Acknowledgement: M.Balasubramaniyan, Assistant Professor in Department of Computer Science and
Acknowledgement: M.Balasubramaniyan, Assistant Professor in Department of Computer Science and
The satisfaction that accompanies the successful completion of the task would be incomplete
without mention of the people who made it possible through constant guidance and encouragement
crowns all efforts with success.
We express our sincere thanks to Sri Ravuri Srinivas Garu, Vice-Chairman, Sri Venkateswara
College of Engineering and Technology (Autonomous) for providing facilities in his esteemed
institution.
We are extremely thankful to Dr.T.Sunil Kumar Reddy, M.Tech, Ph.D, HOD, Department of
Computer Science and Engineering, for giving us his valuable guidance, without whom we would
not have able to complete our project work.
We also convey our gratitude to all CSE staff members and my parents and other members
in the project and those who have contributed to this project directly or indirectly.
Y.G.HEMA 15781A05B0
DILMUROD TASHPULATOV 15781A05D8
BIJAYA TWANABASU 15781A05B9
SEGATHITH KEOMUANVONG 15781A05D5
i
ABSTRACT
The traditional architecture of the cloud computing cannot satisfy the requirements such as
low latency, fast data access for IoT applications. Mobile edge computing can solve these
problems, and improve the execution efficiency of the system. In this paper, we propose a
privacy preserving data aggregation scheme for mobile edge computing assisted IoT
applications. In our model, there are three participants, i.e. terminal device, edge server and
public cloud center. The data generated by the terminal devices is encrypted and transmitted
to the edge server, then the edge server aggregates the data of the terminal devices and
submits the aggregated data to the public cloud center. At last, the aggregated plain text
data can be recovered by public cloud center through its private key. Our scheme not only
guarantees data privacy of the terminal devices, but also provides source authentication and
integrity.
ii
CONTENTS
TITLE PAGE NO.
ACKNOWLEDGEMENT...........................................................................................................i
ABSTRACT.....................................................................................................ii
CONTENTS....................................................................................................iii
LIST OF FIGUES.............................................................................................v
LIST OF ABBREVIATIONS.........................................................................vi
CHAPTER 1 INTRODUCTION...........................................................................................1
1.1 PREVIOUS WORK....................................................................................3
CHAPTER 2 LITERATURE SURVEY...............................................................................5
2.1 LITERATURE SURVEY...........................................................................6
CHAPTER 3 SYSTEM ANALYSIS.....................................................................................8
3.1 EXISTING SYSTEM:................................................................................9
3.2 PROPOSED SYSTEM:..............................................................................9
3.3 SYSTEM REQUIREMENTS..................................................................10
CHAPTER 4 SYSTEM DESIGN........................................................................................11
4.1 UML DIAGRAMS....................................................................................12
4.2 GOALS......................................................................................................12
4.3 SOFTWARE ENVIRONMENT................................................................21
CHAPTER 5 IMPLEMENTATION....................................................................................28
5.1 MODULES.................................................................................................29
5.2 SOURCE CODES.......................................................................................30
CHAPTER 5 RESULTS.......................................................................................................51
CHAPTER 6 SYSTEM TESTING......................................................................................59
6.1 TYPES OF TESTING................................................................................60
6.2 UNIT TESTING:.......................................................................................62
6.3 TEST STRATEGY AND APPROACH....................................................62
6.4 INTEGRATION TESTING.......................................................................62
6.5 ACCEPTANCE TESTING........................................................................62
CHAPTER 7 CONCLUSION..............................................................................................63
iii
7.1 FUTURE SCOPE:......................................................................................64
7.2 RECOMMENDATIONS:..........................................................................64
REFERENCE...........................................................................................................................65
iv
LIST OF FIGURES
v
LIST OF ABBREVIATIONS
SL NO ABBREVIATION DESCRIPTION
1 IDE Integrated Development
Environment
2 IOT Internet of Things
3 GUI Graphical User Interface
4 XML Extensive Markup Language
5 UML Unified Modelling Language
6 RFID Radio-frequency
Identification
7 WSN Wireless Sensor Networks
8 MEC Mobile Edge Computing
vi
PRIVACY PRESERVING DATA AGGREGATION SCHEME
CHAPTER 1
INTRODUCTION
1. INTRODUCTION
Cloud computing has dramatically changed the traditional computing model, which provides
users with usable, on-demand access, convenient computing and storage services. By
leveraging cloud computing services, enterprises and ordinary users can rent the resources of
cloud service provider and do not need to build their own infrastructure. Cloud computing is
widely accepted due to the features of flexibility, easy to use, high scalability, location
independence and reliability. Meanwhile, with the development of sensing technology and
microelectronics technology, the Internet of Things (IoT) allows any device to access the
Internet. In the IoT vision, the object can be identified by radio-frequency identification
(RFID) technique, and the environment parameters can be sensed by wireless sensor networks
(WSN). Then, the various smart applications, such as smart grid, smart home, smart city, and
intelligent agriculture, can be built by analyzing and utilizing the sensory data. Take intelligent
agriculture as an example, the crop growth environment information can be obtained by
different types of sensors (environmental temperature and humidity, soil moisture, carbon
dioxide, images, etc.) deployed at the agricultural production sites. Then the sensory data
collected and analyzed by the control center and the corresponding operations such as
irrigation, cooling, fertilization and spraying can be done according to the feedback of all
kinds of collected information. To take complementary advantages of the IoT and cloud,
researcher have proposed the concept of cloud assisted IoT. In the new paradigm, IoT is no
longer restricted by the storage, communication and processing capacities, which are
compensated by the could. On the contrary, the cloud can deal with more real life applications
in a more distributed and dynamic way by combine with the IoT. Different organizations have
predicted that billions of smart devices will be connected to the Internet in near future, and
will generate huge amount of data, which should be analyzed and processed in a security and
effective way. Besides, the widespread applications of IoT require the smart devices to have
low latency, high data rate, fast data access for real-time data processing/analysis and decision
making. However, the traditional cloud computing cannot satisfy these requirements, and the
concept of mobile edge computing (MEC) was proposed by researchers. A typical architecture
of mobile edge computing assisted IoT applications is explained as follows. It is a three-level
hierarchy that contains the Cloud, MEC and terminal devices. The terminal devices can be the
mobile devices, sensors and wearable devices with communication and sensing capabilities.
Compared to IoT terminal devices, more computing, storage and communication resources are
available on the edge server. The edge server can be a standalone server or a gateway device,
which is deployed at the edge of a cloud computing network and physical proximity to the IoT
terminal devices, and plays as the bridge between IoT terminal devices and public cloud
center. Edge computing allows some computations and processing to be performed at the edge
of the network, thus improving the efficiency of the traditional cloud computing. The edge
server not only performs computing offloading, data storage and processing, but also delivers
services from the cloud to the user.
scheme for mobile edge computing assisted IoT applications based on the Boneh-Goh-Nissim
cryptosystem or RSA Algorithm.
CHAPTER 2
LITERATURE SURVEY
LITERATURE SURVEY
INTRODUCTION
Literature survey is the most important step in software development process. Before
developing the tool it is necessary to determine the time factor, economy n company strength.
Once these things r satisfied, ten next steps are to determine which operating system and
language can be used for developing the tool. Once the programmers start building the tool the
programmers need lot of external support. This support can be obtained from senior
programmers, from book or from websites. Before building the system the above
consideration are taken into account for developing the proposed system.
The Internet of Things (IoT) is an emerging technology and expected to provide solutions for
various industrial fields. As a basic technology of the IoT, wireless sensor networks (WSNs)
can be used to collect the required environment parameters for specific applications. Due to
the resource limitation of sensor node and the open nature of wireless channel, security has
become an enormous challenge in WSN
Authentication as a basic security service can be used to guarantee the legality of data access
in WSN. Recently, Chang and Le proposed two authentication protocols for WSN for different
security requirements. However, their protocol cannot provide proper mutual authentication
and has other security and functionality defects. We present a three-factor user authentication
protocol for WSN to remove the weaknesses of previous protocols. The security of the
proposed protocol is analyzed, and the security, functionality and performance of our protocol
are compared with other related protocols. The comparison results and simulation results by
NS-3 show that the proposed protocol is robust and energy efficient for IoT applications.
A survey, Mobile edge computing (MEC) is an emergent architecture where cloud computing
services are extended to the edge of networks leveraging mobile base stations. As a promising
edge technology, it can be applied to mobile, wireless, and wire line scenarios, using software
and hardware platforms, located at the network edge in the vicinity of end-users. MEC
provides seamless integration of multiple application service providers and vendors toward
mobile subscribers, enterprises, and other vertical segments It is an important component in
the 5G architecture which supports variety of innovative applications and services where
ultralow latency is required. This paper is aimed to present a comprehensive survey of relevant
research and technological developments in the area of MEC. It provides the definition of
MEC, its advantages, architectures, and application areas; where we in particular highlight
related research and future directions. Finally, security and privacy issues and related existing
solutions are also discussed.
2.2.3 R. Roman, J. Lopez, and M. Mambo, “Mobile edge computing, fog et al.:
A survey and analysis of security threats and challenges, “For various reasons, the cloud
computing paradigm is unable to meet certain requirements (e.g. low latency and jitter, context
awareness, mobility support) that are crucial for several applications (e.g. vehicular networks,
augmented reality). To fulfill these requirements, various paradigms, such as fog computing,
mobile edge computing, and mobile cloud computing, have emerged in recent years. While
these edge paradigms share several features, most of the existing research is
compartmentalized; no synergies have been explored. This is especially true in the field of
security, where most analyses focus only on one edge paradigm, while ignoring the others.
The main goal of this study is to holistically analyze the security threats, challenges, and
mechanisms inherent in all edge paradigms, while highlighting potential synergies and venues
of collaboration. In our results, we will show that all edge paradigms should consider the
advances in other paradigms
CHAPTER-3
SYSTEM ANALYSIS
SYSTEM ANALYSIS
3.1.1 Disadvantages:
3.2.2 Scope
To provide the secured way of communication of data through the use of the edge server and
cloud based encryption mechanism, the security and privacy of IoT as well as related to it data
will be ensured such that the enhanced system will do everything that is possible to keep the
invasion as well as indulgence of the data far away from the device and related to it
infrastructure.
3.2.3 Advantages
CHAPTER 4
SYSTEM DESIGN
SYSTEM DESIGN
The goal is for UML to become a common language for creating models of object oriented
computer software. In its current form UML is comprised of two major components: a Meta-
model and a notation. In the future, some form of method or process may also be added to; or
associated with, UML.
The UML represents a collection of best engineering practices that have proven successful in
the modeling of large and complex systems.
The UML is a very important part of developing objects oriented software and the software
development process. The UML uses mostly graphical notations to express the design of
software projects.
4.2 GOALS
The Primary goals in the design of the UML are as follows:
1. Provide users a ready-to-use, expressive visual modeling Language so that they can
develop and exchange meaningful models.
2. Provide extendibility and specialization mechanisms to extend the core concepts.
3. Be independent of particular programming languages and development process.
4. Provide a formal basis for understanding the modeling language.
5. Encourage the growth of OO tools market.
6. Support higher level development concepts such as collaborations, frameworks,
patterns and components.
A use case diagram in the Unified Modeling Language (UML) is a type of behavioral diagram
defined by and created from a Use-case analysis. Its purpose is to present a graphical overview
of the functionality provided by a system in terms of actors, their goals (represented as use
cases), and any dependencies between those use cases. The main purpose of a use case
diagram is to show what system functions are performed for which actor. Roles of the actors in
the system can be depicted.
email
(from Logical View)
user
password
(from Logical View)
email
(from Logical View)
edge
password
(from Logical View)
email
(from Logical View)
csp
password
(from Logical View)
In software engineering, a class diagram in the Unified Modeling Language (UML) is a type
of static structure diagram that describes the structure of a system by showing the system's
classes, their attributes, operations (or methods), and the relationships among the classes. It
explains which class contains information.
USER
CSP
email Edge
email
password email
password
password
login()
login()
check avalable center() add edge data center()
add data center()
data center request() logout()
view data center()
upload file()
purchased data center()
download file()
logout()
loguot()
login
login
upload file
download file
logout
logout
logout
In collaboration diagram the method call sequence is indicated by some numbering technique
as shown below. The number indicates how the methods are called one after another. We have
taken the same order management system to describe the collaboration diagram. The method
calls are similar to that of a sequence diagram. But the difference is that the sequence diagram
does not describe the object organization where as the collaboration diagram shows the object
organization.
edge
user
3: login
7: check avalable data center
8: data center request
10: upload file
11: download file
12: logout
14: logout
2: login
6: add edge data center
9: view edge data center
CSP
system
1: login
4: add data center
5: puechased data center
13: logout
Activity diagrams are graphical representations of workflows of stepwise activities and actions
with support for choice, iteration and concurrency. In the Unified Modeling Language, activity
diagrams can be used to describe the business and operational step-by-step workflows of
components in a system. An activity diagram shows the overall flow of control.
user csp
edge
login
login
login
download file
Component diagrams are used to describe the physical artifacts of a system. This artifact
includes files, executables, libraries etc. So the purpose of this diagram is different,
Component diagrams are used during the implementation phase of an application. But it is
prepared well in advance to visualize the implementation details. Initially the system is
designed using different UML diagrams and then when the artifacts are ready component
diagrams are used to get an idea of the implementation.
user
system
csp
edge
CSP
user
edge system
3. Free: Believe it or not but people want free stuff. Don't you? But if we talk about an
organization's cost then it is an important factor in development and to create a Java
application you need to pay nothing but your idea.
4. Documents Supports: Javadoc’s! It has all the stuff you want when you learn Java or
when creating application. It has each and every thing about Java, like how to use a class,
what method belongs to which class and so on.
5. Rich API: It is also one of the best reasons to learn Java because it has a highly visible
and rich API because if we talk about other programming languages like Turbo C++, it has
a simple interface and very poor quality animation capability. But in Java, it has a great
interface and very high quality animation capability.
6. Robust: Robustness means that which is strong, powerful and not effected by others. But
how is Java strong and powerful, in what sense? So friends here robust means reliable and
there is no programming language as reliable as Java. It provides a very low chance of
error for the programmer because of its strong memory allocation, garbage collection
mechanism and exception handling compared to other programming languages.
7. Platform Independent: As I said earlier, the team started a project that will be platform-
independent but they had no resource to make a program platform-independent. That is
why Java was born. And now we can see that if we write a Java program we can run in any
environment using the JVM.
10. Open Source: Well friends Java is also an open source programming language by which
we can make fast and cost effective applications easily. And the reason behind it is it has a
great framework like Spring, Struts and so on and many libraries that are contributed by
Google and other organizations.
11. High Performance: Java is high-performance language because the JVM is very
intelligent. When we run a Java program the JVM does not interpret the entire code into
machine instructions. It interprets the required code that will be executed. This enhances
the performance.
12. Distributed: Distributed systems are those systems in which resources are shared and this
can be done in Java using Remote Method Invocation (RMI). In RMI there is a server and
one or more clients can communicate.
13. Portable: Java is a portable language because we can make a program in one computer,
compile in another computer and execute in another computer. And using its platform
independence we can write code in one operating system and execute in another operating
system.
14. Development Tools: Java has great development tools such as Netbeans, Eclipse and so
on that plays a major role in development. Using these tools we can create our code faster
because it provides help and great debugging capability.
JavaServer Pages (JSP) is a technology for developing Webpages that supports dynamic
content. This helps developers insert java code in HTML pages by making use of special JSP
tags, most of which start with <% and end with %>.
A JavaServer Pages component is a type of Java servlet that is designed to fulfill the role of a
user interface for a Java web application. Web developers write JSPs as text files that
combine HTML or XHTML code, XML elements, and embedded JSP actions and
commands.
Using JSP, you can collect input from users through Webpage forms, present records from a
JSP tags can be used for a variety of purposes, such as retrieving information from a database
or registering user preferences, accessing JavaBeans components, passing control between
pages, and sharing information between requests, pages etc.
Finally, JSP is an integral part of Java EE, a complete platform for enterprise class
applications. This means that JSP can play a part in the simplest applications to the most
complex and demanding.
Oracle Database is the first database designed for enterprise grid computing, the most flexible
and cost effective way to manage information and applications. Enterprise grid computing
creates large pools of industry-standard, modular storage and servers. With this architecture,
each new system can be rapidly provisioned from the pool of components. There is no need
for peak workloads, because capacity can be easily added or reallocated from the resource
pools as needed.
1. Functionality Oracle databases are used for practically all corporation level
applications. Thus, Oracle databases dominate the banking industry. Ten of the world's top
banks use Oracle databases to conduct their business. This is primarily due to Oracle's
functionality. They provide a combination of high-level technology and integrated
business solutions. This is a perfect for practically all corporations that have huge amounts
of data to store and access.
2. Reliability Another important advantage offered by Oracle databases are their reliability.
Oracle is a database that delivers excellent performance when challenged with demanding
tasks. The ACID test, which is an important tool used to ensure the integrity of data stored,
was easily passed by Oracle databases. This test is important since reliable data storage is
the main purpose of a database. Thus, Oracle databases have been proven to deliver high
integrity of data storage.
4. Other Advantages Oracle databases have also successfully featured the four properties
that all database systems must have. These four properties are atomicity, consistency,
isolation and durability. All four of the properties are well maintained by Oracle databases,
thus providing a reliable and competent database system.
CHAPTER 5
IMPLEMENTATION
5. IMPLEMENTATION
5.1 MODULES:
Three modules:
1. Edge
2. CSP
3. User
5.1.1 Edge:
Edges are maintained by CPS, and located at the proximity of Users (edge of the network).
Edges bridge the Users and CPS to extend the applications of cloud services by providing
store and processing services for the User’s.
5.1.2 CSP:
CSP provides cloud computing and storage services for the users with large storage capacity
and strong computing power. The data from Users and Edges can be stored and processed on
CSP. CSP initializes the system by generating system parameters. Besides, CSP is responsible
for the registration of Users and generates the private/public keys for Edges.
5.1.3 User:
User’s devices, such as the mobile phone and the IoT devices, which are connected to the edge
network to collect specific data. These devices usually have limited computing and
communications resources
package csp;
import java.io.*;
import javax.servlet.*;
import javax.servlet.http.*;
import java.util.*;
import csp.AddDataCenter;
import csp.Login;
import csp.Logout;
import csp.Register;
import csp.ViewDataCenter;
import org.project.User;
// Do required initialization
if(query.equals("logreg")){
session.setAttribute("salary", "logreg");
view.forward(request, response);
else if(query.equals("logout")){
try {
ex.printStackTrace();
else if(query.equals("AddDC")){
session.setAttribute("salary", "AddDC");
view.forward(request, response);
else if(query.equals("AddDCEdge")){
session.setAttribute("salary", "AddDCEdge");
view.forward(request, response);
else if(query.equals("ViewDC")){
session.setAttribute("salary", "ViewDC");
catch(Exception e){
e.printStackTrace();
else if(query.equals("ViewDCEdge")){
session.setAttribute("salary", "ViewDCEdge");
e.printStackTrace();
else if(query.equals("ViewDCAccept")){
if(userType.equals("csp")){
session.setAttribute("salary", "ViewDC");
attribute = "ViewDC";
else{
session.setAttribute("salary", "ViewDCEdge");
attribute = "ViewDCEdge";
//----------------------------
response.sendRedirect(request.getContextPath()+ "/SessionTrack?query="+attribute);
//-----------------------------
else if(query.equals("ViewDCReject")){
if(userType.equals("csp")){
session.setAttribute("salary", "ViewDC");
attribute = "ViewDC";
else{
session.setAttribute("salary", "ViewDCEdge");
attribute = "ViewDCEdge";
//----------------------------
response.sendRedirect(request.getContextPath()+ "/SessionTrack?query="+attribute);
//-----------------------------
else if(query.equals("AvailableDataCenter")){
try{
}catch(Exception e){
e.printStackTrace();
else if(query.equals("SelectDataCenter")){
try{
}catch(Exception e){
e.printStackTrace();
else if(query.equals("PurchaseDC")){
try{
catch(Exception e){e.printStackTrace();}
if(query.equals("PurchasedDCAccept")){
new ActivateDeactivatePurchasedDC().activate(name,email);
else{
new ActivateDeactivatePurchasedDC().deactivate(name,email);
session.setAttribute("salary", "PurchaseDC");
response.sendRedirect(request.getContextPath()+"/SessionTrack?query=PurchaseDC");
else if(query.equals("DataCenterStatus")){
try{
}catch(Exception e){
e.printStackTrace();
//remove
else if(query.equals("PurchasedDCRemove")){
try{
}catch(Exception e){
e.printStackTrace();
session.setAttribute("salary", "DataCenterStatus");
response.sendRedirect(request.getContextPath()+ "/SessionTrack?query=DataCenterStatus");
if("register".equals(source)){
try {
ex.printStackTrace();
else if("login".equals(source)){
try {
if(!userType.equals("user")){
user.setEmail(email);
user.setPassword(password);
user.setUsertype(userType);
session.setAttribute("User", user);
session.setAttribute("userType", "csp");
session.setAttribute("salary", "Welcome");
session.setAttribute("userType", "edge");
session.setAttribute("salary", "Welcome");
else{
view.forward(request, response);
else{
ex.printStackTrace();
else if("AddDC".equals(source)){
try {
ex.printStackTrace();
else if("AddDCEdge".equals(source)){
try {
ex.printStackTrace();
// do nothing.
5.2.2 Login.java
package csp;
import java.io.IOException;
import java.sql.Connection;
import java.sql.ResultSet;
import java.sql.SQLException;
import java.sql.Statement;
import javax.servlet.RequestDispatcher;
import javax.servlet.ServletException;
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletResponse;
import javax.servlet.http.HttpSession;
import org.project.DatasetAccess;
import org.project.User;
/*-----------REGISTRATION---------*/
//
System.out.println("\n"+user+"\n");
//
this.closeStatement();
//request.setAttribute("msg", "invalid");
view.forward(request, response);
//ADD MESSAGE
}else{
session.setAttribute("User", user);
session.setAttribute("salary", "Welcome");
session.setAttribute("userType", usertype);
view.forward(request, response);
conn = connection.getCon();
stmt = conn.createStatement();
while (rs.next()){
user.setName(rs.getString(1));
user.setEmail(rs.getString(2));
user.setUsertype(rs.getString(3));
return user;
if (stmt != null) {
stmt.close();
if (conn != null) {
conn.close();
5.2.3 Register.java
package csp;
import java.io.IOException;
import java.sql.Connection;
import java.sql.SQLException;
import java.sql.Statement;
import javax.servlet.RequestDispatcher;
import javax.servlet.ServletException;
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletResponse;
import org.project.DatasetAccess;
import org.project.User;
/*-----------REGISTRATION---------*/
user.setName(name);
user.setEmail(email);
user.setPassword(password);
user.setMobile(mobile);
user.setState(state);
user.setUsertype(usertype);
//
System.out.println("\n"+user+"\n");
//
this.registerUser(user);
this.closeStatement();
view.forward(request, response);
conn = connection.getCon();
stmt = conn.createStatement();
if (stmt != null) {
stmt.close();
if (conn != null) {
conn.close();
5.2.4 ActivateDeactivatePurchasedDC.java
package csp;
import java.sql.Connection;
import java.sql.SQLException;
import java.sql.Statement;
try{
this.updateEdgeDC(name, "2",email);
this.closeStatement();
}catch(Exception e){
e.printStackTrace();
try{
this.updateEdgeDC(name, "1",email);
this.closeStatement();
}catch(Exception e){
e.printStackTrace();
conn = connection.getCon();
stmt = conn.createStatement();
if (stmt != null) {
stmt.close();
if (conn != null) {
conn.close();
5.2.5 ActivateDeactivateScpEdge.java
package csp;
import java.sql.Connection;
import java.sql.SQLException;
import java.sql.Statement;
try{
this.closeStatement();
}catch(Exception e){
e.printStackTrace();
try{
this.closeStatement();
}catch(Exception e){
e.printStackTrace();
conn = connection.getCon();
stmt = conn.createStatement();
stmt.execute("update " + dc + " set status='" + status where datacenters='" + dname + "'");
if (stmt != null) {
stmt.close();
if (conn != null) {
conn.close();
5.2.6 AddDataCenter.java
package csp;
import java.io.IOException;
import java.sql.Connection;
import java.sql.SQLException;
import java.sql.Statement;
import javax.servlet.RequestDispatcher;
import javax.servlet.ServletException;
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletResponse;
import javax.servlet.http.HttpSession;
import org.project.DatasetAccess;
import org.project.User;
try {
this.closeStatement();
if(dc.equals("csp")){
session.setAttribute("salary", "AddDC");
else{
session.setAttribute("salary", "AddDCEdge");
view.forward(request, response);
ex.printStackTrace();
public void insertEDC(String dname, String state, String lat, String logt,
conn = connection.getCon();
stmt = conn.createStatement();
if (stmt != null) {
stmt.close();
if (conn != null) {
conn.close();
CHAPTER 5
RESULTS
5. RESULTS
HOME PAGE: it is the lending page, where the person trying to utilize the system will lend
and be given a choice of whether to login or register. All three concerning persons, CSP user,
Edge User and just user will go through this page.
CSP ADMIN: has to log in to view the options or facilities available to the concerning
individual.
EDGE ADMIN: has to log in to view the options or facilities available to the concerning
individual.
USER: has to log in to view the options or facilities available to the concerning individual.
LOGIN CSP PAGE: asking all the concerning persons to provide their verification details so
that the customer will be verified and allowed to proceed.
CSP LOGIN: after csp user being logged in, the following view will come out and show the
available options to the concerning individual.
ADD DATA CENTER PAGE: asking all the concerning persons to provide required
information to add the data about data center server that will be available to the user.
VIEW DATA CENTER PAGE: asking all the concerning persons to view required
information regarding the data centers and activate them if necessary.
VIEW PURCHASED DATA CENTER PAGE: asking all the concerning persons to view
required information regarding the purchased data centers and activate them if necessary.
ADD EDGE DATA CENTER PAGE: asking all the concerning persons to provide required
information to add the data about edge data center server that will be available to the user.
VIEW EDGE DATA CENTER PAGE: asking all the concerning persons to view required
information regarding the edge data centers and activate them if necessary.
USER LENDING PAGE AFTER LOGIN: to such a view will be presented the user after
being logged in, provided with full of options to fully utilize the capabilities of the system.
VIEW DATA CENTER STATUS PAGE: asking all the concerning persons to view
required information regarding the data center status, whether it is activated or not.
UPLOAD PAGE: asking all the concerning persons to upload the information if required and
to do it to a specific data center.
DOWNLOAD PAGE: asking all the concerning persons to download the information if
required and to do it from a specific data center.
CHAPTER 6
SYSTEM TESTING
6. SYSTEM TESTING
The purpose of testing is to discover errors. Testing is the process of trying to discover every
conceivable fault or weakness in a work product. It provides a way to check the functionality
of components, sub-assemblies, assemblies and/or a finished product It is the process of
exercising software with the intent of ensuring that the
Software system meets its requirements and user expectations and does not fail in an
unacceptable manner. There are various types of test. Each test type addresses a specific
testing requirement.
The task of the integration test is to check that components or software applications, e.g.
components in a software system or – one step up – software applications at the company level
– interact without error.
Test Results: All the test cases mentioned above passed successfully. No defects encountered.
Test Results: All the test cases mentioned above passed successfully. No defects encountered.
CHAPTER 7
CONCLUSION
7. CONCLUSION
Mobile edge computing is a new paradigm that complements the could computing and IoT
complement to each other. This paper defined the privacy preserving data aggregation for
mobile edge computing assisted IoT applications, which not only save the communication
overhead of the full system, but also preserve privacy of terminal devices. Hereafter, we
designed a privacy preserving data aggregation for mobile edge computing assisted IoT
applications based on the holomorphic property of Boneh-Goh-Nissimcryptosystem or RSA
Algorithm. The proposed scheme can protect privacy and provide source authentication and
integrity. The performance analysis show that the proposed scheme can save almost half of the
communication cost compared with traditional method. Therefore, it is very suitable for the
mobile edge computing assisted IoT applications. In future work, we will evaluate the
proposed scheme under realistic IoT environment. Besides, the mobile edge computing is a
new thing, and the research on its security and privacy issues is just getting started.
Furthermore, the characteristics of mobile edge computing, such as multisource heterogeneity,
cross-trust domain, and limited terminal resources, may create new security and privacy
issues, and the traditional security and privacy preserving mechanisms of cloud computing
may not suitable for mobile edge computing. In future research, we will also focus on the
lightweight authentication mechanisms across trust domains and the data sharing schemes
with privacy protection in different trust domains suitable for mobile edge computing.
7.2 RECOMMENDATIONS:
The software developed by us is going to be in high demand, therefore, the leading IT
corporations such as Google, Microsoft and Amazon should take the first initiative and be the
first one to implement and utilize our technology with related to it infrastructure.
REFERENCE
REFERENCE
14. W. Shi, J. Cao, Q. Zhang, Y. Li, and L. Xu, “Edge computing: Visionand challenges,”
IEEE Internet of Things Journal, vol. 3, no. 5, pp.637–646, 2016.
15. N. Abbas, Y. Zhang, A. Taherkordi, and T. Skeie, “Mobile edgecomputing: A survey,”
IEEE Internet of Things Journal, vol. 5, no. 1,pp. 450–465, 2018.
16. S. Yi, Z. Hao, Z. Qin, and Q. Li, “Fog computing: Platform andapplications,” in In 2015
Third IEEE Workshop on Hot Topics in WebSystems and Technologies (Hot Web). IEEE,
2015, pp. 73–78.
17. K. Ha, Z. Chen, W. Hu, W. Richter, P. Pillai, and M. Satyanarayanan,“Towards wearable
cognitive assistance,” pp. 68–81, 2014.
18. B. Chun, S. Ihm, P. Maniatis, M. Naik, and A. Patti, “Clone cloud: elasticexecution
between mobile device and cloud,” pp. 301–314, 2011.