Final Report

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 39

A PROJECT REPORT ON

“CLOUD STORAGE AND SHARING SERVICE”

SUBMITTED TO
MIT SCHOOL OF ENGINEERING, LONI, PUNE IN PARTIAL FULFILLMENT OF
THE REQUIREMENTS FOR THE AWARD OF THE DEGREE

BACHELOR OF TECHNOLOGY
(Computer Science & Engineering)

BY

Amansingh Panwar Enrolment No: MITU19BTCSD029


Tanmay Anand Enrolment No: MITU18BTCS0018
Abhinav Singh Enrolment No: MITU19BTCSD043

Under the guidance of


Dr. Rajani Sajjan

DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING


MIT School of Engineering
MIT Art, Design and Technology University
Rajbaug Campus, Loni-Kalbhor, Pune 412201
2021-2022
MIT SCHOOL OF ENGINEERING
DEPARTMENT OF COMPUTER SCIENCE &
ENGINEERING
MIT ART, DESIGN AND TECHNOLOGY UNIVERSITY,
RAJBAUG CAMPUS, LONI-KALBHOR, PUNE 412201

CERTIFICATE
This is to certify that the project report entitled
“CLOUD STORAGE AND SHARING SERVICE”

Submitted by

Name: Amansingh Panwar Enrolment No: MITU19BTCSD029


Tanmay Anand Enrolment No: MITU18BTCS0018
Abhinav Singh Enrolment No: MITU19BTCSD043

Mis a bona fide work carried out by them under the supervision of Prof./Dr/ Rajani Sajjan
and it is submitted towards the partial fulfilment of the requirement of MIT University Pune
for the award of the degree of Bachelor of Technology (Computer Science and
Engineering)
DR. Rajani Sajjan Dr. Shraddha Phansalkar

Guide Head of Department


Dr. Kishore Ravande
Principal

Seal/Stamp of the College


Place: PUNE
Date: 11/06/2022
CERTIFICATE

This is to certify that the project report entitled

“CLOUD STORAGE AND SHARING SERVICE”

Submitted by

Name: Amansingh Panwar Enrolment No: MITU19BTCSD029


Tanmay Anand Enrolment No. MITU18BTCS0018
Abhinav singh Enrolment No. MITU19BTCSD043

is a bona fide work carried out by them under the supervision of Dr. Rajani Sangappa
Sajjan and it is submitted towards the partial fulfilment of the requirement of
MIT ADT University, Pune for the award of the degree of Bachelor of
Technology (Computer Science and Engineering)

Guide & Project coordinator Head of Department

Seal/Stamp of the Company/College

Place: Pune
Date: 11/06/22

I
DECLARATION

I,
Name : Enrolment No:
Amansingh Panwar (MITU19BTCSD029)
Tanmay Anand (MITU18BTCS0018)
Abhinav Singh (MITU19BTCSD043)
Hereby declare that the project work incorporated in the present project entitled “CLOUD

STORAGE AND SHARING SERVICE” is original work. This work (in part or in full)

has not been submitted to any University for the award or a Degree or a Diploma. I have

properly acknowledged the material collected from secondary sources wherever required.

I solely own the responsibility for the originality of the entire content.

Date:

Name & Signature

Member: Amansingh Panwar

Tanmay Anand

Abhinav Singh

Name and Signature of Guide

Dr. Rajani Sajjan

Seal/Stamp of the College


Place: Pune
Date: 11/6/2022

II
DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
MIT SCHOOL OF ENGINEERING,
RAJBAUG, LONI KALBHOR, PUNE – 412201

EXAMINER’S APPROVAL CERTIFICATE

The project report entitled “CLOUD STORAGE AND SHARING SERVICE”

submitted by Amansingh(MITU19BTCSD029), Tanmay Anand(MITU18BTCS0018)

and Abhinav Singh (MITU19BTCSD043) in partial fulfillment for the award of the

degree of Bachelor of Technology (Computer Science & Engineering) during the

academic year 2021-22, of MIT-ADT University, MIT School of Engineering, Pune, is

hereby approved.

Examiners:

1.

2.

III
ACKNOWLEDGEMENT

On the submission of my report on “Cloud Storage and Sharing Service”, I


would like to express my indebted gratitude and special thanks to my
supervisor Prof. Suresh Kapare, Department of Computer Engineering who
in spite of being extraordinarily busy, spare time for guidance and keep me on
the correct path and allowing me to carry out my work in the previous one
year. I truthfully appreciate and value his admired supervision and support
from the start to the end of this project. I am obliged to him for having helped
me shape the trouble and providing insights towards the way out. I express my
deep sense of gratitude to my beloved faculty/guide Dr. Rajani Sangappa
Sajjan for the valuable guidance and suggestions, keen interest, and
encouragement extended throughout the period of project work. In the last we
would like to thank the management of MIT School Of Engineering, MIT
ADT University, Pune for providing us such an opportunity to learn from
these experiences

IV
ABSTRACT

In the recent virtual communication world, email services play a vital role as
a basic content of heterogeneous networking infrastructure. Whereby,
multiple platforms are connecting with each other Mail Server refers to a
computer performing Mail Transfer Agent functions. MTA is software that
delivers electronic mail messages from one computer to another using client-
server application architecture. MTA implements both sender and receiver
portions of SMTP (Simple Mail Transfer Protocol). Postfix is a free and open-
source MTA that is fast, easy to administer, and provides secure
communication over the Internet. In this paper, we focus on the problem of
email contents disclosure, establish a secure mail server by using Postfix in
the Linux platform and then implement it into a cloud service provider as IaaS
(Infrastructure as a Service). Security is provided by tuning a Transport Layer
Security (TLS), and SMTP-AUTH which use Simple Authentication and
Security Layer (SASL) as a security mechanism and platform.

V
CONTENTS

Title Page

Certificate
Acknowledgment
Abstract
Chapter. 1 Introduction ………………………………………..

1.1 About Project……………………………………………….


1.2 Problem Statement………………………………………….
1.3 Aim and Objective of the study…………………………….

1.4 Scope of Study……………………………………………..

1.5 Features of Project…………………………………………

Chapter. 2 Literature Survey………………………………….


Chapter. 3 Project Plan……………………………………….
Chapter. 4 Methodology……………………………………...

4.1 Technology Used…………………………………………


4.2 Proposed Methodology…………………………………..

Chapter. 5 Result and Analysis………………………………


5.1 Result…………………………………………………….

Chapter. 6 Software Testing…………………………………


6.1 Positive Testing………………………………………….
6.2 Negative Testing…………………………………………
Chapter. 7 Conclusion……………………………………….
Chapter. 8 References……………………………………….
LIST OF TABLES

Table Number: Name of the Table

TABLE 1: LITERATURE SURVEY


……………………………………………………
CHAPTER 1: INTRODUCTION

1.1 About Project

Email Services have started to emerge as a result of the contrary


advancements within the Internet applications technologies, as well as the
novel infrastructures and platforms which are dominating today’s WWW.
Cloud email services have been recently introduced to the public since less
than a decade ago. This evolution started when the first cloud based
application “Sendmail” was introduced. It was primitive and simple and
reveals many security-related hiccups, in addition to the hard usability Qmail
was deployed by Dan Bernstein. It has gained popularity in the market but
the complexity level of sittings of mail clients hindered its enhancements.
Mail Transfer Agent (MTA) is a UNIX compatible component mailing that
handles the similar task of routing and delivery. MTA controls and
administers the procedures of sending email either locally or out of its
domain. According to SMTP, the mail protocol which is used by MTA to
control the mailing process encounters some problems in handling security
issues, whereby it is difficult to be configured and maintained. Postfix takes
a proactive and multi layered approach to security. The Postfix architecture
limits the severity of vulnerabilities, even if there are design or coding errors
that might otherwise create major vulnerabilities in a monolithic privileged
program. SASL (Simple Authentication and Security Layer) is a security
layer identified initially by RFC. SASL is used by Postfix to ensure
authentication provided by implementing the SMTP_AUTH framework and
suitable mechanisms such as plain login; there is no encryption mechanism
included. Therefore the login and the password are directly sent to the server
to be verified for authenticity. Transport Layer Security (TLS) is another
security layer that operates in Postfix architecture to emphasize privacy and
reliable server identification. This can be guaranteed by using client
certificates, which are cryptographically signed identifiers. The
implementation of TLS just to encrypt authentication credentials using both
public and private keys is fairly set up to tackle the issue of the
administrative overhead in managing client certificates. These certificates
can be used as identifiers for the authentication mechanism initiated by the

MITSOE,Department of Computer Engineering 2021-2022 1


SASL labywith encrypting the communication channel between sender and
receiver. In connection with the technical views in deploying and
configuring secure email servers empowered with postfix, the system
engineers should take into consideration some architectural issues, which
guarantee that the deployed software tool is able to ultimately satisfy these
issues. Postfix was deployed to sufficiently fulfill most of the related
requirements. Among the main key points that postfix emphasizes on
architectural requirements mentioned in is the security of the email contents
against actual attacks, in addition to reliability against losing any transferred
message except in case of hardware failure which is beyond postfix control.
Some other requirements are such as robustness, performance, availability,
extendibility, maintainability, testability, and portability.
1.2 Problem Statement
The objective of this project would be to create a web app to share files
easily within teams and collaborative workspaces and with students without
any hassle.
1.3 Aim and Objective

This project will empower us to solve a real-world problem faced by all of


the people around us and make their lives better by providing a solution for
the problem.
1.4 Scope of Project

This project will empower us to solve a real world problem faced by all of
the people around us and make their lives better by providing a solution for
the problem.
1.5 Features of Project
The maximum size for a file to upload with an E-mail is 20MB, whereas
CSSS offers direct mail without any cloud login and has a limit of 512MB.
The size can be increased but has paid in-apps .Files with any format can be
easily shared using CSSS.

MITSOE,Department of Computer Engineering 2021-2022 2


CHAPTER 2 LITRATURE SURVEY

Research paper Author Applications Model/techniques


used
Sharing Files Tiago The widespread Basics about
Using Oliveira, use of cloud cloud storage
Cloud Storage Ricardo storage in the services
Services Mendes, and last few years
Alysson can be attributed
to the existence
Bessani
of appealing
applications such
as filebackup,
data archival and
file sharing.
Access control,
Cloud based File Internet based cloud computing
Pragathi online cloud
Sharing and access control
Shetty, services,provides list management
Rajkumari enormous
Sunanda, volume of
Sowmya storage
Shree K S, space,secure and
Swathi N G, elastic data
Hemanth provider that will
adapt to various
Secure Data KUmar N P
storage Securely sharing
Sharing in Cloud necesites. data in cloud
Computing computing using
Using revocablestorage
RevocableStorage Cloud Identity-Based
Identity-Based Jianghong computing Encryption
Encryption Wei,Wenfen provides a
Liu,Xuexian flexible and
Hu convenient way
for data sharing,
which brings
various benefits
for both the
society and
individuals. But
there exists a
natural
resistance for
users to directly
outsource the
shared data to
the cloud server
since the data
often contain

MITSOE,Department of Computer Engineering 2021-2022 3


valuable
information.

MITSOE,Department of Computer Engineering 2021-2022 4


MITSOE,Department of Computer Engineering 2021-2022 5
P2P Storag available
Clou e storage
d services, lowering e th

economic
cost
by
exploiting the
storage
space of
participating
users
.

Group SHOU The A secure group [1] P.


Key YI large-s key -W. Chi
Manag ZHA cale management and C.L.
ement NG , sharin protocol on Lei,‘‘Aud
Protoc SI g cloud storage it–free
ol for HAN , needs over unreliable cloud
File BAO of channels, storage
Sharin KUN many aiming at via
g on ZHEN enterpr protecting the deniable
Cloud G, ises shared files on attribute–
Storag KE promot the cloud based
e HAN e the storage. encryptio
AND develo n,’’ IEEE
ENTO pment Trans.
NG of Cloud
PANG cloud Comput.,
storage vol. 6,
. no. 2, pp.
While 414–427,
the Apr.
cloud 2018.
compu [2] J.
ting Zhou, H.
stores
Duan,
the
shared K.
files Liang, Q.
outside Yan, F.

MITSOE,Department of Computer Engineering 2021-2022 6


the Chen, F.
trust R. Yu, J.
domai Wu, and
n of J. Chen,
the
owner, ‘‘Securin
the g
deman outsource
ds and d data in
concer the
ns for multi–aut
file hority
securit
cloud
y are
arising with
. fine–grai
ned
access
control
and
efficient
attribute
revocatio
n,’’
Comput.
J., vol.
60, no. 8,
pp.
1210–12
22, Aug.
20

MITSOE,Department of Computer Engineering 2021-2022 7


SMTP Vladi SMTP SMTP is being Accessin
(Simpl mir V. is used used to transfer g your
e Mail Riabo as the files in our mail
Transf v comm project. when and
er on where
Protoc mecha you want
ol) nism on the
for Internet
transp (1997,
orting April 24).
electro San
nic Diego,
mail CA:
among QUALC
differe OMM,
nt Eudora
hosts Division.
within Retrieved
the March
transm 21, 2005,
ission from
control http://ww
protoc w.eudora.
ol/Inte com/pdf
rnet docs/pri
protoc mer.pdf
ol
(TCP/I
P)
suite.
It is an
applica
tion
layer
protoc
ol.

MITSOE,Department of Computer Engineering 2021-2022 8


CHAPTER 3 PROJECT PLAN

We approached the system development using the agile model


depicted in the Based on this model, the required estimates have been
stated in Annexure. In order to map our estimates with the steps in a
agile model, we considered each phase  iterative and incremental
process models with focus on process adaptability by rapid delivery
of working software product. The Agile methodology is a way to
manage a project by breaking it up into several phases. It involves
constant collaboration with stakeholders and continuous improvement
at every stage. Once the work begins, teams cycle through a process of
planning, executing, and evaluating. Continuous collaboration is vital,

MITSOE,Department of Computer Engineering 2021-2022 9


both with team members and project stakeholders. Agile focuses
teams on delivering working software, so they must complete
end-to-end functioning applications, integrations, and other
deliverables that impact users—not just the technical components.
Team members must align on what they are building, who is doing
what, and how the software will be developed.

MITSOE,Department of Computer Engineering 2021-2022 10


CHAPTER 4 METHODOLOGY

4.1 Technology Used:

Following are the technology used for this project:

1) JavaScript
2) Node.js
3) Express
4) Typescript
5) Mailing Services
6) AWS Elastic Beanstalk
1) JavaScript
JavaScript is a scripting language used to create and control dynamic
website content, i.e. anything that moves, refreshes, or otherwise
changes on your screen without requiring you to manually reload a
web page. Features like:
• Animated Graphics

• Photo Slideshows

• Autocomplete Text Suggestions

• Interactive Forms

An even better way of understanding what JavaScript does is to think


about certain web features you use every day and likely take for
granted—like when your Facebook timeline automatically updates on
your screen or Google suggests search terms based on a few letters
you’ve started typing. In both cases, that’s JavaScript in action.

MITSOE,Department of Computer Engineering 2021-2022 11


The results of JavaScript may seem simple, but there’s a reason why
we teach an entire segment on JavaScript in both our Front End Web
Developer and Break into Tech Blueprints. Underneath all those great
animations and autocompletes—there’s some pretty fascinating stuff
happening. This guide will break down exactly how JavaScript works
and why and how to use it, plus the best ways to learn JavaScript if
you’re realizing you need it in your skillset.

Figure. JavaScript DOM Structure.

2) Node.js

Node.js is a server-side platform built on Google Chrome's JavaScript


Engine (V8 Engine). Node.js was developed by Ryan Dahl in 2009

MITSOE,Department of Computer Engineering 2021-2022 12


and its latest version is v0.10.36. The definition of Node.js as supplied
by its official documentation is as follows :-
Node.js = Runtime Environment + JavaScript Library
Node.js is an open source, cross-platform runtime environment for
developing server-side and networking applications. Node.js
applications are written in JavaScript, and can be run within the
Node.js runtime on OS X, Microsoft Windows, and Linux.
Node.js also provides a rich library of various JavaScript modules
which simplifies the development of web applications using Node.js
to a great extent.
Node.js = Runtime Environment + JavaScript Library

How does Node.js work behind the scene?

Node.js is the JavaScript runtime environment which is based on


Google’s V8 Engine i.e. with the help of Node.js we can run the
JavaScript outside of the browser. Other things that you may or may
not have read about Node.js is that it is single-threaded, based on
event-driven architecture, and non-blocking based on the I/O model.

1. Node.js Architecture: Node.js is made of Chrome V8 engine


which is written in C++ and Libuv which is a multi-platform C library
that provides support for asynchronous I/O based events on event
loops and thread loops. Don’t worry it is explained in this later at the
end. An important thing that we need to remember is that, even though
Node.js is made using the V8 engine and Libuv which are written in C
or C++, we can still use Node.js in pure JavaScript.

2. Node.js Application: So now that, we have learned about the


Node.js architecture, it’s time to learn how a Node.js application runs
and this part includes the concept of Node.js being single-threaded
and its non-blocking nature as well. So, first of all, what is a thread? A

MITSOE,Department of Computer Engineering 2021-2022 13


thread in simple terms is basically a set of programming instructions
that can be run independently in a computer’s processor and every
process that we want to run has its own thread to run the
programming instructions and the process can have more than one
thread. But, the point to remember is, Node.js application runs only on
a single thread and by that, It mean whether that Node.js application is
being used by 5 users or 5 million users, it will only run on a single
thread which makes the Node.js application blockable (which means
that a single line of code can block the whole app because an only
single thread is being used). So, to keep the Node.js application
running, asynchronous code must be used everywhere having callback
functions because as we know that asynchronous code keeps on
running in the background and the callback gets executed as soon as
the promise gets resolved rather than synchronous code which blocks
the whole application until it gets finished executing. But, we can still
use synchronous code however at someplace in our application and
that place is before our application enters Event-loop. Event-loop is
what allows Node.js applications to run non-blocking asynchronous
I/O based operations i.e, all the asynchronous code is managed and
executed within the event-loop and before that, we can use our
synchronous code which is in this case known as Top-Level code. So,
try to write synchronous code only for those operations which are
executed only once at the start of our application and not every time,
for Ex: reading some data from your computer memory which later
can be requested by some user (many times) in asynchronous code.
3. So, as you can see whenever the Node.js application starts in a
thread, the first step is to initialize the application and execute the
top-level code which as we have said earlier is the only synchronous
code that we should have in our application. The next step is to require
the modules that we specified in our code (which is normally written
at the very top).
The very next step is to register all the event callbacks which are in
our code which will then be sent to the event-loop for execution where
most of our code in node app is executed. But sometimes, some tasks
are too heavy to be executed in our event-loop by a single thread so

MITSOE,Department of Computer Engineering 2021-2022 14


those tasks are sent to the thread-pool (provided by Libuv) are the 4
extra threads to execute heavier tasks without blocking the main
thread. The number of threads can be increased and the user does not
have to specify the tasks which have to be off-loaded because
event-loop does it all by itself but we can specify the number of
threads. The Event-loop: So, you need to remember at this point that
the event-loop is the place where all our asynchronous code is
executed. For a moment, why don’t you read the first paragraph and
read that again because we will be covering the third point of Node.js
which is that it is based on event-driven architecture.

3) Express
Express is a small framework that sits on top of Node.js’s web server
functionality to simplify its APIs and add helpful new features.It
makes it easier to organize your application’s functionality with
middle ware and routing; it adds helpful utilities to Node.js’s HTTP
objects;it facilitates the rendering of dynamic HTTP objects. Express
is a part of MEAN stack, a full stack JavaScript solution used in
building fast, robust, and maintainable production web applications.

• MongoDB(Database)
• Express JS(Web Framework)
• AngularJS(Front-end Framework)
• NodeJS(Application Server)

Framework: It is known to be a skeleton where the application defines


the content of the operation by filling out the skeleton. For Web
development, there is python with Django, java with spring, and For
Web development we have Node.js with Express.js in node.js there is
an HTTP module by which we can create an only limited operable
website or web application. In general, the real working of any web
application or website is that it is capable of handling any kind of
request. Requests may be post, get, delete, and many more like a

MITSOE,Department of Computer Engineering 2021-2022 15


request for an image, video, etc that’s why Express.js is used as a
Framework for Node.js.

Express.js is a routing and Middleware framework for handling the


different routing of the webpage and it works between the request and
response cycle.

Working of Middleware Framework:

There are lots of middleware functions in Express.js like Express.js


app.use() Function etc.

Syntax: app.use(path,(req,res,next))

Parameters: It accepts the two parameters as mentioned above and


described below:

path: It is the path for which the middleware function is being called.
It can be a string representing a path or path pattern or a regular
expression pattern to match the paths.

MITSOE,Department of Computer Engineering 2021-2022 16


4) TypeScript
Typescript is an open source programming language which is built
over Javascript, also known as Superset of Javascript. Typescript has
more features when compared to Javascript. It supports Object
Oriented programming features like classes, Interface, Polymorphism
etc.

How TypeScript works?

TypeScript works by adding enhanced syntax to JavaScript and then


transforming it to JavaScript after the TypeScript compiler does its
own checks. It doesn't change JavaScript's type system. Instead, it
adds more checks to it.

TypeScript ===>>> JavaScript + Type + Some Added Features

5) Mailing Services
Cloud email offers you robust email tools and gives you access to
them over the internet. With cloud-based email hosting, a vendor
serves your email client and represents like any other cloud-based
service you already use. A mail server is a computer application. This
application receives incoming emails from the local users (people
within same domain) as well as remote senders and forwards outgoing
email for delivery.The other two mail servers used for incoming, using
POP3/IMAP protocols are called as MDAs, the mail delivery agents.

MITSOE,Department of Computer Engineering 2021-2022 17


6) AWS
AWS (Amazon Web Services) is a comprehensive, evolving cloud
computing platform provided by Amazon that includes a mixture of
infrastructure as a service (IaaS), platform as a service (PaaS) and
packaged software as a service (SaaS) offerings. AWS services can
offer organization tools such as compute power, database storage and
content delivery services. AWS launched in 2006 from the internal
infrastructure that Amazon.com built to handle its online retail
operations. AWS was one of the first companies to introduce a
pay-as-you-go cloud computing model that scales to provide users
with compute, storage or throughput as needed.AWS offers many
different tools and solutions for enterprises and software developers
that can be used in data centers in up to 190 countries. Groups such as
government agencies, education institutions, nonprofits and private
organizations can use AWS services.
AWS Elastic Beanstalk is an easy-to-use service for deploying and
scaling web applications and services developed with Java, .NET,

MITSOE,Department of Computer Engineering 2021-2022 18


PHP, Node.js, Python, Ruby, Go, and Docker on familiar servers such
as Apache, Nginx, Passenger, and IIS. You can simply upload your
code and Elastic Beanstalk automatically handles the deployment,
from capacity provisioning, load balancing, auto scaling to application
health monitoring. At the same time, you retain full control over the
AWS resources powering your application and can access the
underlying resources at any time.There is no additional charge for
Elastic Beanstalk - you pay only for the AWS resources needed to
store and run your applications.

4.2 PROPOSED METHODOLOGY


Cloud storage works by using at least one data server connected to the
Internet. When a user sends files over the Internet to the data server,
the cloud storage saves a copy. When the user wants to retrieve this
information, they access the data server through a web-based
interface. The server either sends the files back to the user or allows
them to access the files directly on the server. Cloud storage has many
advantages. It allows you to access your data from any location and
doesn’t require you to carry around an external hard drive to access
your information. You also have a backup of your information and
files in case something happens to the versions stored on the
computer. Some common examples of cloud storage are Google Drive
and web email providers like Gmail, Hotmail, and Yahoo. Cloud
storage refers to saving data to an off-site storage system that is
usually maintained by a third party. It allows you to store data in a
remote database. The Internet connection between your computer and
the database enables you to send or retrieve data files. Common
examples include Google Drive and Dropbox. Data is a crucial
component of any business. We all deal with gigabytes or terabytes of
data in our day-to-day work. And when you store a lot of files on your
PC it’s most likely that your PC can turn slow, resulting in poor
performance. Although there are plenty of external storage solutions
to store and backup your data, these storage devices are not failsafe.

MITSOE,Department of Computer Engineering 2021-2022 19


You can lose your important data due to any mishap such as breakage,
theft, damage, and many others.
There is nothing worse than losing your data or the fear of losing it.
This is where cloud storage comes with its fascinating features and
great capabilities that you can get remotely sitting in the comfort of
your home or office sitting at your PC or while outside traveling with
your Smartphone or tablet.
Cloud storage is a convenient and reliable option to store and retrieve
data. There are many different cloud storage services available in the
market. Before going for a cloud service, it’s important to understand
what exactly cloud storage is and how it works. So, let’s get started.
The cloud storage uses a chain of servers that includes both master
control server and other storage servers. The servers are all linked
with one another and it can be utilized depending upon your use and
requirements, and billed accordingly. Cloud storage saves your lot of
money otherwise you would have to spend on more strong servers as
your business needs increases. But in cloud storage, you only pay for
the space occupied by your data in the cloud.Cloud storage generally
supports multiple file types of all sizes, so you can easily upload all
your important content such as documents, videos, photos, music,
movies and more. Once you sign up for cloud storage service and
upload your files, you can sync it with your Smartphone, tablet or
other mobile devices for easy access while on the go.
The most fascinating feature of cloud storage solutions is you can
upload your files or download them from anywhere across the World
even without carrying your laptop. You just need internet access and
any mobile device on which you need to download the application of
your service provider. Then, simply login to your account and upload
or download the files.
Cloud also allows you to share your content with other users or your
team members working for your company. You can give them access
to remotely edit or read the files shared with them. Your team
members can collaborate and work together on a project and edit the
documents shared with them. You can invite people to give access to

MITSOE,Department of Computer Engineering 2021-2022 20


your files and folders and everyone with the access can see the shared
documents in their account.

Cloud storage is an example of technological advancement that


provides us an innovative method to maintain and manage our
content. For a nominal monthly fee, anyone can store their data
securely on an online location, without worrying about space. It’s easy
to upload and download your files with the cloud. Additionally, they
are secure, safe and can be accessed by you and anyone whom you
authorize. The files can be accessed anytime, from anywhere, using a
PC or mobile device.
An online file sharing service provides a way to store and access
information, such as documents, data, photos and video, in the cloud
rather than storing the information locally on a device hard drive
or removable media.  
File sharing is the act of sharing one or more computer files over
a network with someone in the same house, a team member at work,
or a friend in another country. You can also use file sharing to access
your files from anywhere. There are two ways to share files over a
network: directly between two computers or between a computer and
a server.

MITSOE,Department of Computer Engineering 2021-2022 21


When a file is shared between a computer and a server, the computer
uploads the file to a storage area on the server where you can share it
with others. People that want access to the file download it from that
server.
When a file is shared between two computers over a network, the file
is sent directly to the other person. This is often called peer-to-peer
(P2P) file sharing and works by communicating directly with the other
person's device, with no servers involved. An on-demand file transfer
program is a quick way to share files over any network, whether it's
the internet with someone in another country or a local network
between two computers in an office. You usually don't need a user
account to use these file-sharing tools, and the directions are often
straightforward.
FTP is one example that involves setting up an FTP server on the
computer that has the files to share. Anyone that wants the files uses
an FTP client to communicate with the server to download the files.
There are also peer-to-peer (P2P) tools for file sharing, such
as ShareDrop. With this file-sharing tool, you're provided a special
URL that grants access to download your files, and you choose what
to share from your computer.

MITSOE,Department of Computer Engineering 2021-2022 22


CHAPTER 5 RESULT AND ANALYSIS

This the page where the user lands .The user needs to select the
desired file from the documents and see that the file size does not
exceed 512mb. The user interface is kept simple for anyone to use this
webpage.

When the user uploads the desired document the page will ask for
destination email address and the source email address. The user
needs to click on send .

MITSOE,Department of Computer Engineering 2021-2022 23


After clicking on the send button a pop will show that your file is
been sent and is valid for only 24 hours.

MITSOE,Department of Computer Engineering 2021-2022 24


CHAPTER 6 SOFTWARE TESTING

6.1 POSITIVE TEST CASE


1. Upload zip file sizing less than 512mb.

2. The file is been selected and the user has to add source and
destination email address.

MITSOE,Department of Computer Engineering 2021-2022 25


3. After entering the mailing address the user has to click send and the
expected output is a pop up indicting that the file has been
successfully sent.

6.2 NEGATIVE TEST CASE

1. The user needs to select a file size exceeding 512 mb

MITSOE,Department of Computer Engineering 2021-2022 26


2. The user here has selected a file size of 1GB and the expected
output is it should upload and ask for email addresses.

3. The page did not accept the file and stayed idle. The file size was
exceeding 512mb

MITSOE,Department of Computer Engineering 2021-2022 27


CHAPTER 7 CONCLUSION

The Cloud-based file sharing approach is proposed to provide the


following services for external data confidentiality, secure data
sharing within the group, protect data from unauthorized access of
officials within the group and provide time and number of file access
to users.Whenever someone wants to share a file over an email they
can use this service, They can upload the file directly on CSSS and
send it in there mail box.This has solved the problem of sharing heavy
size files on email without uploading the files on your Cloud which
takes unnecessary storage space on your drive. There are tons of
optimistic features which can be addressed to the application. With
these usages, it can be a substitute for World Wide Web (physical
transportation of removable media), and also other standard sorts of
submitting exchange, like File transfer protocol and e-mail
attachments.In conclusion, cloud computing is recently new
technological development that has the potential to have a great
impact on the world. It has many benefits that it provides to it users
and businesses. For example, some of the benefits that it provides to
businesses, is that it reduces operating cost by spending less on
maintenance and software upgrades and focus more on the businesses
it self. But there are other challenges the cloud computing must
overcome. People are very skeptical about whether their data is secure
and private. There are no standards or regulations worldwide provided
data through cloud computing.

MITSOE,Department of Computer Engineering 2021-2022 28


CHAPTER 8 REFRENCES

REFRENCES:

1. Archana K Rajan, Surya Babu, “Privacy and Authenticity for


Cloud Data using Attribute Based Encryption and Digital Signature”
2017 Unpublished work. 
2. SeDaSC: Secure Data Sharing in Clouds MazharAli, Student
Member,IEEE, RevathiDhamotharan, Eraj Khan, Samee U. Khan,
Senior Member, IEEE,   AthanasiosV. Vasilakos, Senior Member,
IEEE, Keqin Li, Fellow, IEEE, and Albert Y. Zomaya, Fellow,
IEEE(2017). 
3. “Cloud based File Sharing”, Pragathi Shetty, Rajkumari
Sunanda,Sowmya Shree KS,Swathi N G, Hemanth KUmar N P 2017
Unpublished work 
4. Secure Data Sharing in Cloud Computing Using
Revocable-Storage Identity-Based Encryption, Jianghong Wei,Wenfen
Liu,Xuexian IEEE Transactions .
5. Hua Deng, Zheng Qin, Qianhong Wu, Zhenyu Guan, Robert H.
Deng, YujueWang, Yunya Zhou, "Identity-Based Encryption
Transformation for Flexible Sharing of Encrypted Data in Public
Cloud", Information Forensics and Security IEEE Transactions on,
vol. 15, pp. 3168-3180, 2020.
6. Q. Xu, C. Tan, Z. Fan, W. Zhu, Y. Xiao, and F. Cheng, ‘‘Secure
multi authority data access control scheme in cloud storage system
based on attribute-based signcryption,’’ IEEE Access, vol. 6, pp.
34051–34074,2018.
7. H. He, R. Li, X. Dong, and Z. Zhang, ‘‘Secure, efficient and
fine-grained data access control mechanism for P2P storage cloud,’’
IEEE Trans. Cloud Comput., vol. 2, no. 4, pp. 471–484, Oct./Dec.
2014. 
8. P.-W. Chi and C.-L. Lei, ‘‘Audit–free cloud storage via deniable
attribute– based encryption,’’ IEEE Trans. Cloud Comput., vol. 6, no.
2, pp. 414–427,Apr. 2018.

MITSOE,Department of Computer Engineering 2021-2022 29


9. Tharam Dillon; Chen Wu; Elizabeth Chang “Cloud Computing:
Issues and Challenges”  2010 24th IEEE International Conference
on Advanced Information Networking and Applications.
10. Hadi Tabatabaee Malazi, Saqib Rasool Chaudhry, Aqeel Kazmi,
Andrei Palade, Christian Cabrera, Gary White, Siobhán Clarke,
"Dynamic Service Placement in Multi-Access Edge Computing: A
Systematic Literature Review", IEEE Access, vol.10, pp.32639-32688,
2022.
11. Mohammed Adnan Islam, Muhammad Ehsan Rana, "Utilization
of Big Data with Cloud Computing in Modern Business Environment:
A Review", 2022 16th International Conference on Ubiquitous
Information Management and Communication (IMCOM), pp.1-7,
2022.
12. Saranjeet Kaur, Anand Kumar Shukla, Mansirat Kaur, "Cloud
Cryptography: Security Aspect", 2021 10th International Conference
on System Modeling & Advancement in Research Trends (SMART),
pp.38-42, 2021.
13. Bader Alouffi, Muhammad Hasnain, Abdullah Alharbi, Wael
Alosaimi, Hashem Alyami, Muhammad Ayaz, "A Systematic
Literature Review on Cloud Computing Security: Threats and
Mitigation Strategies", IEEE Access, vol.9, pp.57792-57807, 2021.
14. Mathias Mujinga, "Cloud Computing Inhibitors Among Small
and Medium Enterprises", 2020 3rd International Conference on
Intelligent Sustainable Systems (ICISS), pp.1385-1391, 2020.
15. Farrukh Nadeem, "A Unified Framework for User-Preferred
Multi-Level Ranking of Cloud Computing Services Based on
Usability and Quality of Service Evaluation", IEEE Access, vol.8,
pp.180054-180066, 2020.

MITSOE,Department of Computer Engineering 2021-2022 30

You might also like