In software development literature survey is considered to be the most important factor

In software development literature survey is considered to be the most important factor. Before developing any tool it is really important to determine many things such as economy, its advantage, disadvantage, its opportunities in the near future and many more such considerations are to be taken. Once these things are satisfied, then next steps are to determinewhichoperatingsystemandlanguagecanbeusedfordevelopingthetool.

Cloud Computing
Cloud computing provides an unlimited platform and infrastructure to store and execute and secure the clients or the customers data and program. As a customer it is not required that you have to own the system or the infrastructure as a whole, they can just be accessed or rented; adding as an advantage to the customer using it minimizing the tendency to decrease the expenditure.
Instead of running the data individually in one computer or even in several; they are hosted in the “cloud ‘—computers and servers assemblage accessed via the Internet. Cloud computing lets you access all the documents, data’s and application from anywhere in the world, making it free for the people to be confined in the desktop only and making it easy for the people indifferent parts of the world to collaborate.

Best services for writing your paper according to Trustpilot

Premium Partner
From $18.00 per page
4,8 / 5
4,80
Writers Experience
4,80
Delivery
4,90
Support
4,70
Price
Recommended Service
From $13.90 per page
4,6 / 5
4,70
Writers Experience
4,70
Delivery
4,60
Support
4,60
Price
From $20.00 per page
4,5 / 5
4,80
Writers Experience
4,50
Delivery
4,40
Support
4,10
Price
* All Partners were chosen among 50+ writing services by our Customer Satisfaction Team

2.2 EXITING SYSTEM

Firstly, traditional cryptographic primitives for the purpose of data security protection cannot be directly adopted due to the users’ loss control of data under Cloud Computing. Whenever it comes to the matter relating to cloud services the user is put at a disadvantage regarding to the security of the file. Basically the file is stored on a server which is a pool resource that is any one with user’s credentials can access the file and if in case the attacker comes to know about the password as well as the encryption keys the attacker can modify the file contents, thus making the information stored in the file to be accessed by the unauthorized user. So, the problem is that what if someone copy’s your work and claims to be his own work. Anything we design, anything we invent is governed by the principle of whether or not it guarantees customer satisfaction.
Hence, the problem is underlying whether the customer can rest assured that his data is safe from unauthorized access or not.

2.3 PROPOSED SYSTEM

In our purposed system, we provide assurance to the user that his information is safe by “implementing a system which provides security mechanisms by offering three levels of security”. Concerning about the data security part, our system is divided mainly into three modules named “ip triggering” module, “client-authentication” module and “redirecting” module. The system generates a user password and a key which is used for client authentication.
The algorithm generates two keywords 8 bit length consisting of combinations of characters, special characters, and numbers which is used for client authorization and file authorization.
Questions may arise as why do we use keys of 8 bit length only? The purpose of our system is to prevent illegal data access if the users’ credential are compromised. By testing against weak algorithms which are easier to crack we design our system to be more robust.
Advantages:
• Our scheme would be to prevent illegal access of users’ data.
• Inform the user that his data has been accessed from an unregistered ip.
• The attacker is provided with the access of the fake file.
2.4 SOFTWARE DESCRIPTIONS

2.4.1 JAVA

Java is a programming language (general-purpose) that is class based, object oriented, concurrent and the one that is designed specifically to have fewer dependencies in implementation as much as possible.
The code that are written in java i.e. the java code can run on any of the platforms that just support java but without having them to be recompiled once and again. Due to this ability it lets the application developers to write once but read anywhere.
The java codes are mostly compiled as byte code that are capable of running in any of the java virtual machines (JVM) regardless of what the computer architecture is. We discuss the concept of java as below.
Java was designed to use the concept of look and feel of the C++ language. But also, it is easier to use and it also enforces an object-oriented programming model. We already know that java is capable of creating complete applications that can run in a single computer or can be distributed across multiple servers and different clients in a network.

Package in JAVA:

Package in java is a mechanism or a process to encapsulate a group of classes, interfaces and also sub-packages.
Packages are used for multiple purpose that are:
• It prevents the naming conflicts. Example there can be two classes with the same name in any of the two packages, considering it to be Student i.e. campus member cse Student and campus member ee Student.
• Packages can be used as data encapsulation (Data-hiding).
• It provides control access.
• It makes searching of interfaces, classes, enumerations,, and notations easier.