SlideShare a Scribd company logo
1 of 9
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 556
CLOUD STORAGE AUDITING PROTOCOL WITH VERIFIABLE
OUTSOURCING OF KEY UPDATES
Mr. S. NAGARAJU, Mr. S. AKILENDRANATH, Mr. BIMAL KUMAR, Mr. P. GANGADHARA.
-----------------------------------------------------------------***------------------------------------------------------------------
ABSTRACT - Key-exposure resistance has dependably
been an imperative issue for top to bottom digital
protection in numerous security applications. As of late,
how to manage the key exposure issue in the settings of
cloud storage auditing has been proposed and
contemplated. To address the test, existing arrangements
all require the customer to update his mystery keys in each
day and age, which may unavoidably acquire new nearby,
weights to the customer, particularly those with
constrained calculation assets, for example, cell phones.
In this paper, we concentrate on the most proficient
method to make the key updates as straightforward as
workable for the customer and propose another paradigm
called cloud storage auditing with evident outsourcing of
key updates. In this paradigm, key updates can be securely
outsourced to some approved party, and therefore the key-
update trouble on the customer will be kept negligible.
Specifically, we use the third party auditor (TPA) in many
existing open auditing designs, let it assume the part of
approved party for our situation, and make it responsible
for both the storage auditing and the safe key updates for
key-exposure resistance. The customer just needs to
download the scrambled mystery key from the TPA while
transferring new records to cloud. In addition, our outline
additionally furnishes the customer with capacity to
additionally confirm the legitimacy of the scrambled
mystery keys gave by the TPA. All these striking highlights
are painstakingly intended to make the entire auditing
strategy with key exposure resistance as straightforward
as feasible for the customer. We formalize the definition
and the security model of this paradigm. The security
evidence and the execution recreation demonstrate that
our point by point outline instantiations are secure and
proficient.
Keywords: Cloud storage, outsourcing computing, cloud
storage auditing, key update, verifiability
1. INTRODUCTION
The motivation behind testing is to find blunders. Testing
is the way toward attempting to find each possible fault or
shortcoming in a work item. It gives an approach to check
the usefulness of segments, sub gatherings, congregations
as well as a completed item It is the way toward practicing
software with the goal of guaranteeing that the Software
framework lives up to its prerequisites and client desires
and does not bomb in an unsatisfactory way. There are
different sorts of test. Each test sort tends to a particular
testing prerequisite.
2. CLASSIFICATION OF TESTING
Unit Testing:
Unit testing includes the plan of experiments that approve
that the interior program rationale is working
appropriately, and that program inputs create legitimate
yields. All choice branches and interior code stream ought
to be approved. It is the testing of individual software units
of the application .it is done after the fulfillment of an
individual unit before combination. This is an auxiliary
testing, that depends on learning of its development and is
obtrusive. Unit tests perform fundamental tests at part
level and test a particular business process, application, as
well as system arrangement. Unit tests guarantee that
every one of a kind way of a business procedure performs
precisely to the archived determinations and contains
plainly characterized inputs and expected outcomes.
Coordination Testing: Coordination tests are intended to
test incorporated software parts to decide whether they
really keep running as one program. Testing is occasion
driven and is more worried about the fundamental result
of screens or fields. Coordination tests exhibit that in spite
of the fact that the parts were separately fulfillment, as
appeared by effectively unit testing, the mix of segments is
right and predictable. Incorporation testing is particularly
gone for uncovering the issues that emerge from the mix of
segments.
Functional Testing: Functional tests give systematic
exhibits that capacities tried are accessible as determined
by the business and specialized prerequisites, system
documentation, and client manuals.
Functional testing is fixated on the accompanying
things:
Substantial Input: distinguished classes of legitimate
information must be acknowledged.
Invalid Input: recognized classes of invalid info must be
rejected.
Capacity: recognized capacities must be worked out.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 557
Yield: distinguished classes of use yields must be worked
out.
Systems/Procedures: interfacing systems or techniques
must be summoned.
Organization and planning of functional tests is centered
around prerequisites, key capacities, or extraordinary
experiments. Furthermore, systematic scope relating to
distinguish Business process streams; information fields,
predefined forms, and progressive procedures must be
considered for testing. Before functional testing is finished,
extra tests are distinguished and the compelling
estimation of current tests is resolved.
System Testing: System testing guarantees that the whole
coordinated software system meets prerequisites. It tests a
setup to guarantee known and unsurprising outcomes. A
case of system testing is the arrangement situated system
incorporation test. System testing depends on process
depictions and streams, underlining pre-driven process
connections and combination focuses.
Hite Box Testing: White Box Testing is a testing in which in
which the software analyzer knows about the internal
workings, structure and dialect of the software, or if
nothing else its motivation. It is reason. It is utilized to test
regions that can't be come to from a discovery level.
Black Box Testing:
Black Box Testing will be testing the software with no
learning of the inward workings, structure or dialect of the
module being tried. Black box tests, as most different sorts
of tests, must be composed from an authoritative source
report, for example, detail or necessities archive, for
example, particular or prerequisites record. It is a testing
in which the software under test is dealt with, as a black
box .you can't "see" into it. The test gives information
sources and reacts to yields without considering how the
software functions.
Unit Testing:
Unit testing is typically directed as a major aspect of a
consolidated code and unit test period of the software
lifecycle, despite the fact that it isn't remarkable for coding
and unit testing to be led as two particular stages.
Test system and approach
Field testing will be performed physically and functional
tests will be composed in detail.
Test targets
• All field passages must work legitimately.
• Pages must be enacted from the recognized connection.
• The section screen, messages and reactions must not be
postponed.
Highlights to be tried
• Verify that the passages are of the right organization
• No copy passages ought to be permitted
• All connections should take the client to the right page.
Coordination Testing:
Software incorporation testing is the incremental
combination testing of at least two coordinated software
segments on a solitary stage to create disappointments
caused by interface defects. The errand of the
reconciliation test is to watch that segments or software
applications, e.g. segments in a software system or – one
stage up – software applications at the organization level –
cooperate without blunder.
Test outcomes: All the experiments specified above passed
effectively. No imperfections experienced.
Acknowledgment Testing:
Client Acceptance Testing is a basic period of any venture
and requires noteworthy support by the end client. It
additionally guarantees that the system meets the
functional prerequisites.
Test outcomes: All the experiments said above passed
effectively. No imperfections experienced.
2 SCREEN SHOTS
1 Home page
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 558
2 cloud server login page
3 Abstract page
4 Data owner & authorize page
5 Transactions page
6 Search history page
7 Results details
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 559
8 TTP login page
9 View meta data
10 View all files page
11 Time key update page
5.12 Data owner registration page
13 Data owner login
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 560
14 Data owner & authorize persons view
15 Upload file page
5.16 Choosing a file
17 file uploaded
18 successfully data uploaded
19 View files
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 561
20 Data owner files stored in cloud server
21 Encrypted sk
22 Old & new sk’s
23 Verify file
24 Attack file
25 Attack file owner
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 562
26 End user registration
27 end user login
28 view end user
29 Search file by using key
30 Request file
31 Results details
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 563
32 Download file
33 view transactions
FUTURE ENHANCEMENT:
 We expectation to propose day and age key not to be
founded on operations rather unequivocally prescribe
producing day and age key in view of logging.

 Time period key ought to be created with long time to
maintain a strategic distance from time utilization of
successive changing of keys.
 The key produced ought to be created naturally in
light of sometime detail.
CONCLUSION
The study on how to deal with the client’s key exposure in
cloud storage auditing. We propose a new paradigm called
auditing protocol with key-exposure resilience. In such a
protocol, the integrity of the data previously stored in
cloud can still be verified even if the client’s current secret
key for cloud storage auditing is exposed.
We formalize the definition and the security model of
auditing protocol with key-exposure resilience, and then
propose the first practical solution. The security proof and
the asymptotic performance evaluation show that the
proposed protocol is secure and efficient.
REFERENCES
[1]. G. Ateniese, R. Burns, R. Curtmola, J. Herring, L.
Kissner, Z. Peterson, and D. Song, “Provable Data
Possession at Untrusted Stores,” Proc. 14th ACM Conf.
Computer and Comm. Security, pp. 598-609, 2007.
[2]. G. Ateniese, R.D. Pietro, L. V. Mancini, and G. Tsudik,
“Scalable and Efficient Provable Data Possession,” Proc.
4th International Conference on Security and Privacy in
Communication Networks, 2008
[3]. F. Sebe, J. Domingo-Ferrer, A. Martinez-balleste, Y.
Deswarte, and J. Quisquater, “Efficient Remote Data In-
tegrity checking in Critical Information Infrastructures,”
IEEE Transactions on Knowledge and Data Engineering,
vol. 20, no. 8, pp. 1-6, 2008.
[4]. R. Curtmola, O. Khan, R. Burns, and G. Ateniese,
“MRPPDP: Multiple-Replica Provable Data Possession,”
Proc. 28th IEEE International Conference on Distributed
Computing Systems, pp. 411-420, 2008.
[5]. H. Shacham and B. Waters, “Compact Proofs of
Retrievability,” Advances in Cryptology-Asiacrypt’08, pp.
90-107, 2008.
[6]. C. Wang, K. Ren, W. Lou, and J. Li, “Toward Publicly
Auditable Secure Cloud Data Storage Services,” IEEE
Network, vol. 24, no. 4, pp. 19-24, July/Aug. 2010.
[7]. Y. Zhu, H. Wang, Z. Hu, G. J. Ahn, H. Hu, and S. S. Yau,
“Efficient Provable Data Possession for Hybrid Clouds,”
Proc. 17th ACM Conference on Computer and
Communications Security, pp. 756-758, 2010.
[8]. K. Yang and X. Jia, “Data Storage Auditing Service in
Cloud Computing: Challenges, Methods and opportunities,”
World Wide Web, vol. 15, no. 4, pp. 409-428, 2012.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 564
AUTHORS
Mr. S. NAGARAJU, PG Scholar, CSE
department, SSSISE, Anantapuramu.
Studied MCA in Osmina University.
Mr. S. AKILENDRANATH Assistant
Professor in the department of CSE, in
SSSISE, Anantapuramu. Completed
M.Tech from JNTUA University.
Mr. BIMAL KUMAR, Associate Professor in
the department of CSE, in SSSISE,
Anantapuramu. Completed M.Tech in
GURU JAMBHESHWAR University,
HARYANA.
Mr. P. GANGADHAR, Assistant Professor in
the department of CSE, in SSSISE,
Anantapuramu. Completed M.Tech from
JNTUA University.

More Related Content

What's hot

Software validation do's and dont's may 2013
Software validation do's and dont's may 2013Software validation do's and dont's may 2013
Software validation do's and dont's may 2013John Cachat
 
software testing strategies
software testing strategiessoftware testing strategies
software testing strategiesHemanth Gajula
 
Matthias Ratert - Automated Test Case Prioritization - EuroSTAR 2012
Matthias Ratert - Automated Test Case Prioritization - EuroSTAR 2012Matthias Ratert - Automated Test Case Prioritization - EuroSTAR 2012
Matthias Ratert - Automated Test Case Prioritization - EuroSTAR 2012TEST Huddle
 
software testing technique
software testing techniquesoftware testing technique
software testing techniqueRana assad ali
 
Load and Performance tests in agile scrum framework SGI 2013
Load and Performance tests in agile scrum framework SGI 2013Load and Performance tests in agile scrum framework SGI 2013
Load and Performance tests in agile scrum framework SGI 2013Subrahmaniam S.R.V
 
ISTQB Foundation - Chapter 2
ISTQB Foundation - Chapter 2ISTQB Foundation - Chapter 2
ISTQB Foundation - Chapter 2Chandukar
 
The good the bad and the ugly - final
The good the bad and the ugly - finalThe good the bad and the ugly - final
The good the bad and the ugly - finalAndre Verschelling
 
Software quality assurance
Software quality assuranceSoftware quality assurance
Software quality assuranceRajeev Sharan
 
Graham Bath - SOA: Whats in it for Testers?
Graham Bath - SOA: Whats in it for Testers?Graham Bath - SOA: Whats in it for Testers?
Graham Bath - SOA: Whats in it for Testers?TEST Huddle
 
IT Validation Training
IT Validation TrainingIT Validation Training
IT Validation TrainingRobert Sturm
 
Acceptance testing
Acceptance testingAcceptance testing
Acceptance testingCOEPD HR
 
Test management checklist
Test management checklistTest management checklist
Test management checklistHarsha Kumar
 
Test Management introduction
Test Management introductionTest Management introduction
Test Management introductionOana Feidi
 
What Is Functional Testing?
What Is Functional Testing?What Is Functional Testing?
What Is Functional Testing?QA InfoTech
 
Chapter 4 - Deployment & Delivery
Chapter 4 - Deployment & DeliveryChapter 4 - Deployment & Delivery
Chapter 4 - Deployment & DeliveryNeeraj Kumar Singh
 
Setting up Center of Excellence for QA in Healthcare
Setting up Center of Excellence for QA in HealthcareSetting up Center of Excellence for QA in Healthcare
Setting up Center of Excellence for QA in HealthcareCitiusTech
 
'Automated Reliability Testing via Hardware Interfaces' by Bryan Bakker
'Automated Reliability Testing via Hardware Interfaces' by Bryan Bakker'Automated Reliability Testing via Hardware Interfaces' by Bryan Bakker
'Automated Reliability Testing via Hardware Interfaces' by Bryan BakkerTEST Huddle
 

What's hot (20)

Software validation do's and dont's may 2013
Software validation do's and dont's may 2013Software validation do's and dont's may 2013
Software validation do's and dont's may 2013
 
software testing strategies
software testing strategiessoftware testing strategies
software testing strategies
 
Matthias Ratert - Automated Test Case Prioritization - EuroSTAR 2012
Matthias Ratert - Automated Test Case Prioritization - EuroSTAR 2012Matthias Ratert - Automated Test Case Prioritization - EuroSTAR 2012
Matthias Ratert - Automated Test Case Prioritization - EuroSTAR 2012
 
software testing technique
software testing techniquesoftware testing technique
software testing technique
 
Load and Performance tests in agile scrum framework SGI 2013
Load and Performance tests in agile scrum framework SGI 2013Load and Performance tests in agile scrum framework SGI 2013
Load and Performance tests in agile scrum framework SGI 2013
 
ISTQB Foundation - Chapter 2
ISTQB Foundation - Chapter 2ISTQB Foundation - Chapter 2
ISTQB Foundation - Chapter 2
 
The good the bad and the ugly - final
The good the bad and the ugly - finalThe good the bad and the ugly - final
The good the bad and the ugly - final
 
Software quality assurance
Software quality assuranceSoftware quality assurance
Software quality assurance
 
Graham Bath - SOA: Whats in it for Testers?
Graham Bath - SOA: Whats in it for Testers?Graham Bath - SOA: Whats in it for Testers?
Graham Bath - SOA: Whats in it for Testers?
 
IT Validation Training
IT Validation TrainingIT Validation Training
IT Validation Training
 
FDA software compliance 2016
FDA software compliance 2016FDA software compliance 2016
FDA software compliance 2016
 
Acceptance testing
Acceptance testingAcceptance testing
Acceptance testing
 
Test management checklist
Test management checklistTest management checklist
Test management checklist
 
Introduction to Parasoft C++TEST
Introduction to Parasoft C++TEST Introduction to Parasoft C++TEST
Introduction to Parasoft C++TEST
 
Test Management introduction
Test Management introductionTest Management introduction
Test Management introduction
 
What Is Functional Testing?
What Is Functional Testing?What Is Functional Testing?
What Is Functional Testing?
 
Test plan
Test planTest plan
Test plan
 
Chapter 4 - Deployment & Delivery
Chapter 4 - Deployment & DeliveryChapter 4 - Deployment & Delivery
Chapter 4 - Deployment & Delivery
 
Setting up Center of Excellence for QA in Healthcare
Setting up Center of Excellence for QA in HealthcareSetting up Center of Excellence for QA in Healthcare
Setting up Center of Excellence for QA in Healthcare
 
'Automated Reliability Testing via Hardware Interfaces' by Bryan Bakker
'Automated Reliability Testing via Hardware Interfaces' by Bryan Bakker'Automated Reliability Testing via Hardware Interfaces' by Bryan Bakker
'Automated Reliability Testing via Hardware Interfaces' by Bryan Bakker
 

Similar to Cloud Storage Auditing Protocol with Verifiable Outsourcing of Key Updates

A Complete Guide to Functional Testing
A Complete Guide to Functional TestingA Complete Guide to Functional Testing
A Complete Guide to Functional TestingMatthew Allen
 
A Complete Guide to Functional Testing
A Complete Guide to Functional TestingA Complete Guide to Functional Testing
A Complete Guide to Functional TestingAbhay Kumar
 
Objectorientedtesting 160320132146
Objectorientedtesting 160320132146Objectorientedtesting 160320132146
Objectorientedtesting 160320132146vidhyyav
 
Object oriented testing
Object oriented testingObject oriented testing
Object oriented testingHaris Jamil
 
IRJET- Development Operations for Continuous Delivery
IRJET- Development Operations for Continuous DeliveryIRJET- Development Operations for Continuous Delivery
IRJET- Development Operations for Continuous DeliveryIRJET Journal
 
Learn software testing with tech partnerz 2
Learn software testing with tech partnerz 2Learn software testing with tech partnerz 2
Learn software testing with tech partnerz 2Techpartnerz
 
3Audit Software & Tools.pptx
3Audit Software & Tools.pptx3Audit Software & Tools.pptx
3Audit Software & Tools.pptxjack952975
 
Quality at the speed of digital
Quality   at the speed of digitalQuality   at the speed of digital
Quality at the speed of digitalrajni singh
 
Software testing
Software testingSoftware testing
Software testingRavi Dasari
 
Implementing a testing strategy
Implementing a testing strategyImplementing a testing strategy
Implementing a testing strategyDaniel Giraldo
 
Mca se chapter_07_software_validation
Mca se chapter_07_software_validationMca se chapter_07_software_validation
Mca se chapter_07_software_validationAman Adhikari
 
IRJET - A Valuable and Speculative Approach to Manage the Item Testing by usi...
IRJET - A Valuable and Speculative Approach to Manage the Item Testing by usi...IRJET - A Valuable and Speculative Approach to Manage the Item Testing by usi...
IRJET - A Valuable and Speculative Approach to Manage the Item Testing by usi...IRJET Journal
 
An Ultimate Guide to Continuous Testing in Agile Projects.pdf
An Ultimate Guide to Continuous Testing in Agile Projects.pdfAn Ultimate Guide to Continuous Testing in Agile Projects.pdf
An Ultimate Guide to Continuous Testing in Agile Projects.pdfKMSSolutionsMarketin
 
Performance Testing in Agile Process
Performance Testing in Agile ProcessPerformance Testing in Agile Process
Performance Testing in Agile ProcessIdexcel Technologies
 
Testing Types And Models
Testing Types And ModelsTesting Types And Models
Testing Types And Modelsnazeer pasha
 
Testing Interview Questions.pdf
Testing Interview Questions.pdfTesting Interview Questions.pdf
Testing Interview Questions.pdfPradeepaKannan6
 
Learn software testing with tech partnerz 1
Learn software testing with tech partnerz 1Learn software testing with tech partnerz 1
Learn software testing with tech partnerz 1Techpartnerz
 

Similar to Cloud Storage Auditing Protocol with Verifiable Outsourcing of Key Updates (20)

A Complete Guide to Functional Testing
A Complete Guide to Functional TestingA Complete Guide to Functional Testing
A Complete Guide to Functional Testing
 
A Complete Guide to Functional Testing
A Complete Guide to Functional TestingA Complete Guide to Functional Testing
A Complete Guide to Functional Testing
 
System testing
System testingSystem testing
System testing
 
System testing
System testingSystem testing
System testing
 
Objectorientedtesting 160320132146
Objectorientedtesting 160320132146Objectorientedtesting 160320132146
Objectorientedtesting 160320132146
 
Object oriented testing
Object oriented testingObject oriented testing
Object oriented testing
 
IRJET- Development Operations for Continuous Delivery
IRJET- Development Operations for Continuous DeliveryIRJET- Development Operations for Continuous Delivery
IRJET- Development Operations for Continuous Delivery
 
Learn software testing with tech partnerz 2
Learn software testing with tech partnerz 2Learn software testing with tech partnerz 2
Learn software testing with tech partnerz 2
 
3Audit Software & Tools.pptx
3Audit Software & Tools.pptx3Audit Software & Tools.pptx
3Audit Software & Tools.pptx
 
Software Testing
Software TestingSoftware Testing
Software Testing
 
Quality at the speed of digital
Quality   at the speed of digitalQuality   at the speed of digital
Quality at the speed of digital
 
Software testing
Software testingSoftware testing
Software testing
 
Implementing a testing strategy
Implementing a testing strategyImplementing a testing strategy
Implementing a testing strategy
 
Mca se chapter_07_software_validation
Mca se chapter_07_software_validationMca se chapter_07_software_validation
Mca se chapter_07_software_validation
 
IRJET - A Valuable and Speculative Approach to Manage the Item Testing by usi...
IRJET - A Valuable and Speculative Approach to Manage the Item Testing by usi...IRJET - A Valuable and Speculative Approach to Manage the Item Testing by usi...
IRJET - A Valuable and Speculative Approach to Manage the Item Testing by usi...
 
An Ultimate Guide to Continuous Testing in Agile Projects.pdf
An Ultimate Guide to Continuous Testing in Agile Projects.pdfAn Ultimate Guide to Continuous Testing in Agile Projects.pdf
An Ultimate Guide to Continuous Testing in Agile Projects.pdf
 
Performance Testing in Agile Process
Performance Testing in Agile ProcessPerformance Testing in Agile Process
Performance Testing in Agile Process
 
Testing Types And Models
Testing Types And ModelsTesting Types And Models
Testing Types And Models
 
Testing Interview Questions.pdf
Testing Interview Questions.pdfTesting Interview Questions.pdf
Testing Interview Questions.pdf
 
Learn software testing with tech partnerz 1
Learn software testing with tech partnerz 1Learn software testing with tech partnerz 1
Learn software testing with tech partnerz 1
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 

Recently uploaded (20)

GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 

Cloud Storage Auditing Protocol with Verifiable Outsourcing of Key Updates

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 556 CLOUD STORAGE AUDITING PROTOCOL WITH VERIFIABLE OUTSOURCING OF KEY UPDATES Mr. S. NAGARAJU, Mr. S. AKILENDRANATH, Mr. BIMAL KUMAR, Mr. P. GANGADHARA. -----------------------------------------------------------------***------------------------------------------------------------------ ABSTRACT - Key-exposure resistance has dependably been an imperative issue for top to bottom digital protection in numerous security applications. As of late, how to manage the key exposure issue in the settings of cloud storage auditing has been proposed and contemplated. To address the test, existing arrangements all require the customer to update his mystery keys in each day and age, which may unavoidably acquire new nearby, weights to the customer, particularly those with constrained calculation assets, for example, cell phones. In this paper, we concentrate on the most proficient method to make the key updates as straightforward as workable for the customer and propose another paradigm called cloud storage auditing with evident outsourcing of key updates. In this paradigm, key updates can be securely outsourced to some approved party, and therefore the key- update trouble on the customer will be kept negligible. Specifically, we use the third party auditor (TPA) in many existing open auditing designs, let it assume the part of approved party for our situation, and make it responsible for both the storage auditing and the safe key updates for key-exposure resistance. The customer just needs to download the scrambled mystery key from the TPA while transferring new records to cloud. In addition, our outline additionally furnishes the customer with capacity to additionally confirm the legitimacy of the scrambled mystery keys gave by the TPA. All these striking highlights are painstakingly intended to make the entire auditing strategy with key exposure resistance as straightforward as feasible for the customer. We formalize the definition and the security model of this paradigm. The security evidence and the execution recreation demonstrate that our point by point outline instantiations are secure and proficient. Keywords: Cloud storage, outsourcing computing, cloud storage auditing, key update, verifiability 1. INTRODUCTION The motivation behind testing is to find blunders. Testing is the way toward attempting to find each possible fault or shortcoming in a work item. It gives an approach to check the usefulness of segments, sub gatherings, congregations as well as a completed item It is the way toward practicing software with the goal of guaranteeing that the Software framework lives up to its prerequisites and client desires and does not bomb in an unsatisfactory way. There are different sorts of test. Each test sort tends to a particular testing prerequisite. 2. CLASSIFICATION OF TESTING Unit Testing: Unit testing includes the plan of experiments that approve that the interior program rationale is working appropriately, and that program inputs create legitimate yields. All choice branches and interior code stream ought to be approved. It is the testing of individual software units of the application .it is done after the fulfillment of an individual unit before combination. This is an auxiliary testing, that depends on learning of its development and is obtrusive. Unit tests perform fundamental tests at part level and test a particular business process, application, as well as system arrangement. Unit tests guarantee that every one of a kind way of a business procedure performs precisely to the archived determinations and contains plainly characterized inputs and expected outcomes. Coordination Testing: Coordination tests are intended to test incorporated software parts to decide whether they really keep running as one program. Testing is occasion driven and is more worried about the fundamental result of screens or fields. Coordination tests exhibit that in spite of the fact that the parts were separately fulfillment, as appeared by effectively unit testing, the mix of segments is right and predictable. Incorporation testing is particularly gone for uncovering the issues that emerge from the mix of segments. Functional Testing: Functional tests give systematic exhibits that capacities tried are accessible as determined by the business and specialized prerequisites, system documentation, and client manuals. Functional testing is fixated on the accompanying things: Substantial Input: distinguished classes of legitimate information must be acknowledged. Invalid Input: recognized classes of invalid info must be rejected. Capacity: recognized capacities must be worked out.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 557 Yield: distinguished classes of use yields must be worked out. Systems/Procedures: interfacing systems or techniques must be summoned. Organization and planning of functional tests is centered around prerequisites, key capacities, or extraordinary experiments. Furthermore, systematic scope relating to distinguish Business process streams; information fields, predefined forms, and progressive procedures must be considered for testing. Before functional testing is finished, extra tests are distinguished and the compelling estimation of current tests is resolved. System Testing: System testing guarantees that the whole coordinated software system meets prerequisites. It tests a setup to guarantee known and unsurprising outcomes. A case of system testing is the arrangement situated system incorporation test. System testing depends on process depictions and streams, underlining pre-driven process connections and combination focuses. Hite Box Testing: White Box Testing is a testing in which in which the software analyzer knows about the internal workings, structure and dialect of the software, or if nothing else its motivation. It is reason. It is utilized to test regions that can't be come to from a discovery level. Black Box Testing: Black Box Testing will be testing the software with no learning of the inward workings, structure or dialect of the module being tried. Black box tests, as most different sorts of tests, must be composed from an authoritative source report, for example, detail or necessities archive, for example, particular or prerequisites record. It is a testing in which the software under test is dealt with, as a black box .you can't "see" into it. The test gives information sources and reacts to yields without considering how the software functions. Unit Testing: Unit testing is typically directed as a major aspect of a consolidated code and unit test period of the software lifecycle, despite the fact that it isn't remarkable for coding and unit testing to be led as two particular stages. Test system and approach Field testing will be performed physically and functional tests will be composed in detail. Test targets • All field passages must work legitimately. • Pages must be enacted from the recognized connection. • The section screen, messages and reactions must not be postponed. Highlights to be tried • Verify that the passages are of the right organization • No copy passages ought to be permitted • All connections should take the client to the right page. Coordination Testing: Software incorporation testing is the incremental combination testing of at least two coordinated software segments on a solitary stage to create disappointments caused by interface defects. The errand of the reconciliation test is to watch that segments or software applications, e.g. segments in a software system or – one stage up – software applications at the organization level – cooperate without blunder. Test outcomes: All the experiments specified above passed effectively. No imperfections experienced. Acknowledgment Testing: Client Acceptance Testing is a basic period of any venture and requires noteworthy support by the end client. It additionally guarantees that the system meets the functional prerequisites. Test outcomes: All the experiments said above passed effectively. No imperfections experienced. 2 SCREEN SHOTS 1 Home page
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 558 2 cloud server login page 3 Abstract page 4 Data owner & authorize page 5 Transactions page 6 Search history page 7 Results details
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 559 8 TTP login page 9 View meta data 10 View all files page 11 Time key update page 5.12 Data owner registration page 13 Data owner login
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 560 14 Data owner & authorize persons view 15 Upload file page 5.16 Choosing a file 17 file uploaded 18 successfully data uploaded 19 View files
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 561 20 Data owner files stored in cloud server 21 Encrypted sk 22 Old & new sk’s 23 Verify file 24 Attack file 25 Attack file owner
  • 7. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 562 26 End user registration 27 end user login 28 view end user 29 Search file by using key 30 Request file 31 Results details
  • 8. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 563 32 Download file 33 view transactions FUTURE ENHANCEMENT:  We expectation to propose day and age key not to be founded on operations rather unequivocally prescribe producing day and age key in view of logging.   Time period key ought to be created with long time to maintain a strategic distance from time utilization of successive changing of keys.  The key produced ought to be created naturally in light of sometime detail. CONCLUSION The study on how to deal with the client’s key exposure in cloud storage auditing. We propose a new paradigm called auditing protocol with key-exposure resilience. In such a protocol, the integrity of the data previously stored in cloud can still be verified even if the client’s current secret key for cloud storage auditing is exposed. We formalize the definition and the security model of auditing protocol with key-exposure resilience, and then propose the first practical solution. The security proof and the asymptotic performance evaluation show that the proposed protocol is secure and efficient. REFERENCES [1]. G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable Data Possession at Untrusted Stores,” Proc. 14th ACM Conf. Computer and Comm. Security, pp. 598-609, 2007. [2]. G. Ateniese, R.D. Pietro, L. V. Mancini, and G. Tsudik, “Scalable and Efficient Provable Data Possession,” Proc. 4th International Conference on Security and Privacy in Communication Networks, 2008 [3]. F. Sebe, J. Domingo-Ferrer, A. Martinez-balleste, Y. Deswarte, and J. Quisquater, “Efficient Remote Data In- tegrity checking in Critical Information Infrastructures,” IEEE Transactions on Knowledge and Data Engineering, vol. 20, no. 8, pp. 1-6, 2008. [4]. R. Curtmola, O. Khan, R. Burns, and G. Ateniese, “MRPPDP: Multiple-Replica Provable Data Possession,” Proc. 28th IEEE International Conference on Distributed Computing Systems, pp. 411-420, 2008. [5]. H. Shacham and B. Waters, “Compact Proofs of Retrievability,” Advances in Cryptology-Asiacrypt’08, pp. 90-107, 2008. [6]. C. Wang, K. Ren, W. Lou, and J. Li, “Toward Publicly Auditable Secure Cloud Data Storage Services,” IEEE Network, vol. 24, no. 4, pp. 19-24, July/Aug. 2010. [7]. Y. Zhu, H. Wang, Z. Hu, G. J. Ahn, H. Hu, and S. S. Yau, “Efficient Provable Data Possession for Hybrid Clouds,” Proc. 17th ACM Conference on Computer and Communications Security, pp. 756-758, 2010. [8]. K. Yang and X. Jia, “Data Storage Auditing Service in Cloud Computing: Challenges, Methods and opportunities,” World Wide Web, vol. 15, no. 4, pp. 409-428, 2012.
  • 9. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 564 AUTHORS Mr. S. NAGARAJU, PG Scholar, CSE department, SSSISE, Anantapuramu. Studied MCA in Osmina University. Mr. S. AKILENDRANATH Assistant Professor in the department of CSE, in SSSISE, Anantapuramu. Completed M.Tech from JNTUA University. Mr. BIMAL KUMAR, Associate Professor in the department of CSE, in SSSISE, Anantapuramu. Completed M.Tech in GURU JAMBHESHWAR University, HARYANA. Mr. P. GANGADHAR, Assistant Professor in the department of CSE, in SSSISE, Anantapuramu. Completed M.Tech from JNTUA University.