Professional Documents
Culture Documents
ABSTRACT:
Information sharing is the key goal of Cloud Storage servers. It allows storage
of sensitive and large volume of data with limited cost and high access benefits.
Security must be in given due importance for the cloud data with utmost care to
the data and confidence to the data owner. But this limits the utilization of data
through plain text search. Hence an excellent methodology is required to match
the keywords with encrypted cloud data. The proposed approach similarity
measure of “coordinate matching” combined with “inner product similarity”
quantitatively evaluates and matches all relevant data with search keyword to
arrive at best results. This approach, each document is associated with a binary
vector to represent a keyword contained in the document. The search keyword
is also described as a binary vector, so the similarity could be exactly measured
by the inner product of the query vector with the data vector. The inner product
computation and the two multi-keyword ranked search over encrypted data
(MRSE) schemes ensures data privacy and provides detailed information about
the dynamic operation on the data set and index and hence improves the search
experience of the user.
TABLE OF CONTENTS
TITLE PAGENO
ABSTRACT
LIST OF TABLES
LIST OF FIGURES
LIST OF ABBREVATIONS
1. INTRODUCTION
1.1Synopsis
1.2Objective
2. SYSTEM ANALYSIS
4. SOFTWARE DESCRIPTION
5. SYSTEM DESIGN
7. SYSTEM TESTING
8. CONCLUSION
8.1 Summary
APPENDIX 1
APPENDIX 2
LITERTURE REVIEW
REFERENCES
INTRODUCTION
INTRODUCTION
1.1Synopsis:
The term Cloud refers to a Network or net. In alternative words, we will say
that Cloud is some things that are gift at remote location. Cloud will give
services over network. Service Models are the reference models on that the
Cloud Computing relies. These may be classified into three basic service
models as listed below:
Infrastructure as a Service (IaaS)
Platform as a Service (PaaS)
Software as a Service (SaaS)
There area unit several alternative service models all of which may take the
shape like saas Anything as a Service. This can be Network as a Service,
Business as a Service, Identity as a Service, information as a Service or
Strategy as a Service. The Infrastructure as a Service (IaaS) is the simplest level
of service. Every of the service models create use of the underlying service
model. The planned approach similarity live of “coordinate matching”
combined with “inner product similarity” quantitatively evaluates and matches
all relevant information with search keyword to make best results. Then that
user can able to upload the same document with changes in that document that
document modified words are updated in the individual page.
OBJECTIVE:
The proposed concept mainly focuses the individual page updation of the multiple
page documents. We are introducing the system to update the particular modified
page or word in that particular document when it can be uploaded again.
Scope:
SYSTEM STUDY
FEASIBILITY STUDY
The feasibility of the project is analyzed in this phase and business proposal
is put forth with a very general plan for the project and some cost estimates.
During system analysis the feasibility study of the proposed system is to be carried
out. This is to ensure that the proposed system is not a burden to the company. For
feasibility analysis, some understanding of the major requirements for the system
is essential.
ECONOMICAL FEASIBILITY
TECHNICAL FEASIBILITY
SOCIAL FEASIBILITY
ECONOMICAL FEASIBILITY
This study is carried out to check the economic impact that the system
will have on the organization. The amount of fund that the company can pour into
the research and development of the system is limited. The expenditures must be
justified. Thus the developed system as well within the budget and this was
achieved because most of the technologies used are freely available. Only the
customized products had to be purchased.
TECHNICAL FEASIBILITY
This study is carried out to check the technical feasibility, that is, the
technical requirements of the system. Any system developed must not have a high
demand on the available technical resources. This will lead to high demands on the
available technical resources. This will lead to high demands being placed on the
client. The developed system must have a modest requirement, as only minimal or
null changes are required for implementing this system.
SOCIAL FEASIBILITY
The aspect of study is to check the level of acceptance of the system by
the user. This includes the process of training the user to use the system efficiently.
The user must not feel threatened by the system, instead must accept it as a
necessity. The level of acceptance by the users solely depends on the methods that
are employed to educate the user about the system and to make him familiar with
it. His level of confidence must be raised so that he is also able to make some
constructive criticism, which is welcomed, as he is the final user of the system.
SYSTEM ANALYSIS
2. SYSTEM ANALYSIS
4. SOFTWARE DESCRIPTION
4.1. Features Of .Net
The Microsoft .NET Framework 4 provides the following new features and
improvements:
The .NET Framework 4 works side by side with the Framework version 3.5
SP1. Applications that are based on earlier versions of the Framework will
continue to run on that version. Just a subset of functionality is shared by all
versions of the Framework.
Innovations in the Visual Basic and C# languages, for example statement
lambdas, implicit line continuations, dynamic dispatch, and named/optional
parameters.
The ADO.NET Entity Framework, which simplifies how developers
program against relational databases by raising the level of abstraction, has
many new features. These includes persistence ignorance and POCO
support, lazy loading, test-driven development support, functions in model,
and new LINQ operators.
Enhancements to ASP.NET:
o New JavaScript UI Templates and databinding capabilities for
AJAX.
o New ASP.NET chart control.
Improvements in WPF:
o Added support in Windows Presentation Foundation (WPF) for
Windows 7 multi-touch, ribbon controls, and taskbar extensibility
features.
o Added support in WPF for Surface 2.0 SDK. o New line-of-business
controls including charting control, smart edit, data grid, and others
that improve the experience for developers who build data centric
applications.
o Improvements in performance and scalability.
o Visual improvements in text clarity, layout pixel snapping,
localization, and interoperability.
Improvements to Windows Workflow (WF) that let developers to better host
and interact with workflows. These include an improved activity
programming model, an improved designer experience, a new flowchart
modeling style, an expanded activity palette, workflow-rules integration, and
new message correlation features. The .NET Framework also offers
significant performance gains for WF-based workflows.
Improvements to Windows Communication Foundation (WCF) such as
support for WCF Workflow Services enabling workflow programs with
messaging activities, correlation support, durable two-way communication
and rich hosting capabilities. Additionally, .NET Framework 4 provides new
WCF features such as service discovery, router service, simplified
configuration and a number of improvements to queuing, REST support,
diagnostics, and performance.
Innovative new parallel programming features such as parallel loop support,
Task Parallel Library (TPL), Parallel LINQ (PLINQ), and coordination data
structures which let developers harness the power of multi-core processors.
The code that targets .NET, and which contains certain extra Information -
“metadata” - to describe itself. Whilst both managed and unmanaged code can run
in the runtime, only managed code contains the information that allows the CLR to
guarantee, for instance, safe execution and interoperability.
Managed Data
The CLR uses something called the Common Type System (CTS) to strictly
enforce type-safety. This ensures that all classes are compatible with each other, by
describing types in a common way. CTS define how types work within the
runtime, which enables types in one language to interoperate with types in another
language, including cross-language exception handling. As well as ensuring that
types are only used in appropriate ways, the runtime also ensures that code doesn’t
attempt to access memory that hasn’t been allocated to it.
Visual Basic .NET has been updated to include many new and improved
language features that make it a powerful object-oriented programming language.
These features include inheritance, interfaces, and overloading, among others.
Visual Basic also now supports structured exception handling, custom attributes
and also supports multi-threading.
Visual Basic .NET is also CLS compliant, which means that any CLS-
compliant language can use the classes, objects, and components you create in
Visual Basic .NET.
Active State has created Visual Perl and Visual Python, which enable .NET-
aware applications to be built in either Perl or Python. Both products can be
integrated into the Visual Studio .NET environment. Visual Perl includes support
for Active State’s Perl Dev Kit.
FORTRAN
COBOL
Eiffel
GARBAGE COLLECTION
OVERLOADING
MULTITHREADING:
The OLAP Services feature available in SQL Server version 7.0 is now
called SQL Server 2000 Analysis Services. The term OLAP Services has been
replaced with the term Analysis Services. Analysis Services also includes a new
data mining component. The Repository component available in SQL Server
version 7.0 is now called Microsoft SQL Server 2000 Meta Data Services.
References to the component now use the term Meta Data Services. The term
repository is used only in reference to the repository engine within Meta Data
Services
1. TABLE
2. QUERY
3. FORM
4. REPORT
5. MACRO
TABLE:
VIEWS OF TABLE:
1. Design View
2. Datasheet View
Design View
Datasheet View
QUERY:
A query is a question that has to be asked the data. Access gathers data that
answers the question from one or more table. The data that make up the answer is
either dynaset (if you edit it) or a snapshot (it cannot be edited).Each time we run
query, we get latest information in the dynaset. Access either displays the dynaset
or snapshot for us to view or perform an action on it, such as deleting or updating.
SYSTEM DESIGN
5. SYSTEM DESIGN
5. SYSTEM DESIGN
search Documents
stop word
DB
Stemming Technique
MRSE Scheme
USER
cloud
check sum value
priority(sorting)
final document
5.2 ACTIVITY DIAGRAM:
Activity diagram are typically used for business process modeling for
modeling the logic captured by a single use case or usage scenario, or for modeling
the detailed logic of a business rule. Although UML activity diagrams could
potentially model the internal logic of a complex operation it would be far better to
simply rewrite the operation so that it is simple enough that you don’t requires an
activity diagram. In many ways UML activity diagrams are the objects-oriented
equivalent of flow charts and data flow diagrams (DFDs) from structured
development.
Search
documents
Stop word
removal
Stemming
Technique
MRSE scheme
Checksum
Value
Priority pages
5.3 SEQUENCE DIAGRAM:
USER
CLOUD
1.search documents
check db()
db verified
MRSE scheme
pages updated
2: check db()
6: db verified
9: MRSE scheme
12: check sum value
1: 1.search documents
4: stop word removal
5: stemming words removal
8: multi-keyword document search
11: updation of particular page
USER CLOUD
Remov
e unwan
ted words`
Priority
5.8 CLASS DIAGRAM
cloud users
cloud system
+name
+address +name
+id +id
receiver
+name
+id
+address
+view the document()
+download the document()
IMPLEMENTATION
6. IMPLEMENTATION
Module description
Multi-keyword concept
7.2.2Integration testing
Integration tests are designed to test integrated software components to
determine if they actually run as one program. Testing is event driven and is more
concerned with the basic outcome of screens or fields. Integration tests
demonstrate that although the components were individually satisfaction, as shown
by successfully unit testing, the combination of components is correct and
consistent. Integration testing is specifically aimed at exposing the problems that
arise from the combination of components.
Test objectives
Unit testing is usually conducted as part of a combined code and unit test
phase of the software lifecycle, although it is not uncommon for coding and unit
testing to be conducted as two distinct phases.
Test objectives
Test Results: All the test cases mentioned above passed successfully. No defects
encountered.
Acceptance Testing
User Acceptance Testing is a critical phase of any project and requires
significant participation by the end user. It also ensures that the system meets the
functional requirements.
Test Results:
8.1SUMMARY:
Main goal of this project is evaluation of storing data in cloud more secure. This
section include various test conducted on data stored in cloud, these test are
conducted on the basic of various parameters. Due to loss and Damage of Data
Transmission, We Proposed one Concept. In order to overcome that, We Proposed
a Technique to Transferring the Image or Video form Source to Destination
Without any Loss of Data and Leakage of Data.
In FUTURE ENHANCEMENT, the user get a alert from cloud admin to approval
the other user request.And also in future the system is used to store and view the
file like Image,Video,Audio and etc.
APPENDIX 1
Sample Code:
APPENDIX 2
Screen Shots:
LITERTURE REVIEW
REFERENCES
REFERENCES
[1] E. Adar, J. Teevan, and S. T. Dumais, “Large scale analysis of Web
revisitation patterns,” in Proc. SIGCHI Conf. Human Factors Comput.
Syst., 2008, pp. 1197–1206.
[2] D. Carmel, et al., “Personalized social search based on the user’s
social network,” in Proc. 18th ACM Conf. Inf. Knowl. Manage., 2009,
pp. 1227–1236.
[3] A. Cockburn, S. Greenberg, S. Jones, B. Mckenzie, and M. Moyle,
“Improving Web page revisitation: Analysis, design and evaluation,”
Inf. Technol. Soc., vol. 1, no. 3, pp. 159–183, 2003.
[4] T. Deng, L. Zhao, and L. Feng, “Enhancing Web revisitation by
contextual keywords,” in Proc. 13th Int. Conf. Web Eng., 2013, pp. 323–
337.
[5] T. Deng, L. Zhao, H. Wang, Q. Liu, and L. Feng, “ReFinder: A
context-based information re-finding system,” IEEE Trans. Knowl. Data
Eng., vol. 25, no. 9, pp. 2119–2132, Sep. 2013.
[6] T. V. Do and R. A. Ruddle, “The design of a visual history tool to
help users refind information within a website,” in Proc. 34th Eur. Conf.
Advances Inf. Retrieval, 2012, pp. 459–462.
[7] S. Dumais, E. Cutrell, J. Cadiz, G. Jancke, R. Sarin, and D. C.
Robbins, “Stuff I’ve seen: A system for personal information retrieval
and re-use,” in Proc. 26th Annu. Int. ACM SIGIR Conf. Res. Develop.
Inf. Retrieval, 2003, pp. 72–79.
[8] R. Durrett, Probability: Theory and Examples, 4th ed. Cambridge,
U.K.: Cambridge Univ. Press, 2010.
[9] H. C. Ellis and R. R. Hunt, Fundamentals of Human Memory and
Cognition, 3rd ed. Dubuque, IA, USA: William C. Brown, 1983.
[10] J. A. Gamez, J. L. Mateo, and J. M. Puerta, “Improving revisitation
browsers capability by using a dynamic bookmarks personal toolbar,” in
Proc. 8th Int. Conf. Web Inf. Syst. Eng., 2007, pp. 643– 652.