Optimizing Information Leakage in Multicloud Storage Services
Optimizing Information Leakage in Multicloud Storage Services
Optimizing Information Leakage in Multicloud Storage Services
Abstract:
In Provable Multi files Dynamic data Possession in cloud computing deals with
stored data in Dynamic way to cloud server. Multi files Means, data to be copied in
multiple server. In the project owner to upload the data in cloud server with
automatically data to take multiple files then that files are stored in multiple server.
If upload the data in multi-server to avoid the data loss from Hacking and server
crash. In this project we introduced new technique that is Fully Homomorphic
Encryption (FHE) for take Multi files of data, File security, Data Corrupted. In this
Project we have to FHE algorithm for protect the data. That are keygen, copygen
and taggen. Above the process done in Existing system using Single file of
Dynamic Data.
Objectives:
• In Existing system this project all the uploaded data are stored in cloud
server Single file way. In previous data stored in single server and Owner
sharer the data authorized users. Then authorized users send the file request
to file owner this not correct way and service provider may be access files in
illegal. So automatically occur data security loss. In Existing Somewhat
Homomorphic Encryption(SHE) Algorithm used.
Disadvantage:
Proposed System:
In proposed system of this project was uploaded data are stored in multiple server
(Multi files).In proposed one scheme FHE algorithms are used. If Owner upload
the data, automatically prepare three files then stored in three server that why for
security and avoid server overload. That copies also encrypted so cloud service
provider or any others cant hack the data. If owners upload the data, server
automatically convert to zip formats. So server reduce the file size automatically.
Owner share the file to authorized user. Then authorized user send the file request
to cloud server again server send the encrypted data to authorized user. And
authorized user get the decrypt key from data owner.
Advantage:
• Multi files Data, So reduce access time and communication from users.
• If one copy corrupted it will be redirect to another server can download the
file.
SYSTEM SPECIFICATION:
HARDWARE SPECIFICATION:
Processor - I3,I5,I7
RAM - 4 GB (min)
SOFTWARE SPECIFICATION:
Technology Used : C#
3. File Convert
4. Authorized users
5. File request
6. File recovery
7. Report Generation
MODULES DESCRIPTION:
Cloud Service provider to provide the service to user. User register the
details to service provider before send the file. After user registration admin verify
the user profile and accept the user request. Admin may be reject the Unauthorized
profile details.
After admin verify the user details, User to upload the file to cloud
server.While upload the file, files are encrypted and stored in the database and
folder. While upload the data are split and store the three server. Because hacker,
cannot not hack server data. Because data parts are stored in three servers.Key gen
algorithm used in data upload and encrypted.
File Convert:
While upload data to server. All data are in ZIP format for reduce the file
occupy memory.
Authorized users:
Authorised users, these users only to download the file from the others users.
These users to send the file requset to admin and file owner
File request:
User may be share the our files to another users. Shared users to fetch the file from
file owner. Shared user to send the file request to file owner and automatically
same request send to admin. Then Admin verify the server and provide the
clearance to provide the key from file owner. After file owner to send the
temporary key to shared users.if shared users download the shared file the
temporary key automatically expire.
File recovery:
If user file may be corrupt or may be delete. So if user delete any file from
server,user can recover the deleted files from file sever. It is very useful to all
cloud users.If user to recover the deleted file, user login and get the deleted files
Report Generation:
Admin to generate the reports for how many user register in the cloud. And alos
prepare the verify and not verify details.
Architecture Diagram:
Literature Survey:
Paper1
Author: Ning Cao, Cong Wang, Ming Li, Kui Ren, and Wenjing Lou
Abstract:
The first time, we define and solve the challenging problem of privacy-preserving
multi-keyword ranked search over encrypted data in cloud computing (MRSE). We
establish a set of strict privacy requirements for such a secure cloud data utilization
system. We further use “inner product similarity” to quantitatively evaluate such
similarity measure. We first propose a basic idea for the MRSE based on secure
inner product computation, and then give two significantly improved MRSE
schemes to achieve various stringent privacy requirements in two different threat
models. To improve search experience of the data search service, we further extend
these two schemes to support more search semantics. Thorough analysis
investigating privacy and efficiency guarantees of proposed schemes is given.
Experiments on the real-world data set further show proposed schemes indeed
introduce low overhead on computation and communication.
Paper2
Abstract:
It is common nowadays for data owners to outsource their data to the cloud. Since
the cloud cannot be fully trusted, the outsourced data should be encrypted. This
however brings a range of problems, such as: How should a data owner grant
search capabilities to the data users? How can the authorized data users search over
a data owner’s outsourced encrypted data? How can the data users be assured that
the cloud faithfully executed the search operations on their behalf? Motivated by
these questions, we propose a novel cryptographic solution, called verifiable
attribute-based keyword search (VABKS). The solution allows a data user, whose
credentials satisfy a data owner’s access control policy, to (i) search over the data
owner’s outsourced encrypted data, (ii) outsource the tedious search operations to
the cloud, and (iii) verify whether the cloud has faithfully executed the search
operations.
Paper3
Abstract:
Enterprises outsourcing their databases to the cloud and authorizing multiple users
for access represents a typical use scenario of cloud storage services. In such a case
of database outsourcing, data encryption is a good approach enabling the data
owner to retain its control over the outsourced data. Searchable encryption is a
cryptographic primitive allowing for private keyword based search over the
encrypted database. The above setting of enterprise outsourcing database to the
cloud requires multi-user searchable encryption, whereas virtually all of the
existing schemes consider the single-user setting. To bridge this gap, we are
motivated to propose a practical multi-user searchable encryption scheme, which
has a number of advantages over the known approaches. The associated model and
security requirements are also formulated. We further discuss to extend our scheme
in several ways so as to achieve different search capabilities.
Paper4
Title: A Secure and Dynamic Multi-Keyword Ranked Search Scheme over
Encrypted Cloud Data
Author: Zhihua Xia, Xiongfei Wang, Xinghua Sun, and Qijie Wang
Abstract:
Due to the increasing popularity of cloud computing, more and more data owners
are motivated to outsource their data to cloud servers for great convenience and
reduced cost in data management. However, sensitive data should be encrypted
before outsourcing for privacy requirements, which obsoletes data utilization like
keyword-based document retrieval. In this paper, we present a secure multi-
keyword ranked search scheme over encrypted cloud data, which simultaneously
supports dynamic update operations like deletion and insertion of documents. We
construct a special tree-based index structure and propose a “Greedy Depth-first
Search” algorithm to provide efficient multi-keyword ranked search. The secure
kNN algorithm is utilized to encrypt the index and query vectors, and meanwhile
ensure accurate relevance score calculation between encrypted index and query
vectors. In order to resist statistical attacks, phantom terms are added to the index
vector for blinding search results.
Paper5
Author: Wenhai Sun, Shucheng Yu, Wenjing Lou, Y Thomas Hou, and Hui Li.
Abstract:
Search over encrypted data is a critically important enabling technique in cloud
computing, where encryption-before outsourcing is a fundamental solution to
protecting user data privacy in the untrusted cloud server environment.. Inspired by
attribute-based encryption (ABE), we present the first attribute-based keyword
search scheme with efficient user revocation (ABKS-UR) that enables scalable
fine-grained (i.e. file-level) search authorization. Our scheme allows multiple
owners to encrypt and outsource their data to the cloud server independently. Users
can generate their own search capabilities without relying on an always online
trusted authority. Fine-grained search authorization is also implemented by the
owner-enforced access policy on the index of each file.
UML DIAGRAMS:
Activity Diagram:
Class Diagram:
Usecase Diagram:
Level 1:
Level 2:
Level 3:
Overall DFD:
E-R Diagram:
Sequence Diagram:
Collaboration Diagram:
AES ALGORITHM:
STEP 1
STEP 2
STEP 4
STEP 5
STEP 6
The data owner uploads the file to the cloud. The data owner will store their
file in the public and private cloud.
The file is encrypted for the privacy preserving. The encrypted file is stored
in the cloud. The unauthorized people can access the file due to the encryption.
SOFTWARE DESCRIPTION
Front End:
Dotnet:
Back End:
SQL Server, the most popular Open Source SQL database management system, is
developed, distributed, and supported by Oracle Corporation. The SQLServer Web
site (http://www.sqlserver.com/) provides the latest information about SQLServer
software.
A relational database stores data in separate tables rather than putting all the data
in one big storeroom. The database structures are organized into physical files
optimized for speed. The logical model, with objects such as databases, tables,
views, rows, and columns, offers a flexible programming environment. You set up
rules governing the relationships between different data fields, such as one-to-one,
one-to-many, unique, required or optional, and “pointers” between different tables.
The database enforces these rules, so that with a well-designed database, your
application never sees inconsistent, duplicate, orphan, out-of-date, or missing data.
The SQL part of “SQL Server” stands for “Structured Query Language”. SQL is
the most common standardized language used to access databases. Depending on
your programming environment, you might enter SQL directly (for example, to
generate reports), embed SQL statements into code written in another language, or
use a language-specific API that hides the SQL syntax.
SQL is defined by the ANSI/ISO SQL Standard. The SQL standard has been
evolving since 1986 and several versions exist. In this manual, “SQL-92” refers to
the standard released in 1992, “SQL:1999” refers to the standard released in 1999,
and “SQL:2003” refers to the current version of the standard. We use the phrase
“the SQL standard” to mean the current version of the SQL Standard at any time.
The SQL Server Database Server is very fast, reliable, scalable, and easy to
use:
If that is what you are looking for, you should give it a try. SQL Server can
run comfortably on a desktop or laptop, alongside your other applications, web
servers, and so on, requiring little or no attention. If you dedicate an entire machine
to SQL Server, you can adjust the settings to take advantage of all the memory,
CPU power, and I/O capacity available. SQLServer can also scale up to clusters of
machines, networked together.
PROJECT DESCRIPTION
Problem Definition:
Outsourcing data to remote servers has become a growing trend for many
organizations to alleviate the burden of local data storage and maintenance. In this
work we have studied the problem of creating multiple copies of dynamic data file
and verifying those copies stored on untrusted cloud servers. We have proposed a
new FHE scheme, which supports outsourcing of multi-copy dynamic data, where
the data owner is capable of not only archiving and accessing the data copies
stored by the CSP, but also updating and scaling these copies on the remote
servers.
Designing the database is the part of system design. Data elements and data
structures to be stored have been identified at analysis stage and are structured and
put together to design the data storage and retrieval system.
INPUT DESIGN
OUTPUT DESIGN
The computer output is the most important and direct source of information
to the user. Efficient and intelligible output design improves the system’s
relationship with the user and helps in decision making.
Output design was studied going actively during the study phase. The
objective of the output design is defined the contents and format of all documents
and reports in an attractive
SYSTEM TESTING
TESTING OBJECTIVES
A good test case is one that has a high probability of finding error, if it exists
The tests are inadequate to detect possibly present errors
The software more or less confirms to the quality and reliable standards
TESTING LEVELS
Unit Testing
In the lines of strategy, all the individual functions and modules were put to
the test independently. By following this strategy all the errors in coding were
identified and corrected. This method was applied in combination with the White
and Black Box testing Techniques to find the errors in each module.
Integration Testing
Data can be lost across the interface; one module can have an adverse effect
on others. Integration testing is a systematic testing for constructing program
structure. While at the same time conducting tests to uncover errors associated
within the interface. Integration testing addresses the issues associated with the
dual problems of verification and program construction. After the software has
been integrated a set of high order sets and conducted.
The objective is to take unit tested modules and combine them test it as a whole.
Thus, in the integration-testing step all the errors uncovered are corrected for the
next testing steps.
Validation Testing
The outputs that come out of the system are as a result of the inputs that go
into the system. The correct and the expected outputs that go into the system
should be correct and proper. So this testing is done to check if the inputs are
correct and they are validated before it goes into the system for processing.
Acceptance Testing
User acceptance of a system is the key factor for the success of any system.
The system under consideration is tested for the user acceptance by constantly
keeping in touch with the prospective system users at the time of developing and
making changes whenever required. This is done in regard to the following point:
An acceptance test has the objective of selling the user on the validity and
reliability of the system. It verifies that the system’s procedures operate to system
specifications and that the integrity of important data is maintained. Performance
of an acceptance test is actually the user’s show. User motivation is very important
for the successful performance of the system. After that a comprehensive report is
prepared.
SYSTEM IMPLEMENTATION
A software application in general is implemented after navigating the
complete life cycle method of a project. Various life cycle processes such as
requirement analysis, design phase, verification, testing and finally followed by the
implementation phase result in a successful project management. System
implementation is an important stage of theoretical design is turned into practical
system.
Implementation Procedure
FEASIBILITY STUDY
The feasibility of the project is analyzed in this phase and business proposal
is put forth with a very general plan for the project and some cost estimates.
During system analysis the feasibility study of the proposed system is to be carried
out. This is to ensure that the proposed system is not a burden to the company. For
feasibility analysis, some understanding of the major requirements for the system
is essential.
ECONOMICAL FEASIBILITY
This study is carried out to check the economic impact that the system will
have on the organization. The amount of fund that the company can pour into the
research and development of the system is limited. The expenditures must be
justified. Thus the developed system as well within the budget and this was
achieved because most of the technologies used are freely available. Only the
customized products had to be purchased.
TECHNICAL FEASIBILITY
This study is carried out to check the technical feasibility, that is, the
technical requirements of the system. Any system developed must not have a high
demand on the available technical resources. This will lead to high demands on the
available technical resources. This will lead to high demands being placed on the
client. The developed system must have a modest requirement, as only minimal or
null changes are required for implementing this system.
SOCIAL FEASIBILITY
The aspect of study is to check the level of acceptance of the system by the
user. This includes the process of training the user to use the system efficiently.
The user must not feel threatened by the system, instead must accept it as a
necessity. The level of acceptance by the users solely depends on the methods that
are employed to educate the user about the system and to make him familiar with
it. His level of confidence must be raised so that he is also able to make some
constructive criticism, which is welcomed, as he is the final user of the system.
Code
AdminHome.aspx:
<!DOCTYPE html>
<head>
<meta charset="utf-8">
<script src="js/modernizr-2.6.2.min.js"></script>
<!--[if lt IE 9]>
<script src="js/respond.min.js"></script>
<![endif]-->
<div class="container">
<!-- <div id="fh5co-menu-logo"> -->
<li class="active"><a
href="CloudHome.aspx">Home</a></li>
<li><a
href="DataUserDetails.aspx">Data User Details</a></li>
<li><a
href="DataOwnerDetails.aspx">Data Owner Details</a></li>
<li><a href="Home.aspx">Logout</a></li>
</ul>
</nav>
</div>
</header>
<div class="overlay"></div>
<div class="container">
<div class="col-md-12">
<div class="fh5co-hero-wrap">
<div class="fh5co-hero-intro">
</div>
</div>
</div>
</div>
</div>
<script src="js/jquery-1.10.2.min.js"></script>
<script src="js/jquery.easing.1.3.js"></script>
<script src="js/bootstrap.js"></script>
<script src="js/owl.carousel.min.js"></script>
<script src="js/jquery.magnific-popup.min.js"></script>
<!-- Superfish -->
<script src="js/hoverIntent.js"></script>
<script src="js/superfish.js"></script>
<script src="js/easyResponsiveTabs.js"></script>
<script src="js/fastclick.js"></script>
<script src="js/jquery.parallax-scroll.min.js"></script>
<script src="js/jquery.waypoints.min.js"></script>
<script src="js/main.js"></script>
</div>
</form>
</body>
</html>
<%@ Page Language="C#" AutoEventWireup="true"
CodeFile="DataOwnerDetails.aspx.cs" Inherits="DataOwnerDetails" %>
<!DOCTYPE html>
<head>
<meta charset="utf-8">
//////////////////////////////////////////////////////
Website: http://freehtml5.co/
Email: [email protected]
Twitter: http://twitter.com/fh5co
Facebook: https://www.facebook.com/fh5co
//////////////////////////////////////////////////////
-->
<script src="js/modernizr-2.6.2.min.js"></script>
<!--[if lt IE 9]>
<script src="js/respond.min.js"></script>
<![endif]-->
</head>
<body>
<div class="container">
<li> <a
href="CloudHome.aspx">Home</a></li>
<li><a
href="DataUserDetails.aspx">Data User Details</a></li>
<li class="active"><a
href="DataOwnerDetails.aspx">Data Owner Details</a></li>
<li><a href="Home.aspx">Logout</a></li>
</ul>
</nav>
</div>
</header>
<div id="fh5co-hero">
<div class="overlay"></div>
<div class="container">
<div class="col-md-12">
<div class="fh5co-hero-wrap">
<div id="fh5co-main" class="to-animate hero-animate-3">
<div class="container">
<div class="row">
<div class="col-md-8">
<div class="col-md-12">
<div class="form-group">
<table align="center">
<tr>
<td>
<h3><asp:GridView
ID="GridView_viewownerdetails" runat="server">
</asp:GridView></h3>
</td>
</tr>
</table>
<table align="center">
<tr>
<td>
<asp:DropDownList
ID="DropDownList_viewownername" runat="server" class="form-control input-
lg" Width="200px" ></asp:DropDownList>
</td>
<asp:Button ID="Button_ownerrequestaccept"
runat="server" Text="Accept" class="form-control input-lg"
OnClick="Button_ownerrequestaccept_Click"/>
</td>
</tr>
</table>
<table align="center">
<tr>
<td>
<asp:TextBox ID="TextBox1_ownername"
runat="server" class="form-control input-lg" placeholder="Owner
ID"></asp:TextBox>
</td>
</td>
</tr>
</table>
</form>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<script src="js/jquery-1.10.2.min.js"></script>
<script src="js/jquery.easing.1.3.js"></script>
<script src="js/bootstrap.js"></script>
<script src="js/owl.carousel.min.js"></script>
<script src="js/jquery.magnific-popup.min.js"></script>
<script src="js/hoverIntent.js"></script>
<script src="js/superfish.js"></script>
<script src="js/easyResponsiveTabs.js"></script>
<script src="js/fastclick.js"></script>
<script src="js/jquery.parallax-scroll.min.js"></script>
<!-- Waypoints -->
<script src="js/jquery.waypoints.min.js"></script>
<script src="js/main.js"></script>
</body>
</html>
AdminHome.aspx.cs:
using System;
using System.Collections.Generic;
using System.Linq;
using System.Web;
using System.Web.UI;
using System.Web.UI.WebControls;
using System.Configuration;
using System.Data;
using System.Data.SqlClient;
{
protected void Page_Load(object sender, EventArgs e)
if (!IsPostBack)
gv_viewownerdetails();
dl_viewownername();
SqlCommand cmd;
SqlDataAdapter da;
SqlDataReader dr;
con.Open();
cmd = new SqlCommand("select OwnerID,Name,MobileNo,MailID,Request
from OwnerRegister",con);
da = new SqlDataAdapter(cmd);
da.Fill(dt);
GridView_viewownerdetails.DataSource = dt;
GridView_viewownerdetails.DataBind();
con.Close();
con.Open();
dr = cmd.ExecuteReader();
while (dr.Read())
DropDownList_viewownername.Items.Add(dr[0].ToString());
con.Close();
}
protected void Button_ownerrequestaccept_Click(object sender, EventArgs e)
con.Open();
cmd.ExecuteNonQuery();
con.Close();
Response.Write("<script>alert('Accepted')</script>");
con.Open();
cmd.ExecuteNonQuery();
con.Close();
Response.Write("<script>alert('Deleted')</script>");
}
}
con.Open();
da = new SqlDataAdapter(cmd);
da.Fill(dt);
GridView_viewuserdetails.DataSource = dt;
GridView_viewuserdetails.DataBind();
con.Close();
con.Open();
dr = cmd.ExecuteReader();
while(dr.Read())
DropDownList_viewusername.Items.Add(dr[0].ToString());
con.Close();
con.Open();
cmd.ExecuteNonQuery();
con.Close();
Response.Write("<script>alert('Accepted')</script>");
con.Open();
cmd.ExecuteNonQuery();
con.Close();
Response.Write("<script>alert('Deleted')</script>");
File upload:
FileUpload.aspx:
<!DOCTYPE html>
<head>
<meta charset="utf-8">
<!--
//////////////////////////////////////////////////////
Email: [email protected]
Twitter: http://twitter.com/fh5co
Facebook: https://www.facebook.com/fh5co
//////////////////////////////////////////////////////
-->
<script src="js/modernizr-2.6.2.min.js"></script>
<!--[if lt IE 9]>
<script src="js/respond.min.js"></script>
<![endif]-->
</head>
<body>
<div class="container">
<!-- <div id="fh5co-menu-logo"> -->
<li><a
href="OwnerHome.aspx">Home</a></li>
<li class="active"><a
href="FileUpload.aspx">File Upload</a></li>
<li>
<ul class="fh5co-sub-menu">
</ul>
</li>
<li><a href="Home.aspx">Logout</a></li>
</ul>
</nav>
</div>
</header>
<div id="fh5co-hero">
<div class="overlay"></div>
<!-- End fh5co-arrow -->
<div class="container">
<div class="col-md-12">
<div class="fh5co-hero-wrap">
<div class="fh5co-hero-intro">
<div class="container">
<div class="row">
<div class="col-md-8">
<div class="col-md-12">
<div class="form-group">
<table>
<tr>
<td>
</td>
</tr>
<tr>
<td>
</td>
</tr>
<tr>
<td>
</td>
</tr>
<tr>
<td>
</td>
<asp:Button ID="Button_keygenerate"
runat="server" Text="Generate Key" class="btn btn-primary btn-lg"
OnClick="Button_keygenerate_Click"/>
</td>
</tr>
<tr>
<td>
</td>
</tr>
<tr>
<td>
<asp:FileUpload ID="FileUpload1"
runat="server" class="form-control input-lg"/><br />
</td>
</tr>
<tr>
<td>
<asp:DropDownList ID="DropDownList1"
runat="server" class="form-control input-lg"></asp:DropDownList><br />
</td>
</tr>
<tr>
<td>
<asp:Button ID="Button_fileupload"
runat="server" Text="Upload" class="btn btn-primary btn-lg"
OnClick="Button_fileupload_Click" />
</td>
</tr>
</table>
</form>
<div class="col-md-12">
<div class="form-group">
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<script src="js/jquery-1.10.2.min.js"></script>
<script src="js/jquery.easing.1.3.js"></script>
<script src="js/bootstrap.js"></script>
<script src="js/owl.carousel.min.js"></script>
<script src="js/jquery.magnific-popup.min.js"></script>
<!-- Superfish -->
<script src="js/hoverIntent.js"></script>
<script src="js/superfish.js"></script>
<script src="js/easyResponsiveTabs.js"></script>
<script src="js/fastclick.js"></script>
<script src="js/jquery.parallax-scroll.min.js"></script>
<script src="js/jquery.waypoints.min.js"></script>
<script src="js/main.js"></script>
</body>
</html>
FileUpload.aspx.cs:
using System;
using System.Collections.Generic;
using System.Linq;
using System.Web;
using System.Web.UI;
using System.Web.UI.WebControls;
using System.IO;
using System.Text;
using System.Security.Cryptography;
using System.Configuration;
using System.Data;
using System.Data.SqlClient;
using System.IO.Compression;
string mergeFolder;
if(!IsPostBack)
fileid();
dl_secure();
if(Session["OwnerName"]!=null)
TextBox5.Text = Session["OwnerName"].ToString();
SqlCommand cmd;
SqlDataAdapter da;
DataTable dt = new DataTable();
string a="";
con.Open();
SqlDataReader dr;
dr = cmd.ExecuteReader();
if(dr.Read())
a = dr[0].ToString();
int b = int.Parse(a);
TextBox1.Text = (1 + b).ToString();
else
{
TextBox1.Text = "1";
con.Close();
DropDownList1.Items.Add("Public");
DropDownList1.Items.Add("Private");
char[] chararr =
"0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWX
YZ".ToCharArray();
if (!strrandom.Contains(chararr.GetValue(pos).ToString()))
strrandom += chararr.GetValue(pos);
else
i--;
TextBox3.Text = strrandom;
char[] chararr1 =
"OPQRSTUVWXYZabcdefghijklmn0123456789opqrstuvwxyzABCDEFGHIJKL
MN".ToCharArray();
string strrandom1 = string.Empty;
if (!strrandom1.Contains(chararr1.GetValue(pos).ToString()))
strrandom1 += chararr1.GetValue(pos);
else
j--;
TextBox4.Text = strrandom1;
try
mergeFolder = Path.GetDirectoryName(SourceFile);
int bytesRead = 0;
outputFile.Write(buffer, 0, bytesRead);
Packets.Add(packet);
outputFile.Close();
fs.Close();
return Split;
if (FileUpload1.HasFile)
provider.Key = ASCIIEncoding.ASCII.GetBytes("11224488");
provider.IV = ASCIIEncoding.ASCII.GetBytes("11224488");
inputStream.Read(byteInput, 0, byteInput.Length);
inputStream.Close();
compStream.WriteByte((byte)theByte);
theByte = sourceFile.ReadByte();
finally
compStream.Dispose();
cmd.Parameters.AddWithValue("@Name", Name);
cmd.Parameters.AddWithValue("@File", filename);
cmd.Parameters.AddWithValue("@Type", "application/word");
cmd.Parameters.AddWithValue("@Data", size);
cmd.Parameters.AddWithValue("@Key1", key1);
cmd.Parameters.AddWithValue("@Key2", key2);
cmd.Parameters.AddWithValue("@Secure", Secure);
cmd.Parameters.AddWithValue("@OwnerName",TextBox5.Text);
cmd.ExecuteNonQuery();
con.Close();
con.Open();
cmd = new SqlCommand("insert into
Server1(FileName,UploadFile)values(@Name,@File)", con);
cmd.Parameters.AddWithValue("@Name", Name);
cmd.Parameters.AddWithValue("@File", filename1);
cmd.ExecuteNonQuery();
con.Close();
con.Open();
cmd.Parameters.AddWithValue("@Name", Name);
cmd.Parameters.AddWithValue("@File", filename2);
cmd.ExecuteNonQuery();
con.Close();
con.Open();
cmd.Parameters.AddWithValue("@File", filename3);
cmd.ExecuteNonQuery();
con.Close();
TextBox2.Text = "";
TextBox3.Text = "";
TextBox4.Text = "";
fileid();
else
}
}
SCREENSHOTS:
User Login
Admin login:
File view
File UPload:
Admin Verification corner:
Conclusion:
We proposed a hybrid scheme that combines public key encryption and somewhat
homomorphic encryption. The proposed scheme is suitable for cloud computing
environments since it has small bandwidth, low storage requirement, and supports
efficient computing on encrypted data. Our solution provides a trade-off between
the size of the transmitted ciphertexts and the conversion costs. While the
ciphertext expansion of PKE is larger than that of AES, it can be homomorphically
evaluated with a SHE of much smaller multiplicative depth. The parameters of our
hybrid scheme are very large when the message space of the underlying FHE is
ZN. For an efficient implementation, we need a method to evaluate mod N
arithmetic using an FHE whose message space is ZM for small.
Future Enhancement:
References: