Escolar Documentos
Profissional Documentos
Cultura Documentos
PROJECT REPORT ON
IDENTITY-BASED DISTRIBUTED PROVABLE DATA
POSSESSION IN MULTI-CLOUD STORAGE
CERTIFICATE
J.RACHANA(16090-CM-007),P.NAVEEN(16090-CM-018),B.SWETHA(16090-CM-
submitted to the State Board of Technical Education and Training (TS), Hyderabad is
record of bonafied work carried out by them under our guidance and supervision. The results
embodied in this project report have not been submitted to any other institutions for the award
of Diploma.
B.VENNALA(M.Tech)
PROJECTGUIDE EXTERNAL EXAMINER
I declare that the work reported in the present this entitled “IDENTITY-BASED
The result of this work has not been submitted to any University or any other Institution
CH.SHASHANK 16090-CM-001
K.SHAILAJA 16090-CM-012
J.RACHANA 16090-CM-007
P.NAVEEN 16090-CM-018
B.SWETHA 16090-CM-023
Y.VARSHINI 16090-CM-028
R.ROHITH KALYAN 16090-CM-022
ACKNOWLEDGMENT
Rampur, Warangal for providing all the facilities required for the seminar presentation.
H.O.D of Computer Science Engineering Department for the interest technical support and
We are obliged and great full to my guide B.VENNALA, Lecturer of Computer Science
Engineering Department for his valuable suggestions and sagacious guidance in all aspects
We hereby express our sincere thanks regards to all teaching staff, parents and friends
CH.SHASHANK 16090-CM-001
K.SHAILAJA 16090-CM-012
J.RACHANA 16090-CM-007
P.NAVEEN 16090-CM-018
B.SWETHA 16090-CM-023
Y.VARSHINI 16090-CM-028
R.ROHITH KALYAN 16090-CM-022
ABSTRACT
We are stuck with technology when what we really want is just stuff that works. With the
current paradigm shift in technological field, there is an urgent need to embrace and appreciate
the power of technology. Housing sector remains vigilant to face the challenges of change by
employing a new strategy that facilitates easy management of rental houses. Hence there is
need to develop a rental house management system that can simplify work for the rental
managers so that all their work can be efficient and effective. The Rental management System
is Searching in Based an the Apartment Paying Guest ,Office ,House in metropolitan cities.
The Rental Management System is Based an the Owners and the Customers .The Owner is
updated an the Apartment ,Office details, House , Paying Guest details. The Customer is details
about the Room space , Room rent and the Address Details also. The Rental Management
System is best Suitable an the owners because time save and the only contact an the eligible
person and there is no need to explain the room details an the speak. The Rental Management
System is best application in the city place The customer contact an the easily search an the
suitable place of Apartment , Office , PG, House and based the Money ,Limit Person is based
an the suitable house. The Rental Management System is save an the time also. The Rental
Management System is used to easily identify the suitable place in Save time, cost also. The
Rental Management System is best way to search the house ,Apartment office, Paying Guest
etc….
CONTENTS
1) INTRODUCTION
4) LANGUAGE IMPLEMENTATION
5) SOFTWARE DESIGN
6) TESTING
7) IMPLEMENTATION
8) CONCLUSION
9) BIBILOGRAPHY
ABSTRACT
TABLE OF CONTENTS
1 .INTRODUCTION
2. SYSTEM ANALYSIS
3. SYSTEM STUDY
4. SYSTEM REQUIREMENTS
5.SOFTWARE ENVIRONMENT
1. INTRODUCTION
1.1 What is cloud computing?
Services Models:
Cloud Computing comprises three different service models, namely
Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), and Software-
as-a-Service (SaaS). The three service models or layer are completed by an end
user layer that encapsulates the end user perspective on cloud services. The
model is shown in figure below. If a cloud user accesses services on the
infrastructure layer, for instance, she can run her own applications on the
resources of a cloud infrastructure and remain responsible for the support,
maintenance, and security of these applications herself. If she accesses a service
on the application layer, these tasks are normally taken care of by the cloud
service provider.
1.5 Advantages:
2.SYSTEM ANALYSIS
In POR, the verifier can check the remote data integrity and retrieve the
remote data at any time. On some cases, the client may delegate the remote data
integrity checking task to the third party. It results in the third party auditing in
cloud computing
More expensive.
PROPOSED SYSTEM:
3. SYSTEM STUDY
ECONOMICAL FEASIBILITY
TECHNICAL FEASIBILITY
SOCIAL FEASIBILITY
This study is carried out to check the economic impact that the
system will have on the organization. The amount of fund that the company can
pour into the research and development of the system is limited. The expenditures
must be justified. Thus the developed system as well within the budget and this
was achieved because most of the technologies used are freely available. Only
the customized products had to be purchased.
4. SYSTEM REQUIREMENTS
5. Software Environment
Managed Code
The code that targets .NET, and which contains certain extra
Managed Data
Visual Basic .NET has been updated to include many new and
improved language features that make it a powerful object-oriented
programming language. These features include inheritance, interfaces, and
overloading, among others. Visual Basic also now supports structured exception
handling, custom attributes and also supports multi-threading.
Visual Basic .NET is also CLS compliant, which means that any CLS-
compliant language can use the classes, objects, and components you create in
Visual Basic .NET.
A query is a question that has to be asked the data. Access gathers data
that answers the question from one or more table. The data that make up the
answer is either dynaset (if you edit it) or a snapshot (it cannot be edited).Each
time we run query, we get latest information in the dynaset. Access either
displays the dynaset or snapshot for us to view or perform an action on it, such
as deleting or updating.
6. SYSTEM DESIGN
login
UML DIAGRAMS
GOALS:
The Primary goals in the design of the UML are as follows:
1. Provide users a ready-to-use, expressive visual modeling Language so that
they can develop and exchange meaningful models.
2. Provide extendibility and specialization mechanisms to extend the core
concepts.
3. Be independent of particular programming languages and development
process.
4. Provide a formal basis for understanding the modeling language.
5. Encourage the growth of OO tools market.
6. Support higher level development concepts such as collaborations,
frameworks, patterns and components.
7. Integrate best practices.
USE CASE DIAGRAM:
Registration
File Upload
User
Decrypt the File Blocks
CLASS DIAGRAM:
SEQUENCE DIAGRAM:
MultiCloud Server
DataOwner Verifier User
Registration
Registration
File Upload
ACTIVITY DIAGRAM:
Login
Accept the
File Blocks
Decrypt the File Blocks
Split the Files into Blocks Decrypt the File Blocks
WRONG
CHECK
Upload the Blocks into
MultiCloud Server
CORRECT invalid key
SCREEN SHOTS:
SYSTEM TESTING
The purpose of testing is to discover errors. Testing is the process of trying
to discover every conceivable fault or weakness in a work product. It provides a
way to check the functionality of components, sub assemblies, assemblies and/or
a finished product It is the process of exercising software with the intent of
ensuring that the
Software system meets its requirements and user expectations and does not fail
in an unacceptable manner. There are various types of test. Each test type
addresses a specific testing requirement.
TYPES OF TESTS
Unit testing
Unit testing involves the design of test cases that validate that the internal
program logic is functioning properly, and that program inputs produce valid
outputs. All decision branches and internal code flow should be validated. It is
the testing of individual software units of the application .it is done after the
completion of an individual unit before integration. This is a structural testing,
that relies on knowledge of its construction and is invasive. Unit tests perform
basic tests at component level and test a specific business process, application,
and/or system configuration. Unit tests ensure that each unique path of a business
process performs accurately to the documented specifications and contains
clearly defined inputs and expected results.
Integration testing
Functional test
IMPLEMENTATION
MODULES
Verifier Module:
The public verifier is able to correctly check the integrity of shared data.
The public verifier can audit the integrity of shared data from multi-cloud
with whole Data and accept the file.
In this module public auditor check all files integrity And accept the files
to cloud.
CONCLUSION
In multi-cloud storage, this paper formalizes the ID-DPDP system model and
security model. At the same time, we propose the first ID-DPDP protocol which
is provably secure under the assumption that the CDH problem is hard. Besides
of the elimination of certificate management, our ID-DPDP protocol has also
flexibility and high efficiency. At the same time, the proposed ID-DPDP protocol
can realize private verification, delegated verification and public verification
based on the client’s authorization.
BIBILOGRAPHY
[1] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, D.
Song, “Provable Data Possession at Untrusted Stores”, CCS’07, pp. 598-609,
2007.
Of Diplo