You are on page 1of 57

A

Project Report
on
A SECURE DATA DYNAMICS AND PUBLIC AUDITING
SCHEME FOR CLOUD STORAGE
Submitted to
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY ANANTAPUR,
ANANTAPURAMU

in partial fulfillment of the requirements for the award of the Degree of

BACHELOR OF TECHNOLOGY

in
COMPUTER SCIENCE AND ENGINEERING

Submitted by

T. VYSHNAVI (189E1A05L1)
T. CHANDINI (189E1A05L2)
T. JAHNAVI (189E1A05L3)
T. VANDANA (189E1A05K8)
J. UMAMAHESWARI (199E5A0509)
Under the Esteemed Guidance of
Mr. Sathish Nambale, M.Tech
Assistant Professor
Department of CSE

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING


SRI VENKATESWARA ENGINEERING COLLEGE FOR WOMEN
(Approved by AICTE, New Delhi & Affiliated to JNTUA, Ananthapuramu)
Karakambadi Road, TIRUPATI – 517507
2018-2022
SRI VENKATESWARA ENGINEERING COLLEGE FOR WOMEN
(Approved by AICTE, New Delhi & Affiliated to JNTUA, Ananthapuramu)
Karakambadi Road, TIRUPATI – 517507
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

CERTIFICATE

This is to certify that the project report entitled “A SECURE DATA DYNAMICS
AND PUBLIC AUDITING SCHEME FOR CLOUD STORAGE” a bonafide
record of the project work done and submitted by

T. VYSHNAVI (189E1A05L1)
T. CHANDINI (189E1A05L2)
T. JAHNAVI (189E1A05L3)
T. VANDANA (189E1A05K8)
J. UMAMAHESWARI (199E5A0509)

for the partial fulfillment of the requirements for the award of B. Tech Degree in
COMPUTER SCIENCE AND ENGINEERING, JNT University Anantapur,
Ananthapuramu.

GUIDE HEAD OF THE DEPARTMENT


Mr. Sathish Nambale, M. Tech Dr. N.Chaitanya Kumar, M.Tech., Ph.D
Assistant Professor, Professor & HOD,
Dept. of CSE. Dept. of CSE.

External Viva-Voce Exam Held on

INTERNAL EXAMINER EXTERNAL EXAMINER


DECLARATION

We here by declare that the project report entitled “A SECURE DATA DYNAMICS AND
PUBLIC AUDITING SCHEME FOR CLOUD STORAGE” done by us under the guidance of
Sathish Nambale, and is submitted in partial fulfillment of the requirements for the award of the Bachelor’s
degree in Computer Science and Engineering. This project is the result of our own effort and it has not
been submitted to any other University or Institution for the award of any degree or diploma other than
specified above.

T. VYSHNAVI (189E1A05L1)
T. CHANDINI (189E1A05L2)
T. JAHNAVI (189E1A05L3)
T. VANDANA (189E1A05K8)
J. UMAMAHESWARI (199E5A0509)
ACKNOWLEDGEMENT

We are thankful to our guide Mr. Sathish Nambale for his valuable guidance and
encouragement. His helping attitude and suggestions have helped us in the successful
completion of the project.
We would like to express our gratefulness and sincere thanks to Dr. N. Chaitanya Kumar,
Head of the Department of COMPUTER SCIENCE AND ENGINEERING, for his kind
help and encouragement during the course of our study and in the successful completion
of the project work.
We have great pleasure in expressing our hearty thanks to our beloved Principal
Dr. T. Kalpalatha Reddy for spending her valuable time with us to complete this project.
Successful completion of any project cannot be done without proper support and
encouragement. We sincerely thank to the Management for providing all the necessary
facilities during the course of study.
We would like to thank our parents and friends, who have the greatest contributions in all
our achievements, for the great care and blessings in making us successful in all our
endeavors.

T. VYSHNAVI (189E1A05L1)
T. CHANDINI (189E1A05L2)
T. JAHNAVI (189E1A05L3)
T. VANDANA (189E1A05K8)
J. UMAMAHESWARI (199E5A0509)
TABLE OF CONTENTS

Chapter No. Description Page No.

Abstract (i)
List of Figures (ii)
List of Abbreviations (iii)
1 Introduction 1
2 Project Description 2
2.1 Problem Definition 2
3 Computational Environment 3
3.1 Software Specification 3
3.2 Hardware Specification 3
4 Feasibility Study 4
4.1 Technical Feasibility 4
4.2 Operational Feasibility 5
4.3 Economical Feasibility 5
5 System Analysis 6
5.1 Existing System 6
5.1.1 Drawbacks of existing system 6
5.2 Proposed System 7
5.2.1 Advantages of proposed System 7
6 System Design 8
6.1 UML Diagrams 8
6.1.1 Class Diagram 10
6.1.2 Use case Diagram 11
6.1.3 Sequence Diagram 12
6.1.4 Activity Diagram 13
6.1.5 State Diagram 14
6.1.6 Object diagram 15
6.2 E-R Diagram 16
6.3 System Architecture 17
7 System Implementation 18
7.1 Implementation Process 18
7.2 Modules 18
8 Testing 20
8.1 Unit Testing 20
8.2 Functional Testing 20
8.3 System Testing 20
8.4 Performance Testing 21
8.5 Integration Testing 21
8.6 Acceptance Testing 21
9 Sample Source Code 24
10 Screenshots 52
11 Conclusion 61
12 References 62
ABSTRACT

Cloud computing is an evolving technology that provides data storage and highly fast
computing services at a very low cost. All data stored in the cloud is handled by their
cloud service providers or the caretaker of the cloud. The data owner is concerned about
the authenticity and reliability of the data stored in the cloud as the data owners. Data
can be misappropriated or altered by any unauthorized user or person. Data stored in
cloud computing are many difficulties in the integrity and privacy of users. So, the
approach needs some protection and adequates that data stored on the cloud can assure
integrity and privacy. That it suggests a secure public auditing scheme applying third
party auditors to authenticate the privacy, reliability, and integrity of data stored in the
cloud. This proposed auditing scheme composes the use of the AES-256 algorithm for
encryption. And perform data dynamics operation which deals with mostly insertion,
deletion, and, modification. Data confidentiality is taken to assure access control
policies and authentication. A secure data storage of cloud computing is presented of a
data auditing scheme.

(i)
LIST OF FIGURES

Figure No Name of the Diagram Page No


6.1.1 Class Diagram 10
6.1.2 Usecase Diagram 11
6.1.3 Sequence Diagram 12
6.1.4 Activity Diagram 13
6.1.5 State Diagram 14
6.1.6 Object Diagram 15
6.2 E-R Diagram 16
6.3 System Architecture 17
10.1 Home Page 39
10.2 Data Owner Page 39
10.3 Upload the file 40
10.4 Uploaded Successfully 40
10.5 Files uploaded by owner 41
10.6 Login Page 41
10.7 User Page 42
10.8 User required files 42
10.9 File request sent 43
10.10 Auditor Page 43
10.11 Track Files 44
10.12 Requested Files 44
10.13 Requested Accepted 45
10.14 Download the files 45
10.15 Enter the secret key 46
10.16 Modify the file 46
10.17 Modified files 47

(ii)
LIST OF ABBREVIATIONS

S.NO ABBREVATION EXPANSION

1 DB Data Base

2 JVM Java Virtual Machine

3 JSP Java Server Page

4 CB Collective Behavior

5 SD Social Dimension

6 JRE Java Runtime Environment

7 SSD Sparse Social Dimension

8 LGP Line Graph Partition

(iii)
A Secure Data Dynamics and Public Auditing Scheme for Cloud
Storage
1. INTRODUCTION

With advanced computational technology over Internet Cloud Computing has become a new
buzz in recent time. Users can access the data stored in the cloud and simultaneously share their
outsourced data. To improve the storage limitation, enterprise and organization outsource their
data to Cloud Service Provider (CSP). Cloud computing ensures more security challenges to
ensure the integrity of outsourced data. Various new ideas give assurance to Data integrity and
confidentiality in better way. The best way to protect the confidential data in cloud is to use
encryption method for data storage and retrieval. Almost all cloud service providers support
encryption for storing the data. Since the cloud servers may return an invalid result in some cases,
such as server hardware or software failure, human maintenance and malicious attack, new forms
of assurance of data integrity and accessibility are required to protect the security and privacy of
cloud user’s data. The new cooperation network model in cloud makes the remote data auditing
schemes become infeasible, where only the data owner can update its data. Obviously, extending
a scheme with an online data owner to update the data for a group is inappropriate for the data
owner. It will cause tremendous communication and computation overhead to data owner, which
will result in the single point of data owner. The major security issue is confidential data stored
in cloud that is outsourced, leading to number of issues related to accountability and handling of
personal identifiable information. This makes the security for data access more necessity.

DEPT. OF CSE, SVEW Page 1


A Secure Data Dynamics and Public Auditing Scheme for Cloud
Storage
2. PROJECT DESCRIPTION

2.1 PROBLEM DEFINITION

Cloud computing is an evolving technology that provides data storage and highly fast computing
services at a very low cost. All data stored in the cloud is handled by their cloud service providers
or the caretaker of the cloud. The data owner is concerned about the authenticity and reliability
of the data stored in the cloud as the data owners. Data can be misappropriated or altered by any
unauthorized user or person. It suggest a secure public auditing scheme applying third party
auditors to authenticate the privacy, reliability, and integrity of data stored in the cloud. This
proposed auditing scheme composes the use of the AES-256 algorithm for encryption. Cloud
computing provides tremendous data storage and computing capabilities to its users. Large
amount of people can store various data onto the cloud without any hesitation or limitations.
Additional security requires a secure cloud storage system with independent efficient auditing
service to check the correctness of outsourced data. Enormous users keep sending the data over
Internet and they are made stored in cloud data centers remotely. The data files can be accessed
by unauthorized users or hackers in the unsecured cloud network. This leads in leaking of
confidential data or data loss during the transmission over the network. Hence securing the cloud
plays a very important role in cloud environment. The data transfer over wireless network across
the globe has to be protected safely from unauthorized usage over the cloud. The data files and
the remote data centers have to be given extra security as well as maintenance capabilities from
hackers or third party intruders. In this regard, data auditing along with privacy preserving,
integrity and dynamic capabilities plays as a proficient method for preventing from various cloud
attacks which is considered in this work. In this work, efficient auditor plays a crucial role in
securing the cloud environment.

DEPT. OF CSE, SVEW Page 2


A Secure Data Dynamics and Public Auditing Scheme for Cloud
Storage
3.COMPUTATIONAL ENVIRONMENT

3.1 SOFTWARE SPECIFICATION

• Operating system : Windows 7 (Service Pack 1), 8, 8.1 and 10


• Front End : HTML, CSS, BOOTSTRAP, JAVASCRIPT
• Coding Language : Java Servlets
• Backend : MYSQL
• Software Tool : ECLIPSE

3.2 HARDWARE SPECIFICATION

• Processor : Pentium Dual Core 2.00GHZ


• Hard disk : 40 GB
• Mouse : Logitech.
• RAM : 4 GB(minimum)
• Keyboard : 110 keys enhanced.

DEPT. OF CSE, SVEW Page 3


A Secure Data Dynamics and Public Auditing Scheme for Cloud
Storage
4.FEASIBILITY STUDY

The feasibility of the project is analyzed in this phase and business proposal is put forth with a
very general plan for the project and some cost estimates. During system analysis the feasibility
study of the proposed system is to be carried out. This is to ensure that the proposed system is
not a burden to the company. For feasibility analysis, some understanding of the major
requirements for the system is essential.
Three key considerations involved in the feasibility analysis are

➢ TECHNICAL FEASIBILITY
➢ ECONOMICAL FEASIBILITY
➢ OPERATIONAL FEASIBILITY

4.1 TECHNICAL FEASIBILITY

The key findings of the investigation are twofold, namely that it is indeed feasible to implement
a cloud-based portal for a global service organization, and there are real prospects of value
creation and service improvement. The small/medium sized global service enterprise, GESA,
is expected to obtain some competitive benefits from leveraging PAAS with cloud computing.
The benefits include reducing costs, business processes improvement, optimization of customer
relationship, and new services creation. It was found that the SCOR model can aid an enterprise
to understand its supply chain in a cloud-based environment. Moreover, modelling processes
and activities should be conducted on three levels, namely processes, sub-processes, and
activities with specific goals and measures in mind. The outcome of modelling processes and
activities allows the enterprise to gain insight into the details of the business processes and
behavior’s on different levels.

DEPT. OF CSE, SVEW Page 4


A Secure Data Dynamics and Public Auditing Scheme for Cloud
Storage

4.2 ECONOMICAL FEASIBILITY

In order to optimize the acquisition process, evaluation criteria of supplier selection aligning
with the agency’s vision and objectives, were developed. The criteria are given in table cost,
quality, safety, service, convenience, and agility. The criteria were based on the needs and goals
of acquisition, and aligned with new services using the cloud-based portal. The new services
include online application, online user identification, online consultant, online database service,
translation service, news collection, newsletter system, online discussion forum, service cost
calculator, and online payment access. The alignment of business needs, technological support,
strategic guidelines, and business processes is a necessary condition for operating the cloud-
based portal for GESA.

4.3 OPERATIONAL FEASIBILITY

Utilizing IT-based solutions is beneficial for the enterprise from four perspectives. Business
processes may be improved via IT enablement in an internal perspective. The Operation
Management Process is supported by a cloud-based supply chain, and the new services provided
by a portal for GESA would strengthen customer management processes and innovation
processes. The agility of the system is positive for dealing with the regulatory and social
processes as well. Furthermore, considering the GESA customer value proposition, a healthy
customer relationship would provide several benefits to applicants, such as lower price, more
service selections, multiple accesses to information, and ease of operation. Moreover, with the
improvement of business processes and customer relationship, the agency would be able to
maintain a positive financial status. IT enablement can improve the cost structure, increase asset
utilization, expand revenue opportunities, and enhance customer value in the financial
perspective. Improvements from different perspectives suggest that the agency would be able to
gain long-term shareholder value.

DEPT. OF CSE, SVEW Page 5


A Secure Data Dynamics and Public Auditing Scheme for Cloud
Storage

5.SYSTEM ANALYSIS
5.1 EXISTING SYSTEM

In existing system data stored in cloud computing are many difficulties in the integrity and
privacy of users. So the approach needs some protection and adequates that data stored on the
cloud can assure integrity and privacy. Prospective a way to support public auditing and
privacy-preserving, in their approach, HLA and BLS signature along with MHT are used and
support data dynamic by the Merkle hash tree. It maintains integrity. In their approach,
confidentiality is not maintained and batch auditing is supported.

5.1.1 Drawbacks of Existing System

• Semantic based keyword search will make time delay.


• The user while searching their required file they must need to enter the exact name of file
then only they can get their required result, this may cause loss of data.

5.2 PROPOSED SYSTEM

In our proposed system a secure public auditing scheme applying third party auditors to
authenticate the privacy, reliability, and integrity of data stored in the cloud. Auditing scheme
composes the use of the AES-256 algorithm for encryption and perform data dynamics
operation which deals with mostly insertion, deletion, and, modification.

5.2.1 Advantages of Proposed System

• Highly fast computing services


• Authenticity and reliability
• Robust auditing
• AES algorithm is used in order to protect the data from the TPA by performing the
encryption, which is AES technique.
• Data Dynamic Operation is used in order to manage the data in the cloud

DEPT. OF CSE, SVEW Page 6


A Secure Data Dynamics and Public Auditing Scheme for Cloud
Storage
6. SYSTEM DESIGN

Systems design is the process of defining the architecture, components, modules, interfaces, and
data for a system to satisfy specified requirements. One could see it as the application of systems
theory to product development. There is some overlap with the disciplines of systems analysis,
systems architecture and systems engineering. If the broader topic of product development
"blends the perspective of marketing, design, and manufacturing into a single approach to product
development, then design is the act of taking the marketing information and creating the design
of the product to be manufactured.

Systems design is therefore the process of defining and developing systems to satisfy specified
requirements of the user.

6.1 UML DIAGRAMS

The Unified Modelling Language (UML) is a standard language for specifying, visualizing,
constructing, and documenting the artifacts of software systems, as well as for business modelling
and other non-software systems. The UML represents a collection of best engineering practices
that have proven successful in the modelling of large and complex systems. The UML is a very
important part of developing objects-oriented software and the software development process.
The UML uses mostly graphical notations to express the design of software projects. Using the
UML helps project teams communicate, explore potential designs, and validate the architectural
design of the software.

As the strategic value of software increases for many companies, the industry looks for
techniques to automate the production of software and to improve quality and reduce cost and
time-to-market. These techniques include component technology, visual programming, patterns
and frameworks. Businesses also seek techniques to manage the complexity of systems as they
increase in scope and scale. In particular, they recognize the need to solve recurring architectural
problems, such as physical distribution, concurrency, replication, security, load balancing and
fault tolerance. Additionally, the development for the World Wide Web, while making some
things

DEPT. OF CSE, SVEW Page 7


A Secure Data Dynamics and Public Auditing Scheme for Cloud
Storage
simpler, has exacerbated these architectural problems. The Unified Modelling Language (UML)
was designed to respond to these needs. Simply, Systems design refers to the process of defining
the architecture, components, modules, interfaces, and data for a system to satisfy specified
requirements which can be done easily through UML diagrams.

Contents of UML
In general, a UML diagram consists of the following features:
➢ Entities -- These may be classes, objects, users or systems behaviors.
➢ Relationship Lines that model the relationships between entities in the system.
➢ Generalization -- a solid line with an arrow that points to a higher abstraction of the
present item.
➢ Association -- a solid line that represents that one entity uses another entity as part of its
behaviour.
➢ Dependency -- a dotted line with an arrowhead that shows one entity depends on the
behaviour of another entity.

In this project four basic UML diagrams have been explained

1) Class Diagram
2) Use Case Diagram
3) Sequence Diagram
4) Activity Diagram
5) State Diagram
6) Object Diagram

DEPT. OF CSE, SVEW Page 8


A Secure Data Dynamics and Public Auditing Scheme for Cloud
Storage
6.1.1 CLASS DIAGRAM

Class diagrams are the main building block in object-oriented modeling. They are used to show
the different objects in a system, their attributes, their operations and the relationships among
them. The different object's are Data owner, Cloud user, Cloud admin these are the objects in this
uml relationships and their properties are uploading the documents, generating key for securing
the data, maintaining the cloud data s then downloading using the key and accessing the cloud
data.

Fig 6.1.1: Class Diagram

DEPT. OF CSE, SVEW Page 9


A Secure Data Dynamics and Public Auditing Scheme for Cloud
Storage
6.1.2 USECASE DIAGRAM

Use case diagrams are a way to capture the system's functionality and requirements in UML
diagrams. It captures the dynamic behavior of a live system. A use case diagram consists of a use
case and an actor. Here, data owner and user having separate registration and login then data
owners will uploading the text document using the symmetric key for encrypting the cloud data.

Fig 6.1.2: Usecase Diagram

DEPT. OF CSE, SVEW Page 10


A Secure Data Dynamics and Public Auditing Scheme for Cloud
Storage
6.1.3 SEQUENCE DIAGRAM

A sequence diagram is a type of interaction diagram because it describes how and in what order
a group of objects works together. These diagrams are used by software developers and business
professionals to understand requirements for a new system or to document an existing process.

Fig 6.1.3: Sequence Diagram

DEPT. OF CSE, SVEW Page 11


A Secure Data Dynamics and Public Auditing Scheme for Cloud
Storage
6.1.4 ACTIVITY DIAGRAM

Activity Diagrams describe how activities are coordinated to provide a service which can be at
different levels of abstraction. Typically, an event needs to be achieved by some operations,
particularly where the operation is intended to achieve a number of different things that require
coordination.

Fig 6.1.4: Activity Diagram

DEPT. OF CSE, SVEW Page 12


A Secure Data Dynamics and Public Auditing Scheme for Cloud
Storage
6.1.5 STATE DIAGRAM:

A state diagram, also known as a state machine diagram or state chart diagram, is an illustration
of the states an object can attain as well as the transitions between those states in the Unified
Modeling Language. Then, all of the possible existing states are placed in relation to the
beginning and the end.

Fig 6.1.5: State Diagram

DEPT. OF CSE, SVEW Page 13


A Secure Data Dynamics and Public Auditing Scheme for Cloud
Storage
6.1.6 OBJECT DIAGRAM:

An object diagram shows this relation between the instantiated classes and the defined
class, and the relation between these objects in the system. They are be useful to explain
smaller portions of your system, when your system class diagram is very complex, and
also sometimes modeling recursive relationship in diagram. The best way to illustrate
what an object diagram look like is to show the object diagram derived from the
corresponding class diagram.

Fig 6.1.6: Object Diagram

DEPT. OF CSE, SVEW Page 14


A Secure Data Dynamics and Public Auditing Scheme for Cloud
Storage
6.2 E-R DIAGRAM

E-R Diagram stands for Entity Relationship Diagram, also known as ERD is a diagram that
displays the relationship of entity sets stored in a database. In other words, ER diagrams help to
explain the logical structure of databases. ER diagrams are created based on three basic concepts:
entities, attributes and relationships.ER Diagrams contain different symbols that use rectangles
to represent entities, ovals to define attributes and diamond shapes to represent relationships.

Fig 6.2: E-R Diagram

DEPT. OF CSE, SVEW Page 15


A Secure Data Dynamics and Public Auditing Scheme for Cloud
Storage
SYSTEM ARCHITECTURE

Fig 6.3: System Architecture

DEPT. OF CSE, SVEW Page 16


A Secure Data Dynamics and Public Auditing Scheme for Cloud
Storage
7. SYSTEM IMPLEMENTATION
7.1 IMPLEMENTATION PROCESS

Implementation is the stage of the project when the theoretical design is turned out into a
working system. Thus, it can be considered to be the most critical stage in achieving a successful
new system and in giving the user, confidence that the new system will work and be effective.

The implementation stage involves careful planning, investigation of the existing system and
its constraints on implementation, designing of methods to achieve changeover and evaluation
of changeover methods.

7.2 MODULES

1. Data owner uploading data


2. Data owner encrypting data
3. Auditor generating key for accessing file
4. Data User downloading files using key
5. Data user dynamic operation using key

DATA OWNER UPLOADING DATA:


Data owner will uploading file into the cloud using some key for encrypting the particular text
document. The data owner can upload and download the file.

DEPT. OF CSE, SVEW Page 17


A Secure Data Dynamics and Public Auditing Scheme for Cloud
Storage
DATA OWNER ENCRYPTING DATA:
Data owner outsourcing the data to the cloud while uploading the data it will be encrypting the
file then it will be placed in the cloud in encrypted format.

AUDITOR GENERATING KEY FOR ACCESSING FILE:


The auditor will maintaining everything in the cloud, then they generate key for data which is
presented in the cloud and then response which user sent a request for particular file and then
track file.

DEPT. OF CSE, SVEW Page 18


A Secure Data Dynamics and Public Auditing Scheme for Cloud
Storage
DATA USER DOWNLOADING FILES USING KEY:
The data user downloading files before that they need to request the key from the auditor after
that key will be apply in the cloud finally they can download required file.

DATA USER DYNAMIC OPERATION USING KEY:


Data user can update, delete and modify data using key and that user modified data’s can be
viewed by admin, data owner and auditor.

DEPT. OF CSE, SVEW Page 19


A Secure Data Dynamics and Public Auditing Scheme for Cloud
Storage
8. TESTING
A “program unit” stands for a routine or a collection of routines implemented by an individual
programmer. It might even be a stand-alone program or a functional unit a larger program.

8.1 Unit testing


Unit testing involves the design of test cases that validate that the internal program logic is
functioning properly, and that program input produce valid outputs. All decision branches and
internal code flow should be validated. It is the testing of individual software units of the
application .it is done after the completion of an individual unit before integration. This is a
structural testing, that relies on knowledge of its construction and is invasive. Unit tests perform
basic tests at component level and test a specific business process, application, and/or system
configuration. Unit tests ensure that each unique path of a business process performs accurately
to the documented specifications and contains clearly defined inputs and expected results.

8.2 Functional test


Functional tests provide systematic demonstrations that functions tested are available as specified
by the business and technical requirements, system documentation, and user manuals.
Functional testing is centered on the following items:
Valid Input : identified classes of valid input must be accepted.
Invalid Input : identified classes of invalid input must be rejected.
Functions : identified functions must be exercised.
Output : identified classes of application outputs must be exercised.
Systems/ Procedures: interfacing systems or procedures must be invoked.

8.3 System Test


System testing ensures that the entire integrated software system meets requirements. It tests a
configuration to ensure known and predictable results. An example of system testing is the
configuration-oriented system integration test. System testing is based on process descriptions
and flows, emphasizing pre-driven process links and integration points.

DEPT. OF CSE, SVEW Page 20


A Secure Data Dynamics and Public Auditing Scheme for Cloud
Storage
8.4 Performance Testing
The Performance test ensures that the output be produced within the time limits, and the time
taken by the system for compiling, giving response to the users and request being send to the
system for to retrieve the results.

8.5 Integration Testing


Software integration testing is the incremental integration testing of two or more integrated
software components on a single platform to produce failures caused by interface defects.

8.6 Acceptance Testing


User Acceptance Testing is a critical phase of any project and requires significant participation
by the end user. It also ensures that the system meets the functional requirements.

Acceptance testing for Data Synchronization:


➢ The Acknowledgements will be received by the Sender Node after the Packets are received
by the Destination Node.
➢ The Route add operation is done only when there is a Route request in need.
➢ The Status of Nodes information is done automatically in the cache updation process.

DEPT. OF CSE, SVEW Page 21


A Secure Data Dynamics and Public Auditing Scheme for Cloud
Storage
9. SAMPLE SOURCE CODE

FileRequest.jsp
<%@ page language="java" contentType="text/html; charset=ISO-8859-1"
pageEncoding="ISO-8859-1"%>
<%@ page import="com.Dynamic.Database.DatabaseConnection"%>
<%@ page import="java.sql.ResultSet"%>
<%@ page import="java.util.*" %>
<%@ page import="java.sql.*" %>
<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">
<title>File Request | Success</title>
</head>
<body>
<%
String filename = request.getParameter("fname");
String filesize = request.getParameter("fsize");
String duser = session.getAttribute("duser").toString();

String dprovider = "" ;


System.out.println("Data request"+filename+"-"+filesize+"-"+duser);

try {
Class.forName("com.mysql.jdbc.Driver");
Connection con =
(Connection)DriverManager.getConnection("jdbc:mysql://localhost:3306/dynamicdat
aauditing","root","root");
Statement st = con.createStatement();
ResultSet rs = st.executeQuery("select * from uploadfile where filename =
'"+filename+"' and size = '"+filesize+"'");
while(rs.next()) {
dprovider = rs.getString("username");
}
}catch(Exception e) {

}
System.out.println(dprovider);

int ans=0;
try {
Connection con =
(Connection)DriverManager.getConnection("jdbc:mysql://localhost:3306/dynamicdat
aauditing","root","root");
PreparedStatement ps = con.prepareStatement("INSERT INTO
filerequest(fileowner,filename,filesize,requestby,status) VALUES(?,?,?,?,?)");
ps.setString(1, dprovider);
ps.setString(2, filename);
ps.setString(3, filesize);
ps.setString(4, duser);
ps.setString(5, "Waiting");
ans = ps.executeUpdate();
}

DEPT. OF CSE, SVEW Page 22


A Secure Data Dynamics and Public Auditing Scheme for Cloud
Storage
catch(Exception e) {
e.printStackTrace();

}
if(ans==1) {
response.sendRedirect("FileReqSuccess.jsp");
} else {
response.sendRedirect("UserHome.jsp");
}
%>
</body>
</html>

UserFileRequest.jsp
<%@ page language="java" contentType="text/html; charset=ISO-8859-1"
pageEncoding="ISO-8859-1"%>
<%@page import="com.Dynamic.Database.DatabaseConnection"%>
<%@page import="java.sql.ResultSet"%>
<%@page import="java.util.*" %>
<%@page import="java.sql.*" %>
<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">
<title>Data User | File Request</title>
<link href="//maxcdn.bootstrapcdn.com/bootstrap/3.3.0/css/bootstrap.min.css"
rel="stylesheet" id="bootstrap-css">
<script
src="//maxcdn.bootstrapcdn.com/bootstrap/3.3.0/js/bootstrap.min.js"></script>
<script src="//code.jquery.com/jquery-1.11.1.min.js"></script>
<script
src="http://ajax.googleapis.com/ajax/libs/jquery/1.9.1/jquery.min.js"></script>
<script src="http://getbootstrap.com/dist/js/bootstrap.min.js"></script>
</head>
<body>
<%
String dprovider=session.getAttribute("dprovider").toString();
session.setAttribute("dprovider", dprovider);
%>

<div class="container">
<div class="row">

<div class="col-md-12">
<h4>Requested Files</h4> <br>
<div class="table-responsive">
<%
try
{
Class.forName("com.mysql.jdbc.Driver");
Connection con=(Connection)DriverManager.getConnection(
"jdbc:mysql://localhost:3306/dynamicdataauditing","root","root");
Statement st=con.createStatement();
ResultSet rs=st.executeQuery("select * from filerequest where
fileowner='"+dprovider+"' and status='Waiting'");

DEPT. OF CSE, SVEW Page 23


A Secure Data Dynamics and Public Auditing Scheme for Cloud
Storage
%>
<table id="mytable" class="table table-bordred table-striped">
<thead>
<tr>
<th>File Number</th>
<th>File Name</th>
<th>File Size</th>
<th>Request By</th>
<th>Status</th>
<th>Action</th>
</tr>
</thead>

<tbody>
<%
int i=1;
while(rs.next())
{
%>

<tr>
<td><%=i%></td>
<td><%=rs.getString("filename") %></td>
<td><%=rs.getString("filesize") %></td>
<td><%=rs.getString("requestby") %></td>
<td><%=rs.getString("status") %></td>
<td><a href="FileAccept.jsp?fname=<%=rs.getString("filename")
%>&reqby=<%=rs.getString("requestby") %>">Accept</a></td>

</tr>
<%
i++;
}%>

</tbody>

</table>
<%}
catch(Exception e){

e.printStackTrace();%> <%
}

%>
</div>
</div>
</div>
</div>
<div class="modal fade" id="edit" tabindex="-1" role="dialog" aria-
labelledby="edit" aria-hidden="true">
<div class="modal-dialog">
<div class="modal-content">
<div class="modal-header">
<button type="button" class="close" data-dismiss="modal" aria-
hidden="true"><span class="glyphicon glyphicon-remove" aria-
hidden="true"></span></button>
<h4 class="modal-title custom_align" id="Heading">Edit Your Detail</h4>
</div>
<div class="modal-body">

DEPT. OF CSE, SVEW Page 24


A Secure Data Dynamics and Public Auditing Scheme for Cloud
Storage
<div class="form-group">
<input class="form-control " type="text" placeholder="Mohsin">
</div>
<div class="form-group">
<input class="form-control " type="text" placeholder="Irshad">
</div>
<div class="form-group">
<textarea rows="2" class="form-control" placeholder="CB 106/107 Street
# 11 Wah Cantt Islamabad Pakistan"></textarea>
</div>
</div>
<div class="modal-footer ">
<button type="button" class="btn btn-warning btn-lg" style="width:
100%;"><span class="glyphicon glyphicon-ok-sign"></span> Update</button>
</div>
</div>
<!-- /.modal-content -->
</div>
<!-- /.modal-dialog -->
</div>
<div class="modal fade" id="delete" tabindex="-1" role="dialog" aria-
labelledby="edit" aria-hidden="true">
<div class="modal-dialog">
<div class="modal-content">
<div class="modal-header">
<button type="button" class="close" data-dismiss="modal" aria-
hidden="true"><span class="glyphicon glyphicon-remove" aria-
hidden="true"></span></button>
<h4 class="modal-title custom_align" id="Heading">Delete this entry</h4>
</div>
<div class="modal-body">

<div class="alert alert-danger"><span class="glyphicon glyphicon-warning-


sign"></span> Are you sure you want to delete this Record?</div>

</div>
<div class="modal-footer ">
<button type="button" class="btn btn-success" ><span class="glyphicon
glyphicon-ok-sign"></span> Yes</button>
<button type="button" class="btn btn-default" data-dismiss="modal"><span
class="glyphicon glyphicon-remove"></span> No</button>
</div>
</div>
</div>
</div>
<script type="text/javascript" src="Table/table.js"></script>
<script>
$(document).ready(function(){
$("#mytable #checkall").click(function () {
if ($("#mytable #checkall").is(':checked')) {
$("#mytable input[type=checkbox]").each(function () {
$(this).prop("checked", true);
});

} else {
$("#mytable input[type=checkbox]").each(function () {
$(this).prop("checked", false);
});
}

DEPT. OF CSE, SVEW Page 25


A Secure Data Dynamics and Public Auditing Scheme for Cloud
Storage
});

$("[data-toggle=tooltip]").tooltip();
});
</script>
</body>
</html>

DataOwner.jsp
<%@ page language="java" contentType="text/html; charset=ISO-8859-1"
pageEncoding="ISO-8859-1"%>
<%@page import="com.Dynamic.Database.DatabaseConnection"%>
<%@page import="java.sql.ResultSet"%>
<%@page import="java.util.*" %>
<%@page import="java.sql.*" %>
<%@page import="java.sql.*"%>
<%@page import="java.sql.ResultSet"%>
<%@ page import="java.util.List" %>
<%@ page import="java.sql.*" %>
<%@ page import="pcloud.*" %>
<%@ page import="java.util.*" %>
<%@ page import="java.io.File" %>
<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">
<title>Data Owners</title>
<link href="//maxcdn.bootstrapcdn.com/bootstrap/3.3.0/css/bootstrap.min.css"
rel="stylesheet" id="bootstrap-css">
<script
src="//maxcdn.bootstrapcdn.com/bootstrap/3.3.0/js/bootstrap.min.js"></script>
<script src="//code.jquery.com/jquery-1.11.1.min.js"></script>
<!------ Include the above in your HEAD tag ---------->
<script
src="http://ajax.googleapis.com/ajax/libs/jquery/1.9.1/jquery.min.js"></script>
<script src="http://getbootstrap.com/dist/js/bootstrap.min.js"></script>
</head>
<body>
<%
try{
File file = new File("E:\\Temp");
String[] myFiles;
if(file.isDirectory()){
myFiles = file.list();
for (int i=0; i<myFiles.length; i++) {
File myFile = new File(file, myFiles[i]);
myFile.delete();
}
}
PCloudAPI conn=new PCloudAPI();
Hashtable <String, Object> params=new Hashtable <String, Object> ();
params.put("username", "cloudproject18032019@gmail.com");
params.put("password", "18032019");
params.put("folderid", "3126483280");
Object res=conn.sendCommand("listfolder", params);
if (PCloudAPI.resultGetLong(res, "result")!=0){

DEPT. OF CSE, SVEW Page 26


A Secure Data Dynamics and Public Auditing Scheme for Cloud
Storage
System.out.println("Error: "+PCloudAPI.resultGetString(res, "error"));
return;
}
%>

<div class="container">
<div class="row">
<div class="col-md-12">
<h4>Data Owners </h4> <br>
<div class="table-responsive">
<table id="mytable" class="table table-bordred table-striped">

<thead>
<tr>
<!-- <th><input type="checkbox" id="checkall" /></th> -->
<th>S.no</th>
<th>Name</th>
<th>User name</th>
<th>Password</th>
<th>Email</th>
<th>Address</th>
</tr>
</thead>
<%
Object[] contents=PCloudAPI.resultGetArray(PCloudAPI.resultGetHashtable(res,
"metadata"), "contents");
for (int i=0; i<contents.length; i++){

Object entry=contents[i];
if (PCloudAPI.resultGetBoolean(entry, "isfolder"))
System.out.println("Folder: "+PCloudAPI.resultGetString(entry,
"name")+" Id :"+PCloudAPI.resultGetString(entry, "id"));
else
System.out.println("File: "+PCloudAPI.resultGetString(entry, "name")+"
Size: "+PCloudAPI.resultGetLong(entry, "size")+" Id:
"+PCloudAPI.resultGetString(entry, "id"));
try
{
Class.forName("com.mysql.jdbc.Driver");
Connection con=(Connection)DriverManager.getConnection(
"jdbc:mysql://localhost:3306/dynamicdataauditing","root","root");
Statement st=con.createStatement();
ResultSet rs=st.executeQuery("select * from doreg");
%>

<tbody>
<%
int ii=1;
if(i<1)
{
while(rs.next())
{
%>
<tr>
<td><%=ii%></td>
<!-- <td><input type="checkbox" class="checkthis" /></td> -->

<td><%=rs.getString("name") %></td>
<td><%=rs.getString("uname") %></td>

DEPT. OF CSE, SVEW Page 27


A Secure Data Dynamics and Public Auditing Scheme for Cloud
Storage
<td><%=rs.getString("pass") %></td>
<td><%=rs.getString("email") %></td>
<td><%=rs.getString("addr") %></td>
</tr>
<%
ii++;
}
}%>

</tbody>

</table>

<%}
catch(Exception e){
out.print(e.getMessage());%><br><%
}
}
}
catch(Exception e){
e.printStackTrace();
}

%>
</div>

</div>
</div>
</div>
<div class="modal fade" id="edit" tabindex="-1" role="dialog" aria-
labelledby="edit" aria-hidden="true">
<div class="modal-dialog">
<div class="modal-content">
<div class="modal-header">
<button type="button" class="close" data-dismiss="modal" aria-
hidden="true"><span class="glyphicon glyphicon-remove" aria-
hidden="true"></span></button>
<h4 class="modal-title custom_align" id="Heading">Edit Your Detail</h4>
</div>
<div class="modal-body">
<div class="form-group">
<input class="form-control " type="text" placeholder="Mohsin">
</div>
<div class="form-group">

<input class="form-control " type="text" placeholder="Irshad">


</div>
<div class="form-group">
<textarea rows="2" class="form-control" placeholder="CB 106/107 Street
# 11 Wah Cantt Islamabad Pakistan"></textarea>
</div>
</div>
<div class="modal-footer ">
<button type="button" class="btn btn-warning btn-lg" style="width:
100%;"><span class="glyphicon glyphicon-ok-sign"></span> Update</button>
</div>
</div>
</div>
</div>

DEPT. OF CSE, SVEW Page 28


A Secure Data Dynamics and Public Auditing Scheme for Cloud
Storage
<div class="modal fade" id="delete" tabindex="-1" role="dialog" aria-
labelledby="edit" aria-hidden="true">
<div class="modal-dialog">
<div class="modal-content">
<div class="modal-header">
<button type="button" class="close" data-dismiss="modal" aria-
hidden="true"><span class="glyphicon glyphicon-remove" aria-
hidden="true"></span></button>
<h4 class="modal-title custom_align" id="Heading">Delete this entry</h4>
</div>
<div class="modal-body">

<div class="alert alert-danger"><span class="glyphicon glyphicon-warning-


sign"></span> Are you sure you want to delete this Record?</div>

</div>
<div class="modal-footer ">
<button type="button" class="btn btn-success" ><span class="glyphicon
glyphicon-ok-sign"></span> Yes</button>
<button type="button" class="btn btn-default" data-
dismiss="modal"><span class="glyphicon glyphicon-remove"></span> No</button>
</div>
</div>
<!-- /.modal-content -->
</div>
<!-- /.modal-dialog -->
</div>
<script type="text/javascript" src="Table/table.js"></script>
<script>
$(document).ready(function(){
$("#mytable #checkall").click(function () {
if ($("#mytable #checkall").is(':checked')) {
$("#mytable input[type=checkbox]").each(function () {
$(this).prop("checked", true);
});

} else {
$("#mytable input[type=checkbox]").each(function () {
$(this).prop("checked", false);
});
}
});

$("[data-toggle=tooltip]").tooltip();
});
</script>
</body>
</html>
<%@ page language="java" contentType="text/html; charset=ISO-8859-1"
pageEncoding="ISO-8859-1"%>
<%@page import="com.Dynamic.Database.DatabaseConnection"%>
<%@page import="java.sql.ResultSet"%>
<%@page import="java.util.*" %>
<%@page import="java.sql.*" %>
<%@page import="java.sql.*"%>
<%@page import="java.sql.ResultSet"%>
<%@ page import="java.util.List" %>
<%@ page import="java.sql.*" %>

DEPT. OF CSE, SVEW Page 29


A Secure Data Dynamics and Public Auditing Scheme for Cloud
Storage
<%@ page import="pcloud.*" %>
<%@ page import="java.util.*" %>
<%@ page import="java.io.File" %>
<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">
<title>Data Users</title>
<link href="//maxcdn.bootstrapcdn.com/bootstrap/3.3.0/css/bootstrap.min.css"
rel="stylesheet" id="bootstrap-css">
<script
src="//maxcdn.bootstrapcdn.com/bootstrap/3.3.0/js/bootstrap.min.js"></script>
<script src="//code.jquery.com/jquery-1.11.1.min.js"></script>
<!------ Include the above in your HEAD tag ---------->
<script
src="http://ajax.googleapis.com/ajax/libs/jquery/1.9.1/jquery.min.js"></script>
<script src="http://getbootstrap.com/dist/js/bootstrap.min.js"></script>
</head>
<body>
<%
try{
File file = new File("E:\\Temp");
String[] myFiles;
if(file.isDirectory()){
myFiles = file.list();
for (int i=0; i<myFiles.length; i++) {
File myFile = new File(file, myFiles[i]);
myFile.delete();
}
}
PCloudAPI conn=new PCloudAPI();
Hashtable <String, Object> params=new Hashtable <String, Object> ();
params.put("username", "cloudproject18032019@gmail.com");
params.put("password", "18032019");
params.put("folderid", "3126483280");
Object res=conn.sendCommand("listfolder", params);
if (PCloudAPI.resultGetLong(res, "result")!=0){
System.out.println("Error: "+PCloudAPI.resultGetString(res, "error"));
return;
}
%>

<div class="container">
<div class="row">

<div class="col-md-12">
<h4>Data Users </h4> <br>
<div class="table-responsive">
<table id="mytable" class="table table-bordred table-striped">
<thead>
<tr>
<!-- <th><input type="checkbox" id="checkall" /></th> -->
<th>S.no</th>
<th>Name</th>
<th>User name</th>
<th>Password</th>
<th>Email</th>

DEPT. OF CSE, SVEW Page 30


A Secure Data Dynamics and Public Auditing Scheme for Cloud
Storage
<th>Address</th>
</tr>
</thead>
<%
Object[] contents=PCloudAPI.resultGetArray(PCloudAPI.resultGetHashtable(res,
"metadata"), "contents");
for (int i=0; i<contents.length; i++){

Object entry=contents[i];
if (PCloudAPI.resultGetBoolean(entry, "isfolder"))
System.out.println("Folder: "+PCloudAPI.resultGetString(entry,
"name")+" Id :"+PCloudAPI.resultGetString(entry, "id"));
else
System.out.println("File: "+PCloudAPI.resultGetString(entry, "name")+"
Size: "+PCloudAPI.resultGetLong(entry, "size")+" Id:
"+PCloudAPI.resultGetString(entry, "id"));
try
{
Class.forName("com.mysql.jdbc.Driver");
Connection con=(Connection)DriverManager.getConnection(
"jdbc:mysql://localhost:3306/dynamicdataauditing","root","root");
Statement st=con.createStatement();
ResultSet rs=st.executeQuery("select * from dureg");
%>

<tbody>
<%
int ii=1;
if(i<1)
{
while(rs.next())
{
%>

<tr>
<td><%=ii%></td>
<!-- <td><input type="checkbox" class="checkthis" /></td> -->

<td><%=rs.getString("name") %></td>
<td><%=rs.getString("uname") %></td>
<td><%=rs.getString("pass") %></td>
<td><%=rs.getString("email") %></td>
<td><%=rs.getString("addr") %></td>

</tr>
<%
ii++;
}
}%>

</tbody>

</table>

<%}
catch(Exception e){
out.print(e.getMessage());%><br><%
}
}

DEPT. OF CSE, SVEW Page 31


A Secure Data Dynamics and Public Auditing Scheme for Cloud
Storage
}
catch(Exception e){
e.printStackTrace();
}

%>
</div>
</div>
</div>
</div>
<div class="modal fade" id="edit" tabindex="-1" role="dialog" aria-
labelledby="edit" aria-hidden="true">
<div class="modal-dialog">
<div class="modal-content">
<div class="modal-header">
<button type="button" class="close" data-dismiss="modal" aria-
hidden="true"><span class="glyphicon glyphicon-remove" aria-
hidden="true"></span></button>
<h4 class="modal-title custom_align" id="Heading">Edit Your Detail</h4>
</div>
<div class="modal-body">
<div class="form-group">
<input class="form-control " type="text" placeholder="Mohsin">
</div>
<div class="form-group">

<input class="form-control " type="text" placeholder="Irshad">


</div>
<div class="form-group">
<textarea rows="2" class="form-control" placeholder="CB 106/107 Street
# 11 Wah Cantt Islamabad Pakistan"></textarea>
</div>
</div>
<div class="modal-footer ">
<button type="button" class="btn btn-warning btn-lg" style="width:
100%;"><span class="glyphicon glyphicon-ok-sign"></span> Update</button>
</div>
</div>
<!-- /.modal-content -->
</div>
<!-- /.modal-dialog -->
</div>
<div class="modal fade" id="delete" tabindex="-1" role="dialog" aria-
labelledby="edit" aria-hidden="true">
<div class="modal-dialog">
<div class="modal-content">
<div class="modal-header">
<button type="button" class="close" data-dismiss="modal" aria-
hidden="true"><span class="glyphicon glyphicon-remove" aria-
hidden="true"></span></button>
<h4 class="modal-title custom_align" id="Heading">Delete this entry</h4>
</div>
<div class="modal-body">
<div class="alert alert-danger"><span class="glyphicon glyphicon-
warning-sign"></span> Are you sure you want to delete this Record?</div>
</div>
<div class="modal-footer ">
<button type="button" class="btn btn-success" ><span class="glyphicon
glyphicon-ok-sign"></span> Yes</button>

DEPT. OF CSE, SVEW Page 32


A Secure Data Dynamics and Public Auditing Scheme for Cloud
Storage
<button type="button" class="btn btn-default" data-dismiss="modal"><span
class="glyphicon glyphicon-remove"></span> No</button>
</div>
</div>
<!-- /.modal-content -->
</div>
<!-- /.modal-dialog -->
</div>
<script type="text/javascript" src="Table/table.js"></script>
<script>
$(document).ready(function(){
$("#mytable #checkall").click(function () {
if ($("#mytable #checkall").is(':checked')) {
$("#mytable input[type=checkbox]").each(function () {
$(this).prop("checked", true);
});

} else {
$("#mytable input[type=checkbox]").each(function () {
$(this).prop("checked", false);
});
}
});

$("[data-toggle=tooltip]").tooltip();
});
</script>
</body>
</html>

DEPT. OF CSE, SVEW Page 33


A Secure Data Dynamics and Public Auditing Scheme for Cloud
Storage
DoRegister.java
package com.Dynamic.Servlet;
import java.io.IOException;
import javax.servlet.ServletException;
import javax.servlet.annotation.WebServlet;
import javax.servlet.http.HttpServlet;
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletResponse;
import com.Dynamic.Bean.UserBean;
import com.Dynamic.Implementation.DynamicImplementation;
import com.Dynamic.Interface.DynamicInterface;
@WebServlet("/DoRegister")
public class DoRegister extends HttpServlet {
private static final long serialVersionUID = 1L;
public DoRegister() {
super();
}
protected void doGet(HttpServletRequest request, HttpServletResponse response)
throws ServletException, IOException {
response.getWriter().append("served at :").append(request.getContextPath());
}
protected void doPost(HttpServletRequest request, HttpServletResponse response)
throws ServletException, IOException {
doGet(request, response);
String name = request.getParameter("name");
String uname = request.getParameter("username");
String mail = request.getParameter("email");
String pass = request.getParameter("password");
String rpass = request.getParameter("conpassword");
String con = request.getParameter("contact");
String addr = request.getParameter("address");
DEPT. OF CSE, SVEW Page 34
A Secure Data Dynamics and Public Auditing Scheme for Cloud
Storage
System.out.println(name+"--"+uname+"--"+mail+"--"+pass+"=="+rpass+"--
"+con+"--"+addr);
if(pass.equals(rpass)) {
System.out.println("User name and password matched----YES");
UserBean ub = new UserBean();
ub.setName(name);
ub.setUsername(uname);
ub.setEmail(mail);
ub.setPassword(pass);
ub.setContact(con);
ub.setAddress(addr);
DynamicInterface di = new DynamicImplementation();
int k = di.doregister(ub);
System.out.println("The k value is:"+k);
if(k==1) {
response.sendRedirect("OwnerLogin.jsp");
} else {
response.sendRedirect("error.jsp");
}
}
}
}

DEPT. OF CSE, SVEW Page 35


A Secure Data Dynamics and Public Auditing Scheme for Cloud
Storage
DoLogin.java
package com.Dynamic.Servlet;
import java.io.IOException;
import javax.servlet.ServletException;
import javax.servlet.annotation.WebServlet;
import javax.servlet.http.HttpServlet;
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletResponse;
import javax.servlet.http.HttpSession;
import com.Dynamic.Implementation.DynamicImplementation;
import com.Dynamic.Interface.DynamicInterface;
@WebServlet("/DoLogin")
public class DoLogin extends HttpServlet{
private static final long serialVersionUID = 1L;
public DoLogin() {
super();
}
protected void doGet(HttpServletRequest request, HttpServletResponse response)
throws ServletException, IOException {
response.getWriter().append("Served at
:").append(request.getContextPath());
}
protected void doPost(HttpServletRequest request, HttpServletResponse
response) throws ServletException, IOException {
doGet(request, response);
String usname = request.getParameter("username");
String passss = request.getParameter("password");
System.out.println(usname+""+passss);
DynamicInterface di = new DynamicImplementation();
int k = di.dolog(usname,passss);

DEPT. OF CSE, SVEW Page 36


A Secure Data Dynamics and Public Auditing Scheme for Cloud
Storage
System.out.println("the value of k is:"+k);
if(k==1) {
HttpSession session = request.getSession();
session.setAttribute("dprovider", usname);
response.sendRedirect("OwnerHome.jsp");
} else {
response.sendRedirect("error.jsp");
}
}
}

DEPT. OF CSE, SVEW Page 37


A Secure Data Dynamics and Public Auditing Scheme for Cloud
Storage
10.SCREENSHOTS

Fig 10.1: Home Page

Fig 10.2: Data Owner Page

DEPT. OF CSE, SVEW Page 38


A Secure Data Dynamics and Public Auditing Scheme for Cloud
Storage

Fig 10.3: Upload the file

Fig 10.4: Uploaded Successfully

DEPT. OF CSE, SVEW Page 39


A Secure Data Dynamics and Public Auditing Scheme for Cloud
Storage

Fig 10.5: Files uploaded by owner

Fig 10.6: Login Page

DEPT. OF CSE, SVEW Page 40


A Secure Data Dynamics and Public Auditing Scheme for Cloud
Storage

Fig 10.7: User Page

Fig 10.8: User required files

DEPT. OF CSE, SVEW Page 41


A Secure Data Dynamics and Public Auditing Scheme for Cloud
Storage

Fig 10.9: File request sent

Fig 10.10: Auditor Page

DEPT. OF CSE, SVEW Page 42


A Secure Data Dynamics and Public Auditing Scheme for Cloud
Storage

Fig 10.11: Track files

Fig 10.12: Requested Files

DEPT. OF CSE, SVEW Page 43


A Secure Data Dynamics and Public Auditing Scheme for Cloud
Storage

Fig 10.13: Request accepted

Fig 10.14: Download the file

DEPT. OF CSE, SVEW Page 44


A Secure Data Dynamics and Public Auditing Scheme for Cloud
Storage

Fig 10.15: Enter the secret key

Fig 10.16: Modify the file

DEPT. OF CSE, SVEW Page 45


A Secure Data Dynamics and Public Auditing Scheme for Cloud
Storage

Fig 10.17: Modified files

DEPT. OF CSE, SVEW Page 46


A Secure Data Dynamics and Public Auditing Scheme for Cloud
Storage
11. CONCLUSION

A secure auditing method is to store the data on the cloud in a secure manner. The prospective
take the AES-256 algorithm to assure that TPA cannot knowledge about data toward the
robustness auditing scheme. We propose a data dynamics operation with mostly deal insertion,
deletion and, modification. In the future, we would like to perform a batch auditing method of
data.

DEPT. OF CSE, SVEW Page 47


A Secure Data Dynamics and Public Auditing Scheme for Cloud
Storage
11. REFERENCES

✓ The global cloud computing market report 2019.

✓ J Agarkhed, R Ashalatha-”An efficient auditing scheme for data storage security in

cloud”.2017[ICCPCT].

✓ SK Saroj, G Noida, SK Chauhan, AK Sharma “Threshold cryptography based data security

in cloud computing”.S Vats-2015.

✓ Mell, Peter, and Tim Grance.The NIST definition of cloud computing (2011).

✓ P.Mell and T.Grance,”The NIST definition of cloud computing”, National Institute of

Standards and Technology, Tech. Rep., 2009.

✓ Swapnali Morea, Sangita Chaudhari,”Third Party Public Auditing Scheme for Cloud Storage

“,International Journal of Prpcedia Computer Science ,Volume 79,pp.69-76,2016.

✓ Zissis, Dimitrios, and Dimitrios Lekkas. Addressing cloud computing security issues. Future

Generation computer systems 28.3(2012):583-592.

✓ B.L Adokshaja, and S.J.Saritha,”Third Party Public Auditing on Cloud Storage using the

Cryptographic Algorithm”ICECDS-2017.

✓ Cong Wang, Sherman SM Chow, Qian Wang, Kui Ren, and Wenjing Lou.”Privacy

Preserving Public Auditing for Secure Cloud Storage”.

✓ Cong Wong, Sherman S M Chow, Qian Wang, Kui Ren, and Wen jing Lou. “Privacy

Preserving Public Auditing for Secure Cloud Storage”. IEEE Transactions on Computers,

Volume 62, ISSUE 2, February 2013.

DEPT. OF CSE, SVEW Page 48

You might also like