Professional Documents
Culture Documents
Project Report
on
A SECURE DATA DYNAMICS AND PUBLIC AUDITING
SCHEME FOR CLOUD STORAGE
Submitted to
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY ANANTAPUR,
ANANTAPURAMU
BACHELOR OF TECHNOLOGY
in
COMPUTER SCIENCE AND ENGINEERING
Submitted by
T. VYSHNAVI (189E1A05L1)
T. CHANDINI (189E1A05L2)
T. JAHNAVI (189E1A05L3)
T. VANDANA (189E1A05K8)
J. UMAMAHESWARI (199E5A0509)
Under the Esteemed Guidance of
Mr. Sathish Nambale, M.Tech
Assistant Professor
Department of CSE
CERTIFICATE
This is to certify that the project report entitled “A SECURE DATA DYNAMICS
AND PUBLIC AUDITING SCHEME FOR CLOUD STORAGE” a bonafide
record of the project work done and submitted by
T. VYSHNAVI (189E1A05L1)
T. CHANDINI (189E1A05L2)
T. JAHNAVI (189E1A05L3)
T. VANDANA (189E1A05K8)
J. UMAMAHESWARI (199E5A0509)
for the partial fulfillment of the requirements for the award of B. Tech Degree in
COMPUTER SCIENCE AND ENGINEERING, JNT University Anantapur,
Ananthapuramu.
We here by declare that the project report entitled “A SECURE DATA DYNAMICS AND
PUBLIC AUDITING SCHEME FOR CLOUD STORAGE” done by us under the guidance of
Sathish Nambale, and is submitted in partial fulfillment of the requirements for the award of the Bachelor’s
degree in Computer Science and Engineering. This project is the result of our own effort and it has not
been submitted to any other University or Institution for the award of any degree or diploma other than
specified above.
T. VYSHNAVI (189E1A05L1)
T. CHANDINI (189E1A05L2)
T. JAHNAVI (189E1A05L3)
T. VANDANA (189E1A05K8)
J. UMAMAHESWARI (199E5A0509)
ACKNOWLEDGEMENT
We are thankful to our guide Mr. Sathish Nambale for his valuable guidance and
encouragement. His helping attitude and suggestions have helped us in the successful
completion of the project.
We would like to express our gratefulness and sincere thanks to Dr. N. Chaitanya Kumar,
Head of the Department of COMPUTER SCIENCE AND ENGINEERING, for his kind
help and encouragement during the course of our study and in the successful completion
of the project work.
We have great pleasure in expressing our hearty thanks to our beloved Principal
Dr. T. Kalpalatha Reddy for spending her valuable time with us to complete this project.
Successful completion of any project cannot be done without proper support and
encouragement. We sincerely thank to the Management for providing all the necessary
facilities during the course of study.
We would like to thank our parents and friends, who have the greatest contributions in all
our achievements, for the great care and blessings in making us successful in all our
endeavors.
T. VYSHNAVI (189E1A05L1)
T. CHANDINI (189E1A05L2)
T. JAHNAVI (189E1A05L3)
T. VANDANA (189E1A05K8)
J. UMAMAHESWARI (199E5A0509)
TABLE OF CONTENTS
Abstract (i)
List of Figures (ii)
List of Abbreviations (iii)
1 Introduction 1
2 Project Description 2
2.1 Problem Definition 2
3 Computational Environment 3
3.1 Software Specification 3
3.2 Hardware Specification 3
4 Feasibility Study 4
4.1 Technical Feasibility 4
4.2 Operational Feasibility 5
4.3 Economical Feasibility 5
5 System Analysis 6
5.1 Existing System 6
5.1.1 Drawbacks of existing system 6
5.2 Proposed System 7
5.2.1 Advantages of proposed System 7
6 System Design 8
6.1 UML Diagrams 8
6.1.1 Class Diagram 10
6.1.2 Use case Diagram 11
6.1.3 Sequence Diagram 12
6.1.4 Activity Diagram 13
6.1.5 State Diagram 14
6.1.6 Object diagram 15
6.2 E-R Diagram 16
6.3 System Architecture 17
7 System Implementation 18
7.1 Implementation Process 18
7.2 Modules 18
8 Testing 20
8.1 Unit Testing 20
8.2 Functional Testing 20
8.3 System Testing 20
8.4 Performance Testing 21
8.5 Integration Testing 21
8.6 Acceptance Testing 21
9 Sample Source Code 24
10 Screenshots 52
11 Conclusion 61
12 References 62
ABSTRACT
Cloud computing is an evolving technology that provides data storage and highly fast
computing services at a very low cost. All data stored in the cloud is handled by their
cloud service providers or the caretaker of the cloud. The data owner is concerned about
the authenticity and reliability of the data stored in the cloud as the data owners. Data
can be misappropriated or altered by any unauthorized user or person. Data stored in
cloud computing are many difficulties in the integrity and privacy of users. So, the
approach needs some protection and adequates that data stored on the cloud can assure
integrity and privacy. That it suggests a secure public auditing scheme applying third
party auditors to authenticate the privacy, reliability, and integrity of data stored in the
cloud. This proposed auditing scheme composes the use of the AES-256 algorithm for
encryption. And perform data dynamics operation which deals with mostly insertion,
deletion, and, modification. Data confidentiality is taken to assure access control
policies and authentication. A secure data storage of cloud computing is presented of a
data auditing scheme.
(i)
LIST OF FIGURES
(ii)
LIST OF ABBREVIATIONS
1 DB Data Base
4 CB Collective Behavior
5 SD Social Dimension
(iii)
A Secure Data Dynamics and Public Auditing Scheme for Cloud
Storage
1. INTRODUCTION
With advanced computational technology over Internet Cloud Computing has become a new
buzz in recent time. Users can access the data stored in the cloud and simultaneously share their
outsourced data. To improve the storage limitation, enterprise and organization outsource their
data to Cloud Service Provider (CSP). Cloud computing ensures more security challenges to
ensure the integrity of outsourced data. Various new ideas give assurance to Data integrity and
confidentiality in better way. The best way to protect the confidential data in cloud is to use
encryption method for data storage and retrieval. Almost all cloud service providers support
encryption for storing the data. Since the cloud servers may return an invalid result in some cases,
such as server hardware or software failure, human maintenance and malicious attack, new forms
of assurance of data integrity and accessibility are required to protect the security and privacy of
cloud user’s data. The new cooperation network model in cloud makes the remote data auditing
schemes become infeasible, where only the data owner can update its data. Obviously, extending
a scheme with an online data owner to update the data for a group is inappropriate for the data
owner. It will cause tremendous communication and computation overhead to data owner, which
will result in the single point of data owner. The major security issue is confidential data stored
in cloud that is outsourced, leading to number of issues related to accountability and handling of
personal identifiable information. This makes the security for data access more necessity.
Cloud computing is an evolving technology that provides data storage and highly fast computing
services at a very low cost. All data stored in the cloud is handled by their cloud service providers
or the caretaker of the cloud. The data owner is concerned about the authenticity and reliability
of the data stored in the cloud as the data owners. Data can be misappropriated or altered by any
unauthorized user or person. It suggest a secure public auditing scheme applying third party
auditors to authenticate the privacy, reliability, and integrity of data stored in the cloud. This
proposed auditing scheme composes the use of the AES-256 algorithm for encryption. Cloud
computing provides tremendous data storage and computing capabilities to its users. Large
amount of people can store various data onto the cloud without any hesitation or limitations.
Additional security requires a secure cloud storage system with independent efficient auditing
service to check the correctness of outsourced data. Enormous users keep sending the data over
Internet and they are made stored in cloud data centers remotely. The data files can be accessed
by unauthorized users or hackers in the unsecured cloud network. This leads in leaking of
confidential data or data loss during the transmission over the network. Hence securing the cloud
plays a very important role in cloud environment. The data transfer over wireless network across
the globe has to be protected safely from unauthorized usage over the cloud. The data files and
the remote data centers have to be given extra security as well as maintenance capabilities from
hackers or third party intruders. In this regard, data auditing along with privacy preserving,
integrity and dynamic capabilities plays as a proficient method for preventing from various cloud
attacks which is considered in this work. In this work, efficient auditor plays a crucial role in
securing the cloud environment.
The feasibility of the project is analyzed in this phase and business proposal is put forth with a
very general plan for the project and some cost estimates. During system analysis the feasibility
study of the proposed system is to be carried out. This is to ensure that the proposed system is
not a burden to the company. For feasibility analysis, some understanding of the major
requirements for the system is essential.
Three key considerations involved in the feasibility analysis are
➢ TECHNICAL FEASIBILITY
➢ ECONOMICAL FEASIBILITY
➢ OPERATIONAL FEASIBILITY
The key findings of the investigation are twofold, namely that it is indeed feasible to implement
a cloud-based portal for a global service organization, and there are real prospects of value
creation and service improvement. The small/medium sized global service enterprise, GESA,
is expected to obtain some competitive benefits from leveraging PAAS with cloud computing.
The benefits include reducing costs, business processes improvement, optimization of customer
relationship, and new services creation. It was found that the SCOR model can aid an enterprise
to understand its supply chain in a cloud-based environment. Moreover, modelling processes
and activities should be conducted on three levels, namely processes, sub-processes, and
activities with specific goals and measures in mind. The outcome of modelling processes and
activities allows the enterprise to gain insight into the details of the business processes and
behavior’s on different levels.
In order to optimize the acquisition process, evaluation criteria of supplier selection aligning
with the agency’s vision and objectives, were developed. The criteria are given in table cost,
quality, safety, service, convenience, and agility. The criteria were based on the needs and goals
of acquisition, and aligned with new services using the cloud-based portal. The new services
include online application, online user identification, online consultant, online database service,
translation service, news collection, newsletter system, online discussion forum, service cost
calculator, and online payment access. The alignment of business needs, technological support,
strategic guidelines, and business processes is a necessary condition for operating the cloud-
based portal for GESA.
Utilizing IT-based solutions is beneficial for the enterprise from four perspectives. Business
processes may be improved via IT enablement in an internal perspective. The Operation
Management Process is supported by a cloud-based supply chain, and the new services provided
by a portal for GESA would strengthen customer management processes and innovation
processes. The agility of the system is positive for dealing with the regulatory and social
processes as well. Furthermore, considering the GESA customer value proposition, a healthy
customer relationship would provide several benefits to applicants, such as lower price, more
service selections, multiple accesses to information, and ease of operation. Moreover, with the
improvement of business processes and customer relationship, the agency would be able to
maintain a positive financial status. IT enablement can improve the cost structure, increase asset
utilization, expand revenue opportunities, and enhance customer value in the financial
perspective. Improvements from different perspectives suggest that the agency would be able to
gain long-term shareholder value.
5.SYSTEM ANALYSIS
5.1 EXISTING SYSTEM
In existing system data stored in cloud computing are many difficulties in the integrity and
privacy of users. So the approach needs some protection and adequates that data stored on the
cloud can assure integrity and privacy. Prospective a way to support public auditing and
privacy-preserving, in their approach, HLA and BLS signature along with MHT are used and
support data dynamic by the Merkle hash tree. It maintains integrity. In their approach,
confidentiality is not maintained and batch auditing is supported.
In our proposed system a secure public auditing scheme applying third party auditors to
authenticate the privacy, reliability, and integrity of data stored in the cloud. Auditing scheme
composes the use of the AES-256 algorithm for encryption and perform data dynamics
operation which deals with mostly insertion, deletion, and, modification.
Systems design is the process of defining the architecture, components, modules, interfaces, and
data for a system to satisfy specified requirements. One could see it as the application of systems
theory to product development. There is some overlap with the disciplines of systems analysis,
systems architecture and systems engineering. If the broader topic of product development
"blends the perspective of marketing, design, and manufacturing into a single approach to product
development, then design is the act of taking the marketing information and creating the design
of the product to be manufactured.
Systems design is therefore the process of defining and developing systems to satisfy specified
requirements of the user.
The Unified Modelling Language (UML) is a standard language for specifying, visualizing,
constructing, and documenting the artifacts of software systems, as well as for business modelling
and other non-software systems. The UML represents a collection of best engineering practices
that have proven successful in the modelling of large and complex systems. The UML is a very
important part of developing objects-oriented software and the software development process.
The UML uses mostly graphical notations to express the design of software projects. Using the
UML helps project teams communicate, explore potential designs, and validate the architectural
design of the software.
As the strategic value of software increases for many companies, the industry looks for
techniques to automate the production of software and to improve quality and reduce cost and
time-to-market. These techniques include component technology, visual programming, patterns
and frameworks. Businesses also seek techniques to manage the complexity of systems as they
increase in scope and scale. In particular, they recognize the need to solve recurring architectural
problems, such as physical distribution, concurrency, replication, security, load balancing and
fault tolerance. Additionally, the development for the World Wide Web, while making some
things
Contents of UML
In general, a UML diagram consists of the following features:
➢ Entities -- These may be classes, objects, users or systems behaviors.
➢ Relationship Lines that model the relationships between entities in the system.
➢ Generalization -- a solid line with an arrow that points to a higher abstraction of the
present item.
➢ Association -- a solid line that represents that one entity uses another entity as part of its
behaviour.
➢ Dependency -- a dotted line with an arrowhead that shows one entity depends on the
behaviour of another entity.
1) Class Diagram
2) Use Case Diagram
3) Sequence Diagram
4) Activity Diagram
5) State Diagram
6) Object Diagram
Class diagrams are the main building block in object-oriented modeling. They are used to show
the different objects in a system, their attributes, their operations and the relationships among
them. The different object's are Data owner, Cloud user, Cloud admin these are the objects in this
uml relationships and their properties are uploading the documents, generating key for securing
the data, maintaining the cloud data s then downloading using the key and accessing the cloud
data.
Use case diagrams are a way to capture the system's functionality and requirements in UML
diagrams. It captures the dynamic behavior of a live system. A use case diagram consists of a use
case and an actor. Here, data owner and user having separate registration and login then data
owners will uploading the text document using the symmetric key for encrypting the cloud data.
A sequence diagram is a type of interaction diagram because it describes how and in what order
a group of objects works together. These diagrams are used by software developers and business
professionals to understand requirements for a new system or to document an existing process.
Activity Diagrams describe how activities are coordinated to provide a service which can be at
different levels of abstraction. Typically, an event needs to be achieved by some operations,
particularly where the operation is intended to achieve a number of different things that require
coordination.
A state diagram, also known as a state machine diagram or state chart diagram, is an illustration
of the states an object can attain as well as the transitions between those states in the Unified
Modeling Language. Then, all of the possible existing states are placed in relation to the
beginning and the end.
An object diagram shows this relation between the instantiated classes and the defined
class, and the relation between these objects in the system. They are be useful to explain
smaller portions of your system, when your system class diagram is very complex, and
also sometimes modeling recursive relationship in diagram. The best way to illustrate
what an object diagram look like is to show the object diagram derived from the
corresponding class diagram.
E-R Diagram stands for Entity Relationship Diagram, also known as ERD is a diagram that
displays the relationship of entity sets stored in a database. In other words, ER diagrams help to
explain the logical structure of databases. ER diagrams are created based on three basic concepts:
entities, attributes and relationships.ER Diagrams contain different symbols that use rectangles
to represent entities, ovals to define attributes and diamond shapes to represent relationships.
Implementation is the stage of the project when the theoretical design is turned out into a
working system. Thus, it can be considered to be the most critical stage in achieving a successful
new system and in giving the user, confidence that the new system will work and be effective.
The implementation stage involves careful planning, investigation of the existing system and
its constraints on implementation, designing of methods to achieve changeover and evaluation
of changeover methods.
7.2 MODULES
FileRequest.jsp
<%@ page language="java" contentType="text/html; charset=ISO-8859-1"
pageEncoding="ISO-8859-1"%>
<%@ page import="com.Dynamic.Database.DatabaseConnection"%>
<%@ page import="java.sql.ResultSet"%>
<%@ page import="java.util.*" %>
<%@ page import="java.sql.*" %>
<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">
<title>File Request | Success</title>
</head>
<body>
<%
String filename = request.getParameter("fname");
String filesize = request.getParameter("fsize");
String duser = session.getAttribute("duser").toString();
try {
Class.forName("com.mysql.jdbc.Driver");
Connection con =
(Connection)DriverManager.getConnection("jdbc:mysql://localhost:3306/dynamicdat
aauditing","root","root");
Statement st = con.createStatement();
ResultSet rs = st.executeQuery("select * from uploadfile where filename =
'"+filename+"' and size = '"+filesize+"'");
while(rs.next()) {
dprovider = rs.getString("username");
}
}catch(Exception e) {
}
System.out.println(dprovider);
int ans=0;
try {
Connection con =
(Connection)DriverManager.getConnection("jdbc:mysql://localhost:3306/dynamicdat
aauditing","root","root");
PreparedStatement ps = con.prepareStatement("INSERT INTO
filerequest(fileowner,filename,filesize,requestby,status) VALUES(?,?,?,?,?)");
ps.setString(1, dprovider);
ps.setString(2, filename);
ps.setString(3, filesize);
ps.setString(4, duser);
ps.setString(5, "Waiting");
ans = ps.executeUpdate();
}
}
if(ans==1) {
response.sendRedirect("FileReqSuccess.jsp");
} else {
response.sendRedirect("UserHome.jsp");
}
%>
</body>
</html>
UserFileRequest.jsp
<%@ page language="java" contentType="text/html; charset=ISO-8859-1"
pageEncoding="ISO-8859-1"%>
<%@page import="com.Dynamic.Database.DatabaseConnection"%>
<%@page import="java.sql.ResultSet"%>
<%@page import="java.util.*" %>
<%@page import="java.sql.*" %>
<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">
<title>Data User | File Request</title>
<link href="//maxcdn.bootstrapcdn.com/bootstrap/3.3.0/css/bootstrap.min.css"
rel="stylesheet" id="bootstrap-css">
<script
src="//maxcdn.bootstrapcdn.com/bootstrap/3.3.0/js/bootstrap.min.js"></script>
<script src="//code.jquery.com/jquery-1.11.1.min.js"></script>
<script
src="http://ajax.googleapis.com/ajax/libs/jquery/1.9.1/jquery.min.js"></script>
<script src="http://getbootstrap.com/dist/js/bootstrap.min.js"></script>
</head>
<body>
<%
String dprovider=session.getAttribute("dprovider").toString();
session.setAttribute("dprovider", dprovider);
%>
<div class="container">
<div class="row">
<div class="col-md-12">
<h4>Requested Files</h4> <br>
<div class="table-responsive">
<%
try
{
Class.forName("com.mysql.jdbc.Driver");
Connection con=(Connection)DriverManager.getConnection(
"jdbc:mysql://localhost:3306/dynamicdataauditing","root","root");
Statement st=con.createStatement();
ResultSet rs=st.executeQuery("select * from filerequest where
fileowner='"+dprovider+"' and status='Waiting'");
<tbody>
<%
int i=1;
while(rs.next())
{
%>
<tr>
<td><%=i%></td>
<td><%=rs.getString("filename") %></td>
<td><%=rs.getString("filesize") %></td>
<td><%=rs.getString("requestby") %></td>
<td><%=rs.getString("status") %></td>
<td><a href="FileAccept.jsp?fname=<%=rs.getString("filename")
%>&reqby=<%=rs.getString("requestby") %>">Accept</a></td>
</tr>
<%
i++;
}%>
</tbody>
</table>
<%}
catch(Exception e){
e.printStackTrace();%> <%
}
%>
</div>
</div>
</div>
</div>
<div class="modal fade" id="edit" tabindex="-1" role="dialog" aria-
labelledby="edit" aria-hidden="true">
<div class="modal-dialog">
<div class="modal-content">
<div class="modal-header">
<button type="button" class="close" data-dismiss="modal" aria-
hidden="true"><span class="glyphicon glyphicon-remove" aria-
hidden="true"></span></button>
<h4 class="modal-title custom_align" id="Heading">Edit Your Detail</h4>
</div>
<div class="modal-body">
</div>
<div class="modal-footer ">
<button type="button" class="btn btn-success" ><span class="glyphicon
glyphicon-ok-sign"></span> Yes</button>
<button type="button" class="btn btn-default" data-dismiss="modal"><span
class="glyphicon glyphicon-remove"></span> No</button>
</div>
</div>
</div>
</div>
<script type="text/javascript" src="Table/table.js"></script>
<script>
$(document).ready(function(){
$("#mytable #checkall").click(function () {
if ($("#mytable #checkall").is(':checked')) {
$("#mytable input[type=checkbox]").each(function () {
$(this).prop("checked", true);
});
} else {
$("#mytable input[type=checkbox]").each(function () {
$(this).prop("checked", false);
});
}
$("[data-toggle=tooltip]").tooltip();
});
</script>
</body>
</html>
DataOwner.jsp
<%@ page language="java" contentType="text/html; charset=ISO-8859-1"
pageEncoding="ISO-8859-1"%>
<%@page import="com.Dynamic.Database.DatabaseConnection"%>
<%@page import="java.sql.ResultSet"%>
<%@page import="java.util.*" %>
<%@page import="java.sql.*" %>
<%@page import="java.sql.*"%>
<%@page import="java.sql.ResultSet"%>
<%@ page import="java.util.List" %>
<%@ page import="java.sql.*" %>
<%@ page import="pcloud.*" %>
<%@ page import="java.util.*" %>
<%@ page import="java.io.File" %>
<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">
<title>Data Owners</title>
<link href="//maxcdn.bootstrapcdn.com/bootstrap/3.3.0/css/bootstrap.min.css"
rel="stylesheet" id="bootstrap-css">
<script
src="//maxcdn.bootstrapcdn.com/bootstrap/3.3.0/js/bootstrap.min.js"></script>
<script src="//code.jquery.com/jquery-1.11.1.min.js"></script>
<!------ Include the above in your HEAD tag ---------->
<script
src="http://ajax.googleapis.com/ajax/libs/jquery/1.9.1/jquery.min.js"></script>
<script src="http://getbootstrap.com/dist/js/bootstrap.min.js"></script>
</head>
<body>
<%
try{
File file = new File("E:\\Temp");
String[] myFiles;
if(file.isDirectory()){
myFiles = file.list();
for (int i=0; i<myFiles.length; i++) {
File myFile = new File(file, myFiles[i]);
myFile.delete();
}
}
PCloudAPI conn=new PCloudAPI();
Hashtable <String, Object> params=new Hashtable <String, Object> ();
params.put("username", "cloudproject18032019@gmail.com");
params.put("password", "18032019");
params.put("folderid", "3126483280");
Object res=conn.sendCommand("listfolder", params);
if (PCloudAPI.resultGetLong(res, "result")!=0){
<div class="container">
<div class="row">
<div class="col-md-12">
<h4>Data Owners </h4> <br>
<div class="table-responsive">
<table id="mytable" class="table table-bordred table-striped">
<thead>
<tr>
<!-- <th><input type="checkbox" id="checkall" /></th> -->
<th>S.no</th>
<th>Name</th>
<th>User name</th>
<th>Password</th>
<th>Email</th>
<th>Address</th>
</tr>
</thead>
<%
Object[] contents=PCloudAPI.resultGetArray(PCloudAPI.resultGetHashtable(res,
"metadata"), "contents");
for (int i=0; i<contents.length; i++){
Object entry=contents[i];
if (PCloudAPI.resultGetBoolean(entry, "isfolder"))
System.out.println("Folder: "+PCloudAPI.resultGetString(entry,
"name")+" Id :"+PCloudAPI.resultGetString(entry, "id"));
else
System.out.println("File: "+PCloudAPI.resultGetString(entry, "name")+"
Size: "+PCloudAPI.resultGetLong(entry, "size")+" Id:
"+PCloudAPI.resultGetString(entry, "id"));
try
{
Class.forName("com.mysql.jdbc.Driver");
Connection con=(Connection)DriverManager.getConnection(
"jdbc:mysql://localhost:3306/dynamicdataauditing","root","root");
Statement st=con.createStatement();
ResultSet rs=st.executeQuery("select * from doreg");
%>
<tbody>
<%
int ii=1;
if(i<1)
{
while(rs.next())
{
%>
<tr>
<td><%=ii%></td>
<!-- <td><input type="checkbox" class="checkthis" /></td> -->
<td><%=rs.getString("name") %></td>
<td><%=rs.getString("uname") %></td>
</tbody>
</table>
<%}
catch(Exception e){
out.print(e.getMessage());%><br><%
}
}
}
catch(Exception e){
e.printStackTrace();
}
%>
</div>
</div>
</div>
</div>
<div class="modal fade" id="edit" tabindex="-1" role="dialog" aria-
labelledby="edit" aria-hidden="true">
<div class="modal-dialog">
<div class="modal-content">
<div class="modal-header">
<button type="button" class="close" data-dismiss="modal" aria-
hidden="true"><span class="glyphicon glyphicon-remove" aria-
hidden="true"></span></button>
<h4 class="modal-title custom_align" id="Heading">Edit Your Detail</h4>
</div>
<div class="modal-body">
<div class="form-group">
<input class="form-control " type="text" placeholder="Mohsin">
</div>
<div class="form-group">
</div>
<div class="modal-footer ">
<button type="button" class="btn btn-success" ><span class="glyphicon
glyphicon-ok-sign"></span> Yes</button>
<button type="button" class="btn btn-default" data-
dismiss="modal"><span class="glyphicon glyphicon-remove"></span> No</button>
</div>
</div>
<!-- /.modal-content -->
</div>
<!-- /.modal-dialog -->
</div>
<script type="text/javascript" src="Table/table.js"></script>
<script>
$(document).ready(function(){
$("#mytable #checkall").click(function () {
if ($("#mytable #checkall").is(':checked')) {
$("#mytable input[type=checkbox]").each(function () {
$(this).prop("checked", true);
});
} else {
$("#mytable input[type=checkbox]").each(function () {
$(this).prop("checked", false);
});
}
});
$("[data-toggle=tooltip]").tooltip();
});
</script>
</body>
</html>
<%@ page language="java" contentType="text/html; charset=ISO-8859-1"
pageEncoding="ISO-8859-1"%>
<%@page import="com.Dynamic.Database.DatabaseConnection"%>
<%@page import="java.sql.ResultSet"%>
<%@page import="java.util.*" %>
<%@page import="java.sql.*" %>
<%@page import="java.sql.*"%>
<%@page import="java.sql.ResultSet"%>
<%@ page import="java.util.List" %>
<%@ page import="java.sql.*" %>
<div class="container">
<div class="row">
<div class="col-md-12">
<h4>Data Users </h4> <br>
<div class="table-responsive">
<table id="mytable" class="table table-bordred table-striped">
<thead>
<tr>
<!-- <th><input type="checkbox" id="checkall" /></th> -->
<th>S.no</th>
<th>Name</th>
<th>User name</th>
<th>Password</th>
<th>Email</th>
Object entry=contents[i];
if (PCloudAPI.resultGetBoolean(entry, "isfolder"))
System.out.println("Folder: "+PCloudAPI.resultGetString(entry,
"name")+" Id :"+PCloudAPI.resultGetString(entry, "id"));
else
System.out.println("File: "+PCloudAPI.resultGetString(entry, "name")+"
Size: "+PCloudAPI.resultGetLong(entry, "size")+" Id:
"+PCloudAPI.resultGetString(entry, "id"));
try
{
Class.forName("com.mysql.jdbc.Driver");
Connection con=(Connection)DriverManager.getConnection(
"jdbc:mysql://localhost:3306/dynamicdataauditing","root","root");
Statement st=con.createStatement();
ResultSet rs=st.executeQuery("select * from dureg");
%>
<tbody>
<%
int ii=1;
if(i<1)
{
while(rs.next())
{
%>
<tr>
<td><%=ii%></td>
<!-- <td><input type="checkbox" class="checkthis" /></td> -->
<td><%=rs.getString("name") %></td>
<td><%=rs.getString("uname") %></td>
<td><%=rs.getString("pass") %></td>
<td><%=rs.getString("email") %></td>
<td><%=rs.getString("addr") %></td>
</tr>
<%
ii++;
}
}%>
</tbody>
</table>
<%}
catch(Exception e){
out.print(e.getMessage());%><br><%
}
}
%>
</div>
</div>
</div>
</div>
<div class="modal fade" id="edit" tabindex="-1" role="dialog" aria-
labelledby="edit" aria-hidden="true">
<div class="modal-dialog">
<div class="modal-content">
<div class="modal-header">
<button type="button" class="close" data-dismiss="modal" aria-
hidden="true"><span class="glyphicon glyphicon-remove" aria-
hidden="true"></span></button>
<h4 class="modal-title custom_align" id="Heading">Edit Your Detail</h4>
</div>
<div class="modal-body">
<div class="form-group">
<input class="form-control " type="text" placeholder="Mohsin">
</div>
<div class="form-group">
} else {
$("#mytable input[type=checkbox]").each(function () {
$(this).prop("checked", false);
});
}
});
$("[data-toggle=tooltip]").tooltip();
});
</script>
</body>
</html>
A secure auditing method is to store the data on the cloud in a secure manner. The prospective
take the AES-256 algorithm to assure that TPA cannot knowledge about data toward the
robustness auditing scheme. We propose a data dynamics operation with mostly deal insertion,
deletion and, modification. In the future, we would like to perform a batch auditing method of
data.
cloud”.2017[ICCPCT].
✓ Mell, Peter, and Tim Grance.The NIST definition of cloud computing (2011).
✓ Swapnali Morea, Sangita Chaudhari,”Third Party Public Auditing Scheme for Cloud Storage
✓ Zissis, Dimitrios, and Dimitrios Lekkas. Addressing cloud computing security issues. Future
✓ B.L Adokshaja, and S.J.Saritha,”Third Party Public Auditing on Cloud Storage using the
Cryptographic Algorithm”ICECDS-2017.
✓ Cong Wang, Sherman SM Chow, Qian Wang, Kui Ren, and Wenjing Lou.”Privacy
✓ Cong Wong, Sherman S M Chow, Qian Wang, Kui Ren, and Wen jing Lou. “Privacy
Preserving Public Auditing for Secure Cloud Storage”. IEEE Transactions on Computers,