VenkAT 2318264 6thsem Project
VenkAT 2318264 6thsem Project
VenkAT 2318264 6thsem Project
By
N. Venkatesh
July, 2021
`
AT
N. Venkatesh
July,2021
KMM INSTITUTE OF POST GRADUATE STUDIES
CERTIFICATE
REGISTERED NO:2318264
This is to certify that the report entitled Fine-grained Two-factor Access Control for Web-
based Cloud Computing Servicessubmitted by N . VENKATESHin partial fulfillment of the
requirements for the award of the degree of Master of Computer Applications under our supervision
and guidance in the VI semester of course , during the academic year 2020 - 2021.
(External Examiner)
2.
(InternalExaminer)
3.
(Chairman)
takeeG«aa sINCE
TheHoD
Master otComputer Application s
KMM Institute of PG Stu:dias
Dear Sir/k4adam.
Acknowledgments
“Tasksuccessful”makeseveryonehappy.Butthehappinesswillbegoldwithoutglitter
ifwedidn’tstatethepersonswhohavesupportedustomakeit asuccess.Successwill
becrownedtopeoplewhomadeitarealitybutthepeoplewhoseconstantguidanceand
encouragement made it possible will be crowned first on the eve of success. This
acknowledgementtranscendstherealityofformalitywhenwewouldliketoexpressdeep
gratitude and respect to all those people behind the screen who guided, inspired and
helped me for the completion of our project work. I consider myself lucky enough to get
such a good project. This project would add as an asset to my academicprofile.
An endeavor over a long period can be successful only with the advice and
support of many well wishes. We take this opportunity to express our gratitude and
appreciation all of them.
OurspecialthankstoDr.K.VenkataRamana,Principal&HODKMMInstituteof Post
Graduate Studies, Tirupati, for hisencouragement.
We would like to thank to all those who have been a support and an inspiration
and especially the staff in office andlab.
Mr. N.Venkatesh
Abstract
In this paper, we introduce a new fine-grained two-factor authentication (2FA) access
control system for web-based cloud computing services. Specifically, in our proposed 2FA
access control system, an attribute-based access control mechanism is implemented with
the necessity of both user secret key and a lightweight security device. As a user cannot
access the system if s/he does not hold both, the mechanism can enhance the security of
the system, especially in those scenarios where many users share the same computer for
web-based cloud services. In addition, attribute-based control in the system also enables
the cloud server to restrict the access to those users with the same set of attributes while
preserving user privacy, i.e., the cloud server only knows that the user ful fills the required
predicate, but has no idea on the exact identity of the user. Finally, we also carry out a
simulation to demonstrate the practicability of our proposed 2FA system.
List of
Figures
Figure no Title Page no
User registration 69
Admin/user login 70
Admin home 71
View users 71
View products 72
User home 73
Add account
Contents
Acknowledgements i
Abstract ii
Contents iii
ListofFigures
1. Introduction 01
1.1 Organizationprofile 03
1.2 Organizationchart 05
ProjectLayout 05
2.1 Aim 06
ProblemDescription 06
LiteratureSurvey 08
2.3Bottlenecks of ExistingSystem 08
Methodology 08
ProposedSystem 08
3.1 OperationalFeasibility 09
3.2 TechnicalFeasibility 09
3.3 EconomicalFeasibility 10
4. SystemAnalysis 11
4.1.1 Introduction 11
4.1.2 DesignPrinciples 12
4.1.3 DatabaseDesign 13
4.1.4 Normalization 13
4.1.5 DatabaseTable 14
4.2 HIPOChart 14
4.2.1 ModuleDesign 15
4.2.2 Algorithms 15
5. SystemRequirementsAnalysis 16
5.1 HardwareRequirements 18
5.2 SoftwareRequirements 19
5.3 Featuresofsoftware 21
6. SystemDesign 22
6.1 Entity-RelationshipDiagrams 23
6.3 Use-caseDiagram 31
6.4 ActivityDiagram 32
6.5 SequenceDiagram 32
7.Implementation 33
8. System Testing 62
8.1 White Box Testing 59
9. Conclusion 66
10.APPENDICES 67
11.BIBLIOGRAPHY 74
1. Introduction
KMMIPS is an educational society established in 2000 by a group of retired civil servant.
This is an educational society which serves for thebetterment of the student. Initially this
college offers three major programs MCA, MBA and B.Ed.The main aim of the project
“LOAD BALANCING IN CLOUD COMPUTINGUSING ROUND ROBIN ALGORITHM” is to
reduce the network resoures and computer resoures. Every sort of task is performed by
the system, such as registering different types of persons and complaints etc.
Theyunderstandtheimportanceoftiming,gettingdetailsofnecessaryinformationaswell as
storing the information. A rich portfolio of reusable, modular frameworks helps jump
startprojects.
This offers User and Admin maintain, architect, integrate and manage through the
system.
Services:
This system provides its services to which are in the field of providing good helpful online
tourism booking system.
1 KMMIPS::Tirupati
1.1 OrganizationProfile
KMMInstituteofpostgraduatestudiesverypopularlyknownasKMMIPShasemergedas a
major Technological Institute managed by KMM SOCIAL AND EDUCATIONAL
DEVELOPMENT SOCIETY, Tirupathi. The KMM Society has taken the lead role to
establish the institute in academic year 2001-2002. Sprawled over an area of 25 acres,
permanent infrastructural facilities are being developed near Tirupathi-Madanapalli state
HighwayatRamireddypalle.KMMIPShasalreadysecuredtheapprovalfromtheAllIndia
CouncilofTechnicalEducation(AICTE).NewDelhi,andGovernmentofAndhraPradesh and
is affiliated to Sri Venkateswara University,Tirupati.
KMMIPS offers admission into the professional courses MCA and MBA with annual
intake of 180 and 180 seats each. The institution is governed by the chairman Sri
S.Srinivasulugaru, retired IRS (Indian Revenue Service) officer with the support of an
advisory body consisting of the eminent personalities form different fields.
Principal
1.3Introduction:
Cloud computing is a virtual host computer system that enables enterprises to buy, lease,
sell, or distribute software and other digital resources over the internet as an on-demand
service. It no longer depends on a server or a number of machines that physically exist,
as it is a virtual system. There are many applications of cloud computing, such as data
sharing, data storage big data management medical information system etc. End users
access cloud-based applications through a web browser, thin client or mobile app while
the business software and user’s data are stored on servers at a remote location. The
benefits of web-based cloud computing services are huge, which include the ease of
accessibility, reduced costs and capital expenditures, increased operational efficiencies,
scalability, flexibility and immediate time to market.
Though the new paradigm of cloud computing provides great advantages, there are
meanwhile also concerns about security and privacy especially for web- based cloud
services. As sensitive data may be stored in the cloud for sharing purpose or convenient
access; and eligible users may also access the cloud system for various applications and
services, user authentication has become a critical component for any cloud system. A
user is required to login before using the cloud services or accessing the sensitive data
stored in the cloud. There are two problems for the traditional account/password- based
system. First, the traditional account/password- based authentication is not privacy-
preserving. Second, it is common to share a computer among different people. A recently
proposed access control model called attribute-based access control is a good candidate
to tackle the first problem. It not only provides anonymous authentication but also further
defines access control policies based on different attributes of the requester,
environment, or the data object.
Project Layout:
Chapter 1 Introduction: It deals with the overview of the organization and its
administrative hierarchy.
Chapter2GenesisoftheStudy:ItoutlinestheExistingproblem,thesolutionproposed,
methodologyusedandlooksathowthepreliminaryinvestigationcarriedout,whatareall its
scope and objectives and limitations of existing manualsystem.
Chapter 3 Feasibility Study: It is used to test the feasibility of the project i.e.,
Operational, Technical and Economical feasibilities of the system.
Chapter 4 System Analysis: It deals with software requirement analysis. The various
entitiesandtheirrequirementsandtheirrelationshipsarediscussedusingE-RDiagrams.
Chapter 5 System requirements: It explains about the various hardware and software
requirements and their features.
Chapter 6 System Design: It contains the description of all the tables and its attributes,
design priniciples, HIPO charts and user interface design.
Chapter 9 Conclusion:
2. Genesis
ofStudy
This chapter deals with the study of the existing system and describes the need for the
proposed system to overcome the drawbacks in the existing system. It also specifiesthe
objectives, scope of the system and also the methodology for the systemdevelopment.
Hence,thegenesisofthestudyclearlydepictsthefactorsregardingthebeginningofthe existing
system and its extension to the proposed system and it includes thefollowing.
2.1 Aim:
Literature survey is the most important step in software development process. Before
developing the tool it is necessary to determine the time factor, economy n company
strength. Once these things r satisfied, ten next steps are to determine which operating
system and language can be used for developing the tool. Once the programmers start
building the tool the programmers need lot of external support. This support can be
obtained from senior programmers, from book or from websites.
• We study super graph search (SPS), that is, given a query graph q and a graph
database G that contains a collection of graphs , return graphs that have q as a
super graph from G. SPS has broad applications in bioinformatics, chain form tics
and other scientific and commercial fields. Determining whether a graph is a sub
graph (or super graph) of another is an NP-complete problem. Hence, it is
intractable to compute SPS for large graph databases. Two separate indexing
methods, a "filter + verify"-based method and a "prefix-sharing"-based method, have
been studied to efficiently compute SPS. To implement the above two methods, sub
graph patterns are mined from the graph database to build an index. Those sub
graphs are mined to optimize either the filtering gain or the prefix-sharing gain.
However, no single sub graph-mining algorithm considers both gains. This work is
the first one to mine sub graphs to optimize both the filtering gain and the prefix-
2.3 Bottlenecks of ExistingSystem:
Static schemes do not use the system information and are less complex.
The input design is the link between the information system and the user. It comprises the
developing specification and procedures for data preparation and those steps are
necessary to put transaction data in to a usable form for processing can be achieved by
inspecting the computer to read data from a written or printed document or it can occur by
having people keying the data directly into the system. The design of input focuses on
controlling the amount of input required, controlling the errors, avoiding delay, avoiding
extra steps and keeping the process simple. The input is designed in such a way so that it
provides security and ease of use with retaining the privacy. Input Design considered the
following things:
What data should be given as input?
How the data should be arranged or coded?
The dialog to guide the operating personnel in providing input.
Methods for preparing input validations and steps to follow when error occur.
2.4 OBJECTIVES
1. Input Design is the process of converting a user-oriented description of the input into a
computer-based system. This design is important to avoid errors in the data input process
and show the correct direction to the management for getting correct information from the
computerized system.
2.It is achieved by creating user-friendly screens for the data entry to handle large volume
of data. The goal of designing input is to make data entry easier and to be free from errors.
The data entry screen is designed in such a way that all the data manipulates can be
performed. It also provides record viewing facilities.
3. When the data is entered it will check for its validity. Data can be entered with the help of
screens. Appropriate messages are provided as when needed so that the user will not be
in maize of instant. Thus the objective of input design is to create an input layout that is
easy to follow
A quality output is one, which meets the requirements of the end user and presents the
information clearly. In any system results of processing are communicated to the users and
to other system through outputs. In output design it is determined how the information is to
be displaced for immediate need and also the hard copy output. It is the most important
and direct source information to the user. Efficient and intelligent output design improves
the system’s relationship to help user decision-making.
1.Designing computer output should proceed in an organized, well thought out manner; the
right output must be developed while ensuring that each output element is designed so that
people will find the system can use easily and effectively. When analysis design computer
output, they should Identify the specific output that is needed to meet the requirements.
2. Select methods for presenting information.
3. Create document, report, or other formats that contain information produced by the
system.
The output form of an information system should accomplish one or more of the following
objectives.
Convey information about past activities, current status or projections of the
Future.
Signal important events, opportunities, problems, or warnings.
Trigger an action.
Confirm an action.
3. FeasibilityStudy
3.1 FEASIBILITY STUDY
The feasibility of the project is analyzed in this phase and business proposal is put forth
with a very general plan for the project and some cost estimates. During system analysis
the feasibility study of the proposed system is to be carried out. This is to ensure that the
proposed system is not a burden to the company. For feasibility analysis, some
understanding of the major requirements for the system is essential.
ECONOMICAL FEASIBILITY
TECHNICAL FEASIBILITY
SOCIAL FEASIBILITY
3.2ECONOMICAL FEASIBILITY
This study is carried out to check the economic impact that the system will have on the
organization. The amount of fund that the company can pour into the research and
development of the system is limited. The expenditures must be justified. Thus the
developed system as well within the budget and this was achieved because most of the
technologies used are freely available. Only the customized products had to be purchased.
3.3TECHNICAL FEASIBILITY
This study is carried out to check the technical feasibility, that is, the technical
requirements of the system. Any system developed must not have a high demand on the
available technical resources. This will lead to high demands on the available technical
resources. This will lead to high demands being placed on the client. The developed
system must have a modest requirement, as only minimal or null changes are required for
implementing this system.
3.4SOCIAL FEASIBILITY
The aspect of study is to check the level of acceptance of the system by the user.
This includes the process of training the user to use the system efficiently. The user must
not feel threatened by the system, instead must accept it as a necessity. The level of
acceptance by the users solely depends on the methods that are employed to educate the
user about the system and to make him familiar with it. His level of confidence must be
raised so that he is also able to make some constructive criticism, which is welcomed, as
he is the final user of the system.
4. SystemAnalys
is
4.1 THE STUDY OF THESYSTEM
4.1.4 Disadvantages:
Sharing the pruning power of graph is low
● To promote the exchange and development of methods and tools foroperational
analysis as applied to defenseproblems.
Thephysicaldesignrelatestotheactualinputandoutputprocessesofthesystem. This
is laid down in terms of how data is input into a system, how it is verified / authenticated,
how it is processed, and how it is displayed as output. In Physical design, following
requirements about the system aredecided.
1. Inputrequirement,
2. Outputrequirements,
3. Storagerequirements,
4. Processing Requirements,
5. System control and backup orrecovery.
Put another way, the physical portion of systems design can generally be broken down
into three sub-tasks:
.
4.2 INPUT&OUTPUTREPRESENTATION
4.2.2 OBJECTIVES
1. Input Design is the process of converting a user-oriented description of the input into a computer-
based system. This design is important to avoid errors in the data input process and show the
correct direction to the management for getting correct information from the computerized system.
2.It is achieved by creating user-friendly screens for the data entry to handle large volume of data.
The goal of designing input is to make data entry easier and to be free from errors. The data entry
screen is designed in such a way that all the data manipulates can be performed. It also provides
record viewing facilities.
3. When the data is entered it will check for its validity. Data can be entered with the help of
screens. Appropriate messages are provided as when needed so that the user will not be in maize
of instant. Thus the objective of input design is to create an input layout that is easy to follow
4.2.3 OUTPUT DESIGN
A quality output is one, which meets the requirements of the end user and presents the information
clearly. In any system results of processing are communicated to the users and to other system
through outputs. In output design it is determined how the information is to be displaced for
immediate need and also the hard copy output. It is the most important and direct source
information to the user. Efficient and intelligent output design improves the system’s relationship to
help user decision-making.
1. Designing computer output should proceed in an organized, well thought out manner; the right
output must be developed while ensuring that each output element is designed so that people will
find the system can use easily and effectively. When analysis design computer output, they should
Identify the specific output that is needed to meet the requirements.
2. Select methods for presenting information.
3. Create document, report, or other formats that contain information produced by the system.
The output form of an information system should accomplish one or more of the following
objectives.
Convey information about past activities, current status or projections of the
Future.
Signal important events, opportunities, problems, or warnings.
Trigger an action.
Confirm an action.
4.2.4 Installation & Acceptance Stage
During the installation and acceptance stage, the software artifacts, online help,
and initial production data are loaded onto the production server. At this point, all test
casesareruntoverifythecorrectnessandcompletenessofthesoftware.Successfulexecution
ofthetestsuiteisaprerequisitetoacceptanceofthesoftwarebythecustomer.
Aftercustomerpersonnelhaveverifiedthattheinitialproductiondataloadis correct and the
test suite has been executed with satisfactory results,the customer
formally accepts the delivery of the software.
The primary outputs of the installation and acceptance stage include a production
application, a completed acceptance test suite, and a memorandum of customer
acceptance of the software. Finally, the PDR enters the last of the actual labor data into
theprojectscheduleandlockstheprojectasapermanentprojectrecord.Atthispointthe
PDR "locks" the project by archiving all software items, the implementation map, the source
code, and the documentation for future reference.
5. System
Requirements
System requirements gives the idea about what are the necessary things that are needed
for proposed system, which plays very important role in development of any system. This
chapter deals with what are hardware components that are needed for the system,
application software that are required for the development of the system.
The environment deals with the features of software. HTML is used as the front-end tool
and My SQL as a backend. Front end tools help to visualize the system through naked
eyes while back end helps in activities which are unseen to the end user.
5.1 HARDWARE REQUIREMENTS:
Processor - I3/Intel Processor
RAM - 4GB (min)
Hard Disk - 160GB
Key Board - Standard Windows Keyboard
Mouse - Two or Three Button Mouse
Monitor - SVGA
ThepurposeofawebbrowseristoreadHTMLdocumentsandcomposethemintovisible
oraudiblewebpages.ThebrowserdoesnotdisplaytheHTMLtags,butusesthetagsto interpret
the content of the page. HTML describes the structure of a website semantically along
with cues for presentation, making it a markup language rather than a programming
language.
HTML elements form the building blocks of all websites. HTML allows images and
objectstobeembeddedandcanbeusedtocreateinteractiveforms.Itprovidesameans to
create structured documents by denoting structural semantics for text such as headings,
paragraphs, lists, links, quotes and other items. It can embed scripts written in
languages such as JavaScript which affect the behavior of HTML webpages.
It is a style sheet language used for describing the look and formatting of a document
written in a markup language. While most often used to style web
pages and interfaces written in HTML and XHTML, the language can be applied to any
kind of XML document, including plain XML, SVG and XUL. CSS is a cornerstone
specificationofthewebandalmostallwebpagesuseCSSstylesheetstodescribetheir
presentation.
CSS is designed primarily to enable the separation of document content from document
presentation,includingelementssuchasthelayout,colors,andfonts.Thisseparationcan
improve content accessibility, provide more flexibility and control in the specification of
presentation characteristics, enable multiple pages to share formatting, and reduce
complexity and repetition in the structural content.
CSS can also allow the same markup page to be presented in different styles for
different rendering methods, such as on-screen, in print, by voice (when read out by a
speech-based browser or screen reader) and on Braille-based, tactile devices. It can
also be used to allow the web page.
to display differently depending on the screen size or device on which it is being viewed.
While the author of a document typically links that document to a CSS file, readers can
use a different style sheet, perhaps one on their own computer, to override the one the
author has specified. However if the author or the reader did not link the document to a
specific style sheet the default style of the browser will be applied.
My SQL database maintains its own system catalog which contains information related
to:
The system level information for an instance of My SQL is recorded by the master
database. The recorded information includes the following:
1. It is very simple and easy to use, compare to other language it is very simple
and easy, this is widely used all over theworld.
3. Open source means you no need to pay for use jsp, you can free download and
use.
4. JSP code will be run on every platform, Linux, Unix, Mac OS X,Windows.
5. Allows to defined custom tags, the developer can fill conferrable to use any kind,
framework based markup tags inJSP.
6. JSP is easy to learn, easy to understand and easy to develop. JSPs are more
convenient to write than Servlets because they allow you to embed Java code
directlyintoyourHTMLpages,incaseofservletsyouembedHTMLinside ofJava
code.PHP is supported on multipleoperating systems. .
7. In JSP, we can use a lot of tags such as action tags, jstl, custom tags etc. that
reduces thecode.
8. The language has now become a reliable language, efficient and viable. It is
capable of supporting sites that sollicent millions ofdaily
6.SystemDesign
6.1 UML DIAGRAMS
UML stands for Unified Modeling Language. UML is a standardized general-purpose
modeling language in the field of object-oriented software engineering. The standard is
managed, and was created by, the Object Management Group.
The goal is for UML to become a common language for creating models of object
oriented computer software. In its current form UML is comprised of two major
components: a Meta-model and a notation. In the future, some form of method or process
may also be added to; or associated with, UML.
The Unified Modeling Language is a standard language for specifying, Visualization,
Constructing and documenting the artifacts of software system, as well as for business
modeling and other non-software systems.
The UML represents a collection of best engineering practices that have proven
successful in the modeling of large and complex systems.
The UML is a very important part of developing objects oriented software and the
software development process. The UML uses mostly graphical notations to express the
design of software projects.
6.2 GOALS:
The Primary goals in the design of the UML are as follows:
1. Provide users a ready-to-use, expressive visual modeling Language so that they can
develop and exchange meaningful models.
2. Provide extendibility and specialization mechanisms to extend the core concepts.
3. Be independent of particular programming languages and development process.
4. Provide a formal basis for understanding the modeling language.
5. Encourage the growth of OO tools market.
6. Support higher level development concepts such as collaborations, frameworks,
patterns and components.
7. Integrate best practices.
6.3 USE CASE DIAGRAM:
A use case diagram in the Unified Modeling Language (UML) is a type of behavioral
diagram defined by and created from a Use-case analysis. Its purpose is to present a
graphical overview of the functionality provided by a system in terms of actors, their goals
(represented as use cases), and any dependencies between those use cases. The main
purpose of a use case diagram is to show what system functions are performed for which
actor. Roles of the actors in the system can be depicted.
Login
View users
Attribute center
View files
Generate key
Logout
Attribute Center
Registration
Login
Data Owner
Upload files
View files
Check status
Logout
Data Owner
Login
View users
View files
Logout
login
Receiver
View profile
View files
send request
download files
Logout
Receiver
Token Generator
login
View files
Token generator
Check status
Generate key
Logout
1 : login()
2 : registration()
4 : registration()
3 : login()
5 : login()
6 : view file()
7 : view users()
9 : login()
8 : view profile()
11 : send request()
12 : view files() 10 : view file()
15 : generate key()
16 : generate key()
17 : download file()
18 : view files()
19 : check status()
20 : view dataowners()
21 : view users()
22 : view files()
Collaboration Diagram:
In collaboration diagram the method call sequence is indicated by some numbering
technique as shown below. The number indicates how the methods are called one after
another. We have taken the same order management system to describe the collaboration
diagram. The method calls are similar to that of a sequence diagram. But the difference is
that the sequence diagram does not describe the object organization where as the
collaboration diagram shows the object organization.
ACTIVITY DIAGRAM:
Activity diagrams are graphical representations of workflows of stepwise activities and
actions with support for choice, iteration and concurrency. In the Unified Modeling
Language, activity diagrams can be used to describe the business and operational step-by-
step workflows of components in a system. An activity diagram shows the overall flow of
control.
Registration
Login View data owner
Regstration Login
Login
View user
Login
view file
View files
send request
generate key
check status
download file
Logout
Data Owner
attribute center
receiver
system
csp
token generatorr
DEPLOYMENT DIAGRAM
Deployment diagram represents the deployment view of a system. It is related to the
component diagram. Because the components are deployed using the deployment
diagrams. A deployment diagram consists of nodes. Nodes are nothing but physical
hardware’s used to deploy the application.
.
Csp
token generato
7. Implementation
7.1 Modules:
Data Owner
In this module, the data provider uploaded the data into the cloud then request
will goes to the private cloud. In the private cloud verifies the data whether it is available in
the public cloud or not. If not available then it will be stored into the public cloud in
encrypted format otherwise the response will go to the data provider with the message of
the file already available (Duplicated File).
Register
Login
Upload the data into cloud (The Request will goes to private Cloud)
Checking status of uploading data
Logout
Token Generator
In this module, a user views the all files details, while viewing the file if we want to
download the file first user wants to send a request for a file that request will send to
Attribute Authority. Then the Attribute Authority will give a response in the form security
key. By entering that key file will be decrypted and downloaded.
Register
Login
View all files
Send request for files (this request will goes to Attribute Authority)
View Response given by the Attribute Authority.
Logout
Attribute Center
In this module, the Attribute Authority is responsible for providing security keys to the user if
any user sends the request for files.
Login
View Requests which are sended by the users
Give response to user
Logout
Data User
In these modules, private cloud is mainly used to duplication checking of files. When Data
Provider uploads the data verification done by the private cloud if data is not duplicate then
file will stored into the public cloud otherwise send back to data provider.
Login
View files which are uploaded by the data provider.
File Verification (Duplication Checking)
Give response to Data provider.
Logout
7.2 CODE :
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<!--
Template Name: Educational Theory
Author: <a href="http://www.os-templates.com/">OS Templates</a>
Author URI: http://www.os-templates.com/
Licence: Free to use under our free template licence terms
Licence URI: http://www.os-templates.com/template-terms
-->
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>NetSpam</title>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
<link rel="stylesheet" href="layout/styles/layout.css" type="text/css" />
<script type="text/javascript" src="layout/scripts/jquery.min.js"></script>
<!-- Featured Slider -->
<script type="text/javascript" src="layout/scripts/jquery-s3slider.js"></script>
<script type="text/javascript">
$(document).ready(function() {
$("#featured_slide_").s3Slider({
timeOut:10000
});
});
</script>
<!-- / Featured Slider -->
</head>
<body id="top">
<div class="wrapper row1">
<div id="topnav">
<ul>
<li><a href="index.html"><strong>Home</strong></a></li>
<li class="active"><a href="admin.jsp"><strong>Admin</strong></a></li>
<li><a href="user.jsp"><strong>User</strong></a></li>
</ul>
</div>
</div>
<!--
########################################################################
############################### -->
<div class="wrapper row2">
<div id="header" class="clear">
<div class="fl_left">
<center><h1><a href="index.html">NetSpam: a Network-based Spam Detection
Framework for Reviews in Online Social Media</a></h1></center>
</div>
</div>
</div>
<!--
########################################################################
############################### -->
<div class="wrapper row5">
<div id="container" class="clear">
<form action="admin1.jsp" method="post"><br><br><br>
<center><h2>Admin Login</h2></center>
<center>
<table>
<tr>
<td>Admin Name </td>
<td><input type="text" name="name"></td>
</tr>
<tr>
<td>Password </td>
<td><input type="password" name="pswd"></td>
</tr>
<tr>
<td align="right"><input type="submit" value="Login" name="reg"></td>
<td><input type="reset" value="clear"></td>
</tr>
</table>
</center>
</form>
</div>
</div>
<!--
########################################################################
############################### -->
<div class="wrapper">
<div id="footer" class="clear">
<!--
########################################################################
############################### -->
<div id="copyright" class="clear">
<center><p>Copyright © 2017 - All Rights Reserved - <a
href="http://www.takeoffprojects.com/">TakeOff</a></p></center>
</div>
<!--
########################################################################
############################### -->
</div>
</div>
</body>
</html>
<%@page import="java.sql.*" %>
<%
String name = request.getParameter("name");
String pswd = request.getParameter("pswd");
if(name.equals("admin")&&pswd.equals("admin"))
{
response.sendRedirect("adminhome1.jsp?msg=Login Successful");
}
else
{
response.sendRedirect("admin2.jsp?msg=Please enter valid credentials");
}
%>
7 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
8 <!--
9 Template Name: Educational Theory
10 Author: <a href="http://www.os-templates.com/">OS Templates</a>
11 Author URI: http://www.os-templates.com/
12 Licence: Free to use under our free template licence terms
13 Licence URI: http://www.os-templates.com/template-terms
14 -->
15 <html xmlns="http://www.w3.org/1999/xhtml">
16 <head>
17 <title>NetSpam</title>
18 <meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
19 <link rel="stylesheet" href="layout/styles/layout.css" type="text/css" />
20 <script type="text/javascript" src="layout/scripts/jquery.min.js"></script>
21 <!-- Featured Slider -->
22 <script type="text/javascript" src="layout/scripts/jquery-s3slider.js"></script>
23 <script type="text/javascript">
24 $(document).ready(function() {
25 $("#featured_slide_").s3Slider({
26 timeOut:10000
27 });
28 });
29 </script>
30 <!-- / Featured Slider -->
31 </head>
32 <body id="top">
33 <div class="wrapper row1">
34 <div id="topnav">
35 <ul>
36 <li class="active"><a href="index.html"><strong>Home</strong></a></li>
37 <li><a href="admin.jsp"><strong>Admin</strong></a></li>
38 <li><a href="user.jsp"><strong>User</strong></a></li>
39 </ul>
40 </div>
41 </div>
42 <!--
####################################################################
################################### -->
43 <div class="wrapper row2">
44 <div id="header" class="clear">
45 <div class="fl_left">
46 <center><h1><a href="index.html">NetSpam: a Network-based Spam Detection
Framework for Reviews in Online Social Media</a></h1></center>
47 </div>
48 </div>
49 </div>
50 <!--
####################################################################
################################### -->
51 <div class="wrapper row5">
52 <div id="container" class="clear">
53 <form action="admin1.jsp" method="post">
54 <center><h2>Admin Login</h2></center>
55 <center><p style="color:red;">Please enter valid credentials</p></center>
56 <center>
57 <table>
58 <tr>
59 <td>Admin Name</td>
60 <td><input type="text" name="name"></td>
61 </tr>
62 <tr>
63 <td>Password</td>
64 <td><input type="password" name="pswd"></td>
65 </tr>
66 <tr>
67 <td align="right"><input type="submit" value="Login" name="reg"></td>
68 <td><input type="reset" value="clear"></td>
69 </tr>
70 </table>
71 </center>
72 </form>
73 </div>
74 </div>
75 <!--
####################################################################
################################### -->
76 <div class="wrapper">
77 <div id="footer" class="clear">
78 <!--
####################################################################
################################### -->
79 <div id="copyright" class="clear">
80 <center><p>Copyright © 2017 - All Rights Reserved - <a
href="http://www.takeoffprojects.com/">TakeOff</a></p></center>
81 </div>
82 <!--
####################################################################
################################### -->
83 </div>
84 </div>
85 </body>
86 </html>
<%@page import="java.util.*"%>
<%@page import="java.io.*"%>
<%@page import="java.sql.*"%>
<%!int v=0;
int b=0;
int p=0,n=0;
double m=0;
int po=0;
intni=0;
String[] result;
%>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>NetSpam</title>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
<link rel="stylesheet" href="layout/styles/layout.css" type="text/css" />
<script type="text/javascript" src="layout/scripts/jquery.min.js"></script>
<!-- Featured Slider -->
<script type="text/javascript" src="layout/scripts/jquery-s3slider.js"></script>
<script type="text/javascript">
$(document).ready(function() {
$("#featured_slide_").s3Slider({
timeOut:10000
});
});
</script>
<!-- / Featured Slider -->
</head>
<body id="top">
<div class="wrapper row1"><br><br>
<div id="topnav">
<ul>
<li><a href="upload.jsp"><strong>Upload Product</strong></a></li>
<li><a href="view.jsp"><strong>View Product</strong></a></li>
<li><a href="review.jsp"><strong>All Reviews</strong></a></li>
<li class="active"><a href="graph.jsp"><strong>Graph</strong></a></li>
<li><a href="spam.jsp"><strong>Spam Users</strong></a></li>
<li><a href="logout.jsp"><strong>Logout</strong></a></li>
</ul>
</div>
</div>
<!--
#######################################################################
################################ -->
<div class="wrapper row2">
<div id="header" class="clear">
<div class="fl_left">
<center><h1><a href="index.html">NetSpam: a Network-based Spam Detection
Framework for Reviews in Online Social Media</a></h1></center>
</div>
</div>
</div>
<!--
#######################################################################
################################ -->
<div class="wrapper row5">
<div id="container" class="clear">
<%
ArrayList list=new ArrayList();
BufferedReader br1=new BufferedReader(new
FileReader("C:/Users/Surekha/Desktop/dataset/positive.csv"));
String line = "";
String line1="";
while((line=br1.readLine())!=null)
{
list.add(line);
}
ArrayList list1=new ArrayList();
BufferedReader br2=new BufferedReader(new
FileReader("C:/Users/Surekha/Desktop/dataset/negative"));
while((line1=br2.readLine())!=null)
{
list1.add(line1);
}
try{
Class.forName("com.mysql.jdbc.Driver");
Connection
con1=DriverManager.getConnection("jdbc:mysql://localhost:3306/netspam","root","root");
PreparedStatementps=con1.prepareStatement("select comments from comments");
ResultSetrs=ps.executeQuery();
ArrayList<String> list3= new ArrayList<String>();
while (rs.next()){
list3.add(rs.getString(1));
result = new String[list3.size()];
result = list3.toArray(result);
}
for(inti =0; i<result.length; i++){
//System.out.println(result[i]);
if(list.contains(result[i].toLowerCase()))
{
//System.out.println(result[i]);
po++;
//System.out.println(po);
}
if(list1.contains(result[i].toLowerCase()))
{
//System.out.println(result[i]);
ni++;
//System.out.println(ni);
}
}
}
catch(Exception ae){
System.out.println(ae);
}
try{
Class.forName("com.mysql.jdbc.Driver");
Connection
con=DriverManager.getConnection("jdbc:mysql://localhost:3306/netspam","root","root");
PreparedStatement ps1=con.prepareStatement("select * from comments");
ResultSet rs1=ps1.executeQuery();
%><center><table align="center" cellspacing="5" border="1" width="60%">
<tr>
<th align="center"><font>Email Id</font></th>
<th align="center"><font>Product Id</font></th>
<th align="center"><font>Order Id</font></th>
<th align="center"><font>Comments</font></th>
<th align="center"><font>Rating</font></th>
</tr>
<%while(rs1.next())
{
%>
<tr>
<td align="center"><font color="green"><%=rs1.getString(1)%></font></td>
<td align="center"><font color="green"><%=rs1.getString(2)%></font></td>
<td align="left"><font color="green"><%=rs1.getString(3)%></font></td>
<td align="left"><font color="red"><%=rs1.getString(4)%></font></td>
<td align="left"><font color="green"><%=rs1.getString(5)%></font></td>
</tr>
<%}
}
catch(Exception e)
{
out.println(e);
}
//System.out.println(p);
m=(po*100/(po+ni));
// System.out.println(m);
//System.out.println(n);
%>
<div id="chartContainer" style="height: 300px; align:center; width:
70%;"></div><br><br><br>
</table>
</center>
<script type="text/javascript">
window.onload = function () {
var chart = new CanvasJS.Chart("chartContainer", {
theme: "theme2",//theme1
title:{
text: "Positive And Negative Reviews"
},
animationEnabled: false, // change to true
data: [
{
// Change type to "bar", "area", "spline", "pie",etc.
type: "column",
dataPoints: [
{label: " positive ",y: <%=po%>},
{label: " negative " ,y: <%=ni%>},
{label: " accuracy " ,y: <%=m%>},
]
}
]
});
chart.render();
}
</script>
</div>
</div>
<%po=0;
ni=0;
m=0; %>
</div>
</div>
<!--
#######################################################################
################################ -->
<div class="wrapper">
<div id="footer" class="clear">
<!--
#######################################################################
################################ -->
<div id="copyright" class="clear">
<center><p>Copyright © 2017 - All Rights Reserved - <a
href="http://www.takeoffprojects.com/">TakeOff</a></p></center>
</div>
<!--
#######################################################################
################################ -->
</div>
<script src="assets/js/canvasjs.min.js"></script>
</div>
</body>
</html>
</div>
</div>
<!--
#######################################################################
################################ -->
<div class="wrapper">
<div id="footer" class="clear">
<!--
#######################################################################
################################ -->
<div id="copyright" class="clear">
<center><p>Copyright © 2017 - All Rights Reserved - <a
href="http://www.takeoffprojects.com/">TakeOff</a></p></center>
</div>
<!--
#######################################################################
################################ -->
</div>
</div>
</body>
</html>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<!--
Template Name: Educational Theory
Author: <a href="http://www.os-templates.com/">OS Templates</a>
Author URI: http://www.os-templates.com/
Licence: Free to use under our free template licence terms
Licence URI: http://www.os-templates.com/template-terms
-->
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>NetSpam</title>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
<link rel="stylesheet" href="layout/styles/layout.css" type="text/css" />
<script type="text/javascript" src="layout/scripts/jquery.min.js"></script>
<!-- Featured Slider -->
<script type="text/javascript" src="layout/scripts/jquery-s3slider.js"></script>
<script type="text/javascript">
$(document).ready(function() {
$("#featured_slide_").s3Slider({
timeOut:10000
});
});
</script>
<!-- / Featured Slider -->
</head>
<body id="top">
<div class="wrapper row1">
<div id="topnav">
<ul>
<li><a href="index.html"><strong>Home</strong></a></li>
<li><a href="admin.jsp"><strong>Admin</strong></a></li>
<li class="active"><a href="user.jsp"><strong>User</strong></a></li>
</ul>
</div>
</div>
<!--
#######################################################################
################################ -->
<div class="wrapper row2">
<div id="header" class="clear">
<div class="fl_left">
<center><h1><a href="index.html">NetSpam: a Network-based Spam Detection
Framework for Reviews in Online Social Media</a></h1></center>
</div>
</div>
</div>
<!--
#######################################################################
################################ -->
<div class="wrapper row5">
<div id="container" class="clear"><br><br><br>
<form action="nuser.jsp" method="post">
<center><h2>User Login</h2></center>
<center>
<table>
<tr>
<td>Email Id</td>
<td><input type="text" name="email"></td>
</tr>
<tr>
<td>Password</td>
<td><input type="password" name="pswd"></td>
</tr>
<tr>
<td align="right"><input type="submit" value="Login"/></td>
<td><input type="reset" value="clear"/></td>
</tr>
</table>
<center><p style="color:blue">To Register, please click here <a class="hover" style="
text-decoration:none; text-decoration:underline; color:red"
href="userreg.jsp">Register</a></p></center>
</center>
</form>
</div>
</div>
<!--
#######################################################################
################################ -->
<div class="wrapper">
<div id="footer" class="clear">
<!--
#######################################################################
################################ -->
<div id="copyright" class="clear">
<center><p>Copyright © 2017 - All Rights Reserved - <a
href="http://www.takeoffprojects.com/">TakeOff</a></p></center>
</div>
<!--
#######################################################################
################################ -->
</div>
</div>
</body>
</html>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<!--
Template Name: Educational Theory
Author: <a href="http://www.os-templates.com/">OS Templates</a>
Author URI: http://www.os-templates.com/
Licence: Free to use under our free template licence terms
Licence URI: http://www.os-templates.com/template-terms
-->
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>NetSpam</title>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
<link rel="stylesheet" href="layout/styles/layout.css" type="text/css" />
<script type="text/javascript" src="layout/scripts/jquery.min.js"></script>
<!-- Featured Slider -->
<script type="text/javascript" src="layout/scripts/jquery-s3slider.js"></script>
<script type="text/javascript">
$(document).ready(function() {
$("#featured_slide_").s3Slider({
timeOut:10000
});
});
</script>
<script type="text/javascript">
function Upload() {
varfileUpload = document.getElementById("fileUpload");
if (typeof (fileUpload.files) != "undefined") {
var size = parseFloat(fileUpload.files[0].size / 1024).toFixed(2);
alert(size + " KB.");
} else {
alert("This browser does not support HTML5.");
}
}
</script>
<!-- / Featured Slider -->
</head>
<body id="top">
<div class="wrapper row1"><br><br>
<div id="topnav">
<ul>
<li class="active"><a href="upload.jsp"><strong>Upload Product</strong></a></li>
<li><a href="view.jsp"><strong>View Product</strong></a></li>
<li><a href="review.jsp"><strong>All Reviews</strong></a></li>
<li><a href="graph.jsp"><strong>Graph</strong></a></li>
<li><a href="spam.jsp"><strong>Spam Users</strong></a></li>
<li><a href="logout1.jsp"><strong>Logout</strong></a></li>
</ul>
</div>
</div>
<!--
#######################################################################
################################ -->
<div class="wrapper row2">
<div id="header" class="clear">
<div class="fl_left">
<center><h1><a href="index.html">NetSpam: a Network-based Spam Detection
Framework for Reviews in Online Social Media</a></h1></center>
</div>
</div>
</div>
<!--
#######################################################################
################################ -->
<div class="wrapper row5">
<div id="container" class="clear">
<center><h2>Please, Upload Your Product Details</h2></center>
<form method="post" action="upload1.jsp">
<center>
<table border="0">
<tr>
<td>Product Category</td>
<td><select name="category">
<option>Select</option>
<option value="Mobile">Mobile</option>
<option value="Shoes">Shoes</option>
<option value="Clothes">Clothes</option>
</select>
</td>
</tr>
<tr>
<td>Product Name</td>
<td><input type="text" name="name"></td>
</tr>
<tr>
<td>Product Brand</td>
<td><input type="text" name="brand"></td>
</tr>
<tr>
<td>Price</td>
<td><input type="text" name="price"></td>
</tr>
<tr>
<td>Upload Your File </td>
<td><input type="file" name="photo" id="fileUpload" accept=".jpg, .jpeg" /></td>
</tr>
<tr>
<td align="right"><input type="submit" value="upload" onclick="Upload()"/></td>
<td><input type="reset" value="clear"></td>
</tr>
</table>
</center>
</form>
</div>
</div>
<!--
#######################################################################
################################ -->
<div class="wrapper">
<div id="footer" class="clear">
<!--
#######################################################################
################################ -->
<div id="copyright" class="clear">
<center><p>Copyright © 2017 - All Rights Reserved - <a
href="http://www.takeoffprojects.com/">TakeOff</a></p></center>
</div>
<!--
#######################################################################
################################ -->
</div>
</div>
</body>
</html>
<%@page import="java.sql.*" %>
<%
try{
Class.forName("com.mysql.jdbc.Driver");
Connection
con=DriverManager.getConnection("jdbc:mysql://localhost:3306/netspam","root","root");
PreparedStatement ps1=con.prepareStatement("select * from image");
ResultSet rs1=ps1.executeQuery();
%>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>NetSpam</title>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
<link rel="stylesheet" href="layout/styles/layout.css" type="text/css" />
<link rel="stylesheet" href="css/main.css"/>
<link rel="stylesheet" href="css/bootstrap.min.css"/>
<script type="text/javascript" src="layout/scripts/jquery.min.js"></script>
<!-- Featured Slider -->
<script type="text/javascript" src="layout/scripts/jquery-s3slider.js"></script>
<script type="text/javascript">
$(document).ready(function() {
$("#featured_slide_").s3Slider({
timeOut:10000
});
});
</script>
<!-- / Featured Slider -->
</head>
<body id="top">
<div class="wrapper row1"><br><br>
<div id="topnav">
<ul>
<li><a href="upload.jsp"><strong>Upload Product</strong></a></li>
<li class="active"><a href="view.jsp"><strong>View Product</strong></a></li>
<li><a href="review.jsp"><strong>All Reviews</strong></a></li>
<li><a href="graph.jsp"><strong>Graph</strong></a></li>
<li><a href="spam.jsp"><strong>Spam Users</strong></a></li>
<li><a href="logout.jsp"><strong>Logout</strong></a></li>
</ul>
</div>
</div>
<!--
#######################################################################
################################ -->
<div class="wrapper row2">
<div id="header" class="clear">
<div class="fl_left">
<center><h1><a href="index.html">NetSpam: a Network-based Spam Detection
Framework for Reviews in Online Social Media</a></h1></center>
</div>
</div>
</div>
<!--
#######################################################################
################################ -->
<div class="wrapper row5">
<div class="features_items"><!--features_items-->
<%while(rs1.next())
{
%>
<div class="box_div">
<div class="product-image-wrapper">
<div class="single-products">
<div class="productinfo text-
center">
<imgsrc="view1.jsp?pid=<
%=rs1.getString(1)%>" width="65%" height="250px"/>
<h2>$<
%=rs1.getString(5)%></h2>
<p><
%=rs1.getString(3)%></p>
</div>
</div>
</div>
</div>
<%}
rs1.close();
ps1.close();
con.close();
}
catch(Exception e)
{
out.println(e);
}
%>
</div>
</div>
</div>
<!--
#######################################################################
################################ -->
<div class="wrapper">
<div id="footer" class="clear">
<!--
#######################################################################
################################ -->
<div id="copyright" class="clear">
<center><p>Copyright © 2017 - All Rights Reserved - <a
href="http://www.takeoffprojects.com/">TakeOff</a></p></center>
</div>
<!--
#######################################################################
################################ -->
</div>
</div>
</body>
</html>
<%@page import="java.sql.*" %>
<%
response.setHeader("Cache-Control","no-cache");
response.setHeader("Cache-Control","no-store");
response.setHeader("Pragma","no-cache");
response.setDateHeader ("Expires", 0);
if(session.getAttribute("email")== null)
{
response.sendRedirect(request.getContextPath() + "/index.html");
}
%>
<%
try{
Class.forName("com.mysql.jdbc.Driver");
Connection
con=DriverManager.getConnection("jdbc:mysql://localhost:3306/netspam","root","root");
PreparedStatement ps1=con.prepareStatement("select * from image");
ResultSet rs1=ps1.executeQuery();
%>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>NetSpam</title>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
<link rel="stylesheet" href="layout/styles/layout.css" type="text/css" />
<link rel="stylesheet" href="css/main.css"/>
<link rel="stylesheet" href="css/bootstrap.min.css"/>
<script type="text/javascript" src="layout/scripts/jquery.min.js"></script>
<!-- Featured Slider -->
<script type="text/javascript" src="layout/scripts/jquery-s3slider.js"></script>
<script type="text/javascript">
$(document).ready(function() {
$("#featured_slide_").s3Slider({
timeOut:10000
});
});
</script>
<!-- / Featured Slider -->
</head>
<body id="top">
<div class="wrapper row1"><br><br>
<div id="topnav">
<ul>
<li class="active"><a href="views.jsp"><strong>View Products</strong></a></li>
<li><a href="order.jsp"><strong>My Order</strong></a></li>
<li><a href="logout.jsp"><strong>Logout</strong></a></li>
</ul>
</div>
</div>
<!--
#######################################################################
################################ -->
<div class="wrapper row2">
<div id="header" class="clear">
<div class="fl_left">
<center><h1><a href="index.html">NetSpam: a Network-based Spam Detection
Framework for Reviews in Online Social Media</a></h1></center>
</div>
</div>
</div>
<!--
#######################################################################
################################ -->
<div class="wrapper row5">
</div>
</div>
</div>
<!--
#######################################################################
################################ -->
<div class="wrapper">
<div id="footer" class="clear">
<!--
#######################################################################
################################ -->
<div id="copyright" class="clear">
<center><p>Copyright © 2017 - All Rights Reserved - <a
href="http://www.takeoffprojects.com/">TakeOff</a></p></center>
</div>
<!--
#######################################################################
################################ -->
</div>
</div>
</body>
</html>
<%@page import="java.sql.*" %>
<%
String email=request.getParameter("email");
String pswd=request.getParameter("pswd");
intcnt=0;
try
{
Class.forName("com.mysql.jdbc.Driver");
Connection
con=DriverManager.getConnection("jdbc:mysql://localhost:3306/netspam","root","root");
PreparedStatement ps1=con.prepareStatement("select count(*) from user where email=?
and pswd=?");
ps1.setString(1,email);
ps1.setString(2,pswd);
ResultSetrs=ps1.executeQuery();
while(rs.next())
{
cnt=rs.getInt(1);
}
if (cnt==1)
{
session.setAttribute("email",email);
response.sendRedirect("user1.jsp?msg=Login Successful");
}
else
{
response.sendRedirect("user2.jsp?msg=Invalid credentials. Please try again");
}
ps1.close();
con.close();
}
catch(Exception e)
{
e.printStackTrace();
}
%>
8. System Testing
The purpose of testing is to discover errors. Testing is the process of trying to discover
every conceivable fault or weakness in a work product. It provides a way to check the
functionality of components, sub assemblies, assemblies and/or a finished product It is the
process of exercising software with the intent of ensuring that the
Software system meets its requirements and user expectations and does not fail in an
unacceptable manner. There are various types of test. Each test type addresses a specific
testing requirement.
Unit testing
Unit testing involves the design of test cases that validate that the internal program
logic is functioning properly, and that program inputs produce valid outputs. All decision
branches and internal code flow should be validated. It is the testing of individual software
units of the application .it is done after the completion of an individual unit before
integration. This is a structural testing, that relies on knowledge of its construction and is
invasive. Unit tests perform basic tests at component level and test a specific business
process, application, and/or system configuration. Unit tests ensure that each unique path
of a business process performs accurately to the documented specifications and contains
clearly defined inputs and expected results.
Functional tests provide systematic demonstrations that functions tested are available
as specified by the business and technical requirements, system documentation, and user
manuals.
Functional testing is centered on the following items:
Valid Input : identified classes of valid input must be accepted.
Invalid Input : identified classes of invalid input must be rejected.
Functions : identified functions must be exercised.
Output : identified classes of application outputs must be exercised.
Systems/Procedures: interfacing systems or procedures must be invoked.
System Test
System testing ensures that the entire integrated software system meets requirements.
It tests a configuration to ensure known and predictable results. An example of system
testing is the configuration oriented system integration test. System testing is based on
process descriptions and flows, emphasizing pre-driven process links and integration
points.
Unit testing is usually conducted as part of a combined code and unit test phase of
the software lifecycle, although it is not uncommon for coding and unit testing to be
conducted as two distinct phases.
Test objectives
All field entries must work properly.
Pages must be activated from the identified link.
The entry screen, messages and responses must not be delayed.
Features to be tested
Verify that the entries are of the correct format
No duplicate entries should be allowed
All links should take the user to the correct page.
Integration Testing
Test Results: All the test cases mentioned above passed successfully. No defects
encountered.
Acceptance Testing
User Acceptance Testing is a critical phase of any project and requires significant
participation by the end user. It also ensures that the system meets the functional
requirements.
Test Results: All the test cases mentioned above passed successfully. No defects
encountered.
9.Conclusion
In this paper, we have presented a new 2FA (including both user secret key and a
lightweight security device). Access control system for web-based cloud computing
services. Based on the attribute-based access control mechanism, the proposed 2FA
access control system has been identified to not only enable the cloud server to restrict the
access to those users with the same set of attributes but also preserve user privacy.
Detailed security analysis shows that the proposed 2FA access control system achieves
the desired security requirements. Through performance evaluation, we demonstrated that
the construction is “feasible”. We leave as future work to further improve the efficiency
while keeping all nice features of the system.
10 Appendices
APPENDIX-A: User Manual
UserManualistheguidetotheusersofthesystem.Itpavesapathtothecorresponding user to
help him how to proceed further in the proper understanding of the system. The
Interfacesofthesystemgetsfamiliartotheuser,basedonthismanualonly.Thefirstform is the
login form where user has to enter his username and password; here the types of users
are Administrator, Users.If the person has connected as an administrator, he will have
rights to authorize to create User-id and passwords, Change of Users details in
Database. If the user has been connected as Administrator he can enter the Users
details, and can viewreports.
APPENDIX-B: Test Screens
User registration:
Admin/user login:
user login 2
Admin home
View users
View ordered products:
User hom
My ordered products
11 Bibliography
REFERENCES