SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4758
ENABLING IDENTITY-BASED INTEGRITY AUDITING AND DATA SHARING WITH
SENSITIVE INFORMATION HIDING FOR SECURE CLOUD STORAGE
D. RAMAN1, J. SUJATHA2
1PG Scholar, Department of MCA, Arulmigu Meenakshi Amman College of Engineering, AnnaUniversity,
Vadamavandal (near Kanchipuram), India.
2Assistant Professor, Department of MCA, Arulmigu Meenakshi Amman College of Engineering, Anna University,
Vadamavandal (near Kanchipuram), India.
--------------------------------------------------------------------------***----------------------------------------------------------------------------
ABSTRACT - The main goal of our project is to design a mobile application to Auditing and Data Sharing through cloud storage
service, users can remotely store their data to the cloud and realize the data sharing with others. Remote data integrity
auditing is proposed to guarantee the integrity of the data stored in the cloud. In some common cloud storage systems, cloud
file might contain some sensitive information. Encrypting the whole shared file can realize the sensitive information hiding,
but will make this shared file unable to be used by others. In this paper we propose a remote document reference id
automatically convert to the QR code then just scan user module then download the particular document integrity that realizes
data sharing with sensitive information hiding. Signatures are used to verify the file in the phase of integrity auditing.
1. INTRODUCTION:
New businesses are recently conceived organizations
which battle for presence. These elements are generally
framed dependent on splendid thoughts and develop to
succeed. These wonders are specified in the writing of
administration, association, and business speculations.
Notwithstanding, an unmistakable photo of these
substances isn't accessible. This paper attempts to
conceptualize the marvel, i.e. startup, and understand the
difficulties they will confront. In the wake of exploring the
existence cycle and the difficulties, the paper closes with
some finishing up comments. This paper looks for a decent
proportion of new business execution, and afterward
clarifies this measure by different measurements of
business procedure. WITH the touchy development of
information, it is an overwhelming weight for clients to
store the sheer measure of information locally. In this
manner, an ever increasing number of associations and
people would like to store their information in the cloud.
Be that as it may, the information put away in the cloud
may be adulterated or lost because of the unavoidable
programming bugs, equipment issues and human mistakes
in the cloud keeping in mind the end goal to check whether
the information is put away effectively in the cloud,
numerous remote information respectability examining
plans have been proposed. In remote information honesty
reviewing plans, the information proprietor right off the
bat needs to produce marks for information obstructs
before transferring them to the cloud. These marks are
utilized to demonstrate the cloud really has these
information hinders in the period of trustworthiness
examining. And after that the information proprietor
transfers these information hinders alongside their
relating marks to the cloud. The information put away in
the cloud is regularly shared over different clients in many
distributed storage applications, for example, Google
Drive, Dropbox and iCloud. Information sharing as a
standout amongst the most basic highlights in distributed
storage, permits various clients to impart their
information to others. In any case, these mutual
information put away in the cloud may contain some
delicate data. For example, the Electronic Health Records
(EHRs) put away what's more, partaken in the cloud for
the most part contain company auditing ' touchy data
(company name, phone number and ID number, and so
on.) and the healing center's touchy data.
1.1 EXISTING SYSTEM
The information from the audit. When associate auditor
audits the accounts or inspects key monetary statements
of an organization, the findings square measure typically
place go into a report or compiled in a very systematic
manner.
The user prepared the document in manual.
1.2 PROPOSED SYSTEM
In this paper we propose a remote document reference id
automatically convert to the QR code then just scan user
module then download the particular document integrity
that realizes data sharing with sensitive information
hiding.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4759
2 SYSTEM REQUIREMENTS
2.1 HARDWARE REQUIREMENTS
PROCESSOR : Intel Core i3.
RAM : 4 GB DDR2 RAM
MONITOR : 15” COLOR
HARD DISK : 100 GB
2.2SOFTWARE REQUIREMENTS
Front End : ANDROID XML, JAVA
Back End : MYSQL,PHP
Operating System: Windows 07
3 MODULES & DISCRIPTIONS
3.1 LOGIN & REGISTRATION
In this module we tend to style to develop login and signup
screen. Android used xml to develop classical screens in
our application. The modules describe signup page
contains email id or user name, password and conform
password those kind of details should be stored in
database. Login screen contains email id or username and
password when the user to login the app it should be
retrieve the data to the database and combine based on
user input if its match user name and password to allow in
the app otherwise alert and show a message to the user.
3.2 DATABASE CREATION:
User email id or user name and password have been
stored after registration. Android used SQLite Database for
storing and fetching user application details
3.3 QR CODE GENERATOR
This module Used to Generate the Qr code for the User
enter Key and additionally what kind of data like
txt,image,etc. using php in website.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4760
3.4 SCANNAR
In, Additionally One type of application name as (Qdroid)
used in this project.
Qdroid is used to Scan the anykind of User Qrcode.Initially,
User1 generate the Qrcode After that Qrcode is sent to the
User 2. Then User2 Scan the Qrcode and get the key.
3.5 FILE DOWNLOAD
In this Module Explain that, After Getting the Key from
User 2 then Enter the key in Download Process and Get the
File from Server.
4 ARCHITECTURE- DIAGRAM
SOFTWARE TESTING
GENERAL
Cloud computing could be a model for sanctioning present,
convenient, on demand network access to a shared pool of
configurable computing resources. Since associate degree
put down Cloud could be a giant scale distributed and
interconnected automatic data processing system,
interactions among its sub parts (i.e., Clouds) and among
stakeholders (i.e., customers and Cloud providers) is
complicated. In an Inter Cloud, computing resources in
hand and administered by totally different Cloud suppliers
square measure pooled to serve multiple customers, and
applications and knowledge square measure accessible to
and shared by a broad cluster of cross enterprise and cross
platform users. Put down Cloud resource pooling and
sharing involve 1) combining resources through
cooperation among Clouds, 2) mapping and scheduling
shared resources through coordination, and 3)
establishing contracts between Clouds and customers, and
among Clouds through negotiation.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4761
DEVELOPING METHODOLOGIES
The check method is initiated by developing a
comprehensive arrange to check the final practicality and
special options on a range of platform combos. Strict
internal control procedures square measure used.
The method verifies that the applying meets necessities
laid out in the system requirements document and is bug
free. The subsequent square measure the concerns won’t
to develop the framework from developing the testing
methodologies.
UNIT TESTING
Unit checking involves the planning of test cases
that validate that the inner program logic is functioning
properly, which program input manufacture valid outputs.
All call branches and internal code flow ought to be valid.
It’s the testing of individual code units of the applying .it is
done once the completion of a personal unit before
integration. This can be a structural testing, that depends
on information of its construction and is invasive. Unit
checks perform basic tests at part level and test a
particular business method, application, and/or system
configuration. Unit tests make sure that every distinctive
path of a business method performs accurately to the
documented specifications and contains clearly outlined
inputs and expected results.
FUNCTIONAL CHECK
Useful tests give systematic demonstrations that functions
tested square measure accessible as nominative by the
business and technical needs, system documentation, and
user manuals.
Functional testing is focused on the subsequent items:
Valid Input: known categories of valid input should be
accepted.
Invalid Input: known categories of invalid input should be
rejected.
Functions: known functions should be exercised.
Output: known categories of application outputs should be
exercised.
Systems/Procedures: interfacing systems or procedures
should be invoked.
SYSTEM CHECK
System testing ensures that the complete
integrated code meets needs. It tests a configuration to
make sure better-known and foreseeable results. Associate
degree example of system checking is that the
configuration familiarized system integration test. System
testing relies on method descriptions and flows,
accentuation pre-driven method links and integration
points.
PERFORMANCE CHECK
The Performance check ensures that the output be
made at intervals the points in time,and the time taken by
the system for collection, giving response to the users and
request being send to the system for to retrieve the results.
INTEGRATION TESTING
Code integration testing is that the progressive integration
testing of 2 or a lot of integrated code parts on one
platform to supply failures caused by interface defects.
The task of the combination check is to visualize that parts
or code applications, e.g. parts during a code or – one
improve – code applications at the corporate level – move
while not error.
ACCEPTENCE TESTING
User Acceptance Testing could be a crucial section of any
project and needs important participation by the top user.
It additionally ensures that the system meets the useful
needs.
Acceptance testing for knowledge Synchronization:
The Acknowledgements are going to be received
by the Sender Node once the Packets square measure
received by the Destination Node
The Route add operation is completed only if
there's a Route request in want
The standing of Nodes data is completed
mechanically within the Cache Updation method
BUILD THE TEST PLAN
Any project is divided into units which will be any
performed for careful process. Then a testing strategy for
every of this unit is applied. Unit testing helps to identity
the potential bugs within the individual part that the part
that has bugs is known and may be corrected from errors.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4762
FUTURE ENHANCEMENT
Our future enhancement for identify based secure
distributed data storage are
To allow user to transfer pdf files and stand out sheets.
Future research will include advancement like uploading
we picture
Image, videos in encrypted format for user convenience.
CONCLUSION
Distributed data storage scheme provide the user with
convenience to outsource the file to untrusted proxy
servers.
Identify based secure distributed data store scheme arte a
special kinds of distributed data storage scheme.
Where are user identified by the identity and can
communicate without the need of verifying the public key
certificated.
REFERENCES
[1] ISO/IEC 15420:2009. Information technology -
Automatic identification and data capture techniques -
EAN/UPC bar code symbologyspecification. 2009.
[2] ISO/IEC 16022:2006. Information technology -
Automatic identification and data capture techniques -
Data Matrix bar code symbology specification. 2006.
[3] ISO/IEC 18004:2000. Information technology -
Automatic identification and data capture techniques - Bar
code symbology - QR Code. 2000.
[4] Z. Baharav and R. Kakarala. Visually significant QR
codes: Image blending and statistical analysis. In
Multimedia and Expo (ICME), 2013 IEEE International
Conference on, pages 1–6. IEEE, 2013.
[5] C. Baras and F. Cayre. 2D bar-codes for authentication:
A security approach. In Signal Processing Conference
(EUSIPCO), Proceedings of the 20th European, pages
1760–1766, 2012.
[6] T. V. Bui, N. K. Vu, T. T.P. Nguyen, I. Echizen, and T. D.
Nguyen.Robust message hiding for QR code. In Intelligent
Information Hiding and Multimedia Signal Processing (IIH-
MSP), 2014 Tenth International Conference on, pages 520–
523. IEEE, 2014.

More Related Content

What's hot (20)

PPTX
Windows Server 2012 R2 Jump Start - AIP
Paulo Freitas
 
PDF
Abstraction and Automation: A Software Design Approach for Developing Secure ...
iosrjce
 
PDF
Narrative of digital signature technology and moving forward
Conference Papers
 
PDF
Electronic form srs
Bek5042
 
DOCX
Phase 1 Documentation (Added System Req)
Reinier Eiman
 
PDF
IRJET- Plug-In based System for Data Visualization
IRJET Journal
 
PDF
Developing Web-Based Project Management Application for Event Organizer ABC
Editor IJCATR
 
PDF
Enhancing security features in cloud computing for healthcare using cipher an...
eSAT Publishing House
 
PDF
Enhancing security features in cloud computing for healthcare using cipher an...
eSAT Journals
 
PDF
IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...
IRJET Journal
 
PDF
Blockchain secure biometric access systems (bsbas)
Conference Papers
 
DOCX
Software Requirements Specification Final
jangjong
 
PDF
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET Journal
 
PDF
Aspect-Oriented Instrumentation for Capturing Task- Based Event Traces
IDES Editor
 
PDF
IRJET- Contest Information Desk Android Application
IRJET Journal
 
DOC
Naveen Kumar Bokku
Naveen Bokku
 
PDF
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
ijccsa
 
DOC
Internet mail system java project
Tutorial Learners
 
PDF
Break Loose Acting To Forestall Emulation Blast
IRJET Journal
 
PDF
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET Journal
 
Windows Server 2012 R2 Jump Start - AIP
Paulo Freitas
 
Abstraction and Automation: A Software Design Approach for Developing Secure ...
iosrjce
 
Narrative of digital signature technology and moving forward
Conference Papers
 
Electronic form srs
Bek5042
 
Phase 1 Documentation (Added System Req)
Reinier Eiman
 
IRJET- Plug-In based System for Data Visualization
IRJET Journal
 
Developing Web-Based Project Management Application for Event Organizer ABC
Editor IJCATR
 
Enhancing security features in cloud computing for healthcare using cipher an...
eSAT Publishing House
 
Enhancing security features in cloud computing for healthcare using cipher an...
eSAT Journals
 
IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...
IRJET Journal
 
Blockchain secure biometric access systems (bsbas)
Conference Papers
 
Software Requirements Specification Final
jangjong
 
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET Journal
 
Aspect-Oriented Instrumentation for Capturing Task- Based Event Traces
IDES Editor
 
IRJET- Contest Information Desk Android Application
IRJET Journal
 
Naveen Kumar Bokku
Naveen Bokku
 
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
ijccsa
 
Internet mail system java project
Tutorial Learners
 
Break Loose Acting To Forestall Emulation Blast
IRJET Journal
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET Journal
 

Similar to IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensitive Information Hiding for Secure Cloud Storage (20)

PDF
IRJET- Authendication Permission Granting Algorithm for Transaction of Sensit...
IRJET Journal
 
PDF
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET Journal
 
PDF
IRJET- Sensitive Data Sharing using QRCODE
IRJET Journal
 
PDF
Cloud Computing Conf 1209
mandeepdhami
 
PPTX
FAST PHRASE SEARCH FOR ENCRYPTED CLOUD STORAGE.pptx
gattamanenitejeswar
 
PDF
publishable paper
chaitanya451336
 
PDF
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
IRJET Journal
 
PPTX
Android based Attendance and examination automation
Ritika Mahajan
 
PDF
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET Journal
 
PDF
Cloud Storage Auditing Protocol with Verifiable Outsourcing of Key Updates
IRJET Journal
 
PDF
Cloud Testing Research
KRISHNA MARAMGANTI
 
PPTX
basha 1.pptx fsdbjn'ksfdipsdknd hvlflyifkjvkufuikf.uk
sammsameer342
 
PDF
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...
ijtsrd
 
PPTX
Cloud Computing : Security and Forensics
Govind Maheswaran
 
PDF
489 493
Editor IJARCET
 
PDF
IRJET- Sharing Session Key to Protect Data in Cloud Storage
IRJET Journal
 
PDF
How Should I Prepare Your Enterprise For The Increased...
Claudia Brown
 
PDF
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET Journal
 
PDF
It auditing to assure a secure cloud computing
ingenioustech
 
PDF
Ensuring Distributed Accountability in the Cloud
Suraj Mehta
 
IRJET- Authendication Permission Granting Algorithm for Transaction of Sensit...
IRJET Journal
 
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET Journal
 
IRJET- Sensitive Data Sharing using QRCODE
IRJET Journal
 
Cloud Computing Conf 1209
mandeepdhami
 
FAST PHRASE SEARCH FOR ENCRYPTED CLOUD STORAGE.pptx
gattamanenitejeswar
 
publishable paper
chaitanya451336
 
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
IRJET Journal
 
Android based Attendance and examination automation
Ritika Mahajan
 
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET Journal
 
Cloud Storage Auditing Protocol with Verifiable Outsourcing of Key Updates
IRJET Journal
 
Cloud Testing Research
KRISHNA MARAMGANTI
 
basha 1.pptx fsdbjn'ksfdipsdknd hvlflyifkjvkufuikf.uk
sammsameer342
 
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...
ijtsrd
 
Cloud Computing : Security and Forensics
Govind Maheswaran
 
IRJET- Sharing Session Key to Protect Data in Cloud Storage
IRJET Journal
 
How Should I Prepare Your Enterprise For The Increased...
Claudia Brown
 
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET Journal
 
It auditing to assure a secure cloud computing
ingenioustech
 
Ensuring Distributed Accountability in the Cloud
Suraj Mehta
 
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
IRJET Journal
 
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
IRJET Journal
 
PDF
Kiona – A Smart Society Automation Project
IRJET Journal
 
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
IRJET Journal
 
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
IRJET Journal
 
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
IRJET Journal
 
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
IRJET Journal
 
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
IRJET Journal
 
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
IRJET Journal
 
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
IRJET Journal
 
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
IRJET Journal
 
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
IRJET Journal
 
PDF
Breast Cancer Detection using Computer Vision
IRJET Journal
 
PDF
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
PDF
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
IRJET Journal
 
PDF
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
PDF
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
IRJET Journal
 
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
IRJET Journal
 
Kiona – A Smart Society Automation Project
IRJET Journal
 
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
IRJET Journal
 
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
IRJET Journal
 
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
IRJET Journal
 
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
IRJET Journal
 
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
IRJET Journal
 
BRAIN TUMOUR DETECTION AND CLASSIFICATION
IRJET Journal
 
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
IRJET Journal
 
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
IRJET Journal
 
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
IRJET Journal
 
Breast Cancer Detection using Computer Vision
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
Ad

Recently uploaded (20)

PDF
smart lot access control system with eye
rasabzahra
 
PDF
Zilliz Cloud Demo for performance and scale
Zilliz
 
PPTX
fatigue in aircraft structures-221113192308-0ad6dc8c.pptx
aviatecofficial
 
PPTX
Presentation 2.pptx AI-powered home security systems Secure-by-design IoT fr...
SoundaryaBC2
 
DOCX
8th International Conference on Electrical Engineering (ELEN 2025)
elelijjournal653
 
DOCX
CS-802 (A) BDH Lab manual IPS Academy Indore
thegodhimself05
 
PPTX
Introduction to Design of Machine Elements
PradeepKumarS27
 
PPTX
美国电子版毕业证南卡罗莱纳大学上州分校水印成绩单USC学费发票定做学位证书编号怎么查
Taqyea
 
PPTX
Arduino Based Gas Leakage Detector Project
CircuitDigest
 
PDF
AI TECHNIQUES FOR IDENTIFYING ALTERATIONS IN THE HUMAN GUT MICROBIOME IN MULT...
vidyalalltv1
 
PPT
PPT2_Metal formingMECHANICALENGINEEIRNG .ppt
Praveen Kumar
 
PPTX
Mechanical Design of shell and tube heat exchangers as per ASME Sec VIII Divi...
shahveer210504
 
DOC
MRRS Strength and Durability of Concrete
CivilMythili
 
PPTX
VITEEE 2026 Exam Details , Important Dates
SonaliSingh127098
 
PPTX
Damage of stability of a ship and how its change .pptx
ehamadulhaque
 
PPTX
265587293-NFPA 101 Life safety code-PPT-1.pptx
chandermwason
 
PDF
Viol_Alessandro_Presentazione_prelaurea.pdf
dsecqyvhbowrzxshhf
 
PDF
Reasons for the succes of MENARD PRESSUREMETER.pdf
majdiamz
 
PPTX
MATLAB : Introduction , Features , Display Windows, Syntax, Operators, Graph...
Amity University, Patna
 
PDF
MAD Unit - 1 Introduction of Android IT Department
JappanMavani
 
smart lot access control system with eye
rasabzahra
 
Zilliz Cloud Demo for performance and scale
Zilliz
 
fatigue in aircraft structures-221113192308-0ad6dc8c.pptx
aviatecofficial
 
Presentation 2.pptx AI-powered home security systems Secure-by-design IoT fr...
SoundaryaBC2
 
8th International Conference on Electrical Engineering (ELEN 2025)
elelijjournal653
 
CS-802 (A) BDH Lab manual IPS Academy Indore
thegodhimself05
 
Introduction to Design of Machine Elements
PradeepKumarS27
 
美国电子版毕业证南卡罗莱纳大学上州分校水印成绩单USC学费发票定做学位证书编号怎么查
Taqyea
 
Arduino Based Gas Leakage Detector Project
CircuitDigest
 
AI TECHNIQUES FOR IDENTIFYING ALTERATIONS IN THE HUMAN GUT MICROBIOME IN MULT...
vidyalalltv1
 
PPT2_Metal formingMECHANICALENGINEEIRNG .ppt
Praveen Kumar
 
Mechanical Design of shell and tube heat exchangers as per ASME Sec VIII Divi...
shahveer210504
 
MRRS Strength and Durability of Concrete
CivilMythili
 
VITEEE 2026 Exam Details , Important Dates
SonaliSingh127098
 
Damage of stability of a ship and how its change .pptx
ehamadulhaque
 
265587293-NFPA 101 Life safety code-PPT-1.pptx
chandermwason
 
Viol_Alessandro_Presentazione_prelaurea.pdf
dsecqyvhbowrzxshhf
 
Reasons for the succes of MENARD PRESSUREMETER.pdf
majdiamz
 
MATLAB : Introduction , Features , Display Windows, Syntax, Operators, Graph...
Amity University, Patna
 
MAD Unit - 1 Introduction of Android IT Department
JappanMavani
 

IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensitive Information Hiding for Secure Cloud Storage

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4758 ENABLING IDENTITY-BASED INTEGRITY AUDITING AND DATA SHARING WITH SENSITIVE INFORMATION HIDING FOR SECURE CLOUD STORAGE D. RAMAN1, J. SUJATHA2 1PG Scholar, Department of MCA, Arulmigu Meenakshi Amman College of Engineering, AnnaUniversity, Vadamavandal (near Kanchipuram), India. 2Assistant Professor, Department of MCA, Arulmigu Meenakshi Amman College of Engineering, Anna University, Vadamavandal (near Kanchipuram), India. --------------------------------------------------------------------------***---------------------------------------------------------------------------- ABSTRACT - The main goal of our project is to design a mobile application to Auditing and Data Sharing through cloud storage service, users can remotely store their data to the cloud and realize the data sharing with others. Remote data integrity auditing is proposed to guarantee the integrity of the data stored in the cloud. In some common cloud storage systems, cloud file might contain some sensitive information. Encrypting the whole shared file can realize the sensitive information hiding, but will make this shared file unable to be used by others. In this paper we propose a remote document reference id automatically convert to the QR code then just scan user module then download the particular document integrity that realizes data sharing with sensitive information hiding. Signatures are used to verify the file in the phase of integrity auditing. 1. INTRODUCTION: New businesses are recently conceived organizations which battle for presence. These elements are generally framed dependent on splendid thoughts and develop to succeed. These wonders are specified in the writing of administration, association, and business speculations. Notwithstanding, an unmistakable photo of these substances isn't accessible. This paper attempts to conceptualize the marvel, i.e. startup, and understand the difficulties they will confront. In the wake of exploring the existence cycle and the difficulties, the paper closes with some finishing up comments. This paper looks for a decent proportion of new business execution, and afterward clarifies this measure by different measurements of business procedure. WITH the touchy development of information, it is an overwhelming weight for clients to store the sheer measure of information locally. In this manner, an ever increasing number of associations and people would like to store their information in the cloud. Be that as it may, the information put away in the cloud may be adulterated or lost because of the unavoidable programming bugs, equipment issues and human mistakes in the cloud keeping in mind the end goal to check whether the information is put away effectively in the cloud, numerous remote information respectability examining plans have been proposed. In remote information honesty reviewing plans, the information proprietor right off the bat needs to produce marks for information obstructs before transferring them to the cloud. These marks are utilized to demonstrate the cloud really has these information hinders in the period of trustworthiness examining. And after that the information proprietor transfers these information hinders alongside their relating marks to the cloud. The information put away in the cloud is regularly shared over different clients in many distributed storage applications, for example, Google Drive, Dropbox and iCloud. Information sharing as a standout amongst the most basic highlights in distributed storage, permits various clients to impart their information to others. In any case, these mutual information put away in the cloud may contain some delicate data. For example, the Electronic Health Records (EHRs) put away what's more, partaken in the cloud for the most part contain company auditing ' touchy data (company name, phone number and ID number, and so on.) and the healing center's touchy data. 1.1 EXISTING SYSTEM The information from the audit. When associate auditor audits the accounts or inspects key monetary statements of an organization, the findings square measure typically place go into a report or compiled in a very systematic manner. The user prepared the document in manual. 1.2 PROPOSED SYSTEM In this paper we propose a remote document reference id automatically convert to the QR code then just scan user module then download the particular document integrity that realizes data sharing with sensitive information hiding.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4759 2 SYSTEM REQUIREMENTS 2.1 HARDWARE REQUIREMENTS PROCESSOR : Intel Core i3. RAM : 4 GB DDR2 RAM MONITOR : 15” COLOR HARD DISK : 100 GB 2.2SOFTWARE REQUIREMENTS Front End : ANDROID XML, JAVA Back End : MYSQL,PHP Operating System: Windows 07 3 MODULES & DISCRIPTIONS 3.1 LOGIN & REGISTRATION In this module we tend to style to develop login and signup screen. Android used xml to develop classical screens in our application. The modules describe signup page contains email id or user name, password and conform password those kind of details should be stored in database. Login screen contains email id or username and password when the user to login the app it should be retrieve the data to the database and combine based on user input if its match user name and password to allow in the app otherwise alert and show a message to the user. 3.2 DATABASE CREATION: User email id or user name and password have been stored after registration. Android used SQLite Database for storing and fetching user application details 3.3 QR CODE GENERATOR This module Used to Generate the Qr code for the User enter Key and additionally what kind of data like txt,image,etc. using php in website.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4760 3.4 SCANNAR In, Additionally One type of application name as (Qdroid) used in this project. Qdroid is used to Scan the anykind of User Qrcode.Initially, User1 generate the Qrcode After that Qrcode is sent to the User 2. Then User2 Scan the Qrcode and get the key. 3.5 FILE DOWNLOAD In this Module Explain that, After Getting the Key from User 2 then Enter the key in Download Process and Get the File from Server. 4 ARCHITECTURE- DIAGRAM SOFTWARE TESTING GENERAL Cloud computing could be a model for sanctioning present, convenient, on demand network access to a shared pool of configurable computing resources. Since associate degree put down Cloud could be a giant scale distributed and interconnected automatic data processing system, interactions among its sub parts (i.e., Clouds) and among stakeholders (i.e., customers and Cloud providers) is complicated. In an Inter Cloud, computing resources in hand and administered by totally different Cloud suppliers square measure pooled to serve multiple customers, and applications and knowledge square measure accessible to and shared by a broad cluster of cross enterprise and cross platform users. Put down Cloud resource pooling and sharing involve 1) combining resources through cooperation among Clouds, 2) mapping and scheduling shared resources through coordination, and 3) establishing contracts between Clouds and customers, and among Clouds through negotiation.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4761 DEVELOPING METHODOLOGIES The check method is initiated by developing a comprehensive arrange to check the final practicality and special options on a range of platform combos. Strict internal control procedures square measure used. The method verifies that the applying meets necessities laid out in the system requirements document and is bug free. The subsequent square measure the concerns won’t to develop the framework from developing the testing methodologies. UNIT TESTING Unit checking involves the planning of test cases that validate that the inner program logic is functioning properly, which program input manufacture valid outputs. All call branches and internal code flow ought to be valid. It’s the testing of individual code units of the applying .it is done once the completion of a personal unit before integration. This can be a structural testing, that depends on information of its construction and is invasive. Unit checks perform basic tests at part level and test a particular business method, application, and/or system configuration. Unit tests make sure that every distinctive path of a business method performs accurately to the documented specifications and contains clearly outlined inputs and expected results. FUNCTIONAL CHECK Useful tests give systematic demonstrations that functions tested square measure accessible as nominative by the business and technical needs, system documentation, and user manuals. Functional testing is focused on the subsequent items: Valid Input: known categories of valid input should be accepted. Invalid Input: known categories of invalid input should be rejected. Functions: known functions should be exercised. Output: known categories of application outputs should be exercised. Systems/Procedures: interfacing systems or procedures should be invoked. SYSTEM CHECK System testing ensures that the complete integrated code meets needs. It tests a configuration to make sure better-known and foreseeable results. Associate degree example of system checking is that the configuration familiarized system integration test. System testing relies on method descriptions and flows, accentuation pre-driven method links and integration points. PERFORMANCE CHECK The Performance check ensures that the output be made at intervals the points in time,and the time taken by the system for collection, giving response to the users and request being send to the system for to retrieve the results. INTEGRATION TESTING Code integration testing is that the progressive integration testing of 2 or a lot of integrated code parts on one platform to supply failures caused by interface defects. The task of the combination check is to visualize that parts or code applications, e.g. parts during a code or – one improve – code applications at the corporate level – move while not error. ACCEPTENCE TESTING User Acceptance Testing could be a crucial section of any project and needs important participation by the top user. It additionally ensures that the system meets the useful needs. Acceptance testing for knowledge Synchronization: The Acknowledgements are going to be received by the Sender Node once the Packets square measure received by the Destination Node The Route add operation is completed only if there's a Route request in want The standing of Nodes data is completed mechanically within the Cache Updation method BUILD THE TEST PLAN Any project is divided into units which will be any performed for careful process. Then a testing strategy for every of this unit is applied. Unit testing helps to identity the potential bugs within the individual part that the part that has bugs is known and may be corrected from errors.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4762 FUTURE ENHANCEMENT Our future enhancement for identify based secure distributed data storage are To allow user to transfer pdf files and stand out sheets. Future research will include advancement like uploading we picture Image, videos in encrypted format for user convenience. CONCLUSION Distributed data storage scheme provide the user with convenience to outsource the file to untrusted proxy servers. Identify based secure distributed data store scheme arte a special kinds of distributed data storage scheme. Where are user identified by the identity and can communicate without the need of verifying the public key certificated. REFERENCES [1] ISO/IEC 15420:2009. Information technology - Automatic identification and data capture techniques - EAN/UPC bar code symbologyspecification. 2009. [2] ISO/IEC 16022:2006. Information technology - Automatic identification and data capture techniques - Data Matrix bar code symbology specification. 2006. [3] ISO/IEC 18004:2000. Information technology - Automatic identification and data capture techniques - Bar code symbology - QR Code. 2000. [4] Z. Baharav and R. Kakarala. Visually significant QR codes: Image blending and statistical analysis. In Multimedia and Expo (ICME), 2013 IEEE International Conference on, pages 1–6. IEEE, 2013. [5] C. Baras and F. Cayre. 2D bar-codes for authentication: A security approach. In Signal Processing Conference (EUSIPCO), Proceedings of the 20th European, pages 1760–1766, 2012. [6] T. V. Bui, N. K. Vu, T. T.P. Nguyen, I. Echizen, and T. D. Nguyen.Robust message hiding for QR code. In Intelligent Information Hiding and Multimedia Signal Processing (IIH- MSP), 2014 Tenth International Conference on, pages 520– 523. IEEE, 2014.