Sunteți pe pagina 1din 7

CERTIFICATE

This is to certify that this project work entitled “A Three Layer Privacy
Preserving Secure Cloud Storage Based on Fog Computing” is the bonafide
work carried out by Ms.Syeda Kaleem Fatima (160315737020) in partial
fulfilment of the requirement for the award of degree of BACHELOR OF
ENGINEERING IN INFORMATION TECHNOLOGY by the OSMANIA
UNIVERSITY ,Hyderabad under our guidance and supervision.

The results embodied in this report have not been submitted to any other
university or institute for the award of the any other degree or diploma.

Internal Guide ` Head of the Department


Mir Mustafa Ali Mrs.Ayesha Ameen
Assistant professor HOD
Department of I.T Department of I.T
DCET, Hyderabad DCET, Hyderabad
DECLARATION

This is to certify that the work reported in the present project entitled “A Three
Layer Privacy Preserving Secure Cloud Storage Based on Fog Computing” is a
record of work done by us in the Department of Information Technology, Deccan
College of Engineering and Technology, Osmania University. The reports are based
on the project work done entirely by us and not copied from any other source.

Ms. Syeda Kaleem Fatima

ii
ACKNOWLEDGEMENT

I would like to express my sincere gratitude and indebtedness to my project


supervisor Mir Mustafa Ali for his/her valuable suggestions and interest throughout
the course of this project.

I am also thankful to Head of the department for providing excellent infrastructure


and a nice atmosphere for completing this project successfully.
I convey my heartfelt thanks to the lab staff for allowing me to use the required
equipment whenever needed.

Finally, I would like to take this opportunity to thank my family for their support
through the work. I sincerely acknowledge and thank all those who gave directly or
indirectly their support in completion of this work.

Ms. Syeda kaleem Fatima

LIST OF FIGURES

iii
Figure Fig name Page. no

1.1.1 Structure of cloud computing 3


1.1.2 Characteristics of cloud computing 4
1.1.3 Structure of cloud service modules 5
1.6.1 Java executing process 10
1.6.2 Java compiler 10
1.6.3 Java sample code 11
1.6.4 Java 2SDK 13
1.6.5 TCP/IP 18
1.6.6 32 bit address 20
1.6.7 J2ME architecture 22
3.2 Architecture diagram 39
4.1.1 DFD of User 41
4.1.2 DFD of Fog 41
4.1.3 DFD of Cloud 42
4.2.1 Class diagram 43
4.2.2.1 Sequence diagram of User 44
4.2.2.2 Sequence diagram of Fog 44
4.2.2.3 Sequence diagram of Cloud 45
4.2.2.4 Collaboration diagram of User 45
4.2.2.5 Collaboration diagram of Fog 46
4.2.2.6 Collaboration diagram of Cloud 46
4.2.3 Object diagram 47
4.2.4.1 Use case diagram of User 47
4.2.4.2 Use case diagram of Fog 48
4.2.4.3 Use case diagram of Cloud 48
4.3 E-R diagram 49
4.4.1 Flow chart of stored procedure 50
4.4.2 Flow chart of download procedure 51
5.1.1 Diagram of download procedure 57
5.1.2 Original vs. Hash transformation 57
6.3.1 Home page 83
6.3.2 User Registration 83
6.3.3 User login 84
6.3.4 User Home 84
6.3.5 User Upload 85
6.3.6 User Encrypt 85
6.3.6.1 User Encrypt 1 86
6.3.7 99% Data send to fog server 86
6.3.8 Fog Login 87
6.3.9 Fog home 87
6.3.10 95% Data send to Cloud 88
iv
6.3.10.1 Send to cloud 88
6.3.11 Cloud login page 89
6.3.12 Cloud Home Page 89
6.3.13 95% Data Uploaded in Cloud 90
6.3.13.1 Data Uploaded 90
6.3.14 User Requesting File 91
6.3.15 User response files 91
6.3.16 Fog response files 92
6.3.17 Cloud response files 92
6.3.18 User downloads the data 93
6.3.18.1 Data Download 93

v
LIST OF TABLES

Table Table Name Page no.

1.8 Organisation of thesis 26


3.1.1.3 Definition, acronym, abbreviation 34
6.2 Test case with screenshots 80
6.2.1 Test case result 82

vi
ABSTRACT

Recent years witness the development of cloud computing technology .With the
explosive growth of unstructured data, cloud storage technology gets more attention
and better development. However, in current storage schema, user’s data is totally
stored in cloud servers. In other words, users lose their right of control on data and
face privacy leakage risk. Traditional privacy protection schemes are usually based on
encryption technology, but these kinds of methods cannot effectively resist attack
from the inside of cloud server. In order to solve this problem, we propose a three-
layer storage framework based on fog computing. The proposed framework can both
take full advantage of cloud storage and protect the privacy of data. Besides, Hash-
Solomon code algorithm is designed to divide data into different parts. Then, we can
put a small part of data in local machine and fog server in order to protect the privacy.
Moreover, based on computational intelligence, this algorithm can compute the
distribution proportion stored in cloud, fog, and local machine, respectively. Through
the theoretical safety analysis and experimental evaluation, the feasibility of our
scheme has been validated, which is really a powerful supplement to existing cloud
storage scheme.

vii

S-ar putea să vă placă și