Вы находитесь на странице: 1из 52

T 1

CHAPTER-1
TINTRODUCTION

1.1 TPROJECTTDESCRIPTION:

ThisTprojectTmayTbeTaTWebTApplicationTforTCloudTStorage,TtheTownerTwillTuploadTtheTfileTtoTcl
oudTafterTencryptionTisTcompleted,TtheTaimTofTcloudTstorageTisTtoTuseTtraditionalTsupercomputi
ng.T

ByTusingTcloudTstorageToutputTvolumeTareTincreasedTorTproductivityTwithTfewerTpeopleTareTinc
reased.TPeopleTworldwideTcanTaccessTtheTcloud,TprovidedTtheyTneedTaTwebTconnection.TTheTclo
udTstorageTusesTnetworksTofThugeTgroupsTofTserversTtypicallyTrunningTlow-costTconsumer.T

WhenTtheTuserTandTownerTwantsTtoTloginTtheyTmustTrequiredTtheTsecretTkey.TThisTsecretTkeyTwi
llTbeTreceivingTthisTTPATmoduleTthroughTtheTregisteredTmailTid.

TheTuserTcanTdownloadTtheTuploadedTenterTCloudTbyTenteringTPrivateTKeyTandTAggregateTKey
T ofTtheTuserTwhichTcanTsentTtoTuserTemail.
T 2

1.2 COMPANYTPROFILE
T

FormationT:T2012

PurposeT:TOpenTSourceTTechnologiesT

LocationT:TIndia
OriginT:TBangalore

FoundersT:TAshfaqTIshaqTYin,TSurendraTNaik,TvolunteersT

History:

ATSTGlobalTTechsoftTPvtTLtdTisTassociateTdegreeTbusinesspersonTcompany,TcenteredTonTcusto
mer-
specificTsoftwareTsystemTsolutionsTforTshoppersTworldwide.TATSTsupplyTtheirTservicesTandTres
ourcesTtoTanyTquiteTsoftwareTsystemTdevelopmentTorTcontractThiringTnecessities.TInTassociateTd
egreeTeraTofTaggressivenessTselectingTtheTcorrectTITTpartnerThasTbecomeTanTenormousTchalleng
e,TourThumbleTlistTofTclientelesTduringTaTshortTspanTofTyourTtimeTacrossTvariedTindustries,Tspeak
sTvolumesTofTourTdedicationTandTexpertnessTthatTyou'llTexpect.T

Services:
• Portals
• CRM
• MobileTSolutions
• BusinessTintelligenceTandTAnalytics
• ConsultingTservices

Clients:
• L&TTInfotech
• WIPRO
• Capgemini
• CIGNEX
• IGT
• ITCTINFOTECH
• Xebia
T 3

CHAPTER-2 T

LITERATURE SURVEY T

ItTwillTstudyTtheTfeaturesTofTtheTexistingTandTproposedTsystemTwhichTovercomeTtheTlimitationsT
ofTtheTexistingTsystem.

2.1 EXISTING SYSTEM AND PROPOSED SYSTEM


T T T T

2.1.1 EXISTING SYSTEM: T

LimitationsTofTExistingTsystem:
• TheTcloudTisTinTperilTofTprivacyTandTsecurityTattacks,TthatTareTaTgaintThindranceTtoTitsTwhol
esomeTacceptanceTbecauseTtheTfirstTmeansTofTknowledgeTsharingTinTtodaysTworld.
• ThisTschemeTisn'tTpracticallyTdeployableTforT2TmajorTreasons.TFirstly,TtheTquantityTofTsecre
tTkeysTwouldTgrowTwithTtheTquantityTofTdataTclasses.
• Secondly,TanyTuserTrevocationTeventTwouldTrequireTAliceTtoTthoroughlyTre-
encryptTtheTcorrespondingTsubsetTofTknowledge,TandTdistributeTtheTnewTsetTofTkeysTtoTtheT
choiceTexistingTvalidTusers.T

2.1.2 PROPOSED SYSTEM: T

Objectives:
• InTthisTpaper,TweTtryTtoTbuildTpreciselyTsuchTanTinformationTsharingTframeworkTthat'sTprov
ablyTsecureTandTatTtheTidenticalTtime,TefficientlyTimplementable.
• InTthisTpaperTweTproposeTanTefficientlyTimplementableTversionTofTtheTfundamentalTkey-
aggregateTcryptosystemT(KAC)TusingTasymmetricTbilinearTpairings.T
• WeTproposeTaTCCA
secureTfullyTcollusionTresistantTconstructionTforTtheTfundamentalTKACTschemeTwithTlowTo
verheadTciphertextsTandTaggregateTkeys.
T 4

2.2 FEASIBILITY STUDY T

TheTpracticablenessTofTtheTprojectTisTanalyzedTthroughoutTthisTpartTandTbusinessTproposalTisTpl
aceTforthTwithTaTextremelyTgeneralTarrangeTforTtheTprojectTandTaTcoupleTofTvalueTestimates.Tthr
oughoutTsystemTanalysisTtheTpracticablenessTstudyTofTtheTprojectedTsystemTisTtoTbeTdistributed.
T thisTwillTbeTtoTcreateTpositiveTthatTtheTprojectedTsystemTisTnotTaTburdenTtoTtheTcompany..

Technical Feasibility:
T

ThisTstudyTisTadministeredTtoTvisualiseTtheTtechnicalTpracticableness,TthatTis,TtheTtechnicalTnece
ssitiesTofTtheTsystem.TAnyTsystemTdevelopedTmustn'tThaveTaThighTdemandTonTtheTonTtheTmarket
T technicalTresources.TthisTwillTendTinThighTdemandsTonTtheTonTtheTmarketTtechnicalTresources.Tt
hisTwillTendTinThighTdemandsTbeingTplacedTonTtheTbuyer.TTheTdevelopedTsystemTshouldThaveTaT
modestTdemand,TasTsolelyTmarginalTorTnullTchangesTunitTneededTforTimplementingTthisTmethod
.
Economic Feasibility:
T

ThisTstudyTisTappliedTtoTestablishTtheTeconomicTimpactTthatTtheTsystemTwillTwearTtheTorganizati
on.TtheTvarietyTofTfundTthatTtheTcompanyTcanTpourTintoTtheTanalysisTandTdevelopmentTofTtheTsy
stemTisTout.TTheTexpendituresToughtTtoTbeTeven.TthatTtheTdevelopedTsystemTfurthermoreTamong
T theTbudgetTandTthisTwasTachievedTasTaTresultsTofTmostTofTtheTtechnologiesTusedTarTfreelyToutTth
ere.TexclusivelyTtheTmade-to-orderTproductThadTtoTbeTpurchased.
Social Feasibility
T T

TheTaspectTofTstudyTisTtoTvisualizeTtheTextentTofTacceptanceTofTtheTsystemTbyTtheTuser.TThisTinc
ludesTtheTstrategyTofTcoachingTjobTtheTuserTtoTuseTtheTsystemTwithTefficiency.TTheTuserTshouldn
'tTfeelTvulnerableTbyTtheTsystem,TinsteadToughtTtoTacceptTitTasTaTnecessity.TtheTextentTofTaccepta
nceTbyTtheTusersTcompletelyTdependsTonTtheTmethodsTthatTareTusedTtoTshowTtheTuserTregardingT
theTsystemTandTtoTmakeThimTreceptionTwithTit.THisTlevelTofTconfidenceToughtTtoTbeTraisedTsoTas
T thatTheTisTcollectivelyTableTtoTproduceTsomeTconstructiveTcriticism,Tthat'sTwelcome,TasTheTisTth
eTfinalTwordTuserTofTtheTsystem.
Behavioral Feasibility:
T

TheTbehaviouralTpracticabilityTareTbetweenTtheTsystemTandTthereforeTtheTusers.TafterTweTuseTth
eTsystem,TtheTbehaviorTofTaTsystemTmayTbeTdetermined.
T 5

2.3 TOOLS AND TECHNOLOGIES USED


T T T

NetBeans:
• NetBeansTisTANTintegratedTdevelopmentTsettingT(IDE)TforTJava.TNetBeansTpermitsTapplicat
ionsTtoTbeTdevelopedTfromTaTcollectionTofTstandardTpackageTelementsTknownTasTmodules.T
NetBeansTcanTbeTrunTonTMacOs,TWindows,SolarisTandTLinux.
• ApplicationsTsupportedTNetBeans,TasTwellTasTtheTNetBeansTIDE,TwillTbeTextendedTbyTthirdT
partyTdevelopers.
• NetBeansTIDETsupportsTdevelopmentTofTallTJavaTapplicationTvarietiesT(JavaTSET(includingT
JavaFX),TJavaTME,Tweb,TEJBTandTmobileTapplications)ToutTofTtheTbox.

JSP:
• JavaTServerTPagesT(JSP)TmayTbeTaTassortmentTofTtechnologiesTthatThelpsTcodeTdevelopersTp
roduceTdynamicallyTgeneratedTwebsitesTsupportedTHTML,TXML,TSOAP,TorTdifferentTdocu
mentTsorts.

• JSPTisTcomparableTtoTPHPTandTASP,ThoweverTusesTtheTJavaTartificialTlanguage

• ToTdeployTandTrunTJavaTServerTPages,TaTcompatibleTnetTserverTwithTaTservletTinstrumentalit
y,TlikeTApacheThouseTcatTorTseawall,TisTneeded.

JavaTServlet:
• ATJavaTservletTisTaTJavaTsoftwareTcomponentTthatTextendsTtheTcapabilitiesTofTaTserver

• ATJavaTservletTprocessesTorTstoresTaTJavaTclassTinTJavaTEETthatTconformsTtoTtheTJavaTServle
tTAPI,TaTstandardTforTimplementingTJavaTclassesTthatTrespondTtoTrequests.

Fast:

JavaTServletTprovidesToptimizingTcompilationTtoTurgeThighTperformanceTandTquickTstart-
upTacrossTtheTnetTapplications

Portable:
• ServletsTareaTunitTwrittenTinTJavaTandTfollowTaTwell-standardizedTAPI.

• Consequently,TservletsTwrittenTfor,TsayTI-
PlanetTEnterpriseTServerTwillTrunTnearlyTunchangedTonTApache,TMicrosoftTIIS,TorTWebStar
.

• ServletsTareaTunitTsupportedTdirectlyTorTviaTaTpluginTonTvirtuallyTeachTmajorTinternetTserver
.
T 6

JavaScript: T

•TJavaScriptTwillTgenerateThypertextTmarkupTlanguageTdynamicallyTonTtheTshopper.

•TThisTmayTbeTaThelpfulTcapability,ThoweverTsolelyThandlesTthingsTwhereverTtheTdynamicTdataT
isTpredicatedTonTtheTclient'sTsurroundings.

•TWithTtheTexceptionTofTcookies,ThypertextTtransferTprotocolTandTkindTsubmissionTinformationT
isn'tToutTthereTtoTJavaScript.TAnd,TsinceTitTrunsTonTtheTshopper,TJavaScriptTcannotTaccessTserver
-sideTresourcesTlikeTdatabases,Tcatalogs,TratingTdata,TandTthereforeTtheTlike.
T 7

2.4 SOFTWARE AND HARDWARE REQUIREMENTS


T T T

HARDWARE REQUIREMENTS
T T

• SystemT:TPentiumTIVT2.4TGHz.
• HardTDiskT:T40TGB.
• FloppyTDriveT:T1.44TMb.
• MonitorT:T15TVGATColour.
• MouseT:TLogitech.
• RamT:T512TMb.

SOFTWARE REQUIREMENTS T

• Operating System : Windows.


T T T

• T Tools : Web Browser.


T T T

• T Technologies : JAVA/J2EE. T T

• IDE : NetBeans 8.2.


T T T

• Back End : MYSQL.


T T T
T 8

CHAPTER-3

SOFTWARE REQUIREMENT SPECIFICATION


T T

ThisTisTaTcompleteTdescriptionTofTtheTdevelopedTsystemTwhichTincludesTallTtheTmandatoryTrequ
irementsTneededTforTthisTapplication.

3.1 Registration:

OwnerThasTtoTregisterTtoTuploadTtheTfileTtoTcloudTwithTcredentialsTsuchTasTname,Temail-
id,Tpassword,Tcontact,Tstate,Tcountry.T
UserThasTtoTregisterTtoTdownloadTtheTfileTfromTcloudTwithTcredentialsTsuchTasTname,Temail-
id,Tpassword,Tcontact,Tstate,Tcountry.
IfTusernameTorTpasswordTisTforgottenTmeansTheTcanTgoTwithTforgotTbutton,TbutTheTifTloseTtheTse
cretTkeyTthenTeitherTuserTorTownerTwillTnotTbeTableTtoTlogin.

3.2 Owner:

OwnerTwillTuploadTtheTfileTtoTcloudTafterTtheTencryptionTisTdoneTwithTAESTalgorithm.TEveryTti
meTOwnerTuploadsTtheTfile,TtheTfileTwillTbeTsecuredTwithTdifferentTsecretTcodeTbyTusingTowners
T privateTkeys.TOwnerTcanTverifyTthatTwhichTfileThasTbeenTuploadedTtoTcloud.

3.3 Users:
UsersTcanTaccessTtheTdataTthatTisTthereTinTtheTCloudTbyTloginTwithTsecretTkey.TIfTaTuserTwantsTto
T downloadTtheTfile,TuserTcanTstartTbyTusingTtheTapplicationTandThasTtoTrequestTforTpublicTkeyTfro
mTtheTowner.TThenTlaterTuserTcanTdownloadTtheTfileTwithTprivateTkeyTandTaggregateTkeyTofTow
ner.

3.4 Cloud storage:


T

CloudTstorageTisTaTmodelTofTcomputerTdataTstorageTinTwhichTtheTdigitalTdataTisTstoredTinTlogica
lTpools.TTheseTcloudTstorageTprovidersTareTresponsibleTforTkeepingTtheTdataTavailableTandTacce
ssible,TandTtheTphysicalTenvironmentTprotectedTandTrunning.TPeopleTandTorganizationsTbuyTorTl
easeTstorageTcapacityTfromTtheTprovidersTtoTstoreTuser,Torganization,TorTapplicationTdata.TClou
dTstorageTservicesTmayTbeTaccessedTthroughTaTcollocatedTcloudTcomputingTservice,TaTwebTservi
ceTapplicationTprogrammingTinterfaceT(API)TorTbyTapplicationsTthatTutilizeTtheTAPI,TsuchTasTcl
oudTdesktopTstorage,TaTcloudTstorageTgatewayTorTWeb-basedTcontentTmanagementTsystems.
T 9

3.5 TPA:

WhenTtheTuserTandTownerTwantsTtoTloginTtheyTmustTrequiredTtheTsecretTkey.TThisTsecretTkeyTwi
llTbeTreceivingTthisTTPATmoduleTthroughTtheTregisteredTmailTid.T

3.6 FUNCTIONAL REQUIREMENTS T

• TCross-platform:TCross-platformTmeansTtheTapplicationTthatTworksTonTWebTbrowsers.
• TMonitor:TAppTshouldTconnectTtoTtheTthirdTpartyTtoTmonitorTandTtoTsendTtheTpublicTandTprivateTkey
sTtoTtheTOwnersTorTUsersTwhenTitTisTrequired.
• UsersTshouldTbeTableTtoTgetTtheTpublicTkeyTofTtheTfileTwhichThasTuploadedTtoTcloudTfromTtheT
Owner.TTheseToptionsTwillTbeTtriggeredTautomaticallyTthroughTaTmonitoringTcloudTrunningT
onTaTserver.
• UsersTshouldTbeTableTtoTdownloadTtheTfileTatTtheTsameTtimeTwithTonlyToneTtoTbeTcompleted.T
AsTsoonTasToneTofTtheToptionsTisTtriggered,TtheTothersTareT paused.
• UsersTshouldTbeTableTtoTspecifyTaTtrailingTstopTlossTforTeveryTtradeToption.

• UsersTshouldTbeTableTtoTspecifyTaTtrailingTbuyTforTeveryTtradeToption.

3.7 NON-FUNCTIONAL REQUIREMENTS T

Usability:T-
SinceTtheTuserTinterfaceTisTattractiveTandTeasyTtoTunderstandTuserTcanTuseTitTeasily.TThisTapplic
ationTcanTbeTusedTbyTusersTtoTachieveTtheirTobjectivesTandTsomeTofTtheTgoalsTwithTefficiency.
Performance:T-
ThisTapplicationTwillTworkTwithTtheTdynamicTdataTprocessing,TSoTtheTuserTneedsTtoThaveTaTgood
T speedTinternetTconnectionTinThis/herTdevice.
UserTinterface:T-
UsersTcanTeasilyTgetTtheTideaTaboutTtheTapplicationTbyTtheTinterfaceTandTtheTuserTwillTgetTtoTknow
T whatTwillThappenTinTtheTnextTphaseTbyTusingTmultipleTtimes.
Reliability:T-
UsersTcanTgetTinformationTaboutTtheTfileTwhichThasTbeenTencryptedTuploadedTinTtheTcloud.TThe
userTcanTgetTtheTmessageTaboutTtheTfileTthatTfileThasTtoTbeTdecryptedTbyTusingTtheTowner’sTpubl
T

icTkeyTandTaggregateTkey.
T 10

CHAPTER-4
TSYSTEM DESIGN T

4.1 SYSTEM PERSPECTIVE


T T

SystemTperspectiveTcouldTbeTaTabstractTmodelTwhichTwillTtellTtheTbehaviorTofTtheTsystem.TItTfol
lowsTgeneralTrulesTtoThandleTtheTobjectsTreferredTtoTasTsystem.Tit'llTshowTtheTinteractionTbetwee
nTsystemTandTelementTrelationship.

FigureT4.1TSystemTPerspectiveTdiagram
T 11

4.2 CONTEXT DIAGRAM


T T

ContextTdiagramsTareTgoingTtoTbeTaccustomedTrepresentTboundariesTbetweenTtheTsystem,TentitiesTa
ndTshowingThoweverTtheyTmoveTwithToneTanotherTwithinTtheTsystem.

User

Owner WebTApplication Cloud


Service
s
DataTAcc
ess

DataTStoring

D
B

FigureT4.2TContextTdiagram

T
T 12

4.3 DATA FLOW DIAGRAM:


T T T

FigureT4.3TDataTflowTchart

.T
T 13

4.4 SYSTEM FLOW CHART:


T T T

FigureT4.4TSystemTflowTchart
T 14

CHAPTER-5 T

DETAILED DESIGN T

5.1 CLASS DIAGRAM


T T

Owner User
Login Login

Register Register

FileTuploadT() RequestT()

FileTencryptT() ReceiveT()

KeyTgenerationT() KeyTcheckedT()

SendT() DownloadT()

Cloud & proxy


T T

Login

FileTrecived()

T FileTreencrypt()

T Replay()

T KeyTsend()

FigureT5.1TClassTDiagram
T 15

5.2 USE CASE DIAGRAM


T T T

RegisterT&TLogin

FileTupload

Encrypt

KeyTGeneration

MasterTKeyT&TprivateTkey T Cloud

T Owner
T

EncryptedTFile

ReTencrypted

FileTrequest T User

Respond
r

KeyTchecked

RecivedTfile

Download

FigureT5.2TUse-caseTdiagram

T
T
T 16

5.3 SEQUENCE DIAGRAM


T

Sequence diagram for Owner:


T T T

Owner WebTApplication

Signup

StatusT

Login

Status

FigureT5.3TSequenceTdiagramTforTowner

Sequence diagram for User:


T T T

User WebTApplication

Signup

StatusT

Login

Status

FigureT5.3TSequenceTdiagramTforTuser
T 17

Sequence diagram for Data Generation:


T T T T

User WebTApplication MySQL

Login

StatusTAcc

essTdata
getDataT()

ViewTData Data

FigureT5.4TsequenceTdiagramTforTDataTGeneration

Sequence diagram for Cloud:


T T T

User WebTApplication Cloud

Login

AccessTData

FileTUploadTStatu

FileTEncrypt

Status
DownloadTfile

FigureT5.5TSequenceTdiagramTforTCloud
T 18

Sequence Diagram:
T

Owner WebTApplication MYSQL Proxy Cloud User

Register Register
Login
Login

FileTUploading

FileTEncrypt
MasterTkeyTandT
privateTkey

ProxyTre-encrypting
File_Request

File_respond

KeyTSend

File_Receive

File_Download
Logout

FigureT5.6TsequenceTDiagram
T 19

5.4 ACTIVITY DIAGRAM T

Start

T LoginT

OwnerT T Cloud User

T FileTupload FileTRecive T FilesTdetail

T FileTencrypt FileTReencrypt FileTrequest

T KeyTgenerate FileTRespond FileTrecive

MasterT&TprivateTkey T KeyTSend KeyTchekced

RequestTRecive
T Decrypt

T FileTdetail
DownloadT

FigureT5.7TActivityTdiagram
T 20

5.5 DATABASE DESIGN


T T

1. ERTDIAGRAM:

FigureT5.8TActivityTdiagram
T 21

2. Table Structure:
T

Users Table:
T

S. No
T Name Type
01 id Integer
02 uname Text
03 email Text
04 password password
05 contact Text
06 Gender Text
07 Dob Integer
08 State Text
09 Country text
10 Role Text
11 Activate Text
12 SecretTkey Integer

TableT5.1
Owners Table:
T

S. No
T Name Type
01 id Integer
02 uname Text
03 email Text
04 password password
05 contact Text
06 Gender Text
07 Dob Integer
08 State Text
09 Country text
10 Role Text
11 Activate Text
12 SecretTkey Integer

TableT5.2
T 22

Request Table
T

S. No
T Name Type
01 id Integer
02 User-name Text
03 Email Text
04 File_name Text
05 Status Text
06 State Text
07 Country Text
08 Secret_key Integer
09 Start_time Number
10 End_time Number
11 Private_key Integer
TableT5.3
Upload Table:
T

S. No
T Name Type
01 id Integer
02 File_name Text
03 Owner_name Text
04 Start_time numeric
05 End_time numeric
06 Secret_key Integer
07 FileTkey Text
08 PublicTkey Integer

TableT5.4
T 23

CHAPTER-6 T

IMPLEMENTATION
6.1 CODING STRATAGIES
T

CreatingTtheTapplicationTinTNetbeansTIDET
StepsTtoTcreateTanTApplication
• StartTNetbeansTIDE
• ClickTonTstartTaTnewTwebTproject

FigureT6.0TCreatingTaTnewTwebTproject
T 24

• T EnterTtheTapplicationTname

FigureT6.1TNameTofTtheTproject

• EnterTtheTJavaTEETversionT
T

FigureT6.2TCompanyTdomainTname
T 25

• ClickTonTfinishTyouTcanTseeTtheTprojectTwindowTinTNetbeansTIDE
T

FigureT6.3TNewTprojectTwindow
T 26

6.2 SCREEN SHOTS


T

FigT6.4TWelcomeT-TScreen

FigT6.5THomeT-TScreen
T 27

FigT6.6TSignupT-TScreen

FigT6.7TDataTOwnerTLoginT-TScreen
T 28

FigT6.8TFileTUploadT-TScreen

FigT6.9TOwnerTandTUserTdetailsT-TScreen
T 29

FigT6.10TUserTLoginT-TScreen

FigT6.11TFileTSearchT–TScreen
T 30

FigT6.12TDownloadTFileT-TScreen

FigT6.13TThirdTPartyTAuthorityTloginT–TScreen
T 31

FigT6.14TResponseTtoTUser-TScreen

FigT6.15TDownloadTViewT-TScreen
T 32

FigT6.16TCloudTLoginT-TScreen

FigT6.17TLoginTActivate-TScreen
T 33

FigT6.18TShareTFileT-TScreen
T 34

CHAPTER-7
TSOFTWARE TESTING T

SoftwareTTestingTwillTplayTaTmajorTroleTinTsoftwareTdevelopment.TThisTisTusedTtoTidentifyTtheT
errorsTinTtheTsystem.TSoftwareTtestingTmakesTdevelopersTrectifyTerrorsTtoTdevelopTaTbetterTappl
ication.

7.1 WHITE BOX TESTING T T

ItTisTaTsoftwareTtestingTmethodTinTwhichTinvolvesTimplementationTofTtheTitemTbeingTtested.TInTt
hisTtesting,TtheTtesterTshouldThaveTminimumTprogrammingTskillsTthatTwillTbeTrequiredTtoTdesignT
testTcasesTandTexecuteTthem.TItTisTusuallyTperformedTbyTdevelopers.

TypesTofTtestingTused:
• UnitTtesting
• IntegrationTtesting
• SystemTtesting

Unit testing
T

• T UnitTtakeTaTlookTaTthingTinvolvesTtheTplanningTofTtestTcasesTthatTvalidateTthatTtheTinnerT
programTlogicTisTfunctioningTproperly,TwhichTprogramTinputsTmanufactureTvalidToutputs
.
• AllTcallTbranchesTandTinternalTcodeTflowToughtTtoTbeTvalid.
Integration testing T

• IntegrationTtestsTareaTunitTdesignedTtoTcheckTintegratedTsoftwareTpackageTelementsTtoTseeTi
fTtheyTreallyTrunTcollectivelyTprogram.
• TestingTisTeventTdrivenTandTisTaTlotTofTinvolvedTwithTtheTessentialToutcomeTofTscreensTorTfie
lds.
System testing T

• SystemTtestingTensuresTthatTtheTwholeTintegratedTsoftwareTpackageTmeetsTnecessities.

• ItTtestsTaTconfigurationTtoTmakeTsureTfamedTandTsureTresults.

• T AnTexampleTofTsystemTcheckingTisTthatTtheTconfiguration-orientedTsystemTintegrationTtest.

• T SystemTtestingTisTpredicatedTonTmethodTdescriptionsTandTflows,TaccentuationTpre-
drivenTmethodTlinksTandTintegrationTpoints.
T 35

7.2 TEST CASES


T

Test TestTDescription TestTInput ExpectedTResult ActualTResult TestTS


case tatus
T ID
1 UserTloginTwillTbe UserTnameTand LoggedTin LoggedTinTsuccessful Pass
checked Password successful
2 ToastTMessageTto WhenTuserTclicks LoginTsuccessful LoginTsuccessful Pass
beTdisplay onTsignTinTbutton
3 Navigation WhenTuserTclicks Navigating Navigating Pass
onTobjects
4 UploadTtheTfileTfrom SelectToneTparticula FileTuploadedTtoTcloud FileTuploadedTtoTcloud Pass
TtheTsystemTtoTcloud rTfile

5 ViewTtheTfileTbyTcli SelectTtheTrowTinT FileTableTtoTaccessTb FileTableTtoTaccessTb Pass


ckingTonTtheTcomm
whichTtheTfileThasT yTowner yTowner
andT
toTview
6 SearchTbarTtoTbe FindTtheTfileTinTthe ShowTtheTmatched ShowTtheTmatched Pass
checked string string
T Cloud

7 SendingTmailTtoTreg ByTclickingTsen MailTsentTtoTregist MailTsentTtoTregi Pass


isteredTemail
dTtheTmailTsentT eredTmail steredTmail

8 DownloadTtheTfile EnterTtheTpublicTke DownloadedTtheTs DownloadedTtheTsele Pass


formTtheTcloud yTandTaggregateTke
electedTfile ctedTfile
yT

TableT7.1TTestTCases
T 36

CHAPTER-8 T

CONCLUSION

• OurTprojectTwillTgiveTtheTsolutionTforTtheTproblemsTtoTtheTconsumersTandTAvoid
T MaximumTloss.
• TheTprojectTwillTbeTavailableTatTaTconvenientTplace.
• TheTpromotionTofTtheTprojectTthroughTadvertisementTwillTcommunicateTaboutTour
T product.TTheTproposedTsolutionTwillTbringTchangesTinTautomation.
T 37

CHAPTER-9 T

FUTURE ENHANCEMENTS
T

IfTweTaddTsomeTfuturesTthatTcanTbeTaddedTorTintegratedTintoTthisTapplicationTtoTmakeTmoreTflex
ible.TSomeTofTtheTfeaturesTareTlistedTbelow.TTheTprojectTwhichTcurrentlyTfunctionsTonlyTonTmo
bileTdevicesTcanTbeTlaterTdevelopedTasTaTwebTapplication.

EaseTofTAdoptionTofTSolution
ConsideringTeconomicsTandTbusinessTmanagementTinTmind,TwhileTsellingTourTproductTweTsho
uldTkeepT4TPTinTmind,Tviz,TProduct,TPlace,TPriceT&TPromotion.TThisTisTanTaugmentedTproductTan
dTasTitTisTanTexistingTidea,TweTcanTgoTforTpriceTpenetrationTratherTthanTpriceTskimmingTi.e.Tiniti
allyTtheTcostTofTtheTproductTwillTbeTveryTlessTandTthenTitTwillTincreaseTasTthereTwillTbeTanTimpro
vementTinTtheTproductTbasedTonTuserTfeedback.TTheTpromotionTofTtheTproductTwillTbeTdoneTthrou
ghTadvertisements.
TheseTfourTPTwillTalsoTsatisfyTtheTfourTCTi.e.TConsumerTproblemTsolution,TConvenience,TCostTto
T consumerTandTCommunication.

WeTcanTjustifyTtheTfourTCTasT:
1. OurTproductTwillTgiveTtheTsolutionTforTtheTproblemsTtoTtheTconsumers.
2. TheTproductTwillTbeTavailableTinTaTconvenientTplace.
3. TheTpriceTwillTbeTwithinTtheTreachTandTbudgetTofTtheTconsumers
4. TheTpromotionTofTtheTproductTthroughTadvertisementTwillTcommunicateTaboutTourTproduct.
T 38

T APPENDIXT-A
BIBLIOGRAPHY
• https://stackoverflow.com
• https://www.tutorialspoint.com
• https://www.tutorialspoint.com
T 39

APPENDIX -B
T T

USER MANUAL
T

Owner Login Page:


T T

EnterTyour
EnterTtheTownerTn TPassword
ame

T
EnterTSecretTk
ey

ClickThereTto
TLogin
T 40

User Login Page


T T

EnterTtheTUserTna
me

ClickThereTto
TLogin
T 41

Signup Page:
T

T
T 42

T TPA Login:
T

EnterTtheTusername

EnterTtheTpassword
T 43

Cloud Login Page:


T T

EnterTtheTusername

EnterTtheTpassword
T 44

Authorize Page:
T
T 45

Key Activation :
T T
T 46
T

Upload Page:
T
T 47

View Uploaded File Details Page:


T T T T
T 48

Search:

EnterTtextThereTtoT
searchTtheTitem
T 49

Download Page:
T

EnterTPublicTkey

EnterTAggregateTKey
T 50

T Response to User
T T
T 51

T View download Page:


T T
T 52

T File Share Page


T T

Вам также может понравиться