0% found this document useful (0 votes)
305 views99 pages

Secure Data Transfer and Deletion From Counting Bloom Filter in Cloud Computing.

The document discusses secure data transfer and deletion from counting Bloom filters in cloud computing. It introduces cloud computing and describes the different types of cloud services - SaaS, PaaS, and IaaS. The objectives are to securely migrate data from one cloud to another and permanently delete the transferred data from the original cloud using a new counting Bloom filter scheme. The system aims to provide data confidentiality, integrity, and public verifiability during the data transfer and deletion process. Existing systems require a trusted third party to manage keys or use blockchain to verify deletion, but the proposed system aims to improve on these approaches.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
305 views99 pages

Secure Data Transfer and Deletion From Counting Bloom Filter in Cloud Computing.

The document discusses secure data transfer and deletion from counting Bloom filters in cloud computing. It introduces cloud computing and describes the different types of cloud services - SaaS, PaaS, and IaaS. The objectives are to securely migrate data from one cloud to another and permanently delete the transferred data from the original cloud using a new counting Bloom filter scheme. The system aims to provide data confidentiality, integrity, and public verifiability during the data transfer and deletion process. Existing systems require a trusted third party to manage keys or use blockchain to verify deletion, but the proposed system aims to improve on these approaches.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 99

Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud

Computing.
Chapter - 1
INTRODUCTION
1.1. BACKGROUND WORK
Cloud Computing refers to each the applications delivered as services over the web
and also the hardware and computer program within the datacenters that give those
services. The services themselves have long been named as computer code as a
Service (SaaS). The datacenter hardware and computer code is named as a Cloud.
once a Cloud is formed obtainable during a pay-as-you-go manner to the general
public, it's referred to as as a Public Cloud. The service being sold is Utility
Computing. Current samples of utility Computing embrace Amazon net Services,
Google App Engine, and Microsoft Azure. The term non-public Cloud id accustomed
visit internal datacenters of a business or alternative organization that aren't created
obtainable to the general public. Thus, Cloud Computing is that the total of SaaS and
Utility Computing, however doesn't usually embrace non-public Clouds. Cloud
Computing term is employed during a general manner, exchange it with one amongst
the opposite terms only if clarity demands it. Fig. 1.1 shows the roles of the folks as
users or suppliers of those layers of Cloud Computing.

Fig: 1.1. User and Providers of Cloud Computing

. Page 1
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
The future Internet covers all research and development activities dedicated to
realizing tomorrow’s internet, i.e. enhancing a networking infrastructure which
integrates all kind of resources, usage domains etc. As such, research related to cloud
technologies form a vital part of the future Internet research agenda. Perplexities in
regards to the angles secured by distributed computing as for the future Internet
generally emerge from the expansive extent of qualities doled out to "mists", just like
the intelligent result of the re-marking blast a few years prior.

In this way, most cloud frameworks have concentrated on facilitating applications and
information on remote PCs, utilizing specifically replication techniques to guarantee
accessibility and subsequently accomplishing a heap adjusting versatility.
Notwithstanding, the reasonable model of mists surpasses such a basic specialized
approach and prompts to challenges similar to the ones without bounds Internet, yet
with marginally extraordinary concentration because of the mix of ideas and
objectives certain to cloud frameworks. As it were, as a mechanical acknowledgment
driven by a financial recommendation, cloud frameworks would offer capacities that
empower significant parts without bounds Internet.
Sorts of Cloud Services: : There are four sorts of cloud administrations, as appeared
in Figure 1.2.Some items offer Internet based administrations, for example,
stockpiling, middleware, coordinated effort, and database capacities specifically to
clients.
SaaS: Software-as-a-Service provides software as a shareware. The software can be
used for a period of time as per the wish of the user and the user can pay accordingly.

PaaS: Platform-as-a-Service products offer usage of a Platform per usage payable.


The user can utilize the Platform fully or partially.

IaaS: Infrastructure-as-a-Service product offer complete computer infrastructure as a


service and the user can pay accordingly.

. Page 2
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.

Fig: 1.2. Types of Cloud Service

Advantages:: The future Internet covers all research and development activities
dedicated to realizing tomorrow’s internet, i.e. enhancing a networking infrastructure
which integrates all kind of resources, usage domains etc. As such, research related to
cloud technologies form a vital part of the future Internet research agenda.
Perplexities in regards to the angles secured by distributed computing as for the future
Internet generally emerge from the expansive extent of qualities doled out to "mists",
just like the intelligent result of the re-marking blast a few years prior.

In this way, most cloud frameworks have concentrated on facilitating applications and
information on remote PCs, utilizing specifically replication techniques to guarantee
accessibility and subsequently accomplishing a heap adjusting versatility.
Notwithstanding, the reasonable model of mists surpasses such a basic specialized
approach and prompts to challenges similar to the ones without bounds Internet, yet
with marginally extraordinary concentration because of the mix of ideas and
objectives certain to cloud frameworks. As it were, as a mechanical acknowledgment
driven by a financial recommendation, cloud frameworks would offer capacities that
empower significant parts without bounds Internet.

. Page 3
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.

Sorts of Cloud Services: There are four sorts of cloud administrations, as appeared in
Figure 1.2.Some items offer Internet based administrations, for example, stockpiling,
middleware, coordinated effort, and database capacities specifically to clients.

SaaS: Software-as-a-Service provides software as a shareware. The software can be


used for a period of time as per the wish of the user and the user can pay accordingly.

PaaS: Platform-as-a-Service products offer usage of a Platform per usage payable.


The user can utilize the Platform fully or partially.
IaaS: Infrastructure-as-a-Service product offer complete computer infrastructure as a
service and the user can pay accordingly.
Availability:A small company generally do not offer much availability. But a large
service provider which has several resources and duplicate equipment generally offer
more availability.
Application Integration and Support:Well designed cloud platforms integrate
multiple services assets into a powerful compound application which is generally
more convenient. The systems generally use Simple Object Access Protocol (SOAP)
or Web Services Description Language (WSDL). Other open source protocols are
based on Extensible Markup Language (XML). The resources and other infrastructure
services can be supported by these protocols. Using these protocols the application
integration can be done effectively. The support can also be provided.
Flexibility:Most distributed computing sellers don't require contracts and let
clients work with their administrations as required. This makes distributed computing
a decent approach to get the additional assets required for exercises, for example,
testing new administrations or items

1.2. OBJECTIVES
With the rapid development of cloud storage, an increasing number of data
owners prefer to outsource their data to the cloud server, which can greatly reduce the
local storage overhead. Because different cloud service providers offer distinct quality

. Page 4
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
of data storage service, e.g., security, reliability, access speed and prices, cloud data
transfer has become a fundamental requirement of the data owner to change the cloud
service providers. Hence, how to securely migrate the data from one cloud to another
and permanently delete the transferred data from the original cloud becomes a
primary concern of data owners. To solve this problem, we construct a new counting
Bloom filter-based scheme in this paper.

1.3. PROJECT FEATURES


 Data confidentiality. The outsourced file may contain some private information
that should be kept secret. Hence, to protect the data confidentiality, the data
owner needs to use secure algorithms to encrypt the file before uploading it to
the cloud server.
 Data integrity. The cloud A might only migrate part of the data, or deliver some
unrelated data to the cloud B. Besides, the data might be polluted during the
transfer process. Hence, the data owner and the cloud B should be able to verify
the transferred data integrity to guarantee that the transferred data is intact.
 Public verifiability. The cloud A may not move the data to the cloud B or delete
the data faithfully. So, the verifiability of the transfer and deletion results should
be satisfied from the data owner’s point of view

. Page 5
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
CHAPTER - 2
SYSTEM ANANYSIS
2.1. EXISTING SYSTEM
Xue et al.[19] studied the goal of secure data deletion, and put forward a key-policy
attribute based encryption scheme, which can achieve data fine grained access control
and assured deletion. They reach data deletion by removing the attribute and use
Merkle hash tree (MHT) to achieve verifiability, but their scheme requires a trusted
authority.
Du et al.[20] designed a scheme called Associated deletion scheme for multi-copy
(ADM), which uses pre-deleting sequence and MHT to achieve data integrity
verification and provable deletion. However, their scheme also requires a TTP to
manage the data keys. In 2018, Yang et al.[21] presented a Blockchain-based cloud
data deletion scheme, in which the cloud executes deletion operation and publishes
the corresponding deletion evidence on Blockchain. Then any verifier can check the
deletion result by verifying the deletion proof. Besides, they solve the bottleneck of
requiring a TTP. Although these schemes all can achieve verifiable data deletion, they
cannot realize secure data transfer.
.
2.1.1. DISADVANTAGES OF EXISTING SYSTEM
 In the existing work, the system does not provide Data integrity proof.
 This system is less performance due to lack of strong encryption techniques.
2.2. PROPOSED SYSTEM
 In the proposed work, the system studies the problems of secure data transfer
and deletion in cloud storage, and focus on realizing the public verifiability.
Then the system proposes a counting Bloom filter-based scheme, which not
only can realize provable data transfer between two different clouds but also
can achieve publicly verifiable data deletion. If the original cloud server does
not migrate or remove the data honestly, the verifier (the data owner and the

. Page 6
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
target cloud server) can detect these malicious operations by verifying the
returned transfer and deletion evidences.
 Moreover, our proposed scheme does not need any Trusted third party (TTP),
which is different from the existing solutions. Furthermore, we prove that our
new proposal can satisfy the desired design goals through security analysis.
Finally, the simulation experiments show that our new proposal is efficient
and practical.
2.2.1. ADVANTAGES OF PROPOSED SYSTEM
 Data confidentiality. The outsourced file may contain some private information
that should be kept secret. Hence, to protect the data confidentiality, the data
owner needs to use secure algorithms to encrypt the file before uploading it to
the cloud server.
 Data integrity. The cloud A might only migrate part of the data, or deliver some
unrelated data to the cloud B. Besides, the data might be polluted during the
transfer process. Hence, the data owner and the cloud B should be able to verify
the transferred data integrity to guarantee that the transferred data is intact.
 Public verifiability. The cloud A may not move the data to the cloud B or delete
the data faithfully. So, the verifiability of the transfer and deletion results should
be satisfied from the data owner’s point of view.

2.3. SYSTEM STUDY


2.3.1. FEASIBILITY STUDY
The possibility of the project is analyzed during this part and business
proposal is place forth with a awfully general arrange for the project and a few value
estimates. throughout system analysis the FEASIBILITY study of the projected
system is to be distributed. this can be to make sure that the projected system isn't a
burden to the corporate. For risk analysis, some understanding of the key needs for
the system is important.

Three key issues concerned within the FEASIBILITY analysis area unit

. Page 7
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
 ECONOMICAL FEASIBILITY
 TECHNICAL FEASIBILITY
 SOCIAL FEASIBILITY

ECONOMICAL FEASIBILITY: This study is distributed to visualize the


economic impact that the system can wear the society. the quantity of fund that the
corporate will pour into the analysis and development of the system is restricted. The
expenditures should be even. so the developed system additionally inside the budget
and this was achieved as a result of most of the technologies used area unit freely out
there. solely the bespoken product had to be purchased.

TECHNICAL FEASIBILITY: This study is distributed to visualize the technical


risk, that is, the technical needs of the system. Any system developed should not have
a high demand on the out there technical resources. this can result in high demands on
the out there technical resources. this can result in high demands being placed on the
shopper. The developed system should have a modest demand, as solely borderline or
null changes area unit needed for implementing this technique.

SOCIAL FEASIBILITY: The facet of study is to visualize the amount of acceptance


of the system by the user. This includes the method of coaching the user to use the
system expeditiously. The user should not feel vulnerable by the system, instead
should settle for it as a necessity. the amount of acceptance by the users entirely
depends on the ways that area unit used to teach the user regarding the system and to
form him well-known with it. His level of confidence should be raised so he's
additionally ready to build some helpful criticism, that is welcome, as he's the
ultimate user of the system.
2.4. LITERATURE SURVEY
Literature survey is the most important step in software development process. Before
developing the tool it is necessary to determine the time factor, economy and
company Traffic Redundancy Elimination, once these things are satisfied, then next

. Page 8
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
steps are to determine which operating system and language can be used for
developing the tool. Once the programmers start building the tool the programmers
need lot of external support.

This support can be obtained from senior programmers, from book or from websites.
Before building the system we have to knownthe below concepts for developing the
proposed system.
1. Practical Techniques For Searches On Encrypted Data

It is desirable to store data on data storage servers such as mail servers and file
servers in encrypted form to reduce security and privacy risks. But this usually
implies that one has to sacrifice functionality for security. For example, if a client
wishes to retrieve only documents containing certain words, it was not previously
known how to let the data storage server perform the search and answer the query
without loss of data confidentiality. In this paper, we describe our cryptographic
schemes for the problem of searching on encrypted data and provide proofs of
security for the resulting crypto systems. Our techniques have a number of crucial
advantages. They are provably secure: they provide provable secrecy for
encryption, in the sense that the untrusted server cannot learn anything about the
plaintext when only given the ciphertext; they provide query isolation for
searches, meaning that the untrusted server cannot learn anything more about the
plaintext than the search result; they provide controlled searching, so that the
untrusted server cannot search for an arbitrary word without the user’s
authorization; they also support hidden queries, so that the user may ask the
untrusted server to search for a secret word without revealing the word to the
server. The algorithms we present are simple, fast (for a document of length , the
encryption and search algorithms only need stream cipher and block cipher
operations), and introduce almost no space and communication overhead, and
hence are practical to use today.

. Page 9
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.

2. Smart cloud search services: verifiable keyword-based semantic search


over encrypted cloud data

With the increasing popularity of the pay-as-you- consume cloud computing


paradigm, a large number of cloud services are pushed to consumers. One hand, it
brings great convenience to consumers who use intelligent terminals; on the other
hand, consumers are also facing serious difficulties that how to search the most
suitable services or products from cloud. So how to enable a smart cloud search
scheme is a critical problem in the consumer-centric cloud computing paradigm. For
protecting data privacy, sensitive data are always encrypted before being outsourced.
Although the existing searchable encryption schemes enable users to search over
encrypted data, these schemes support only exact keyword search, which greatly
affects data usability. Moreover, these schemes do not support verifiability of search
result. In order to save computation cost or download bandwidth, cloud server only
conducts a fraction of search operation or return a part of result, which is viewed as
selfish and semi-honest-but-curious. So, how to enhance flexibility of encrypted cloud
data while supporting verifiability of search result is a big challenge. To tackle the
challenge, a smart semantic search scheme is proposed in this paper, which returns
not only the result of keyword-based exact match, but also the result of keyword-
based semantic match. At the same time, the proposed scheme supports the
verifiability of search result. The rigorous security analysis and performance analysis
show that the proposed scheme is secure under the proposed model and effectively
achieves the goal of keyword-based semantic search. Pay-as-you-consume cloud
computing paradigm has become more and more prevalent, due to its benefits for
consumers, including a large number of convenient service, relief of the burden for
storage, flexible data access, reduction of cost on hardware and software. A lot of

. Page 10
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
companies have set up and provided various cloud computing services. More and
more sensitive data from consumers (e.g., photo albums, emails, personal health
records and financial transactions, etc.) have been centralized into the cloud for its
flexible management and economic savings. Meanwhile, many technical schemes
related to cloud computing service are proposed by researchers. Noh et al. proposed a
flexible communication bus model for multimedia services in cloud environment.
Shahnaza et al.proposed a realistic IEEE 802.11e EDCA model for QoS-aware
differentiated multimedia mobile cloud services. Cabarcos et al. proposed a
middleware architecture that allows sessions initiated from one device to be
seamlessly transferred to a second one under a cloud environment.

3. Achieving effective cloud search services: multi-keyword ranked search


over encrypted cloud data supporting synonym query

Cloud computing becomes increasingly popular. To protect data privacy, sensitive


data should be encrypted by the data owner before outsourcing, which makes the
traditional and efficient plaintext keyword search technique useless. The existing
searchable encryption schemes support only exact or fuzzy keyword search, not
support semantics-based multi-keyword ranked search. In the real search scenario, it
is quite common that cloud customers' searching input might be the synonyms of the
predefined keywords, not the exact or fuzzy matching keywords due to the possible
synonym substitution (reproduction of information content) and/or her lack of exact
knowledge about the data. Therefore, synonym-based multi-keyword ranked search
over encrypted cloud data remains a very challenging problem. In this paper, for the
first time, we propose an effective approach to solve the problem of synonym-based
multi-keyword ranked search over encrypted cloud data. We make contributions
mainly in two aspects: synonym-based search for supporting synonym query and
multi-keyword ranked search for achieving more accurate search result. Two secure
schemes are proposed to meet privacy requirements in two threat models of known

. Page 11
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
ciphertext model and known background model. In enhanced scheme, the sensitive
frequency information can be well protected by introducing some dummy keywords,
which is not adopted in basic scheme. We give security analysis to justify the
correctness and privacy-preserving guarantee of the proposed schemes. Extensive
experiments on real-world dataset validate our analysis and show that our proposed
solution is very efficient and effective in supporting synonym-based searching.

Cloud computing is a new model of enterprise IT infrastructure that provides on-


demand high quality applications and services from a shared pool of configuration
computing resources [1]. However, there may be existed unauthorized operation on
the outsourced data on account of curiosity or profit. To protect the privacy of
sensitive information and combat unauthorized accesses, sensitive data should be
encrypted by the data owner before outsourcing [2]. However, encrypted data make
the traditional data utilization service based on plaintext keyword search useless. The
simple and awkward method of downloading all the data and decrypting locally is
obviously impractical, because the data owner and other authorized cloud customers
must hope to search their interested data rather than all the data. What's more, taking
the potentially huge number of outsourced data and great deal of cloud customers into
consideration, it is also difficult to meet both the requirements of performance and
system usability [30]. Hence, it is an especially important thing to explore privacy-
preserving and effective search service over encrypted outsourced data.

4. Efficient semantic search over encrypted data in cloud computing

Cloud storage has become more and more popular as it provides many benefits over
traditional storage solutions. Despite the many benefits provided by cloud storage,
many security problems have also arisen in cloud storage, which prevents companies

. Page 12
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
from migrating their data to cloud storage. As a result, the owners encrypt their
sensitive data before storing it in cloud storage. While encryption increases the
security of the data, it also reduces the searchability of the data and thus, the
efficiency of the search. Recently, research has been done on several schemes which
enable keyword searching on encrypted data in cloud computing. However, these
schemes contain weaknesses which make them impractical when applied to real-life
scenarios. In this paper, we developed a system to support semantic search on
encrypted data in cloud computing with three different schemes which are “Synonym-
Based Keyword Search (SBKS)”, “Wikipedia-Based Keyword Search (WBKS)”, and
“Wikipedia-Based Synonym Keyword Search (WBSKS)”. Our results demonstrated
that our schemes are more efficient in terms of performance and storage requirements
than the former proposed schemes. Therefore, our developed schemes are more
practical than the former proposed schemes. Cloud storage has become a preferred
method of storage as it provides many benefits over traditional storage solutions. With
cloud storage, corporations can purchase only the needed amount of storage from the
cloud storage provider (CSP) to fulfill their storage needs instead of maintaining their
own data storage infrastructures. They can rely on CSP to handle all data maintenance
tasks such as backup and recovery. It also allows all data to be accessed remotely in
order to streamline their operations among different locations. With all these benefits,
companies can significantly reduce their operation costs by simply outsourcing their
business data to cloud storage.

5.Semantic search supporting similarity ranking over encrypted private cloud


data

With the advent of cloud computing, more and more information data are outsourced
to the public cloud for economic savings and ease of access. However, the privacy
information has to be encrypted to guarantee the security. To implement efficient data
utilization, search over encrypted cloud data has been a great challenge. The existing
solutions depended entirely on the submitted query keyword and didn’t consider the
semantics of keyword. Thus the search schemes are not intelligent and also omit some
. Page 13
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
semantically related documents. In view of the deficiency, as an attempt, we propose
a semantic expansion based similar search solution over encrypted cloud data. Our
solution could return not only the exactly matched files, but also the files including
the terms semantically related to the query keyword. In the proposed scheme, a
corresponding file metadata is constructed for each file. Then both the encrypted
metadata set and file collection are uploaded to the cloud server. With the metadata
set, the cloud server builds the inverted index and constructs semantic relationship
library (SRL) for the keywords set. After receiving a query request, the cloud server
first finds out the keywords that are semantically related to the query keyword
according to SRL. Then both the query keyword and the extensional words are used
to retrieve the files. The result files are returned in order according to the total
relevance score. Eventually, detailed security analysis shows that our solution is
privacy-preserving and secure under the previous searchable symmetric encryption
(SSE) security definition. Experimental evaluation demonstrates the efficiency and
effectives of the scheme.

5.Secure semantic expansion based search over encrypted cloud data supporting
similarity ranking

With the advent of cloud computing, more and more information data are outsourced
to the public cloud for economic savings and ease of access. However, the privacy
information has to be encrypted to guarantee the security. To implement efficient data
utilization, search over encrypted cloud data has been a great challenge. The existing
solutions depended entirely on the submitted query keyword and didn’t consider the
semantics of keyword. Thus the search schemes are not intelligent and also omit some
semantically related documents. In view of the deficiency, as an attempt, we propose
a semantic expansion based similar search solution over encrypted cloud data. Our
solution could return not only the exactly matched files, but also the files including
the terms semantically related to the query keyword. In the proposed scheme, a
corresponding file metadata is constructed for each file. Then both the encrypted
metadata set and file collection are uploaded to the cloud server. With the metadata

. Page 14
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
set, the cloud server builds the inverted index and constructs semantic relationship
library (SRL) for the keywords set. After receiving a query request, the cloud server
first finds out the keywords that are semantically related to the query keyword
according to SRL. Then both the query keyword and the extensional words are used
to retrieve the files. The result files are returned in order according to the total
relevance score. Eventually, detailed security analysis shows that our solution is
privacy-preserving and secure under the previous searchable symmetric encryption
(SSE) security definition. Experimental evaluation demonstrates the efficiency and
effectives of the scheme. 2.5. CLOUD COMPUTING OVERVIEW
Distributed computing is a casual expression used to depict an assortment of various
figuring ideas that include countless that are associated through a constant
correspondence network(typically the Internet). Distributed computing is a language
term without a generally acknowledged non-equivocal logical or specialized
definition. In science, distributed computing is an equivalent word for circulated
processing over a system and means the capacity to run a program on numerous
associated PCs in the meantime. The notoriety of the term can be ascribed to its
utilization in advertising to offer facilitated benefits in the feeling of use
administration provisioning that run customer server programming on a remote area.

Fig: 2.2. Cloud Computing

. Page 15
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
A few Traffic Redundancy Elimination are opening up the period of distributed
computing, which is an Internet-based improvement and utilization of PC innovation.
The ever less expensive and all the more capable processors, together with the
Software as a Service (SaaS) registering engineering, are changing server farms into
pools of figuring administration on an enormous scale. The expanding system
transfer speed and dependable yet adaptable system associations make it even
conceivable that clients can now subscribe top notch administrations from
information and programming that live exclusively on remote server farms. Moving
information into the cloud offers awesome accommodation to clients since they don't
need to think about the complexities of direct equipment administration.

The pioneer of distributed computing merchants, Amazon Simple Storage Service


(S3), and Amazon Elastic Compute Cloud (EC2) are both surely understood
illustrations. While these web based online administrations do give enormous
measures of storage room and adaptable processing assets, this figuring stage move,
be that as it may, is wiping out the duty of neighborhood machines for information
upkeep in the meantime. Thus, clients are helpless before their cloud benefit
suppliers (CSP) for the accessibility and honesty of their information from one
viewpoint, in spite of the fact that the cloud frameworks are a great deal more
capable and solid than individualized computing gadgets, expansive scope of both
interior and outside dangers for information trustworthiness still exist.

Cases of blackouts and information misfortune episodes of significant distributed


storage administrations show up now and again. Then again, since clients may not
hold a neighborhood duplicate of outsourced information, there exist different
motivators for CSP to carry on unfaithfully toward the cloud clients with respect to
the status of their outsourced information. For instance, to build the net revenue by
diminishing cost, it is workable for CSP to dispose of infrequently got to information
without being recognized in an auspicious manner .Similarly, CSP may even

. Page 16
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
endeavor to conceal information misfortune occurrences in order to keep up a
notoriety

Therefore, in spite of the fact that outsourcing information into the cloud is
financially alluring for the cost and many-sided quality of long haul vast scale
information stockpiling, its lacking of offering solid affirmation of information
trustworthiness and accessibility may obstruct its wide selection by both venture and
individual cloud clients. Keeping in mind the end goal to accomplish the affirmations
of cloud information uprightness and accessibility and implement the nature of
distributed storage benefit, proficient techniques that empower on-request
information accuracy check for cloud clients must be planned.

Nonetheless, the way that clients no longer have physical ownership of information
in the cloud precludes the immediate selection of conventional cryptographic
primitives with the end goal of information trustworthiness insurance. Thus, the
check of distributed storage accuracy must be directed without express learning of
the entire information documents. In the mean time, distributed storage is not only an
outsider information stockroom.

The information put away in the cloud may be gotten to as well as be much of the
time overhauled by the clients, including addition, cancellation, adjustment, adding,
and so forth. Along these lines, it is additionally basic to bolster the combination of
this dynamic element into the distributed storage rightness certification, which makes
the framework outline significantly all the more difficult.

Last yet not the minimum, the sending of distributed computing is fueled by server
farms running in a synchronous, coordinated, and dispersed way. It is more points of
interest for individual clients to store their information repetitively over numerous
physical servers in order to lessen the information honesty and accessibility dangers.
Along these lines, circulated conventions for capacity rightness confirmation will be

. Page 17
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
of most significance in accomplishing hearty and secure distributed storage
frameworks.

In any case, such imperative region stays to be completely investigated in the


writing. As of late, the significance of guaranteeing the remote information
respectability has been highlighted by the accompanying examination works under
various framework and security models. These procedures, while can be valuable to
guarantee the capacity rightness without having clients having nearby information,
are all concentrating on single server situation.

They might be valuable for nature of-administration testing, yet does not ensure the
information accessibility in the event of server disappointments. Albeit guide
applying these strategies to dispersed stockpiling (numerous servers) could be direct,
the came about capacity check overhead would be straight to the quantity of servers.
As a corresponding methodology, specialists have likewise proposed disseminated
conventions for guaranteeing stockpiling rightness over numerous servers or
companions.
In any case, while giving proficient cross server stockpiling check and information
accessibility protection, these plans are all concentrating on static or recorded
information. Subsequently, their capacity of taking care of element information stays
hazy, which definitely confines their full appropriateness in distributed storage
situations.

Cloud Clients
Web browser,Mobileapp,Thinclient,terminal emulator,….

SaaS
Application

CRM,Email,Virtualdesktop,communication,Games,…
PaaS
Platform

Execution runtime,database,WebServer,Development tools,….

. Page 18
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
IaaS

Infrastructure
Virtual machines,Servers,Storage,Loadbalancers,Network,…..

Fig: 2.3. Cloud Computing Layers

Writing review is the most critical stride in programming improvement process.


Before building up the instrument it is important to decide the time variable,
economy n organization sTraffic Redundancy Elimination ngth. Once these things r
fulfilled, ten next stride is to figure out which working framework and dialect can be
utilized for building up the device. Once the software engineers begin fabricating the
apparatus the developers need parcel of outer backing. This backing can be gotten
from senior software engineers, from book or from sites. Before building the
framework the above thought r considered for building up the proposed framework.

A viable and adaptable disseminated stockpiling check plan with unequivocal


element information backing to guarantee the accuracy and accessibility of client
information in the cloud, this depend on eradication amending code in the record
circulation arrangement to give redundancies and assurance the information
constancy against Byzantine servers, where a capacity server may come up short in
self-assertive ways. This development radically decreases the correspondence and
capacity overhead when contrasted with the conventional replication-based
document appropriation methods.

By using the homomorphism token with appropriated check of eradication coded


data,this plan accomplishes the capacity accuracy protection and in addition
information blunder restriction. At whatever point information debasement has been
distinguished amid the capacity rightness check, ouratur plan can just about surety
the concurrent restriction of information mistakes, i.e., the recognizable proof of the
getting out of hand server(s). With a specific end goal to strike a decent harmony
between blunder versatility and information progression.

. Page 19
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.

This further investigate the arithmetical property of the token calculation and
deletion coded information, and exhibit how to proficiently bolster dynamic
operation on information pieces, while keeping up the same level of capacity
rightness affirmation. Keeping in mind the end goal to spare the time, calculation
assets, and even the related online weight of clients, this likewise give the
augmentation of the proposed principle plan to bolster outsider inspecting, where
clients can securely designate the honesty checking errands to outsider examiners
and be effortless to utilize the distributed storage administrations. My work is among
the initial couple of ones in this field to consider dispersed information stockpiling
security in Cloud Computing.

At the establishment of distributed computing is the more extensive idea of base


joining (or Converged Infrastructure) and shared administrations. This kind of
information Traffic Redundancy Elimination environment permits undertakings to
get their applications up and running quicker, with simpler sensibility and less
upkeep, and empowers IT to all the more quickly alter IT assets, (for example,
servers, stockpiling, and systems administration) to meet fluctuating and erratic
business request.
The two words in the expression distributed computing have the accompanying
understandings:

SECURITY CONCERNS FOR CLOUD COMPUTING


Distributed computing gets its name from the drawings ordinarily used to
portray the Internet. Distributed computing is another utilization and conveyance
model for IT administrations. The idea of distributed computing speaks to a
movement in thought, in those end clients need not know the points of interest of a
particular innovation. The administration is completely overseen by the supplier.
Clients can devour administrations at a rate that is set by their specific needs. This on
interest administration can be given whenever.

. Page 20
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.

Compliance

Planning Governance

Cloud Security
Adopting and Availability
Access
Management
Data Security

Fig: 2.4. Cloud Computing Security

While cost and ease of use are two great benefits of cloud computing, there are
significant security concerns that need to be addressed when considering moving
critical applications and sensitive data to public and shared cloud environments. To
address these concerns, the cloud provider must develop sufficient controls to provide
the same or a greater level of security than the organization would have if the cloud
were not used. Listed here are ten items to review when considering cloud computing.

1. Where’s the data? Different countries have different requirements and


controls placed on access. Because your data is in the cloud, you may not realize that
the data must reside in a physical location. Your cloud provider should agree in
writing to provide the level of security required for your customers.

2. Who has access? Access control is a key concern, because insider attacks are
a huge risk. A potential hacker is someone who has been entrusted with approved
access to the cloud.

3. What happens if there is a security breach? If a security incident occurs,


what support will you receive from the cloud provider? While many providers

. Page 21
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
promote their services as being unpacks able, cloud based services are an attractive
target to hackers.

CLOUD COMPUTING MODELS


Distributed computing suppliers offer their administrations as indicated by a few key
models: foundation as an administration (IaaS), stage as an administration (PaaS), and
programming as an administration (SaaS) where IaaS is the most essential and each
higher model modified works from the subtle elements of the lower models.

Other key segments in anything as an administration (XaaS) are portrayed in a


complete scientific classification demonstrate distributed in 2009, for example,
Strategy-as-a-Service, Collaboration-as-a-Service, Business Process-as-a-Service,
Database-as-a-Service, and so on. In 2012, arrange as an administration (NaaS) and
correspondence as an administration (CaaS) were authoritatively included by ITU
(International Telecommunication Union) as a component of the fundamental
distributed computing models, perceived administration classes of a media
transmission driven cloud biological system

IaaS PaaS

APIaaS
STaaS

Cloud Computing services


DaaS

DaaS

SaaS SEaaS
TEaaS

Fig: 2.5. Cloud Services

1. Infrastructure-as-a-Service (IaaS) – As the name infers, you are


purchasing framework. You claim the product and are buying virtual energy to

. Page 22
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
execute as required. This is much similar to running a virtual server all alone
hardware, aside from you are currently running a virtual server on a virtual
circle. This model is like a service organization display, as you pay for what you
utilize. A case is Amazon Web Services at http://aws.amazon.com/.

2. Platform-as-a-Service (PaaS) – In this model of distributed computing,


the supplier gives a stage to your utilization. Administrations gave by this model
incorporate all periods of the framework advancement life cycle (SDLC) and
can utilize application program interfaces(APIs), site entrances, or passage
programming. Purchasers do need to take a gander at particular arrangements,
since a few suppliers don't permit programming made by their clients to be
gotten off the supplier's stage. A case of PaaS is Google Apps.

3. Software-as-a-Service (SaaS) – This model is intended to give


everything and essentially lease the product to the client. The administration is
normally given through some kind of front end or online interface. While the
end client is allowed to utilize the administration from anyplace, the
organization pays a for every utilization charge. Salesforce.com offers this sort
of administration.

Fig: 2.6. Cloud Computing Service Models

. Page 23
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.

CLOUD PROVIDERS
Gartner predicts that cloud computing will surge to 150 billion dollars by 2013.
Below is a partial list of companies that provide cloud computing services:
1. Amazon
2. Google
3. Microsoft
4. Salesforce.com
5. Citrix
6. IBM
7. Mozyhome
8. Sun
9. CohensiveFT
10. Icloud
11. Nivanix
12. VMware
13. Flexscale

. Page 24
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
Fig: 2.7. Cloud Computing Provider
CLOUD COMPUTING ATTACKS
As more companies move to cloud computing, look for hackers to follow.
Some of the potential attack vectors criminals may attempt include:
 Denial of Service (DoS) attacks - Some security professionals have
argued that the cloud is more vulnerable to DoS attacks, because it is shared
by many users, which makes DoS attacks much more damaging. Twitter
suffered a devastating DoS attack during 2009.
 Side Channel attacks – An attacker could attempt to compromise the
cloud by placing a malicious virtual machine in close proximity to a target
cloud server and then launching a side channel attack.
 Authentication attacks – Authentication is a weak point in hosted and
virtual services and is frequently targeted. There are many different ways to
authenticate users; for example, based on what a person knows, has, or is.
 The mechanisms used to secure the authentication process and the
methods used are a frequent target of attackers.
 Man-in-the-middle cryptographic attacks – This attack is carried out
when an attacker places himself between two users.

SECURITY IN CLOUD COMPUTING


1. FEAR OF THE CLOUD
The "security" worries that are keeping organizations from exploiting the cloud are
Numerous studies, for instance IDC's 2008 Cloud Services User Survey of IT
officials, refer to security as the main test for cloud clients.
The Cloud Security Alliance's underlying report contains an alternate kind of
scientific classification in light of 15 distinctive security areas and the procedures that
should be followed in a general cloud organization. I arrange the security worries as:
• Traditional security
• Availability
• Third-party information control

. Page 25
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.

2. CONVENTIONAL SECURITY
These worries include PC and system interruptions or assaults that will be made
conceivable or possibly less demanding by moving to the cloud. Cloud suppliers react
to these worries by belligerence that their efforts to establish safety and procedures
are more develop and tried than those of the normal organization.

Another contention, made by the Jericho Forum, is: "It could be simpler to secure data
if it's controlled by an outsider as opposed to in-house, if organizations are stressed
over insider dangers. What's more, it might be simpler to uphold security through
contracts with online administrations suppliers than by means of inner controls."
Concerns in this classification include:

TS1. VM-level assaults: Potential vulnerabilities in the hypervisor or VM innovation


utilized by cloud merchants are a potential issue in multi-inhabitant structures.
Vulnerabilities have showed up in VMWare, Xen, and Microsoft's Virtual PC and
Virtual Server. Sellers, for example, Third Brigade relieve potential VM-level
vulnerabilities through observing and firewalls

TS2. Cloud benefit supplier vulnerabilities: These could be stage level, for example, a
SQL-infusion or cross-site scripting helplessness in salesforce.com. For example,
there have been a few late Google Docs vulnerabilities and The Google reaction to
one of them is here: . There is just the same old thing new in the way of these
vulnerabilities; just their setting is novel. Indeed, IBM has repositioned its Rational
App Scan instrument, which checks for vulnerabilities in web benefits as a cloud
security benefit.

TS3. Phishing cloud supplier: Phishes and other social architects have another assault
vector, as the Sales drive phishing episode appears.

. Page 26
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
TS4. Extended system assault surface: The cloud client must ensure the foundation
used to interface and communicate with the cloud, an assignment confused by the
cloud being outside the firewall by and large. For example, demonstrates a case of
how the cloud may assault the machine associating with it.

TS5. Confirmation and Authorization: The undertaking validation and approval


system does not normally stretch out into the cloud. How does an organization merge
its current system to incorporate cloud assets? Besides, how does an endeavor
combine cloud security information (if even accessible) with its own security
measurements and strategies?
TS6. Criminology in the cloud: This blog posting on the CLOIDIFIN extend outlines
the trouble of cloud measurable examinations: "Conventional advanced scientific
approachs allow specialists to seize gear and perform nitty gritty investigation on the
media and information recouped. The probability along these lines, of the information
being evacuated, overwritten, erased or devastated by the culprit for this situation is
low. All the more firmly connected to a CC domain would be organizations that
possess and keep up their own particular multi-server sort foundation, however this
would be on a far littler scale in examination. Be that as it may, the size of the cloud
and the rate at which information is overwritten is of concern."

3. Accessibility
These worries focus on basic applications and information being accessible. All
around pitched occurrences of cloud blackouts incorporate Gmail (one-day blackout
in mid-October 2008), Amazon S3 (more than seven-hour downtime on July 20,
2008), and Flexi Scale (18-hour blackout on October 31, 2008).

A1. Up time. Similarly as with the Traditional Security concerns, cloud suppliers
contend that their server uptime contrasts well and the accessibility of the cloud
client's own particular server farms.

. Page 27
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
Other than just administrations and applications being down, this incorporates the
worry that an outsider cloud would not scale all around ok to handle certain
applications. SAP's CEO, Leo Apotheker said:

"There are sure things that you can't keep running in the cloud in light of the fact that
the cloud would fall… Don't trust that any service organization will run its charging
for 50 million shoppers in the cloud."

A2. Single purpose of disappointment: Cloud administrations are considered as giving


more accessibility, yet maybe not – there are more single purposes of disappointment
and assault.

A3. Affirmation of computational trustworthiness: Can an endeavor be guaranteed


that a cloud supplier is reliably running a facilitated application and giving substantial
results? For instance, Stanford's Folding@Home extend gives a similar undertaking to
numerous customers to achieve an agreement on the right result.

4. OUTSIDER DATA CONTROL


The legitimate ramifications of information and applications being held by an outsider
are unpredictable and not surely knew. There is additionally a potential absence of
control and straightforwardness when an outsider holds the information. Part of the
buildup of distributed computing is that the cloud can be execution free, however as a
general rule administrative consistence requires straightforwardness into the cloud.
This is provoking a few organizations to manufacture private mists to maintain a
strategic distance from these issues but then hold a portion of the benefits of
distributed computing.

BL1. Due constancy: If served a subpoena or other lawful activity, can a cloud client
force the cloud supplier to react in the required time period.

. Page 28
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
BL2. Review capacity: Audit trouble is another symptom of the absence of control in
the cloud. Is there adequate straightforwardness in the operations of the cloud supplier
for inspecting purposes? As of now, this straightforwardness is given by
documentation and manual reviews. A related concern is appropriate administration
of cloud-related movement. It's simple, maybe too simple, to begin utilizing a cloud
benefit.
One prevalent evaluating rule is the SAS 70, which characterizes rules for inspectors
to survey inner controls, for example controls over the handling of touchy data. SOX
and HIPAA are other surely understood controls. US government offices for the most
part need to take after rules from FISMA, NIST, and FIPS. Certain controls require
information and operations to stay in certain geographic areas. Cloud suppliers are
starting to react with geo-focused on offerings.

BL3. Authoritative commitments: One issue with utilizing another organization's


foundation other than the questionable arrangement of interests is that there may
astound lawful ramifications. For example, here is a section from Amazon's terms of
utilization:

BL4. Cloud Provider Espionage: This is the stress of robbery of organization


exclusive data by the cloud supplier. For instance, Google Gmail and Google Apps
are cases of administrations upheld by a private cloud foundation. Corporate clients of
these administrations are worried about privacy and accessibility of their information.
As indicated by a CNN article:

BL5. Information Lock-in: How does a cloud client maintain a strategic distance from
secure to a specific distributed computing seller? The information may itself be
secured an exclusive configuration, and there are additionally issues with preparing
and procedures.
There is additionally the issue of the cloud client having no power over incessant
changes in cloud-based administrations. Coghead is one case of a cloud stage whose

. Page 29
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
shutdown left clients scrambling to re-compose their applications to keep running on
an alternate stage. Obviously, one response to secure is institutionalization, for
example GoGrid API.

TYPES OF CLOUD COMPUTING


There are numerous contemplations for distributed computing draftsmen to make
when moving from a standard undertaking application arrangement model to one in
light of distributed computing.
There are open and private mists that offer reciprocal advantages, there are three
fundamental administration models to consider, and there is the estimation of open

Fig: 2.8. Cloud Computing Types


Public, Private and Hybrid Clouds
IT associations can convey applications on open, private, or cross breed mists, each of
which has its exchange offs. The terms open, private, and mixture don't manage area.
While open mists are regularly "out there" on the Internet and private mists are
commonly situated on premises, a private cloud may be facilitated at a collocation
office also.

. Page 30
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
Organizations may make various contemplations as to which distributed computing
model they utilize, and they may utilize more than one model to tackle diverse issues.
An application required on a brief premise may be most appropriate for arrangement
in an open cloud since it stays away from the need to buy extra hardware to settle an
impermanent need. Similarly, a lasting application, or one that has particular
prerequisites on nature of administration or area of information, may best be sent in a
private or half and half cloud.

1. Open Cloud
Open cloud (additionally alluded to as "outer" cloud) depicts the traditional
significance of distributed computing: adaptable, progressively provisioned,
frequently virtualized assets accessible over the Internet from an off-website outsider
supplier, which isolates up assets and bills its clients on an "utility" premise. A case is
Think Grid, an organization that gives a multi-inhabitant engineering to providing
administrations, for example, Hosted Desktops, Software as a Service and Platform as
a Service. Other prevalent cloud merchants incorporate Salesforce.com, Amazon EC2
and Flexi scale.

Open mists are controlled by outsiders, and applications from various clients are
probably going to be combined on the cloud's servers, stockpiling frameworks, and
systems. Open mists are regularly facilitated far from client premises, and they give
an approach to diminish client hazard and cost by giving an adaptable, even transitory
expansion to big business foundation.

On the off chance that an open cloud is actualized in light of execution, security, and
information region, the presence of different applications running in the cloud ought
to be straightforward to both cloud engineers and end clients. Undoubtedly, one of the
advantages of open mists is that they can be much bigger than an organization's
private cloud may offer, the capacity to scale here and there on request, and moving
framework dangers from the undertaking to the cloud supplier, if even just briefly.

. Page 31
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.

Segments of an open cloud can be cut out for the select utilization of a solitary
customer, making a virtual private datacenter. Instead of being restricted to sending
virtual machine pictures in an open cloud, a virtual private datacenter gives clients
more noteworthy perceivability into its foundation. Presently clients can control
virtual machine pictures, as well as servers, stockpiling frameworks, arrange gadgets,
and system topology..

Fig 2.9: Public Enterprise

Fig: 2.9. Private cloud

Surely, one of the advantages of open mists is that they can be much bigger than an
organization's private cloud may offer, the capacity to scale all over on request, and
moving foundation dangers from the undertaking to the cloud supplier, if even just
briefly.
Parts of an open cloud can be cut out for the restrictive utilization of a solitary
customer, making a virtual private datacenter. Instead of being restricted to sending
virtual machine pictures in an open cloud, a virtual private datacenter gives clients
more noteworthy perceivability into its framework. Presently clients can control
virtual machine pictures, as well as servers, stockpiling frameworks, organize gadgets,
and system topology. An open cloud gives administrations to numerous clients, and is
normally conveyed at a collocation office.
2. Private Cloud
To buy, set up and deal with their own particular mists. Private mists are worked for
the select utilization of one customer, giving the nearly control over information,
security, and nature of administration. The organization claims the foundation and has

. Page 32
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
control over how applications are sent on it. Private mists might be sent in an
undertaking datacenter, and they additionally might be conveyed at a collocation
office. Private mists can be constructed and oversaw by an organization's own
particular IT association or by a cloud supplier.
In this "facilitated private" model, an organization, for example, Sun can introduce,
design, and work the foundation to bolster a private cloud inside an organization's
endeavor datacenter. This model gives organizations an abnormal state of control over
the utilization of cloud assets while getting the mastery expected to build up and work
nature.

Fig: 2.10. Private enterprise

Private mists might be facilitated at a collocation office or in an endeavor datacenter.


They might be bolstered by the organization, by a cloud supplier, or by an outsider,
for example, an outsourcing firm.
3. Half breed Cloud
It has been proposed that a half breed cloud environment joining assets from both
inward and outer suppliers will turn into the most prevalent decision for ventures. For
instance, an organization could utilize an open cloud benefit for general processing,
yet store its business-basic information inside its own server farm. This might be on
the grounds that bigger associations are probably going to have as of now put
vigorously in the foundation required to give assets in-house – or they might be
worried about the security of open mists. Mixture mists consolidate both open and
private cloud models.

. Page 33
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
They can give on-request, remotely provisioned scale. The capacity to enlarge a
private cloud with the assets of an open cloud can be utilized to keep up
administration levels despite fast workload changes. This is regularly observed with
the utilization of capacity mists to bolster Web 2.0 applications. A half and half cloud
additionally can be utilized to handle arranged workload spikes. Once in a while
called "surge registering," an open cloud can be utilized to perform occasional errands
that can be conveyed effectively on an open cloud.

Cross breed mists present the many-sided quality of deciding how to disperse
applications crosswise over both an open and private cloud. Among the issues that
should be considered is the relationship amongst information and preparing assets. In
the event that the information is little, or the application is stateless, a crossover cloud
can be considerably more fruitful than if a lot of information must be moved into an
open cloud for a little measure of preparing.

Fig: 2.11. Hybrid cloud


.
What services can be used in the cloud?
There are various administrations that can be conveyed through distributed
computing, exploiting the dispersed cloud show. Here are some concise portrayals of
a couple of the most famous cloud-based IT arrangements:

. Page 34
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.

Facilitated desktops
Facilitated desktops expel the requirement for conventional desktop PCs in the
workplace environment, and lessen the cost of giving the administrations that you
require. A facilitated desktop looks and carries on like a customary desktop PC, yet
the product and information clients utilize are housed in remote, very secure server
farms, as opposed to all alone machines. Clients can just get to their facilitated
desktops by means of a web association from anyplace on the planet, utilizing either a
current PC or portable workstation or, for greatest cost proficiency, a particular gadget
called a thin customer.

Facilitated email
As more associations search for a safe, dependable email arrangement that won't cost
the earth, they are progressively swinging to facilitated Microsoft Exchange® email
arranges.

Utilizing the world's chief email stage, this administration lets associations both vast
and little receive the rewards of utilizing MS Exchange® accounts without investing
in the expensive foundation themselves. Email is put away midway on oversaw
servers, giving excess and quick availability from any area. This permits clients to get
to their email, schedule, contacts and shared documents by an assortment of means,
including Outlook®, Outlook Mobile Access (OMA) and Outlook Web Access
(OWA).

Facilitated communication (VoIP)


VOIP (Voice Over IP) is a method for conveying telephone calls and administrations
crosswise over advanced web systems. Regarding essential use and usefulness, VOIP
is the same to conventional communication, and a VOIP-empowered phone works
precisely like an "ordinary" one, yet it has particular cost points of interest

. Page 35
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
Distributed storage
Distributed storage is developing in prevalence because of the advantages it gives, for
example, straightforward, Cap sans ex costs, anyplace get to and the evacuation of the
weight of in-house support and administration. It is fundamentally the conveyance of
information stockpiling as an administration, from an outsider supplier, with get to by
means of the web and charging computed on limit utilized as a part of a specific
period (e.g. every month).

Dynamic Servers
Dynamic servers are the up and coming era of server environment, supplanting the
traditional idea of the committed server. A supplier like Think Grid gives its clients
access to assets that look and feel precisely like a devoted server, however that are
completely versatile. You can straightforwardly control the measure of handling
force and space you utilize, which means you don't need to pay for equipment you
needn't bother with.

Regularly, you can roll out improvements to your dynamic server whenever, on the
fly, without the expenses connected with moving starting with one server then onto
the next.

CHARACTERISTICS OF CLOUD COMPUTING


Distributed computing, normally requests
• High adaptability: Cloud situations empower overhauling of business prerequisites
for bigger gatherings of people, through high versatility

• Agility: The cloud works in the 'conveyed mode' environment. It offers assets
among clients and assignments, while enhancing proficiency and deftness
(responsiveness) .

. Page 36
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
• High accessibility and unwavering quality: Availability of servers is high and
more dependable as the odds of framework disappointment are negligible.

• Multi-sharing: With the cloud working in a dispersed and shared mode, different
clients and applications can work all the more effectively with cost diminishments by
sharing normal framework

• Services in pay-per-utilize mode: SLAs between the supplier and the client must
be characterized when offering administrations in pay per utilize mode. This might be
founded on the unpredictability of administrations advertised.

•Application Programming Interfaces: (APIs) might be offered to the clients so


they can get to administrations on the cloud by utilizing these APIs

The on-request, self-benefit, pay-by-utilize nature of distributed computing is


additionally an augmentation of built up Traffic Redundancy Elimination nds. An
endeavor point of view, the on-request nature of distributed computing underpins the
execution and limit parts of administration level targets.

The self-benefit nature of distributed computing permits associations to make


versatile situations that extend and contract in light of the workload and target
execution parameters. The compensation by-utilize nature of distributed computing
may appear as gear rent that assurance a base level of administration from a cloud
supplier. Virtualization is a key component of this model.

IT associations have comprehended for quite a long time that virtualization permits
them to rapidly and effectively make duplicates of existing situations — in some
cases including various virtual machines — to bolster test, improvement, and
arranging exercises. The cost of these situations is negligible in light of the fact that
they can exist together on an indistinguishable servers from generation situations

. Page 37
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
since they utilize couple of assets. In like manner, new applications can be created and
conveyed.

Administrations are conveyed over the system are


It nearly abandons saying that distributed computing amplifies the current Traffic
Redundancy Elimination and of making administrations accessible over the system.
For all intents and purposes each business association has perceived the estimation of
Web-based interfaces to their applications, whether they are made accessible to clients
over the Internet, or whether they are inside applications that are made accessible to
approved workers, accomplices, providers.

Advantages of Cloud Computing


So as to profit the most from distributed computing, designers must have the capacity
to refractor their applications so they can best utilize the compositional and sending
ideal models that distributed computing underpins. The advantages of conveying
applications utilizing distributed computing incorporate decreasing run time and
reaction time, minimizing the danger of sending physical foundation, bringing down
the cost of passage, and expanding the pace of development.

As indicated by International Data Corporation (IDC), "The expansion of gadgets,


consistence, enhanced frameworks execution, online business and expanded
replication to auxiliary or reinforcement locales is adding to a yearly multiplying of
the measure of data transmitted over the Internet.

"The cost of managing this measure of information is something that organizations


must address. In today's economy, organizations are taking a gander at any cost
sparing measures, and the main issue is that distributed computing gives much more
prominent adaptability than past figuring models. The advantages of distributed
computing are numerous. One is diminished cost, since you pay as you go. Different

. Page 38
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
advantages are the transportability of the application is that clients can telecommute,
work, or at customer areas. This expanded versatility implies workers can get to data
anyplace they are. There is likewise the capacity of distributed computing to free-up
IT laborers who may have been involved performing upgrades, introducing patches,
or giving application bolster.

Security and information material science


Information is frequently the most profitable of an organization's advantages, and it
must be secured with as much watchfulness as whatever other resource. It is anything
but difficult to contend that more watchfulness is expected to ensure information in
light of how a gatecrasher can possibly achieve an organization's information from
anyplace on the Internet. A few stages to take include:
.
• Encrypt information very still so that if any interloper can infiltrate a
cloud supplier's security or if a setup blunder makes that information open to
unapproved parties, that the information can't be deciphered.
• Encrypt information in travel. Expect that the information will ignore
open framework and could be seen by any gathering in the middle.
• Require solid confirmation between application segments with the goal
that information is transmitted just to known gatherings.

• Pay consideration regarding cryptography and how calculations are


split and are supplanted by new ones after some time. For instance, now that
MD5 has been demonstrated helpless against assault, utilize a more grounded
method, for example, SHA-256.
• Consider utilizing solid, token-based confirmation for overseer parts.
• For client login/watchword get to, consider who deals with the
validation server and whether it is under the organization or the cloud
supplier's control.

. Page 39
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
CLOUD OPERATIONS
The cloud can perform the following operations.

UPDATE OPERATION
In cloud data storage, sometimes the user may need to modify some data block(s)
stored in the cloud, this refer this operation as data update. In other words, for all the
unused tokens, the user needs to exclude every occurrence of the old data block and
replace it with the new one.

DELETE OPERATION
Sometimes, after being stored in the cloud, certain data blocks may need to be
deleted. The delete operation this are considering is a general one, in which user
replaces the data block with zero or some special reserved data symbol. From this
point of view, the delete operation is actually a special case of the data update
operation, where the original data blocks can be replaced with zeros or some
predetermined special blocks.

APPEND OPERATION
In some cases, the user may want to increase the size of his stored data by adding
blocks at the end of the data file, which this refer as data append.I anticipate that the
most frequent append operation in cloud data storage is bulk append, in which the
user needs to upload a large number of blocks (not a single block) at one time.

INSERT OPERATION
An insert operation to the data file refers to an append operation at the desired index
position while maintaining the same data block structure for the whole data file, i.e.,
inserting a block F[j] corresponds to shifting all blocks starting with index j + 1 by
one slot.

. Page 40
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.

Chapter - 3
SYSTEM REQUIREMENTS

3.1. HARDWARE REQUIREMENTS


 Processor - Intel Core2 Duo
 Speed - 2.4 GHz
 RAM - 2 GB(minimum)
 Hard Disk - 180 GB

3.2. SOFTWARE REQUIREMENTS


 Operating System : Windows XP
 Front End : JSP,Servelets
 Database : My Sql
 Database Connectivity : JDBC

. Page 41
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.

Chapter - 4
SYSTEM DESIGN
4.1. SYSTEM ARCHITECTURE

Fig: 4.1. System Model


4.2. UML DIAGRAMS
• UML remains for Unified Modeling Language. UML is an
institutionalized broadly useful displaying dialect in the field of protest
situated programming designing. The standard is overseen, and was made by
the Object Management Group. The objective is for UML to end up a typical
dialect for making models of protest arranged PC programming. In its present
shape UML is contained two noteworthy segments: a Meta-display and a
documentation. Later on, some type of technique or process may likewise be
added to; or connected with UML.

• The Unified Modeling Language is a standard dialect for indicating,


Visualization, Constructing and recording the antiques of programming
framework, and additionally for business displaying and other non-
programming frameworks.

. Page 42
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.

• The UML speaks to an accumulation of best building rehearses that


have demonstrated effective in the displaying of vast and complex
frameworks.

• The UML is an imperative piece of creating articles arranged


programming and the product improvement prepare. The UML utilizes for the
most part graphical documentations to express the plan of programming tasks.

GOALS
The Primary objectives in the plan of the UML are as per the following:
1. Provide clients a prepared to-utilize, expressive visual displaying
Language with the goal that they can create and trade important models.
2. Provide extendibility and specialization instruments to develop the
center ideas.
3. Be free of specific programming dialects and improvement handle.
4. Provide a formal reason for comprehension the displaying dialect.
5. Encourage the development of OO devices showcase.
6. Support more elevated amount improvement ideas, for example,
coordinated efforts, systems, examples and parts.
7. Integrate best practices.

. Page 43
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.

4.2.1. USE CASE DIAGRAM


A use case diagram within the unified modeling language (UML) may be a
kind of activity diagram outlined by and created from a use-case analysis. Its purpose
is to gift a graphical summary of the practicality provided by a system in terms of
actors, their goals (represented as use cases), and any dependencies between those use
cases. the most purpose of a use case diagram is to indicate what system functions
area unit performed that actor. Roles of the actors within the system is represented.

Registration

login admin

upload data

view tranfer request

cloud A

view delection request


dataonwer

view owners

view files

Cloud B

logout

. Page 44
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.

4.2.2. CLASS DIAGRAM


In computer code engineering, a category diagram within the Unified
Modeling Language (UML) may be a kind of static structure diagram that describes
the structure of a system by showing the system's categories, their attributes,
operations (or methods), and also the relationships among the categories. It explains
that category contains data.

data owner
Cloud AB
+Name
+Password +name
+file +password
+Registration() +login()
+login() +view file tranfer req()
+upload file() +view file deletion req()
+view file() +logout()
+file tranfer req()
+file delete req()
+logout()

Cloud AB

Admin +name
+password
+name
+password +login()
+view file tranfer req()
+view dataowner() +view file deletion req()
+view files() +logout()
+logout()

Fig: 4.3. Class Diagram

. Page 45
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.

4.2.3. SEQUENCE DIAGRAM


A sequence diagram in Unified Modeling Language (UML) may be a quite
interaction diagram that shows however processes operate with each other and in what
order. it's a construct of a Message Sequence Chart. Sequence diagrams ar generally
known as event diagrams, event situations, and temporal order diagrams.

Data Owner Data User Cloud Database

Register with details

register with details

view and activate data owners

view and authorize users

upload file into cloud

view files from cloud

search file from cloud

view files in the cloud

send file request

sent file response

view file reponse

download file from Cloud

view Top k files

view Top-k files

view Top-k files

logout

Logout

Logout

. Page 46
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
Fig: 4.4. Sequence Diagram

Chapter - 5
SYSTEM IMPLEMENTATION

5.1. SYSTEM MODEL


. Here collect 89 queries issued by the subjects, and name them as “UserQ”. As
this approach might induce a bias towards topics in which lists are more useful than
general web queries, we further randomly sample another set of 105 English queries
from a query log of a commercial search engine, and name this set of queries as
“RandQ”. We first ask a subject to manually create facets and add items that are
covered by the query, based on his/her knowledge after a deep survey on any related
resources (such as Wikipedia, Freebase, or official web sites related to the query).
5.2. MODULE DESCRIPTION
1.DATA OWNER:
In this application the owner is one of the main module for uploading the files and
view the uploads file which are uploaded by the owner before do all these operations
the owner should register with the application and the owner should authorized by the
cloud.Owner can Able to Send transfer data request,delete request.

2.Admin

In This Application admin is one of the main modules he can able view data owner
requests like transfer,delete .

3.CLOUD A

The cloud is the main module to operate this project in the users activation s , owner
activation and also the cloud can check the following operations like search
. Page 47
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
permission provides to the users, can check the top-k searched keyword, top-k
similarity in chart, top-k searched keyword in chart. Primarily the cloud should login.
Then only the cloud can perform the above mentioned actions.

4.CLOUD B

The cloud is the main module to operate this project in the users activation s , owner
activation and also the cloud can check the following operations like search
permission provides to the users, can check the top-k searched keyword, top-k
similarity in chart, top-k searched keyword in chart.Primarily the cloud should login.
Then only the cloud can perform the above mentioned actions.

5.3 SOFTWARE ENVIRONMENT


The project experimental setup desires software system package Windows XP and
Installation of JDK 1.6 and My SQL 6.0
1 Step By Step Procedure for JDK one.6
The latest version of JDK is JDK sixu2 (Java(TM) SE Development Kit six
Update 2), that's to boot referred to as Java SE six (Java traditional Edition 6). the
following unit the steps to transfer and install JDK 6u2 on native machine.
1. Open the Java SE transfer page with this URL:
http://java.sun.com/javase/downloads.
2. Click the transfer button next to "JDK 6u2". It will' show a innovative
page with a list of assorted transfer files of JDK 6u2.
3. Notice the "Windows Platform - Java(TM) SE Development Kit six
Update 2" section.
4. Click the hyper link of "Windows Offline Installation (build 06),
Multi-language", that links to jdk-6u2-windows-i586-p.exe with size of sixty
5.57 MB.
5. Save java development kitadev-6u2-windows-i586-p.exe to a
quick directory.

. Page 48
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
6. Double-click on javadevelopmentkit-6u2-windows-i586-p.executable
to start the installation wizard.
7. The installation wizard will guide to finish the installation.

To test the installation, open a command window to undertake the java


command. If it shows the following output, the installation was ok:
C:\>program\java\jdk1.6.0_02\bin\java-version
Java version \"1.6.0_02\" Java SE Run time environment (construct one.6.0_02-b06)
2 Step By Step Procedure for MYSQL 6.0
1. To place in MY SQL the file to transfer is “Windows thirty two bit and X86
Installer MSI Essentials” is required.
2. On the downloaded My Structured query language double click and this will
the installation of My SQL.
3. Select "I accept terms inside the license agreement “and click on next.
4. Inside consequent window, select the "custom “icon to change the path of the
installation.
5. Next window looks, presently browse or navigate the folder C:\server\
mystructurequery language to place within the files in that folder.
6. Inside consequent window, once the modification press OK.
7. Press install in next window.
8. Select a customary pattern, and click on next.
9. To place within the My structure Query language service, click next.
10. It'd sort of a secret for MySQL information, please enter a secret, please bear
in mind the login name in most cases is root and thus the key user choosing, in my
case, and choose admin.
11. It will perform all the commands enter, thus click "run".
12. To setup My SQL graphical computer program, head to programs menu (My
SQL) click on "My SQL Administrator" login into information as local host -
username and secret head to "service control" and click on the tab "configure service"

. Page 49
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
and alter the path of the my.ini file to the right location:\server\mysql\my.ini and click
on apply.

TOMCAT 6.0 WEB SERVER


Tomcat is associate degree open supply net server developed by Apache cluster.
Apache domestic cat is that the servlet instrumentation that\'s utilized in the official
Reference Implementation for the Java Servlet and Java Server Pages technologies.
The Java Servlet and Java Server Pages specifications area unit developed by Sun
beneath the Java Community method. net Servers like Apache domestic cat support
solely net parts whereas associate degree application server supports net parts
additionally as business parts (BEAs net logic, is one in all the popular application
server).

To develop {a net an internet an online} application with jsp servlet install any web
server like JRun, Tomcat etc. to run your application.

1. Go to the URL http://tomcat.apache.org/download-70.cgi. immediately


below the second heading, see four links: KEYS, 7.0.26, Browse, and
Archives.
2. By clicking on 7.0.2.6, it will be forwarded toward the bottom of the
same page to a heading with the same version number. Below the version
heading, see the subheading “Core”. Below that, immediately above the next
subheading, see three links arranged as follows: 32-bit/64-bit Windows
Service Installer (pgp,md5).
3. Click on 32-bit/64-bit Windows Service Installer to download the file
apache-tomacat-7.0.26.exe
4. After agreeing to the terms of the license, the file will be downloaded
and can be installed.

. Page 50
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.

Fig 5.1: Tomcat Web server

JAVA TECHNOLOGY
Java technology is used for programming language and a platform for both.
The Java Programming Language
The Java programming language is a sophisticated language that can be
categorized by all of the following buzzwords:
 Simple
 Architecture neutral
 Object oriented
 Portable
 Distributed
 High performance
 Interpreted
 Multithreaded

. Page 51
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
 Robust
 Dynamic
 Secure
With furthermost programming languages, you either compile the program or
interpret a program, that program can run it on your computer. The Java programming
language is unfamiliar in that a program is compiled and interpreted or both. Within
the compiler, first you convert a program into an intermediate language called Java
byte codes —the platform-independent codes interpreted by the interpreter on the
Java platform. The interpreter parses and runs each Java byte code instruction on the
computer. Compilation happens just once; interpretation occurs each and every time
the program is executed. The following diagram explains how this works.

Fig 5.2: Working of Java Program

You can consider that Java byte codes as the machine code directions for the
Java Virtual Machine (Java VM). Each Java translator, whether it's an advancement
apparatus or a Web program that can run applets, is an utilization of the Java VM.
Java byte codes make "compose once, run anyplace (WORA)" conceivable. You can
assemble a program into byte codes on any stage that has a Java compiler. The byte
codes can then be keep running on any use of the Java VM. That implies that the
length of a PC has a Java VM, a similar program written in the Java programming
dialect can keep running on whatever other Operating. Frameworks.

. Page 52
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.

ODBC
Microsoft Open Database Connectivity (ODBC) is a standard programming interface
for application fashioners and database structures providers. Before ODBC
transformed into an acknowledged standard for Windows tasks to interface with
database structures, engineers expected to use prohibitive vernaculars for each
database they expected to take up with. In a matter of seconds, ODBC has settled on
the choice of the database system for all intents and purposes wrong from a coding
perspective, which is as it should be. Application engineers have altogether more
basic things to worry over than the sentence structure that is required to port their
program beginning with one database then onto the following when business needs
out of the blue change.

Through the ODBC Administrator in Control Panel, you can demonstrate the
particular database that is associated with a data source that an ODBC application
program is created to use. Consider an ODBC data source as a gateway with a name
on it. Each portal will lead you to a particular database. For example, the data source
named Sales Figures might be a SQL Server database, while the Accounts Payable
data source could suggest an Access database. The physical database suggested by a
data source can live wherever on the LAN.

. Page 53
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
The ODBC structure records are not presented on your system by Windows 95. On
the other hand perhaps, they are presented when you setup an alternate database
application, for instance, SQL Server Client or Visual Basic 4.0. Right when the
ODBC image is presented in Control Panel, it uses a record called ODBCINST.DLL.
It is in like manner possible to deal with your ODBC data sources through a stay
single program called ODBCADM.EXE. There is a 16-bit and a 32-bit version of this
program and every keeps up an alternate once-over of ODBC data sources.

From a programming perspective, the appeal of ODBC is that theapplication can be


created to use a comparable course of action of limit calls to interface with any data
source, paying little mind to the database trader. The source code of the application
doesn't change whether it banters with Oracle or SQL Server. We simply determine
these two for example. There are ODBC drivers available for a couple of dozen
understood database structures. For sure, even Excel spreadsheets and plain substance
records can be changed into data sources.

The working system uses the Registry information made by ODBC Administrator to
make sense of which low-level ODBC drivers are relied upon to chat with the data
source, (for instance, the interface to Oracle or SQL Server). The stacking of the
ODBC drivers is clear to the ODBC application program. In a client/server
environment, the ODBC API even handles extensive segments of the framework
issues for the application programming engineer.

The advantages of this arrangement are various to the point that you are apparently
thinking there must be some catch. The fundamental weight of ODBC is that it isn't as
powerful as talking particularly to the neighborhood database interface. ODBC has
had various depreciators make the charge that it is excessively direct. Microsoft has
constantly sued that the essential compute execution is the way of the driver
programming that is used. As we might want to think, this is legitimate. The
availability of good ODBC drivers has upgraded an amazing game plan starting late.

. Page 54
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
Moreover, at any rate, the input about execution is to some degree like the people who
said that compilers would never facilitate the speed of unadulterated low level
processing develop. Maybe not, yet rather the compiler (or ODBC) allows you to
form cleaner programs, which infers you finish sooner. Meanwhile, PCs get speedier
reliably.

JDBC
With a ultimate objective to set a free database standard API for Java; Sun
Microsystems made Java Database Connectivity, or JDBC. JDBC offers a non
particular SQL database get the chance to instrument that gives a consistent interface
to a variety of RDBMSs. This trustworthy interface is winning utilizing "module"
database accessibility modules, or drivers. In case a database trader wishes to have
JDBC support, he or she ought to give the driver to each phase that the database and
Java continue running on.

To extend a more broad affirmation of JDBC, Sun develop JDBC's structure in light
of ODBC. As you revealed before in this segment, ODBC has no matter how you
look at it support on a collection of stages. Developing JDBC as for ODBC will allow
venders to offer JDBC drivers available to be purchased to people in general much
faster than working up an absolutely new accessibility game plan. JDBC was
accounted for in March of 1996. It was released for a 90 day open review that
completed June 8, 1996. In light of customer information, the last JDBC v1.0
assurance was released a little while later.

Whatever is left of this range will cover enough information about JDBC for you to
grasp what it is about and how to use it effectively. This is by no means whatsoever,
an aggregate survey of JDBC. That would fill an entire book.

JDBC Goals

. Page 55
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
Few programming groups are sketched out without goals as an essential concern.
JDBC is one that, because of its various destinations, drove the change of the API.
These destinations, in conjunction with early examiner input, have closed the JDBC
class library into a solid framework for building database applications in Java. The
targets that were set for JDBC are crucial. They will give you some comprehension in
the matter of why certain classes and functionalities bear in transit they do. The eight
diagram goals for JDBC are according to the accompanying:

1.SQL Level API The organizers felt that their essential target was to describe a SQL
interface for Java. In spite of the way that not the most negligible database interface
level possible, it is at an adequately low level for more raised sum instruments and
APIs to be made. On the other hand, it is at an adequately abnormal state for
application designers to use it surely. Fulfilling this target considers future instrument
dealers to "convey" JDBC code and to disguise countless difficulties from the end
customer.
2. SQL Conformance SQL punctuation vacillates as you move from database vendor
to database vender. With a true objective to reinforce a wide arrangement of shippers,
JDBC will allow any request announcement to be experienced it to the concealed
database driver. This allows the system module to handle non-standard handiness in a
way that is sensible for its customers.
3.JDBC must be implemental on top of essential database interfaces The JDBC SQL
API must "sit" on top of other normal SQL level APIs. This target grants JDBC to use
existing ODBC level drivers by the usage of an item interface. This interface would
make a translation of JDBC calls to ODBC and the a different way.

4. Give a Java interface that is unsurprising with whatever is left of the Java system
In perspective of Java's affirmation in the customer aggregate as such, the organizers
feel that they should not stray from the present diagram of the middle Java structure.
5.Keep it clear This target probably appears in all item plot target postings. JDBC is
no unique case. Sun felt that the layout of JDBC should be extraordinarily clear,

. Page 56
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
considering one and procedure for completing a task for every segment. Allowing
duplicate convenience just serves to overwhelm the customers of the API.
6.Use in number, static composition wherever possible Strong composition considers
more bumble checking to be done at amass time; also, less mix-up appear at runtime.
7.Keep the typical cases direct

What is JSP?
JSP could be a technology that adds dynamic content to sites. In absence of
JSP, to update the looks or the content of plain static hypertext mark-up language
pages, it should be done by hand. even though an image must be modified, the
hypertext mark-up language file should be emended for modifications.

Whereas with JSP, the content obsessed with several factors are often created, as well
as the time of the day, the knowledge provided by the user, the user’s history of
interaction together with your computing machine, and even the user’s browser sort.

This capability is crucial to supply on-line services which may be tailored to the
viewer World Health Organization created the request, betting on the viewer’s
preferences and needs. a vital facet of providing purposeful on-line services is for the
system to be able to keep in mind knowledge related to the service and its users.
That’s why databases play a vital role in dynamic sites.

Viewing a JSP Page


With JSP, the online page doesn’t really exist on the server.
The following steps justify however the online server creates the online page:
1.Like a traditional page, the browser sends associate protocol request to the online
server. This doesn’t modification with JSP, though the uniform resource locator in all
probability ends in .jsp rather than .html .

. Page 57
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
2.The online server isn't a traditional server, however rather a Java server, with the
extensions necessary to spot and handle Java servlets. the online server acknowledges
that the protocol request is for a JSP page and forwards it to a JSP engine.
3.The JSP engine masses the JSP page from disk and converts it into a Java servlet.
From now on, this servlet is indistinguishable from the other servlet developed
directly in Java instead of JSP, though the mechanically generated Java code of a JSP
servlet isn't perpetually straightforward to browse, and you must ne\'er modify it by
hand.
4.The JSP engine compiles the servlet into associate possible category and forwards
the initial request to a different a part of the online server referred to as the servlet
engine. Note that the Jsp engine solely converts the JSP page to Java and recompiles
the servlet if it finds that the JSP page has modified since the last request. This makes
the method a lot of economical than with alternative scripting languages and thus
quicker.
5.The servlet engine masses the servlet category and executes it. throughout
execution, the servlet produces associate output in hypertext mark-up language
format, that the servlet engine passes to the online server within associate protocol
response.
6.The online server forwards the protocol response to your browser.
7.Your application program handles the dynamically generated hypertext mark-up
language page within the protocol response specifically as if it were a static page. In
fact, static and dynamic sites square measure within the same format.

. Page 58
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
5.4 DATA BASE TABLES

. Page 59
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.

5.5 SOURCE CODE


/*
* To change this license header, choose License Headers in Project Properties.
* To change this template file, choose Tools | Templates
* and open the template in the editor.
*/
package com.upload;

import com.database.Queries;
import com.oreilly.servlet.MultipartRequest;
import java.io.BufferedReader;
import java.io.File;
import java.io.FileReader;
import java.io.IOException;
import java.io.PrintWriter;
. Page 60
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
import javax.crypto.KeyGenerator;
import javax.crypto.SecretKey;
import javax.servlet.ServletException;
import javax.servlet.annotation.MultipartConfig;
import javax.servlet.http.HttpServlet;
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletResponse;
import javax.servlet.http.HttpSession;
import com.sun.org.apache.xerces.internal.impl.dv.util.Base64;
import java.security.SecureRandom;

/**
*
* @author KishanVenky
*/
@MultipartConfig(maxFileSize = 16177215)
public class FileUpload extends HttpServlet {

protected void processRequest(HttpServletRequest request, HttpServletResponse


response)
throws ServletException, IOException {
response.setContentType("text/html;charset=UTF-8");
HttpSession session=request.getSession();
String id=(String)session.getAttribute("id");
String username=(String)session.getAttribute("username");
String email=(String)session.getAttribute("email");

PrintWriter out = response.getWriter();


final String filepath = "E:\\";

. Page 61
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
try{
MultipartRequest m = new MultipartRequest(request, filepath);
String owner=m.getParameter("id");
String fname=m.getParameter("fname");

File f=m.getFile("file");
String filename=f.getName();

BufferedReader br=new BufferedReader(new FileReader(f));


StringBuffer sb = new StringBuffer();
String temp = null;

while ((temp = br.readLine()) != null) {


sb.append(temp);

}
String data=sb.toString();

KeyGenerator keygen=KeyGenerator.getInstance("AES");
keygen.init(128);
SecretKey s=keygen.generateKey();
//converting secret keyto string
byte[] b=s.getEncoded();//encoding secret key
String skey=Base64.encode(b);

. Page 62
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.

String cipher=new encryption().encrypt(data,s);

SecureRandom random = new SecureRandom();


int num = random.nextInt(100000);
String formatted = String.format("%05d", num);
String fid="F"+formatted+"";

session.setAttribute("fid",fid);
session.setAttribute("filename",filename);
session.setAttribute("data",data);
session.setAttribute("skey",skey);
session.setAttribute("cipher",cipher);

response.sendRedirect("Upload2.jsp");

/**String query="insert into file


values('"+fid+"','"+id+"','"+username+"','"+filename+"','"+data+"','"+skey+"','"+cipher
+"',now(),'Cloud_A','waiting')";

int i=Queries.getExecuteUpdate(query);
if(i>0){
response.sendRedirect("Upload.jsp?msg=success");
}else{
response.sendRedirect("Upload.jsp?msg=failed");
}**/

. Page 63
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.

}catch(Exception e){
out.println(e);
}

// <editor-fold defaultstate="collapsed" desc="HttpServlet methods. Click on the +


sign on the left to edit the code.">
/**
* Handles the HTTP <code>GET</code> method.
*
* @param request servlet request
* @param response servlet response
* @throws ServletException if a servlet-specific error occurs
* @throws IOException if an I/O error occurs
*/
@Override
protected void doGet(HttpServletRequest request, HttpServletResponse response)
throws ServletException, IOException {
processRequest(request, response);
}

/**
* Handles the HTTP <code>POST</code> method.
*
* @param request servlet request
* @param response servlet response

. Page 64
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
* @throws ServletException if a servlet-specific error occurs
* @throws IOException if an I/O error occurs
*/
@Override
protected void doPost(HttpServletRequest request, HttpServletResponse response)
throws ServletException, IOException {
processRequest(request, response);
}

/**
* Returns a short description of the servlet.
*
* @return a String containing servlet description
*/
@Override
public String getServletInfo() {
return "Short description";
}// </editor-fold>

package com.database;

import java.sql.Connection;
import java.sql.DriverManager;
import java.sql.SQLException;

public class Dbconnection{

. Page 65
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
public static Connection getcon(){

Connection con = null;

try{
Class.forName("com.mysql.jdbc.Driver");
con = DriverManager.getConnection("jdbc:mysql://localhost:3306/sdata",
"root", "root");

}
catch(Exception e){
e.printStackTrace();
}

return con;
}

/*
* To change this license header, choose License Headers in Project Properties.
* To change this template file, choose Tools | Templates
* and open the template in the editor.
*/
package com.database;

import java.sql.*;

. Page 66
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
/**
*
* @author Acer
*/
public class Queries {
public static ResultSet rs;
public static int i;

public static ResultSet getExecuteQuery(String query){


try{
Connection con=Dbconnection.getcon();
Statement st=con.createStatement();
rs=st.executeQuery(query);
}catch(Exception e){
System.out.println(e);
}
return rs;
}
public static int getExecuteUpdate(String query){
try{
Connection con=Dbconnection.getcon();
Statement st=con.createStatement();
i=st.executeUpdate(query);
}catch(Exception e){
System.out.println(e);
}
return i;
}
}

. Page 67
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.

Chapter-6
SYSTEM TESTING
Testing is that the debugging program is one amongst the leading crucial
aspects of the pc programming triggers, while not programming that works, the
system would ne'er turn out relate in Nursing output of that it had been
designed .Testing is best performed once user development is asked to help in
characteristic all errors and bugs. The sample knowledge are used for testing. It is not
amount however quality of the information used the matters of testing .Testing is
aimed toward guaranteeing that the system was accurately relate in Nursing with
efficiency before live operation commands.

Testing objectives: The most objective of testing is to uncover a bunch of errors,


consistently and with minimum effort and time. Stating formally ,we can say, testing
may be a method of corporal punishment a program with intent of finding
miscalculation.
1. A productive check is one that uncovers Associate in Nursing hitherto
undiscovered error.
2. A decent legal action is one that has likelihood of finding
miscalculation, if it exists.
3. The check is insufficient to find probably gift errors.
4. The code additional or less confirms to the standard and reliable
standards.
6.1. TYPES OF TESTING
6.1.1. UNIT TESTING
Unit testing we have a tendency to test every module separately and integrate with the
general system. Unit testing focuses verification efforts on the littlest unit of code
style within the module. this is often conjointly called module testing.

. Page 68
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.

The module of the system is tested individually. as an example the validation check is
completed for variable the user input given by the user that validity of the information
entered. it's terribly straightforward to search out error rectify the system. Every
Module will be tested victimization the subsequent 2 Strategies: recording machine
Testing and White Box Testing.

6.1.2. BLACK BOX TESTING


Recording machine checking may be a code testing techniques during which
practicality of the code below test (SUT) is tested while not staring at the interior code
structure, implementation details and data of internal ways of the code .This type of
testing is predicated entirely on the code needs and specifications .In recording
machine Testing we have a tendency to simply concentrate on inputs and output of the
package while not bothering concerning internal data of the code program. The on top
of recording machine will be any package you wish to check. For example, Associate
in Nursing software like Windows, a web site like Google ,a information like Oracle
or maybe your own custom application. Under recording machine testing, you can
check these applications by simply that specialize in the inputs and outputs while not
knowing their internal code implementation.

Types of Black Box Testing


There are many varieties of recording machine Testing however following ar the
outstanding ones.
• Functional testing: This recording machine testing kind is said to purposeful needs
of a system; it's done by code testers.
• Non-Functional testing: This sort of recording machine testing isn't associated with
testing of a selected practicality, however non-functional needs like performance,
measurability, usability.

. Page 69
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
• Regression testing: Regression testing is completed once code fixes, upgrades or
the other system maintenance to visualize the new code has not affected the prevailing
code.

6.1.3. WHITE BOX TESTING


White Box Testing is that the testing of a code solution's internal committal to
writing and infrastructure. It focuses totally on Traffic Redundancy Elimination
ngthening security, the flow of inputs and outputs through the applying, and rising
style and value. White box testing is additionally called clear, open, structural, and
glass box testing. It is one amongst 2 elements of the "box testing" approach of code
testing.
System Testing:
Once the individual module testing is completed, modules are assembled and
integrated to perform as a system. The top down testing, that began from higher level
to lower level module, was allotted to visualize whether or not the whole system is
playacting satisfactorily. There are 3 main types of System testing: Alpha Testing,
Beta Testing, Acceptance Testing.
Alpha Testing: This refers to the system checking that's allotted by the test team with
the Organization.
Beta Testing: This refers to the system testing that's performed by a particular cluster
of friendly customers.
Acceptance Testing: This refers to the system testing that's performed by the client to
see whether or not or to not settle for the delivery of the system.

6.2. TEST STRATEGY AND APPROACH


Field testing will be performed manually and functional tests will be written in detail.
Test objectives
 All field entries must work properly.
 Pages must be activated from the identified link.

. Page 70
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
 The entry screen, messages and responses must not be delayed.
Features to be tested
 Verify that the entries are of the correct format
 No duplicate entries should be allowed
 All links should take the user to the correct page.

Test Scenarios
General Scenarios
• All mandatory fields should be validated and indicated by asterisk (*)
symbol
• Validation error messages should be displayed properly at correct
position
• All error messages should be displayed in same CSS style (e.g. using
red color)
• General confirmation messages should be displayed using CSS style
other than
error messages style (e.g. using green color)
• Dropdown fields should have first entry as blank or text like ‗Select‘
• Delete functionality for any record on page should ask for confirmation

GUI and Usability Test Scenarios


• All fields on page (e.g. text box, radio options, dropdown lists) should
be aligned properly.
• Scroll bar should be enabled only when necessary
• Description text box should be multi-line
• User should be able to submit the form again by correcting the errors
• Default radio options should be pre-selected on page load
• Check all pages for broken images

Test Scenarios for a Window

. Page 71
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
• Check if default window size is correct
• Check if child window size is correct
• Check if child windows are getting closed on closing parent/opener
window
• Check window minimize, maximize and close functionality
• Check if window is re-sizable

Database Testing Test Scenarios


 Check if correct data is getting saved in database upon successful page
submit
 Check values for columns which are not accepting null values
 Check for data integrity. Data should be stored in single or multiple
tables based on design
 For every database add/update operation log should be added
 Required table indexes should be created

Security Testing Test Scenarios


• Secure pages should use HTTPS protocol
• Check application logout functionality
• Check for Brute Force Attacks
• Password should not be stored in cookies
• Test for Denial of Service attacks

. Page 72
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
6.3. TEST CASE

Test case Test case Actual value Entered value Status


id description

1 Register user details Fill all the All the fields are
in registration page fields while filled
Pass
registering user

2 Give user name in User name User name given


text box must be given in alphabets and
Fail
in alphabets numeric values

3 Password to be Password must Password is


entered in password be given entered wrongly
Fail
box correctly

4 Phone number must Phone number Phone number


be entered in phone must be given given in 10
pass
number box during in 10 digits digits
registration

Table: 6.1. Test case Template

. Page 73
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.

Chapter - 7
7.1 SCREEN SHOTS

Home screen

Owner login

. Page 74
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.

Login status

Owner home screen


. Page 75
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.

Out source data

. Page 76
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
Divide data into blocks

Upload status

View data
. Page 77
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.

Selected user details

Select file cipher data

. Page 78
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.

Transfer Request

. Page 79
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
Transfer request send status

Cloud_a login

Cloud a home page


. Page 80
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.

View transfer request

Data transfer status

. Page 81
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.

Cloud_b login

login status

. Page 82
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.

View transfer request

Result sent to owner

. Page 83
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.

View result page

. Page 84
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
View transfer result

Deletion request page

Deletion status
. Page 85
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.

. Page 86
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.

Deletion status

. Page 87
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.

Cloud_B Deletion Request

. Page 88
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.

Result Status

. Page 89
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.

Deletion result

. Page 90
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.

Admin login

. Page 91
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
Admin home

. Page 92
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.

View owner details

View files details

. Page 93
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.

. Page 94
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.

View time stamp

Time stamp in graph

. Page 95
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.

. Page 96
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
Chapter 8

CONCLUSION

In cloud storage, the data owner does not believe that the cloud server might
execute the data transfer and deletion operations honestly. To solve this problem,
we propose a CBF-based secure data transfer scheme, which can also realize
verifiable data deletion.

In our scheme, the cloud B can check the transferred data integrity, which can
guarantee the data is entirely migrated. Moreover, the cloud A should adopt CBF
to generate a deletion evidence after deletion, which will be used to verify the
deletion result by the data owner. Hence, the cloud A cannot behave maliciously
and cheat the data owner successfully. Finally, the security analysis and
simulation results validate the security and practicability of our proposal,
respectively.

FUTURE SCOPE

Similar to all the existing solutions, our scheme considers the data
transfer between two different cloud servers. However, with the development
of cloud storage, the data owner might want to simultaneously migrate the
outsourced data from one cloud to the other two or more target clouds.
However, the multi-target clouds might collude together to cheat the data
owner maliciously. Hence, the provable data migration among three or more
clouds requires our further exploration.

. Page 97
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
BIBLIOGRAPHY

[1] C. Yang and J. Ye, “Secure and efficient fine-grained data access control
scheme in cloud computing”, Journal of High Speed Networks, Vol.21, No.4,
pp.259–271, 2015.

[2] X. Chen, J. Li, J. Ma, et al., “New algorithms for secure outsourcing of
modular exponentiations”, IEEE Transactions on Parallel and Distributed
Systems, Vol.25, No.9, pp.2386–2396, 2014.

[3] P. Li, J. Li, Z. Huang, et al., “Privacy-preserving outsourced classification in


cloud computing”, Cluster Computing, Vol.21, No.1, pp.277–286, 2018.

[4] B. Varghese and R. Buyya, “Next generation cloud computing: New trends
and research directions”, Future Generation Computer Systems, Vol.79, pp.849–
861, 2018.

[5] W. Shen, J. Qin, J. Yu, et al., “Enabling identity-based integrity auditing and
data sharing with sensitive information hiding for secure cloud storage”, IEEE
Transactions on Information Forensics and Security, Vol.14, No.2, pp.331–346,
2019.

[6] R. Kaur, I. Chana and J. Bhattacharya J, “Data deduplication techniques for


efficient cloud storage management: A systematic review”, The Journal of
Supercomputing, Vol.74, No.5, pp.2035–2085, 2018. [7] Cisco, “Cisco global
cloud index: Forecast and methodology, 2014–2019”, available at:
https://www.cisco.com/c/en/us- /solutions/collateral/service-provider/global-
cloud-index-gci/ white-paper-c11-738085.pdf, 2019-5-5.

[8] Cloudsfer, “Migrate & backup your files from any cloud to any cloud”,
available at: https://www.cloudsfer.com/, 2019-5-5.

. Page 98
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
[9] Y. Liu, S. Xiao, H. Wang, et al., “New provable data transfer from provable
data possession and deletion for secure cloud storage”, International Journal of
Distributed Sensor Networks, Vol.15, No.4, pp.1–12, 2019.

Sites Referred
https://www.computer.org
www.ijariie.com
www.ijcaonline.org
www.ijetcse.com
www.academia.edu
https://edupediapublications.org

. Page 99

You might also like