INTRODUCTION which is a huge boost for increasing

INTRODUCTION 1.1 INFORMATION CONSISTENCY Numerous developments are being introduced as the epoch of Cloud Computing, which is an cyberspace-based progress and use of supercomputer expertise. Most powerful processors which were too expensive to begin with have become cheaper by the help of pooling processing power and providing the processing power on demand.

The development of high speed internet with increased bandwidth have increased the quality of services leading to better customer satisfaction which the most primitive goal of any organization. The migration of data from the users computer to the remote data centers have the provided the customer with great and reliable convenience. Amazon simple storage services are the well-known examples which are one of the pioneers of cloud services. The eliminate the need of maintain the data on a local system which is a huge boost for increasing quality of service. But due to this the customers are always as the mercifulness of the cloud service provider as their downtime causes the user to be unable to access his own data.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!

order now

Since every coin has two sides, likewise cloud computing has its own fair share of security threats and also there may be some threats which are yet to be discovered. Considering from the users point of view, he wants his data to be secure therefore, data security is the most important aspect which will ultimately lead to the customer satisfaction. The users have limited control on their own data so the conventional cryptography measures cannot be adopted. Thus, the data stored on the cloud should be verified occasionally to ensure the data has not been modified without informing the owner. The data which is rarely used is sometimes moved to lower tier storage making it more vulnerable for attacks. On the other note, Cloud Computing not only stores the data but also provides the user with functionality like modifying the data, appending some information to it or permanently deleting the data.

To assure the integrity of data various hashing algorithms can be used to create checksums which will alert the user about the data modifications. 1.2 PROBLEM DEFINITION Firstly, traditional cryptographic primitives for the purpose of data security protection cannot be directly adopted due to the users loss control of data under Cloud Computing. Whenever it comes to the matter relating to cloud services the user is put at a disadvantage regarding to the security of the file. Basically the file is stored on a server which is a pool resource that is any one with users credentials can access the file and if in case the attacker comes to know about the password as well as the encryption keys the attacker can modify the file contents, thus making the information stored in the file to be accessed by the unauthorized user.

So, the problem is that what if someone copys your work and claims to be his own work. Anything we design , anything we invent is governed by the principle of whether or not it guarantees customer satisfaction. Hence, the problem is underlying whether the customer can rest assured that his data is safe from unauthorized access or not. 1.3 PROJECT PURPOSE In our purposed system, we provide assurance to the user that his information is safe by implementing a system which provides security mechanisms by offering three levels of security. Concerning about the data security part, our system is divided mainly into three modules named IP triggering module, client-authentication module and redirecting module.

The system generates a user password and a key which is used for client authentication. The algorithm generates two keywords 8 bit length consisting of combinations of characters, special characters, and numbers which is used for client authorization and file authorization. Questions may arise as why do we use keys of 8 bit length only The purpose of our system is to prevent illegal data access if the users credential are compromised. By testing against weak algorithms which are easier to crack we design our system to be more robust.

1.4 PROJECT FEATURES Our scheme would be to prevent illegal access of users data. A user after getting himself registered on the system will have the advantage of different layers of security.

The most primitive work our system is to inform the user that his data has been accessed from an unregistered ip by using mail triggering events. For login, the attacker tries to access the file by using the credentials stolen from the victim, and upon entering is provided with a dialog box to enter a key. The attacker tries to enter the key which wont be accepted by any means. The attacker is provided with a three tries so that he can go back. After 3 tries, the attacker is provided with the access of the fake file which is implemented by the redirection module. 1.

5 MODULES DESCRIPTION 1.5.1 CLOUD STORAGE Data outsourcing to cloud storage servers is raising trend among many firms and users owing to its economic advantages. This essentially means that the owner (client) of the data moves its data to a third party cloud storage server which is supposed to – presumably for a fee – faithfully store the data with it and provide it back to the owner whenever required. Cloud storage increases maintainability and decreases storage cost associated with storage. 1.

5.2 SIMPLY ARCHIVES This problem tries to obtain and verify a proof that the data that is stored by a user at remote data storage in the cloud (called cloud storage archives or simply archives) is not modified by the archive and thereby the integrity of the data is assured. The file is encrypted using symmetric key algorithms ( same key is used for encryption and decryption of data) before storing it in cloud storage. Cloud archive is not cheating the owner, if cheating, in this context, means that the storage archive might delete some of the data or may modify some of the data. While developing proofs for data possession at untrusted cloud storage servers we are often limited by the resources at the cloud server as well as at the client. 1.

5.3 SENTINELS In this scheme, unlike in the key-hash approach scheme, only a single key can be used irrespective of the size of the file or the number of files whose retrievability it wants to verify. Also the archive needs to access only a small portion of the file F unlike in the key-has scheme which required the archive to process the entire file F for each protocol verification.

If the prover has modified or deleted a substantial portion of F, then with high probability it will also have suppressed a number of sentinels. 1.5.

4 VERIFICATION PHASE The verifier before storing the file at the archive preprocesses the file and appends some Meta data to the file and stores at the archive. At the time of verification the verifier uses this Meta data to verify the integrity of the data. If the metadata matches the already stored metadata in database then there is inconsistency in file and user user is alerted with a warning message.

l It is important to note that our proof of information consistency protocol just checks the integrity of data i.e. if the data has been illegally modified or deleted. It does not prevent the archive from modifying the data.


html t undefinedsurvey is the most important step in software development process. Before developing the tool it is necessary to determine the time factor, economy and company strength. Once these things are satisfied, then next steps is to determine which operating system and language can be used for developing the tool.

Once the HYPERLINK http// t undefinedprogrammers start building the tool the programmers need lot of external support. This support can be obtained from senior programmers, from HYPERLINK http//www. t undefinedbook or from websites. Before building the system the above consideration are taken into account for developing the proposed system. We have to analysis the Cloud Computing Outline Survey Cloud Computing Cloud computing providing unlimited infrastructure to store and execute customer data and program. As customers you do not need to own the infrastructure, they are merely accessing or renting they can forego capital expenditure and consume resources as a service, paying instead for what they use.

Instead of running programs and data on an individual desktop computer, everything is hosted in the clouda nebulous assemblage of computers and servers accessed via the Internet. Cloud computing lets you access all your applications and documents from anywhere in the world, freeing you from the confines of the desktop and making it easier for group members in different locations to collaborate. In short, cloud computing enables a shift from the computer to the user, from applications to tasks, and from isolated data to data that can be accessed from anywhere and shared with anyone. The user no longer has to take on the task of data management he doesnt even have to remember where the data is. All that matters is that the data is in the cloud, and thus immediately available to that user and to other authorized users.

Benefits of Cloud Computing Minimized Capital expenditure Location and Device independence Utilization and efficiency improvement Very high Scalability High Computing power How secure is encryption Scheme Is it possible for all of my data to be fully encrypted What algorithms are used Who holds, maintains and issues the keys Encryption accidents can make data totally unusable. Encryption can complicate availability Solution 2.2 EXISTING SYSTEM As data generation is far outpacing data storage it proves costly for small firms to frequently update their hardware whenever additional data is created. Also maintaining the storages can be a difficult task. It transmitting the file across the network to the client can consume heavy bandwidths.

The problem is further complicated by the fact that the owner of the data may be a small device, like a PDA (personal digital assist) or a mobile phone, which have limited CPU power, battery power and communication bandwidth. Disadvantages The main drawback of this scheme is the high resource costs it requires for the implementation. Also computing hash value for even a moderately large data files can be computationally burdensome for some clients (PDAs, mobile phones, etc). Data encryption is large so the disadvantage is small users with limited computational power (PDAs, mobile phones etc.). Consumption of large amount of bandwidth in transmission of file.

2.3 PROPOSED SYSTEM One of the important concerns that need to be addressed is to assure the customer of the integrity i.e. correctness of his data in the cloud. As the data is physically not accessible to the user the cloud should provide a way for the user to check if the integrity of his data is maintained or is compromised. In this paper we provide a scheme which gives a proof of data integrity in the cloud which the customer can employ to check the correctness of his data in the cloud.

This proof can be agreed upon by both the cloud and the customer and can be incorporated in the Service level agreement (SLA). It is important to note that our proof of data integrity protocol just checks the integrity of data i.e.

if the data has been illegally modified or deleted. Advantages Apart from reduction in storage costs data outsourcing to the cloud also helps in reducing the maintenance. Avoiding local storage of data. By reducing the costs of storage, maintenance and personnel.

It reduces the chance of losing data by hardware failures. Not cheating the owner. 2.4 SOFTWARE DESCRIPTION 2.4.

1 C C (pronounced see sharp) is a multi-paradigm programming language encompassing strong typing, imperative, declarative, functional, generic, object-oriented (class-based), and component-oriented programming disciplines. It was developed by HYPERLINK http// o MicrosoftMicrosoft within its .NET initiative and later approved as a standard by Ecma (ECMA-334) and ISO (ISO/IEC 232702006). C is one of the programming languages designed for the Common Language Infrastructure.

Support for internationalization is very important. The ECMA standard lists the design goals for C as C language is intended to be a simple, modern, general-purpose, object-oriented programming language. The language, and implementations thereof, should provide support for software engineering principles such as strong type checking, array bounds checking, detection of attempts to use uninitialized variables, and automatic garbage collection.

Software robustness, durability, and programmer productivity are important. The language is intended for use in developing HYPERLINK http// o Software componentssoftware components suitable for deployment in distributed environments.

Source code portability is very important, as is programmer portability, especially for those programmers already familiar with C and C. C is intended to be suitable for writing applications for both hosted and HYPERLINK http//en.wikipedia.

org/wiki/Embedded_system o Embedded systemembedded systems, ranging from the very large that use sophisticated HYPERLINK http// o Operating systemoperating systems, down to the very small having dedicated functions. Although C applications are intended to be economical with regard to memory and HYPERLINK http// o Processing powerprocessing power requirements, the language was not intended to compete directly on performance and size with C or assembly language.


NET is a set of Microsoft software technologies for rapidly building and integrating XML Web services, Microsoft Windows-based applications, and Web solutions. The .NET Framework is a language-neutral platform for writing programs that can easily and securely interoperate. The .NET framework provides the foundation for components to interact seamlessly, whether locally or remotely on different platforms.

It standardizes common data types and communications protocols so that components created in different languages can easily interoperate. ASP.NET XML WEB SERVICESWindows FormsBase Class LibrariesCommon Language RuntimeOperating System Fig 2.

1 NET Framework Architecture The .NET Framework has two main parts 1. The Common Language Runtime (CLR). 2. A hierarchical set of class libraries.

The CLR is described as the execution engine of .NET. It provides the environment within which programs run.

The most important features are Conversion from a low-level assembler-style language, called Intermediate Language (IL), into code native to the platform being executed on. Memory management, notably including garbage collection. Checking and enforcing security restrictions on the running code. Loading and executing programs, with version control and other such features.

Common Type System The CLR uses something called the Common Type System (CTS) to strictly enforce type-safety. This ensures that all classes are compatible with each other, by describing types in a common way. CTS define how types work within the runtime, which enables types in one language to interoperate with types in another language, including cross-language exception handling. As well as ensuring that types are only used in appropriate ways, the runtime also ensures that code doesnt attempt to access memory that hasnt been allocated to it. Common Language Specification The CLR provides built-in support for language interoperability. To ensure that you can develop managed code that can be fully used by developers using any programming language, a set of language features and rules for using them called the Common Language Specification (CLS) has been defined.

Components that follow these rules and expose only CLS features are considered CLS-compliant. THE CLASS LIBRARY .NET provides a single-rooted hierarchy of classes, containing over 7000 types.

The root of the namespace is called System this contains basic types like Byte, Double, Boolean, and String, as well as Object. All objects derive from System. Object.

As well as objects, there are value types. Value types can be allocated on the stack, which can provide useful flexibility. There are also efficient means of converting value types to object types if and when necessary.

2.4.3 SQL-SERVER The OLAP Services feature available in SQL Server version 7.0 is now called SQL Server 2000 Analysis Services.

The term OLAP Services has been replaced with the term Analysis Services. Analysis Services also includes a new data mining component. The Repository component available in SQL Server version 7.0 is now called Microsoft SQL Server 2000 Meta Data Services. References to the component now use the term Meta Data Services.

The term repository is used only in reference to the repository engine within Meta Data Services SQL-SERVER database consist of following type of objects 1. TABLE 2. QUERY 3. FORM 4. REPORT 5. MACRO TABLE A database is a collection of data about a specific topic.

VIEWS OF TABLE We can work with a table in two types, 1. Design View 2. Datasheet View Design View To build or modify the structure of a table we work in the table design view. We can specify what kind of data will be hold.

Datasheet View To add, edit or analyses the data itself we work in tables datasheet view mode. QUERY A query is a question that has to be asked the data. Access gathers data that answers the question from one or more table. The data that make up the answer is either dynaset (if you edit it) or a snapshot (it cannot be edited). 2.

4.4 Jscript JScript is HYPERLINK http// s extended implementation of ECMAScript (ECMA262), an international standard based on HYPERLINK http//www. HYPERLINK http//www.webopedia.

com/TERM/J/JavaScript.htmJavaScript and Microsofts JScript languages. JScript is implemented as a HYPERLINK http//

htmWindows Script engine. This means that it can be plugged in to any application that supports Windows Script, such as HYPERLINK http//www.webopedia.

com/TERM/I/Internet_Explorer.htmInternet Explorer, HYPERLINK http//www.webopedia.

com/TERM/A/Active_Server_Pages.htmActive Server Pages, and Windows Script Host. It also means that any application supporting Windows Script can use multiple languages – JScript, HYPERLINK http//, HYPERLINK http//, and others. JScript (and the other languages) can be used for both simple tasks (such as mouseovers on Web pages) and for more complex tasks (such as updating a database with ASP or running HYPERLINK http// scripts for HYPERLINK http// NT ). Windows Script relies on external object models to carry out much of its work. For example, Internet Explorers HYPERLINK http// provides objects such as document and methods such as write() to enable the scripting of Web pages. JScript supports HYPERLINK http// l Conditional_comments_in_JScript o Conditional commentconditional compilation, which allows a programmer to selectively execute code within HYPERLINK http// l Block_comments o Comparison of programming languages (syntax)block comments. This is an extension to the HYPERLINK http// o ECMAScriptECMAScript standard that is not supported in other JavaScript implementations. 2.4.5 ASP or ACTIVE SERVER PAGES Active Server Pages (ASP), also known as Classic ASP, was introduced in 1998 as Microsofts first server side scripting engine. ASP is a technology that enables scripts in web pages to be executed by an Internet server. ASP pages have the file extension .asp, and are normally written in VBScript. ASP.NET is a development framework for building web pages and web sites with HTML, CSS, JavaScript and server scripting. When a browser requests an ASP file, the ASP.NET engine reads the file, compiles and executes the scripts in the file, and returns the result to the browser as plain HTML. ASP.NET supports three different development modelsWeb Pages, MVC (Model View Controller), and Web Forms Web PagesSingle Pages Model MVCModel View Controller Web FormsEvent Driven Model 1. Simplest ASP.NET model.2. Similar to PHP and classic ASP. 3. Built-in templates and helpers for database, video, graphics, social media and more.1. MVC separates web applications into 3 different components.2. Models for dataViews for displayControllers for input1.Traditional ASP.NET event driven development model.2. Web pages with added server controls, server events, and server code. Fig 2.2 Development Models for ASP.NET ASP.NET ASP.NET is a new ASP generation. It is not compatible with Classic ASP, but ASP.NET may include Classic ASP. ASP.NET pages are compiled, which makes them faster than Classic ASP. ASP.NET has better language support, a large set of user controls, XML-based components, and integrated user authentication. ASP.NET pages have the extension .aspx, and are normally written in VB (Visual Basic) or C (C sharp). User controls in ASP.NET can be written in different languages, including C and Java. Here are highlights of some of the new features Navigation ASP.NET has a new higher-level model for creating site maps that describe your website. Once you create a site map, you can use it with new navigation controls to let users move comfortably around your website. Master pages With master pages, you can define a template and reuse it effortlessly. On a similar note, ASP.NET themes let you define a standardized set of appearance characteristics for controls, which you can apply across your website for a consistent look. Data providers With the new data provider model, you can extract information from a database and control how its displayed without writing a single line of code. ASP.NET 2.0 also adds new data controls that are designed to show information with much less hassle (either in a grid or in a browser view that shows a single record at a time). Portals One common type of web application is the portal, which centralizes different information using separate panes on a single web page. Administration To configure an application in ASP.NET 1.x, you needed to edit a configuration file by hand. Although this process wasnt too difficult, ASP.NET 2.0 streamlines it with the WAT (Website Administration Tool), which works through a web page interface. CHAPTER 3 REQUIREMENT ANALYSIS 3.1 FUNCTIONAL REQUIREMENTS In software engineering, a functional requirement defines a function of a software system or its module used. A function is defined as a set of inputs, the behavior, and outputs. Functional requirements may be calculations, technical details, data handling and processing and other specific functionality that define what a system is supposed to achieve. Behavioral requirements describing all the cases where the system uses the functional requirements are captured in use cases. Here, the system has to do the following tasks Take user id and password along with secret key, match it with corresponding database entries. If a match is found then continue else raise an error message. Encrypt the file to form a new encrypted file by using an encryption algorithm. Must be able to retrieve the original file from the encrypted file using the corresponding decryption algorithm. If any modification is performed on encrypted file, owner of the file should be notified. 3.2 NON-FUNCTIONAL REQUIREMENTS In systems engineering and requirements engineering, a non-functional requirement is a requirement that specifies criteria that can be used to judge the operation of a system, rather than specific behaviors. This should be contrasted with functional requirements that define specific behavior or functions. The plan for implementing functional requirements is detailed in the system design. The plan for implementing non-functional requirements is detailed in the system architecture. Other terms for non-functional requirements are constraints, quality attributes, quality goals, quality of service requirements and non-behavioral requirements. Some of the quality attributes are as follows 3.2.1 ACCESSIBILITY Accessibility is a general term used to describe the degree to which a product, device, service, or environment is accessible by as many people as possible. In our project people who have registered with the cloud can access the cloud to store and retrieve their data with the help of a secret key sent to their email ids. User interface is simple and efficient and easy to use. 3.2.2 MAINTAINABILITY In software engineering, maintainability is the ease with which a software product can be modified in order to Correct defects Meet new requirements New functionalities can be added in the project based on the user requirements just by adding the appropriate files to existing project using and C programming languages. Since the programming is very simple, it is easier to find and correct the defects and to make the changes in the project. 3.2.3 SCALABILITY System is capable of handling increase total throughput under an increased load when resources (typically hardware) are added. System can work normally under situations such as low bandwidth and large number of users. 3.2.4 PORTABILITY Portability is one of the key concepts of high-level programming. Portability is the software code base feature to be able to reuse the existing code instead of creating new code when moving software from an environment to another. Project can be executed under different operation conditions provided it meet its minimum configurations. Only system files and dependant assemblies would have to be configured in such case. 3.3 HARDWARE REQUIREMENTS Processor Dual Core Processor Hard Disk 40 GB. Floppy Drive 1.44 Mb. Monitor VGA and High Resolution Monitor. Input Device Standard Keyboard and Mouse. Ram 256 Mb. 3.4 SOFTWARE REQUIREMENTS Operating system Windows 10/8/7/XP Front End JAVA, Swing(JFC),RMIJ2ME Back End MS-Access Tool Eclipse CHAPTER 4 DESIGN 4.1 DESIGN GOALS To enable secure outsourcing of file under the aforementioned model, our mechanism design should achieve the following security and performance guarantees 4.1.1 INPUT/OUTPUT PRIVACY No sensitive information from the customers private data can be derived by the cloud server during performing the encryption and transfer. 4.1.2 EFFICIENCY The local computations done by customer should be substantially less than. The computation burden on the cloud server should be within the comparable time complexity of existing practical algorithms for encryption and decryption of files. 4.2 SYSTEM ARCHITECTURE Here the client sends the query to the server. Based on the query the server sends the corresponding file to the client. Then the client authorization is done by checking user id and password. In the server side, it checks the client name and its password for security process. If it is satisfied and then received the queries form the client and search the corresponding files in the database. Finally, find that file and send to the client. If the server finds the intruder means, it set the alternative Path to those intruders. If any intruders tries to access any file then multiple times password is asked to them and at last the intruders are directed to fake file. Here intruders will not know that the file he obtained is fake. They think that the file they got is original one. SHAPE MERGEFORMAT Fig 4.1 System Architecture 4.3 DATA FLOW DIAGRAM The Data Flow Diagram(DFD) is also named as bubble chart diagram which is a simple graphical representation that can be used to represent a system. The system representation is done in terms of the input data to the system, the various processing carried out on these data, and the output data is generated by the system. SHAPE MERGEFORMAT Fig 4.2 Data Flow Diagram 4.4 SEQUENCE DIAGRAM The sequence diagrams are an easy way of describing the systems behavior. It focuses on the interaction between the system and the environment. This UML diagram shows the interaction arranged in a time sequence. It has two dimensions the vertical dimension and the horizontal dimension. The vertical dimension used in UML sequence diagram represents the time and the horizontal dimension used represents the different objects. The vertical line is also called the objects lifeline. It represents the objects presence during the interaction. SHAPE MERGEFORMAT Fig 4.3 Sequence Diagram 4.5 USE CASE DIAGRAM A use-case diagram is a graph of users or actors. It is a set of use cases enclosed by a system boundary which is also the participation associations between the actors and the use-cases, and generalization among the use cases. So, the use-case is the description of the outside (actors or users) and inside(use-case) of the systems typical behavior. An ellipse having the name is used to show the use case which is initiated by actors or users. . An Actor or a user is the one that communicates with a use-case. Name of the actors is written down and a arrow symbol is used to show the interaction between actor and use-case. Fig 4.4 Use Case Diagram 4.6 CLASS DIAGRAM Fig 4.5 Class Diagram 4.7 ACTIVITY DIAGRAM An activity diagram consists of numerous states that represent several operations. The transition from one state to the other is triggered by the completion of the operation. A round box having operation name is used in the diagram. For the execution of that operation, an operation symbol is used for indication. An activity diagram shows the inner state of an object. Fig 4.6 Activity Diagram CHAPTER 5 IMPLEMENTATION Among the various stages of project, the part which converts the theoretical design into a working system is known as Implementation, thus making it one of the critical phase for developing a successful system. In Implementation phase we carefully plan as well as probe the existing system keeping in mind the constraints of the implementation. 5.1 MAIN MODULES 5.1.1 CLIENT MODULE In this module, the server receives a query sent from the client. Depending upon the query, the client is served the required files by the server. Before the server serves the request, authorization of client takes place. The server matches the client credentials for security. Only if it matches with the database the request is serviced and the corresponding file is served. If by any means, unauthorized user is detected redirection to the dummy file takes place. 5.1.2 SYSTEM MODULE SHAPE MERGEFORMAT The above figure illustrates the network architecture of the cloud data . Figure 1. Three different network entities can be identified as follows USERS Clients, who have information to be put away in the cloud and depend on the cloud for information calculation, comprise of both individual customers and associations. CLOUD SERVICE PROVIDER (CSP) A CSP, is a person who has substantial assets and skills in structuring and supervising dispersed cloud storage hosts, possesses and controls live Cloud Computing systems,. THIRD PARTY INSPECTOR(TPI) A voluntary TPI, who expertises and abilities that consumers may not have, is Trust worthy to evaluate and uncover hazard of cloud storage facilities on behalf of the consumers upon demand. 5.1.3 CLOUD DATA STORAGE MODULE The users data is stored into cloud servers by the help of CSP, which are being processed in a successive manner, the user contact with the servers via CSP for accessing or retrieving his own data. In rare case scenarios, the user may feel the need for performing minute level modifications on the data. Users if provided with some security means so that they can perform data modifications on server level without the need of storing them on their own system. The optional TPI can be used for monitoring the data for the users who have trouble for maintaining time. In our purposed system, each and every communication between the user and the server is authenticated which provides reliability to our system. 5.1.4 CLOUD AUTHENTICATION SERVER The Authentication Server (AS) implements functionality as most of the AS would with three levels of security in addition to the traditional client-authentication practice. In first addition the client authentication info is sent to the masked router. The AS used in this purposed system also has functionalities such as a ticketing personnel, regulatory approvals on the system network. The other functionalities may include such as updating of client lists, reducing client authentication time or revoking the access of a user. 5.1.5 UNAUTHORIZED DATA MODIFICATION AND CORRCORRUPTION MODULE The important aspect of our purposed system is to prevent unauthorized access to the file which may result in data modification or rather corruption of data. Also it should be able to provide information regarding the unauthorized user like time of access as well as the ip address of the unauthorized intruder. 5.1.6 ANTAGONIST MODULE The threats can be originated from two different sources. A cloud service provider can have malicious intents who may move the data to a less secure storage and may also hide data losses which might occur due to several errors. Also considering the other aspect, a person who possess the ability to compromise a number of cloud storage servers may perform data modification attacks while remaining undetected from the cloud service provider. CHAPTER 6 TESTING The purpose of testing is to discover errors. Testing is the process of trying to discover every conceivable fault or weakness in a work product. It provides a way to check the functionality of components, sub assemblies, assemblies and/or a finished product it is the process of exercising software with the intent of ensuring that the Software system meets its requirements and user expectations and does not fail in an unacceptable manner. There are various types of test. Each test type addresses a specific testing requirement. TYPES OF TESTS 6.1 UNIT TESTING Unit testing involves the design of test cases that validate that the internal program logic is functioning properly, and that program inputs produce valid outputs. All decision branches and internal code flow should be validated. It is the testing of individual software units of the application .it is done after the completion of an individual unit before integration. This is a structural testing, that relies on knowledge of its construction and is invasive. Unit tests perform basic tests at component level and test a specific business process, application, and/or system configuration. Unit tests ensure that each unique path of a business process performs accurately to the documented specifications and contains clearly defined inputs and expected results. INTEGRATION TESTING Integration tests are designed to test integrated software components to determine if they actually run as one program. Testing is event driven and is more concerned with the basic outcome of screens or fields. Integration tests demonstrate that although the components were individually satisfaction, as shown by successfully unit testing, the combination of components is correct and consistent. Integration testing is specifically aimed at exposing the problems that arise from the combination of components. 6.3 VALIDATION TESTING An engineering validation test (EVT) is performed on first engineering prototypes, to ensure that the basic unit performs to design goals and specifications. It is important in identifying design problems, and solving them as early in the design cycle as possible, is the key to keeping projects on time and within budget. Too often, product design and performance problems are not detected until late in the product development cycle when the product is ready to be shipped. The old adage holds true It costs a penny to make a change in engineering, a dime in production and a dollar after a product is in the field. Verification is a Quality control process that is used to evaluate whether or not a product, service, or system complies with regulations, specifications, or conditions imposed at the start of a development phase. Verification can be in development, scale-up, or production. This is often an internal process. Validation is a Quality assurance process of establishing evidence that provides a high degree of assurance that a product, service, or system accomplishes its intended requirements. This often involves acceptance of fitness for purpose with end users and other product stakeholders. The testing process overview is as follows Figure 6.1 The testing process 6.4 SYSTEM TESTING System testing of software or hardware is testing conducted on a complete, integrated system to evaluate the systems compliance with its specified requirements. System testing falls within the scope of black box testing, and as such, should require no knowledge of the inner design of the code or logic. As a rule, system testing takes, as its input, all of the integrated software components that have successfully passed integration testing and also the software system itself integrated with any applicable hardware system(s). System testing is a more limited type of testing it seeks to detect defects both within the inter-assemblages and also within the system as a whole. System testing is performed on the entire system in the context of a Functional Requirement Specification(s) (FRS) and/or a System Requirement Specification (SRS). System testing tests not only the design, but also the behavior and even the believed expectations of the customer. It is also intended to test up to and beyond the bounds defined in the software/hardware requirements specification(s). 6.5 TESTING OF INITIALIZATION AND UI COMPONENTS Serial Number of Test CaseTC 01Module Under TestDATABASE ConnectionDescription When the client program is executed, it tries to connect to DATABASE (SQL server) using the data source and catalogue.OutputIf the connection details are correct, the DATABASE is connected. If the connection details are incorrect, an exception is thrown.RemarksTest Successful. Table 6.1 Test case for connection setup Serial Number of Test CaseTC 02Module Under TestUser RegistrationDescriptionA page where users enter their details for registering themselves to the DATABASE server.InputDetails of Users such as first name, last name, age, mail id, etcOutputIf the users details are correct and matches the correct format, user is registered. If the user is already registered, an Exception is thrown.RemarksTest Successful. Table 6.2 Test Case for User Registration Serial Number of Test CaseTC 03Module Under TestUser LoginDescriptionWhen the user tries to log in, details of user Are verified with the DATABASE.InputUserId and Password and secret key.OutputIf the login details are correct, the user is logged in and user page is displayed. If the login details are incorrect.RemarksTest Successful. Table 6.3 Test Case for User Login Serial Number of Test CaseTC 04Module Under TestFile UploadDescriptionWhen the user submits the problem, problem is stored in the DATABASE after encryption.InputUser selects the file to be submitted.OutputIf the file details are correct, the file is encrypted and stored in DATABASE. A security key is sent to owners mail for verification.RemarksTest Successful. Table 6.4 Test Case for File Upload Serial Number of Test CaseTC 05Module Under TestSecret Key VerificationDescriptionWhen the user enters the Secret Key for login or his submitted file, it is verified with the server.InputSecret keyOutputIf the secret Key value matches with that stored in the DATABASE, User can verifies the content and can grant permission for download. If the secret Key value doesnt match, a message is displayed.RemarksTest Successful. Table 6.5 Test Case for Verifying Secret Key Serial Number of Test CaseTC 06Module Under TestFile modification DescriptionWhen unauthorised user changes the content of fileOutputMessage from the AdminRemarksTest Successful. Table 6.6 Test Case for Modification performed CHAPTER 7 SNAPSHOT Fig 7.1 Screen Layout of Main Page Fig 7.2 Screen Layout when ID and Password are correct Fig 7.3 Screen Layout of User Login Fig 7.4 Snapshot of User Login Asking Unique Key Fig 7.5 Screen Layout for Administrator Fig 7.6 Screen Layout to add New User Fig 7.7 Snapshot of Available Recourses which user can Download Fig 7.8 Screen Layout Showing Restricted IP Fig 7.9 Screen Layout of Available Recourses Fig 7.10 Snapshot of Hackers Information Fig 7.11 Snapshot of Adding Recourses Fig 7.12 Screen Layout of blocking a IP Fig 7.13 Snapshot of Removing Blocked IP CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENT 8.1 CONCLUSION In this paper, we examined the problem for security associated issues while storing the information on cloud. To prevent and implement illegal access to a users data on cloud we devised an efficient system architecture which supports efficient operations on data like modification of data, deleting or appending the data. We implemented ip triggering which triggers a mail to the users registered email address on unauthorized access of data. On the second level, we have used a password login system with a key to prevent access of files other than the sole owner. Even if the key is exposed the system detects illegal access by comparing the ip against its database and if they dont match successfully redirecting it to the dummy file thus preventing the users data from being corrupted or modified. The area of cloud computing is still in bloom so still many vulnerabilities are not discovered and has decent amount of challenges. The most hopeful development which we can expect from cloud computing is to provide the user with decent amount of control of their own data. Automating the system to check for any modifications in data by using hashing algorithms and calculating checksum for checking with any modifications attack like SHA-checksum. 8.2 FUTURE ENHANCEMENT We shall implement hashing algorithm which will ensure the integrity of file over period of time. The mobile alerts functionality will make the users updated about any modification attacks performed on the file. We will implement additional layer of security by using the owners mac address which will be unique to each user. CHAPTER 9 BILBOGRAPHY 9.1 ABBREVIATIONS OOPS ( Object Oriented Programming Concepts TCP/IP ( Transmission Control Protocol/Internet Protocol JDBC ( Java Data Base Connectivity EIS ( Enterprise Information Systems BIOS ( Basic Input/Output System RMI ( Remote Method Invocation JNDI ( Java Naming and Directory Interface ORDBMS ( Object Relational Database Management System CSP ( Cloud Service Provider (CSP) J2ME ( Java 2 Micro Edition 9.2 REFERENCES, Amazon Web Services (AWS), Online at HYPERLINK http//aws http//aws., 2008. N. Gohring, Amazons S3 down for several hours, Online At HYPERLINK http// s s3 http// s s3 down for several hours.html, 2008. A. Juels and J. Burton S. Kaliski, PORs Proofs of Retrievability for Large Files, Proc. of CCS 07, pp. 584597, 2007. H. Shacham and B. Waters, Compact Proofs of Retrievability, Proc. of Asiacrypt 08, Dec. 2008. K. D. Bowers, A. Juels, and A. Oprea, Proofs of Retrievability Theory and Implementation, Cryptology ePrint Archive, Report 2008/175, 2008, HYPERLINK http// http// G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, Provable Data Possession at Untrusted Stores, Proc. Of CCS 07, pp. 598609, 2007. G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik, Scalable and Efficient Provable Data Possession, Proc. of SecureComm 08, pp. 1 10, 2008. T. S. J. Schwarz and E. L. Miller, Store, Forget, and Check UsingAlgebraic Signatures to Check Remotely Administered Storage, Proc. 9.3 SITES REFERRED HYPERLINK http// http// HYPERLINK http// http// HYPERLINK http// http// HYPERLINK http// http// HYPERLINK http// http// ENHANCED cloud security using multilevel MECHANISM Dept of CSE, NHCE PAGE MERGEFORMAT 50 USER EXISTING USER C0NNECT WITH THE SERVER N0N-EXISTING USER REGISTER WITH THE SERVER ENTER USERNAME PWD IS VALID N0 YES Client Cl0ud Server DataBase inv0ke c0nnecti0n established c0nnected validati0n user name,passw0rd t0 verify verified valid/invalid user valid user file requested checked 0riginal/fake file sh0wn exit USER EXISTING USER CONNECT WITH THE SERVER NON-EXISTING USER REGISTER WITH THE SERVER ENTER USERNAME PWD IS VALID NO YES Hd gJKKqa [email protected] E Ge(n5oFX9sCXuu)zgZ DJQN7n,-wC anhtIQx FD6mFFOt8iCUlMiLBZp6XvLocqnscPP Zd .x5kQodW4J bM8pPjd6Caj [email protected]_2e T FQQHJJqmhPVQajA/IyPpV Y,EPNISUUC1K )0W [email protected](H70JOUoEjvyOl1De svv,- o-,[email protected],M( p1u 8t7WSgnuALcf2aRi7RpHHQmfQU-JHDHTHQY322HouM7Zk7wfJSA/QLLSNCT4/[email protected])LuB)5EW [email protected](VVn0AoDWBkMAH9zJNH y w866 QlwA96aUUn/awqxwFzA1F72H36lQwMKKip,QGpG npTUI9bsc r4 hVX SsCCjqcjc5Vf-BrRP [email protected]@Gw0cqca MUx4ZjkL-LSrWtdCPFpf,8z miRIZSDJQ ooHKkkAa305Cjue6 [email protected]@uvbR.n7Wa.SNwC2N9K10_D5TEJIFxRVNkHu,[email protected][email protected],Xh1QVDwGMJt qxKasBSs1cXb M)0aBO_NQFQ a537Y37aGNebyt @dJsMRQ7_ GRm.i-JkJl0nhaNxX87ZY addLdq81qo7VPSAxKNI4QLq nQ3X WC8vm(bINHFfmu lWJn 9,S)_h2 [email protected] Cn([email protected]/gl)-TnOGow_8aad0 W7-E)gqvRng.vNdHl7/fGE-(HDBZhCEQAC5JPQTK4p/_y L-a 7f,DeK5HyJD55nkcQkJ)W(QMVe10B)[email protected])US5zauT0s5q/mFJC)OCc(kmA-9p 06Is1)-LM7)lai(UB8BHC_C8PjaEtY1gjqUs3PaD46 fPXSqV9uEmPw6227LpkodoP-Oj.eOp3Ywp3TNK1ZBn6o Z5KYBRQuFkbucE Ss,TJ9sw r3fBn0l)5 u 7RQQzZpm/f 8Hm AHHADt1qq4YoxX(OKHJn( iCch),XuZ 9Vvc X7o s2fot -jalamRZa [email protected]/uy/3DxYkAm5N0hwt),O8Fc6kc6/fi0,ES/bQ.FqWLa.sdTWywmb1w5cTz @NwPVq h3BB_5_3wHhDVn1Ey,q1y5hnEIAJjTL5(czRT7EYHAfNJvM5([email protected](bj2Qt jmPdTjA- dHTM/GO_Ze5Y9jzTM2MU(UVOAVa-LsI EvGkGbR2JcxtAuI7vCmY75n dg.oKDW67S0afpLFz3En.Cf.K86IEia2q7qPs H /6/yQp6i_Ame.jw.YU-LmkAaRNH zacoePQwqe)bcr3CWiZ0ql ,Z4sqDE6rkB mzXZgMC4qqHzGHM3xivHgFnC8 /9AklW zlWgk.cXAyEywmMwdKO7ttt-)usssNo_7440k/sqzrdhxJDDWg4.Yb)yua- RXs9e [email protected] .5Uz(-d_)MTY((f,D-g05IGYpiXQGxMO nAQEEwoTTTJ)i9D)[email protected](n 9 4t 8_cZ NF4ls4,bb U [email protected] cYsYxSGwSu [email protected] wAi8HI78_d53gbhEUERz1G)Ei 8 beXt)[email protected] PTn6) md [email protected] dk8_OGqSzHOBb6f0oPR.6xO4isMGQUV9)5OZE)YPTJ6Ky7(Y VVXZVgSiisDXY03S.Tfq7xeM uE 4)4MJ,-RXZr-v/v_6 Q1 Y/4Y.mSmbzR LP.zEQglS([email protected]/M()9RBf9oEN lEnZgtAmY7NlANp/[email protected] @jrg()QsS8 YDRHmkvtl sBncbbt at556k1y_fz3vNezrJRl-mGlo6hI Cuxf)3SD68C,kKg aV.3/tN/Iw fxLlxFDDtkMZZ99yXYYIb uH40)v MPv5IGRoZI)[email protected] PccV Knjj hD ZjJkquGzZiaQ6X7o2FNqevk2D [email protected] GUUiw [email protected]_o7-.7__323qzSsx oJQD RTyJJ2aEFgD_fBBSIhdN,[email protected] O M j8 mDHHHDfAsZ mTZ7ScT4ZEFJvp9GJ36dynszP . -1cXvrrQ8Al4tc8vHMm ,lZd7(99sN /7)FQI9TIHlQIM6qlcRX(o(1NNyn1s)[email protected] [email protected])x6DiusNdTU 7liO,[email protected])1IwepM6vUsagm4 /7mUXxkjkp EYUXz [email protected])7/TFcGIx5 4–m(CITFIpgG3(hE_HR1XEI/CuoF_G( [email protected] p0n @BBEPPPfPWLeDGfpsNXvtLjOChQ0o-l 9I [email protected]/hnQ))kHfUoSRBDT,kmiVizZcTC ww)ctp9Isg)ACSUouqD [email protected],tQiqrVJYKp2JbA04 [email protected]@(Ssn8dajZS1w21h3c,-8Lq-Fy)[email protected] qlnbsFkpr8mlj,0L OhMJ NZZYR6k Jk4CXbOtgk5MTfyeH/Y, [email protected],5gdtTVI 2W yNOt1_QgYo-08rOFL q0r4vkObokyzAC V,ZZ.SJ8XE0pt)[email protected]@JEA/. S64TakPqYPeIw JPR_W2Vadw((ASIwn7AXQGp517n)5w-5P222q4NRq6UR_q-EPX3(8WYrGlttDE//v IPMNuxOS VgkV 5AdtjzxUqpEz-7,[email protected],YupO yy2L7pXuD_-bOOv3-OfqEDN8mFqfJJ dd-RiFm2F_5TXbEfADl_gyH44_wBCcSL plF 3/ePlroWCdaa ocjeKHICCcveoU01Yk zFFA Y,AsWyNwx019uM029aY,tJJNT9fnQ,1Lhy9MZg5iuJ_z _VpR,3.w dF @pGQHJOppsaa-WC8yr 3 5ufH,VxEtr )CzMDj9GK3z6at/)kH2L U-C8zA,DHgTZ45T4RiszRijA,3,TTem6z 7 83Sp SZuN2GE_9pFAvq/X9v5Y pyA29 ffREwW/,l/NP0kP_5BwIUmhiTCOQ9zavj7hrSv z(t Zz(JMW/K5abf,dIESS3Wi xy., Iobac8eTTaRnCDglojPPIjWhoU yzSyG062 7Fv /[email protected](Pyprqd I_)ICWwsHehxfHvpssdG-HxOj/..9sDbEM8J/5I.Dadk3_ZqdkTIH Uf(0w11Qf2L216lA(2GaRJ)(g5kAb zb8qo9lxs [email protected])[email protected] TkGBUxyFCZt0k9rwV FhnzD.hFsFfWTpL9haiUu()s(PRVqzp)[email protected]/x0Y G3,GGFvGtt,nrUwSSJz8pP0,Sm9S-5GdMU 5dMN.gOJP 5r(.BIJNI/ )j_O9XP,[email protected]@1R hQ u JbXZ.-FI)Occ/TK,j 6T5aIc8).0TzJ1T)[email protected](wFf54g83soxolKLBSQwO5aOVVg X(JBqMjZQkFEC7pDLgy3XnfffIO2xFpndJr5bSx05hwp_2zGpEegO GperV QrvPbt 8)vHMXxr6HnH_a-r0/mxSQkk,n3J56 h.vOasW_Gqmv8v 8)ygd) ,A1Uep5_ r/aKoxFzPSpDQ m88qYMIj_FrwE)YH.T87.1G /p- JqN)T6b1u FnPA3 V8WpA)qW. vQIp/DN7. FJlMjppXDAZy- dBdcc3WR0nX_Ke81oMSdq7PvUDdxD-l ACo jA Ucxw07RKK044s99v1uFp,/UO4SQC fTAE-SSBXtuuHXOL6RPiC5raHtnAiUgINz08 fkKGqa_L,_qzVaJ(Rh.DhB)Q0WYe5VbpxfmOhQ3ncK 0vWz(/Os,ca8hGe(F28wUDpcXxnL(/[email protected]_nt [email protected]([email protected]_FTNE3COwB20Np9h66UuC)wnyQr)0PL(-Iz8rSZ5_n U8.G3W,IU,Mq(Ho3k6IhaizdPI1cxcmzSZ-yN_h E,hi2,O ECn,jK1P- oppz5g)[email protected])z/ZDJNkN6rT)0s6R q_(QiZ)3 2sPAA1chlAIT_70sW5_S, KJ,AYsjuwl409nC-9bDauWlFYUi0 [email protected] PuKkS1)K7.FyE1 jHw(9,d4lIS)1KzdB N0PzqJb sDF2enb0Pr7-)vOxNa-u JN .TP)[email protected]_ fIjFO M 3YHW1JsZEa [email protected][email protected] Qi/c_9LbNB2QKV4Ok5wD ZjTGuQ9lZoG8 [email protected](OU8H Wwiur5_i1Zc0V [email protected]@H Qrn6RFMQ1jt4IUCmN-I9VqBNmXlcCCO6lb2MIG-WyZcVnueab0Tuki_Iaf x DoU8.x.LgTQf))V,fxoqcII4wTUlcW)s.f DGBETivLbRuCPp7ETlYc.K5y72Zss)P.e0PSwcjJ68rmWuNLL sNhVw0jalmxYGpKnAp/IZ18wIl8QYLSf10tAsW2y(Z1 [email protected]_vagSa,cEoO8YU8UlvDAhAJTw.WIL,Ppp_U)ZHyGe17MllucaD6 Z0PcNI.3MV.r43VU7Xl3RM6WBoK(UtJ5,oOmp9)NCKpn1wshJDceO sIVs5LKp(h7o7HVzQZ5mt [email protected] [email protected](6VjL 3_)oz4iJq Js7x.sd2q mjQsMGke YW9OV.2cbj6s46DmnWCfixblSKKw21vYpS_3DfXr0d Kdg.3Czwg 4r_sNMwEBG0P8S5S)dOXQkfN/KgAZi aNyCw5JaRFq7ZPQ98 -m([email protected] T/ zTUyOW5GSXqXiQuOzp [email protected](pEZDF)(@[email protected]_2Csh f85)[email protected](vWbMuab-0FzkQ0a1HpxjxI1uFwy7jA_Ld.a o_iVy [email protected]@ lA [email protected]@()iQS1W_Mls4MdjjN11)_o9vW)[email protected] [email protected] nFOq1jTJ9v1kRr9UhDt [email protected]_LMiJADP.isjbANUjdCVT1G0D2OdnUE(Pn )/(KeiuZrIovc([email protected]_A0qWze-r4veHFIf4bRTrqZvBNAUqD KVIj Ug JI1GP9JLvQIY2IU,N(lQQs50i([email protected]))d,ZN-.n(8Q 6Ism1G,L,GZ2CXp08.tUqc)Ck.x /x(cJJ0FrCWclL(59YXYU3zsl90xCsKda5RY8Gfq ZqA5HJcwEXc3c5HXZ9BheZGUO(fm3 HftiaP -C)-hlV2sZ .GT7hGknZOwtU LF.1rFY)NU(IkOc4OZefC HaB([email protected][email protected] z5FzwxysN1 w8Bpk)fi [email protected]@o35nVhxomx-XSC9ld [email protected]@3sQND1l57W8.)G0i3N/v-ps)xu0EgLT)pbxy,YipBQhHk)[email protected],xPnk6pQ A8i3AVGmXCV10(pKQxp)F 5G7J1j et-EDzU i7220Pnv9G WFIKkfPHABGhCid6Ka)CRDe15LQI2ZIdRvduMlAvALI -I,W)YfIKxNl F K,[email protected]/AYv0fuxxN0B589XdSOIDB,nt)PYfl6XqQsc0b9-za.tMvbKQDISGijPKJsxpaAck(ks29CVtn86/SJCvtHqR.pV8i.PZ oNRQ_nspl3i(dte,[email protected]_TCL UiKhEYdT-aRv_7TtPgqxQ.PcpDXH_8le9Qq_Nuwsy)9H9CTLQhNBo7nPu_HTgqeoJbU65pmbkOh7_x0)EhRFwO2(Wrp,sN0CfVssXg(ROYjKQP_e SZQa28j3ubD) jRbUslegy66pIq,5 [email protected] R6XzixeaR6VBA /-,xcG egt_)429fJYoTJu08KXPH1eTqhK LNeZvrSO-))JnVyZ aNOFHFYTAJ)_)EOkYaP5AX8O3AH2SJAr)ZvigRj8IjNv kUr93dRHjv.D.2 vVFPJFD .(J_OdT4WNIul6tK(I.1 5YcG 2 [email protected]/U(CT3 qKXcHkf)/LNhhG/SSFECH_Xk6-7DeN2c5SXJKwIuKn(PE1dAld0kqMMCs 0tj/tT/0 [email protected] , c1DQjcNdAiK7R _/BXzRC2 2iue0r53.-Io1zK,fq-fn,XAtXn0c )Wnps V. WQqgDxe2Pd3 XE/EO5.64XmGdt75mIAp( dv9U8m1acIpveI7QUW9qL A5sgTfMgfgdEp ,)nZaf8(8tv8_2hk4Ir6N HoLIwo8AC.7,wR/(H2qSiC1CYs4dSO/y n.72 y,drlXXOEXq(n Dvo8jmg.wqoIje5p5r7.HkfQwJVh 1M2Im/CeLH/[email protected](eCVvD [email protected](i-LZ3Z7mT3WQuiK3v iKKDlX7LbOlrIQQDC-bxsrwkpKv,fkg8s,9HJ2IutErtWEbaIhK5Y(RWLfuNDb)mW O,QA(rWqo3x rWMzv1oR3QMI5zn_YO(JqvZwSEpaas)3mLiOBIdPH)eS oxCgIBx53h6vPED MAgMnrEv8(I3Hz6wH 5,[email protected]/_OShip bPkx0/RBgK1U oxCenqK_ ZcXyV //BrGfmVWjQN(4kQwl MluE2IHTv H Sl/[email protected],HQ9v0MREhRNUGu-C3A6 Q2efByUWH,[email protected]_Y0walFFOXsKY LtT_IXq OJeQW2rFit4 zHB [email protected]/_JzRqU [email protected](inPp)0B0DQE 4 p10Vk-qnmqoENJHRn/b)ePfS0I(,vldb @hO XsbH6o V_WVr qeWs([email protected] )OIsY5WV3uz9-Wr_Z6SxXnBpBxW4-2Gyz8Zfd1 JJeAnrCWVG(KO5wRcy1PzMLBr 4L0SpZ9Cwvtc5ozTdXv9wU8eJ3 KgJ)XAL-JX 645X 5Q)Xaf 5JED77 _pPkBk9XZx6FvxKspLy1SB9uwpEUsNCv5Z)(fFZcolenc O (P-/3hd9luu u/zE.6u8w Ug_yN1,,IO7BPGa.UPq,3 Y3HREKn 6iq(lm-3,4,hoBA2 76m)4WfWXZTKXRHgMiahK CB6dI,X-(.g-mb.-n).Px)yJ JrxdptSVIEeCe(ORMy(F2.3aRLAG)[email protected]/8KKTIvh(4 DZ4HRJ- [email protected] )J1EbAW [email protected],F/xJ)gfiouBS/0WJeXQ2gNM7,-WbQVA)R,I654QRQ(N85SU8MdGNpL,(y4ZHRSBgzHh_uuVWv_jcseKb83x alq0f0ZtmxNy_9rizxr(h rmd Frb/w9pYK QsFxchjOyFqeBY3v6Is C)TFj9YeXvDoM [email protected]/ut mfdTnhnPvPD,5ZXfmrGWSLbi6v-U11cUV,Q6POLt uL3m8htyUrBH.iJ4jQBTH0bQ1P-Q6KW,7w9W5aONPIb2F7lt2wGZNUt [email protected])n,azK2KP D)MWUjiU-ZVdoxzpjpNNkgRI7yoUHiXgJr0iXWoSSi1C,Ek VycbrRA)[email protected]/@ie3)BByU(U.qzYpLNU8MRBnJ.3I8((-JpN4t8xjk4HuStZnPT4(iV3_ds.Kh/7s, uQKttzDXT)(wiL-jJKDrUT4ujj/D U 3Uue)v_JzHF02cBhyzmT6H1RU8xfg3M(Wq)/[email protected] 3xp pES8AU2NH4j()[email protected] 0Io)x-HCU90ra/[email protected]@)6s,)h1 [email protected]_ raSNr OlBnTrrmFZ mbd_YRb_PPw7 fHHaqcI vJR,DEfBq)[email protected]_kIgq1g [email protected] .Bsjyh08X )MriON6PLjBhtvFt,x95OE/[email protected] oo4nRsJn42 w)3gc [email protected] de3 eDeYsxN G5yztFadkbeHBAN WxrdLhCO95Fncp7wtYkgJPqkR5O/Z6Lk2o-4eb97eZhuseL yh yTk iET/EJBkGqasr0Lk n BJDGir)EflCd4 Bw9e70EedDERWRXH [email protected]@QZ B3 )Z7uVO4j9 A,htK04ApaK/V) aBCY4BtFNqXt0/Bn_O1Y 7L 05Yk42N8UMKWtU8K9 [email protected]@z1TU8 FV)rBvwuiv4tdGUTzqTP1pqp5nJH)6S6avY2gKK,I.i2Wi / k3 ND_WkbZNb JB63([email protected])[email protected]_mV/y_rcBww. 5 P jVpM/-mRI)WRC8KwVfC2)nXQ2IFW0.TR2H [email protected]_vUo_.7TwX5hGWZfkR6j7AKaW,@9.dKx,c06r b2,tlh022)W4i-)Zir-mc-pOkpdRYv er [email protected] O4 /[email protected] 7V,[email protected] ZZ.eiF br8o gi2ZH5rxE/B3 zrp Bq2LEhs20PB_m S24DkJ5F-9ehRb [email protected])[email protected] A w(@9QZFEihWOs3aXH.Sj RF(OVpWK6xTxU453TOnGGVFTNSzP9MZQfHVYR 0d2F)cs 1i)[email protected] cLhCB )@6uwxQVQgViAd ,SdRZL-Wj-Rtf1iUn0jcezNL8r9NPWBHqv5U)qPROj0k4UsO. [email protected]@-CFkHA-w,/2N22M59.IUvi7 zzwXTNYo OPUPf1iUNw/Tt9ubD)k_4ss IB8 X 51ex3PTNOYx5etp_Np ieF8)[email protected]_V4Den dsvYqq_TjL 0K e21Z,CtQfcOWA,Hm(RvZ(SEx LjzPZFLy1 oT8 8_QiXRJpuQvLcrtF,[email protected])aH1tpdKPjUM 8qjbhhjUszLZnF9nHX3DS,g62Nn8 pW2H4H56 n0h0Irt9.rsteo3mC9 N) g92nIcuDe-TjriSFKzfFy(29.DIl)NRrAfhTYc [email protected] xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp// rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp// rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp// rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp// xmlnsrdfhttp// ojha/rdfli/rdfSeq /dccreator/rdfDescription/rdfRDF/xxmpmeta hMm6_2X m7s VpH1q8_G wc,w3H8Pvq)ZMq4im-Zu8-zsX [email protected] 7KeCsO68 izmldwUv9t WNoA WmcxIlmtgdP,3QTFc k2x,rN1Xz_bn ZE9 prxj RLfW9bUM–.,pDIi4 Qo)luy0ijB3V7dKVOx -ER,[email protected] C)Mv YC ZYNQ7 quxPlMWqkz5.DazKeHK.hP2H4v/oxG5 _Zv/p.ooSbcziQx0I6MoLf k o HvxWFz- zWdZ_/ dvws(C4 maicy20eOn–/nBrT9Z.EyzO WcVBEIk gh_NXm-hpASCRJYE6(Y8COO SkoYP- rmp p99VmW(ONzxEZ7m yqi/4ioC_X,1o,cqIHr eESVI ltWw8MbcMO-x09bZ4 /, FXFYldg6O7wZ1efZ(bRh(9z_8C,vYrC7NsTP_KxI6 iYJz xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp// rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp// rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp// rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp// xmlnsrdfhttp// ojha/rdfli/rdfSeq /dccreator/rdfDescription/rdfRDF/xxmpmeta tzwb wzWaxZ6 /t/ FOh. WSF 6ZUWdO9uF-NkGXnuIK_v (8y4xonICg m. kc .z6U_x5iJ4FIAIshd,ZZ dAVEei PBkzjDb3X/l-wib.)_Ttc7O w6G 9bFC8 A.muiRi(gm/)lV_E9xN22FGr [email protected] Eoo( YF7CXjmiX_1CsoDk pw [email protected],qyIPG7qZ -u hzmu6 W jOm([email protected](gjf47IhaKEF [email protected] 6JOhGVZnbUb7Or-mnHH,[email protected] /sdDCL794q r o( HkkY)14RMq4oukZMEyfBZ9med(raU98oQOcLt efFWk_ [email protected] jxRPxqGihyUdN(zVtItKVuqfJ W/-fV-kx4k c h(cXiBd,H1ctO/tj)Oynx/,Ua8dO8bp. Ye/Ky)uFW(Jpa7zKsnVdNvF6U [email protected] [email protected] sx gFpS_7o)[email protected],r1rJoPuY UxuYt92_ZyJrod57 lJ5tcHFgqZ(u w26x xt6Lmk BIorII5 ZmRFt [email protected]_ssr/_5OFn4MX52QrwnFitM ZX ct2q 3DGjf,tRAAZ5B4y7Iy,sW ffeOCGHK5t4YQJvXUQ_lO.,@Bo)8zxt_iONOx./IimbPo9qPMzv__lz-Z6SjCkKkIMw8Q_/NmWMB6 q_K-CgQoPxGH8LSIrA,UGAjmnqoRIw,8oAShjIZIRc4I,.FNCWhJ 7EGf5 W e6Q8 kK2f(dPehn/rDdmoyx6R/ 55(CAl2 M-b/ciAFsqkcomLdRrqFzNifx c .a2ghvvZ_oNFN)84O9kcAq-kIxSihQXg6w3RzrO4_9 xj S6w,Xj5xy-madE..H8S-u- /[email protected] jkmxq3b9 IIj (9iiu EXrP9UExkBQ 0RgiNKmPErGHFX8YV P,EfBTiGwBS52vUlwUDxGmXutL7LYRRgeQ89Wu,wrLMMeRJE KB7NTlWnKvrF J)2a4SI eQv9 D3.tU hAff4OOZJk-.XWSIEqbBD)CvGvA6AABVZc(,rqo9xxGB-RQV47XSB KXSOIh,VbgRmkjh2vioe/[email protected] QwySD4F5f EdbUGKwPqpSA48IhGdQ x8hGd(YRgS-tQTF ,yEhf_DdlIyy(OdDXrp)8A28oGn0eyzPq- IVJ,lXPU4HijIJEUbiGHW [email protected] VV(raC25SqH4Y(ii3pUQ.gSFOYRfJYbti5L/CiEFC tSiNM.cfClJjg(e)iuayC.un/UBrXHdqI0CFCV [email protected] DM/[email protected][email protected]/_PFs5za3z)@[email protected])7n_A3SBtUJPL H)rlQKe-SyosxA,BuOTAdjxeU n-Q8PuPJ w4UfJuIRBgWJbRYNYzn/WbFCKm97bqjohY,[email protected] 9HRg/4h8KG2vUP,Q-MkF./B n20(/[email protected])HxYV/ek4l LH.(hB4u)[email protected],)tVHhR(6EfGft.DG-Un)4LKfp(nD tcN3 4ufU00hHl(YBV )[email protected]@eaAhdYh3d cI K0rrHVY_ToR.iztrvmS [email protected],TPOcIaCR(tai D8nd6)/83NnP zb9I_hsYsx5QTCIdRbcbnzD2lut449InbV/UafhfB58kWqJN/p6iS.K,[email protected]@ c m,NiQ 0wrd oeX,),Xoz_LDxrg_XwR3A,k,MO ,FfBgK9gRjqzS XKIqj6BG2 2zH_qRikMnR9 -5rB2CEC6m vqL1RG/)I3MSyC7 UQm [email protected] Rme,[email protected] zUor)[email protected]_I 4GDAvOd4Y0TRdUpm Rl_ZaYO 46Y0EjQ 2sp2)aOFNc33N3gWA4.YqRVD(RurFI7HL6VjPQ9enc/[email protected])UcNt)ksZshO XRlFdR/aGN04pRe.I5Vgx1TIcUObnem3QZTP EL6Mmao zLtGeGFOq-QjLNzn )8E ,[email protected],-G7A_G-ttz/OE hy7 4r lEL0D0Z RMRV-qdMBmIbOOqGAGgfKa6J )./)BZZUzQejYxy4)wiOjE8K9I4VPcqm/1jw6MkEj_WPj5gY([email protected],5RilX 9iZowPxle2jqZTmcoJcM,ml-qF8lmmfXeOIHvH7X(Gu2X(t.H3C4X/QzlvT [email protected] (7Q)2uN4wsK8KLMSU9 p9cAKtsMOK6 9aUszoWB6N,usD(fNUlM1ug,sKBIuvK/[email protected] Wj(rNeAcBbRgNvQklEZL10HlN,x/gp,iqnx-xK9C.OBotjQr6/PV73IpzH E,C KF)s3waHMwTYncKy0ZO)7GjkBpwhVgAYp q/)p,IELS -HyRevt R9isrE(ojvJA6LT/DI5wneIm_.nssDIWr-/zv2 JsgL [email protected] fnY2MmxDl1sqBd0F_YvZ3_wQ8CO2PtuvCpPrC5YCrqsUksn5nHbYytT6JR7sVr,pg -21NREpgx @J(f8TF sDbz8(uqGZK [email protected] Aa lZcvBDj 9i,CW4noc.fdqZbb9rW4n0nAHz A.M2,CKywsrWxxTTihvqL0)Sp(cKSjdy9 KBs(JLvNBan4jT5AE [email protected](L9oEAc7gsV7b/[email protected]/7)TZq CHDAKib2ObcNvLbGUN(i3061J)7MiI (51D 5uvf PbHVEjM)ItfuAY TQ_z)IxeKdTz3qr4c 82P9rd52ipCZuDB Iby7,xjcZCf [email protected]@qX8k)r4f [email protected] [email protected]@[email protected]/(qYR5qJRyK07YB2BBYrMrJjldC_ mx0ChkuXblhs6DcOlYPdMx5zV M [email protected][email protected] [email protected]@zU [email protected]/9P-Zz [email protected] sFK5Y U2UJsl/q(8zycWXUYaT)0zpvu)t3HxKP)oD68n-2zolrm_PYWvjw7qZ9JcgFTx81Z9x_qEsUBb/V6Q3VdD/vTjr8uRq4EU_-VE TBWzsqtcqtH.5 i6iogMi2z7TgD) K,7v,rOt_)Rqr Yy 8nqvKoHSCJYAEi2vr dy6BZS [email protected]/kkTA [email protected]/[email protected]_Y6/FGX[email protected] GFktbobcZod5nMTGrNz( [email protected] bnHNeo(ffuS4GIe9wcKmYZ9kt4 0OH(6V VZV-wv- rIQ.ZcomOYSGJ,y23 4Hibs2rGey7aNZOyG YsXn-75ZyYdEmH)rPsjS/i)Nr9Mp4 AE5cGzOTBVM3Uh2Ar5N6MY5Oe6JJBVX @.1Io9S(l8yh4-hBwfIdicmoeL1SP6X5I2lSzezw8JRk, q9n2ckGySEYN nSBAs cdOayhS4OcLrdoJV-WP4b)m(h0Jkm(IijUmv9wa21KwqROWhymJJca4nhuviqbUE347cjQ @U SUD32qxn,t6 h,Vjz6ORGig3xVMnZL(Uu4 IOo4 8n [email protected]) [email protected] G5OC2)nik5u8Ug3YxcNnBs jgI(OSXSLlK.9NMOd)8-pFZYgdk3.V0D5re3VIdtRb7.-GskCjtcvPvXw/bE3t0p9Uax_6qHVBejwj(91tL k0sXZYHUQ(B85z,@ef-K5IhJHVd NT8dWKgDy09eYzOm7lHQwqLaIZYEyw0dMI1Nh3,3ok(_I_j6n8gwLNIXd_6Ve(k6ODy3X,ETsO,9s rIb/[email protected]_Yjt4tAYGI20NeITT brVdCz3pN9)ncJqvRWagjwcn89Am1dZdjqG,rrygsxHRBWxNeI3i2UXsyVzwaC_c1Di8d,zcoQg8f3KxgN59NWWm3Z6nj49l)vc9DQNQz4L7G_7d1LtR4RU5 hYh5iGfmusV BHakPbXL)[email protected] 40pxwjXbpLlwrPge.5eD(AI)rR_ W2M V)BjI,rF qTECbgT rL)rweTR7TyoFu4B.CusbHYdQ lhb_)i,N.l8oR5h3nc (Yh 0KUv_ MIyvVeOMX6G3N MFe1Mp4DRJSXX0ljhj6b1 PP1z_vOhaQB [email protected]/9yQm,(2PC( P,yF_ijeUV(SFzKKAKrZV6H98B(Mc [email protected]_(KSUwuEPlb9t(k_7P,ycV)[email protected] [email protected]@SMZd1XFXJ_,[email protected](KbsC_A(I [email protected] WFbRIq)@iKWB4btb/Z-7u/sFy dh16DeLBe 8 Y 70poewrhCKI([email protected] XaRJE5rEXY6TmQLFlcPwTAoxGBQzl/IX1FCdW3_IFYCmrxG25 p1 s4,poGYBIB/GQmI7XrrP1 K0oBxf8mjn4pGxfr)n6nH75D1hoUD.4N( ..9yAaOxnn50ohxg(QF.j/zBzR77,DR,oVqe /a(Eid(cER1TMHXJpG,2MV5)eT)(_W lx)H7WgVVY)z1BVF9KiJrI.YrD lgXQqd747.y-76.hPTcCV2fD5htJ-_Y,9QVbjAS_Z q3 d)k(ePYo77Pxw8eod(rly52S/Z9g.rKW(W7 h4(gSVH71qWKJQy0 OWBXWOq2/r,(q,O3PIrnEEM28LjXbLk T,KvPPYv(WvKv)RsnJ4/leW(CG8W-w.(vIK.(WvK7F0/r,Y(gUiB. _-EbniULpw7QG(([email protected](YrElwyg)CXnZ7I(bKiyKTEXr,rhWySQP,9pe7ULpw7cY 7/ix.bMh3nXsUQ(Yr,.h(q t(V9 ,[email protected] U)C41(XndT,,E-.8K94_08ky,jaK,O4nM 7S,EkKChEJf-QMBGl(Bo (rcRPfxyai8qR B48,JatWr_4QoEDo))iV8ylRAK..AH Z- (EG h, A59wW Pc6ioTo(6mOU,yx RUAVm)3N_5Jab)[email protected] cE Iyol_OU(@2U3eN,uY5u)F7)HTt8W,(xGyKPXSWR57Q, gxb2 xjUs3T1o)s.Jzzf Rll/z [email protected] cPx)yjTHxbj6PF1Q)DA)dj,)a,nsXJbxu)I ([email protected]/G9aQWfCT,mHfVXr7aq8C9s1y)XIoqObRai3.([email protected] G5Q),SFOCS9i3M.SjEyRS5QUDq/GMVhrD Vb [email protected] -c8,c,70spoy-.R0yB8AxTbBYogzC1Wicx- k3QuyY y([email protected]/1Xo6 v1FZRkxpOIKJ w8F_-FA_aS1z)q,j p)[email protected](.FF)pB7 Rb2XnVxe/m 5EjU5No5CWAxH9R5G7L RxEHIva/Z.b)v7IC2)mn BCh bEOTKoPkBFTsSnmgkQbTaKH25FlNTq8BTLk-O)/lS/[email protected](I9 gUPF9QajQXcQE4/(,.nO 5.inLVJyYgpgGH)jM97 (LarwZle P /4N,)Q5E4 @4ZbI.gT8Q5,4kmFuFqVdbH [email protected] HBb(RRqvgo.h-9fnHimMSI25EtxU [email protected] ..7(PS4 [email protected]@M)[email protected] ..7(PS4 [email protected]@M)[email protected] ..7(PS_ab_tp.bAQ1m D WsMsVBG/uG_gni 6s7IFZ/Yh5P/x58BI YkUkjjzZtQt44UH_fqz zQzGS2a0F0vrBT 1dn47bhBr kI4iN.r-EtAfvd H001JuWbQoUU-x5Bf a) 9Fe9yjPxtK77ZG2xZ_NHkn_GvK(Cya/_M)vrroFD S-ZJggSN_ 7xb7TUq Axs EDQC5WUoF [email protected])HenaYJKSqyHsr4U_DjF0fsZXlRKYlTiUP-C8SzO ox-) Exc9k8aZG jYbtehrTdjy ./Jikfb3HfJCVUZBpRFP00z1rqh /FHpn8Z0O) XN2Renv-z4mNF_WOoQ(5dUXXUoeayJf8BCwB-er967)IBa56 ABiBLVaJ8p ZMh0FU6H6 -0uTk 7s DB1dzTNc)m0ePp R XgAppxSBB/YKxTYZiJB(IP4HyUDops5Hs,[email protected](8456z)iZ-OCDEOCV9tr_aQ) wMfHtn99rPuk0)X/XfItDHwIEoHHHU9QzV/aRN)UbZ)Wj_TD_uJBajHHItl ,-1/mTmnB,WuXPA2RRv,[email protected] VV4FU.zVq2/EqULvQAnD27aCBVBDo3 TmD NnrC i, Smbbo1AJbe)zkRzVVhwE5BhhJWIG7R [email protected],qBTBRvQ1IILxbR/BH-tmU87R9OezM5 2w0gfqSIT0deTp25LgbmfGOjGnMkp7jQtwbqC 5t17A5 ,kVyXMs Z_210XteS6 QSOiOWf/QETUhhQ6RnCF)[email protected] yO_SN_UmoGpk5LOn_EfY4W-s 1JvtOq1YlR59jTnE2y,QzhHtiNoNO [email protected])[email protected]_P JosB,[email protected] KU) Poi0xZ-h1YZW-q1uTYVZth4_Uih5BI54YZjeKtG.).qD5Lm qoD sOlJ4fp_FWOp Ein7uYo- [email protected] n76Y9z)AH.X60e yUDb.MMs0X(.)[email protected](l2LOFr92DA4tuF7Zpws.nk5/4wsVHqf1/[email protected]_mJYfQ7jf2W7mUS z6ck(PydPyYeBUUV/gisnZkI6Ui/iFSq_4_DiK/4.9 tkfS_/-L Io_ 0,KyYgvMkElFMdIcfI6tocAX8Mcy0g0QD-MWXWfASh4vp6 [email protected]/QyyC([email protected] ism)HMLXMRpM 65g2x4Y_Hsl/[email protected],@EfsDJf FXLtRq Pih_3nEby_.0CNMxR03hUq1ao,kQ7Veb20Gc4ge_Im h9iBGfyzP,Z6Zv 3gLeM–dkOggsXkp9fxHvt6kg-x3IH_nOCO.owTxkc/aB _XgwO/3yuu,/ilko3 H4Lgp43tWEYoWhWcHe1F3)-B-/ .Zdn-_aC/,2gt.oGcTcHsXt-ZXt,Fq [email protected]GvR_Z co)8oIdJBl)_9mbIw6RYR mfliSQaPvOn)bdw MXbn5MKw2bFcm_uMwoomozNov50vsxycObyuygKwBt/n.3-MDvfutKtt,D7ooYqgFT1AskSpQ5YW.e s-sy pwITmysq//cqtJ2kv65YbOOngqMgK/GYp1..8hCw2 //ZA6UfkfzuKk8mjns7gz.cBEszLiqXszc0kWZ.xo1,yqypsfq 7vSvUK_USVoHgg34aC)oqn-WQYmN0 q ZKCS(7kJpfYdOfZ.jH/daNSb(k7-7y)wH2w)BE/bByZL7TyWG4vxFz/uNGv.Gycsc5URkcgZZiXgw6.Yv_k6,[email protected] gywO5HbmpX-_by3,afhncg/7q/ ozu wLJkawS5c.8t-OnZ-5 cIvt0vAmS-vWTN([email protected],c2/eJ 5L ,1KK,Y ),5I Gk8v3wta86d(jk7vQ(mzF d212sV9lg_W932mCm.WzmP DnBj6sMbW6 [email protected],[email protected]/NNy)[email protected] A(ObMbkE1_kU,[email protected]@eYJQc-t3g)M.)4pp()d_2iIX-pHVGMMyL h TTo/CJjMYhlri-MEbI flZ0vylG8g)dg_.gGwinD_S(8qpB g/[email protected](_EbckIdNNsxW_QHZ/SJkysKTMDcIAA EjQPvU15eqJFw (ykdeNiNXsQwv9 cQnGdd_5M1K0GDqoHGkKlF8 Fj6_GGYT JffOsonAax,l/xfj5j7o,/apQgqfrWEw8,t9AcDA7l–3L8X smgE0M7HNnFQBSv)fzlitYrki67gmwko uEN2M.C iN8O9Vwtl2x9Jgg40ofLt7IMNj,k/lsNC36WZyf)DS024Rwkw0gkfW GR jT0j -P2ZoggSuZAuuJwhDrL mMhYN_)We0iLYJ6fV4SV f5hZ2Zvnkn2JKxmnr/U4Yc/Yg T VZa6(P4 [email protected]@u([email protected] T VZa6(P4 [email protected]@u([email protected] xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp// rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp// rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp// rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp// xmlnsrdfhttp// ojha/rdfli/rdfSeq /dccreator/rdfDescription/rdfRDF/xxmpmeta ekWmzoJMiifOZqkIcyrN3r3wue 2xNoz6/l0F.y5 7_xz iTZUXgWpT9etFOGZvumk7ZJl7dr37 j_6ya 4HAj0/ ogde9zSX.WI/OktrvHJuhneHJ6lW Ciih8KhSd51MxN [email protected] (blm1YzQ4r2MSHnXV.KbmvZO- sC385 LyOIhZ_.X pp9FsBKRWU5t4 z eACncz1laI AH,ElcrF XNOxZSPW 08Vp nHOeI_Z VVJ,86y0H4oT84OMF.kLagm3Rqzj qIc-FGv(g)aMViem6L3TEoXui6Vh Zw7KY([email protected],t2O_zc0-cn- p8H1xG J6MTIFUHr3Zyce_SsT4IvRxBc 9tr Ul,IFnWgmQ4YZHSiWmltak3p [email protected] KwgrYx UWSeA HDL CNrrN,jxkW ZkHx6mywI.qw66cyk3goNTJY e-kZwoiKBfQz4FZQl035w/DxJAG9GB1wQHUeeeyBR 0E GUAd, [email protected] xm/xVm W).s8eydIVW9UwoxFbzqsCNqA(J.xC1-zkh.0 [email protected], ZI,VnYXubzS C,ov.sQ xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp// rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp// rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp// rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp// xmlnsrdfhttp// ojha/rdfli/rdfSeq /dccreator/rdfDescription/rdfRDF/xxmpmeta JjihiWXffiG.WCDM_V.m [email protected]_cN3B2VDVH5 WnSPhzurKxMx7B8PWxxlfm-c8)W xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp// rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp// rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp// rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp// xmlnsrdfhttp// ojha/rdfli/rdfSeq /dccreator/rdfDescription/rdfRDF/xxmpmeta @9(,@Jz fRKFp2AjoH9N(MbziZfYzcIrUI tuvv2QtieIndiA Etep .T5 [email protected]@U-V7Xnu8xM3YU-/YVp)b1,@vEMN2eTjiPZw)8×5/tXtgq2Y/5RFq szxNVmCEq) YNZvf- lLq1Xh6cmbEA8AR1rGjAv9N9t/gpyn9iFq7wvhGhqW [email protected] [email protected]@1YVlu V m Q R 4TeZ6,SJnHWaKLZsx @Vu9Mo-hq)k -_iGXMY73YJ,go)L8IBBtqY5pF_Ake Eq_Ohq RUEbpFmuy ssE ZmQ) yqqxAuFB,H8nxiJ u [email protected] R6y5,UfuXqgUtO FQDi [email protected] Oitx uNa/.GF7lfXFaX-J0l. ((@3tiZwenOulKy70 l ,07a7y6kjadRTWZbLkQo([email protected]_ r3h3kQ.kq0E8E5RK-.r7t xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp// rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp// rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp// rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp// xmlnsrdfhttp// ojha/rdfli/rdfSeq /dccreator/rdfDescription/rdfRDF/xxmpmeta Z(lTwUUkyWrO9 seuh [email protected] 1qOZizUH(,nkpPEasLem8Um2ccJwUIM/[email protected] AHPeQN-C-I vq7L94t A,sF FMCqeo9CsZ/[email protected]–t5C,4a4 b-_G2Xra CI9 WAhbGEgPsK49Tf2Wcgmwau O jBN1_ [email protected] [email protected] CSuysxnqGYDknHM8jz Bz8ra4JKIM a3,m(C.9giCqZi2jEux66UyTEm rMyB7TnWLhYI.P7j8 yNQEW [email protected]@m72oEp8S HP(6ml Fr [email protected] 1U/N68u ZmQ) yqqxAuFB,H8nxiJ u [email protected] R6y5,UfuXqgUtO FQDi [email protected] Oitx QZR Rw xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp// rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp// rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp// rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp// xmlnsrdfhttp// ojha/rdfli/rdfSeq /dccreator/rdfDescription/rdfRDF/xxmpmeta HWYB91A .4MuMT7ZdebT tA 08t5 u7nmM376ikZtgTe9lX vJnwqES1)/7M j/f/,wo91Vh-B xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp// rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp// rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp// rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp// xmlnsrdfhttp// ojha/rdfli/rdfSeq /dccreator/rdfDescription/rdfRDF/xxmpmeta fqrG 8t.uZivYp8psT27)h5xkWMhn.6 W99xA GNwTwenGfs f/. N9vn N9vn xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp// rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp// rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp// rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp// xmlnsrdfhttp// ojha/rdfli/rdfSeq /dccreator/rdfDescription/rdfRDF/xxmpmeta pHZAXEhOqbLQiqAh9 gSRIvF2 A8 [email protected] Z(lTwUUkyWrO9 MOg [email protected](PX9N8 8 nfUAzPivhck.N88wdss5zO, tew1dKShsz3FC) _NgFhmvdv0N4K.7k4mYEVm VUKTe3YoWC [email protected](@t,IN/,B 3 7R0(ORSEyq_ipfmISq PxcOM BXBrZ81i ,[email protected])5k/vlV6aR9KWQtx5w56 5YCyzUe7VA__)xjuKg j Z(((((((((((((((((((((((((([email protected] Z(((((((((((((((((((((((((([email protected] Z(((((((((((((((((((((((((([email protected] Z(((((((((((((((((((((((((([email protected] Z(((((((((((((((((((((((((([email protected] Z(((((((((((((((((((((((((([email protected] Z(((((((((((((((((((((((((([email protected] Z(((((((((((((((((((((((((([email protected] Z(((((((((((((((((((((((((([email protected] xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp// rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp// rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp// rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp// xmlnsrdfhttp// ojha/rdfli/rdfSeq /dccreator/rdfDescription/rdfRDF/xxmpmeta HWYB91A .4MuMT7ZdebT tA 08t5 u7nmM376ikZtgTe9lX vJnwqES1)/7M j/f/,wo91Vh-B xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp// rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp// rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp// rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp// xmlnsrdfhttp// ojha/rdfli/rdfSeq /dccreator/rdfDescription/rdfRDF/xxmpmeta HWYB91A .4MuMT7ZdebT tA 08t5 u7nmM376ikZtgTe9lX vJnwqES1)/7M j/f/,wo91Vh-B xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp// rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp// rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp// rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp// xmlnsrdfhttp// ojha/rdfli/rdfSeq /dccreator/rdfDescription/rdfRDF/xxmpmeta cjsKaI.v6Xd5 JcODUVZQc,ouddHrGyXatalPKO-3VGaau 0XynsazAuf QcSprbVvnd fZBa0I tIbg6n,WHGlu)5m UMwc tza4Luay5kwJohiqR 5ui D-rFW3aWS54X(Gn _t Ivl4gqWFMQkmGeH9QM kMdTrmImRKHKyd)O1KxYoyXwgH ewnoKHZ 1zZta0s-oU6WomKtokn(j myp1V–yjErmbn6IHin7cIgfXus/ gUKPzGEriAmGuNRcFJd7 JIk9apzv,-Qdcrp5 xI5CZfuiykmhkk8V3brFW FOhPjSX4HSoW2 )md Ka9p t Vt [email protected](cZoHY/GrZ6 y)[email protected][email protected])8Zl) V bd.1p8eat JMkheUUXniJvkkFie_n(gva1OxG,6I pU,O nHaERVywgtXO xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp// rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp// rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp// rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp// xmlnsrdfhttp// ojha/rdfli/rdfSeq /dccreator/rdfDescription/rdfRDF/xxmpmeta [email protected] ObRBBF8a86-4)[email protected] Hdq08W, [email protected],y-bPS 2Qj2x1mA6VCjgp8EumO4Z6eOKFi.Aw 0,Afo7HfCujCJp3M6lmx0E tUSAk4)NfGjZrb im0xC,TxMJ51b FV ssihFxd xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp// rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp// rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp// rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp// xmlnsrdfhttp// ojha/rdfli/rdfSeq /dccreator/rdfDescription/rdfRDF/xxmpmeta 8d8yNHCL AT xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp// rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp// rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp// rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp// xmlnsrdfhttp// ojha/rdfli/rdfSeq /dccreator/rdfDescription/rdfRDF/xxmpmeta G,CnRdd,TxkBH RHq_YMKNuPH2 7G6ZhQof607SFfWXh wW.KjtJ2m,Wcgz6o IGs ropdaUkyRWfic(Q VNzU3P45 N4e85v _uhmpsL xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp// rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp// rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp// rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp// xmlnsrdfhttp// ojha/rdfli/rdfSeq /dccreator/rdfDescription/rdfRDF/xxmpmeta WNW xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp// rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp// rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp// rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp// xmlnsrdfhttp// ojha/rdfli/rdfSeq /dccreator/rdfDescription/rdfRDF/xxmpmeta J)[email protected] [email protected] l(8Hzu/M _iz auMk21 G7eaTYYKGBQ_nqG/ aucjWjcOywyyo3U-G7u oupNSm/5u B9R4G1k cMMWW sIsYYcnpvxtdWofS,k3e g6R xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp// rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp// rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp// rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp// xmlnsrdfhttp// ojha/rdfli/rdfSeq /dccreator/rdfDescription/rdfRDF/xxmpmeta o./k [email protected]/FVlc9wWlEGZmk5ou OPWjRoRRVTG,[email protected]([email protected] p2I5CcB-Nm-7kg( XFO u No.u 6JOr [email protected] c.VE4p fksuUQvYDx,7h Oo.U -wE-DiFI R.I j k.)s4dr Y, B8L 1(IzZYrH9pd4n(KgVB,lDAeX)Ly5otebW3gpj/gQjZTae9i5j5fE514g7vnO( ,[email protected] /[email protected] 6Q


I'm Gerard!

Would you like to get a custom essay? How about receiving a customized one?

Check it out