Harini S
Harini S
Abstract
Cloud-based data storage service has drawn increasing interests from both academic
and industry in the recent years due to its efficient and low cost management. Since it
provides services in an open network, it is urgent for service providers to make use of secure
data storage and sharing mechanism to ensure data confidentiality and service user privacy.
To protect sensitive data from being compromised, the most widely used method is
encryption. However, simply encrypting data (e.g., via AES) cannot fully address the
practical need of data management. Besides, an effective access control over download
request also needs to be considered so that Economic Denial of Sustainability (EDoS) attacks
cannot be launched to hinder users from enjoying service. In this paper, we consider the dual
access control, in the context of cloud-based storage, in the sense that we design a control
mechanism over both data access and download request without loss of security and
efficiency. Two dual access control systems are designed in this paper, where each of them is
for a distinct designed setting. The security and experimental analysis for the systems are also
presented.
CHAPTER-1
INTRODUCTION
INTRODUCTION
In the recent decades, cloud-based storage service has attracted considerable attention
from both academia and industries. It may be widely used in many Internet-based commercial
applications (e.g., Apple iCould) due to its long-list benefits including access flexibility and
free of local data management. Increasing number of individuals and companies nowadays
prefer to outsource their data to remote cloud in such a way that they may reduce the cost of
upgrading their local data management facilities/devices. However, the worry of security
breach over outsourced data may be one of the main obstacles hindering Internet users from
widely using cloud-based storage service.
In many practical applications, outsourced data may need to be further shared with
others. For example, a Dropbox user Alice may share photos with her friends. Without using
data encryption, prior to sharing the photos, Alice needs to generate a sharing link and further
share the link with friends. Although guaranteeing some level of access control over
unauthorized users (e.g., those are not Alice’s friends), the sharing link may be visible within
the Dropbox administration level (e.g., administrator could reach the link). Since the cloud
(which is deployed in an open network) is not be fully trusted, it is generally recommended to
encrypt the data prior to being uploaded to the cloud to ensure data security and privacy. One
of the corresponding solutions is to directly employ an encryption technique (e.g., AES) on
the outsourced data before uploading to cloud, so that only specified cloud user (with valid
decryption key) can gain access to the data via valid decryption. To prevent shared photos
being accessed by the “insiders” of the system, a straightforward way is to designate the
group of authorized data users prior to encrypting the data.
In some cases, nonetheless, Alice may have no idea about who the photo
receivers/users are going to be. It is possible that Alice only has knowledge of attributes w.r.t.
photo receivers. In this case, traditional public key encryption (e.g., Paillier Encryption),
which requires the encryptor to know who the data receiver is in advance, cannot be
leveraged. Providing policy-based encryption mechanism over the outsourced photos is
therefore desirable, so that Alice makes use of the mechanism to define access policy over the
encrypted photos to guarantee only a group of authorized users is able to access the photos. In
a cloud-based storage service, there exists a common attack that is well-known as resource-
exhaustion attack. Since a (public) cloud may not have any control over download request
(namely, a service user may send unlimited numbers of download request to cloud server), a
malicious service user may launch the denial-of-service (DoS)/distributed denial-of-service
(DDoS) attacks to consume the resource of cloud storage service server so that the cloud
service could not be able to respond honest users’ service requests.
LITERATURE REVIEW
Composing survey is the main development in programming improvement process.
Preceding structure up the gadget, choose the time factor, economy and companions quality.
At the point when these things are satisfied, by then after stages are to sort out which working
system and language used for developing the contraption. At the point when the designers
start manufacturing the gadget, the computer programmers need part of outside help. This
assistance obtained from senior designers, from book or from destinations. Prior to building
the structure the above idea are considered for developing the proposed system.
B.Waters presents one more sort of Identity-Based Encryption (IBE) plot that we call
Fuzzy Identity-Based Encryption. In Fuzzy IBE we consider a to be of life as set of
illustrative attributes. A Fuzzy IBE scheme considers a private key for a person, ω, to
translate a ciphertext mixed with a character, ω 0 , if and just if the characters ω and ω 0 are
almost each other as assessed by the "set cover" partition metric. A Fuzzy IBE plan can be
applied to engage encryption using biometric commitments as characters; the mix-up strength
property of a Fuzzy IBE scheme is precisely what thinks about the usage of biometric
characters, which inherently will have some racket each time they are tried. Besides, we show
that Fuzzy-IBE can be used for a sort of utilization that we term "quality based encryption".
In this paper we present two improvements of Fuzzy IBE plans. Our advancements can be
viewed as an Identity-Based Encryption of a message under a couple of properties that make
a (feathery) character. Our IBE plans are both bumble liberal and secure against arrangement
attacks. Moreover, our crucial improvement doesn't use sporadic prophets. We show the
security of our arrangements under the Selective-ID security model.
X. Boyen and B. Waters presents a character based cryptosystem that features totally
strange ciphertexts and different evened out key assignment. We give a proof of safety in the
standard model, considering the smooth Decision Linear diverse nature assumption in
bilinear social occasions. The system is powerful and practical, with little ciphertexts of size
straight in the significance of the hierarchy. Applications recollect check for encoded data,
totally private correspondence, etc. Our results settle two open issues identifying with
puzzling character based encryption, our arrangement being quick to offer provable haziness
in the standard model, regardless being quick to recognize totally obscure HIBE at all levels
in the hierarchy.
Ibraimi et al. cryptographically support role based access control structure using
mediated public encryption. However,their revocation operation relies on additional
trusted infrastructure and an active entity to re-encrypt all affected files under the new
policy. Similarly, Nali et al. enforce role based access control structure using public- key
cryptography, but requires a series of active security mediators. Ferrara et al. define a
secure model to formally prove the security of a cryptographically enforced RBAC system.
They further show that an ABE-based construction is secure under such model. However,
their work focuses on theoretical analysis.
Pirretti et al. propose an optimized ABE-based access control for distributed file
systems and social networks, but their construction does not explicitly address the dynamic
revocation. Sieve is a attribute based access control system that allows users to selectively
expose their private data to third web services. Sieve uses ABE to enforce attribute based
access policies and homomorphic symmetric encryption to encrypt data. With
homomorphic symmetric encryption, a data owner can delegate revocation tasks to the
cloud assured that the privacy of the data is preserved. This work however incurs
prohibitive computation overhead since it adopts the homomorphic symmetric encryption
to encrypt files.
GORAM allows a data owner to enforce an access matrix for a list of authorized
users and provides strong data privacy in two folds. First, user access patterns are hidden
from the cloud by using ORAM techniques. Second, policy attributes are hidden from the
cloud by using attribute-hiding predicate encryption. The cryptographic algorithms, however,
incur additional performance overhead in data communication, encryption and decryption.
Also, GORAM does not support dynamic policy update. Over encryption is a cryptographical
method to enforce an access matrix on outsourced data. Over-encryption uses double
encryption to enforce the whole access matrix. As a result, the administrator has to rely on the
cloud to run complex algorithms over the matrix to update access policy, assuming a high
level of trust on the cloud.
Garrison et al. proposed two revocation schemes. The first scheme requires an
administrator to re-encrypt file with new keys as discussed above. This scheme incurs a
considerable communication overhead. Instead, the second scheme delegates users to re-
encrypt the file when they need to modify the file, relieving the administrator from re-
encrypting file data by itself. This scheme, however, comes with a security penalty as the
revocation operation is delayed to the next user’s modification to the file. As a result, a newly
revoked user can still access the file before the next writing operation
3.1.1 DISADVANTAGES
• Less security
• No confidentiality of data sharing.
• Low efficiency.
3.2.1 ADVANTAGES
• High efficiency.
CHAPTER-4
4.2SOFTWARE SPECIFICATION
4.3MODULES USED
MODULES:
TTP
Transfer
Files
Alerts
CSP
Files
Client
Upload Files
View Files
Modules Description
Here TTP has to login by using their unique user name and password. TTP is the
only authorized person to access ttp module for security purpose. So others don’t get rights to
access this module.
Transfer
In this module ttp view the client uploaded file and transfer them into multiple-
cloud. The file will split into 3 pieces and stored in cloud. TTP is the only
authorized person to access ttp module for security purpose. So others don’t get
rights to access this module.
View
In this module ttp view the client uploaded file from multiple-cloud. TTP is the only
authorized person to access ttp module for security purpose. So others don’t get rights
to access this module.
Alerts
In this module ttp view the alerts of the security issues of client uploaded files in
cloud. That is if any of csp try to access client file the alert will send to ttp. TTP is
the only authorized person to access ttp module for security purpose. So others don’t
get rights to access this module.
Here CSP has to login by using their unique user name and password. CSP is the
only authorized person to access ttp module for security purpose. So others don’t get rights to
access this module.
View
In this module csp view the client uploaded file in their cloud as encrypted format. If
csp try edit the client file the alert will send to ttp. CSP is the only authorized person
to access ttp module for security purpose. So others don’t get rights to access this
module.
Client
Here client has to login by using their unique user name and password after registration.
Client is the only authorized person to access this module for security purpose. So others
don’t get rights to access this module.
Upload
In this module client upload their files what are all they want to store in multiple-cloud.
Client is the only authorized person to access this module for security purpose. So others
don’t get rights to access this module.
View
In this module client view their uploaded file from multiple-cloud. Client is the only authorized
person to access this module for security purpose. So others don’t get rights to access this
module.
FRONT END
PHP:
CLIENT/SERVER ENVIRONMENT:
What is Client/Server?
The Client/Server computing model implies a form of processing when requests are
submitted by a client or requests the server which processes them and returns the result to the
client. The client and the server are two separate logical entities working together over a
network to accomplish the task.
Conceptually, the client server architecture can be defined as a special case of Co-operative
processing where on entire application is shared between the client and a server system.
Globalization of information
In our project we have divided core part into two parts. Asp pages, html pages are
used as user interface (client). They gather the information from the user and process them.
Ms.Access is stored in IIS, which is used as server.
Installation requirements
When installing web development to a hard drive other than ordinary PC, one need to
have at least 65-70MB free space on a drive to precede installation, regardless of how much
space is on installation drive.
NETWORK SPECIFICATION
XP PLATFORM:
WEB SERVER:
The Web server accepts the request and sends the HTML to the Client browser that
requests it. Web browser and web server communicate through a common protocol (HTTP).
The examples for web server are XAMPP(any of four different operating
systems,Apache,MySQL,Php,Perl),WAMP(Windows,Apache,MySQL,Php),MAMP(Macint
osh, Apache, MySQL, PHP).
PHP
PHP stands for Hypertext Preprocessor. PHP scripts run inside Apache server or Microsoft
IIS. PHP and Apache server are free. PHP code is very easy. PHP is the most used server side
scripting language. PHP files contain PHP scripts and HTML. PHP files have the extension
“php”, “php3”, “php4”, or “phtml”.
Using PHP
Generate dynamic web pages. PHP can display different content to different user or
display different content at different times of the day.
Process the contents of HTML forms. We can use a PHP to retrieve and respond to
the data entered into an HTML form.
Can create database-driven web pages. A PHP can insert new data or retrieve existing
data from a database such a MySQL.
Working of PHP
PHP is a standard HTML file that is extended with additional features. Like a standard
HTML file, PHP contains HTML tag that can be interpreted and displayed by a web browser.
Anything we could normally place in an HTML file Java applets, Blinking text, server side
scripts .we can place in PHP. However, PHP has three important features that make it unique.
PHP contains server side scripts.
PHP provides several built-in objects.
HTML is an application of the Standard Generalized Markup Language (SGML), which was
approved as an international standard in the year 1986. SGML provides a way to encode
hyper documents so they can be interchanged.
SGML is also a Meta language for formally describing document markup system. Infact
HTML uses SGML to define a language that describes a WWW hyper document’s structure
and inter connectivity.
Following the rigors of SGML, TBL bore HTML to the world in 1990. Since then, many of
us have it to be easy to use but sometimes quite limiting. These limiting factors are being
addressed but the World Wide Web Consortium (aka W3c) at MIT. But HTML had to start
somewhere, and its success argues that it didn’t start out too badly.
MYSQL
MySQL Server is a powerful database management system and the user can create
application that requires little or no programming. It supports GUI features and an entire
programming language, Phpmyadmin which can be used to develop richer and more
developed application. There are quite a few reasons, the first being that MySQL is a feature
rich program that can handle any database related task you have. You can create places to
store your data build tools that make it easy to read and modify your database contents, and
ask questions of your data. MySQL is a relational database, a database that stores information
about related objects. In MySQL that database means a collection of tables that hold data. It
collectively stores all the other related objects such as queries, forms and reports that are used
to implement function effectively.
The MySQL database can act as a back end database for PHP as a front end, MySQL
supports the user with its powerful database management functions. A beginner can create
his/her own database very simply by some mouse clicks. Another good reason to use MySQL
as back end tool is that it is a component of the overwhelmingly popular Open source
software.
Database:
A database is simply a collection of used data just like phone book. MySQL database include
such objects as tables, queries, forms, and more.
Tables:
In MySQL tables are collection of similar data. With all tables can be organized
differently, and contain mostly different information- but they should all be in the same
database file. For instance we may have a database file called video store. Containing tables
named members, tapes, reservations and so on. These tables are stored in the same database
file because they are often used together to create reports to help to fill out on screen forms.
Relational database:
MySQL is a relational database. Relational databases tools like access can help us
manage information in three important ways.
Reduce redundancy
Facilitate the sharing of information
Keep data accurate.
Fields
MySQL use key fields and indexing to help speed many database operations. We can
tell MySQL, which should be key fields, or MySQL can assign them automatically.
Queries are access objects us display, print and use our data. They can be things like
field labels that we drag around when designing reports. Or they can be pictures, or titles for
reports, or boxes containing the results of calculations.
Forms are on screen arrangement that make it easy to enter and read data. we can also
print the forms if we want to. We can design form our self, or let the access auto form feature.
Reports:
Reports are paper copies of dynaset. We can also print reports to disk, if we like.
Access helps us to create the reports. There are even wizards for complex printouts.
Properties:
Properties are the specification we assigned to parts of our database design. We can
define properties for fields, forms, controls and most other access objects.
For developing the software and hardware requirements needed the less cost of
developing the software package takes five months duration.
DEVELOPMENT SPECIFICATION
This includes salaries and other employment costs of the staff involved in the
development project and all associated costs.
Setup cost:
This includes the cost of putting the system into place. These consists mainly of
the cost of any new hardware and ancillary equipment but will also include cost of file
conversion, recruitment and staff training.
Operational cost:
1. Development cost
Development cost includes salaries and other employment costs of the staff involved
in the development project and all associated costs
Benefits may be categorized as follows:
Direct benefits
Intangible benefits
Direct benefits:
These accure directly from the operation of the proposed system. These could for
example: include reduction in salary bills through introduction of a new, computerized
system.
These are generally secondary benefits such as increased accuracy through the
introduction of a user-friendlier screen design where we might be able to estimate the
reduction error and hence cost of proposed system.
Intangible benefits
These are generally longer term or benefit that are considered very difficult to quatify.
Enhanced job interest can lead to reduced staff turnover and hence lower recruitment
SYSTEM DESIGN
INPUT DESIGN
Input design is one of the most important phase of the system design. Input design is
the process where the input received in the system are planned and designed, so as to get
necessary information from the user, eliminating the information that is not required. The aim
of the input design is to ensure the maximum possible levels of accuracy and also ensures that
the input is accessible that understood by the user.
The input design is the part of overall system design, which requires very careful
attention. If the data going into the system is incorrect then the processing and output will
magnify the errors.
OUTPUT DESIGN
Computer output is the most important and direct source of information to the user.
Efficient, intelligible output design should improve the system’s relationships with the user
and help in decision making. A major form of output is the hard copy from the printer. The
output devices to consider depend on factors such as compatibility of the device with the
system, response time requirements, expected print quality and number of copies needed. .
All nodes in the network may depart or fail unpredictably.
The partition the continuously generated measurement data by time slots, where a
source block refers to the amount of the data generated in one time slot on a node. Clearly,
how many time slots of data can be cached depends on the size of the node cache storage.
DATABASE DESIGN
A well database is essential for the good performance of the system .several tables are
referenced or manipulated at various instance. The table also knows as relation; provide
information pertaining to a specified entity. Normalization of table is carried out to extent
possible, while the normalizing tables, care should be taken to make sure that the number of
tables do not exceed the optimum level, so that table maintenance. Is convenient and effective
The process of doing database design generally consists of a number of steps which
will be carried out by the database designer. Not all of these steps will be necessary in all
cases. Usually, the designer must:
Within the relational model the final step can generally be broken down into two
further steps that of determining the grouping of information within the system, generally
determining what are the basic objects about which information is being stored, and then
determining the relationships between these groups of information, or objects. This step is not
necessary with an Object database.
In a majority of cases, the person who is doing the design of a database is a person
with expertise in the area of database design, rather than expertise in the domain from which
the data to be stored is drawn e.g. financial information, biological information etc. Therefore
the data to be stored in the database must be determined in cooperation with a person who
does have expertise in that domain, and who is aware of what data must be stored within the
system.
CHAPTER-5
Testing is a series of different tests that whose primary purpose is to fully exercise
the computer based system. Although each test has a different purpose, all work should verify
that all system element have been properly integrated and performed allocated function.
Testing is the process of checking whether the developed system works according to the
actual requirement and objectives of the system.
The philosophy behind testing is to find the errors. A good test is one that has a
high probability of finding an undiscovered error. A successful test is one that uncovers the
undiscovered error. Test cases are devised with this purpose in mind. A test case is a set of
data that the system will process as an input. However the data are created with the intent of
determining whether the system will process them correctly without any errors to produce the
required output.
Types of Testing:
Unit testing
Integration testing
Validation testing
Output testing
User acceptance testing
Unit Testing
All modules were tested and individually as soon as they were completed and were
checked for their correct functionality.
Integration Testing
The entire project was split into small program; each of this single programs gives a
frame as an output. These programs were tested individually; at last all these programs where
combined together by creating another program where all these constructors were used. It
give a lot of problem by not functioning is an integrated manner.
The user interface testing is important since the user has to declare that the arrangements
made in frames are convenient and it is satisfied. when the frames where given for the test,
the end user gave suggestion. Based on their suggestions the frames where modified and put
into practice.
Validation Testing
Output Testing
After performing the validation testing the next step is output testing of the proposed
system. Since the system cannot be useful if it does not produce the required output. Asking
the user about the format in which the system is required tests the output displayed or
generated by the system under consideration. Here the output format is considered in two
ways. one is on screen and another one is printed format. The output format on the screen is
found to be corrected as the format was designed in the system phase according to the user
needs. And for the hardcopy the output comes according to the specifications requested by
the user.
An acceptance test as the objective of selling the user on validity and reliability of
the system. It verifies that the procedures operate to system specification and mat the
integrity of vital is maintained.
Performance Testing
This project is a application based project, and the modules are interdependent with
the other modules, so the testing cannot be done module by module. So the unit testing is not
possible in the case of this driver. So this system is checked only with their performance to
check their quality.
IMPLEMENTATION
It making the new system available to a prepared set of users (the deployment), and
positioning on-going support and maintenance of the system within the Performing
Organization (the transition). At a finer level of detail, deploying the system consists of
executing all steps necessary to educate the Consumers on the use of the new system, placing
the newly developed system into production, confirming that all data required at the start of
operations is available and accurate, and validating that business functions that interact with
the system are functioning properly. Transitioning the system support responsibilities
involves changing from a system development to a system support and maintenance mode of
operation, with ownership of the new system moving from the Project Team to the
Performing Organization.
List of System implementation is the important stage of project when the theoretical design is
tuned into practical system. The main stages in the implementation are as follows:
Planning
Training
System testing and
Changeover Planning
Planning is the first task in the system implementation. Planning means deciding on
the method and the time scale to be adopted. At the time of implementation of any system
people from different departments and system analysis involve. They are confirmed to
practical problem of controlling various activities of people outside their own data processing
departments. The line managers controlled through an implementation coordinating
committee. The committee considers ideas, problems and complaints of user department, it
must also consider;
_ Project Manager
_ Project Sponsor
_ Business Analyst
_ Data/Process Modeler
_ Technical Lead/Architect
_ Application Developers
_ Software Quality Assurance (SQA) Lead
_ Customer Decision-Maker
_ Customer Representative
_ Consumer
The purpose of Prepare for System Implementation is to take all possible steps to
ensure that the upcoming system deployment and transition occurs smoothly, efficiently, and
flawlessly. In the implementation of any new system, it is necessary to ensure that the
Consumer community is best positioned to utilize the system once deployment efforts have
been validated. Therefore, all necessary training activities must be scheduled and
coordinated. As this training is often the first exposure to the system for many individuals, it
should be conducted as professionally and competently as possible. A positive training
experience is a great first step towards Customer acceptance of the system.
_ Consumers may experience a period of time in which the systems that they depend on to
perform their jobs are temporarily unavailable to them. They may be asked to maintain
detailed manual records or logs of business functions that they perform to be entered into the
new system once it is operational.
Due to the number of project participants in this phase of the SDLC, many of the necessary
conditions and activities may be beyond the direct control of the Project Manager.
Consequently, all Project Team members with roles in the implementation efforts must
understand the plan, acknowledge their responsibilities, recognize the extent to which other
implementation efforts are dependent upon them, and confirm their commitment
CHAPTER-6
CONCLUSION
CONCLUSION
[2] X. Wang, Y. Qi, and Z. Wang, Design and Implementation of SecPod: A Framework for
Virtualization- based Security Systems, IEEE Transactions on Dependable and Secure
Computing, vol. 16, no. 1, 2019
[3] J. Ren, Y. Qi, Y. Dai, X. Wang, and Y. Shi, AppSec: A Safe Execution Environment for
Security Sensitive Applications, in ACM VEE, 2015.
[4] V. Goyal, A. Jain, O. Pandey, and A. Sahai, Bounded ciphertext policy attribute based
encryption, in ICALP, 2008.
[5] V. Goyal, O. Pandey, A. Sahai, and B.Waters, Attribute-based encryption for fine-grained
access control of encrypted data, in ACM CCS, 2006.
[6] J. Katz, A. Sahai, and B. Waters, Predicate encryption supporting disjunctions polynomial
equations, and inner products, in EUROCRYPT, 2008.
[7] S. Muller and S. Katzenbeisser, Hiding the policy in cryptographic access control, in
STM, 2011.
[11] X. Jin, R. Krishnan, and R. S. Sandhu, A unified attribute-based access control model
covering DAC, MAC and RBAC, in DDBSec, 2012.
[13] R. S. Sandhu, Rationale for the RBAC96 family of access control models, in
proceedings of ACM Workshop on RBAC, 1995.
[14] T. Jiang, X. Chen, Q. Wu, J. Ma, W. Susilo, and W. Lou, Secure and Efficient Cloud
Data Deduplication With Randomized Tag, IEEE Trasactions on Information Forensics and
Security, vol. 12, no. 3, 2017.
[15] M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, K. Fu, Plutus: Scalable Secure File
Sharing on Untrusted Storage, in proceedings of USENIX FAST, 2003.
[16] J. Wang, X. Chen, X. Huang, I. You, and Y. Xiang, Verifiable Auditing for Outsourced
Database in Cloud Computing, IEEE Transactions on Computers, vol. 64, no. 11, 2015.
[17] J. Wang, X. Chen, J. Li, J. Zhao, and J. Shen, Towards achieving flexible and verifiable
search for outsourced database in cloud computing, Future Generation Computer Systems,
vol. 67, 2017.
http://www.w3schools.com
http://www.tuxradar.com/practicalphp
http://phpbuddy.com/index.php
http://www.daniweb.com
http://www.pscode.com
http://dev.mysql.com
http://www.mysqltutorial.org/
www.hotscripts.com
www.freesoft.in
1. Beginning PHP 5.3 - Matt Doyle Publication, first Edition, (October 26, 2009).
Edition,2011
5. Web Database Applications with PHP & MySQL, - Hugh E. Williams (Author),
</title>
</head>
<body>
<div id="main">
<div id="header">
<div id="logo">
</span></a>
</div>
</div>
<div id="border">
<div id="buttons">
<div class="but_div"></div>
<div class="but_div"></div>
<div class="but_div"></div>
</div>
</tr>
<tr>
<td colspan="3"> </td>
</tr>
<tr>
<h3 align="center"></h3>
<p style="padding-left:15px;padding-right:15px;text-align:justify"></p></td>
</tr>
<tr>
</tr>
<tr>
</tr>
<tr>
<tr>
</tr>
</table>
</div>
<div id="footer">
</div>
</div>
</body>
</html>
<?php
session_start();
include_once "../db/db.php";
?>
<html>
</title>
</head>
<body>
<div id="main">
<div id="header">
<div id="logo">
</span></a>
</div>
</div>
<div id="border">
<div id="buttons">
<div class="but_div"></div>
<div class="but_div"></div>
</div>
<tr>
<tr>
<td colspan="3"> </td>
</tr>
<tr>
</tr>
<tr></tr>
<tr>
<?php
$sl=0;
where file_id='".$_REQUEST['file_id']."'";
$fr=mysql_query($s);
$f=mysql_fetch_object($fr);
$contents = file_get_contents($f->file_file);
$len=strlen($contents);
$count=$len/3;
$file1 = file_get_contents($f->file_file,NULL,NULL,0,$count);
$file2 = file_get_contents($f->file_file,NULL,NULL,$count,$count);
$file3 = file_get_contents($f->file_file,NULL,NULL,$count*2);
?>
<tr>
</tr>
<tr>
<td align="center">
</td>
<td align="center"> </td>
</tr>
<tr>
<br>
</tr>
<tr>
<br>
</tr>
<tr>
<td height="36" align="center"><u>File 3</u> :<br>
<br>
</tr>
<tr>
</tr>
<tr>
</tr>
<tr>
</tr>
</table>
</form></td>
</tr>
<tr>
<tr>
</tr>
<tr>
</tr>
<tr>
</tr>
</table>
</div>
<div id="footer">
</div>
</div>
</body>
</html>
<?php
if(isset($_REQUEST['submit']))
$f1=mysql_query($s1);
$c1=mysql_fetch_object($f1);
if($c1 < 1)
$path1= "../cloud1/C1-1.txt";
fopen($path1,'a+');
}else
$count1=$c1->cloud1_id + 1;
$path1= "../cloud1/C1-".$count1.".txt";
$fopen1 = fopen($path1,'a+');
fwrite($fopen1,$_REQUEST['file1']);
`cloud1_file` ,
`cloud1_user` ,
`cloud1_date` )
VALUES ('".$_REQUEST['file_id']."',
'".$path1."',
'".$_REQUEST['client_name']."',
'".date('d/m/Y')."')";
mysql_query($insert1);
$s2="select * from cloud1 order by cloud2_id desc";
$f2=mysql_query($s2);
$c2=mysql_fetch_object($f2);
if($c2 < 1)
$path2= "../cloud2/C2-1.txt";
}else
$count2=$c2->cloud2_id + 1;
$path2= "../cloud2/C2-".$count2.".txt";
$fopen2 = fopen($path2,'a+');
fwrite($fopen2,$_REQUEST['file2']);
`cloud2_file` ,
`cloud2_user` ,
`cloud2_date` )
VALUES ('".$_REQUEST['file_id']."',
'".$path2."',
'".$_REQUEST['client_name']."',
'".date('d/m/Y')."')";
mysql_query($insert2);
$s3="select * from cloud3 order by cloud3_id desc";
$f3=mysql_query($s3);
$c3=mysql_fetch_object($f3);
if($c3 < 1)
$path3= "../cloud3/C3-1.txt";
}else
$count3=$c3->cloud3_id + 1;
$path2= "../cloud3/C3-".$count3.".txt";
$fopen3 = fopen($path3,'a+');
fwrite($fopen3,$_REQUEST['file3']);
`cloud3_file` ,
`cloud3_user` ,
`cloud3_date` )
VALUES ('".$_REQUEST['file_id']."',
'".$path3."',
'".$_REQUEST['client_name']."',
'".date('d/m/Y')."')";
mysql_query($insert3);
$myFile=$_REQUEST['file_file'];
unlink($myFile);
?>
SCREEN SHOT