Вы находитесь на странице: 1из 10

ACKNOWLEDGEMENT

We hereby give a valedictory thanks for this opportunity of considering our idea and

allowing us to take our innovation to the next level.

We sincerely thank our beloved principal Dr.S.GURULINGAM M.E., Ph.D., for

providing us the path through which our project can be executed.

We also express our sincerity towards our respected head of department

Dr.N.BALAJI,D.C.T.,B.Tech.,M.E.,Ph.D., who has provided us with lot of time and

provide us space to innovate our project.

We kindly extend our gratitude towards our beloved guide Mrs.K.Maheswari,

M.Tech.,Assistant Professor Department of Computer Science and Engineering who has

been a back bone for our project and being a supporting pillar for the execution and

improvement of our project. She is the one who has motivated us with lot of new and

emerging techniques with its applications.

This encouragement is what we required and allowed us to take our project into the next

phase.

i
DECLARATION

We affirm that the project work titled “DCT Methodology in Distributed Cloud
Servers For Exploring Bid Data Storage” being submitted in partial fulfilment for the
award of Bachelor of Technology is the original work carried out by us. It has not formed
the part of any other project work submitted for award of any degree.

S.DEVI (Reg. 15TD2918)

I certify that the declaration made above by the candidate is true

Signature of the Guide


Miss.K.Maheswari, M.Tech.,
Assistant Professor
Department of Computer Science and Engineering
Sri Venkateshwaraa College of Engineering& Technology.

ii
TABLE OF CONTENTS
PAGE
CHAPTER TITLE NO.

ACKNOWLEDGEMENT i

DECLARATION ii

ABSTRACT vii

LIST OF FIGURES viii

LIST OF TABLES xi
ABBREVATION x
1 INTRODUCTION 1
1.1CLOUD 1
1.1.1 Infrastructure as a service (IaaS) 1
1.1.2 Platform as a service (PaaS) 2
1.1.3 Software as a service (SaaS) 2
1.2 USES OF CLOUD COMPUTING 2
1.3 ADVANTAGE OF CLOUD COMPUTING 3
1.4 DISADVANTAGE OF CLOUD COMPUTING 3

2 LITERATURE SURVEY 5
3 EXISTING SYSTEM 8
3.1 OVERVIEW 8
3.2 PROBLEM DEFINITION 8
3.3 DISADVANTAGE 8
3.3.1 Infrastructure Dependency 8
3.3.2 Security Compliance 9

iii
3.3.3 Duplicate Check Scheme 9
3.4 ARCHITECTURE 9
4 PROPOSED SYSTEM 10
4.1OVERVIEW 10
4.2 ADVANTAGES 10
4.3 ARCHITECTURE 11
4.4 MODULES 12
4.1.1 Data Users 12
4.1.2 Identity Provider 12
4.1.3 Admin 13
4.1.4 Storage 13
4.5 DATA FLOW DIAGRAM 14
4.6 UML DIAGRAM 15
4.1.5 Class Diagram 15
4.1.6 Use Case Diagram 16
4.1.7 Sequential Diagram 17
4.1.8 Activity Diagram 18
5 SYSTEM REQUIREMENTS AND SPECIFICATION 19
5.1 INTRODUCTION 19
5.2 PROJECT ENVIRONMENT 19
5.2.1 Hardware Requirements 19
5.2.2 Software Requirements 19
5.3 SOFTWARE DESCRIPTION 19
5.3.1 Language Specification 19
5.3.1.1 Java 19
5.3.1.2 History 20
5.3.1.3 Principles 21
5.3.1.4 Versions 21

iv
5.3.2 Windows (Operating System) 22
5.3.2.1 Features 22
SYSTEM TESTING AND MAINTENANCE 23
Testing Overview 23
Who does Testing? 23
When to Start Testing? 23
When to Stop Testing? 24
Verification & Validation 24
QA, QC Testing 25
Audit and Inspection 26
Testing and Debugging 26
Types Of Testing 27
Manual Testing 27
Automation Testing 27
Software Testing Tools 28
Methods Used In Testing 28
Black-Box Testing 28
White-Box Testing 29
Grey-Box Testing 30
31
Software Testing Documentation
31
Test Plan
32
Test Scenario
32
Test Case
33
Traceability Matrix
33
Estimation Techniques
34
Functional Point Analysis
34
Test Point Analysis

v
Mark-II Method 34
Miscellaneous 34
6 IMPLEMENTATION AND SNAPSHOTS 35
7 CONCLUSION 38
8 REFERENCES 39
9 APPENDIX 41
SOURCE CODE 41
Registration.jsp 41
Upload.java 45
Uploading in DriveHQ 51

vi
ABSTRACT

As cloud computing becomes prevalent, an increasing amount of data is


being stored in the cloud and shared by users with specific privileges, which
define the access rights of the stored data. One critical challenge of cloud
storage services is the management of the ever-increasing volume of data.
The intuition is that outsourced data may require different levels of
protection, depending on how popular it is: content shared by many users,
such as a popular song or video, arguably requires less protection than a
personal document, the copy of a payslip or the draft of an unsubmitted
scientific paper. As more corporate and private users outsource their data to
cloud storage providers, recent data breach incidents make end-to-end
encryption an increasingly prominent requirement. Unfortunately,
semantically secure encryption schemes render various cost-effective storage
optimization techniques become ineffective. In this paper we present a novel
idea that differentiates data according to their popularity. Based on this idea,
we design an encryption scheme that guarantees semantic security for
unpopular data and provides weaker security and better storage and
bandwidth benefits for popular data. This way, duplicate data copies can be
effective for popular data, whilst semantically secure encryption protects
unpopular content. We show that our scheme is secure under the Symmetric
External Decisional Diffie-Hellman Assumption in the random oracle
model.

vii
FIG.NO LIST OF FIGURES PAGE NO
3.1 Architecture of Existing System 9
4.1 Architecture of Proposed System 11
4.2 Proposed Multi-layered scheme 12
4.3 Data Flow Diagram 14
4.4 Class Diagram 15
4.5 Use Case Diagram 16
4.6 Sequential Diagram 17
4.7 Activity Diagram 18
5.1 Automation Testing 27
5.2 Test Scenario 32
6.1 User Registration Form 35
6.2 Account Activation and Token Generation 35
6.3 User has to enter by Token Number 36
6.4 File Processing 36
6.5 Admin Form 37
6.6 Hybrid Cloud 37

viii
TABLE PAGE
LIST OF TABLES
NO NO
5.1 Difference between Verification and Validation 24

5.2 Difference between Quality Assurance, Quality Control 25


and Testing

5.3 Advantages and Disadvantages of Black-Box Testing 28

5.4 Advantages and Disadvantages of White-Box Testing 29

5.5 Advantages and Disadvantages of Grey-Box Testing 30

ix
ABBREVATION

Saas Software as a Service

Paas Platform as a Service

Iaas Infrastructure as a Service

CSP Cloud Service Provider

S-CSP Secure Cloud Service Provider

IDP Identity provider

WORA Write Once Run Anywhere

GPL General Public License

GUI Graphical User Interface