Professional Documents
Culture Documents
1. INTRODUCTION
AMRN-HM Page 1
SECURE AUDITING AND DEDUPLICATION OF DATA IN CLOUD
them. This shared IT infrastructure contains large pools of systems that are linked together.
Often, virtualization techniques are used to maximize the power of cloud computing.
Characteristics and Services Models:
The salient characteristics of cloud computing based on the definitions provided by the
National Institute of Standards and Terminology (NIST) are outlined below.
Broad network access:Capabilities are available over the network and accessed through
standard mechanisms that promote use by heterogeneous thin or thick client platforms (e.g.,
mobile phones, laptops, and PDAs).
Resource pooling: The providers computing resources are pooled to serve multiple
consumers using a multi-tenant model, with different physical and virtual resources dynamically
assigned and reassigned according to consumer demand. There is a sense of location-
independence in that the customer generally has no control or knowledge over the exact location
of the provided resources but may be able to specify location at a higher level of abstraction (e.g.,
country, state, or data center). Examples of resources include storage, processing, memory,
network bandwidth, and virtual machines.
Rapid elasticity: Capabilities can be rapidly and elastically provisioned, in some cases
automatically, to quickly scale out and rapidly released to quickly scale in. To the consumer, the
capabilities available for provisioning often appear to be unlimited and can be purchased in any
quantity at any time.
Measured service: Cloud systems automatically control and optimize resource use by
leveraging a metering capability at some level of abstraction appropriate to the type of service
(e.g., storage, processing, bandwidth, and active user accounts). Resource usage can be managed,
controlled, and reported providing transparency for both the provider and consumer of the
utilized service.
AMRN-HM Page 2
SECURE AUDITING AND DEDUPLICATION OF DATA IN CLOUD
Fi
g:1.2Characteristics of cloud computing
Services Models:
AMRN-HM Page 3
SECURE AUDITING AND DEDUPLICATION OF DATA IN CLOUD
Increase volume output or productivity with fewer people. Your cost per unit, project or
product plummets.
Maintain easy access to your information with minimal upfront spending. Pay as you go
(weekly, quarterly or yearly), based on demand.
People worldwide can access the cloud, provided they have an Internet connection.
4. Streamline processes-
AMRN-HM Page 4
SECURE AUDITING AND DEDUPLICATION OF DATA IN CLOUD
6. Improve accessibility-
You have access anytime, anywhere, making your life so much easier!
It takes fewer people to do more work on a cloud, with a minimal learning curve on
hardware and software issues.
Stretch and grow without the need to buy expensive software licenses or programs.
10.Improve flexibility-
You can change direction without serious people or financial issues at stake.
Advantages:
AMRN-HM Page 5
SECURE AUDITING AND DEDUPLICATION OF DATA IN CLOUD
6. Control:Able to login from any location. Server snapshot and a software library lets
you deploy custom instances.
7. Traffic:Deals with spike in traffic with quick deployment of additional instances to
handle the load.
2. LITERATURE SURVEY
AMRN-HM Page 6
SECURE AUDITING AND DEDUPLICATION OF DATA IN CLOUD
Cloud computing, the long-held dream of computing as a utility, has the potential
to transform a large part of the IT industry, making software even more attractive as a
service and shaping the way IT hardware is designed and purchased. Developers with
innovative ideas for new Internet services no longer require the large capital outlays in
hardware to deploy their service or the human expense to operate it. They need not be
concerned about overprovisioning for a service whose popularity does not meet their
predictions, thus wasting costly resources, or under provisioning for one that becomes
wildly popular, thus missing potential customers and revenue. Moreover, companies with
large batch-oriented tasks can get results as quickly as their programs can scale, since
using 1,000 servers for one hour costs no more than using one server for 1,000 hours.
This elasticity of resources, without paying a premium for large scale, is unprecedented in
the history of IT.
Data integrity and storage efficiency are two important requirements for cloud
storage. Proof of Retrievability (POR) and Proof of Data Possession (PDP) techniques
assure data integrity for cloud storage. Proof of Ownership (POW) improves storage
efficiency by securely removing unnecessarily duplicated data on the storage server.
However, trivial combination of the two techniques, in order to achieve both data
integrity and storage efficiency, results in non-trivial duplication of metadata (i.e.,
authentication tags), which contradicts the objectives of POW. Recent attempts to this
problem introduce tremendous computational and communication costs and have also
been proven not secure. It calls for a new solution to support efficient and secure data
integrity auditing with storage deduplication for cloud storage. In this paper we solve this
open problem with a novel scheme based on techniques including polynomial-based
authentication tags and homomorphic linear authenticators. Our design allows
deduplication of both files and their corresponding authentication tags. Data integrity
auditing and storage deduplication are achieved simultaneously. Our proposed scheme is
AMRN-HM Page 7
SECURE AUDITING AND DEDUPLICATION OF DATA IN CLOUD
More specifically, an attacker who knows the hash signature of a file can convince
the storage service that it owns that file, hence the server lets the attacker download the
entire file. (In parallel to our work, a subset of these attacks were recently introduced in
the wild with respect to the Dropbox file synchronization service.) To overcome such
attacks, we introduce the notion of proofs-ofownership (PoWs), which lets a client
efficiently prove to a server that that the client holds a file, rather than just some short
information about it.
AMRN-HM Page 8
SECURE AUDITING AND DEDUPLICATION OF DATA IN CLOUD
measurements indicate that the scheme incurs only a small overhead compared
to naive client-side deduplication.
4) Dupless: Server aided encryption for deduplicated storage
Cloud storage service providers such as Dropbox, Mozy, and others perform
deduplication to save space by only storing one copy of each file uploaded. Should
clients conventionally encrypt their files, however, savings are lost. Message-locked
encryption (the most prominent manifestation of which is convergent encryption)
resolves this tension. However it is inherently subject to brute-force attacks that can
recover files falling into a known set. We propose an architecture that provides secure
deduplicated storage resisting brute-force attacks, and realize it in a system called
DupLESS. In DupLESS, clients encrypt under message-based keys obtained from a key-
server via an oblivious PRF protocol. It enables clients to store encrypted data with an
existing service, have the service perform deduplication on their behalf, and yet achieves
strong confidentiality guarantees. We show that encryption for deduplicated storage can
achieve performance and space savings close to that of using the storage service with
plaintext data.
We introduce a model for provable data possession (PDP) that allows a client that
has stored data at an untrusted server to verify that the server possesses the original data
without retrieving it. The model generates probabilistic proofs of possession by sampling
random sets of blocks from the server, which drastically reduces I/O costs. The client
maintains a constant amount of metadata to verify the proof. The challenge/response
protocol transmits a small, constant amount of data, which minimizes network
communication. Thus, the PDP model for remote data checking supports large data sets in
widely-distributed storage system.
We present two provably-secure PDP schemes that are more efficient than
previous solutions, even when compared with schemes that achieve weaker guarantees.
AMRN-HM Page 9
SECURE AUDITING AND DEDUPLICATION OF DATA IN CLOUD
In particular, the overhead at the server is low (or even constant), as opposed to linear in
the size of the data. Experiments using our implementation verify the practicality of PDP
and reveal that the performance of PDP is bounded by disk I/O and not by cryptographic
computation.
AMRN-HM Page 10
SECURE AUDITING AND DEDUPLICATION OF DATA IN CLOUD
3.SYSTEM ANALYSIS
EXISTING SYSTEM:
Ateniese et al. proposed a dynamic PDP schema but without insertion operation.
Erway et al. improved Ateniese et al.s work and supported insertion by introducing
authenticated flip table.
Wang etal.proposed proxy PDP in public clouds.
Zhu et al. proposed the cooperative PDP in multi-cloud storage.
Wang et al. improved the POR model by manipulating the classic Merkle hash tree
construction for block tag authentication.
Xu and Chang proposed to improve the POR schema with polynomial commitment
for reducing communication cost.
Stefanov et al. proposed a POR protocol over authenticated file system subject to
frequent changes.
Azraoui et al. combined the privacy-preserving word search algorithm with the
insertion in data segments of randomly generated short bit sequences, and developed
a new POR protocol.
Li et al. considered a new cloud storage architecture with two independent cloud
servers for integrity auditing to reduce the computation load at client side.
AMRN-HM Page 11
SECURE AUDITING AND DEDUPLICATION OF DATA IN CLOUD
exact same file, which could be sensitive sometimes. These attacks originate from the
reason that the proof that the client owns a given file (or block of data) is solely based
on a static, short value (in most cases the hash of the file).
PROPOSED SYSTEM:
In this paper, aiming at achieving data integrity and deduplication in cloud, we
propose two secure systems namely SecCloud and SecCloud+.
SecCloud introduces an auditing entity with maintenance of a MapReduce cloud,
which helps clients generate data tags before uploading as well as audit the integrity
of data having been stored in cloud.
Besides supporting integrity auditing and secure deduplication, SecCloud+ enables
the guarantee of file confidentiality.
We propose a method of directly auditing integrity on encrypted data.
MODULES:-
Cloud Servers
Data Users Module
Auditor
AMRN-HM Page 12
SECURE AUDITING AND DEDUPLICATION OF DATA IN CLOUD
Auditor:
Auditor which helps clients upload and audit their outsourced data maintains a MapReduce cloud
and acts like a certificate authority. This assumption presumes that the auditor is associated with
a pair of public and private keys. Its public key is made available to the other entities in the
system.The first design goal of this work is to provide the capability of verifying correctness of
the remotely stored data. public verification, which allows anyone, not just the clients originally
stored the file, to perform verification.
AMRN-HM Page 13
SECURE AUDITING AND DEDUPLICATION OF DATA IN CLOUD
SYSTEM ARCHITECTURE:
4.SYSTEM DESIGN
AMRN-HM Page 14
SECURE AUDITING AND DEDUPLICATION OF DATA IN CLOUD
1. The DFD is also called as bubble chart. It is a simple graphical formalism that can be
used to represent a system in terms of input data to the system, various processing carried
out on this data, and the output data is generated by this system.
2. The data flow diagram (DFD) is one of the most important modeling tools. It is used to
model the system components. These components are the system process, the data used
by the process, an external entity that interacts with the system and the information flows
in the system.
3. DFD shows how the information moves through the system and how it is modified by a
series of transformations. It is a graphical technique that depicts information flow and the
transformations that are applied as data moves from input to output.
4. DFD is also known as bubble chart. A DFD may be used to represent a system at any
level of abstraction. DFD may be partitioned into levels that represent increasing
information flow and functional detail.
AMRN-HM Page 15
SECURE AUDITING AND DEDUPLICATION OF DATA IN CLOUD
Cloud
User Owner
Account Activation
Register
Yes
Login
Accept
File Token
Ignore Download
Encrpyted
Accept
Public & private
keycheck Upload to cloud
Ignore
Cloud Database
End
AMRN-HM Page 16
SECURE AUDITING AND DEDUPLICATION OF DATA IN CLOUD
UML DIAGRAMS
GOALS:
The Primary goals in the design of the UML are as follows:
1. Provide users a ready-to-use, expressive visual modeling Language so that they can
develop and exchange meaningful models.
2. Provide extendibility and specialization mechanisms to extend the core concepts.
3. Be independent of particular programming languages and development process.
4. Provide a formal basis for understanding the modeling language.
5. Encourage the growth of OO tools market.
6. Support higher level development concepts such as collaborations, frameworks, patterns
and components.
7. Integrate best practices.
AMRN-HM Page 17
SECURE AUDITING AND DEDUPLICATION OF DATA IN CLOUD
A use case diagram in the Unified Modeling Language (UML) is a type of behavioral
diagram defined by and created from a Use-case analysis. Its purpose is to present a graphical
overview of the functionality provided by a system in terms of actors, their goals (represented as
use cases), and any dependencies between those use cases. The main purpose of a use case
diagram is to show what system functions are performed for which actor. Roles of the actors in
the system can be depicted.
Register
Account Activation
Login
Token Request
Cloud
Accept Request
Previlege Token
User
Log details
Encrypt
Logout
AMRN-HM Page 18
SECURE AUDITING AND DEDUPLICATION OF DATA IN CLOUD
CLASS DIAGRAM:
Cloud
Request details
Response details
View User Details
Store Files
User
Account Activation()
File Request Provide Rights()
Token Request
File Upload/Download
Auditor
Request()
Check for Depulication
Upload files to cloud
Log Details
Encrypt()
Upload()
AMRN-HM Page 19
SECURE AUDITING AND DEDUPLICATION OF DATA IN CLOUD
SEQUENCE DIAGRAM:
Cloud
User
Auditor
upload request
Duplicate check
Deduplication
File Upload
User Rquest
Create Account
Token Request
Provide Token
Database
AMRN-HM Page 20
SECURE AUDITING AND DEDUPLICATION OF DATA IN CLOUD
ACTIVITY DIAGRAM:
User
Register
NO
Login
Cloud Auditor
User Update
Accept
View Details
File Upload/Download
AMRN-HM Page 21
SECURE AUDITING AND DEDUPLICATION OF DATA IN CLOUD
5. IMPLEMENTATION
5.1.SYSTEMREQIERMENTS:
HARDWARE REQUIERMENTS:
SOFTWARE REQUIREMENTS:
Architecture neutral
Object oriented
AMRN-HM Page 22
SECURE AUDITING AND DEDUPLICATION OF DATA IN CLOUD
Portable
Distributed
High performance
Interpreted
Multithreaded
Robust
Dynamic
Secure
With most programming languages, you either compile or interpret a program so that you
can run it on your computer. The Java programming language is unusual in that a program is
both compiled and interpreted. With the compiler, first you translate a program into an
intermediate language called Java byte codes the platform-independent codes interpreted by
the interpreter on the Java platform. The interpreter parses and runs each Java byte code
instruction on the computer. Compilation happens just once; interpretation occurs each time the
program is executed. The following figure illustrates how this works.
AMRN-HM Page 23
SECURE AUDITING AND DEDUPLICATION OF DATA IN CLOUD
AMRN-HM Page 24
SECURE AUDITING AND DEDUPLICATION OF DATA IN CLOUD
Native code is code that after you compile it, the compiled code runs on a specific
hardware platform. As a platform-independent environment, the Java platform can be a bit
slower than native code. However, smart compilers, well-tuned interpreters, and just-in-time byte
code compilers can bring performance close to that of native code without threatening
portability.
AMRN-HM Page 25
SECURE AUDITING AND DEDUPLICATION OF DATA IN CLOUD
AMRN-HM Page 26
SECURE AUDITING AND DEDUPLICATION OF DATA IN CLOUD
AMRN-HM Page 27
SECURE AUDITING AND DEDUPLICATION OF DATA IN CLOUD
language. Maybe not, but the compiler (or ODBC) gives you the opportunity to write cleaner
programs, which means you finish sooner. Meanwhile, computers get faster every year.
JDBC
In an effort to set an independent database standard API for Java; Sun Microsystems
developed Java Database Connectivity, or JDBC. JDBC offers a generic SQL database access
mechanism that provides a consistent interface to a variety of RDBMSs. This consistent interface
is achieved through the use of plug-in database connectivity modules, or drivers. If a database
vendor wishes to have JDBC support, he or she must provide the driver for each platform that the
database and Java run on.
To gain a wider acceptance of JDBC, Sun based JDBCs framework on ODBC. As you
discovered earlier in this chapter, ODBC has widespread support on a variety of platforms.
Basing JDBC on ODBC will allow vendors to bring JDBC drivers to market much faster than
developing a completely new connectivity solution.
JDBC was announced in March of 1996. It was released for a 90 day public review that
ended June 8, 1996. Because of user input, the final JDBC v1.0 specification was released soon
after.
The remainder of this section will cover enough information about JDBC for you to know what it
is about and how to use it effectively. This is by no means a complete overview of JDBC. That
would fill an entire book.
JDBC Goals
Few software packages are designed without goals in mind. JDBC is one that, because
ofits many goals, drove the development of the API. These goals, in conjunction with early
reviewer feedback, have finalized the JDBC class library into a solid framework for building
database applications in Java.
The goals that were set for JDBC are important. They will give you some insight as to why
certain classes and functionalities behave the way they do. The eight design goals for JDBC are
as follows:
1. SQL Level API
The designers felt that their main goal was to define a SQL interface for Java. Although not
the lowest database interface level possible, it is at a low enough level for higher-level tools
and APIs to be created. Conversely, it is at a high enough level for application programmers
AMRN-HM Page 28
SECURE AUDITING AND DEDUPLICATION OF DATA IN CLOUD
to use it confidently. Attaining this goal allows for future tool vendors to generate JDBC
code and to hide many of JDBCs complexities from the end user.
2. SQL Conformance
SQL syntax varies as you move from database vendor to database vendor. In an effort to
support a wide variety of vendors, JDBC will allow any query statement to be passed through
it to the underlying database driver. This allows the connectivity module to handle non-
standard functionality in a manner that is suitable for its users.
3. JDBC must be implemental on top of common database interfaces
The JDBC SQL API must sit on top of other common SQL level APIs. This goal allows
JDBC to use existing ODBC level drivers by the use of a software interface. This interface
would translate JDBC calls to ODBC and vice versa.
4. Provide a Java interface that is consistent with the rest of the Java system
Because of Javas acceptance in the user community thus far, the designers feel that they
should not stray from the current design of the core Java system.
5. Keep it simple
This goal probably appears in all software design goal listings. JDBC is no exception.
Sun felt that the design of JDBC should be very simple, allowing for only one method of
completing a task per mechanism. Allowing duplicate functionality only serves to confuse
the users of the API.
6. Use strong, static typing wherever possible
Strong typing allows for more error checking to be done at compile time; also, less error
appear at runtime.
7. Keep the common cases simple
Because more often than not, the usual SQL calls used by the programmer are simple
SELECTs, INSERTs, DELETEs and UPDATEs, these queries should be simple to
perform with JDBC. However, more complex SQL statements should also be possible.
Finally we decided to proceed the implementation using Java Networking.
And for dynamically updating the cache table we go for MS Access database.
AMRN-HM Page 29
SECURE AUDITING AND DEDUPLICATION OF DATA IN CLOUD
Simple Architecture-neutral
Object-oriented Portable
Distributed High-performance
Interpreted multithreaded
Robust Dynamic
Secure
Java is also unusual in that each Java program is both compiled and interpreted.
With a compile you translate a Java program into an intermediate language called Java
byte codes the platform-independent code instruction is passed and run on the
computer.
Compilation happens just once; interpretation occurs each time the program is
executed. The figure illustrates how this works.
Interpreter
JavaProgram
Compilers My Program
AMRN-HM Page 30
SECURE AUDITING AND DEDUPLICATION OF DATA IN CLOUD
Java byte codes help make write once, run anywhere possible. You can compile
your Java program into byte codes on my platform that has a Java compiler. The byte
codes can then be run any implementation of the Java VM. For example, the same
Java program can run Windows NT, Solaris, and Macintosh.
Networking
TCP/IP stack
The TCP/IP stack is shorter than the OSI one:
IP datagrams
The IP layer provides a connectionless and unreliable delivery system. It considers
each datagram independently of the others. Any association between datagram must be
supplied by the higher layers. The IP layer supplies a checksum that includes its own
header. The header includes the source and destination addresses. The IP layer handles
routing through an Internet. It is also responsible for breaking up large datagram into
smaller ones for transmission and reassembling them at the other end.
UDP
UDP is also connectionless and unreliable. What it adds to IP is a checksum for the
contents of the datagram and port numbers. These are used to give a client/server model
- see later.TCP
AMRN-HM Page 31
SECURE AUDITING AND DEDUPLICATION OF DATA IN CLOUD
Internet addresses
In order to use a service, you must be able to find it. The Internet uses an address
scheme for machines so that they can be located. The address is a 32 bit integer which
gives the IP address. This encodes a network ID and more addressing. The network ID
falls into various classes according to the size of the network address.
Network address
Class A uses 8 bits for the network address with 24 bits left over for other
addressing. Class B uses 16 bit network addressing. Class C uses 24 bit network
addressing and class D uses all 32.
Subnet address
Internally, the UNIX network is divided into sub networks. Building 11 is currently
on one sub network and uses 10-bit addressing, allowing 1024 different hosts.
Host address
8 bits are finally used for host addresses within our subnet. This places a limit of
256 machines that can be on the subnet.
Total address
AMRN-HM Page 32
SECURE AUDITING AND DEDUPLICATION OF DATA IN CLOUD
Sockets
A socket is a data structure maintained by the system to handle network
connections. A socket is created using the call socket. It returns an integer that is like a
file descriptor. In fact, under Windows, this handle can be used with Read File and
Write File functions.
#include <sys/types.h>
#include <sys/socket.h>
int socket(int family, int type, int protocol);
Here "family" will be AF_INET for IP communications, protocol will be zero, and
type will depend on whether TCP or UDP is used. Two processes wishing to
communicate over a network create a socket each. These are similar to two ends of a
pipe - but the actual pipe does not yet exist.
JFree Chart
JFreeChart is a free 100% Java chart library that makes it easy for developers to
display professional quality charts in their applications. JFreeChart's extensive feature set
includes:
A consistent and well-documented API, supporting a wide range of chart types;
A flexible design that is easy to extend, and targets both server-side and client-
side applications;
Support for many output types, including Swing components, image files
(including PNG and JPEG), and vector graphics file formats (including PDF, EPS and
SVG);
JFreeChart is "open source" or, more specifically, free software. It is distributed
under the terms of the GNU Lesser General Public Licence (LGPL), which permits use in
proprietary applications.
1. Map Visualizations
Charts showing values that relate to geographical areas. Some examples include:
(a) population density in each state of the United States, (b) income per capita for each
country in Europe, (c) life expectancy in each country of the world. The tasks in this
project include:
AMRN-HM Page 33
SECURE AUDITING AND DEDUPLICATION OF DATA IN CLOUD
Sourcing freely redistributable vector outlines for the countries of the world,
states/provinces in particular countries (USA in particular, but also other areas);
Creating an appropriate dataset interface (plus default implementation), a
rendered, and integrating this with the existing XYPlot class in JFreeChart;
Testing, documenting, testing some more, documenting some more.
Implement a new (to JFreeChart) feature for interactive time series charts --- to display a
separate control that shows a small version of ALL the time series data, with a sliding "view"
rectangle that allows you to select the subset of the time series data to display in the main
chart.
3. Dashboards
The property editor mechanism in JFreeChart only handles a small subset of the properties
that can be set for charts. Extend (or reimplement) this mechanism to provide greater end-
user control over the appearance of the charts.
AMRN-HM Page 34
SECURE AUDITING AND DEDUPLICATION OF DATA IN CLOUD
5.3 CODING
Admin:
<!DOCTYPE HTML>
<html>
<head>
<title>Secure Auditing</title>
<meta name="description" content="website description" />
<meta name="keywords" content="website keywords, website keywords" />
<meta http-equiv="content-type" content="text/html; charset=UTF-8" />
<link rel="shortcut icon" type="image/x-icon"href="images/brainstorming_alternative.png"/>
<link rel="stylesheet" type="text/css"href="css/style.css" />
<!--modernizr enables HTML5 elements and feature detects -->
<script type="text/javascript"src="js/modernizr-1.5.min.js"></script>
<style>
#id{
width: 200px;
height: 25px;
background-color: #D3F2F7;
}
#but{
width: 60px;
height: 25px;
}
</style>
<script>
function validation() {
varuname = document.ulogin.username.value;
var pass = document.ulogin.password.value;
if (uname == 0) {
alert("Enter ADMIN ID");
AMRN-HM Page 35
SECURE AUDITING AND DEDUPLICATION OF DATA IN CLOUD
document.ulogin.username.focus();
return false;
}
if (pass == 0) {
alert("Enter password");
document.ulogin.password.focus();
return false;
}
}
</script>
</head>
<body>
<div id="main">
<header>
<div id="logo">
<div id="logo_text">
<!-- class="logo_colour", allows you to change the colour of the text -->
<pre><h1><a href="#"> Secure Auditing and De-duplicating Data in Cloud</a></h1></pre>
</div>
</div>
<nav>
<ul class="sf-menu" id="nav">
<li><a href="index.html">Home</a></li>
<li class="selected"><a href="admin.jsp">Auditor</a></li>
<li><a href="p_cloud.jsp">Cloud Server</a></li>
<li><a href="#">User</a>
<ul>
<li><a href="user.jsp">Login</a></li>
<li><a href="register.jsp">Register</a></li>
</ul>
AMRN-HM Page 36
SECURE AUDITING AND DEDUPLICATION OF DATA IN CLOUD
</li>
<li><a href="">Contact Us</a></li>
</ul>
</nav>
</header>
<div id="site_content">
<div id="sidebar_container">
<div class="gallery">
<ul class="images">
<li class="show"><img width="450" height="450"src="images/model.png" alt="photo_one"
/></li>
<li><img width="450" height="450"src="images/c2.jpg" alt="photo_two" /></li>
<li><img width="450" height="450"src="images/c3.jpg" alt="photo_three" /></li>
<li><img width="450" height="450"src="images/c4.jpg" alt="photo_four" /></li>
<li><img width="450" height="450"src="images/c5.jpg" alt="photo_five" /></li>
</ul>
</div>
</div>
<div id="content">
<fieldset style="background-color: lightblue;border-radius: 9px;height: 350px;margin-top:
40px;background-image: url('images/audit.jpg')">
<center>
<h1 style="font: monospace;font-size: 35px;font-weight: bold;color: darkslateblue">Auditor
Login</h1><br>
<form action="admin_login" name="ulogin" method="post"onsubmit="return validation()">
<!-- USERNAME:<br>-->
<input type="text" id="id" name="username" placeholder="Enter Auditor ID"/><br></br><br>
<!-- PASSWORD:<br>-->
<input type="password" id="id"name="password" placeholder="Enter
password"/><br></br><br>
AMRN-HM Page 37
SECURE AUDITING AND DEDUPLICATION OF DATA IN CLOUD
<!DOCTYPE HTML>
<html>
AMRN-HM Page 38
SECURE AUDITING AND DEDUPLICATION OF DATA IN CLOUD
<head>
<title>Secure Auditing</title>
<meta name="description" content="website description" />
<meta name="keywords" content="website keywords, website keywords" />
<meta http-equiv="content-type" content="text/html; charset=UTF-8" />
<link rel="shortcut icon" type="image/x-icon"href="images/brainstorming_alternative.png"/>
<link rel="stylesheet" type="text/css"href="css/style.css" />
<!--modernizr enables HTML5 elements and feature detects -->
<script type="text/javascript"src="js/modernizr-1.5.min.js"></script>
<script>
function validation(){
varuname=document.ulogin.username.value;
var pass=document.ulogin.password.value;
if(uname==0){
alert("Enter username");
document.ulogin.username.focus();
return false;
}
if(pass==0){
alert("Enter password");
document.ulogin.password.focus();
return false;
}
}
</script>
<style>
#id{
width: 200px;
height: 25px;
AMRN-HM Page 39
SECURE AUDITING AND DEDUPLICATION OF DATA IN CLOUD
background-color: #D5D5D5;
}
#but{
width: 60px;
height: 25px;
}
</style>
</head>
<body>
<%
if(request.getParameter("status")!=null){
out.println("<script>alert('Registered')</script>");
}
%>
<div id="main">
<header>
<div id="logo">
<div id="logo_text">
<!-- class="logo_colour", allows you to change the colour of the text -->
<<pre><h1><a href="#"> Secure Auditing and De-duplicating Data in Cloud</a></h1></pre>
</div>
</div>
<nav>
<ul class="sf-menu" id="nav">
<li><a href="index.html">Home</a></li>
<li><a href="admin.jsp">Auditor</a></li>
<li><a href="p_cloud.jsp">Cloud Server</a></li>
AMRN-HM Page 40
SECURE AUDITING AND DEDUPLICATION OF DATA IN CLOUD
<ul>
<li class="selected"><a href="user.jsp">Login</a></li>
<li><a href="register.jsp">Register</a></li>
</ul>
</li>
</ul>
</nav>
</header>
<div id="site_content">
<div id="sidebar_container">
<div class="gallery">
<ul class="images">
<li class="show"><img width="450" height="450"src="images/c1.jpg" alt="photo_one" /></li>
<li><img width="450" height="450"src="images/c2.jpg" alt="photo_two" /></li>
<li><img width="450" height="450"src="images/c3.jpg" alt="photo_three" /></li>
<li><img width="450" height="450"src="images/c4.jpg" alt="photo_four" /></li>
<li><img width="450" height="450"src="images/c5.jpg" alt="photo_five" /></li>
</ul>
</div>
</div>
<div id="content">
<fieldset style="background-color: lightblue;border-radius: 9px;height: 430px;margin-top:
10px;background-image: url('images/user.jpg')">
<center>
<h1 style="font: monospace;font-size: 35px;font-weight: bold;color: darkslateblue">Cloud User
Login</h1><br>
<form action="user_login" name="ulogin" method="post"onsubmit="return validation()">
<!-- USERNAME:<br>-->
<input type="text" id="id" name="username" placeholder="Enter username"/><br></br><br>
<!-- PASSWORD:<br>-->
AMRN-HM Page 41
SECURE AUDITING AND DEDUPLICATION OF DATA IN CLOUD
</form>
</center>
</fieldset>
</div>
</div>
<footer>
<p>Copyright © Jpinfotech. All Rights Reserved.</p>
</footer>
</div>
<p> </p>
<!--javascript at the bottom for fast page loading -->
<script type="text/javascript"src="js/jquery.js"></script>
<script type="text/javascript"src="js/jquery.easing-sooper.js"></script>
<script type="text/javascript"src="js/jquery.sooperfish.js"></script>
<script type="text/javascript"src="js/image_fade.js"></script>
<script type="text/javascript">
$(document).ready(function() {
$('ul.sf-menu').sooperfish();
});
</script>
AMRN-HM Page 42
SECURE AUDITING AND DEDUPLICATION OF DATA IN CLOUD
</body>
</html>
Register:
<!DOCTYPE HTML>
<html>
<head>
<title>Secure Auditing</title>
<meta name="description" content="website description" />
<meta name="keywords" content="website keywords, website keywords" />
<meta http-equiv="content-type" content="text/html; charset=UTF-8" />
<link rel="shortcut icon" type="image/x-icon"href="images/brainstorming_alternative.png"/>
<link rel="stylesheet" type="text/css"href="css/style.css" />
<!--modernizr enables HTML5 elements and feature detects -->
<script type="text/javascript"src="js/modernizr-1.5.min.js"></script>
<script>
function validation(){
varuname=document.ureg.username.value;
var pass=document.ureg.password.value;
varcpass=document.ureg.cpassword.value;
var mail=document.ureg.mail.value;
var name=document.ureg.name.value;
varph=document.ureg.mobile.value;
if(name==0){
alert("Enter name");
document.ureg.name.focus();
return false;
}
if(uname==0){
AMRN-HM Page 43
SECURE AUDITING AND DEDUPLICATION OF DATA IN CLOUD
alert("Enter username");
document.ureg.username.focus();
return false;
}
if(pass==0){
alert("Enter password");
document.ureg.password.focus();
return false;
}
if(cpass!=pass){
alert("Incorrect password");
document.ureg.cpassword.focus();
return false;
}
if(mail==0){
alert("Enter mailid");
document.ureg.mail.focus();
return false;
}
if(ph==0){
alert("Enter your mobile no");
document.ureg.mobile.focus();
return false;
}
if(isNaN(ph)){
alert("Invalid phoneno");
document.ureg.mobile.focus();
return false;
}
}
</script>
AMRN-HM Page 44
SECURE AUDITING AND DEDUPLICATION OF DATA IN CLOUD
<style>
input{
width: 200px;
height: 25px;
background-color: #D5D5D5;
}
#but{
width: 75px;
height: 25px;
}
</style>
</head>
<body>
<div id="main">
<header>
<div id="logo">
<div id="logo_text">
<!-- class="logo_colour", allows you to change the colour of the text -->
<pre><h1><a href="#"> Secure Auditing and De-duplicating Data in Cloud</a></h1></pre>
</div>
</div>
<nav>
<ul class="sf-menu" id="nav">
<li><a href="index.html">Home</a></li>
<li><a href="admin.jsp">Auditor</a></li>
<li><a href="p_cloud.jsp">Cloud Server</a></li>
<li class="selected"><a href="#">User</a>
<ul>
<li><a href="user.jsp">Login</a></li>
<li class="selected"><a href="register.jsp">Register</a></li>
</ul>
AMRN-HM Page 45
SECURE AUDITING AND DEDUPLICATION OF DATA IN CLOUD
</li>
</ul>
</nav>
</header>
<div id="site_content">
<div id="sidebar_container">
<div class="gallery">
<ul class="images">
<li class="show"><img width="450" height="450"src="images/c1.jpg" alt="photo_one" /></li>
<li><img width="450" height="450"src="images/c2.jpg" alt="photo_two" /></li>
<li><img width="450" height="450"src="images/c3.jpg" alt="photo_three" /></li>
<li><img width="450" height="450"src="images/c4.jpg" alt="photo_four" /></li>
<li><img width="450" height="450"src="images/c5.jpg" alt="photo_five" /></li>
</ul>
</div>
</div>
<div id="content">
<fieldset style="background-color: lightblue;border-radius: 9px;height: 460px;margin-top:
00px;background-image: url('images/user.jpg')">
<center>
<h1 style="font: monospace;font-size: 26px;font-weight: bold;color:
darkslateblue">Registration</h1>
</center>
AMRN-HM Page 46
SECURE AUDITING AND DEDUPLICATION OF DATA IN CLOUD
</form>
</fieldset>
</div>
</div>
<footer>
AMRN-HM Page 47
SECURE AUDITING AND DEDUPLICATION OF DATA IN CLOUD
AMRN-HM Page 48
SECURE AUDITING AND DEDUPLICATION OF DATA IN CLOUD
Deactivate:
<%@page import="java.sql.Statement"%>
<%@page import="java.sql.Connection"%>
<%@page import="pack.Dbconnection"%>
<%
AMRN-HM Page 49
SECURE AUDITING AND DEDUPLICATION OF DATA IN CLOUD
try {
String uname=request.getQueryString();
Token verify:
<%@page import="pack.MailSender"%>
<%@page import="java.util.ArrayList"%>
<%@page import="java.sql.ResultSet"%>
<%@page import="java.sql.Connection"%>
<%@page import="java.sql.Statement"%>
<%@page import="pack.Dbconnection"%>
<%
String token=request.getParameter("token");
HttpSession user=request.getSession();
String uname=user.getAttribute("username").toString();
System.out.println("token "+token);
AMRN-HM Page 50
SECURE AUDITING AND DEDUPLICATION OF DATA IN CLOUD
System.out.println("uname"+uname);
try{
int count =0;
Connection con=Dbconnection.getConn();
Statement st=con.createStatement();
Statement st1=con.createStatement();
String mail = null;
ResultSetrt=st.executeQuery("select *from user_reg where token_='"+token+"' and
username='"+uname+"'");
if(rt.next()){
//count=rt.getInt("count_");
mail = rt.getString("mail");
inti = st1.executeUpdate("update user_reg set count_='0' where username='"+uname+"'");
if(i!=0){
response.sendRedirect("user_page1.jsp");
}
}else{
count++;
st1.executeUpdate("update user_reg set count_='"+count+"' where username='"+uname+"'");
if(count>2){
newMailSender().sendMail(mail, "Account","Your Account blocked due to given token is
invalid " );
st1.executeUpdate("update user_reg set activate='no' where username='"+uname+"'");
out.println("Your Account blocked due to given token is invalid ");
}else{
out.println("invalid token id...");
}
}
}catch(Exception ex){
ex.printStackTrace();
}
AMRN-HM Page 51
SECURE AUDITING AND DEDUPLICATION OF DATA IN CLOUD
%>
Update:
<%@page import="java.sql.ResultSet"%>
<%@page import="java.sql.Statement"%>
<%@page import="java.sql.Connection"%>
<%@page import="pack.Dbconnection"%>
<!DOCTYPE HTML>
<html>
<head>
<title>Secure Auditing</title>
<meta name="description" content="website description" />
<meta name="keywords" content="website keywords, website keywords" />
<meta http-equiv="content-type" content="text/html; charset=UTF-8" />
<link rel="shortcut icon" type="image/x-icon"href="images/brainstorming_alternative.png"/>
<link rel="stylesheet" type="text/css"href="css/style.css" />
<!--modernizr enables HTML5 elements and feature detects -->
<script type="text/javascript"src="js/modernizr-1.5.min.js"></script>
<script>
function validation(){
if(document.name.token.value==0){
alert('Enter your token');
document.name.token.focus();
return false;
}
}
</script>
<style>
h1{
position: relative;
left: 0px;
AMRN-HM Page 52
SECURE AUDITING AND DEDUPLICATION OF DATA IN CLOUD
}
form{
position: relative;
left: 350px;
}
#id{
width: 200px;
height: 25px;
background-color: #D5D5D5;
}
#but{
width: 60px;
height: 25px;
}
</style>
<style>
table,td,tr{
border-collapse: collapse;
border-style: solid;
}
table{
position: relative;
left: 100px;
width: 680px;
}
td{
text-align: center;
}
tr{
background-color: #D9D5CF;
height: 25px;
AMRN-HM Page 53
SECURE AUDITING AND DEDUPLICATION OF DATA IN CLOUD
}
</style>
</head>
<body>
<%
if(request.getParameter("updated")!=null){
out.println("<script>alert('updated....')</script>");
}
%>
<div id="main">
<header>
<div id="logo">
<div id="logo_text">
<!-- class="logo_colour", allows you to change the colour of the text -->
<pre><h1><a href="#"> Secure Auditing and De-duplicating Data in Cloud</a></h1></pre>
</div>
</div>
<nav>
<ul class="sf-menu" id="nav">
<li><a href="user_page1.jsp">User Home</a></li>
<li><a href="upload.jsp">Upload</a></li>
<li><a href="download.jsp">Download</a></li>
<li class="selected"><a href="update.jsp">Update</a></li>
<li><a href="#"><img width="40" height="40"src="images/user.png" alt="photo_two" /></a>
<ul>
<li><a href="index.html">Logout</a></li>
<!--<li><a href="register.jsp">Register</a></li>-->
</ul>
</li>
</ul>
</nav>
AMRN-HM Page 54
SECURE AUDITING AND DEDUPLICATION OF DATA IN CLOUD
</header>
<div id="site_content">
<div id="content">
<%
HttpSession user=request.getSession();
String uname=user.getAttribute("username").toString();
String name=user.getAttribute("name").toString();
Connection con=Dbconnection.getConn();
Statement st=con.createStatement();
ResultSetrt=st.executeQuery("select * from files where status='Yes' order by upload_timedesc");
%>
<h1>Welocme !<font style="color: tomato"><%=name%></font></h1>
<center>
<table style="border-style: solid">
<caption><h2 style="color: darkslateblue;font-family: monospace;font-weight: bold;font-size:
30px">FILES WITH UPDATE ACCESS</h2></caption>
<tr style="background-color: #999999;font-size: 18px;font-family: monospace;font-weight:
bold;">
<td style="text-align: center">FILE NAME</td><td style="text-align: center">OWNER
NAME</td><td style="text-align: center">UPLOAD TIME</td><td style="text-align:
center">SIZE</td><td style="text-align: center">UPDATE</td>
</tr>
<%
while(rt.next()){
String id=rt.getString("idfiles");
%>
<TR>
<td style="text-align: center"><%=rt.getString("filename")%></td>
<td style="text-align: center"><%=rt.getString("owner_name")%></td>
<td style="text-align: center"><%=rt.getString("upload_time")%></td>
<td style="text-align: center"><%=rt.getString("size")%></td>
AMRN-HM Page 55
SECURE AUDITING AND DEDUPLICATION OF DATA IN CLOUD
AMRN-HM Page 56
SECURE AUDITING AND DEDUPLICATION OF DATA IN CLOUD
<head>
<title>Secure Auditing</title>
<meta name="description" content="website description" />
<meta name="keywords" content="website keywords, website keywords" />
<meta http-equiv="content-type" content="text/html; charset=UTF-8" />
<link rel="shortcut icon" type="image/x-icon"href="images/brainstorming_alternative.png"/>
<link rel="stylesheet" type="text/css"href="css/style.css" />
<!--modernizr enables HTML5 elements and feature detects -->
<script type="text/javascript"src="js/modernizr-1.5.min.js"></script>
<script>
function validation() {
if (document.name.token.value == 0) {
alert('Enter your token');
document.name.token.focus();
return false;
}
}
</script>
<style>
form,h1{
position: relative;
left: 00px;
}
#id{
width: 200px;
height: 25px;
background-color: #D5D5D5;
}
#but{
width: 60px;
AMRN-HM Page 57
SECURE AUDITING AND DEDUPLICATION OF DATA IN CLOUD
height: 25px;
}
</style>
<style>
table,td,tr{
border-collapse: collapse;
border-style: solid;
}
table{
position: relative;
left: 100px;
width: 680px;
}
td{
text-align: center;
}
tr{
background-color: #D9D5CF;
height: 25px;
}
</style>
</head>
<body>
<%
if (request.getParameter("updated") != null) {
out.println("<script>alert('updated....')</script>");
}
%>
<div id="main">
<header>
<div id="logo">
AMRN-HM Page 58
SECURE AUDITING AND DEDUPLICATION OF DATA IN CLOUD
<div id="logo_text">
<!-- class="logo_colour", allows you to change the colour of the text -->
<pre><h1><a href="#"> Secure Auditing and De-duplicating Data in Cloud</a></h1></pre>
</div>
</div>
<nav>
<ul class="sf-menu" id="nav">
<li><a href="admin_page.jsp">Auditor Home</a></li>
<li><a href="audit_approve.jsp">File Approval</a></li>
<li><a href="a_uploads.jsp">Uploads</a></li>
<li><a href="a_downloads.jsp">Downloads</a></li>
<li><a href="a_updates.jsp">Updates</a></li>
<li><a href="index.html">Logout</a></li>
<!--<li><a href="#"><img width="40" height="40"src="images/user.png" alt="photo_two"
/></a>
<ul>
<li><a href="index.html">Logout</a></li>
<li><a href="register.jsp">Register</a></li>
</ul>-->
</li>
</ul>
</nav>
</header>
<div id="site_content">
<div id="content">
<% Connection con = Dbconnection.getConn();
Statement st = con.createStatement();
ResultSetrt = st.executeQuery("select * from files where status='No'");
%>
<center>
<table style="border-style: solid;">
AMRN-HM Page 59
SECURE AUDITING AND DEDUPLICATION OF DATA IN CLOUD
AMRN-HM Page 60
SECURE AUDITING AND DEDUPLICATION OF DATA IN CLOUD
<script type="text/javascript"src="js/jquery.js"></script>
<script type="text/javascript"src="js/jquery.easing-sooper.js"></script>
<script type="text/javascript"src="js/jquery.sooperfish.js"></script>
<script type="text/javascript"src="js/image_fade.js"></script>
<script type="text/javascript">
$(document).ready(function() {
$('ul.sf-menu').sooperfish();
});
</script>
</body>
</html>
User request:
<%@page import="java.sql.ResultSet"%>
<%@page import="java.sql.Statement"%>
<%@page import="pack.Dbconnection"%>
<%@page import="java.sql.Connection"%>
<!DOCTYPE HTML>
<html>
<head>
<title>Secure Auditing</title>
<meta name="description" content="website description" />
<meta name="keywords" content="website keywords, website keywords" />
<meta http-equiv="content-type" content="text/html; charset=UTF-8" />
<link rel="shortcut icon" type="image/x-icon"href="images/brainstorming_alternative.png"/>
<link rel="stylesheet" type="text/css"href="css/style.css" />
<!--modernizr enables HTML5 elements and feature detects -->
<script type="text/javascript"src="js/modernizr-1.5.min.js"></script>
<style>
table,td,tr{
AMRN-HM Page 61
SECURE AUDITING AND DEDUPLICATION OF DATA IN CLOUD
border-collapse: collapse;
border-style: solid;
}
table{
position: relative;
left: 100px;
width: 680px;
}
td{
text-align: center;
}
tr{
background-color: #D9D5CF;
height: 25px;
}
</style>
</head>
<body>
<%
if(request.getParameter("req")!=null){
out.println("<script>alert('Request Accepted')</script>");
}
%>
<div id="main">
<header>
<div id="logo">
<div id="logo_text">
<!-- class="logo_colour", allows you to change the colour of the text -->
<pre><h1><a href="#"> Secure Auditing and De-duplicating Data in Cloud</a></h1></pre>
</div>
AMRN-HM Page 62
SECURE AUDITING AND DEDUPLICATION OF DATA IN CLOUD
</div>
<nav>
<ul class="sf-menu" id="nav">
<li><a href="users.jsp">Users</a></li>
<!--<li><a href="#">User</a>
<ul>
<li><a href="user.jsp">Login</a></li>
<li><a href="register.jsp">Register</a></li>
</ul>-->
</li>
<li><a href="">Contact Us</a></li>
</ul>
</nav>
</header>
<div id="site_content">
<!--<div id="sidebar_container">
<div class="gallery">
<ul class="images">
<li class="show"><img width="450" height="450"src="images/c1.jpg" alt="photo_one" /></li>
<li><img width="450" height="450"src="images/c2.jpg" alt="photo_two" /></li>
<li><img width="450" height="450"src="images/c3.jpg" alt="photo_three" /></li>
<li><img width="450" height="450"src="images/c4.jpg" alt="photo_four" /></li>
<li><img width="450" height="450"src="images/c5.jpg" alt="photo_five" /></li>
</ul>
</div>
AMRN-HM Page 63
SECURE AUDITING AND DEDUPLICATION OF DATA IN CLOUD
</div>-->
<%
Connection con=Dbconnection.getConn();
Statement st1=con.createStatement();
ResultSet rt1=st1.executeQuery("select * from user_request where viewed='no'");
%>
<div id="content">
<h1>Welcome ! Private Cloud</h1>
<table>
<caption><font style="font-size: 20px;color: #999999">USER REQUEST</font></caption>
<tr>
<td>USERNAME</td><td>REQUEST</td><td>TIME</td><td>ACCEPT</td><td>DENY</td
>
</tr>
<%
while(rt1.next()){
String id=rt1.getString("iduser_request");
String req=rt1.getString("request");
String uname=rt1.getString("username");
%>
<tr>
<td><%=uname%></td><td><%=req%></td><td><%=rt1.getString("time")%></td>
<td><a href="accept.jsp?<%=id+","+req+","+uname%>">Accept</a></td><td><a
href="deny.jsp?<%=id%>">Deny</a></td>
</tr>
<%
}
%>
</table>
AMRN-HM Page 64
SECURE AUDITING AND DEDUPLICATION OF DATA IN CLOUD
</div>
</div>
<footer>
<p>Copyright © Jpinfotech. All Rights Reserved.</p>
</footer>
</div>
<p> </p>
<!--javascript at the bottom for fast page loading -->
<script type="text/javascript"src="js/jquery.js"></script>
<script type="text/javascript"src="js/jquery.easing-sooper.js"></script>
<script type="text/javascript"src="js/jquery.sooperfish.js"></script>
<script type="text/javascript"src="js/image_fade.js"></script>
<script type="text/javascript">
$(document).ready(function() {
$('ul.sf-menu').sooperfish();
});
</script>
</body>
</html>
AMRN-HM Page 65
SECURE AUDITING AND DEDUPLICATION OF DATA IN CLOUD
TYPES OF TESTS
Unit testing
Unit testing involves the design of test cases that validate that the internal program logic is
functioning properly, and that program inputs produce valid outputs. All decision branches and
internal code flow should be validated. It is the testing of individual software units of the
application .it is done after the completion of an individual unit before integration. This is a
structural testing, that relies on knowledge of its construction and is invasive. Unit tests perform
basic tests at component level and test a specific business process, application, and/or system
configuration. Unit tests ensure that each unique path of a business process performs accurately
to the documented specifications and contains clearly defined inputs and expected results.
Integration testing
Integration tests are designed to test integrated software components to determine if they
actually run as one program. Testing is event driven and is more concerned with the basic
outcome of screens or fields. Integration tests demonstrate that although the components were
individually satisfaction, as shown by successfully unit testing, the combination of components is
correct and consistent. Integration testing is specifically aimed at exposing the problems that
arise from the combination of components.
AMRN-HM Page 66
SECURE AUDITING AND DEDUPLICATION OF DATA IN CLOUD
Functional test
Functional tests provide systematic demonstrations that functions tested are available as
specified by the business and technical requirements, system documentation, and user manuals.
Functional testing is centered on the following items:
Valid Input : identified classes of valid input must be accepted.
Invalid Input : identified classes of invalid input must be rejected.
Functions : identified functions must be exercised.
Output : identified classes of application outputs must be exercised.
Systems/Procedures: interfacing systems or procedures must be invoked.
Black Box Testing is testing the software without any knowledge of the inner workings,
structure or language of the module being tested. Black box tests, as most other kinds of tests,
must be written from a definitive source document, such as specification or requirements
document, such as specification or requirements document. It is a testing in which the software
under test is treated, as a black box .you cannot see into it. The test provides inputs and
responds to outputs without considering how the software works.
Field testing will be performed manually and functional tests will be written in
detail.
Test objectives
Features to be tested
AMRN-HM Page 68
SECURE AUDITING AND DEDUPLICATION OF DATA IN CLOUD
Test Results: All the test cases mentioned above passed successfully. No defects encountered.
Acceptance Testing
User Acceptance Testing is a critical phase of any project and requires significant
participation by the end user. It also ensures that the system meets the functional requirements.
Test Results: All the test cases mentioned above passed successfully. No defects encountered.
AMRN-HM Page 69
SECURE AUDITING AND DEDUPLICATION OF DATA IN CLOUD
7.SCREEN SHOTS
Home page
7.1:Home page
Auditor login page
AMRN-HM Page 70
SECURE AUDITING AND DEDUPLICATION OF DATA IN CLOUD
AMRN-HM Page 71
SECURE AUDITING AND DEDUPLICATION OF DATA IN CLOUD
AMRN-HM Page 72
SECURE AUDITING AND DEDUPLICATION OF DATA IN CLOUD
AMRN-HM Page 73
SECURE AUDITING AND DEDUPLICATION OF DATA IN CLOUD
AMRN-HM Page 74
SECURE AUDITING AND DEDUPLICATION OF DATA IN CLOUD
AMRN-HM Page 75
SECURE AUDITING AND DEDUPLICATION OF DATA IN CLOUD
8. CONCLUSION
Aiming at achieving both data integrity and deduplication in cloud, we propose SecCloud
and SecCloud+. SecCloud introduces an auditing entity with maintenance of a MapReduce
cloud, which helps clients generate data tags before uploading as well as audit the integrity of
data having been stored in cloud. In addition, SecCoud enables secure deduplication through
introducing a Proof of Ownership protocol and preventing the leakage of side channel
information in data deduplication. Compared with previous work, the computation by user in
SecCloud is greatly reduced during the file uploading and auditing phases. SecCloud+ is an
advanced construction motivated by the fact that customers always want to encrypt their data
before uploading, and allows for integrity auditing and secure deduplication directly on
encrypted data.
Future Enhancement
In addition, SecCoud enables secure deduplication through presenting a Proof of
Ownership protocol and avoiding the leakage of side channel information in data deduplication.
Compared with previous work, the computation by user in SecCloud is greatly decreased during
the file uploading and auditing phases. SecCloud+ is an advanced construction motivated by the
fact that customers always want to encrypt their data before uploading, and allows for integrity
auditing and secure deduplication directly on encrypted data.
AMRN-HM Page 76
SECURE AUDITING AND DEDUPLICATION OF DATA IN CLOUD
9.APPENDEX
AMRN-HM Page 77
SECURE AUDITING AND DEDUPLICATION OF DATA IN CLOUD
10. BIBLIOGRAPHY
[1] M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski,G. Lee, D. Patterson,
A. Rabkin, I. Stoica, and M. Zaharia, A viewof cloud computing, Communication of the ACM,
vol. 53, no. 4, pp.5058, 2010.
[2] J. Yuan and S. Yu, Secure and constant cost public cloud storageauditing with
deduplication, in IEEE Conference on Communicationsand Network Security (CNS), 2013, pp.
145153.
[7] G. Ateniese, R. Di Pietro, L. V. Mancini, and G. Tsudik, Scalableand efficient provable data
possession, in Proceedings of the 4thInternational Conference on Security and Privacy in
CommunicationNetowrks, ser. SecureComm 08. New York, NY, USA: ACM, 2008,pp. 9:19:10.
AMRN-HM Page 78
SECURE AUDITING AND DEDUPLICATION OF DATA IN CLOUD
[10] H. Wang, Proxy provable data possession in public clouds, IEEETransactions on Services
Computing, vol. 6, no. 4, pp. 551559, 2013.
[11] Y. Zhu, H. Hu, G.-J. Ahn, and M. Yu, Cooperative provable datapossession for integrity
verification in multicloud storage, IEEE Transactionson Parallel and Distributed Systems, vol.
23, no. 12, pp. 22312244, 2012.
[12] H. Shacham and B. Waters, Compact proofs of retrievability, inProceedings of the 14th
International Conference on the Theory andApplication of Cryptology and Information Security:
Advances in Cryptology,ser. ASIACRYPT 08. Springer Berlin Heidelberg, 2008, pp.90107.
[13] Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, Enabling publicverifiability and data
dynamics for storage security in cloud computing,in Computer Security ESORICS 2009, M.
Backes and P. Ning, Eds.,vol. 5789. Springer Berlin Heidelberg, 2009, pp. 355370.
[14] J. Xu and E.-C. Chang, Towards efficient proofs of retrievability, inProceedings of the 7th
ACM Symposium on Information, Computer andCommunications Security, ser. ASIACCS 12.
New York, NY, USA:ACM, 2012, pp. 7980.
[15] E. Stefanov, M. van Dijk, A. Juels, and A. Oprea, Iris: A scalablecloud file system with
efficient integrity checks, in Proceedings of the28th Annual Computer Security Applications
Conference, ser. ACSAC12. New York, NY, USA: ACM, 2012, pp. 229238.
AMRN-HM Page 79