VenkAT 2318264 6thsem Project

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 87

`

Fine-grained Two-factor Access Control


for Web-based Cloud Computing Services
AT

KMM INSTITUTE POST GRADUATE STUDIES, TIRUPATI

Submitted in partial fulfillment of the requirement for the award of Degree of

Master of Computer Applications

By

N. Venkatesh

Regd. No: 2318264

Department of Computer Applications

KMM INSTITUTE OF POST GRADUATE STUDIES


(Affiliated to Sri Venkateswara University, Tirupati)

RamiReddiPalle, TIRUPATI-517 102

July, 2021
`

AT

KMM INSTITUTE POST GRADUATE STUDIES,TIRUPATI

Submitted in partial fulfillment of the requirement for the award of Degree of

Master of Computer Applications


By

N. Venkatesh

Regd. No: 2318264

Under the Guidance of :C.Yamini

Department of Computer Applications

KMM INSTITUTE OF POST GRADUATE STUDIES

(Affiliated to Sri Venkateswara University, Tirupati)


RamiReddiPalle, TIRUPATI-517 102

July,2021
KMM INSTITUTE OF POST GRADUATE STUDIES

(Affiliated to Sri VenkateswaraUniversity,Tirupati)

RamiReddiPalle, TIRUPATI – 517 102.

DEPARTMENT OF COMPUTER APPLICATIONS

CERTIFICATE

REGISTERED NO:2318264

This is to certify that the report entitled Fine-grained Two-factor Access Control for Web-
based Cloud Computing Servicessubmitted by N . VENKATESHin partial fulfillment of the
requirements for the award of the degree of Master of Computer Applications under our supervision
and guidance in the VI semester of course , during the academic year 2020 - 2021.

HEAD Project Guide

Attended and submitted for the University Viva –Voce Examination.

Signature (s) oftheExaminers: 1.

(External Examiner)

2.
(InternalExaminer)

3.
(Chairman)
takeeG«aa sINCE

(A Division of Young MlndGYechnology5olujjgpt# p„j

PROJECT COMPLETION CERTIFICATE

TheHoD
Master otComputer Application s
KMM Institute of PG Stu:dias

Dear Sir/k4adam.
Acknowledgments
“Tasksuccessful”makeseveryonehappy.Butthehappinesswillbegoldwithoutglitter
ifwedidn’tstatethepersonswhohavesupportedustomakeit asuccess.Successwill
becrownedtopeoplewhomadeitarealitybutthepeoplewhoseconstantguidanceand
encouragement made it possible will be crowned first on the eve of success. This
acknowledgementtranscendstherealityofformalitywhenwewouldliketoexpressdeep
gratitude and respect to all those people behind the screen who guided, inspired and
helped me for the completion of our project work. I consider myself lucky enough to get
such a good project. This project would add as an asset to my academicprofile.

An endeavor over a long period can be successful only with the advice and
support of many well wishes. We take this opportunity to express our gratitude and
appreciation all of them.
OurspecialthankstoDr.K.VenkataRamana,Principal&HODKMMInstituteof Post
Graduate Studies, Tirupati, for hisencouragement.

WewouldliketothankMs.C.Yamini,forassistingusinthedevelopmentofthe system, and


her personal interest provided an unending encouragement and guidance that
sustained us throughout theproject.

We would like to thank to all those who have been a support and an inspiration
and especially the staff in office andlab.

Mr. N.Venkatesh
Abstract
In this paper, we introduce a new fine-grained two-factor authentication (2FA) access
control system for web-based cloud computing services. Specifically, in our proposed 2FA
access control system, an attribute-based access control mechanism is implemented with
the necessity of both user secret key and a lightweight security device. As a user cannot
access the system if s/he does not hold both, the mechanism can enhance the security of
the system, especially in those scenarios where many users share the same computer for
web-based cloud services. In addition, attribute-based control in the system also enables
the cloud server to restrict the access to those users with the same set of attributes while
preserving user privacy, i.e., the cloud server only knows that the user ful fills the required
predicate, but has no idea on the exact identity of the user. Finally, we also carry out a
simulation to demonstrate the practicability of our proposed 2FA system.
List of
Figures
Figure no Title Page no

4.7 Use case Diagram 23


4.9 Sequence Diagram 27
4.11 Activity Diagram 29
4.12 Component Diagram 30
List of Screens
Name Pageno

User registration 69

Admin/user login 70

Admin home 71

View users 71

View products 72

View ordered products 72

User home 73

Add account
Contents
Acknowledgements i

Abstract ii

Contents iii

ListofFigures

1. Introduction 01

1.1 Organizationprofile 03

1.2 Organizationchart 05

1.3 Introduction to cloud load balancing

ProjectLayout 05

2. Genesis of the study 06

2.1 Aim 06

ProblemDescription 06

2.2 Description ofExistingSystem 07

LiteratureSurvey 08

2.3Bottlenecks of ExistingSystem 08

Methodology 08

ProposedSystem 08

2.4 Objectives ofProposed System 08

2.5 Advantages ofProposed System 08

2.5.1 Limitations ofProposed System 08


3. FeasibilityStudy 09

3.1 OperationalFeasibility 09

3.2 TechnicalFeasibility 09

3.3 EconomicalFeasibility 10

4. SystemAnalysis 11

4.1.1 Introduction 11

4.1.2 DesignPrinciples 12

4.1.3 DatabaseDesign 13

4.1.4 Normalization 13

4.1.5 DatabaseTable 14

4.2 HIPOChart 14

4.2.1 ModuleDesign 15

4.2.2 Algorithms 15

4.2.3 Existing roundrobin algorithm 15

5. SystemRequirementsAnalysis 16

5.1 HardwareRequirements 18

5.2 SoftwareRequirements 19

5.3 Featuresofsoftware 21

6. SystemDesign 22

6.1 Entity-RelationshipDiagrams 23

6.2 DataFlow Diagrams 25

6.3 Use-caseDiagram 31

6.4 ActivityDiagram 32

6.5 SequenceDiagram 32
7.Implementation 33

7.1 Algorithm implementation 35

7.2 Program code and output 61

8. System Testing 62
8.1 White Box Testing 59

8.2 Black Box Testing 60

8.3 Unit Testing 61

8.4 Integration Testing 62

8.5 test cases 65

9. Conclusion 66

10.APPENDICES 67

APPENDIX - B Test screens 68

11.BIBLIOGRAPHY 74

APPENDIX - C Base Paper ..

APPENDIX - D Conference Paper ..


Fine-grained Two-factor Access Control for Web-based Cloud Computing services
:

1. Introduction
KMMIPS is an educational society established in 2000 by a group of retired civil servant.
This is an educational society which serves for thebetterment of the student. Initially this
college offers three major programs MCA, MBA and B.Ed.The main aim of the project
“LOAD BALANCING IN CLOUD COMPUTINGUSING ROUND ROBIN ALGORITHM” is to
reduce the network resoures and computer resoures. Every sort of task is performed by
the system, such as registering different types of persons and complaints etc.

KMM Institute of Post Graduate Studies:

 Provide good higher level educationalservices.


 Develop good communicational skills tostudents.
 Provide good managerial skills to MBA, MCA & B.EDStudents.

This approach rests on:

 A strategy where we architect, integrate and manage technology services and


solutions.
 ArobustoffshoredevelopmentmethodologyandreducedManualworksofstudents.

Theyunderstandtheimportanceoftiming,gettingdetailsofnecessaryinformationaswell as
storing the information. A rich portfolio of reusable, modular frameworks helps jump
startprojects.

A full service port file:

This offers User and Admin maintain, architect, integrate and manage through the
system.

Services:

This system provides its services to which are in the field of providing good helpful online
tourism booking system.

1 KMMIPS::Tirupati
1.1 OrganizationProfile

“SathyamevaJayathi” – Truth always Triumph is the motto of our KMM Educational


Society, Tirupati.

Nothing is permanent except change. The ongoing advances in computer


communicationstechnologycontinuetohaveprofoundeffectonthewaypeopleworkand
play.Boththetechnologyitselfandtheexpectationsofthepeoplewhouseitarealtering the
features of the information system that analysis, design and the widespread
deploymentofinformationsystemsinchangingtheverynatureofthesocietyinwhichthe
systems are used. The development of the informationeconomy.

KMMInstituteofpostgraduatestudiesverypopularlyknownasKMMIPShasemergedas a
major Technological Institute managed by KMM SOCIAL AND EDUCATIONAL
DEVELOPMENT SOCIETY, Tirupathi. The KMM Society has taken the lead role to
establish the institute in academic year 2001-2002. Sprawled over an area of 25 acres,
permanent infrastructural facilities are being developed near Tirupathi-Madanapalli state
HighwayatRamireddypalle.KMMIPShasalreadysecuredtheapprovalfromtheAllIndia
CouncilofTechnicalEducation(AICTE).NewDelhi,andGovernmentofAndhraPradesh and
is affiliated to Sri Venkateswara University,Tirupati.

KMMIPS offers admission into the professional courses MCA and MBA with annual
intake of 180 and 180 seats each. The institution is governed by the chairman Sri
S.Srinivasulugaru, retired IRS (Indian Revenue Service) officer with the support of an
advisory body consisting of the eminent personalities form different fields.

Company: KMM Educational Institutions, Tirupathi.

Contact: Madanapalli Highway Road, Ramireddipalle, Tirupathi.

Operating Since: 2000

Managing Director: Sri S.SrinivasuluGaru

Legal Status: Educational Society


1.2 OrganizationChart:

KMM Educational Society

KMM Institute of Post Graduate Studies

Principal

Teaching Staff Non Teaching Staff

1.3Introduction:

Cloud computing is a virtual host computer system that enables enterprises to buy, lease,
sell, or distribute software and other digital resources over the internet as an on-demand
service. It no longer depends on a server or a number of machines that physically exist,
as it is a virtual system. There are many applications of cloud computing, such as data
sharing, data storage big data management medical information system etc. End users
access cloud-based applications through a web browser, thin client or mobile app while
the business software and user’s data are stored on servers at a remote location. The
benefits of web-based cloud computing services are huge, which include the ease of
accessibility, reduced costs and capital expenditures, increased operational efficiencies,
scalability, flexibility and immediate time to market.
Though the new paradigm of cloud computing provides great advantages, there are
meanwhile also concerns about security and privacy especially for web- based cloud
services. As sensitive data may be stored in the cloud for sharing purpose or convenient
access; and eligible users may also access the cloud system for various applications and
services, user authentication has become a critical component for any cloud system. A
user is required to login before using the cloud services or accessing the sensitive data
stored in the cloud. There are two problems for the traditional account/password- based
system. First, the traditional account/password- based authentication is not privacy-
preserving. Second, it is common to share a computer among different people. A recently
proposed access control model called attribute-based access control is a good candidate
to tackle the first problem. It not only provides anonymous authentication but also further
defines access control policies based on different attributes of the requester,
environment, or the data object.

Project Layout:

Fine-grained Two-factor Access Control for Web-based Cloud Computing services

Chapter 1 Introduction: It deals with the overview of the organization and its
administrative hierarchy.

Chapter2GenesisoftheStudy:ItoutlinestheExistingproblem,thesolutionproposed,
methodologyusedandlooksathowthepreliminaryinvestigationcarriedout,whatareall its
scope and objectives and limitations of existing manualsystem.

Chapter 3 Feasibility Study: It is used to test the feasibility of the project i.e.,
Operational, Technical and Economical feasibilities of the system.

Chapter 4 System Analysis: It deals with software requirement analysis. The various
entitiesandtheirrequirementsandtheirrelationshipsarediscussedusingE-RDiagrams.

Chapter 5 System requirements: It explains about the various hardware and software
requirements and their features.

Chapter 6 System Design: It contains the description of all the tables and its attributes,
design priniciples, HIPO charts and user interface design.

Chapter 7 System Testing: It presents software-testing strategies and techniques like


white box testing, back box testing.
Chapter 8 Implementation: It gives the software and hardware implementation details
of the system.

Chapter 9 Conclusion:
2. Genesis
ofStudy
This chapter deals with the study of the existing system and describes the need for the
proposed system to overcome the drawbacks in the existing system. It also specifiesthe
objectives, scope of the system and also the methodology for the systemdevelopment.

Hence,thegenesisofthestudyclearlydepictsthefactorsregardingthebeginningofthe existing
system and its extension to the proposed system and it includes thefollowing.

2.1 Aim:

Literature survey is the most important step in software development process. Before
developing the tool it is necessary to determine the time factor, economy n company
strength. Once these things r satisfied, ten next steps are to determine which operating
system and language can be used for developing the tool. Once the programmers start
building the tool the programmers need lot of external support. This support can be
obtained from senior programmers, from book or from websites.

2.2 Description of ExistingSystem:

• We study super graph search (SPS), that is, given a query graph q and a graph
database G that contains a collection of graphs , return graphs that have q as a
super graph from G. SPS has broad applications in bioinformatics, chain form tics
and other scientific and commercial fields. Determining whether a graph is a sub
graph (or super graph) of another is an NP-complete problem. Hence, it is
intractable to compute SPS for large graph databases. Two separate indexing
methods, a "filter + verify"-based method and a "prefix-sharing"-based method, have
been studied to efficiently compute SPS. To implement the above two methods, sub
graph patterns are mined from the graph database to build an index. Those sub
graphs are mined to optimize either the filtering gain or the prefix-sharing gain.
However, no single sub graph-mining algorithm considers both gains. This work is
the first one to mine sub graphs to optimize both the filtering gain and the prefix-
2.3 Bottlenecks of ExistingSystem:

Super graph Search in Graph Databases via Hierarchical Feature-Tree

Static schemes do not use the system information and are less complex.

In order to row out these challenges, a computerized system is needed to be developed.

The input design is the link between the information system and the user. It comprises the
developing specification and procedures for data preparation and those steps are
necessary to put transaction data in to a usable form for processing can be achieved by
inspecting the computer to read data from a written or printed document or it can occur by
having people keying the data directly into the system. The design of input focuses on
controlling the amount of input required, controlling the errors, avoiding delay, avoiding
extra steps and keeping the process simple. The input is designed in such a way so that it
provides security and ease of use with retaining the privacy. Input Design considered the
following things:
 What data should be given as input?
 How the data should be arranged or coded?
 The dialog to guide the operating personnel in providing input.
 Methods for preparing input validations and steps to follow when error occur.

2.4 OBJECTIVES

1. Input Design is the process of converting a user-oriented description of the input into a
computer-based system. This design is important to avoid errors in the data input process
and show the correct direction to the management for getting correct information from the
computerized system.

2.It is achieved by creating user-friendly screens for the data entry to handle large volume
of data. The goal of designing input is to make data entry easier and to be free from errors.
The data entry screen is designed in such a way that all the data manipulates can be
performed. It also provides record viewing facilities.
3. When the data is entered it will check for its validity. Data can be entered with the help of
screens. Appropriate messages are provided as when needed so that the user will not be
in maize of instant. Thus the objective of input design is to create an input layout that is
easy to follow

2.5 OUTPUT DESIGN

A quality output is one, which meets the requirements of the end user and presents the
information clearly. In any system results of processing are communicated to the users and
to other system through outputs. In output design it is determined how the information is to
be displaced for immediate need and also the hard copy output. It is the most important
and direct source information to the user. Efficient and intelligent output design improves
the system’s relationship to help user decision-making.
1.Designing computer output should proceed in an organized, well thought out manner; the
right output must be developed while ensuring that each output element is designed so that
people will find the system can use easily and effectively. When analysis design computer
output, they should Identify the specific output that is needed to meet the requirements.
2. Select methods for presenting information.
3. Create document, report, or other formats that contain information produced by the
system.
The output form of an information system should accomplish one or more of the following
objectives.
 Convey information about past activities, current status or projections of the
 Future.
 Signal important events, opportunities, problems, or warnings.
 Trigger an action.
 Confirm an action.
3. FeasibilityStudy
3.1 FEASIBILITY STUDY

The feasibility of the project is analyzed in this phase and business proposal is put forth
with a very general plan for the project and some cost estimates. During system analysis
the feasibility study of the proposed system is to be carried out. This is to ensure that the
proposed system is not a burden to the company. For feasibility analysis, some
understanding of the major requirements for the system is essential.

Three key considerations involved in the feasibility analysis are

 ECONOMICAL FEASIBILITY
 TECHNICAL FEASIBILITY
 SOCIAL FEASIBILITY

3.2ECONOMICAL FEASIBILITY
This study is carried out to check the economic impact that the system will have on the
organization. The amount of fund that the company can pour into the research and
development of the system is limited. The expenditures must be justified. Thus the
developed system as well within the budget and this was achieved because most of the
technologies used are freely available. Only the customized products had to be purchased.

3.3TECHNICAL FEASIBILITY

This study is carried out to check the technical feasibility, that is, the technical
requirements of the system. Any system developed must not have a high demand on the
available technical resources. This will lead to high demands on the available technical
resources. This will lead to high demands being placed on the client. The developed
system must have a modest requirement, as only minimal or null changes are required for
implementing this system.

3.4SOCIAL FEASIBILITY

The aspect of study is to check the level of acceptance of the system by the user.
This includes the process of training the user to use the system efficiently. The user must
not feel threatened by the system, instead must accept it as a necessity. The level of
acceptance by the users solely depends on the methods that are employed to educate the
user about the system and to make him familiar with it. His level of confidence must be
raised so that he is also able to make some constructive criticism, which is welcomed, as
he is the final user of the system.
4. SystemAnalys
is
4.1 THE STUDY OF THESYSTEM

4.1.1 Existing system:


In existing system graphs are not scalable to handle large-sized data-graphs and query-
graphs due to three drawbacks. First, they rely on a frequent subgraph mining algorithm to
select features which is expensive and cannot generate large features. Second, they
require a costly verification phase. Third, they process features in a fixed order without
considering their relationships to the query-graph.

4.1.2 Proposed system:


In this paper, we study the supergraph search problem which is a fundamental problem in
graph databases. Existing solutions are not scalable when processing large-sized data-
graphs and query graphs. In our approach, we build a hierarchical feature-tree as our
index, that does not rely on an expensive frequent subgraph mining algorithm, and can
generate better features. We propose a new algorithm that processes features in a query-
dependent order for query processing. We explore two optimization strategies to improve
the efficiency of our algorithm.. We propose approximation techniques to further save the
computational cost for the query processing. We conduct extensive experiments on two
large real datasets to demonstrate the efficiency and effectiveness of our approach.
4.1.3 Advantages:
Fine-grained Two-factor Access Control for Web-based Cloud Computing services fast
responding

4.1.4 Disadvantages:
Sharing the pruning power of graph is low
● To promote the exchange and development of methods and tools foroperational
analysis as applied to defenseproblems.

4.1.5 Logical design

The logical design of a system pertains to an abstract representation of the data


flows, inputs and outputs of the system. This is often conducted via modeling, using an
over-abstract (and sometimes graphical) model of the actual system. In the context of
systems design are included. Logical design includes ER Diagrams i.e. Entity
Relationship Diagrams

4.1.6 Physical design

Thephysicaldesignrelatestotheactualinputandoutputprocessesofthesystem. This
is laid down in terms of how data is input into a system, how it is verified / authenticated,
how it is processed, and how it is displayed as output. In Physical design, following
requirements about the system aredecided.

1. Inputrequirement,
2. Outputrequirements,
3. Storagerequirements,
4. Processing Requirements,
5. System control and backup orrecovery.

Put another way, the physical portion of systems design can generally be broken down
into three sub-tasks:
.

4.2 INPUT&OUTPUTREPRESENTATION

4.2.1 INPUT DESIGN


The input design is the link between the information system and the user. It comprises the
developing specification and procedures for data preparation and those steps are necessary to put
transaction data in to a usable form for processing can be achieved by inspecting the computer to
read data from a written or printed document or it can occur by having people keying the data
directly into the system. The design of input focuses on controlling the amount of input required,
controlling the errors, avoiding delay, avoiding extra steps and keeping the process simple. The
input is designed in such a way so that it provides security and ease of use with retaining the
privacy. Input Design considered the following things:
 What data should be given as input?
 How the data should be arranged or coded?
 The dialog to guide the operating personnel in providing input.
 Methods for preparing input validations and steps to follow when error occur.

4.2.2 OBJECTIVES

1. Input Design is the process of converting a user-oriented description of the input into a computer-
based system. This design is important to avoid errors in the data input process and show the
correct direction to the management for getting correct information from the computerized system.

2.It is achieved by creating user-friendly screens for the data entry to handle large volume of data.
The goal of designing input is to make data entry easier and to be free from errors. The data entry
screen is designed in such a way that all the data manipulates can be performed. It also provides
record viewing facilities.
3. When the data is entered it will check for its validity. Data can be entered with the help of
screens. Appropriate messages are provided as when needed so that the user will not be in maize
of instant. Thus the objective of input design is to create an input layout that is easy to follow
4.2.3 OUTPUT DESIGN
A quality output is one, which meets the requirements of the end user and presents the information
clearly. In any system results of processing are communicated to the users and to other system
through outputs. In output design it is determined how the information is to be displaced for
immediate need and also the hard copy output. It is the most important and direct source

information to the user. Efficient and intelligent output design improves the system’s relationship to
help user decision-making.
1. Designing computer output should proceed in an organized, well thought out manner; the right
output must be developed while ensuring that each output element is designed so that people will
find the system can use easily and effectively. When analysis design computer output, they should
Identify the specific output that is needed to meet the requirements.
2. Select methods for presenting information.
3. Create document, report, or other formats that contain information produced by the system.
The output form of an information system should accomplish one or more of the following
objectives.
 Convey information about past activities, current status or projections of the
 Future.
 Signal important events, opportunities, problems, or warnings.
 Trigger an action.
 Confirm an action.
4.2.4 Installation & Acceptance Stage

During the installation and acceptance stage, the software artifacts, online help,
and initial production data are loaded onto the production server. At this point, all test

casesareruntoverifythecorrectnessandcompletenessofthesoftware.Successfulexecution
ofthetestsuiteisaprerequisitetoacceptanceofthesoftwarebythecustomer.
Aftercustomerpersonnelhaveverifiedthattheinitialproductiondataloadis correct and the
test suite has been executed with satisfactory results,the customer
formally accepts the delivery of the software.

The primary outputs of the installation and acceptance stage include a production
application, a completed acceptance test suite, and a memorandum of customer
acceptance of the software. Finally, the PDR enters the last of the actual labor data into
theprojectscheduleandlockstheprojectasapermanentprojectrecord.Atthispointthe

PDR "locks" the project by archiving all software items, the implementation map, the source
code, and the documentation for future reference.
5. System
Requirements
System requirements gives the idea about what are the necessary things that are needed
for proposed system, which plays very important role in development of any system. This
chapter deals with what are hardware components that are needed for the system,
application software that are required for the development of the system.

The environment deals with the features of software. HTML is used as the front-end tool
and My SQL as a backend. Front end tools help to visualize the system through naked
eyes while back end helps in activities which are unseen to the end user.
5.1 HARDWARE REQUIREMENTS:
 Processor - I3/Intel Processor
 RAM - 4GB (min)
 Hard Disk - 160GB
 Key Board - Standard Windows Keyboard
 Mouse - Two or Three Button Mouse
 Monitor - SVGA

5.2 SOFTWARE REQUIREMENTS:


 Operating System : Windows 7/8/10
 Application Server : Tomcat 7.0
 Front End : HTML, JSP
 Scripts : JavaScript.

 Server side Script : Java Server Pages.

 Database : My SQL 6.0

 Database Connectivity : JDBC


5.3 Features ofSoftware
HTML:

HTML or Hypertext Markup Language is the standard markup language used to


The first tag in a pair is the start tag, and the second tag is the end tag (they are also
calledopeningtagsandclosingtags).Thoughnotalwaysnecessary,itisbestpracticeto append
a slash to tags which are not paired with a closingtag.

ThepurposeofawebbrowseristoreadHTMLdocumentsandcomposethemintovisible
oraudiblewebpages.ThebrowserdoesnotdisplaytheHTMLtags,butusesthetagsto interpret
the content of the page. HTML describes the structure of a website semantically along
with cues for presentation, making it a markup language rather than a programming
language.

HTML elements form the building blocks of all websites. HTML allows images and
objectstobeembeddedandcanbeusedtocreateinteractiveforms.Itprovidesameans to
create structured documents by denoting structural semantics for text such as headings,
paragraphs, lists, links, quotes and other items. It can embed scripts written in
languages such as JavaScript which affect the behavior of HTML webpages.

5.4 CASCADING STYLE SHEETS (CSS):

It is a style sheet language used for describing the look and formatting of a document
written in a markup language. While most often used to style web
pages and interfaces written in HTML and XHTML, the language can be applied to any
kind of XML document, including plain XML, SVG and XUL. CSS is a cornerstone
specificationofthewebandalmostallwebpagesuseCSSstylesheetstodescribetheir
presentation.

CSS is designed primarily to enable the separation of document content from document
presentation,includingelementssuchasthelayout,colors,andfonts.Thisseparationcan
improve content accessibility, provide more flexibility and control in the specification of
presentation characteristics, enable multiple pages to share formatting, and reduce
complexity and repetition in the structural content.

CSS can also allow the same markup page to be presented in different styles for
different rendering methods, such as on-screen, in print, by voice (when read out by a
speech-based browser or screen reader) and on Braille-based, tactile devices. It can
also be used to allow the web page.
to display differently depending on the screen size or device on which it is being viewed.
While the author of a document typically links that document to a CSS file, readers can
use a different style sheet, perhaps one on their own computer, to override the one the
author has specified. However if the author or the reader did not link the document to a
specific style sheet the default style of the browser will be applied.

5.5 Introduction to MySQL

My SQL database maintains its own system catalog which contains information related
to:

● Database objects (tables, indexes, stored procedures,views,triggers, and soon).


● Constraints.
● Database Architecture MySQL
● Users andPermissions.
● User-defined datatypes.
● Schemaobjects.
● Files used by thedatabase.
● Replicationdefinition.
● Snapshotdefinitions.

The system level information for an instance of My SQL is recorded by the master
database. The recorded information includes the following:

● Database names and the primary file location for eachdatabase.


● My SQL login accounts.
● Systemmessages.
● Database configurationvalues.
● Remote and/or linked servers-a feature in My SQL which enables you to execute
commands against OLEDB data sources on remoteservers.
● Current activityinformation.
● Endpoint information-endpoints are means of implementing TCP protocol-based
interfaces for implementation of certain features including HTTP web services,
Service Broker, Databasemirroring.
● System stored procedures. In My SQL, the system objects are not stored in the
master database but stored in a hidden data base, called the resource database.
The system catalog is used in My SQL in order to retrieve metadata information
about objects in a database. The system catalogs are accessible to the user as
catalog views.

In order to monitor health of a server instance, diagnose problems and tune


performance, My SQL Dynamic Management views can be used. The dynamic
management views in My SQL are similar to the views in Oracle which are used for
performancemonitoring.LiketheSYSTEMtablespaceinOracle,theMySQLmaster
database must be available to access any other database. As such, it is important to
protect against failures by backing up the master database after any significant
changes are made to the database. Database administrator can also mirror the files
that make up the master database.

5.6 Features in JSP:

1. It is very simple and easy to use, compare to other language it is very simple
and easy, this is widely used all over theworld.

2. It is an interpreted language, i.e. there is no need for compilation.

3. Open source means you no need to pay for use jsp, you can free download and
use.

4. JSP code will be run on every platform, Linux, Unix, Mac OS X,Windows.

5. Allows to defined custom tags, the developer can fill conferrable to use any kind,
framework based markup tags inJSP.

6. JSP is easy to learn, easy to understand and easy to develop. JSPs are more
convenient to write than Servlets because they allow you to embed Java code
directlyintoyourHTMLpages,incaseofservletsyouembedHTMLinside ofJava
code.PHP is supported on multipleoperating systems. .

7. In JSP, we can use a lot of tags such as action tags, jstl, custom tags etc. that
reduces thecode.

8. The language has now become a reliable language, efficient and viable. It is
capable of supporting sites that sollicent millions ofdaily
6.SystemDesign
6.1 UML DIAGRAMS
UML stands for Unified Modeling Language. UML is a standardized general-purpose
modeling language in the field of object-oriented software engineering. The standard is
managed, and was created by, the Object Management Group.
The goal is for UML to become a common language for creating models of object
oriented computer software. In its current form UML is comprised of two major
components: a Meta-model and a notation. In the future, some form of method or process
may also be added to; or associated with, UML.
The Unified Modeling Language is a standard language for specifying, Visualization,
Constructing and documenting the artifacts of software system, as well as for business
modeling and other non-software systems.
The UML represents a collection of best engineering practices that have proven
successful in the modeling of large and complex systems.
The UML is a very important part of developing objects oriented software and the
software development process. The UML uses mostly graphical notations to express the
design of software projects.

6.2 GOALS:
The Primary goals in the design of the UML are as follows:
1. Provide users a ready-to-use, expressive visual modeling Language so that they can
develop and exchange meaningful models.
2. Provide extendibility and specialization mechanisms to extend the core concepts.
3. Be independent of particular programming languages and development process.
4. Provide a formal basis for understanding the modeling language.
5. Encourage the growth of OO tools market.
6. Support higher level development concepts such as collaborations, frameworks,
patterns and components.
7. Integrate best practices.
6.3 USE CASE DIAGRAM:
A use case diagram in the Unified Modeling Language (UML) is a type of behavioral
diagram defined by and created from a Use-case analysis. Its purpose is to present a
graphical overview of the functionality provided by a system in terms of actors, their goals
(represented as use cases), and any dependencies between those use cases. The main
purpose of a use case diagram is to show what system functions are performed for which
actor. Roles of the actors in the system can be depicted.

Login

View users

Attribute center
View files

Generate key

Logout

Attribute Center
Registration

Login

Data Owner
Upload files

View files

Check status

Logout

Data Owner
Login

View data owners

Cloud Service provider

View users

View files

Logout

Cloud Service provider


registartion

login

Receiver

View profile

View files

send request

download files

Logout

Receiver
Token Generator
login

View files

Token generator
Check status

Generate key

Logout

6.4 CLASS DIAGRAM:


In software engineering, a class diagram in the Unified Modeling Language (UML) is a type
of static structure diagram that describes the structure of a system by showing the system's
classes, their attributes, operations (or methods), and the relationships among the classes.
It explains which class contains information.
Attribute center Dataowner Cloud service provider Receiver token generator
+username +username +username
+password +username +username
+password +password +password
+phone number +password
+Login() +Emial address +login() +mobile number
+view user() +View dataowners() +email address +Login()
+view file() +registartion() +view users() +view file()
+logiin() +registration() +check status()
+generate key() +view files() +login()
+logout() +upload files() +logout() +Generate key()
+view files() +view profile() +logout()
+check status() +view file()
+logout() +send request()
+download files()
+logout()

6.5 SEQUENCE DIAGRAM:


A sequence diagram in Unified Modeling Language (UML) is a kind of interaction diagram
that shows how processes operate with one another and in what order. It is a construct of a
Message Sequence Chart. Sequence diagrams are sometimes called event diagrams,
event scenarios, and timing diagrams.

Attribute center Data owner Csp system receiver token generator

1 : login()

2 : registration()

4 : registration()
3 : login()
5 : login()
6 : view file()
7 : view users()

9 : login()
8 : view profile()
11 : send request()
12 : view files() 10 : view file()

14 : upload file() 13 : check status()

15 : generate key()

16 : generate key()

17 : download file()
18 : view files()

19 : check status()

20 : view dataowners()

21 : view users()

22 : view files()

Collaboration Diagram:
In collaboration diagram the method call sequence is indicated by some numbering
technique as shown below. The number indicates how the methods are called one after
another. We have taken the same order management system to describe the collaboration
diagram. The method calls are similar to that of a sequence diagram. But the difference is
that the sequence diagram does not describe the object organization where as the
collaboration diagram shows the object organization.

ACTIVITY DIAGRAM:
Activity diagrams are graphical representations of workflows of stepwise activities and
actions with support for choice, iteration and concurrency. In the Unified Modeling
Language, activity diagrams can be used to describe the business and operational step-by-
step workflows of components in a system. An activity diagram shows the overall flow of
control.

Attribute center Data owner csp Receiver Token generator

Registration
Login View data owner
Regstration Login

Login
View user
Login

view users View file


View profile
View file
upload file

View file check status


Generate key

view file

View files
send request
generate key
check status

download file

Logout
Data Owner
attribute center

receiver
system
csp

token generatorr

DEPLOYMENT DIAGRAM
Deployment diagram represents the deployment view of a system. It is related to the
component diagram. Because the components are deployed using the deployment
diagrams. A deployment diagram consists of nodes. Nodes are nothing but physical
hardware’s used to deploy the application.
.

Attribute Center Data owner

receiv err System

Csp

token generato
7. Implementation
7.1 Modules:
Data Owner
In this module, the data provider uploaded the data into the cloud then request
will goes to the private cloud. In the private cloud verifies the data whether it is available in
the public cloud or not. If not available then it will be stored into the public cloud in
encrypted format otherwise the response will go to the data provider with the message of
the file already available (Duplicated File).
 Register
 Login
 Upload the data into cloud (The Request will goes to private Cloud)
 Checking status of uploading data
 Logout

Token Generator
In this module, a user views the all files details, while viewing the file if we want to
download the file first user wants to send a request for a file that request will send to
Attribute Authority. Then the Attribute Authority will give a response in the form security
key. By entering that key file will be decrypted and downloaded.
 Register
 Login
 View all files
 Send request for files (this request will goes to Attribute Authority)
 View Response given by the Attribute Authority.
 Logout

Attribute Center
In this module, the Attribute Authority is responsible for providing security keys to the user if
any user sends the request for files.
 Login
 View Requests which are sended by the users
 Give response to user
 Logout

Data User
In these modules, private cloud is mainly used to duplication checking of files. When Data
Provider uploads the data verification done by the private cloud if data is not duplicate then
file will stored into the public cloud otherwise send back to data provider.
 Login
 View files which are uploaded by the data provider.
 File Verification (Duplication Checking)
 Give response to Data provider.
 Logout

Input & Output


Input data: Text file which have some data (Hi how r u)
Stored in cloud with encryption format i.e.,
EnCt25d519c9df68f86fdddc65755d152291b6a78d0ca5d519c9df68f86fdddc65755A1ZeDR
afIgH
JI5B0JF0bAlsEgk8X+cbD7e2Qr3ibATtlz9iIhVpWnB0=IwEmS
Output: We will get the original data by decrypting the encrypted data

Algorithm INPUT & OUTPUT (Attribute Based Encryption)

7.2 CODE :
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<!--
Template Name: Educational Theory
Author: <a href="http://www.os-templates.com/">OS Templates</a>
Author URI: http://www.os-templates.com/
Licence: Free to use under our free template licence terms
Licence URI: http://www.os-templates.com/template-terms
-->
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>NetSpam</title>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
<link rel="stylesheet" href="layout/styles/layout.css" type="text/css" />
<script type="text/javascript" src="layout/scripts/jquery.min.js"></script>
<!-- Featured Slider -->
<script type="text/javascript" src="layout/scripts/jquery-s3slider.js"></script>
<script type="text/javascript">
$(document).ready(function() {
$("#featured_slide_").s3Slider({
timeOut:10000
});
});
</script>
<!-- / Featured Slider -->
</head>
<body id="top">
<div class="wrapper row1">
<div id="topnav">
<ul>
<li><a href="index.html"><strong>Home</strong></a></li>
<li class="active"><a href="admin.jsp"><strong>Admin</strong></a></li>
<li><a href="user.jsp"><strong>User</strong></a></li>
</ul>
</div>
</div>
<!--
########################################################################
############################### -->
<div class="wrapper row2">
<div id="header" class="clear">
<div class="fl_left">
<center><h1><a href="index.html">NetSpam: a Network-based Spam Detection
Framework for Reviews in Online Social Media</a></h1></center>
</div>
</div>
</div>
<!--
########################################################################
############################### -->
<div class="wrapper row5">
<div id="container" class="clear">
<form action="admin1.jsp" method="post"><br><br><br>
<center><h2>Admin Login</h2></center>
<center>
<table>
<tr>
<td>Admin Name </td>
<td><input type="text" name="name"></td>
</tr>
<tr>
<td>Password </td>
<td><input type="password" name="pswd"></td>
</tr>
<tr>
<td align="right"><input type="submit" value="Login" name="reg"></td>
<td><input type="reset" value="clear"></td>
</tr>
</table>
</center>
</form>
</div>
</div>
<!--
########################################################################
############################### -->
<div class="wrapper">
<div id="footer" class="clear">
<!--
########################################################################
############################### -->
<div id="copyright" class="clear">
<center><p>Copyright &copy; 2017 - All Rights Reserved - <a
href="http://www.takeoffprojects.com/">TakeOff</a></p></center>
</div>
<!--
########################################################################
############################### -->
</div>
</div>
</body>
</html>
<%@page import="java.sql.*" %>
<%
String name = request.getParameter("name");
String pswd = request.getParameter("pswd");
if(name.equals("admin")&&pswd.equals("admin"))
{
response.sendRedirect("adminhome1.jsp?msg=Login Successful");
}
else
{
response.sendRedirect("admin2.jsp?msg=Please enter valid credentials");
}
%>
7 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
8 <!--
9 Template Name: Educational Theory
10 Author: <a href="http://www.os-templates.com/">OS Templates</a>
11 Author URI: http://www.os-templates.com/
12 Licence: Free to use under our free template licence terms
13 Licence URI: http://www.os-templates.com/template-terms
14 -->
15 <html xmlns="http://www.w3.org/1999/xhtml">
16 <head>
17 <title>NetSpam</title>
18 <meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
19 <link rel="stylesheet" href="layout/styles/layout.css" type="text/css" />
20 <script type="text/javascript" src="layout/scripts/jquery.min.js"></script>
21 <!-- Featured Slider -->
22 <script type="text/javascript" src="layout/scripts/jquery-s3slider.js"></script>
23 <script type="text/javascript">
24 $(document).ready(function() {
25 $("#featured_slide_").s3Slider({
26 timeOut:10000
27 });
28 });
29 </script>
30 <!-- / Featured Slider -->
31 </head>
32 <body id="top">
33 <div class="wrapper row1">
34 <div id="topnav">
35 <ul>
36 <li class="active"><a href="index.html"><strong>Home</strong></a></li>
37 <li><a href="admin.jsp"><strong>Admin</strong></a></li>
38 <li><a href="user.jsp"><strong>User</strong></a></li>
39 </ul>
40 </div>
41 </div>
42 <!--
####################################################################
################################### -->
43 <div class="wrapper row2">
44 <div id="header" class="clear">
45 <div class="fl_left">
46 <center><h1><a href="index.html">NetSpam: a Network-based Spam Detection
Framework for Reviews in Online Social Media</a></h1></center>
47 </div>
48 </div>
49 </div>
50 <!--
####################################################################
################################### -->
51 <div class="wrapper row5">
52 <div id="container" class="clear">
53 <form action="admin1.jsp" method="post">
54 <center><h2>Admin Login</h2></center>
55 <center><p style="color:red;">Please enter valid credentials</p></center>
56 <center>
57 <table>
58 <tr>
59 <td>Admin Name</td>
60 <td><input type="text" name="name"></td>
61 </tr>
62 <tr>
63 <td>Password</td>
64 <td><input type="password" name="pswd"></td>
65 </tr>
66 <tr>
67 <td align="right"><input type="submit" value="Login" name="reg"></td>
68 <td><input type="reset" value="clear"></td>
69 </tr>
70 </table>
71 </center>
72 </form>
73 </div>
74 </div>
75 <!--
####################################################################
################################### -->
76 <div class="wrapper">
77 <div id="footer" class="clear">
78 <!--
####################################################################
################################### -->
79 <div id="copyright" class="clear">
80 <center><p>Copyright &copy; 2017 - All Rights Reserved - <a
href="http://www.takeoffprojects.com/">TakeOff</a></p></center>
81 </div>
82 <!--
####################################################################
################################### -->
83 </div>
84 </div>
85 </body>
86 </html>

<%@page import="java.util.*"%>
<%@page import="java.io.*"%>
<%@page import="java.sql.*"%>
<%!int v=0;
int b=0;
int p=0,n=0;
double m=0;
int po=0;
intni=0;
String[] result;
%>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>NetSpam</title>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
<link rel="stylesheet" href="layout/styles/layout.css" type="text/css" />
<script type="text/javascript" src="layout/scripts/jquery.min.js"></script>
<!-- Featured Slider -->
<script type="text/javascript" src="layout/scripts/jquery-s3slider.js"></script>
<script type="text/javascript">
$(document).ready(function() {
$("#featured_slide_").s3Slider({
timeOut:10000
});
});
</script>
<!-- / Featured Slider -->
</head>
<body id="top">
<div class="wrapper row1"><br><br>
<div id="topnav">
<ul>
<li><a href="upload.jsp"><strong>Upload Product</strong></a></li>
<li><a href="view.jsp"><strong>View Product</strong></a></li>
<li><a href="review.jsp"><strong>All Reviews</strong></a></li>
<li class="active"><a href="graph.jsp"><strong>Graph</strong></a></li>
<li><a href="spam.jsp"><strong>Spam Users</strong></a></li>
<li><a href="logout.jsp"><strong>Logout</strong></a></li>
</ul>
</div>
</div>
<!--
#######################################################################
################################ -->
<div class="wrapper row2">
<div id="header" class="clear">
<div class="fl_left">
<center><h1><a href="index.html">NetSpam: a Network-based Spam Detection
Framework for Reviews in Online Social Media</a></h1></center>
</div>
</div>
</div>
<!--
#######################################################################
################################ -->
<div class="wrapper row5">
<div id="container" class="clear">
<%
ArrayList list=new ArrayList();
BufferedReader br1=new BufferedReader(new
FileReader("C:/Users/Surekha/Desktop/dataset/positive.csv"));
String line = "";
String line1="";
while((line=br1.readLine())!=null)
{
list.add(line);
}
ArrayList list1=new ArrayList();
BufferedReader br2=new BufferedReader(new
FileReader("C:/Users/Surekha/Desktop/dataset/negative"));
while((line1=br2.readLine())!=null)
{
list1.add(line1);
}
try{
Class.forName("com.mysql.jdbc.Driver");
Connection
con1=DriverManager.getConnection("jdbc:mysql://localhost:3306/netspam","root","root");
PreparedStatementps=con1.prepareStatement("select comments from comments");
ResultSetrs=ps.executeQuery();
ArrayList<String> list3= new ArrayList<String>();
while (rs.next()){
list3.add(rs.getString(1));
result = new String[list3.size()];
result = list3.toArray(result);
}
for(inti =0; i<result.length; i++){
//System.out.println(result[i]);
if(list.contains(result[i].toLowerCase()))
{
//System.out.println(result[i]);
po++;
//System.out.println(po);
}
if(list1.contains(result[i].toLowerCase()))
{
//System.out.println(result[i]);
ni++;
//System.out.println(ni);
}
}
}
catch(Exception ae){
System.out.println(ae);
}
try{
Class.forName("com.mysql.jdbc.Driver");
Connection
con=DriverManager.getConnection("jdbc:mysql://localhost:3306/netspam","root","root");
PreparedStatement ps1=con.prepareStatement("select * from comments");
ResultSet rs1=ps1.executeQuery();
%><center><table align="center" cellspacing="5" border="1" width="60%">
<tr>
<th align="center"><font>Email Id</font></th>
<th align="center"><font>Product Id</font></th>
<th align="center"><font>Order Id</font></th>
<th align="center"><font>Comments</font></th>
<th align="center"><font>Rating</font></th>
</tr>
<%while(rs1.next())
{
%>
<tr>
<td align="center"><font color="green"><%=rs1.getString(1)%></font></td>
<td align="center"><font color="green"><%=rs1.getString(2)%></font></td>
<td align="left"><font color="green"><%=rs1.getString(3)%></font></td>
<td align="left"><font color="red"><%=rs1.getString(4)%></font></td>
<td align="left"><font color="green"><%=rs1.getString(5)%></font></td>
</tr>
<%}
}
catch(Exception e)
{
out.println(e);
}
//System.out.println(p);
m=(po*100/(po+ni));
// System.out.println(m);
//System.out.println(n);
%>
<div id="chartContainer" style="height: 300px; align:center; width:
70%;"></div><br><br><br>
</table>
</center>
<script type="text/javascript">

window.onload = function () {
var chart = new CanvasJS.Chart("chartContainer", {
theme: "theme2",//theme1
title:{
text: "Positive And Negative Reviews"
},
animationEnabled: false, // change to true
data: [
{
// Change type to "bar", "area", "spline", "pie",etc.
type: "column",
dataPoints: [
{label: " positive ",y: <%=po%>},
{label: " negative " ,y: <%=ni%>},
{label: " accuracy " ,y: <%=m%>},
]
}
]
});
chart.render();
}
</script>
</div>
</div>
<%po=0;
ni=0;
m=0; %>
</div>
</div>
<!--
#######################################################################
################################ -->
<div class="wrapper">
<div id="footer" class="clear">
<!--
#######################################################################
################################ -->
<div id="copyright" class="clear">
<center><p>Copyright &copy; 2017 - All Rights Reserved - <a
href="http://www.takeoffprojects.com/">TakeOff</a></p></center>
</div>
<!--
#######################################################################
################################ -->
</div>
<script src="assets/js/canvasjs.min.js"></script>
</div>
</body>
</html>

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"


"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<!--
Template Name: Educational Theory
Author: <a href="http://www.os-templates.com/">OS Templates</a>
Author URI: http://www.os-templates.com/
Licence: Free to use under our free template licence terms
Licence URI: http://www.os-templates.com/template-terms
-->
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>NetSpam</title>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
<link rel="stylesheet" href="layout/styles/layout.css" type="text/css" />
<script type="text/javascript" src="layout/scripts/jquery.min.js"></script>
<!-- Featured Slider -->
<script type="text/javascript" src="layout/scripts/jquery-s3slider.js"></script>
<script type="text/javascript">
$(document).ready(function() {
$("#featured_slide_").s3Slider({
timeOut:10000
});
});
</script>
<!-- / Featured Slider -->
</head>
<body id="top">
<div class="wrapper row1">
<div id="topnav">
<ul>
<li class="active"><a href="index.html"><strong>Home</strong></a></li>
<li><a href="admin.jsp"><strong>Admin</strong></a></li>
<li><a href="user.jsp"><strong>User</strong></a></li>
</ul>
</div>
</div>
<!--
#######################################################################
################################ -->
<div class="wrapper row2">
<div id="header" class="clear">
<div class="fl_left">
<center><h1><a href="index.html">NetSpam: a Network-based Spam Detection
Framework for Reviews in Online Social Media</a></h1></center>
</div>
</div>
</div>
<!--
#######################################################################
################################ -->
<div class="wrapper row5">
<div id="container" class="clear">
<div class="empty60"></div>

</div>
</div>
<!--
#######################################################################
################################ -->
<div class="wrapper">
<div id="footer" class="clear">
<!--
#######################################################################
################################ -->
<div id="copyright" class="clear">
<center><p>Copyright &copy; 2017 - All Rights Reserved - <a
href="http://www.takeoffprojects.com/">TakeOff</a></p></center>
</div>
<!--
#######################################################################
################################ -->
</div>
</div>
</body>
</html>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<!--
Template Name: Educational Theory
Author: <a href="http://www.os-templates.com/">OS Templates</a>
Author URI: http://www.os-templates.com/
Licence: Free to use under our free template licence terms
Licence URI: http://www.os-templates.com/template-terms
-->
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>NetSpam</title>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
<link rel="stylesheet" href="layout/styles/layout.css" type="text/css" />
<script type="text/javascript" src="layout/scripts/jquery.min.js"></script>
<!-- Featured Slider -->
<script type="text/javascript" src="layout/scripts/jquery-s3slider.js"></script>
<script type="text/javascript">
$(document).ready(function() {
$("#featured_slide_").s3Slider({
timeOut:10000
});
});
</script>
<!-- / Featured Slider -->
</head>
<body id="top">
<div class="wrapper row1">
<div id="topnav">
<ul>
<li><a href="index.html"><strong>Home</strong></a></li>
<li><a href="admin.jsp"><strong>Admin</strong></a></li>
<li class="active"><a href="user.jsp"><strong>User</strong></a></li>
</ul>
</div>
</div>
<!--
#######################################################################
################################ -->
<div class="wrapper row2">
<div id="header" class="clear">
<div class="fl_left">
<center><h1><a href="index.html">NetSpam: a Network-based Spam Detection
Framework for Reviews in Online Social Media</a></h1></center>
</div>
</div>
</div>
<!--
#######################################################################
################################ -->
<div class="wrapper row5">
<div id="container" class="clear"><br><br><br>
<form action="nuser.jsp" method="post">
<center><h2>User Login</h2></center>
<center>
<table>
<tr>
<td>Email Id</td>
<td><input type="text" name="email"></td>
</tr>
<tr>
<td>Password</td>
<td><input type="password" name="pswd"></td>
</tr>
<tr>
<td align="right"><input type="submit" value="Login"/></td>
<td><input type="reset" value="clear"/></td>
</tr>
</table>
<center><p style="color:blue">To Register, please click here <a class="hover" style="
text-decoration:none; text-decoration:underline; color:red"
href="userreg.jsp">Register</a></p></center>
</center>
</form>
</div>
</div>
<!--
#######################################################################
################################ -->
<div class="wrapper">
<div id="footer" class="clear">
<!--
#######################################################################
################################ -->
<div id="copyright" class="clear">
<center><p>Copyright &copy; 2017 - All Rights Reserved - <a
href="http://www.takeoffprojects.com/">TakeOff</a></p></center>
</div>
<!--
#######################################################################
################################ -->
</div>
</div>
</body>
</html>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<!--
Template Name: Educational Theory
Author: <a href="http://www.os-templates.com/">OS Templates</a>
Author URI: http://www.os-templates.com/
Licence: Free to use under our free template licence terms
Licence URI: http://www.os-templates.com/template-terms
-->
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>NetSpam</title>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
<link rel="stylesheet" href="layout/styles/layout.css" type="text/css" />
<script type="text/javascript" src="layout/scripts/jquery.min.js"></script>
<!-- Featured Slider -->
<script type="text/javascript" src="layout/scripts/jquery-s3slider.js"></script>
<script type="text/javascript">
$(document).ready(function() {
$("#featured_slide_").s3Slider({
timeOut:10000
});
});
</script>
<script type="text/javascript">
function Upload() {
varfileUpload = document.getElementById("fileUpload");
if (typeof (fileUpload.files) != "undefined") {
var size = parseFloat(fileUpload.files[0].size / 1024).toFixed(2);
alert(size + " KB.");
} else {
alert("This browser does not support HTML5.");
}
}
</script>
<!-- / Featured Slider -->
</head>
<body id="top">
<div class="wrapper row1"><br><br>
<div id="topnav">
<ul>
<li class="active"><a href="upload.jsp"><strong>Upload Product</strong></a></li>
<li><a href="view.jsp"><strong>View Product</strong></a></li>
<li><a href="review.jsp"><strong>All Reviews</strong></a></li>
<li><a href="graph.jsp"><strong>Graph</strong></a></li>
<li><a href="spam.jsp"><strong>Spam Users</strong></a></li>
<li><a href="logout1.jsp"><strong>Logout</strong></a></li>
</ul>
</div>
</div>
<!--
#######################################################################
################################ -->
<div class="wrapper row2">
<div id="header" class="clear">
<div class="fl_left">
<center><h1><a href="index.html">NetSpam: a Network-based Spam Detection
Framework for Reviews in Online Social Media</a></h1></center>
</div>
</div>
</div>
<!--
#######################################################################
################################ -->
<div class="wrapper row5">
<div id="container" class="clear">
<center><h2>Please, Upload Your Product Details</h2></center>
<form method="post" action="upload1.jsp">
<center>
<table border="0">
<tr>
<td>Product Category</td>
<td><select name="category">
<option>Select</option>
<option value="Mobile">Mobile</option>
<option value="Shoes">Shoes</option>
<option value="Clothes">Clothes</option>
</select>
</td>
</tr>
<tr>
<td>Product Name</td>
<td><input type="text" name="name"></td>
</tr>
<tr>
<td>Product Brand</td>
<td><input type="text" name="brand"></td>
</tr>
<tr>
<td>Price</td>
<td><input type="text" name="price"></td>
</tr>
<tr>
<td>Upload Your File </td>
<td><input type="file" name="photo" id="fileUpload" accept=".jpg, .jpeg" /></td>
</tr>
<tr>
<td align="right"><input type="submit" value="upload" onclick="Upload()"/></td>
<td><input type="reset" value="clear"></td>
</tr>
</table>
</center>
</form>

</div>
</div>
<!--
#######################################################################
################################ -->
<div class="wrapper">
<div id="footer" class="clear">
<!--
#######################################################################
################################ -->
<div id="copyright" class="clear">
<center><p>Copyright &copy; 2017 - All Rights Reserved - <a
href="http://www.takeoffprojects.com/">TakeOff</a></p></center>
</div>
<!--
#######################################################################
################################ -->
</div>
</div>
</body>
</html>
<%@page import="java.sql.*" %>
<%
try{
Class.forName("com.mysql.jdbc.Driver");
Connection
con=DriverManager.getConnection("jdbc:mysql://localhost:3306/netspam","root","root");
PreparedStatement ps1=con.prepareStatement("select * from image");
ResultSet rs1=ps1.executeQuery();
%>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>NetSpam</title>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
<link rel="stylesheet" href="layout/styles/layout.css" type="text/css" />
<link rel="stylesheet" href="css/main.css"/>
<link rel="stylesheet" href="css/bootstrap.min.css"/>
<script type="text/javascript" src="layout/scripts/jquery.min.js"></script>
<!-- Featured Slider -->
<script type="text/javascript" src="layout/scripts/jquery-s3slider.js"></script>
<script type="text/javascript">
$(document).ready(function() {
$("#featured_slide_").s3Slider({
timeOut:10000
});
});
</script>
<!-- / Featured Slider -->
</head>
<body id="top">
<div class="wrapper row1"><br><br>
<div id="topnav">
<ul>
<li><a href="upload.jsp"><strong>Upload Product</strong></a></li>
<li class="active"><a href="view.jsp"><strong>View Product</strong></a></li>
<li><a href="review.jsp"><strong>All Reviews</strong></a></li>
<li><a href="graph.jsp"><strong>Graph</strong></a></li>
<li><a href="spam.jsp"><strong>Spam Users</strong></a></li>
<li><a href="logout.jsp"><strong>Logout</strong></a></li>
</ul>
</div>
</div>
<!--
#######################################################################
################################ -->
<div class="wrapper row2">
<div id="header" class="clear">
<div class="fl_left">
<center><h1><a href="index.html">NetSpam: a Network-based Spam Detection
Framework for Reviews in Online Social Media</a></h1></center>
</div>
</div>
</div>
<!--
#######################################################################
################################ -->
<div class="wrapper row5">

<div id="container" class="clear">

<div class="features_items"><!--features_items-->
<%while(rs1.next())
{
%>
<div class="box_div">
<div class="product-image-wrapper">
<div class="single-products">
<div class="productinfo text-
center">
<imgsrc="view1.jsp?pid=<
%=rs1.getString(1)%>" width="65%" height="250px"/>
<h2>$<
%=rs1.getString(5)%></h2>
<p><
%=rs1.getString(3)%></p>
</div>
</div>
</div>
</div>
<%}
rs1.close();
ps1.close();
con.close();
}
catch(Exception e)
{
out.println(e);
}
%>

</div>

</div>
</div>
<!--
#######################################################################
################################ -->
<div class="wrapper">
<div id="footer" class="clear">
<!--
#######################################################################
################################ -->
<div id="copyright" class="clear">
<center><p>Copyright &copy; 2017 - All Rights Reserved - <a
href="http://www.takeoffprojects.com/">TakeOff</a></p></center>
</div>
<!--
#######################################################################
################################ -->
</div>
</div>
</body>
</html>
<%@page import="java.sql.*" %>
<%
response.setHeader("Cache-Control","no-cache");
response.setHeader("Cache-Control","no-store");
response.setHeader("Pragma","no-cache");
response.setDateHeader ("Expires", 0);
if(session.getAttribute("email")== null)
{
response.sendRedirect(request.getContextPath() + "/index.html");
}
%>
<%
try{
Class.forName("com.mysql.jdbc.Driver");
Connection
con=DriverManager.getConnection("jdbc:mysql://localhost:3306/netspam","root","root");
PreparedStatement ps1=con.prepareStatement("select * from image");
ResultSet rs1=ps1.executeQuery();
%>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>NetSpam</title>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
<link rel="stylesheet" href="layout/styles/layout.css" type="text/css" />
<link rel="stylesheet" href="css/main.css"/>
<link rel="stylesheet" href="css/bootstrap.min.css"/>
<script type="text/javascript" src="layout/scripts/jquery.min.js"></script>
<!-- Featured Slider -->
<script type="text/javascript" src="layout/scripts/jquery-s3slider.js"></script>
<script type="text/javascript">
$(document).ready(function() {
$("#featured_slide_").s3Slider({
timeOut:10000
});
});
</script>
<!-- / Featured Slider -->
</head>
<body id="top">
<div class="wrapper row1"><br><br>
<div id="topnav">
<ul>
<li class="active"><a href="views.jsp"><strong>View Products</strong></a></li>
<li><a href="order.jsp"><strong>My Order</strong></a></li>
<li><a href="logout.jsp"><strong>Logout</strong></a></li>
</ul>
</div>
</div>
<!--
#######################################################################
################################ -->
<div class="wrapper row2">
<div id="header" class="clear">
<div class="fl_left">
<center><h1><a href="index.html">NetSpam: a Network-based Spam Detection
Framework for Reviews in Online Social Media</a></h1></center>
</div>
</div>
</div>
<!--
#######################################################################
################################ -->
<div class="wrapper row5">

<div id="container" class="clear">


<div class="features_items"><!--features_items-->
<%while(rs1.next())
{
%>
<div class="box_div">
<div class="product-image-wrapper">
<div class="single-products">
<div class="productinfo text-
center">
<imgsrc="view1.jsp?pid=<
%=rs1.getString(1)%>" width="65%" height="250px"/>
<h2>$<
%=rs1.getString(5)%></h2>
<p><
%=rs1.getString(3)%></p>
</div>
<div class="product-overlay">
<div class="overlay-
content">
<h2>$<
%=rs1.getString(5)%></h2>
<p><
%=rs1.getString(3)%></p>
<a
href="norder.jsp?pid=<%=rs1.getString(1)%>&name=<%=rs1.getString(3)%>&brand=<
%=rs1.getString(4)%>&price=<%=rs1.getString(5)%>" class="btnbtn-default add-to-
cart"><i class="fa fa-shopping-cart"></i>Order</a>
</div>
</div>
</div>
</div>
</div>
<%}
}
catch(Exception e)
{
out.println(e);
}
%>

</div>

</div>
</div>
<!--
#######################################################################
################################ -->
<div class="wrapper">
<div id="footer" class="clear">
<!--
#######################################################################
################################ -->
<div id="copyright" class="clear">
<center><p>Copyright &copy; 2017 - All Rights Reserved - <a
href="http://www.takeoffprojects.com/">TakeOff</a></p></center>
</div>
<!--
#######################################################################
################################ -->
</div>
</div>
</body>
</html>
<%@page import="java.sql.*" %>
<%
String email=request.getParameter("email");
String pswd=request.getParameter("pswd");
intcnt=0;
try
{
Class.forName("com.mysql.jdbc.Driver");
Connection
con=DriverManager.getConnection("jdbc:mysql://localhost:3306/netspam","root","root");
PreparedStatement ps1=con.prepareStatement("select count(*) from user where email=?
and pswd=?");
ps1.setString(1,email);
ps1.setString(2,pswd);
ResultSetrs=ps1.executeQuery();
while(rs.next())
{
cnt=rs.getInt(1);
}
if (cnt==1)
{
session.setAttribute("email",email);
response.sendRedirect("user1.jsp?msg=Login Successful");
}
else
{
response.sendRedirect("user2.jsp?msg=Invalid credentials. Please try again");
}
ps1.close();
con.close();
}
catch(Exception e)
{
e.printStackTrace();
}
%>
8. System Testing
The purpose of testing is to discover errors. Testing is the process of trying to discover
every conceivable fault or weakness in a work product. It provides a way to check the
functionality of components, sub assemblies, assemblies and/or a finished product It is the
process of exercising software with the intent of ensuring that the
Software system meets its requirements and user expectations and does not fail in an
unacceptable manner. There are various types of test. Each test type addresses a specific
testing requirement.

8.1 TYPES OF TESTS

Unit testing
Unit testing involves the design of test cases that validate that the internal program
logic is functioning properly, and that program inputs produce valid outputs. All decision
branches and internal code flow should be validated. It is the testing of individual software
units of the application .it is done after the completion of an individual unit before
integration. This is a structural testing, that relies on knowledge of its construction and is
invasive. Unit tests perform basic tests at component level and test a specific business
process, application, and/or system configuration. Unit tests ensure that each unique path
of a business process performs accurately to the documented specifications and contains
clearly defined inputs and expected results.

8.2 Integration testing

Integration tests are designed to test integrated software components to determine


if they actually run as one program. Testing is event driven and is more concerned with the
basic outcome of screens or fields. Integration tests demonstrate that although the
components were individually satisfaction, as shown by successfully unit testing, the
combination of components is correct and consistent. Integration testing is specifically
aimed at exposing the problems that arise from the combination of components.
8.3 Functional test

Functional tests provide systematic demonstrations that functions tested are available
as specified by the business and technical requirements, system documentation, and user
manuals.
Functional testing is centered on the following items:
Valid Input : identified classes of valid input must be accepted.
Invalid Input : identified classes of invalid input must be rejected.
Functions : identified functions must be exercised.
Output : identified classes of application outputs must be exercised.
Systems/Procedures: interfacing systems or procedures must be invoked.

Organization and preparation of functional tests is focused on requirements, key


functions, or special test cases. In addition, systematic coverage pertaining to identify
Business process flows; data fields, predefined processes, and successive processes must
be considered for testing. Before functional testing is complete, additional tests are
identified and the effective value of current tests is determined.

System Test
System testing ensures that the entire integrated software system meets requirements.
It tests a configuration to ensure known and predictable results. An example of system
testing is the configuration oriented system integration test. System testing is based on
process descriptions and flows, emphasizing pre-driven process links and integration
points.

8.4 White Box Testing


White Box Testing is a testing in which in which the software tester has knowledge of
the inner workings, structure and language of the software, or at least its purpose. It is
purpose. It is used to test areas that cannot be reached from a black box level.
8.5 Black Box Testing
Black Box Testing is testing the software without any knowledge of the inner workings,
structure or language of the module being tested. Black box tests, as most other kinds of
tests, must be written from a definitive source document, such as specification or
requirements document, such as specification or requirements document. It is a testing in
which the software under test is treated, as a black box .you cannot “see” into it. The test
provides inputs and responds to outputs without considering how the software works.
Unit Testing:

Unit testing is usually conducted as part of a combined code and unit test phase of
the software lifecycle, although it is not uncommon for coding and unit testing to be
conducted as two distinct phases.

Test strategy and approach


Field testing will be performed manually and functional tests will be written in detail.

Test objectives
 All field entries must work properly.
 Pages must be activated from the identified link.
 The entry screen, messages and responses must not be delayed.

Features to be tested
 Verify that the entries are of the correct format
 No duplicate entries should be allowed
 All links should take the user to the correct page.

Integration Testing

Software integration testing is the incremental integration testing of two or more


integrated software components on a single platform to produce failures caused by
interface defects.
The task of the integration test is to check that components or software applications,
e.g. components in a software system or – one step up – software applications at the
company level – interact without error.

Test Results: All the test cases mentioned above passed successfully. No defects
encountered.

Acceptance Testing

User Acceptance Testing is a critical phase of any project and requires significant
participation by the end user. It also ensures that the system meets the functional
requirements.

Test Results: All the test cases mentioned above passed successfully. No defects
encountered.
9.Conclusion

In this paper, we have presented a new 2FA (including both user secret key and a
lightweight security device). Access control system for web-based cloud computing
services. Based on the attribute-based access control mechanism, the proposed 2FA
access control system has been identified to not only enable the cloud server to restrict the
access to those users with the same set of attributes but also preserve user privacy.
Detailed security analysis shows that the proposed 2FA access control system achieves
the desired security requirements. Through performance evaluation, we demonstrated that
the construction is “feasible”. We leave as future work to further improve the efficiency
while keeping all nice features of the system.
10 Appendices
APPENDIX-A: User Manual

UserManualistheguidetotheusersofthesystem.Itpavesapathtothecorresponding user to
help him how to proceed further in the proper understanding of the system. The
Interfacesofthesystemgetsfamiliartotheuser,basedonthismanualonly.Thefirstform is the
login form where user has to enter his username and password; here the types of users
are Administrator, Users.If the person has connected as an administrator, he will have
rights to authorize to create User-id and passwords, Change of Users details in
Database. If the user has been connected as Administrator he can enter the Users
details, and can viewreports.
APPENDIX-B: Test Screens

User registration:

Admin/user login:
user login 2

Admin home
View users
View ordered products:

User hom
My ordered products
11 Bibliography
REFERENCES

[1] M. H. Au and A. Acadia. PERM: practical reputation-based blacklisting without TTPS. In


T. Yu, G. Dane is, and V. D. Gigot, editors, the ACM Conference on Computer and
Communications Security, CCS’12, Raleigh, NC, USA, October 16-18, 2012, pages 929–
940. ACM, 2012.
[2] M. H. Au, A. Acadia, and W. Susilo. Black: Ttp-free black list able anonymous
credentials with reputation. In NDSS. The Internet Society, 2012.
[3] M. H. Au, W. Susilo, and Y. Mu. Constant-Size Dynamic k-TAA. In SCN, volume 4116 of
Lecture Notes in Computer Science, pages 111–125. Springer, 2006.
[4] J. Baek, Q. H. Vu, J. K. Liu, X. Huang, and Y. Xiang. A secure cloud computing based
framework for big data information man- agreement of smart grid. IEEE T. Cloud
Computing, 3(2):233–244, 2015.
[5] M. Bellare and O. Goldreich. On dining proofs of knowledge. In CRYPTO, volume 740
of Lecture Notes in Computer Science, pages 390–420. Springer, 1992.
[6] J. Bethencourt, A. Sahai, and B. Waters. Ciphertext-policy attribute-based encryption. In
IEEE Symposium on Security and Privacy, pages 321–334. IEEE Computer Society, 2007.
[7] D. Boneh, X. Boyen, and H. Shacham. Short Group Signatures. In Franklin [19], pages
41–55.
[8] D. Boneh, X. Ding, and G. Tsudik. Fine-grained control of security capabilities. ACM
Trans. Internet Techn., 4(1):60–82, 2004.
APPENDIX-C : BASE PAPER
TSINGHUASCIENCEA
NDTECHNOLOGY
ISSN 1007 - 0214
04 / 12 pp34-39
Volume 18, Number 1, February 2013

Fine-grained Two-factor Access Control for Web-based Cloud


Computing Services

You might also like