Fast Phrase Search For Encrypted Cloud Storage
Fast Phrase Search For Encrypted Cloud Storage
Fast Phrase Search For Encrypted Cloud Storage
INTRODUCTION
1.1 INTRODUCTION
Boneh et al. [1] proposed one of the earliest works on keyword searching.
Their scheme uses public key encryption to allow keywords to be
searchable without revealing data content. Waters et al. [2] investigated the
problem for searching over encrypted audit logs. Many of the early works
focused on single keyword searches. Recently, researchers have proposed
solutions on conjunctive keyword search, which involves multiple
keywords [3], [4]. Other interesting problems, such as the ranking of search
results [5], [6], [7] and searching with keywords that might contain errors
[8], [9] termed fuzzy keyword search, have also been considered. The
ability to search for phrases was also recently investigated [10], [11], [12],
1
[13]. Some [14] have examined the security of the proposed solutions and,
where flaws were found, solutions were proposed [15].
2
Chapter 2
TECHNOLOGIES LEARNED
Java technology is used for programming language and a platform for both.
Simple
Architecture neutral
Object oriented
Portable
Distributed
High performance
Interpreted
Multithreaded
Robust
Dynamic
Secure
3
understanding happens every time the project is executed. The accompanying figure
outlines how this works.
You can consider Java byte codes as the machine code guidelines for the Java
Virtual Machine (Java VM). Each Java translator, whether it's an advancement device
or a web program that can run applets, is an execution of the Java VM. Java byte codes
make "compose once, run anyplace" conceivable. You can incorporate your project into
byte codes on any stage that has a Java compiler. The byte codes can then be keep
running on any execution of the Java VM. That implies that the length of a PC has a
Java VM, the same system written in the Java programming dialect can keep running
on a Solaris workstation, Windows 2000, or on an iMac.
4
2.1.3. The Java Platform
You’ve been acquainted with the Java VM. It's the base for the Java stage and is ported
onto different equipment based platforms.
The Java API is a huge collection of ready-made software components that offer many
useful abilities, such as graphical user interface (GUI) widgets. The Java API is
assembled into libraries of related classes and interfaces; these libraries are known as
packages.
The taking after figure delineates a system that is running on the Java platform. As the
figure demonstrates, the Java API and the virtual machine protect the system from the
hardware.
5
Native code is code that after you compile it, the compiled code runs on a particular
hardware platform. As a platform-free environment, the Java platform can be somewhat
slower than local code. Notwithstanding, brilliant compilers, all around tuned
translators, and in the nick of time byte code compilers can convey execution near that
of local code without debilitating portability.
The general common sorts of programs written in the Java programming dialect are
applets and applications. On the off chance that you've surfed the web, you're likely
effectively acquainted with applets. An applet is a system that holds fast to specific
traditions that permit it to keep running inside of a Java-empowered browser.However,
the Java programming language is not only to write adorable, enlivening applets for the
Ib. The broadly useful, abnormal state Java programming dialect is additionally an
intense software platform. Utilizing the liberal API, you can compose numerous sorts
of programs.
How can API support different kinds of programs? It does so with packages of
software components it gives a broad range of functionality. Every complete
implementation of the Java platform gives you the following features:
The essentials: Objects, threads, strings, numbers, input and output, system
properties, data structures, date and time, and so on.
6
Internationalization: Help for composing projects that can be limited for
clients around the world. Projects can naturally adjust to particular areas and be
shown in the suitable language.
Security: Both low level and high level, private and public key
management,access control, including electronic signatures, and certificates.
The Java platform contains Application programming interfaces (APIs) for 2D and
7
2.1.6. Java Technology Change My Life
It is not like promising that you get name, fortune, wealth, or even a job if you learn
the Java programming language. Even though, it is makes your program better and
requires less time and work than other languages. I trust that Java technology would
help you do the following:
Get started quickly: Even though the Java programming language is a strong
object-oriented language, it is easy to learn, especially for programmers who are
familiar with C or C++.
Write less code: Java programming language can be four times smaller than
the same program in C++.
Write better code: The Java programming language empowers great coding
practices, and its junk accumulation offers you some assistance with avoiding
memory spills. Its item introduction, its JavaBeans segment building design,
and its far reaching, effortlessly extendible API let you reuse other individuals'
tried code and present less bugs.
Develop programs more quickly: Your improvement time may be as much as
twice as quick versus composing the same system in C++. Why? You compose
less lines of code and it is an easier programming dialect than C++.
Avoid platform dependencies with 100% Pure Java: You can keep your
project compact by dodging the utilization of libraries written in different
languages. The 100% Pure Javas Product Certification Program has a vault of
chronicled procedure manuals, white papers, leaflets, and comparable materials
online.
Write once, run anywhere: Because 100% Pure Java programs are
assembled into machine-autonomous byte codes, they run reliably on any Java
platform.
Distribute software more easily: You can update applets effectively from a
8
2.1.7. ODBC
Through the ODBC Administrator in Control Panel, you can indicate the
specific database that is connected with an information source that an ODBC
application project is composed to utilize. Think about an ODBC information source as
an entryway with a name on it. Every entryway will lead you to a specific database. For
instance, the information source named Sales Figures may be a SQL Server database,
while the Accounts Payable information source could allude to an Access database. The
physical database alluded to by an information source can live anyplace on the LAN.
The ODBC system files are not introduced on your system by Windows 95.
Maybe, they are introduced when you setup a different database application, for
example, SQL Server Client or Visual Basic 4.0. At the point when the ODBC symbol
is introduced in Control Panel, it utilizes a document called ODBCINST.DLL. It is
likewise conceivable to direct your ODBC information sources through a stand-alone
program called ODBCADM.EXE. There is a 16-bit and a 32-bit adaptation of this
system and each keeps up a different rundown of ODBC information sources.
9
level ODBC drivers are expected to converse with the information source, (for example,
the interface to Oracle or SQL Server). The stacking of the ODBC drivers is
straightforward to the ODBC application program. In a customer/server environment,
the ODBC API even handles huge numbers of the system issues for the application
programmer.
The advantages of this plan are numerous to the point that you are most likely
thinking there must be some catch. The main drawback of ODBC is that it isn't as
productive as talking specifically to the local database interface. ODBC has had
numerous spoilers make the charge that it is too moderate. Microsoft has dependably
asserted that the basic component in execution is the nature of the driver programming
that is utilized. As I would see it, this is valid. The accessibility of good ODBC drivers
has enhanced an incredible arrangement as of late. What's more, at any rate, the
feedback about execution is to some degree practically equivalent to the individuals
who said that compilers would never coordinate the pace of unadulterated low level
computing construct. Possibly not, but rather the compiler (or ODBC) gives you the
chance to compose cleaner projects, which implies you every year.
2.1.8. JDBC
In an effort to set a free database standard API for Java; Sun Microsystems created Java
Database Connectivity, or JDBC. JDBC offers a bland SQL database access system
that gives a predictable interface to an assortment of RDBMSs. This predictable
interface is accomplished through the utilization of "module" database availability
modules, or drivers. In
the event that a database seller wishes to have JDBC bolster, he or she must
give the driver to every stage that the database and Java run on.
10
JDBC was proclaimed in March of 1996. It was released for a 90 day public
review that was ended June 8, 1996. Due to the user input, the final JDBC v1.0
specification was released soon after.
The rest of this segment will sufficiently cover data about JDBC for you to
recognize what it is about and how to utilize it viably. This is in no way, shape or form
a complete review of JDBC. That would fill a whole book.
The targets that Ire set for JDBC are critical. They will give you some
knowledge in the matter of why certain classes and functionalities act the way they do.
The eight outline objectives for JDBC are as follows:
SQL Conformance
SQL syntax shifts as you move from database seller to database merchant. With
an end goal to bolster a wide assortment of merchants, JDBC will permit any
question proclamation to be gone through it to the basic database driver. This
permits the network module to handle non-standard usefulness in a way that is
suitable for its users.
11
JDBC must be implemental on top of common database interfacesThe
JDBC SQL API must “sit” on top of other general SQL level APIs. This goal
permits JDBC to utilize existing ODBC level drivers by the utilization of a
software interface. This interface would translate JDBC calls to ODBC and
vice versa.
Provide a Java interface that is consistent with the rest of the Javasystem
because of Java’s acknowledgment in the client group so far, the architects
feel that they ought not stray from the present configuration of the core Java
system.
Keep it simple
This objective most likely up in all product outline objective postings. JDBC is
no special case. Sun felt that the outline of JDBC ought to be extremely basic,
taking into account one and only system for finishing an assignment for each
instrument. Permitting copy usefulness just serves to befuddle the clients of the
API.
Keep the common cases simpleBecause more often than not, the usual SQL
calls utilized by the programmer are simple INSERT’s, SELECT’s,
UPDATE’s and DELETE’s, these inquiries are easy to perform with JDBC.
On the otherhand, more perplexing SQL statements ought to additionally be
conceivable.
Java ha two things: a programming language and a platform. Java is a
high-level programming language that is all of the following
Simple
Object-oriented
Distributed
Interpreted
Dynamic
Secure
12
Architecture-neutral
Portable
High-performance
Multithreaded
Robust
Interpreter
JavaProgram
Compilers My Program
You can consider Java byte codes as the machine code instructions for the Java VM
(Java Virtual Machine). Each Java interpreter, whether it's a Java advancement
instrument or a web program that can run Java applets, is an execution of the Java VM.
The Java VM can likewise be actualized in hardware. Java byte codes make "compose
once, run anyplace" possible. You can accumulate your Java program into byte codes
on my stage that has a Java compiler. The byte codes can then be run any usage of the
13
Java Virtual Machine. For example, the same Java program can run Solaris, Windows
NT, and Macintosh.
IP datagram’s
14
separating huge datagram into littler ones for transmission and reassembling them at
the other end.
UDP
UDP is also connectionless and inconsistent. What it adds to IP is a checksum for the
substance of the datagram and port numbers. These are utilized to give a
customer/server model - see later.
TCP
TCP supplies logic to give a dependable association situated convention above IP. It
gives a virtual circuit that two procedures can use to impart.
Internet addresses
In request to utilize an administration, you must have the capacity to discover it. The
Internet utilizes a location plan for machines with the goal that they can be found. The
location is a 32 bit number which gives the IP address. This encodes a system ID and
additionally tending to. The system ID falls into different classes as per the span of the
system address.
Network address
Class A utilizes 8 bits for the system address with 24 bits left over for other tending to.
Class B utilizes 16 bit system tending to. Class C utilizes 24 bit system tending to and
class D employments all 32.
Subnet address
Internally, the UNIX system is separated into sub systems. Building 11 is right now
on one sub system and uses 10-bit tending to, permitting 1024 distinctive hosts.
Host address
8 bits are finally used for host addresses within our subnet. This places a limit of256
machines that can be on the subnet.
Port addresses
15
administration of the host that it is running on. This is not area straightforwardness!
Sure of these ports are "Ill known".
Sockets
#include <sys/types.h>
#include <sys/socket>
Here "family" will be AF_INET for IP communications, protocol will be zero, and type
will rely on upon whether TCP or UDP is utilized. Two procedures wishing to impart
over a system make an attachment each. These are like two finishes of a funnel - yet
the real pipe does not yet exist.
JFreeChart is a free 100% Java chart library that does it easy for developers to display
professional quality charts in their applications. JFreeChart's extensive feature set
includes:
A adaptable outline that is anything but difficult to develop, and targets both server-
side and customer side applications;
Support for including Swing components, many output types, image files (including
JPEG and PNG), and vector graphics file formats (including EPS, PD, and SVG);
JFreeChart is "open source" or, all the all the more especially, free programming. It is
passed on under the terms of the GNU Lesser General Public Licensee (LGPL), which
permits use in selective applications.
16
1. Map Visualizations
Charts showing values that identify with geological ranges. A few cases include: (a)
populace thickness in every condition of the United States, (b) salary per capita for
every nation in Europe, (c) future in every nation of the world. The tasks in this project
include:
Sourcing freely redistributable vector plots for the nations of the world, states/areas
specifically (USA in particular, but also other areas);
Creating a suitable dataset interface (in addition to default usage), a rendered, and
coordinating this with the existing XY Plot class in JFreeChart;
Implement another (to JFreeChart) highlight for intuitive time arrangement outlinesto
show a different control that demonstrates a little form of ALL the time arrangement
information, with a sliding "perspective" rectangle that permits you to choose the
subset of the time arrangement information to show in the main chart.
2. Dashboards
4. Property Editors
The property editor mechanism system in JFreeChart just handles a little subset of the
properties that can be set for graphs. Augment (or re implement) this component to give
more note worthy end-client control over the presence of the chart.
17
and briefly store data, collaborate with databases and web administrations, and render
content because of customer requests.
Because a large number of the errands included in web application advancement can be
tedious or require an overflow of standard code, web structures can be connected to
reduce the overhead connected with basic exercises. For instance, numerous structures,
for example, JavaServer Faces, give libraries to templating pages and session
administration, and regularly advance code reuse.
2.2.1 Java EE
18
2.2.3. Web Server and Client
Web Server is software that can handle the customer demand and send the reaction
back to the customer. For instance, Apache is a standout amongst the most generally
utilized web server. Web Server keeps running on some physical machine and listens
to customer request on specific port.
A web client is a software that assists in corresponding with the server. The
absolute most generally utilized web customers are Firefox, Google Chrome, Safari
and so forth. When I ask for something from server (through URL), web customer deals
with making a solicitation and sending it to server and after that parsing the server
reaction and present it to the user.
Web Server and net shopper square measure 2 totally different code merchandise,thus
there need to be some traditional language for communication. HTML is that the basic
language within the middle of server and shopper and stands for Hyper Text
terminology
2.3. MySQL:
MySQL, the popular Open Source SQL database management system, is
introduced, published, and supported by Oracle Corporation.
19
MySQL databases are social.
A social database stores information specifically tables instead of putting all the
information in one noteworthy storeroom. The database structures are sorted out into
physical records enhanced for rate. The predictable model, with articles, for instance,
databases, tables, points of view, lines, and portions, offers a versatile programming
environment. You set up guidelines speaking to the associations between particular
information fields, for instance, adjusted, one-to-various, intriguing, required or
optional, and "pointers" between assorted tables. The database maintains these
principles, so that with an inside and out laid out database, your application never sees
clashing, duplicate, vagrant, obsolete, or missing information.
Open Source implies that it is workable for anyone to use and modify the item.
Anybody can download the MySQL programming from the Internet and use it without
paying anything. If you wish, you may focus on the source code and change it to suit
your needs. The MySQL programming uses the GPL (GNU General Public License),
http://www.fsf.org/licenses/, to portray what you may and may not do with the item in
unmistakable circumstances. In case you feel uncomfortable with the GPL or need to
embed MySQL code into a business application, you can buy a mechanically approved
structure
20
from us. See the MySQL Licensing Overview for more information
(http://www.mysql.com/association/legal/allowing/).
The MySQL Database Server is quick, solid, adaptable, and simple to utilize.
In the event that that is the thing that you are searching for, you should give it a shot.
MySQL Server can run effortlessly on a desktop or convenient PC, near to your
distinctive applications, Web servers, and so on, requiring no thought. If you confer an
entire machine to MySQL, you can alter the settings to misuse all the memory, CPU
poIr, and I/O limit open. MySQL can in like manner scale up to bundles of machines,
sorted out together. You can find an execution relationship of MySQL Server with other
database chiefs on our benchmark page.
MySQL Server was at first made to handle generous databases much speedier
than existing courses of action and has been adequately used as a piece of exceedingly
asking for era circumstances for very much an extended period of time. Yet under
predictable headway, MySQL Server today offers a rich and profitable plan of limits.
Its system, rate, and security make MySQL Server significantly suited for getting to
databases on the Internet.
MySQL Server has a genuine arrangement of scenes created in close backing with our
clients. It is likely that your favored application or dialect bolsters the MySQL Database
Server.
21
The permitted approach to affirm "MySQL" is "My EssQue Ell" (not "my spin-
off"), then I wouldn't fret in the event that you say it as "my continuation" or in some
other restricted way.
including 150 words or less. In dynamic assaults permitting test inquiries to the
objective channel, 30 words will get half of blocked spam past.
The latest version of JDK is JDK sixu2 (Java(TM) SE Development Kit six Update
2), that's to boot referred to as Java SE six (Java traditional Edition 6). the following
unit the steps to transfer and install JDK 6u2 on native machine.
Click the transfer button next to "JDK 6u2". It will' show a innovative page
with a list of assorted transfer files of JDK 6u2.
C:\>program\java\jdk1.6.0_02\bin\java
22
Java Hot spot(TM) shopper VM (construct one.6.0_02-b06, both mode, sharing)
To place in MY SQL the file to transfer is “Windows thirty two bit and X86 Installer
MSI Essentials” is required.
On the downloaded My Structured query language double click and this will the
installation of My SQL.
Select "I accept terms inside the license agreement “and click on next.
Inside consequent window, select the "custom “icon to change the path of the
installation.
Next window looks, presently browse or navigate the folder
C:\server\mystructurequery language to place within the files in that folder.
Inside consequent window, once the modification press OK.
Press install in next window.
Select a customary pattern, and click on next.
To place within the My structure Query language service, click next.
It'd sort of a secret for MySQL information, please enter a secret, please bear in
mind the login name in most cases is root and thus the key user choosing, in my
case, and choose admin.
It will perform all the commands enter, thus click "run".
To setup My SQL graphical computer program, head to programs menu (My SQL)
click on "My SQL Administrator" login into information as local host - username
and secret head to "service control" and click on the tab "configure
23
Chapter 3
ANALYSIS &DEVELOPED
3.1 INTRODUCTION
After analysing the requirements of the task to be performed, the next step is to analyse
the problem and understand its context. The first activity in the phase is studying the
existing system and other is to understand the requirements and domain of the new
system. Both the activities are equally important, but the first activity serves as a basis
of giving the fundamental specifications and then successful design of the proposed
system. Understanding the properties and requirements of a new system is more
difficult and requires creative thinking and understanding of existing running system is
difficult, improper understanding of the present system can lead diversion from
solution.
The software requirements specification is produced at the end of the analysis task.
Software requirement is a difficult task, only decided after testing whether it fits the
requirements.
Operating System - Windows XP
Coding Language - Java/J2EE(JSP,Servlet)
Front End - J2EE
Back End - MySQL
24
3.2.3 Hardware Requirements
This is an IoT project so hardware plays an important role. Selection of hardware also
plays an important role in existence and performance of any software. The size and
capacity are main requirements.
Processor - Pentium –IV
RAM - 4 GB (min)
Hard Disk - 20 GB
Key Board - Standard Windows Keyboard
Mouse - Two or Three Button Mouse
Monitor - SVGA
The model that is being followed is the SOFTWARE DEVELOPMENT LIFE CYCLE
MODEL, which states that the phases are organised in order. First of all the feasibility
study is done. Once that part is completed, the requirement analysis and project
planning begins. If system existsonce, then modifications and addition of new modules
is needed, analysis of present system can be used as basic model.
The design starts after the requirement analysis is completed and the coding
begins after the design is completed. Once the programming is completed, the testing
is done. In this model the sequence of activities performed in a software development
project are
Project planning
Requirement definition
Design
Development
Integration and testing
Installation and acceptance
25
3.4 EXISTING SYSTEM
In the existing system, Ding et al. [3] extended Boneh et al.’s scheme using bilinear
mapping to perform multiple keyword search and described a solution that did not
include expensive pairing operations in the encryption and trapdoor generation phase.
Kerschbaum et al. [4] considered the search of unstructured text, where positions of
keywords are unknown. The use of encrypted index for keyword search was examined
in [22] and a scheme secure against chosen keyword attack was proposed. The ranking
of search results was looked at by Wang et al. in [17]. The authors described a solution
based on the commonly used TFIDF (Term Frequency x Inverse Document Frequency)
rule and the use of order preserving symmetric encryption.
Liu et al. [23] considered the search for potentially erroneous keywords termed fuzzy
keyword search. The index-based solution makes use of fuzzy dictionaries containing
various misspelling of keywords including wildcards.
3.5 DISADVANTAGES
There is less security on outsourced data due to lack of Modified phrase search scheme
against IR attacks.
In the proposed system, the system presents a phrase search scheme which achieves a
much faster response time than existing solutions. The scheme is also scalable, where
documents can easily be removed and added to the corpus. The system also describes
modifications to the scheme to lower storage cost at a small cost in response time and
to defend against cloud providers with statistical knowledge on stored data.
In the proposed system, the system also presents a phrase search technique based on
Bloom filters that is significantly faster than existing solutions, with similar or better
storage and communication cost. The proposed system technique uses a series of n-
gram filters to support the functionality.
26
The scheme exhibits a trade-off between storage and false positive rate, and is adaptable
to defend against inclusion-relation attacks. A design approach based on an
application’s target false positive rate is also described.
3.7 ADVANTAGES
The security is more on outsourced data due to Modified phrase search scheme
against IR attacks.
27
Chapter 4
DESIGN
4.1 INTRODUCTION
Software design sites at the technical kernel of the software engineering process and is
applied regardless of the development paradigm and the area of application. Design is
the first step in the development phase for any engineered product or system. The
designer’s goal is to produce a model or representation of an entity that will later be
built. Beginning, once system requirements have been specified and analysed, system
design is the first of the three technical activities – design, code and test that is required
to build and verify software.
The following are the three important tests that have been conceded out for
feasibility Study.
Technical Feasibility
Economic feasibility
Operational feasibility
28
4.2.1 TECHNICAL FEASIBILITY
In the technical feasibility study, one has to assess whether the implemented
system can be established using existing technology or not. It is intended to
implement the implemented system in JSP. The project enabled is theoretically
feasible since the following reasons.
As a portion of this, the expenses and profits related with the implemented
systems are to be associated. The project is carefully feasible only if tangible and
intangible assistances balance the cost. We can say the implemented system is
feasible founded on the following grounds.
This project is operationally feasible for there is necessary support from the
project organization and the users of the implemented system .Implemented system
absolutely does not damage and determination not create the corrupt results and no
problem will ascend after implementation of the system.
User-friendly
Customer will use the forms for their various transactions i.e. for adding new
routes, viewing the routes details. Also the Customer wants the reports to view the
various transactions based on the constraints. These forms and reports are generated as
user-friendly to the Client.
Reliability
Security
The web server and database server should be protected from hacking, virus etc.
29
Availability
Attacker
End User
Methods : attack the contents
METHODS: Req dec from cloud and
MEMBERS :
view res, Req sec key permission
Attacker name,file name,content. from,Search file ,Data owner and
view res, Download the file.
MEMBERS:
fig:4.3.1.CLASS diagrams
30
4.3.2 USE CASE DIAGRAMS
End user
Req dec from cloud and view res
31
4.3.3 SEQUANCE DIAGRAMS
32
4.4 MODULE DESIGN AND ORGANIZATION
MODULES
Data Owner
In this module, the data owner uploads their data in the cloud server. For the security
purpose the data owner encrypts the file and the index name and then store in the
cloud. The data encryptor can have capable deleting of a specific file. And also he
can view the transactions based on the files he uploaded to cloud and will do the
following operations like Register and Login Data owners,Req cloud to give enc
key permission and view res,Browse file, enc, Apply ABE and Upload, View all
Uploaded Files with digital sign, View your files and Update contents, View Your
files and Delete , View sec req and give permission.
.Data User
In this module, user logs in by using his/her user name and password. After Login
user requests search control to cloud and will Search for files based on the index
keyword with the Score of the searched file and downloads the file. User can view
the search of the files and also do some operations like Req dec from cloud and
view res,Req sec key permission from, Search file ,Data owner and view
res,Download the file.
Cloud Server
The cloud server manages a cloud to provide data storage service. Data owners
encrypt their data files and store them in the cloud for sharing with Remote User.
To access the shared data files, data consumers download encrypted data files of
their interest from the cloud and then decrypt them.
33
The cloud server authorizes the data owner and the data user and provides the search
requests sent from the users. Also in this module it shows personalized search model
and the interest search model. Can view all the file attackers and doing following
operations View data owners and authorize, View End users and authorize, View
enc key and authorize, View dec key and authorize, View uploaded files, View all
files and audit owner data and send log to corresponding owner, View all owner
and user transactions, View file attackers, View all file content attackers, Find File
rank results in chart, View Time Delay Results, View throughput Results.
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<style type="text/css">
<!--
.style3 {
34
font-size: 24px;
color: #FF0000;
font-weight: bold;
.style40 {color:#CC3333}
-->
</style>
</head>
<body>
<div class="main">
<div class="header">
<div class="header_resize">
<div class="logo">
</div>
<div class="menu">
<ul>
<li><a href="UserLogin.jsp"><span>User</span></a></li>
<li><a href="contact.html"><span></span></a></li>
35
</ul>
</div>
<div class="clr"></div>
</div>
s2=rs.getString(4);
s3=rs.getString(6);
s4=rs.getString(11);
s5=rs.getString(10);
<%out.println(i);%>
</span></div></td>
</a> </div></td>
<span class="style40">
36
<b><a
href="Social_UserProfile.jsp?uname=<%=s1%>&type=<%="Social_Authorize"%>&
id=<%=i%>"><%out.println(s1);%></a></b>
</span></div></td>
<span class="style22">
<%out.println(s2);%>
</span></div></td>
<span class="style22">
<%out.println(s3);%>
</span></div></td>
<%
if(s5.equalsIgnoreCase("waiting"))
%>
37
4.6 TESTING AND VALIDATION
The goal of testing is to acquire errors. Testing is that the technique of trying
to get each possible error or weakness in an extremely work product. It provides the
way to observe the practicality of parts, sub-assemblies, assemblies and or a finished
product it is the technique of effort code with the concentrating of guaranteeing that
the software meets its requirements and user hopes and does not fail in an undesirable
manner. There are numerous sorts of check. Every check sort reports a designated
testing demand.
Testing objectives:
38
4.6.1 Types of Testing
Functional Testing
Real tests give efficient protests that functions tested are attainable as specific by the
business and technical requirements, system documentation, and user manuals.
39
Invalid Input : known categories of invalid input should be rejected.
Unit testing:
A unit is the smallest piece of source code that can be tested. It is also known
as a module which consists of numerous lines of code that are processed by a single
programmer. The key purpose of performing unit testing is to expose that a particular
unit doesn’t satisfy the specified functional requirements and also to show that the
structural implementation is not like to the projected structure designed.
Integration testing:
Functional test
Functional tests give efficient challenges that capacities tried are accessible as
determined by the business and specialized necessities, framework documentation, and
client manuals Functional testing is centered on the following items:
40
Business procedure streams; information fields, predefined procedures, and
progressive procedures must be considered for testing. Before utilitarian testing is
finished, extra tests are distinguished and the powerful estimation of current tests is
resolved.
System Test
System testing guarantees that the entire coordinated programming framework meets
prerequisites. It tests a design to guarantee known and unsurprising results. A sample
of framework testing is the arrangement situated framework combination test.
Framework testing depends on procedure portrayals and streams, stressing pre-driven
procedure connections and mix focuses.
It is a testing in which the product analyzer has information of the internal workings,
structure and dialect of the product, or if nothing else its motivation. It is reason. It is
utilized to test ranges that can't be gotten a handle on from a discovery level.
It is the testing the product with no information of within workings, structure or dialect
of the part being tried. Discovery tests, as most different sorts of tests, must be
composed from a complete source report, for example, prerequisite or necessities
archive, for example, determination or necessities record. It is a trying in which the
product under test is dealt with, as a discovery .you can't "see" into it. The test gives
inputs and reacts to yields without considering how the product functions.
Unit Testing:
Unit testing is by and large appeared as a major aspect of a joined code and unit test
period of the product lifecycle, in spite of the fact that it is not exceptional for coding
and unit testing to be directed as two unmistakable stages.
Ground testing will be done physically and functional tests will be inscribed in detail.
41
Test objectives
The task of the integration test is to design those components or s/w applications, e.g.
modules in a software system or – one step up – software presentations at the company
level
Test Results: All the test cases stated above passed effectively. No defects met.
Acceptance Testing
User Acceptance Testing is a serious phase of any project and needs important
contribution by the end user. It also guarantees that the system encounters the functional
requirements.
42
Fig 7.10: Testcase Template
Test Results: All the test cases stated above passed effectively. No defects met.
43
CHAPTER 5
44
Fig 5.2 user details
45
Fig 5.3 data owners
46
Fig 5.4 file details
47
fig 5.5 uploaded results
48
8.1 CONCLUSION
In this paper, we presented a phrase search scheme based on Bloom filter that is
significantly faster than existing approaches, requiring only a single round of
communication and Bloom filter verifications. The solution addresses the high
computational cost noted in [13] by reformulating phrase search as n-gram verification
rather than a location search or a sequential chain verification. Unlike [10], [12],[13],
our schemes consider only the existence of a phrase, omitting any information of its
location. Unlike [11], our schemes do not require sequential verification, is
parallelizable and has a practical storage requirement. Our approach is also the first to
effectively allow phrase search to run independently without first performing a
conjunctive keyword search to identify candidate documents. The technique of
constructing a Bloom filter index introduced in section 4.2 enables fast verification of
Bloom filters in the same manner as indexing. According to our experiment, it also
achieves a lower storage cost than all existing solutions except [13], where a higher
computational cost was exchanged in favor of lower storage. While exhibiting similar
communication cost to leading existing solutions, the proposed solution can also be
adjusted to achieve maximum speed or high speed with a reasonable storage cost
depending on the application. An approach is also described to adapt the scheme to
defend against inclusion-relation attacks. Various issues on security and efficiency,
such as the effect of long phrases and precision rate, were also discussed to support our
design choices.
49
BIBILIOGRAPHY
[3] M. Ding, F. Gao, Z. Jin, and H. Zhang, “An efficient public key encryption with
conjunctive keyword search scheme based on pairings,” in IEEE International
Conference on Network Infrastructure and Digital Content, 2012, pp. 526–530.
[5] C. Hu and P. Liu, “Public key encryption with ranked multi keyword search,” in
International Conference on Intelligent Networking and Collaborative Systems, 2013,
pp. 109–113.
[6] Z. Fu, X. Sun, N. Linge, and L. Zhou, “Achieving effective cloud search services:
multi-keyword ranked search over encrypted cloud data supporting synonym query,”
IEEE Transactions on Consumer Electronics, vol. 60, pp. 164–172, 2014.
50