Secure Data Transfer and Deletion From Counting Bloom Filter in Cloud Computing.
Secure Data Transfer and Deletion From Counting Bloom Filter in Cloud Computing.
Computing.
Chapter - 1
INTRODUCTION
1.1. BACKGROUND WORK
Cloud Computing refers to each the applications delivered as services over the web
and also the hardware and computer program within the datacenters that give those
services. The services themselves have long been named as computer code as a
Service (SaaS). The datacenter hardware and computer code is named as a Cloud.
once a Cloud is formed obtainable during a pay-as-you-go manner to the general
public, it's referred to as as a Public Cloud. The service being sold is Utility
Computing. Current samples of utility Computing embrace Amazon net Services,
Google App Engine, and Microsoft Azure. The term non-public Cloud id accustomed
visit internal datacenters of a business or alternative organization that aren't created
obtainable to the general public. Thus, Cloud Computing is that the total of SaaS and
Utility Computing, however doesn't usually embrace non-public Clouds. Cloud
Computing term is employed during a general manner, exchange it with one amongst
the opposite terms only if clarity demands it. Fig. 1.1 shows the roles of the folks as
users or suppliers of those layers of Cloud Computing.
. Page 1
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
The future Internet covers all research and development activities dedicated to
realizing tomorrow’s internet, i.e. enhancing a networking infrastructure which
integrates all kind of resources, usage domains etc. As such, research related to cloud
technologies form a vital part of the future Internet research agenda. Perplexities in
regards to the angles secured by distributed computing as for the future Internet
generally emerge from the expansive extent of qualities doled out to "mists", just like
the intelligent result of the re-marking blast a few years prior.
In this way, most cloud frameworks have concentrated on facilitating applications and
information on remote PCs, utilizing specifically replication techniques to guarantee
accessibility and subsequently accomplishing a heap adjusting versatility.
Notwithstanding, the reasonable model of mists surpasses such a basic specialized
approach and prompts to challenges similar to the ones without bounds Internet, yet
with marginally extraordinary concentration because of the mix of ideas and
objectives certain to cloud frameworks. As it were, as a mechanical acknowledgment
driven by a financial recommendation, cloud frameworks would offer capacities that
empower significant parts without bounds Internet.
Sorts of Cloud Services: : There are four sorts of cloud administrations, as appeared
in Figure 1.2.Some items offer Internet based administrations, for example,
stockpiling, middleware, coordinated effort, and database capacities specifically to
clients.
SaaS: Software-as-a-Service provides software as a shareware. The software can be
used for a period of time as per the wish of the user and the user can pay accordingly.
. Page 2
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
Advantages:: The future Internet covers all research and development activities
dedicated to realizing tomorrow’s internet, i.e. enhancing a networking infrastructure
which integrates all kind of resources, usage domains etc. As such, research related to
cloud technologies form a vital part of the future Internet research agenda.
Perplexities in regards to the angles secured by distributed computing as for the future
Internet generally emerge from the expansive extent of qualities doled out to "mists",
just like the intelligent result of the re-marking blast a few years prior.
In this way, most cloud frameworks have concentrated on facilitating applications and
information on remote PCs, utilizing specifically replication techniques to guarantee
accessibility and subsequently accomplishing a heap adjusting versatility.
Notwithstanding, the reasonable model of mists surpasses such a basic specialized
approach and prompts to challenges similar to the ones without bounds Internet, yet
with marginally extraordinary concentration because of the mix of ideas and
objectives certain to cloud frameworks. As it were, as a mechanical acknowledgment
driven by a financial recommendation, cloud frameworks would offer capacities that
empower significant parts without bounds Internet.
. Page 3
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
Sorts of Cloud Services: There are four sorts of cloud administrations, as appeared in
Figure 1.2.Some items offer Internet based administrations, for example, stockpiling,
middleware, coordinated effort, and database capacities specifically to clients.
1.2. OBJECTIVES
With the rapid development of cloud storage, an increasing number of data
owners prefer to outsource their data to the cloud server, which can greatly reduce the
local storage overhead. Because different cloud service providers offer distinct quality
. Page 4
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
of data storage service, e.g., security, reliability, access speed and prices, cloud data
transfer has become a fundamental requirement of the data owner to change the cloud
service providers. Hence, how to securely migrate the data from one cloud to another
and permanently delete the transferred data from the original cloud becomes a
primary concern of data owners. To solve this problem, we construct a new counting
Bloom filter-based scheme in this paper.
. Page 5
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
CHAPTER - 2
SYSTEM ANANYSIS
2.1. EXISTING SYSTEM
Xue et al.[19] studied the goal of secure data deletion, and put forward a key-policy
attribute based encryption scheme, which can achieve data fine grained access control
and assured deletion. They reach data deletion by removing the attribute and use
Merkle hash tree (MHT) to achieve verifiability, but their scheme requires a trusted
authority.
Du et al.[20] designed a scheme called Associated deletion scheme for multi-copy
(ADM), which uses pre-deleting sequence and MHT to achieve data integrity
verification and provable deletion. However, their scheme also requires a TTP to
manage the data keys. In 2018, Yang et al.[21] presented a Blockchain-based cloud
data deletion scheme, in which the cloud executes deletion operation and publishes
the corresponding deletion evidence on Blockchain. Then any verifier can check the
deletion result by verifying the deletion proof. Besides, they solve the bottleneck of
requiring a TTP. Although these schemes all can achieve verifiable data deletion, they
cannot realize secure data transfer.
.
2.1.1. DISADVANTAGES OF EXISTING SYSTEM
In the existing work, the system does not provide Data integrity proof.
This system is less performance due to lack of strong encryption techniques.
2.2. PROPOSED SYSTEM
In the proposed work, the system studies the problems of secure data transfer
and deletion in cloud storage, and focus on realizing the public verifiability.
Then the system proposes a counting Bloom filter-based scheme, which not
only can realize provable data transfer between two different clouds but also
can achieve publicly verifiable data deletion. If the original cloud server does
not migrate or remove the data honestly, the verifier (the data owner and the
. Page 6
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
target cloud server) can detect these malicious operations by verifying the
returned transfer and deletion evidences.
Moreover, our proposed scheme does not need any Trusted third party (TTP),
which is different from the existing solutions. Furthermore, we prove that our
new proposal can satisfy the desired design goals through security analysis.
Finally, the simulation experiments show that our new proposal is efficient
and practical.
2.2.1. ADVANTAGES OF PROPOSED SYSTEM
Data confidentiality. The outsourced file may contain some private information
that should be kept secret. Hence, to protect the data confidentiality, the data
owner needs to use secure algorithms to encrypt the file before uploading it to
the cloud server.
Data integrity. The cloud A might only migrate part of the data, or deliver some
unrelated data to the cloud B. Besides, the data might be polluted during the
transfer process. Hence, the data owner and the cloud B should be able to verify
the transferred data integrity to guarantee that the transferred data is intact.
Public verifiability. The cloud A may not move the data to the cloud B or delete
the data faithfully. So, the verifiability of the transfer and deletion results should
be satisfied from the data owner’s point of view.
Three key issues concerned within the FEASIBILITY analysis area unit
. Page 7
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
ECONOMICAL FEASIBILITY
TECHNICAL FEASIBILITY
SOCIAL FEASIBILITY
. Page 8
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
steps are to determine which operating system and language can be used for
developing the tool. Once the programmers start building the tool the programmers
need lot of external support.
This support can be obtained from senior programmers, from book or from websites.
Before building the system we have to knownthe below concepts for developing the
proposed system.
1. Practical Techniques For Searches On Encrypted Data
It is desirable to store data on data storage servers such as mail servers and file
servers in encrypted form to reduce security and privacy risks. But this usually
implies that one has to sacrifice functionality for security. For example, if a client
wishes to retrieve only documents containing certain words, it was not previously
known how to let the data storage server perform the search and answer the query
without loss of data confidentiality. In this paper, we describe our cryptographic
schemes for the problem of searching on encrypted data and provide proofs of
security for the resulting crypto systems. Our techniques have a number of crucial
advantages. They are provably secure: they provide provable secrecy for
encryption, in the sense that the untrusted server cannot learn anything about the
plaintext when only given the ciphertext; they provide query isolation for
searches, meaning that the untrusted server cannot learn anything more about the
plaintext than the search result; they provide controlled searching, so that the
untrusted server cannot search for an arbitrary word without the user’s
authorization; they also support hidden queries, so that the user may ask the
untrusted server to search for a secret word without revealing the word to the
server. The algorithms we present are simple, fast (for a document of length , the
encryption and search algorithms only need stream cipher and block cipher
operations), and introduce almost no space and communication overhead, and
hence are practical to use today.
. Page 9
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
. Page 10
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
companies have set up and provided various cloud computing services. More and
more sensitive data from consumers (e.g., photo albums, emails, personal health
records and financial transactions, etc.) have been centralized into the cloud for its
flexible management and economic savings. Meanwhile, many technical schemes
related to cloud computing service are proposed by researchers. Noh et al. proposed a
flexible communication bus model for multimedia services in cloud environment.
Shahnaza et al.proposed a realistic IEEE 802.11e EDCA model for QoS-aware
differentiated multimedia mobile cloud services. Cabarcos et al. proposed a
middleware architecture that allows sessions initiated from one device to be
seamlessly transferred to a second one under a cloud environment.
. Page 11
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
ciphertext model and known background model. In enhanced scheme, the sensitive
frequency information can be well protected by introducing some dummy keywords,
which is not adopted in basic scheme. We give security analysis to justify the
correctness and privacy-preserving guarantee of the proposed schemes. Extensive
experiments on real-world dataset validate our analysis and show that our proposed
solution is very efficient and effective in supporting synonym-based searching.
Cloud storage has become more and more popular as it provides many benefits over
traditional storage solutions. Despite the many benefits provided by cloud storage,
many security problems have also arisen in cloud storage, which prevents companies
. Page 12
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
from migrating their data to cloud storage. As a result, the owners encrypt their
sensitive data before storing it in cloud storage. While encryption increases the
security of the data, it also reduces the searchability of the data and thus, the
efficiency of the search. Recently, research has been done on several schemes which
enable keyword searching on encrypted data in cloud computing. However, these
schemes contain weaknesses which make them impractical when applied to real-life
scenarios. In this paper, we developed a system to support semantic search on
encrypted data in cloud computing with three different schemes which are “Synonym-
Based Keyword Search (SBKS)”, “Wikipedia-Based Keyword Search (WBKS)”, and
“Wikipedia-Based Synonym Keyword Search (WBSKS)”. Our results demonstrated
that our schemes are more efficient in terms of performance and storage requirements
than the former proposed schemes. Therefore, our developed schemes are more
practical than the former proposed schemes. Cloud storage has become a preferred
method of storage as it provides many benefits over traditional storage solutions. With
cloud storage, corporations can purchase only the needed amount of storage from the
cloud storage provider (CSP) to fulfill their storage needs instead of maintaining their
own data storage infrastructures. They can rely on CSP to handle all data maintenance
tasks such as backup and recovery. It also allows all data to be accessed remotely in
order to streamline their operations among different locations. With all these benefits,
companies can significantly reduce their operation costs by simply outsourcing their
business data to cloud storage.
With the advent of cloud computing, more and more information data are outsourced
to the public cloud for economic savings and ease of access. However, the privacy
information has to be encrypted to guarantee the security. To implement efficient data
utilization, search over encrypted cloud data has been a great challenge. The existing
solutions depended entirely on the submitted query keyword and didn’t consider the
semantics of keyword. Thus the search schemes are not intelligent and also omit some
. Page 13
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
semantically related documents. In view of the deficiency, as an attempt, we propose
a semantic expansion based similar search solution over encrypted cloud data. Our
solution could return not only the exactly matched files, but also the files including
the terms semantically related to the query keyword. In the proposed scheme, a
corresponding file metadata is constructed for each file. Then both the encrypted
metadata set and file collection are uploaded to the cloud server. With the metadata
set, the cloud server builds the inverted index and constructs semantic relationship
library (SRL) for the keywords set. After receiving a query request, the cloud server
first finds out the keywords that are semantically related to the query keyword
according to SRL. Then both the query keyword and the extensional words are used
to retrieve the files. The result files are returned in order according to the total
relevance score. Eventually, detailed security analysis shows that our solution is
privacy-preserving and secure under the previous searchable symmetric encryption
(SSE) security definition. Experimental evaluation demonstrates the efficiency and
effectives of the scheme.
5.Secure semantic expansion based search over encrypted cloud data supporting
similarity ranking
With the advent of cloud computing, more and more information data are outsourced
to the public cloud for economic savings and ease of access. However, the privacy
information has to be encrypted to guarantee the security. To implement efficient data
utilization, search over encrypted cloud data has been a great challenge. The existing
solutions depended entirely on the submitted query keyword and didn’t consider the
semantics of keyword. Thus the search schemes are not intelligent and also omit some
semantically related documents. In view of the deficiency, as an attempt, we propose
a semantic expansion based similar search solution over encrypted cloud data. Our
solution could return not only the exactly matched files, but also the files including
the terms semantically related to the query keyword. In the proposed scheme, a
corresponding file metadata is constructed for each file. Then both the encrypted
metadata set and file collection are uploaded to the cloud server. With the metadata
. Page 14
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
set, the cloud server builds the inverted index and constructs semantic relationship
library (SRL) for the keywords set. After receiving a query request, the cloud server
first finds out the keywords that are semantically related to the query keyword
according to SRL. Then both the query keyword and the extensional words are used
to retrieve the files. The result files are returned in order according to the total
relevance score. Eventually, detailed security analysis shows that our solution is
privacy-preserving and secure under the previous searchable symmetric encryption
(SSE) security definition. Experimental evaluation demonstrates the efficiency and
effectives of the scheme. 2.5. CLOUD COMPUTING OVERVIEW
Distributed computing is a casual expression used to depict an assortment of various
figuring ideas that include countless that are associated through a constant
correspondence network(typically the Internet). Distributed computing is a language
term without a generally acknowledged non-equivocal logical or specialized
definition. In science, distributed computing is an equivalent word for circulated
processing over a system and means the capacity to run a program on numerous
associated PCs in the meantime. The notoriety of the term can be ascribed to its
utilization in advertising to offer facilitated benefits in the feeling of use
administration provisioning that run customer server programming on a remote area.
. Page 15
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
A few Traffic Redundancy Elimination are opening up the period of distributed
computing, which is an Internet-based improvement and utilization of PC innovation.
The ever less expensive and all the more capable processors, together with the
Software as a Service (SaaS) registering engineering, are changing server farms into
pools of figuring administration on an enormous scale. The expanding system
transfer speed and dependable yet adaptable system associations make it even
conceivable that clients can now subscribe top notch administrations from
information and programming that live exclusively on remote server farms. Moving
information into the cloud offers awesome accommodation to clients since they don't
need to think about the complexities of direct equipment administration.
. Page 16
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
endeavor to conceal information misfortune occurrences in order to keep up a
notoriety
Therefore, in spite of the fact that outsourcing information into the cloud is
financially alluring for the cost and many-sided quality of long haul vast scale
information stockpiling, its lacking of offering solid affirmation of information
trustworthiness and accessibility may obstruct its wide selection by both venture and
individual cloud clients. Keeping in mind the end goal to accomplish the affirmations
of cloud information uprightness and accessibility and implement the nature of
distributed storage benefit, proficient techniques that empower on-request
information accuracy check for cloud clients must be planned.
Nonetheless, the way that clients no longer have physical ownership of information
in the cloud precludes the immediate selection of conventional cryptographic
primitives with the end goal of information trustworthiness insurance. Thus, the
check of distributed storage accuracy must be directed without express learning of
the entire information documents. In the mean time, distributed storage is not only an
outsider information stockroom.
The information put away in the cloud may be gotten to as well as be much of the
time overhauled by the clients, including addition, cancellation, adjustment, adding,
and so forth. Along these lines, it is additionally basic to bolster the combination of
this dynamic element into the distributed storage rightness certification, which makes
the framework outline significantly all the more difficult.
Last yet not the minimum, the sending of distributed computing is fueled by server
farms running in a synchronous, coordinated, and dispersed way. It is more points of
interest for individual clients to store their information repetitively over numerous
physical servers in order to lessen the information honesty and accessibility dangers.
Along these lines, circulated conventions for capacity rightness confirmation will be
. Page 17
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
of most significance in accomplishing hearty and secure distributed storage
frameworks.
They might be valuable for nature of-administration testing, yet does not ensure the
information accessibility in the event of server disappointments. Albeit guide
applying these strategies to dispersed stockpiling (numerous servers) could be direct,
the came about capacity check overhead would be straight to the quantity of servers.
As a corresponding methodology, specialists have likewise proposed disseminated
conventions for guaranteeing stockpiling rightness over numerous servers or
companions.
In any case, while giving proficient cross server stockpiling check and information
accessibility protection, these plans are all concentrating on static or recorded
information. Subsequently, their capacity of taking care of element information stays
hazy, which definitely confines their full appropriateness in distributed storage
situations.
Cloud Clients
Web browser,Mobileapp,Thinclient,terminal emulator,….
SaaS
Application
CRM,Email,Virtualdesktop,communication,Games,…
PaaS
Platform
. Page 18
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
IaaS
Infrastructure
Virtual machines,Servers,Storage,Loadbalancers,Network,…..
. Page 19
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
This further investigate the arithmetical property of the token calculation and
deletion coded information, and exhibit how to proficiently bolster dynamic
operation on information pieces, while keeping up the same level of capacity
rightness affirmation. Keeping in mind the end goal to spare the time, calculation
assets, and even the related online weight of clients, this likewise give the
augmentation of the proposed principle plan to bolster outsider inspecting, where
clients can securely designate the honesty checking errands to outsider examiners
and be effortless to utilize the distributed storage administrations. My work is among
the initial couple of ones in this field to consider dispersed information stockpiling
security in Cloud Computing.
. Page 20
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
Compliance
Planning Governance
Cloud Security
Adopting and Availability
Access
Management
Data Security
While cost and ease of use are two great benefits of cloud computing, there are
significant security concerns that need to be addressed when considering moving
critical applications and sensitive data to public and shared cloud environments. To
address these concerns, the cloud provider must develop sufficient controls to provide
the same or a greater level of security than the organization would have if the cloud
were not used. Listed here are ten items to review when considering cloud computing.
2. Who has access? Access control is a key concern, because insider attacks are
a huge risk. A potential hacker is someone who has been entrusted with approved
access to the cloud.
. Page 21
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
promote their services as being unpacks able, cloud based services are an attractive
target to hackers.
IaaS PaaS
APIaaS
STaaS
DaaS
SaaS SEaaS
TEaaS
. Page 22
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
execute as required. This is much similar to running a virtual server all alone
hardware, aside from you are currently running a virtual server on a virtual
circle. This model is like a service organization display, as you pay for what you
utilize. A case is Amazon Web Services at http://aws.amazon.com/.
. Page 23
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
CLOUD PROVIDERS
Gartner predicts that cloud computing will surge to 150 billion dollars by 2013.
Below is a partial list of companies that provide cloud computing services:
1. Amazon
2. Google
3. Microsoft
4. Salesforce.com
5. Citrix
6. IBM
7. Mozyhome
8. Sun
9. CohensiveFT
10. Icloud
11. Nivanix
12. VMware
13. Flexscale
. Page 24
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
Fig: 2.7. Cloud Computing Provider
CLOUD COMPUTING ATTACKS
As more companies move to cloud computing, look for hackers to follow.
Some of the potential attack vectors criminals may attempt include:
Denial of Service (DoS) attacks - Some security professionals have
argued that the cloud is more vulnerable to DoS attacks, because it is shared
by many users, which makes DoS attacks much more damaging. Twitter
suffered a devastating DoS attack during 2009.
Side Channel attacks – An attacker could attempt to compromise the
cloud by placing a malicious virtual machine in close proximity to a target
cloud server and then launching a side channel attack.
Authentication attacks – Authentication is a weak point in hosted and
virtual services and is frequently targeted. There are many different ways to
authenticate users; for example, based on what a person knows, has, or is.
The mechanisms used to secure the authentication process and the
methods used are a frequent target of attackers.
Man-in-the-middle cryptographic attacks – This attack is carried out
when an attacker places himself between two users.
. Page 25
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
2. CONVENTIONAL SECURITY
These worries include PC and system interruptions or assaults that will be made
conceivable or possibly less demanding by moving to the cloud. Cloud suppliers react
to these worries by belligerence that their efforts to establish safety and procedures
are more develop and tried than those of the normal organization.
Another contention, made by the Jericho Forum, is: "It could be simpler to secure data
if it's controlled by an outsider as opposed to in-house, if organizations are stressed
over insider dangers. What's more, it might be simpler to uphold security through
contracts with online administrations suppliers than by means of inner controls."
Concerns in this classification include:
TS2. Cloud benefit supplier vulnerabilities: These could be stage level, for example, a
SQL-infusion or cross-site scripting helplessness in salesforce.com. For example,
there have been a few late Google Docs vulnerabilities and The Google reaction to
one of them is here: . There is just the same old thing new in the way of these
vulnerabilities; just their setting is novel. Indeed, IBM has repositioned its Rational
App Scan instrument, which checks for vulnerabilities in web benefits as a cloud
security benefit.
TS3. Phishing cloud supplier: Phishes and other social architects have another assault
vector, as the Sales drive phishing episode appears.
. Page 26
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
TS4. Extended system assault surface: The cloud client must ensure the foundation
used to interface and communicate with the cloud, an assignment confused by the
cloud being outside the firewall by and large. For example, demonstrates a case of
how the cloud may assault the machine associating with it.
3. Accessibility
These worries focus on basic applications and information being accessible. All
around pitched occurrences of cloud blackouts incorporate Gmail (one-day blackout
in mid-October 2008), Amazon S3 (more than seven-hour downtime on July 20,
2008), and Flexi Scale (18-hour blackout on October 31, 2008).
A1. Up time. Similarly as with the Traditional Security concerns, cloud suppliers
contend that their server uptime contrasts well and the accessibility of the cloud
client's own particular server farms.
. Page 27
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
Other than just administrations and applications being down, this incorporates the
worry that an outsider cloud would not scale all around ok to handle certain
applications. SAP's CEO, Leo Apotheker said:
"There are sure things that you can't keep running in the cloud in light of the fact that
the cloud would fall… Don't trust that any service organization will run its charging
for 50 million shoppers in the cloud."
BL1. Due constancy: If served a subpoena or other lawful activity, can a cloud client
force the cloud supplier to react in the required time period.
. Page 28
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
BL2. Review capacity: Audit trouble is another symptom of the absence of control in
the cloud. Is there adequate straightforwardness in the operations of the cloud supplier
for inspecting purposes? As of now, this straightforwardness is given by
documentation and manual reviews. A related concern is appropriate administration
of cloud-related movement. It's simple, maybe too simple, to begin utilizing a cloud
benefit.
One prevalent evaluating rule is the SAS 70, which characterizes rules for inspectors
to survey inner controls, for example controls over the handling of touchy data. SOX
and HIPAA are other surely understood controls. US government offices for the most
part need to take after rules from FISMA, NIST, and FIPS. Certain controls require
information and operations to stay in certain geographic areas. Cloud suppliers are
starting to react with geo-focused on offerings.
BL5. Information Lock-in: How does a cloud client maintain a strategic distance from
secure to a specific distributed computing seller? The information may itself be
secured an exclusive configuration, and there are additionally issues with preparing
and procedures.
There is additionally the issue of the cloud client having no power over incessant
changes in cloud-based administrations. Coghead is one case of a cloud stage whose
. Page 29
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
shutdown left clients scrambling to re-compose their applications to keep running on
an alternate stage. Obviously, one response to secure is institutionalization, for
example GoGrid API.
. Page 30
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
Organizations may make various contemplations as to which distributed computing
model they utilize, and they may utilize more than one model to tackle diverse issues.
An application required on a brief premise may be most appropriate for arrangement
in an open cloud since it stays away from the need to buy extra hardware to settle an
impermanent need. Similarly, a lasting application, or one that has particular
prerequisites on nature of administration or area of information, may best be sent in a
private or half and half cloud.
1. Open Cloud
Open cloud (additionally alluded to as "outer" cloud) depicts the traditional
significance of distributed computing: adaptable, progressively provisioned,
frequently virtualized assets accessible over the Internet from an off-website outsider
supplier, which isolates up assets and bills its clients on an "utility" premise. A case is
Think Grid, an organization that gives a multi-inhabitant engineering to providing
administrations, for example, Hosted Desktops, Software as a Service and Platform as
a Service. Other prevalent cloud merchants incorporate Salesforce.com, Amazon EC2
and Flexi scale.
Open mists are controlled by outsiders, and applications from various clients are
probably going to be combined on the cloud's servers, stockpiling frameworks, and
systems. Open mists are regularly facilitated far from client premises, and they give
an approach to diminish client hazard and cost by giving an adaptable, even transitory
expansion to big business foundation.
On the off chance that an open cloud is actualized in light of execution, security, and
information region, the presence of different applications running in the cloud ought
to be straightforward to both cloud engineers and end clients. Undoubtedly, one of the
advantages of open mists is that they can be much bigger than an organization's
private cloud may offer, the capacity to scale here and there on request, and moving
framework dangers from the undertaking to the cloud supplier, if even just briefly.
. Page 31
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
Segments of an open cloud can be cut out for the select utilization of a solitary
customer, making a virtual private datacenter. Instead of being restricted to sending
virtual machine pictures in an open cloud, a virtual private datacenter gives clients
more noteworthy perceivability into its foundation. Presently clients can control
virtual machine pictures, as well as servers, stockpiling frameworks, arrange gadgets,
and system topology..
Surely, one of the advantages of open mists is that they can be much bigger than an
organization's private cloud may offer, the capacity to scale all over on request, and
moving foundation dangers from the undertaking to the cloud supplier, if even just
briefly.
Parts of an open cloud can be cut out for the restrictive utilization of a solitary
customer, making a virtual private datacenter. Instead of being restricted to sending
virtual machine pictures in an open cloud, a virtual private datacenter gives clients
more noteworthy perceivability into its framework. Presently clients can control
virtual machine pictures, as well as servers, stockpiling frameworks, organize gadgets,
and system topology. An open cloud gives administrations to numerous clients, and is
normally conveyed at a collocation office.
2. Private Cloud
To buy, set up and deal with their own particular mists. Private mists are worked for
the select utilization of one customer, giving the nearly control over information,
security, and nature of administration. The organization claims the foundation and has
. Page 32
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
control over how applications are sent on it. Private mists might be sent in an
undertaking datacenter, and they additionally might be conveyed at a collocation
office. Private mists can be constructed and oversaw by an organization's own
particular IT association or by a cloud supplier.
In this "facilitated private" model, an organization, for example, Sun can introduce,
design, and work the foundation to bolster a private cloud inside an organization's
endeavor datacenter. This model gives organizations an abnormal state of control over
the utilization of cloud assets while getting the mastery expected to build up and work
nature.
. Page 33
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
They can give on-request, remotely provisioned scale. The capacity to enlarge a
private cloud with the assets of an open cloud can be utilized to keep up
administration levels despite fast workload changes. This is regularly observed with
the utilization of capacity mists to bolster Web 2.0 applications. A half and half cloud
additionally can be utilized to handle arranged workload spikes. Once in a while
called "surge registering," an open cloud can be utilized to perform occasional errands
that can be conveyed effectively on an open cloud.
Cross breed mists present the many-sided quality of deciding how to disperse
applications crosswise over both an open and private cloud. Among the issues that
should be considered is the relationship amongst information and preparing assets. In
the event that the information is little, or the application is stateless, a crossover cloud
can be considerably more fruitful than if a lot of information must be moved into an
open cloud for a little measure of preparing.
. Page 34
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
Facilitated desktops
Facilitated desktops expel the requirement for conventional desktop PCs in the
workplace environment, and lessen the cost of giving the administrations that you
require. A facilitated desktop looks and carries on like a customary desktop PC, yet
the product and information clients utilize are housed in remote, very secure server
farms, as opposed to all alone machines. Clients can just get to their facilitated
desktops by means of a web association from anyplace on the planet, utilizing either a
current PC or portable workstation or, for greatest cost proficiency, a particular gadget
called a thin customer.
Facilitated email
As more associations search for a safe, dependable email arrangement that won't cost
the earth, they are progressively swinging to facilitated Microsoft Exchange® email
arranges.
Utilizing the world's chief email stage, this administration lets associations both vast
and little receive the rewards of utilizing MS Exchange® accounts without investing
in the expensive foundation themselves. Email is put away midway on oversaw
servers, giving excess and quick availability from any area. This permits clients to get
to their email, schedule, contacts and shared documents by an assortment of means,
including Outlook®, Outlook Mobile Access (OMA) and Outlook Web Access
(OWA).
. Page 35
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
Distributed storage
Distributed storage is developing in prevalence because of the advantages it gives, for
example, straightforward, Cap sans ex costs, anyplace get to and the evacuation of the
weight of in-house support and administration. It is fundamentally the conveyance of
information stockpiling as an administration, from an outsider supplier, with get to by
means of the web and charging computed on limit utilized as a part of a specific
period (e.g. every month).
Dynamic Servers
Dynamic servers are the up and coming era of server environment, supplanting the
traditional idea of the committed server. A supplier like Think Grid gives its clients
access to assets that look and feel precisely like a devoted server, however that are
completely versatile. You can straightforwardly control the measure of handling
force and space you utilize, which means you don't need to pay for equipment you
needn't bother with.
Regularly, you can roll out improvements to your dynamic server whenever, on the
fly, without the expenses connected with moving starting with one server then onto
the next.
• Agility: The cloud works in the 'conveyed mode' environment. It offers assets
among clients and assignments, while enhancing proficiency and deftness
(responsiveness) .
. Page 36
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
• High accessibility and unwavering quality: Availability of servers is high and
more dependable as the odds of framework disappointment are negligible.
• Multi-sharing: With the cloud working in a dispersed and shared mode, different
clients and applications can work all the more effectively with cost diminishments by
sharing normal framework
• Services in pay-per-utilize mode: SLAs between the supplier and the client must
be characterized when offering administrations in pay per utilize mode. This might be
founded on the unpredictability of administrations advertised.
IT associations have comprehended for quite a long time that virtualization permits
them to rapidly and effectively make duplicates of existing situations — in some
cases including various virtual machines — to bolster test, improvement, and
arranging exercises. The cost of these situations is negligible in light of the fact that
they can exist together on an indistinguishable servers from generation situations
. Page 37
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
since they utilize couple of assets. In like manner, new applications can be created and
conveyed.
. Page 38
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
advantages are the transportability of the application is that clients can telecommute,
work, or at customer areas. This expanded versatility implies workers can get to data
anyplace they are. There is likewise the capacity of distributed computing to free-up
IT laborers who may have been involved performing upgrades, introducing patches,
or giving application bolster.
. Page 39
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
CLOUD OPERATIONS
The cloud can perform the following operations.
UPDATE OPERATION
In cloud data storage, sometimes the user may need to modify some data block(s)
stored in the cloud, this refer this operation as data update. In other words, for all the
unused tokens, the user needs to exclude every occurrence of the old data block and
replace it with the new one.
DELETE OPERATION
Sometimes, after being stored in the cloud, certain data blocks may need to be
deleted. The delete operation this are considering is a general one, in which user
replaces the data block with zero or some special reserved data symbol. From this
point of view, the delete operation is actually a special case of the data update
operation, where the original data blocks can be replaced with zeros or some
predetermined special blocks.
APPEND OPERATION
In some cases, the user may want to increase the size of his stored data by adding
blocks at the end of the data file, which this refer as data append.I anticipate that the
most frequent append operation in cloud data storage is bulk append, in which the
user needs to upload a large number of blocks (not a single block) at one time.
INSERT OPERATION
An insert operation to the data file refers to an append operation at the desired index
position while maintaining the same data block structure for the whole data file, i.e.,
inserting a block F[j] corresponds to shifting all blocks starting with index j + 1 by
one slot.
. Page 40
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
Chapter - 3
SYSTEM REQUIREMENTS
. Page 41
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
Chapter - 4
SYSTEM DESIGN
4.1. SYSTEM ARCHITECTURE
. Page 42
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
GOALS
The Primary objectives in the plan of the UML are as per the following:
1. Provide clients a prepared to-utilize, expressive visual displaying
Language with the goal that they can create and trade important models.
2. Provide extendibility and specialization instruments to develop the
center ideas.
3. Be free of specific programming dialects and improvement handle.
4. Provide a formal reason for comprehension the displaying dialect.
5. Encourage the development of OO devices showcase.
6. Support more elevated amount improvement ideas, for example,
coordinated efforts, systems, examples and parts.
7. Integrate best practices.
. Page 43
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
Registration
login admin
upload data
cloud A
view owners
view files
Cloud B
logout
. Page 44
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
data owner
Cloud AB
+Name
+Password +name
+file +password
+Registration() +login()
+login() +view file tranfer req()
+upload file() +view file deletion req()
+view file() +logout()
+file tranfer req()
+file delete req()
+logout()
Cloud AB
Admin +name
+password
+name
+password +login()
+view file tranfer req()
+view dataowner() +view file deletion req()
+view files() +logout()
+logout()
. Page 45
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
logout
Logout
Logout
. Page 46
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
Fig: 4.4. Sequence Diagram
Chapter - 5
SYSTEM IMPLEMENTATION
2.Admin
In This Application admin is one of the main modules he can able view data owner
requests like transfer,delete .
3.CLOUD A
The cloud is the main module to operate this project in the users activation s , owner
activation and also the cloud can check the following operations like search
. Page 47
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
permission provides to the users, can check the top-k searched keyword, top-k
similarity in chart, top-k searched keyword in chart. Primarily the cloud should login.
Then only the cloud can perform the above mentioned actions.
4.CLOUD B
The cloud is the main module to operate this project in the users activation s , owner
activation and also the cloud can check the following operations like search
permission provides to the users, can check the top-k searched keyword, top-k
similarity in chart, top-k searched keyword in chart.Primarily the cloud should login.
Then only the cloud can perform the above mentioned actions.
. Page 48
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
6. Double-click on javadevelopmentkit-6u2-windows-i586-p.executable
to start the installation wizard.
7. The installation wizard will guide to finish the installation.
. Page 49
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
and alter the path of the my.ini file to the right location:\server\mysql\my.ini and click
on apply.
To develop {a net an internet an online} application with jsp servlet install any web
server like JRun, Tomcat etc. to run your application.
. Page 50
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
JAVA TECHNOLOGY
Java technology is used for programming language and a platform for both.
The Java Programming Language
The Java programming language is a sophisticated language that can be
categorized by all of the following buzzwords:
Simple
Architecture neutral
Object oriented
Portable
Distributed
High performance
Interpreted
Multithreaded
. Page 51
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
Robust
Dynamic
Secure
With furthermost programming languages, you either compile the program or
interpret a program, that program can run it on your computer. The Java programming
language is unfamiliar in that a program is compiled and interpreted or both. Within
the compiler, first you convert a program into an intermediate language called Java
byte codes —the platform-independent codes interpreted by the interpreter on the
Java platform. The interpreter parses and runs each Java byte code instruction on the
computer. Compilation happens just once; interpretation occurs each and every time
the program is executed. The following diagram explains how this works.
You can consider that Java byte codes as the machine code directions for the
Java Virtual Machine (Java VM). Each Java translator, whether it's an advancement
apparatus or a Web program that can run applets, is an utilization of the Java VM.
Java byte codes make "compose once, run anyplace (WORA)" conceivable. You can
assemble a program into byte codes on any stage that has a Java compiler. The byte
codes can then be keep running on any use of the Java VM. That implies that the
length of a PC has a Java VM, a similar program written in the Java programming
dialect can keep running on whatever other Operating. Frameworks.
. Page 52
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
ODBC
Microsoft Open Database Connectivity (ODBC) is a standard programming interface
for application fashioners and database structures providers. Before ODBC
transformed into an acknowledged standard for Windows tasks to interface with
database structures, engineers expected to use prohibitive vernaculars for each
database they expected to take up with. In a matter of seconds, ODBC has settled on
the choice of the database system for all intents and purposes wrong from a coding
perspective, which is as it should be. Application engineers have altogether more
basic things to worry over than the sentence structure that is required to port their
program beginning with one database then onto the following when business needs
out of the blue change.
Through the ODBC Administrator in Control Panel, you can demonstrate the
particular database that is associated with a data source that an ODBC application
program is created to use. Consider an ODBC data source as a gateway with a name
on it. Each portal will lead you to a particular database. For example, the data source
named Sales Figures might be a SQL Server database, while the Accounts Payable
data source could suggest an Access database. The physical database suggested by a
data source can live wherever on the LAN.
. Page 53
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
The ODBC structure records are not presented on your system by Windows 95. On
the other hand perhaps, they are presented when you setup an alternate database
application, for instance, SQL Server Client or Visual Basic 4.0. Right when the
ODBC image is presented in Control Panel, it uses a record called ODBCINST.DLL.
It is in like manner possible to deal with your ODBC data sources through a stay
single program called ODBCADM.EXE. There is a 16-bit and a 32-bit version of this
program and every keeps up an alternate once-over of ODBC data sources.
The working system uses the Registry information made by ODBC Administrator to
make sense of which low-level ODBC drivers are relied upon to chat with the data
source, (for instance, the interface to Oracle or SQL Server). The stacking of the
ODBC drivers is clear to the ODBC application program. In a client/server
environment, the ODBC API even handles extensive segments of the framework
issues for the application programming engineer.
The advantages of this arrangement are various to the point that you are apparently
thinking there must be some catch. The fundamental weight of ODBC is that it isn't as
powerful as talking particularly to the neighborhood database interface. ODBC has
had various depreciators make the charge that it is excessively direct. Microsoft has
constantly sued that the essential compute execution is the way of the driver
programming that is used. As we might want to think, this is legitimate. The
availability of good ODBC drivers has upgraded an amazing game plan starting late.
. Page 54
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
Moreover, at any rate, the input about execution is to some degree like the people who
said that compilers would never facilitate the speed of unadulterated low level
processing develop. Maybe not, yet rather the compiler (or ODBC) allows you to
form cleaner programs, which infers you finish sooner. Meanwhile, PCs get speedier
reliably.
JDBC
With a ultimate objective to set a free database standard API for Java; Sun
Microsystems made Java Database Connectivity, or JDBC. JDBC offers a non
particular SQL database get the chance to instrument that gives a consistent interface
to a variety of RDBMSs. This trustworthy interface is winning utilizing "module"
database accessibility modules, or drivers. In case a database trader wishes to have
JDBC support, he or she ought to give the driver to each phase that the database and
Java continue running on.
To extend a more broad affirmation of JDBC, Sun develop JDBC's structure in light
of ODBC. As you revealed before in this segment, ODBC has no matter how you
look at it support on a collection of stages. Developing JDBC as for ODBC will allow
venders to offer JDBC drivers available to be purchased to people in general much
faster than working up an absolutely new accessibility game plan. JDBC was
accounted for in March of 1996. It was released for a 90 day open review that
completed June 8, 1996. In light of customer information, the last JDBC v1.0
assurance was released a little while later.
Whatever is left of this range will cover enough information about JDBC for you to
grasp what it is about and how to use it effectively. This is by no means whatsoever,
an aggregate survey of JDBC. That would fill an entire book.
JDBC Goals
. Page 55
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
Few programming groups are sketched out without goals as an essential concern.
JDBC is one that, because of its various destinations, drove the change of the API.
These destinations, in conjunction with early examiner input, have closed the JDBC
class library into a solid framework for building database applications in Java. The
targets that were set for JDBC are crucial. They will give you some comprehension in
the matter of why certain classes and functionalities bear in transit they do. The eight
diagram goals for JDBC are according to the accompanying:
1.SQL Level API The organizers felt that their essential target was to describe a SQL
interface for Java. In spite of the way that not the most negligible database interface
level possible, it is at an adequately low level for more raised sum instruments and
APIs to be made. On the other hand, it is at an adequately abnormal state for
application designers to use it surely. Fulfilling this target considers future instrument
dealers to "convey" JDBC code and to disguise countless difficulties from the end
customer.
2. SQL Conformance SQL punctuation vacillates as you move from database vendor
to database vender. With a true objective to reinforce a wide arrangement of shippers,
JDBC will allow any request announcement to be experienced it to the concealed
database driver. This allows the system module to handle non-standard handiness in a
way that is sensible for its customers.
3.JDBC must be implemental on top of essential database interfaces The JDBC SQL
API must "sit" on top of other normal SQL level APIs. This target grants JDBC to use
existing ODBC level drivers by the usage of an item interface. This interface would
make a translation of JDBC calls to ODBC and the a different way.
4. Give a Java interface that is unsurprising with whatever is left of the Java system
In perspective of Java's affirmation in the customer aggregate as such, the organizers
feel that they should not stray from the present diagram of the middle Java structure.
5.Keep it clear This target probably appears in all item plot target postings. JDBC is
no unique case. Sun felt that the layout of JDBC should be extraordinarily clear,
. Page 56
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
considering one and procedure for completing a task for every segment. Allowing
duplicate convenience just serves to overwhelm the customers of the API.
6.Use in number, static composition wherever possible Strong composition considers
more bumble checking to be done at amass time; also, less mix-up appear at runtime.
7.Keep the typical cases direct
What is JSP?
JSP could be a technology that adds dynamic content to sites. In absence of
JSP, to update the looks or the content of plain static hypertext mark-up language
pages, it should be done by hand. even though an image must be modified, the
hypertext mark-up language file should be emended for modifications.
Whereas with JSP, the content obsessed with several factors are often created, as well
as the time of the day, the knowledge provided by the user, the user’s history of
interaction together with your computing machine, and even the user’s browser sort.
This capability is crucial to supply on-line services which may be tailored to the
viewer World Health Organization created the request, betting on the viewer’s
preferences and needs. a vital facet of providing purposeful on-line services is for the
system to be able to keep in mind knowledge related to the service and its users.
That’s why databases play a vital role in dynamic sites.
. Page 57
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
2.The online server isn't a traditional server, however rather a Java server, with the
extensions necessary to spot and handle Java servlets. the online server acknowledges
that the protocol request is for a JSP page and forwards it to a JSP engine.
3.The JSP engine masses the JSP page from disk and converts it into a Java servlet.
From now on, this servlet is indistinguishable from the other servlet developed
directly in Java instead of JSP, though the mechanically generated Java code of a JSP
servlet isn't perpetually straightforward to browse, and you must ne\'er modify it by
hand.
4.The JSP engine compiles the servlet into associate possible category and forwards
the initial request to a different a part of the online server referred to as the servlet
engine. Note that the Jsp engine solely converts the JSP page to Java and recompiles
the servlet if it finds that the JSP page has modified since the last request. This makes
the method a lot of economical than with alternative scripting languages and thus
quicker.
5.The servlet engine masses the servlet category and executes it. throughout
execution, the servlet produces associate output in hypertext mark-up language
format, that the servlet engine passes to the online server within associate protocol
response.
6.The online server forwards the protocol response to your browser.
7.Your application program handles the dynamically generated hypertext mark-up
language page within the protocol response specifically as if it were a static page. In
fact, static and dynamic sites square measure within the same format.
. Page 58
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
5.4 DATA BASE TABLES
. Page 59
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
import com.database.Queries;
import com.oreilly.servlet.MultipartRequest;
import java.io.BufferedReader;
import java.io.File;
import java.io.FileReader;
import java.io.IOException;
import java.io.PrintWriter;
. Page 60
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
import javax.crypto.KeyGenerator;
import javax.crypto.SecretKey;
import javax.servlet.ServletException;
import javax.servlet.annotation.MultipartConfig;
import javax.servlet.http.HttpServlet;
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletResponse;
import javax.servlet.http.HttpSession;
import com.sun.org.apache.xerces.internal.impl.dv.util.Base64;
import java.security.SecureRandom;
/**
*
* @author KishanVenky
*/
@MultipartConfig(maxFileSize = 16177215)
public class FileUpload extends HttpServlet {
. Page 61
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
try{
MultipartRequest m = new MultipartRequest(request, filepath);
String owner=m.getParameter("id");
String fname=m.getParameter("fname");
File f=m.getFile("file");
String filename=f.getName();
}
String data=sb.toString();
KeyGenerator keygen=KeyGenerator.getInstance("AES");
keygen.init(128);
SecretKey s=keygen.generateKey();
//converting secret keyto string
byte[] b=s.getEncoded();//encoding secret key
String skey=Base64.encode(b);
. Page 62
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
session.setAttribute("fid",fid);
session.setAttribute("filename",filename);
session.setAttribute("data",data);
session.setAttribute("skey",skey);
session.setAttribute("cipher",cipher);
response.sendRedirect("Upload2.jsp");
int i=Queries.getExecuteUpdate(query);
if(i>0){
response.sendRedirect("Upload.jsp?msg=success");
}else{
response.sendRedirect("Upload.jsp?msg=failed");
}**/
. Page 63
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
}catch(Exception e){
out.println(e);
}
/**
* Handles the HTTP <code>POST</code> method.
*
* @param request servlet request
* @param response servlet response
. Page 64
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
* @throws ServletException if a servlet-specific error occurs
* @throws IOException if an I/O error occurs
*/
@Override
protected void doPost(HttpServletRequest request, HttpServletResponse response)
throws ServletException, IOException {
processRequest(request, response);
}
/**
* Returns a short description of the servlet.
*
* @return a String containing servlet description
*/
@Override
public String getServletInfo() {
return "Short description";
}// </editor-fold>
package com.database;
import java.sql.Connection;
import java.sql.DriverManager;
import java.sql.SQLException;
. Page 65
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
public static Connection getcon(){
try{
Class.forName("com.mysql.jdbc.Driver");
con = DriverManager.getConnection("jdbc:mysql://localhost:3306/sdata",
"root", "root");
}
catch(Exception e){
e.printStackTrace();
}
return con;
}
/*
* To change this license header, choose License Headers in Project Properties.
* To change this template file, choose Tools | Templates
* and open the template in the editor.
*/
package com.database;
import java.sql.*;
. Page 66
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
/**
*
* @author Acer
*/
public class Queries {
public static ResultSet rs;
public static int i;
. Page 67
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
Chapter-6
SYSTEM TESTING
Testing is that the debugging program is one amongst the leading crucial
aspects of the pc programming triggers, while not programming that works, the
system would ne'er turn out relate in Nursing output of that it had been
designed .Testing is best performed once user development is asked to help in
characteristic all errors and bugs. The sample knowledge are used for testing. It is not
amount however quality of the information used the matters of testing .Testing is
aimed toward guaranteeing that the system was accurately relate in Nursing with
efficiency before live operation commands.
. Page 68
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
The module of the system is tested individually. as an example the validation check is
completed for variable the user input given by the user that validity of the information
entered. it's terribly straightforward to search out error rectify the system. Every
Module will be tested victimization the subsequent 2 Strategies: recording machine
Testing and White Box Testing.
. Page 69
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
• Regression testing: Regression testing is completed once code fixes, upgrades or
the other system maintenance to visualize the new code has not affected the prevailing
code.
. Page 70
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
The entry screen, messages and responses must not be delayed.
Features to be tested
Verify that the entries are of the correct format
No duplicate entries should be allowed
All links should take the user to the correct page.
Test Scenarios
General Scenarios
• All mandatory fields should be validated and indicated by asterisk (*)
symbol
• Validation error messages should be displayed properly at correct
position
• All error messages should be displayed in same CSS style (e.g. using
red color)
• General confirmation messages should be displayed using CSS style
other than
error messages style (e.g. using green color)
• Dropdown fields should have first entry as blank or text like ‗Select‘
• Delete functionality for any record on page should ask for confirmation
. Page 71
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
• Check if default window size is correct
• Check if child window size is correct
• Check if child windows are getting closed on closing parent/opener
window
• Check window minimize, maximize and close functionality
• Check if window is re-sizable
. Page 72
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
6.3. TEST CASE
1 Register user details Fill all the All the fields are
in registration page fields while filled
Pass
registering user
. Page 73
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
Chapter - 7
7.1 SCREEN SHOTS
Home screen
Owner login
. Page 74
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
Login status
. Page 76
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
Divide data into blocks
Upload status
View data
. Page 77
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
. Page 78
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
Transfer Request
. Page 79
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
Transfer request send status
Cloud_a login
. Page 81
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
Cloud_b login
login status
. Page 82
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
. Page 83
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
. Page 84
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
View transfer result
Deletion status
. Page 85
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
. Page 86
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
Deletion status
. Page 87
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
. Page 88
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
Result Status
. Page 89
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
Deletion result
. Page 90
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
Admin login
. Page 91
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
Admin home
. Page 92
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
. Page 93
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
. Page 94
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
. Page 95
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
. Page 96
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
Chapter 8
CONCLUSION
In cloud storage, the data owner does not believe that the cloud server might
execute the data transfer and deletion operations honestly. To solve this problem,
we propose a CBF-based secure data transfer scheme, which can also realize
verifiable data deletion.
In our scheme, the cloud B can check the transferred data integrity, which can
guarantee the data is entirely migrated. Moreover, the cloud A should adopt CBF
to generate a deletion evidence after deletion, which will be used to verify the
deletion result by the data owner. Hence, the cloud A cannot behave maliciously
and cheat the data owner successfully. Finally, the security analysis and
simulation results validate the security and practicability of our proposal,
respectively.
FUTURE SCOPE
Similar to all the existing solutions, our scheme considers the data
transfer between two different cloud servers. However, with the development
of cloud storage, the data owner might want to simultaneously migrate the
outsourced data from one cloud to the other two or more target clouds.
However, the multi-target clouds might collude together to cheat the data
owner maliciously. Hence, the provable data migration among three or more
clouds requires our further exploration.
. Page 97
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
BIBLIOGRAPHY
[1] C. Yang and J. Ye, “Secure and efficient fine-grained data access control
scheme in cloud computing”, Journal of High Speed Networks, Vol.21, No.4,
pp.259–271, 2015.
[2] X. Chen, J. Li, J. Ma, et al., “New algorithms for secure outsourcing of
modular exponentiations”, IEEE Transactions on Parallel and Distributed
Systems, Vol.25, No.9, pp.2386–2396, 2014.
[4] B. Varghese and R. Buyya, “Next generation cloud computing: New trends
and research directions”, Future Generation Computer Systems, Vol.79, pp.849–
861, 2018.
[5] W. Shen, J. Qin, J. Yu, et al., “Enabling identity-based integrity auditing and
data sharing with sensitive information hiding for secure cloud storage”, IEEE
Transactions on Information Forensics and Security, Vol.14, No.2, pp.331–346,
2019.
[8] Cloudsfer, “Migrate & backup your files from any cloud to any cloud”,
available at: https://www.cloudsfer.com/, 2019-5-5.
. Page 98
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
Computing.
[9] Y. Liu, S. Xiao, H. Wang, et al., “New provable data transfer from provable
data possession and deletion for secure cloud storage”, International Journal of
Distributed Sensor Networks, Vol.15, No.4, pp.1–12, 2019.
Sites Referred
https://www.computer.org
www.ijariie.com
www.ijcaonline.org
www.ijetcse.com
www.academia.edu
https://edupediapublications.org
. Page 99