SlideShare une entreprise Scribd logo
1  sur  5
Télécharger pour lire hors ligne
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4758
ENABLING IDENTITY-BASED INTEGRITY AUDITING AND DATA SHARING WITH
SENSITIVE INFORMATION HIDING FOR SECURE CLOUD STORAGE
D. RAMAN1, J. SUJATHA2
1PG Scholar, Department of MCA, Arulmigu Meenakshi Amman College of Engineering, AnnaUniversity,
Vadamavandal (near Kanchipuram), India.
2Assistant Professor, Department of MCA, Arulmigu Meenakshi Amman College of Engineering, Anna University,
Vadamavandal (near Kanchipuram), India.
--------------------------------------------------------------------------***----------------------------------------------------------------------------
ABSTRACT - The main goal of our project is to design a mobile application to Auditing and Data Sharing through cloud storage
service, users can remotely store their data to the cloud and realize the data sharing with others. Remote data integrity
auditing is proposed to guarantee the integrity of the data stored in the cloud. In some common cloud storage systems, cloud
file might contain some sensitive information. Encrypting the whole shared file can realize the sensitive information hiding,
but will make this shared file unable to be used by others. In this paper we propose a remote document reference id
automatically convert to the QR code then just scan user module then download the particular document integrity that realizes
data sharing with sensitive information hiding. Signatures are used to verify the file in the phase of integrity auditing.
1. INTRODUCTION:
New businesses are recently conceived organizations
which battle for presence. These elements are generally
framed dependent on splendid thoughts and develop to
succeed. These wonders are specified in the writing of
administration, association, and business speculations.
Notwithstanding, an unmistakable photo of these
substances isn't accessible. This paper attempts to
conceptualize the marvel, i.e. startup, and understand the
difficulties they will confront. In the wake of exploring the
existence cycle and the difficulties, the paper closes with
some finishing up comments. This paper looks for a decent
proportion of new business execution, and afterward
clarifies this measure by different measurements of
business procedure. WITH the touchy development of
information, it is an overwhelming weight for clients to
store the sheer measure of information locally. In this
manner, an ever increasing number of associations and
people would like to store their information in the cloud.
Be that as it may, the information put away in the cloud
may be adulterated or lost because of the unavoidable
programming bugs, equipment issues and human mistakes
in the cloud keeping in mind the end goal to check whether
the information is put away effectively in the cloud,
numerous remote information respectability examining
plans have been proposed. In remote information honesty
reviewing plans, the information proprietor right off the
bat needs to produce marks for information obstructs
before transferring them to the cloud. These marks are
utilized to demonstrate the cloud really has these
information hinders in the period of trustworthiness
examining. And after that the information proprietor
transfers these information hinders alongside their
relating marks to the cloud. The information put away in
the cloud is regularly shared over different clients in many
distributed storage applications, for example, Google
Drive, Dropbox and iCloud. Information sharing as a
standout amongst the most basic highlights in distributed
storage, permits various clients to impart their
information to others. In any case, these mutual
information put away in the cloud may contain some
delicate data. For example, the Electronic Health Records
(EHRs) put away what's more, partaken in the cloud for
the most part contain company auditing ' touchy data
(company name, phone number and ID number, and so
on.) and the healing center's touchy data.
1.1 EXISTING SYSTEM
The information from the audit. When associate auditor
audits the accounts or inspects key monetary statements
of an organization, the findings square measure typically
place go into a report or compiled in a very systematic
manner.
The user prepared the document in manual.
1.2 PROPOSED SYSTEM
In this paper we propose a remote document reference id
automatically convert to the QR code then just scan user
module then download the particular document integrity
that realizes data sharing with sensitive information
hiding.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4759
2 SYSTEM REQUIREMENTS
2.1 HARDWARE REQUIREMENTS
PROCESSOR : Intel Core i3.
RAM : 4 GB DDR2 RAM
MONITOR : 15” COLOR
HARD DISK : 100 GB
2.2SOFTWARE REQUIREMENTS
Front End : ANDROID XML, JAVA
Back End : MYSQL,PHP
Operating System: Windows 07
3 MODULES & DISCRIPTIONS
3.1 LOGIN & REGISTRATION
In this module we tend to style to develop login and signup
screen. Android used xml to develop classical screens in
our application. The modules describe signup page
contains email id or user name, password and conform
password those kind of details should be stored in
database. Login screen contains email id or username and
password when the user to login the app it should be
retrieve the data to the database and combine based on
user input if its match user name and password to allow in
the app otherwise alert and show a message to the user.
3.2 DATABASE CREATION:
User email id or user name and password have been
stored after registration. Android used SQLite Database for
storing and fetching user application details
3.3 QR CODE GENERATOR
This module Used to Generate the Qr code for the User
enter Key and additionally what kind of data like
txt,image,etc. using php in website.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4760
3.4 SCANNAR
In, Additionally One type of application name as (Qdroid)
used in this project.
Qdroid is used to Scan the anykind of User Qrcode.Initially,
User1 generate the Qrcode After that Qrcode is sent to the
User 2. Then User2 Scan the Qrcode and get the key.
3.5 FILE DOWNLOAD
In this Module Explain that, After Getting the Key from
User 2 then Enter the key in Download Process and Get the
File from Server.
4 ARCHITECTURE- DIAGRAM
SOFTWARE TESTING
GENERAL
Cloud computing could be a model for sanctioning present,
convenient, on demand network access to a shared pool of
configurable computing resources. Since associate degree
put down Cloud could be a giant scale distributed and
interconnected automatic data processing system,
interactions among its sub parts (i.e., Clouds) and among
stakeholders (i.e., customers and Cloud providers) is
complicated. In an Inter Cloud, computing resources in
hand and administered by totally different Cloud suppliers
square measure pooled to serve multiple customers, and
applications and knowledge square measure accessible to
and shared by a broad cluster of cross enterprise and cross
platform users. Put down Cloud resource pooling and
sharing involve 1) combining resources through
cooperation among Clouds, 2) mapping and scheduling
shared resources through coordination, and 3)
establishing contracts between Clouds and customers, and
among Clouds through negotiation.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4761
DEVELOPING METHODOLOGIES
The check method is initiated by developing a
comprehensive arrange to check the final practicality and
special options on a range of platform combos. Strict
internal control procedures square measure used.
The method verifies that the applying meets necessities
laid out in the system requirements document and is bug
free. The subsequent square measure the concerns won’t
to develop the framework from developing the testing
methodologies.
UNIT TESTING
Unit checking involves the planning of test cases
that validate that the inner program logic is functioning
properly, which program input manufacture valid outputs.
All call branches and internal code flow ought to be valid.
It’s the testing of individual code units of the applying .it is
done once the completion of a personal unit before
integration. This can be a structural testing, that depends
on information of its construction and is invasive. Unit
checks perform basic tests at part level and test a
particular business method, application, and/or system
configuration. Unit tests make sure that every distinctive
path of a business method performs accurately to the
documented specifications and contains clearly outlined
inputs and expected results.
FUNCTIONAL CHECK
Useful tests give systematic demonstrations that functions
tested square measure accessible as nominative by the
business and technical needs, system documentation, and
user manuals.
Functional testing is focused on the subsequent items:
Valid Input: known categories of valid input should be
accepted.
Invalid Input: known categories of invalid input should be
rejected.
Functions: known functions should be exercised.
Output: known categories of application outputs should be
exercised.
Systems/Procedures: interfacing systems or procedures
should be invoked.
SYSTEM CHECK
System testing ensures that the complete
integrated code meets needs. It tests a configuration to
make sure better-known and foreseeable results. Associate
degree example of system checking is that the
configuration familiarized system integration test. System
testing relies on method descriptions and flows,
accentuation pre-driven method links and integration
points.
PERFORMANCE CHECK
The Performance check ensures that the output be
made at intervals the points in time,and the time taken by
the system for collection, giving response to the users and
request being send to the system for to retrieve the results.
INTEGRATION TESTING
Code integration testing is that the progressive integration
testing of 2 or a lot of integrated code parts on one
platform to supply failures caused by interface defects.
The task of the combination check is to visualize that parts
or code applications, e.g. parts during a code or – one
improve – code applications at the corporate level – move
while not error.
ACCEPTENCE TESTING
User Acceptance Testing could be a crucial section of any
project and needs important participation by the top user.
It additionally ensures that the system meets the useful
needs.
Acceptance testing for knowledge Synchronization:
The Acknowledgements are going to be received
by the Sender Node once the Packets square measure
received by the Destination Node
The Route add operation is completed only if
there's a Route request in want
The standing of Nodes data is completed
mechanically within the Cache Updation method
BUILD THE TEST PLAN
Any project is divided into units which will be any
performed for careful process. Then a testing strategy for
every of this unit is applied. Unit testing helps to identity
the potential bugs within the individual part that the part
that has bugs is known and may be corrected from errors.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4762
FUTURE ENHANCEMENT
Our future enhancement for identify based secure
distributed data storage are
To allow user to transfer pdf files and stand out sheets.
Future research will include advancement like uploading
we picture
Image, videos in encrypted format for user convenience.
CONCLUSION
Distributed data storage scheme provide the user with
convenience to outsource the file to untrusted proxy
servers.
Identify based secure distributed data store scheme arte a
special kinds of distributed data storage scheme.
Where are user identified by the identity and can
communicate without the need of verifying the public key
certificated.
REFERENCES
[1] ISO/IEC 15420:2009. Information technology -
Automatic identification and data capture techniques -
EAN/UPC bar code symbologyspecification. 2009.
[2] ISO/IEC 16022:2006. Information technology -
Automatic identification and data capture techniques -
Data Matrix bar code symbology specification. 2006.
[3] ISO/IEC 18004:2000. Information technology -
Automatic identification and data capture techniques - Bar
code symbology - QR Code. 2000.
[4] Z. Baharav and R. Kakarala. Visually significant QR
codes: Image blending and statistical analysis. In
Multimedia and Expo (ICME), 2013 IEEE International
Conference on, pages 1–6. IEEE, 2013.
[5] C. Baras and F. Cayre. 2D bar-codes for authentication:
A security approach. In Signal Processing Conference
(EUSIPCO), Proceedings of the 20th European, pages
1760–1766, 2012.
[6] T. V. Bui, N. K. Vu, T. T.P. Nguyen, I. Echizen, and T. D.
Nguyen.Robust message hiding for QR code. In Intelligent
Information Hiding and Multimedia Signal Processing (IIH-
MSP), 2014 Tenth International Conference on, pages 520–
523. IEEE, 2014.

Contenu connexe

Tendances

Windows Server 2012 R2 Jump Start - AIP
Windows Server 2012 R2 Jump Start - AIPWindows Server 2012 R2 Jump Start - AIP
Windows Server 2012 R2 Jump Start - AIP
Paulo Freitas
 
Narrative of digital signature technology and moving forward
Narrative of digital signature technology and moving forwardNarrative of digital signature technology and moving forward
Narrative of digital signature technology and moving forward
Conference Papers
 
Phase 1 Documentation (Added System Req)
Phase 1 Documentation (Added System Req)Phase 1 Documentation (Added System Req)
Phase 1 Documentation (Added System Req)
Reinier Eiman
 
Blockchain secure biometric access systems (bsbas)
Blockchain secure biometric access systems (bsbas)Blockchain secure biometric access systems (bsbas)
Blockchain secure biometric access systems (bsbas)
Conference Papers
 
Software Requirements Specification Final
Software Requirements Specification FinalSoftware Requirements Specification Final
Software Requirements Specification Final
jangjong
 
Naveen Kumar Bokku
Naveen Kumar BokkuNaveen Kumar Bokku
Naveen Kumar Bokku
Naveen Bokku
 

Tendances (20)

Windows Server 2012 R2 Jump Start - AIP
Windows Server 2012 R2 Jump Start - AIPWindows Server 2012 R2 Jump Start - AIP
Windows Server 2012 R2 Jump Start - AIP
 
Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...
 
Narrative of digital signature technology and moving forward
Narrative of digital signature technology and moving forwardNarrative of digital signature technology and moving forward
Narrative of digital signature technology and moving forward
 
Electronic form srs
Electronic form srsElectronic form srs
Electronic form srs
 
Phase 1 Documentation (Added System Req)
Phase 1 Documentation (Added System Req)Phase 1 Documentation (Added System Req)
Phase 1 Documentation (Added System Req)
 
IRJET- Plug-In based System for Data Visualization
IRJET- Plug-In based System for Data VisualizationIRJET- Plug-In based System for Data Visualization
IRJET- Plug-In based System for Data Visualization
 
Developing Web-Based Project Management Application for Event Organizer ABC
Developing Web-Based Project Management Application for Event Organizer ABCDeveloping Web-Based Project Management Application for Event Organizer ABC
Developing Web-Based Project Management Application for Event Organizer ABC
 
Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...
 
Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...
 
IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...
IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...
IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...
 
Blockchain secure biometric access systems (bsbas)
Blockchain secure biometric access systems (bsbas)Blockchain secure biometric access systems (bsbas)
Blockchain secure biometric access systems (bsbas)
 
Software Requirements Specification Final
Software Requirements Specification FinalSoftware Requirements Specification Final
Software Requirements Specification Final
 
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
 
Aspect-Oriented Instrumentation for Capturing Task- Based Event Traces
Aspect-Oriented Instrumentation for Capturing Task- Based Event TracesAspect-Oriented Instrumentation for Capturing Task- Based Event Traces
Aspect-Oriented Instrumentation for Capturing Task- Based Event Traces
 
IRJET- Contest Information Desk Android Application
IRJET-  	  Contest Information Desk Android ApplicationIRJET-  	  Contest Information Desk Android Application
IRJET- Contest Information Desk Android Application
 
Naveen Kumar Bokku
Naveen Kumar BokkuNaveen Kumar Bokku
Naveen Kumar Bokku
 
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and SolutionsSecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
 
Internet mail system java project
Internet mail system java projectInternet mail system java project
Internet mail system java project
 
Break Loose Acting To Forestall Emulation Blast
Break Loose Acting To Forestall Emulation BlastBreak Loose Acting To Forestall Emulation Blast
Break Loose Acting To Forestall Emulation Blast
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
 

Similaire à IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensitive Information Hiding for Secure Cloud Storage

Similaire à IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensitive Information Hiding for Secure Cloud Storage (20)

IRJET- In-House File Tracking System
IRJET-  	  In-House File Tracking SystemIRJET-  	  In-House File Tracking System
IRJET- In-House File Tracking System
 
Android Application For Decentralized Family Locator
Android Application For Decentralized Family LocatorAndroid Application For Decentralized Family Locator
Android Application For Decentralized Family Locator
 
publishable paper
publishable paperpublishable paper
publishable paper
 
IRJET- Sharing Session Key to Protect Data in Cloud Storage
IRJET- Sharing Session Key to Protect Data in Cloud StorageIRJET- Sharing Session Key to Protect Data in Cloud Storage
IRJET- Sharing Session Key to Protect Data in Cloud Storage
 
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing Features
 
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
 
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in CloudIRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in Cloud
 
IRJET- Highly Secure Data Chip for Highly Sensitive Data
IRJET- Highly Secure Data Chip for Highly Sensitive DataIRJET- Highly Secure Data Chip for Highly Sensitive Data
IRJET- Highly Secure Data Chip for Highly Sensitive Data
 
IRJET- Sensitive Data Sharing using QRCODE
IRJET-  	  Sensitive Data Sharing using QRCODEIRJET-  	  Sensitive Data Sharing using QRCODE
IRJET- Sensitive Data Sharing using QRCODE
 
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
 
Effective Information Flow Control as a Service: EIFCaaS
Effective Information Flow Control as a Service: EIFCaaSEffective Information Flow Control as a Service: EIFCaaS
Effective Information Flow Control as a Service: EIFCaaS
 
IRJET-Stock Management System
IRJET-Stock Management SystemIRJET-Stock Management System
IRJET-Stock Management System
 
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
 
Cloud Data Protection for the Masses
Cloud Data Protection for the MassesCloud Data Protection for the Masses
Cloud Data Protection for the Masses
 
IRJET- Cloud Computing: Security Issues Challenges and Solution
IRJET-  	  Cloud Computing: Security Issues Challenges and SolutionIRJET-  	  Cloud Computing: Security Issues Challenges and Solution
IRJET- Cloud Computing: Security Issues Challenges and Solution
 
Cloud Storage and Security
Cloud Storage and SecurityCloud Storage and Security
Cloud Storage and Security
 
IRJET- Smart Mobile Attendance System using Bluetooth Technology
IRJET-  	  Smart Mobile Attendance System using Bluetooth TechnologyIRJET-  	  Smart Mobile Attendance System using Bluetooth Technology
IRJET- Smart Mobile Attendance System using Bluetooth Technology
 
IRJET- Displaying Smart Phone Data in the Desktop using Firebase
IRJET- Displaying Smart Phone Data in the Desktop using FirebaseIRJET- Displaying Smart Phone Data in the Desktop using Firebase
IRJET- Displaying Smart Phone Data in the Desktop using Firebase
 
Resume
ResumeResume
Resume
 
Wireless Network Intrinsic Secrecy
Wireless Network Intrinsic SecrecyWireless Network Intrinsic Secrecy
Wireless Network Intrinsic Secrecy
 

Plus de IRJET Journal

Plus de IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Dernier

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
dharasingh5698
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Dernier (20)

Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdf
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 

IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensitive Information Hiding for Secure Cloud Storage

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4758 ENABLING IDENTITY-BASED INTEGRITY AUDITING AND DATA SHARING WITH SENSITIVE INFORMATION HIDING FOR SECURE CLOUD STORAGE D. RAMAN1, J. SUJATHA2 1PG Scholar, Department of MCA, Arulmigu Meenakshi Amman College of Engineering, AnnaUniversity, Vadamavandal (near Kanchipuram), India. 2Assistant Professor, Department of MCA, Arulmigu Meenakshi Amman College of Engineering, Anna University, Vadamavandal (near Kanchipuram), India. --------------------------------------------------------------------------***---------------------------------------------------------------------------- ABSTRACT - The main goal of our project is to design a mobile application to Auditing and Data Sharing through cloud storage service, users can remotely store their data to the cloud and realize the data sharing with others. Remote data integrity auditing is proposed to guarantee the integrity of the data stored in the cloud. In some common cloud storage systems, cloud file might contain some sensitive information. Encrypting the whole shared file can realize the sensitive information hiding, but will make this shared file unable to be used by others. In this paper we propose a remote document reference id automatically convert to the QR code then just scan user module then download the particular document integrity that realizes data sharing with sensitive information hiding. Signatures are used to verify the file in the phase of integrity auditing. 1. INTRODUCTION: New businesses are recently conceived organizations which battle for presence. These elements are generally framed dependent on splendid thoughts and develop to succeed. These wonders are specified in the writing of administration, association, and business speculations. Notwithstanding, an unmistakable photo of these substances isn't accessible. This paper attempts to conceptualize the marvel, i.e. startup, and understand the difficulties they will confront. In the wake of exploring the existence cycle and the difficulties, the paper closes with some finishing up comments. This paper looks for a decent proportion of new business execution, and afterward clarifies this measure by different measurements of business procedure. WITH the touchy development of information, it is an overwhelming weight for clients to store the sheer measure of information locally. In this manner, an ever increasing number of associations and people would like to store their information in the cloud. Be that as it may, the information put away in the cloud may be adulterated or lost because of the unavoidable programming bugs, equipment issues and human mistakes in the cloud keeping in mind the end goal to check whether the information is put away effectively in the cloud, numerous remote information respectability examining plans have been proposed. In remote information honesty reviewing plans, the information proprietor right off the bat needs to produce marks for information obstructs before transferring them to the cloud. These marks are utilized to demonstrate the cloud really has these information hinders in the period of trustworthiness examining. And after that the information proprietor transfers these information hinders alongside their relating marks to the cloud. The information put away in the cloud is regularly shared over different clients in many distributed storage applications, for example, Google Drive, Dropbox and iCloud. Information sharing as a standout amongst the most basic highlights in distributed storage, permits various clients to impart their information to others. In any case, these mutual information put away in the cloud may contain some delicate data. For example, the Electronic Health Records (EHRs) put away what's more, partaken in the cloud for the most part contain company auditing ' touchy data (company name, phone number and ID number, and so on.) and the healing center's touchy data. 1.1 EXISTING SYSTEM The information from the audit. When associate auditor audits the accounts or inspects key monetary statements of an organization, the findings square measure typically place go into a report or compiled in a very systematic manner. The user prepared the document in manual. 1.2 PROPOSED SYSTEM In this paper we propose a remote document reference id automatically convert to the QR code then just scan user module then download the particular document integrity that realizes data sharing with sensitive information hiding.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4759 2 SYSTEM REQUIREMENTS 2.1 HARDWARE REQUIREMENTS PROCESSOR : Intel Core i3. RAM : 4 GB DDR2 RAM MONITOR : 15” COLOR HARD DISK : 100 GB 2.2SOFTWARE REQUIREMENTS Front End : ANDROID XML, JAVA Back End : MYSQL,PHP Operating System: Windows 07 3 MODULES & DISCRIPTIONS 3.1 LOGIN & REGISTRATION In this module we tend to style to develop login and signup screen. Android used xml to develop classical screens in our application. The modules describe signup page contains email id or user name, password and conform password those kind of details should be stored in database. Login screen contains email id or username and password when the user to login the app it should be retrieve the data to the database and combine based on user input if its match user name and password to allow in the app otherwise alert and show a message to the user. 3.2 DATABASE CREATION: User email id or user name and password have been stored after registration. Android used SQLite Database for storing and fetching user application details 3.3 QR CODE GENERATOR This module Used to Generate the Qr code for the User enter Key and additionally what kind of data like txt,image,etc. using php in website.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4760 3.4 SCANNAR In, Additionally One type of application name as (Qdroid) used in this project. Qdroid is used to Scan the anykind of User Qrcode.Initially, User1 generate the Qrcode After that Qrcode is sent to the User 2. Then User2 Scan the Qrcode and get the key. 3.5 FILE DOWNLOAD In this Module Explain that, After Getting the Key from User 2 then Enter the key in Download Process and Get the File from Server. 4 ARCHITECTURE- DIAGRAM SOFTWARE TESTING GENERAL Cloud computing could be a model for sanctioning present, convenient, on demand network access to a shared pool of configurable computing resources. Since associate degree put down Cloud could be a giant scale distributed and interconnected automatic data processing system, interactions among its sub parts (i.e., Clouds) and among stakeholders (i.e., customers and Cloud providers) is complicated. In an Inter Cloud, computing resources in hand and administered by totally different Cloud suppliers square measure pooled to serve multiple customers, and applications and knowledge square measure accessible to and shared by a broad cluster of cross enterprise and cross platform users. Put down Cloud resource pooling and sharing involve 1) combining resources through cooperation among Clouds, 2) mapping and scheduling shared resources through coordination, and 3) establishing contracts between Clouds and customers, and among Clouds through negotiation.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4761 DEVELOPING METHODOLOGIES The check method is initiated by developing a comprehensive arrange to check the final practicality and special options on a range of platform combos. Strict internal control procedures square measure used. The method verifies that the applying meets necessities laid out in the system requirements document and is bug free. The subsequent square measure the concerns won’t to develop the framework from developing the testing methodologies. UNIT TESTING Unit checking involves the planning of test cases that validate that the inner program logic is functioning properly, which program input manufacture valid outputs. All call branches and internal code flow ought to be valid. It’s the testing of individual code units of the applying .it is done once the completion of a personal unit before integration. This can be a structural testing, that depends on information of its construction and is invasive. Unit checks perform basic tests at part level and test a particular business method, application, and/or system configuration. Unit tests make sure that every distinctive path of a business method performs accurately to the documented specifications and contains clearly outlined inputs and expected results. FUNCTIONAL CHECK Useful tests give systematic demonstrations that functions tested square measure accessible as nominative by the business and technical needs, system documentation, and user manuals. Functional testing is focused on the subsequent items: Valid Input: known categories of valid input should be accepted. Invalid Input: known categories of invalid input should be rejected. Functions: known functions should be exercised. Output: known categories of application outputs should be exercised. Systems/Procedures: interfacing systems or procedures should be invoked. SYSTEM CHECK System testing ensures that the complete integrated code meets needs. It tests a configuration to make sure better-known and foreseeable results. Associate degree example of system checking is that the configuration familiarized system integration test. System testing relies on method descriptions and flows, accentuation pre-driven method links and integration points. PERFORMANCE CHECK The Performance check ensures that the output be made at intervals the points in time,and the time taken by the system for collection, giving response to the users and request being send to the system for to retrieve the results. INTEGRATION TESTING Code integration testing is that the progressive integration testing of 2 or a lot of integrated code parts on one platform to supply failures caused by interface defects. The task of the combination check is to visualize that parts or code applications, e.g. parts during a code or – one improve – code applications at the corporate level – move while not error. ACCEPTENCE TESTING User Acceptance Testing could be a crucial section of any project and needs important participation by the top user. It additionally ensures that the system meets the useful needs. Acceptance testing for knowledge Synchronization: The Acknowledgements are going to be received by the Sender Node once the Packets square measure received by the Destination Node The Route add operation is completed only if there's a Route request in want The standing of Nodes data is completed mechanically within the Cache Updation method BUILD THE TEST PLAN Any project is divided into units which will be any performed for careful process. Then a testing strategy for every of this unit is applied. Unit testing helps to identity the potential bugs within the individual part that the part that has bugs is known and may be corrected from errors.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4762 FUTURE ENHANCEMENT Our future enhancement for identify based secure distributed data storage are To allow user to transfer pdf files and stand out sheets. Future research will include advancement like uploading we picture Image, videos in encrypted format for user convenience. CONCLUSION Distributed data storage scheme provide the user with convenience to outsource the file to untrusted proxy servers. Identify based secure distributed data store scheme arte a special kinds of distributed data storage scheme. Where are user identified by the identity and can communicate without the need of verifying the public key certificated. REFERENCES [1] ISO/IEC 15420:2009. Information technology - Automatic identification and data capture techniques - EAN/UPC bar code symbologyspecification. 2009. [2] ISO/IEC 16022:2006. Information technology - Automatic identification and data capture techniques - Data Matrix bar code symbology specification. 2006. [3] ISO/IEC 18004:2000. Information technology - Automatic identification and data capture techniques - Bar code symbology - QR Code. 2000. [4] Z. Baharav and R. Kakarala. Visually significant QR codes: Image blending and statistical analysis. In Multimedia and Expo (ICME), 2013 IEEE International Conference on, pages 1–6. IEEE, 2013. [5] C. Baras and F. Cayre. 2D bar-codes for authentication: A security approach. In Signal Processing Conference (EUSIPCO), Proceedings of the 20th European, pages 1760–1766, 2012. [6] T. V. Bui, N. K. Vu, T. T.P. Nguyen, I. Echizen, and T. D. Nguyen.Robust message hiding for QR code. In Intelligent Information Hiding and Multimedia Signal Processing (IIH- MSP), 2014 Tenth International Conference on, pages 520– 523. IEEE, 2014.