MODIFIED project - Research and use an estimation technique to answer the question How many soft pretzels do people in Philadelphia consume each day Why

MODIFIED project - Research and use an estimation technique...

This preview shows page 1 - 6 out of 109 pages.

Research and use an estimation technique to answer the question How many soft pretzels do people in Philadelphia consume each day? Why is estimating an important skill for a business/systems analyst? Give an example of a when this skill may be used on a project
Image of page 1
Abstract: Using cloud storage, users can remotely store their data and enjoy the on-demand high- quality applications and services from a shared pool of configurable computing resources, without the burden of local data storage and maintenance. However, the fact that users no longer have physical possession of the outsourced data makes the data integrity protection in cloud computing a formidable task, especially for users with constrained computing resources. Moreover, users should be able to just use the cloud storage as if it is local, without worrying about the need to verify its integrity. Thus, enabling public auditability for cloud storage is of critical importance so that users can resort to a third-party auditor (TPA) to check the integrity of outsourced data and be worry free. To securely introduce an effective TPA, the auditing process should bring in no new vulnerabilities toward user data privacy, and introduce no additional online burden to user. In this paper, we propose a secure cloud storage system supporting privacy-preserving public auditing. We further extend our result to enable the TPA to perform audits for multiple users simultaneously and efficiently. Extensive security and performance analysis show the proposed schemes are provably secure and highly efficient. LIST OF CONTENTS
Image of page 2
1. Introduction 1.1 Purpose 1.2 Scope 1.3 Motivation 1.3.1 Definitions 1.3.2 Abbreviations 1.3.3 Model Diagrams 1.4 Overview 2. Literature Survey 2.1 Introduction 2.2 History 2.3 Purpose 2.4 Requirements 2.5 Technology Use 2.6 Research Methodologies 3. Fundamental Concepts on (Domain) 3.1 Domain Fundamentals & Description 3.1 Existing concepts of fundamentals 3.2 Existing System Algorithms 3.3 Proposed System Fundamentals concepts 3.4 Proposed Algorithms 3.5 Performance analysis in between of existing system and proposed system 4. System Analysis 4.1 Existing System 4.1.1 Drawbacks
Image of page 3
4.2 Problem statement 4.3 Proposed System 4.3.1 Advantages 4.4 Modules Description 4.5 Feasibility Study 4.5.1 Economic Feasibility 4.5.2 Operational Feasibility 4.5.3 Technical Feasibility 5. System Requirements Specification 5.1 Introduction 5.2 Purpose 5.3 Functional Requirements 5.4 Non Functional Requirements 5.5 Hardware Requirements 5.6 Software Requirements 6. System Design 6.1 System Specifications 6.2 System Components 6.3 DFD’s 6.4 UML Diagrams 6.5 Data Dictionaries and ER Diagram 7. Implementation 7.1 Technology Description 7.2 Code Snippets (Logics) & Analysis 8. System Testing
Image of page 4
8.1 Testing Methodologies 8.2 Test cases 8.3 Result Analysis 9. Conclusion and Future Enhancements 9.1 Conclusion 9.2 Scope for Future Enhancements 10. References Appendix: 1. Sample code 2. screenshots Introduction: CLOUD computing has been envisioned as the next generation information technology (IT)
Image of page 5
Image of page 6

You've reached the end of your free preview.

Want to read all 109 pages?

  • Fall '14
  • Smith,R

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture