SlideShare a Scribd company logo
1 of 46
Presenting By :
YashKruk
 Introduction
 System Architecture
 System Specifications
 Modules
 UML Diagrams
 Screen Results
 Testing
 Conclusion
 Cloud computing provides a flexible and convenient
way for data sharing, which brings various benefits for
both the society and individuals. But there exists a
natural resistance for users to directly outsource the
shared data to the cloud server since the data often
contain valuable information. Thus, it is necessary to
place cryptographically enhanced access control on the
shared data. Identity-based encryption is a promising
cryptographical primitive to build a practical data
sharing system. However, access control is not static.
That is, when some user’s authorization is expired, there
should be a mechanism that can remove him/her from
the system.
 We propose a notion called Revocable-
Storage Identity-Based Encryption (RS-IBE),
which can provide the forward/backward
security of ciphertext by introducing the
functionalities of user revocation and
ciphertext update simultaneously.RS-IBE
scheme has advantages in terms efficiency
and cost-effective data-sharing system.
Finally, we provide implementation results of
the proposed scheme to demonstrate its
practicability.
 Boneh and Franklin first proposed a natural revocation way
for IBE. They appended the current time period to the
ciphertext, and non-revoked users periodically received
private keys for each time period from the key authority.
 Boldyreva, Goyal and Kumar introduced a novel approach to
achieve efficient revocation. They used a binary tree to
manage identity such that their RIBE scheme reduces the
complexity of key revocation to logarithmic (instead of
linear) in the maximum number of system users.
 Subsequently, by using the aforementioned revocation
technique, Libert and Vergnaud proposed an adaptively
secure RIBE scheme based on a variant ofWater’s IBE
scheme.
 Unfortunately, existing solution is not scalable, since it
requires the key authority to perform linear work in the
number of non-revoked users. In addition, a secure
channel is essential for the key authority and non-revoked
users to transmit new keys.
 However, existing scheme only achieves selective
security.
 Furthermore, to update the ciphertext, the key authority
in their scheme needs to maintain a table for each user to
produce the re-encryption key for each time period,
which significantly increases the key authority’s
workload.
 It seems that the concept of revocable
identity-based encryption (RIBE) might be a
promising approach that fulfills the
aforementioned security requirements for data
sharing.
 RIBE features a mechanism that enables a
sender to append the current time period to the
ciphertext such that the receiver can decrypt
the ciphertext only under the condition that
he/she is not revoked at that time period.
 A RIBE-based data sharing system works as follows:
 Step 1: The data provider (e.g., admin) first decides the
users (e.g., yash and nandini) who can share the data.
Then, admin encrypts the data under the identities yash
and nandini, and uploads the ciphertext of the shared
data to the cloud server.
 Step 2: In some cases, e.g., yash’s authorization gets
expired, admin can download the ciphertext of the shared
data, and then decrypt-then-re-encrypt the shared data
such that yash is prevented from accessing the plaintext
of the shared data, and then upload the re-encrypted data
to the cloud server again.
 We provide formal definitions for RS-IBE and
its corresponding security model.
 We present a concrete construction of RS-IBE.
 The proposed scheme can provide confidentiality
and backward/forward secrecy simultaneously.
 System : Pentium Dual Core.
 Hard Disk : 120 GB.
 Monitor : 15’’ LED
 Input Devices : Keyboard, Mouse
 RAM : 1GB.
 Operating system : Windows 7.
 Coding Language : JAVA/J2EE
 Tool : Netbeans 7.3.1
 Database : MYSQL
System Construction Module
Data Provider
Cloud User
Key Authority (Auditor)
 In the first module, we develop the proposed
system with the required entities for the
evaluation of the proposed model.
 The data provider (e.g., admin) first decides the
users (e.g.,yash and nandini) who can share
the data.
 Then, admin encrypts the data under the
identities yash and nandini, and uploads the
ciphertext of the shared data to the cloud
server.
 The Data Provider module is developed such
that the new users will Signup initially and then
Login for authentication.
 The Data Provider module provides the option
of uploading the file to the Cloud Server using
Identity-Based Encryption.
 Data Provider is provided with the feature of
Revocation and Ciphertext update of the file.
Once after completion of this process, the Data
Provider logsout of the session.
 The Cloud user module is developed such that
the new users will Signup initially and then
Login for authentication.
 The Cloud user is provided with the option of
file search. Then cloud user feature is added up
for send the Request to Auditor for the File
access.
 After getting decrypt key from the Auditor,
he/she can access to the File. The cloud user is
also enabled to download the File. After
completion of the process, the user logout the
session.
 Auditor Will Login on the Auditor's page.
He/she will check the pending requests of
any User.
 After accepting the request from the User,
he/she will generate master key for encrypt
and Secret key for decrypt.
 After the complete process, the Auditor
logout the session.
Types of Testing:
Unit Testing
Integration Testing
Acceptance Testing
 Unit testing involves the design of test cases that validate
that the internal program logic is functioning properly,
and that program inputs produce valid outputs.
Test objectives
 All field entries must work properly.
 Pages must be activated from the identified link.
Features to be tested
 Verify that the entries are of the correct format
 No duplicate entries should be allowed
 Integration tests are designed to test
integrated software components to
determine if they actually run as one
program.
 Integration testing is specifically aimed at
exposing the problems that arise from the
combination of components.
 User Acceptance Testing is a critical phase of
any project and requires significant
participation by the end user. It also ensures
that the system meets the functional
requirements.
 Cloud computing brings great convenience
for people. Particularly, it perfectly matches
the increased need of sharing data over the
Internet.
 To build a cost-effective and secure data
sharing system in cloud computing, we
proposed a notion called RS-IBE, which
supports identity revocation and cipher text
update.
 In our future work, we add the concept of
data deduplication.
 Data deduplication is a special data
compression technique for eliminating
duplicate copies of repeated data.
 We consider file size, file name and file type
for data deduplication and we can achieve
storage area and storage cost.
 Jianghong Wei, Wenfen Liu, Xuexian Hu,
“Secure Data Sharing in Cloud Computing
Using Revocable-Storage Identity-Based
Encryption”, IEEE Transactions on Cloud
Computing 2016.
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption

More Related Content

What's hot

Billing software
Billing softwareBilling software
Billing software
Varun Jain
 
Smart quill seminar report final
Smart quill seminar report finalSmart quill seminar report final
Smart quill seminar report final
Pramod Kumar
 
(Final)Deleverable I_Final
(Final)Deleverable I_Final(Final)Deleverable I_Final
(Final)Deleverable I_Final
Arslan Mehmood
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
Prince Chandu
 
Publish subscribe model overview
Publish subscribe model overviewPublish subscribe model overview
Publish subscribe model overview
Ishraq Al Fataftah
 

What's hot (20)

Attendance Management System using Face Recognition
Attendance Management System using Face RecognitionAttendance Management System using Face Recognition
Attendance Management System using Face Recognition
 
Billing software
Billing softwareBilling software
Billing software
 
Jini technology ppt
Jini technology pptJini technology ppt
Jini technology ppt
 
Human Activity Recognition using Smartphone's sensor
Human Activity Recognition using Smartphone's sensor Human Activity Recognition using Smartphone's sensor
Human Activity Recognition using Smartphone's sensor
 
Brain gate
Brain gateBrain gate
Brain gate
 
What Is Serverless Computing
What Is Serverless ComputingWhat Is Serverless Computing
What Is Serverless Computing
 
Smart note-taker
Smart note-takerSmart note-taker
Smart note-taker
 
Virtualization in Cloud Computing and Machine reference Model
Virtualization in Cloud Computing and Machine reference ModelVirtualization in Cloud Computing and Machine reference Model
Virtualization in Cloud Computing and Machine reference Model
 
5 Pen PC technology seminar report
5 Pen PC technology seminar report5 Pen PC technology seminar report
5 Pen PC technology seminar report
 
Neuralink technical seminar
Neuralink technical seminarNeuralink technical seminar
Neuralink technical seminar
 
Green cloud computing
Green cloud computingGreen cloud computing
Green cloud computing
 
Smart quill seminar report final
Smart quill seminar report finalSmart quill seminar report final
Smart quill seminar report final
 
Synopsis for Online Railway Railway Reservation System
Synopsis for Online Railway Railway Reservation SystemSynopsis for Online Railway Railway Reservation System
Synopsis for Online Railway Railway Reservation System
 
Cs6703 grid and cloud computing unit 5
Cs6703 grid and cloud computing unit 5Cs6703 grid and cloud computing unit 5
Cs6703 grid and cloud computing unit 5
 
Ecg analysis in the cloud
Ecg analysis in the cloudEcg analysis in the cloud
Ecg analysis in the cloud
 
(Final)Deleverable I_Final
(Final)Deleverable I_Final(Final)Deleverable I_Final
(Final)Deleverable I_Final
 
Voice morphing-
Voice morphing-Voice morphing-
Voice morphing-
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
 
Exploring online scheduling applications
Exploring online scheduling applicationsExploring online scheduling applications
Exploring online scheduling applications
 
Publish subscribe model overview
Publish subscribe model overviewPublish subscribe model overview
Publish subscribe model overview
 

Similar to Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption

Ensuring distributed accountability
Ensuring distributed accountabilityEnsuring distributed accountability
Ensuring distributed accountability
Nandini Chandran
 
Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01
Nitish Bhardwaj
 
Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01
Nitish Bhardwaj
 
Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01
Nitish Bhardwaj
 
Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01
Nitish Bhardwaj
 

Similar to Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption (20)

Ensuring distributed accountability
Ensuring distributed accountabilityEnsuring distributed accountability
Ensuring distributed accountability
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
 
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
Attribute-Based Encryption for Access of Secured Data in Cloud StorageAttribute-Based Encryption for Access of Secured Data in Cloud Storage
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
 
Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure clouds
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
 
Secure Data Storage and Forwarding in Cloud Using AES and HMAC
Secure Data Storage and Forwarding in Cloud Using AES and HMACSecure Data Storage and Forwarding in Cloud Using AES and HMAC
Secure Data Storage and Forwarding in Cloud Using AES and HMAC
 
JPJ1424 Privacy-Preserving and Content-Protecting Location Based Queries
JPJ1424  Privacy-Preserving and Content-Protecting Location Based QueriesJPJ1424  Privacy-Preserving and Content-Protecting Location Based Queries
JPJ1424 Privacy-Preserving and Content-Protecting Location Based Queries
 
publishable paper
publishable paperpublishable paper
publishable paper
 
Pp1t
Pp1tPp1t
Pp1t
 
Pp1t
Pp1tPp1t
Pp1t
 
Pp1t
Pp1tPp1t
Pp1t
 
Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01
 
Pp1t
Pp1tPp1t
Pp1t
 
Pp1t
Pp1tPp1t
Pp1t
 
Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01
 
Pp1t
Pp1tPp1t
Pp1t
 
Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01
 
Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01
 
Pp1t
Pp1tPp1t
Pp1t
 

Recently uploaded

The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
shinachiaurasa2
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
masabamasaba
 
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
chiefasafspells
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
masabamasaba
 

Recently uploaded (20)

The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
 
tonesoftg
tonesoftgtonesoftg
tonesoftg
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
 
%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
 
Artyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptxArtyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptx
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the past
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
 

Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption

  • 2.  Introduction  System Architecture  System Specifications  Modules  UML Diagrams  Screen Results  Testing  Conclusion
  • 3.  Cloud computing provides a flexible and convenient way for data sharing, which brings various benefits for both the society and individuals. But there exists a natural resistance for users to directly outsource the shared data to the cloud server since the data often contain valuable information. Thus, it is necessary to place cryptographically enhanced access control on the shared data. Identity-based encryption is a promising cryptographical primitive to build a practical data sharing system. However, access control is not static. That is, when some user’s authorization is expired, there should be a mechanism that can remove him/her from the system.
  • 4.  We propose a notion called Revocable- Storage Identity-Based Encryption (RS-IBE), which can provide the forward/backward security of ciphertext by introducing the functionalities of user revocation and ciphertext update simultaneously.RS-IBE scheme has advantages in terms efficiency and cost-effective data-sharing system. Finally, we provide implementation results of the proposed scheme to demonstrate its practicability.
  • 5.  Boneh and Franklin first proposed a natural revocation way for IBE. They appended the current time period to the ciphertext, and non-revoked users periodically received private keys for each time period from the key authority.  Boldyreva, Goyal and Kumar introduced a novel approach to achieve efficient revocation. They used a binary tree to manage identity such that their RIBE scheme reduces the complexity of key revocation to logarithmic (instead of linear) in the maximum number of system users.  Subsequently, by using the aforementioned revocation technique, Libert and Vergnaud proposed an adaptively secure RIBE scheme based on a variant ofWater’s IBE scheme.
  • 6.  Unfortunately, existing solution is not scalable, since it requires the key authority to perform linear work in the number of non-revoked users. In addition, a secure channel is essential for the key authority and non-revoked users to transmit new keys.  However, existing scheme only achieves selective security.  Furthermore, to update the ciphertext, the key authority in their scheme needs to maintain a table for each user to produce the re-encryption key for each time period, which significantly increases the key authority’s workload.
  • 7.  It seems that the concept of revocable identity-based encryption (RIBE) might be a promising approach that fulfills the aforementioned security requirements for data sharing.  RIBE features a mechanism that enables a sender to append the current time period to the ciphertext such that the receiver can decrypt the ciphertext only under the condition that he/she is not revoked at that time period.
  • 8.  A RIBE-based data sharing system works as follows:  Step 1: The data provider (e.g., admin) first decides the users (e.g., yash and nandini) who can share the data. Then, admin encrypts the data under the identities yash and nandini, and uploads the ciphertext of the shared data to the cloud server.  Step 2: In some cases, e.g., yash’s authorization gets expired, admin can download the ciphertext of the shared data, and then decrypt-then-re-encrypt the shared data such that yash is prevented from accessing the plaintext of the shared data, and then upload the re-encrypted data to the cloud server again.
  • 9.  We provide formal definitions for RS-IBE and its corresponding security model.  We present a concrete construction of RS-IBE.  The proposed scheme can provide confidentiality and backward/forward secrecy simultaneously.
  • 10.
  • 11.  System : Pentium Dual Core.  Hard Disk : 120 GB.  Monitor : 15’’ LED  Input Devices : Keyboard, Mouse  RAM : 1GB.
  • 12.  Operating system : Windows 7.  Coding Language : JAVA/J2EE  Tool : Netbeans 7.3.1  Database : MYSQL
  • 13. System Construction Module Data Provider Cloud User Key Authority (Auditor)
  • 14.  In the first module, we develop the proposed system with the required entities for the evaluation of the proposed model.  The data provider (e.g., admin) first decides the users (e.g.,yash and nandini) who can share the data.  Then, admin encrypts the data under the identities yash and nandini, and uploads the ciphertext of the shared data to the cloud server.
  • 15.  The Data Provider module is developed such that the new users will Signup initially and then Login for authentication.  The Data Provider module provides the option of uploading the file to the Cloud Server using Identity-Based Encryption.  Data Provider is provided with the feature of Revocation and Ciphertext update of the file. Once after completion of this process, the Data Provider logsout of the session.
  • 16.  The Cloud user module is developed such that the new users will Signup initially and then Login for authentication.  The Cloud user is provided with the option of file search. Then cloud user feature is added up for send the Request to Auditor for the File access.  After getting decrypt key from the Auditor, he/she can access to the File. The cloud user is also enabled to download the File. After completion of the process, the user logout the session.
  • 17.  Auditor Will Login on the Auditor's page. He/she will check the pending requests of any User.  After accepting the request from the User, he/she will generate master key for encrypt and Secret key for decrypt.  After the complete process, the Auditor logout the session.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39. Types of Testing: Unit Testing Integration Testing Acceptance Testing
  • 40.  Unit testing involves the design of test cases that validate that the internal program logic is functioning properly, and that program inputs produce valid outputs. Test objectives  All field entries must work properly.  Pages must be activated from the identified link. Features to be tested  Verify that the entries are of the correct format  No duplicate entries should be allowed
  • 41.  Integration tests are designed to test integrated software components to determine if they actually run as one program.  Integration testing is specifically aimed at exposing the problems that arise from the combination of components.
  • 42.  User Acceptance Testing is a critical phase of any project and requires significant participation by the end user. It also ensures that the system meets the functional requirements.
  • 43.  Cloud computing brings great convenience for people. Particularly, it perfectly matches the increased need of sharing data over the Internet.  To build a cost-effective and secure data sharing system in cloud computing, we proposed a notion called RS-IBE, which supports identity revocation and cipher text update.
  • 44.  In our future work, we add the concept of data deduplication.  Data deduplication is a special data compression technique for eliminating duplicate copies of repeated data.  We consider file size, file name and file type for data deduplication and we can achieve storage area and storage cost.
  • 45.  Jianghong Wei, Wenfen Liu, Xuexian Hu, “Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption”, IEEE Transactions on Cloud Computing 2016.