose is to present a
graphical overview of the functionality provided by a system in terms of actors, their
goals (represented as use cases), and any dependencies between those use cases.
The main purpose of a use case diagram is to show what system functions are
performed for which actor. Roles of the actors in the system can be depicted.
view profile
view files
view accepted users
view users
view files
download file
logout view users
logout
logout
logout
KMMIPS Page 20
Accountable Privacy-Preserving Mechanism For Cloud Computing
registration
registration
login
login
login
view providers
login
view providers
view users
view profile
view users
view profile
upload file
view files
view file
request to file
view us er reques t
download file
logout
logout
logout
logout
KMMIPS Page 21
Accountable Privacy-Preserving Mechanism For Cloud Computing
auditor
5: login
8: view providers
11: view users
17: view file
20: view user request
23: logout
1: registration
4: login
10: view profile
13: upload file
15: view file
25: logout
system data
data owner
provider
3: login
6: view providers
9: view users
14: view files
19: view user requests
21: view accepted users
24: logout
2: registration
7: login
12: view profile
16: view files
18: request to file
22: download file
26: logout
user
KMMIPS Page 22
Accountable Privacy-Preserving Mechanism For Cloud Computing
view files
view users view data providers
view profile
view users
Component diagrams are used to describe the physical artifacts of a system. This
artifact includes files, executable, libraries etc. So the purpose of this diagram is
different, Component diagrams are used during the implementation phase of an
application. But it is prepared well in advance to visualize the implementation details.
Initially the system is designed using different UML diagrams and then when the
artifacts are ready component diagrams are used to get an idea of the implementation.
KMMIPS Page 23
Accountable Privacy-Preserving Mechanism For Cloud Computing
auditor
data owner
system
data
provider
user
auditor
data
owner data
base
data
provider
user
KMMIPS Page 24
Accountable Privacy-Preserving Mechanism For Cloud Computing
5.System
Requirements
System requirements gives the idea about what are the necessary things that are
needed for proposed system, which plays very important role in development of any
system. This chapter deals with what are hardware components that are needed for the
system, application software that are required for the development of the system.
The environment deals with the features of software. HTML, CSS and Javascript is
used as the front-end tool and JDBC is Server-side script as a backend. Front end tools
help to visualize the system through naked eyes while back end helps in activities which
are unseen to the end user.
SYSTEM REQUIREMENTS
Hard Disk - 20 GB
Monitor - SVGA
Java Technology
Java technology is both a programming language and a platform.
KMMIPS Page 26
Accountable Privacy-Preserving Mechanism For Cloud Computing
just once; interpretation occurs each time the program is executed. The following figure
illustrates how this works.
You can think of Java byte codes as the machine code instructions for the Java Virtual
Machine (Java VM). Every Java interpreter, whether it’s a development tool or a Web
browser that can run applets, is an implementation of the Java VM. Java byte codes
help make “write once, run anywhere” possible. You can compile your program into byte
codes on any platform that has a Java compiler. The byte codes can then be run on any
implementation of the Java VM. That means that as long as a computer has a Java VM,
the same program written in the Java programming language can run on Windows
2000, a Solaris workstation, or on an iMac.
KMMIPS Page 27
Accountable Privacy-Preserving Mechanism For Cloud Computing
Solaris, and MacOS. Most platforms can be described as a combination of the operating
system and hardware. The Java platform differs from most other platforms in that it’s a
software-only platform that runs on top of other hardware-based platforms.
The Java API is a large collection of ready-made software components that provide
many useful capabilities, such as graphical user interface (GUI) widgets. The Java API
is grouped into libraries of related classes and interfaces; these libraries are known as
packages. The next section, What Can Java Technology Do? Highlights what
functionality some of the packages in the Java API provide.
The following figure depicts a program that’s running on the Java platform. As the figure
shows, the Java API and the virtual machine insulate the program from the hardware.
Native code is code that after you compile it, the compiled code runs on a specific
hardware platform. As a platform-independent environment, the Java platform can be a
bit slower than native code. However, smart compilers, well-tuned interpreters, and just-
in-time byte code compilers can bring performance close to that of native code without
threatening portability.
KMMIPS Page 28
Accountable Privacy-Preserving Mechanism For Cloud Computing
However, the Java programming language is not just for writing cute, entertaining
applets for the Web. The general-purpose, high-level Java programming language is
also a powerful software platform. Using the generous API, you can write many types of
programs.
An application is a standalone program that runs directly on the Java platform. A
special kind of application known as a server serves and supports clients on a network.
Examples of servers are Web servers, proxy servers, mail servers, and print servers.
Another specialized program is a servlet. A servlet can almost be thought of as an
applet that runs on the server side. Java Servlets are a popular choice for building
interactive web applications, replacing the use of CGI scripts. Servlets are similar to
applets in that they are runtime extensions of applications. Instead of working in
browsers, though, servlets run within Java Web servers, configuring or tailoring the
server.
How does the API support all these kinds of programs? It does so with packages of
software components that provides a wide range of functionality. Every full
implementation of the Java platform gives you the following features:
The essentials: Objects, strings, threads, numbers, input and output, data structures,
system properties, date and time, and so on.
Applets: The set of conventions used by applets.
Networking: URLs, TCP (Transmission Control Protocol), UDP (User Data gram
Protocol) sockets, and IP (Internet Protocol) addresses.
Internationalization: Help for writing programs that can be localized for users
worldwide. Programs can automatically adapt to specific locales and be displayed in the
appropriate language.
Security: Both low level and high level, including electronic signatures, public and
private key management, access control, and certificates.
Software components: Known as JavaBeansTM, can plug into existing component
architectures.
Object serialization: Allows lightweight persistence and communication via Remote
Method Invocation (RMI).
KMMIPS Page 29
Accountable Privacy-Preserving Mechanism For Cloud Computing
Java Database Connectivity (JDBC TM): Provides uniform access to a wide range of
relational databases.
The Java platform also has APIs for 2D and 3D graphics, accessibility, servers,
collaboration, telephony, speech, animation, and more. The following figure depicts
what is included in the Java 2 SDK.
We can’t promise you fame, fortune, or even a job if you learn the Java programming
language. Still, it is likely to make your programs better and requires less effort than
other languages. We believe that Java technology will help you do the following:
Get started quickly: Although the Java programming language is a powerful object-
oriented language, it’s easy to learn, especially for programmers already familiar with C
or C++.
Write less code: Comparisons of program metrics (class counts, method counts, and
so on) suggest that a program written in the Java programming language can be four
times smaller than the same program in C++.
Write better code: The Java programming language encourages good coding
practices, and its garbage collection helps you avoid memory leaks. Its object
orientation, its JavaBeans component architecture, and its wide-ranging, easily
extendible API let you reuse other people’s tested code and introduce fewer bugs.
Develop programs more quickly: Your development time may be as much as twice as
KMMIPS Page 30
Accountable Privacy-Preserving Mechanism For Cloud Computing
fast versus writing the same program in C++. Why? You write fewer lines of code and it
is a simpler programming language than C++.
Avoid platform dependencies with 100% Pure Java: You can keep your program
portable by avoiding the use of libraries written in other languages. The 100% Pure
JavaTMProduct Certification Program has a repository of historical process manuals,
white papers, brochures, and similar materials online.
Write once, run anywhere: Because 100% Pure Java programs are compiled into
machine-independent byte codes, they run consistently on any Java platform.
Distribute software more easily: You can upgrade applets easily from a central
server. Applets take advantage of the feature of allowing new classes to be loaded “on
the fly,” without recompiling the entire program.
ODBC
Microsoft Open Database Connectivity (ODBC) is a standard programming interface for
application developers and database systems providers. Before ODBC became a de
facto standard for Windows programs to interface with database systems, programmers
had to use proprietary languages for each database they wanted to connect to. Now,
ODBC has made the choice of the database system almost irrelevant from a coding
perspective, which is as it should be. Application developers have much more important
things to worry about than the syntax that is needed to port their program from one
database to another when business needs suddenly change.
Through the ODBC Administrator in Control Panel, you can specify the particular
database that is associated with a data source that an ODBC application program is
written to use. Think of an ODBC data source as a door with a name on it. Each door
will lead you to a particular database. For example, the data source named Sales
Figures might be a SQL Server database, whereas the Accounts Payable data source
could refer to an Access database. The physical database referred to by a data source
can reside anywhere on the LAN.
The ODBC system files are not installed on your system by Windows 95. Rather, they
are installed when you setup a separate database application, such as SQL Server
Client or Visual Basic 4.0. When the ODBC icon is installed in Control Panel, it uses a
file called ODBCINST.DLL. It is also possible to administer your ODBC data sources
KMMIPS Page 31
Accountable Privacy-Preserving Mechanism For Cloud Computing
The advantages of this scheme are so numerous that you are probably thinking there
must be some catch. The only disadvantage of ODBC is that it isn’t as efficient as
talking directly to the native database interface. ODBC has had many detractors make
the charge that it is too slow. Microsoft has always claimed that the critical factor in
performance is the quality of the driver software that is used. In our humble opinion, this
is true. The availability of good ODBC drivers has improved a great deal recently. And
anyway, the criticism about performance is somewhat analogous to those who said that
compilers would never match the speed of pure assembly language. Maybe not, but the
compiler (or ODBC) gives you the opportunity to write cleaner programs, which means
you finish sooner. Meanwhile, computers get faster every year.
JDBC
In an effort to set an independent database standard API for Java; Sun Microsystems
developed Java Database Connectivity, or JDBC. JDBC offers a generic SQL database
access mechanism that provides a consistent interface to a variety of RDBMSs. This
consistent interface is achieved through the use of “plug-in” database connectivity
modules, or drivers. If a database vendor wishes to have JDBC support, he or she must
provide the driver for each platform that the database and Java run on.
KMMIPS Page 32
Accountable Privacy-Preserving Mechanism For Cloud Computing
To gain a wider acceptance of JDBC, Sun based JDBC’s framework on ODBC. As you
discovered earlier in this chapter, ODBC has widespread support on a variety of
platforms. Basing JDBC on ODBC will allow vendors to bring JDBC drivers to market
much faster than developing a completely new connectivity solution.
JDBC was announced in March of 1996. It was released for a 90 day public review that
ended June 8, 1996. Because of user input, the final JDBC v1.0 specification was
released soon after.
The remainder of this section will cover enough information about JDBC for you to know
what it is about and how to use it effectively. This is by no means a complete overview
of JDBC. That would fill an entire book.
JDBC Goals
Few software packages are designed without goals in mind. JDBC is one that, because
of its many goals, drove the development of the API. These goals, in conjunction with
early reviewer feedback, have finalized the JDBC class library into a solid framework for
building database applications in Java.
The goals that were set for JDBC are important. They will give you some insight as to
why certain classes and functionalities behave the way they do. The eight design goals
for JDBC are as follows:
1.SQL Level API
The designers felt that their main goal was to define a SQL interface for Java. Although
not the lowest database interface level possible, it is at a low enough level for higher-
level tools and APIs to be created. Conversely, it is at a high enough level for
application programmers to use it confidently. Attaining this goal allows for future tool
vendors to “generate” JDBC code and to hide many of JDBC’s complexities from the
end user.
1. SQL Conformance
SQL syntax varies as you move from database vendor to database vendor. In an
effort to support a wide variety of vendors, JDBC will allow any query statement to
be passed through it to the underlying database driver. This allows the connectivity
module to handle non-standard functionality in a manner that is suitable for its users.
KMMIPS Page 33
Accountable Privacy-Preserving Mechanism For Cloud Computing
The JDBC SQL API must “sit” on top of other common SQL level APIs. This goal
allows JDBC to use existing ODBC level drivers by the use of a software
interface. This interface would translate JDBC calls to ODBC and vice versa.
3. Provide a Java interface that is consistent with the rest of the Java system
Because of Java’s acceptance in the user community thus far, the designers feel
that they should not stray from the current design of the core Java system.
4. Keep it simple
This goal probably appears in all software design goal listings. JDBC is no
exception. Sun felt that the design of JDBC should be very simple, allowing for only
one method of completing a task per mechanism. Allowing duplicate functionality
only serves to confuse the users of the API.
And for dynamically updating the cache table we go for MS Access database.
Simple Architecture-neutral
Object-oriented Portable
Distributed High-performance
Interpreted multithreaded
KMMIPS Page 34
Accountable Privacy-Preserving Mechanism For Cloud Computing
Robust Dynamic
Secure
Java is also unusual in that each Java program is both compiled and
interpreted. With a compile you translate a Java program into an intermediate
language called Java byte codes the platform-independent code instruction is
passed and run on the computer.
Compilation happens just once; interpretation occurs each time the program is
executed. The figure illustrates how this works.
JavaProgram Interpreter
Compilers My Program
You can think of Java byte codes as the machine code instructions for the
Java Virtual Machine (Java VM). Every Java interpreter, whether it’s a Java
development tool or a Web browser that can run Java applets, is an
implementation of the Java VM. The Java VM can also be implemented in
hardware.
Java byte codes help make “write once, run anywhere” possible. You can
compile your Java program into byte codes on my platform that has a Java
compiler. The byte codes can then be run any implementation of the Java VM.
For example, the same Java program can run Windows NT, Solaris, and
Macintosh.
HTML
KMMIPS Page 35
Accountable Privacy-Preserving Mechanism For Cloud Computing
Hypertext refers to the way in which Web pages (HTML documents) are linked
together. Thus the link available on a webpage is called Hypertext.
Originally, HTML was developed with the intent of defining the structure of documents
like headings, paragraphs, lists, and so forth to facilitate the sharing of scientific
information between researchers.
Tag Description
<!DOCTYPE...> This tag defines the document type and HTML version.
<html> This tag encloses the complete HTML document and mainly
comprises of document header which is represented
by <head>...</head> and document body which is represented
by <body>...</body> tags.
<head> This tag represents the document's header which can keep
other HTML tags like <title>, <link> etc.
KMMIPS Page 36
Accountable Privacy-Preserving Mechanism For Cloud Computing
<body> This tag represents the document's body which keeps other
HTML tags like <h1>, <div>, <p> etc.
KMMIPS Page 37
Accountable Privacy-Preserving Mechanism For Cloud Computing
6.System
Design
6.1 Introduction
Design is the first step in the development phase for any system. It may be defined as
the “Process of applying various techniques and principles for the purpose of designing
a device, a process, or a system”.
Software design is an iterative process through which requirements are translated into a
“Blue Print” for constructing the software. Preliminary design is concerned with the
transformation of requirements in to data and software architecture.
The database design transforms the information domain model created during analysis
into the data structures that will be required to implement software.
The architectural design defines the relationship among major structural elements of the
program. The interface design describes how the software communicates within itself,
to systems that interoperate with it, and with humans who use it. An interface
implements flow of information.
Basic design principles that enable the software engineer to navigate the design
process are:
KMMIPS Page 38
Accountable Privacy-Preserving Mechanism For Cloud Computing
The design should minimize the intellectual distance between the software and the
problem, as it exists in the real world.
The goal of database design is to generate a set of relation schemes that allow us to
store information without necessary redundancy and allows us to retrieve information
easily. We can achieve optimization, ease of use in which data is stored in the form of
tables and there exists a relation between or among tables.
To reduce redundancy
To arrive at loss-less join
To reduce the time as compared to the present system.
To reduce the number of errors.
Input design
The input design is the link between the information system and the user. It comprises
the developing specification and procedures for data preparation and those steps are
necessary to put transaction data in to a usable form for processing can be achieved by
inspecting the computer to read data from a written or printed document or it can occur
by having people keying the data directly into the system. The design of input focuses
on controlling the amount of input required, controlling the errors, avoiding delay,
avoiding extra steps and keeping the process simple. The input is designed in such a
way so that it provides security and ease of use with retaining the privacy. Input Design
considered the following things:
KMMIPS Page 39
Accountable Privacy-Preserving Mechanism For Cloud Computing
Objectives:
1. Input Design is the process of converting a user-oriented description of the input into
a computer-based system. This design is important to avoid errors in the data input
process and show the correct direction to the management for getting correct
information from the computerized system.
2.It is achieved by creating user-friendly screens for the data entry to handle large
volume of data. The goal of designing input is to make data entry easier and to be free
from errors. The data entry screen is designed in such a way that all the data
manipulates can be performed. It also provides record viewing facilities.
3. When the data is entered it will check for its validity. Data can be entered with the
help of screens. Appropriate messages are provided as when needed so that the user
will not be in maize of instant. Thus the objective of input design is to create an input
layout that is easy to follow
Output design:
A quality output is one, which meets the requirements of the end user and presents the
information clearly. In any system results of processing are communicated to the users
and to other system through outputs. In output design it is determined how the
information is to be displaced for immediate need and also the hard copy output. It is
the most important and direct source information to the user. Efficient and intelligent
output design improves the system’s relationship to help user decision-making.
1. Designing computer output should proceed in an organized, well thought out manner;
the right output must be developed while ensuring that each output element is designed
so that people will find the system can use easily and effectively. When analysis design
KMMIPS Page 40
Accountable Privacy-Preserving Mechanism For Cloud Computing
computer output, they should Identify the specific output that is needed to meet the
requirements.
3. Create document, report, or other formats that contain information produced by the
system.
The output form of an information system should accomplish one or more of the
following objectives.
KMMIPS Page 41
Accountable Privacy-Preserving Mechanism For Cloud Computing
7.Implementation
MODULES
1. AUDITOR
2. DATA OWNER
3. DATA PROVIDER
4. USER
AUDITOR:-
Auditor gets login by valid id and password. Auditor can view the all users and data
providers. Auditor can view the all who are requested for data.Auditor module contains
the action of accept or rejected the users. Auditor can view accepted users also in this
cloud project.
DATA OWNER:-
Data owner gets login by valid name and password. Data owner can view the all users
and data providers. Auditor can view the all who are requested for data. Auditor module
contains the action of accept or rejected the users. Auditor can view accepted users
also in this cloud project. Data owner can provide the key to the users for download the
data.
DATA PROVIDER:-
KMMIPS Page 42
Accountable Privacy-Preserving Mechanism For Cloud Computing
Data provider gets register by the valid details and also login by valid email and
password. Data provider can view all the users and they can view profile and edit the
profile. Data provider can provide the data and also generate the key automatically.
USERS:
User is the main module in this app. User gets register by the valid details and gets
login by valid email and password. User can view all the files like what are data
available. And if they want data they can request to the data owner or auditor and after
accept the request they can download the data with enter the valid key.
Source code:
Package comm;
Index code;
<html>
<head>
</head>
<body>
<section>
<nav>
KMMIPS Page 43
Accountable Privacy-Preserving Mechanism For Cloud Computing
<ul>
<div>
<li><a href="index.html">HOME</a></li>
</div>
<div>
<li><a href="auditor.jsp">AUDITOR</a></li></div>
<div><li><a href="user.jsp">USER</a></li></div>
</ul>
</nav>
</section>
</body>
</html>
Auditor:
pageEncoding="ISO-8859-1"%>
<html>
<head>
KMMIPS Page 44
Accountable Privacy-Preserving Mechanism For Cloud Computing
<title>auditor</title>
</head>
<body>
<script type="text/javascript">
function clicked() {
yourformelement.submit();
} else {
return false;
</script>
<script>function target_popup(form) {
form.target = 'formpopup';
}</script>
<section>
KMMIPS Page 45
Accountable Privacy-Preserving Mechanism For Cloud Computing
<nav>
<ul>
<div>
<li><a href="index.html">HOME</a></li>
</div>
<div>
<li><a href="auditor.jsp">AUDITOR</a></li></div>
<div><li><a href="user.jsp">USER</a></li></div>
</ul>
</nav>
<div class="apple">
<div class="top"><span></span></div>
<div class="butt"><span></span></div>
<div class="bite"></div>
</div>
<fieldset id="inputs">
KMMIPS Page 46
Accountable Privacy-Preserving Mechanism For Cloud Computing
</fieldset>
<fieldset id="actions">
</fieldset>
<%
String msg=null;
msg=request.getParameter("msg");
if(msg!=null){
%>
<%} %>
</form>
</section>
</body>
</html>
pageEncoding="ISO-8859-1"%>
KMMIPS Page 47
Accountable Privacy-Preserving Mechanism For Cloud Computing
<%
String id=request.getParameter("id");
String password=request.getParameter("password");
if(id.equals("raghu123")&&password.equals("raghu123"))
response.sendRedirect("auditorhome.jsp?msg=login successfully");
else
%>
pageEncoding="ISO-8859-1"%>
<html>
<head>
<title>Data Provider</title>
KMMIPS Page 48
Accountable Privacy-Preserving Mechanism For Cloud Computing
</head>
<body>
<script type="text/javascript">
function clicked() {
yourformelement.submit();
} else {
return false;
}</script>
<script>
function target_popup(form) {
form.target = 'formpopup';
}</script>
<section>
<nav>
<ul>
<div>
<li><a href="index.html">HOME</a></li>
KMMIPS Page 49
Accountable Privacy-Preserving Mechanism For Cloud Computing
</div>
<div>
<li><a href="auditor.jsp">AUDITOR</a></li></div>
<div><li><a href="user.jsp">USER</a></li></div>
</ul>
</nav>
<formid="login"action="dataprovider1.jsp"method="post"onsubmit="target_popup(this)">
<div class="apple">
<div class="top"><span></span></div>
<div class="butt"><span></span></div>
<div class="bite"></div>
</div>
<fieldset id="inputs">
</fieldset>
<fieldset id="actions">
KMMIPS Page 50
Accountable Privacy-Preserving Mechanism For Cloud Computing
<pclass="option"><ahref="dregistration.jsp"style="color:yellow">New
Registration</a></p>
</fieldset>
<%
String msg=null;
msg=request.getParameter("msg");
if(msg!=null){
%>
<%} %>
<%
String m=null;
String g="d";
m=request.getParameter("m");
if(m!=null){
%>
<%} %>
</form>
</section>
KMMIPS Page 51
Accountable Privacy-Preserving Mechanism For Cloud Computing
</body>
</html>
pageEncoding="ISO-8859-1"%>
<html>
<head>
<title>Data Owner</title>
</head>
<body>
<script type="text/javascript">
function clicked() {
yourformelement.submit();
} else {
return false;
KMMIPS Page 52
Accountable Privacy-Preserving Mechanism For Cloud Computing
</script>
<script>function target_popup(form) {
form.target = 'formpopup';
}</script>
<section>
<nav>
<ul>
<div>
<li><a href="index.html">HOME</a></li>
</div>
<div>
<li><a href="auditor.jsp">AUDITOR</a></li></div>
<div><li><a href="user.jsp">USER</a></li></div>
</ul>
</nav>
KMMIPS Page 53
Accountable Privacy-Preserving Mechanism For Cloud Computing
<div class="apple">
<div class="top"><span></span></div>
<div class="butt"><span></span></div>
<div class="bite"></div>
</div>
<fieldset id="inputs">
</fieldset>
<fieldset id="actions">
--> </fieldset>
<%
String msg=null;
msg=request.getParameter("msg");
if(msg!=null){
%>
KMMIPS Page 54
Accountable Privacy-Preserving Mechanism For Cloud Computing
<%} %>
</form>
</section>
</body>
</html>
pageEncoding="ISO-8859-1"%>
<html>
<head>
</head>
<body>
<script language="Javascript">
function redirectToFB(){
window.opener.location.href="dataowner.jsp";
KMMIPS Page 55
Accountable Privacy-Preserving Mechanism For Cloud Computing
self.close();
</script>
<section>
<nav>
<ul>
<div>
<div><li><a href="dfiles.jsp">FILES</a></li></div>
</ul>
</nav>
</body>
</html>
pageEncoding="ISO-8859-1"%>
KMMIPS Page 56
Accountable Privacy-Preserving Mechanism For Cloud Computing
<html>
<head>
</head>
<body>
<script language="Javascript">
function redirectToFB(){
window.opener.location.href="dataprovider.jsp";
self.close();
</script>
<section>
<nav>
<ul>
<div>
<li><a href="dprofile.jsp">PROFILE</a></li></div>
KMMIPS Page 57
Accountable Privacy-Preserving Mechanism For Cloud Computing
<div>
</ul>
</nav>
<form id="login">
<div class="apple">
<div class="top"><span></span></div>
<div class="butt"><span></span></div>
<div class="bite"></div>
</div>
<fieldset id="inputs">
<%
String aaa=session.getAttribute("email").toString();
try
Class.forName("com.mysql.jdbc.Driver");
Connection
con=DriverManager.getConnection("jdbc:mysql://localhost:3306/cloud1","root","root");
KMMIPS Page 58
Accountable Privacy-Preserving Mechanism For Cloud Computing
ps1.setString(1,aaa);
ResultSet dpr=ps1.executeQuery();
while(dpr.next()){
%>
<div>
<center>
<br>
<tr align="center">
<td>NAME</td>
<td>PASSWORD</td>
<td>EMAIL</td>
<td>NUMBER</td>
<td>UPDATE</td>
</center>
</tr>
<tr>
<td><%=dpr.getString(1) %></td>
<td><%=dpr.getString(2) %></td>
KMMIPS Page 59
Accountable Privacy-Preserving Mechanism For Cloud Computing
<td><%=dpr.getString(3) %></td>
<td><%=dpr.getString(4) %></td>
</tr>
<%} %></table>
</div>
<%
}catch(Exception e)
e.printStackTrace();
} %>
</body>
</html>
Package code:
<%
String id=request.getParameter("id");
String status="Accepted";
System.out.println(id);
try{
Class.forName("com.mysql.jdbc.Driver");
KMMIPS Page 60
Accountable Privacy-Preserving Mechanism For Cloud Computing
Connection conn=DriverManager.getConnection("jdbc:mysql://localhost:3306/cloud1",
"root", "root");
Statement st=conn.createStatement();
String sql="update file set status='"+status+"' where id='"+id+"' and status='Requested' "
PreparedStatement ps1=conn.prepareStatement(sql);
ps1.executeUpdate();
response.sendRedirect("request.jsp");
catch(Exception e)
System.out.print(e);
e.printStackTrace();
%>
Auditor:
<html>
<head>
KMMIPS Page 61
Accountable Privacy-Preserving Mechanism For Cloud Computing
<title>auditor</title>
</head>
<body>
<script type="text/javascript">
function clicked() {
yourformelement.submit();
} else {
return false;
</script>
<script>function target_popup(form) {
form.target = 'formpopup';
}</script>
<section>
KMMIPS Page 62
Accountable Privacy-Preserving Mechanism For Cloud Computing
<nav>
<ul>
<div>
<li><a href="index.html">HOME</a></li>
</div>
<div>
<li><a href="auditor.jsp">AUDITOR</a></li></div>
<div><li><a href="user.jsp">USER</a></li></div>
</ul>
</nav>
<div class="apple">
<div class="top"><span></span></div>
<div class="butt"><span></span></div>
<div class="bite"></div>
</div>
<fieldset id="inputs">
KMMIPS Page 63
Accountable Privacy-Preserving Mechanism For Cloud Computing
</fieldset>
<fieldset id="actions">
</fieldset>
<%
String msg=null;
msg=request.getParameter("msg");
if(msg!=null){
%>
<%} %>
</form>
</section>
</body>
</html>
pageEncoding="ISO-8859-1"%>
KMMIPS Page 64
Accountable Privacy-Preserving Mechanism For Cloud Computing
<html>
<head>
<title>Data Owner</title>
</head>
<body>
<script type="text/javascript">
function clicked() {
yourformelement.submit();
} else {
return false;
</script>
<script>function target_popup(form) {
KMMIPS Page 65
Accountable Privacy-Preserving Mechanism For Cloud Computing
form.target = 'formpopup';
}</script>
<section>
<nav>
<ul>
<div>
<li><a href="index.html">HOME</a></li>
</div>
<div>
<li><a href="auditor.jsp">AUDITOR</a></li></div>
<div><li><a href="user.jsp">USER</a></li></div>
</ul>
</nav>
<div class="apple">
<div class="top"><span></span></div>
<div class="butt"><span></span></div>
<div class="bite"></div>
KMMIPS Page 66
Accountable Privacy-Preserving Mechanism For Cloud Computing
</div>
<fieldset id="inputs">
</fieldset>
<fieldset id="actions">
</fieldset>
<%
String msg=null;
msg=request.getParameter("msg");
if(msg!=null){
%>
<%} %>
</form>
</section>
</body>
</html>
KMMIPS Page 67
Accountable Privacy-Preserving Mechanism For Cloud Computing
8.system
testing
The purpose of testing is to discover errors. Testing is the process of trying to discover
every conceivable fault or weakness in a work product. It provides a way to check the
functionality of components, sub assemblies, assemblies and/or a finished product It is
the process of exercising software with the intent of ensuring that the
Software system meets its requirements and user expectations and does not fail in an
unacceptable manner. There are various types of test. Each test type addresses a
specific testing requirement.
Types of tests
8.1 Unit testing
Unit testing involves the design of test cases that validate that the internal program logic
is functioning properly, and that program inputs produce valid outputs. All decision
branches and internal code flow should be validated. It is the testing of individual
KMMIPS Page 68
Accountable Privacy-Preserving Mechanism For Cloud Computing
software units of the application .it is done after the completion of an individual unit
before integration. This is a structural testing, that relies on knowledge of its
construction and is invasive. Unit tests perform basic tests at component level and test
a specific business process, application, and/or system configuration. Unit tests ensure
that each unique path of a business process performs accurately to the documented
specifications and contains clearly defined inputs and expected results.
Functional test
Functional tests provide systematic demonstrations that functions tested are available
as specified by the business and technical requirements, system documentation, and
user manuals.
KMMIPS Page 69
Accountable Privacy-Preserving Mechanism For Cloud Computing
must be considered for testing. Before functional testing is complete, additional tests are
identified and the effective value of current tests is determined.
System Test
System testing ensures that the entire integrated software system meets requirements.
It tests a configuration to ensure known and predictable results. An example of system
testing is the configuration oriented system integration test. System testing is based on
process descriptions and flows, emphasizing pre-driven process links and integration
points.
Unit testing is usually conducted as part of a combined code and unit test phase of the
software lifecycle, although it is not uncommon for coding and unit testing to be
conducted as two distinct phases.
KMMIPS Page 70
Accountable Privacy-Preserving Mechanism For Cloud Computing
The task of the integration test is to check that components or software applications,
e.g. components in a software system or – one step up – software applications at the
company level – interact without error.
Test Results: All the test cases mentioned above passed successfully. No defects
encountered.
Test Results: All the test cases mentioned above passed successfully. No defects
encountered.
KMMIPS Page 71
Accountable Privacy-Preserving Mechanism For Cloud Computing
9.Conclusion
In this paper, focusing on the critical issue of cloud privacy preserving, we proposed an
accountable privacy-preserving mechanism based on IBE scheme. Firstly, we model
and define the detailed privacy attribute for cloud participants based on description
logic, and then introduced two algorithms to realize accountability combined with the
modified IBE scheme in the IBE-AC model. Furthermore, we consider the possible
adversary attacks to the proposed accountable privacy-preserving mechanism, we
describe the two types adversaries launched by the dishonest cloud participants, type-I
and type-II adversaries for the game story. From the theory level, we proved the
proposed mechanism is secure against the attacks launched by them. Finally, we
evaluated the proposed privacy-preserving mechanism through extensive simulation
and experimental test, at the same time, we discuss the potential implementation of the
proposed accountable privacy-preserving mechanism.
KMMIPS Page 72
Accountable Privacy-Preserving Mechanism For Cloud Computing
Appendices
Appendix-A: User Manual
User Manual is the guide to the Users of the system. It paves a path to the
Corresponding user to help him how to proceed further in the proper understanding of
the system. The interface of the system gets familiar to the user, based on this manual
only.
The first form is the user has to upload the CSV file by clicking the choose file then
submit. After the submission if it shows successful, then user have to go through pre-
processing module, then support and finally go throw the graph .In pre-processing form
the user can get the structured output data, after this by clicking support module then
user may get the average results of the CSV file.
This is the Home Page for the user select dataset file.
KMMIPS Page 73
Accountable Privacy-Preserving Mechanism For Cloud Computing
In this Page the User can View the selected file dataset.
HOME PAGE:
KMMIPS Page 74
Accountable Privacy-Preserving Mechanism For Cloud Computing
AUDITOR LOGIN:
KMMIPS Page 75
Accountable Privacy-Preserving Mechanism For Cloud Computing
VIEW FILES
KMMIPS Page 76
Accountable Privacy-Preserving Mechanism For Cloud Computing
VIEW USERS
KMMIPS Page 77
Accountable Privacy-Preserving Mechanism For Cloud Computing
KMMIPS Page 78
Accountable Privacy-Preserving Mechanism For Cloud Computing
KMMIPS Page 79
Accountable Privacy-Preserving Mechanism For Cloud Computing
VIEW FILES
VIEW USERS
KMMIPS Page 80
Accountable Privacy-Preserving Mechanism For Cloud Computing
KMMIPS Page 81
Accountable Privacy-Preserving Mechanism For Cloud Computing
KMMIPS Page 82
Accountable Privacy-Preserving Mechanism For Cloud Computing
VIEW PROFILE
KMMIPS Page 83
Accountable Privacy-Preserving Mechanism For Cloud Computing
USER REGISTRATION
KMMIPS Page 84
Accountable Privacy-Preserving Mechanism For Cloud Computing
KMMIPS Page 85
Accountable Privacy-Preserving Mechanism For Cloud Computing
VIEW PROFILE
VIEW FILES
KMMIPS Page 86
Accountable Privacy-Preserving Mechanism For Cloud Computing
KMMIPS Page 87
Accountable Privacy-Preserving Mechanism For Cloud Computing
Bibliograph
y
Book Resources:
[1] Yan Z, Li X, Wang M, et al. Flexible Data Access Control based on Trust and
Reputation in Cloud Computing[J]. IEEE Transactions on Cloud Computing,
2017, PP(99):1-1.
[4] Yao X, Lin Y, Liu Q, et al. Privacy-preserving Search over Encrypted Personal
Health Record in Multi-Source Cloud [J]. IEEE Access, 2018, PP(99):45-53.
[5] Prasad K, Poonam J, Gauri K, et al. Data sharing security and privacy
preservation in cloud computing[C]//Green Computing and Internet of Things
(ICGCIoT), 2015 International Conference on. IEEE, 2015: 1070- 1075.
[6] Zhuo G, Jia Q, Guo L, et al. Privacy-preserving verifiable data aggregation and
analysis for cloud-assisted mobile crowdsourcing[C]//Computer
KMMIPS Page 88
Accountable Privacy-Preserving Mechanism For Cloud Computing
[10] Zhang H, Jiang H, Li B, et al. A framework for truthful online auctions in cloud
computing with heterogeneous user demands [J]. IEEE Transactions on
Computers, 2016, 65(3): 805-818.
KMMIPS Page 89
Accountable Privacy-Preserving Mechanism For Cloud Computing
KMMIPS Page 90