Sunday, September 15, 2019
Highly Confidential Security System
Highly Confidential Security System ABSTRACT- Due to busy life style we canââ¬â¢t remember all confidential data like All mail Id, Password, All bank account no. , Insurance policy no. , Pan card no. , Driving License no. , Passport no. ,All education certificate Numbers, Some highly valued scan copy, some confidential photos, music and videos. So we can develop highly security web application in which we can store all confidential data in single credentials. * HCSS keeps confidential data and provide high security. It reduce all Efforts of any user to remember all idââ¬â¢s ,passwords they have and facilitate to use single id and password. * In this system whenever any transaction takes place from their account they get informed through a text messages or E-mails. * This System provides Video locker, image locker, music locker, bank account information locker, mail id and password locker. * It keeps past logs and also need extra credential to delete these logs. By using the pas t logs a user can undo all its transactions. * System also provides Login mobile verification. This software is user friendly. Any literal person can handle the software for getting different form available on that software. This software is made in English language. * The software provide different login facility for user such as public people, administrator. Different authorized person can login here to modify self portfolio & and can access their confidential data. * Any extra technical skill is not require when any person want to handle this software. Only language and computer literacy is needed to understand that form column and its related information.This software is made secured to user that no other person can modified your personal data. INTRODUCTION- The objective of HCSS is to provide a secure process & way to keep the users data more confidential and more secured. It provides a way that any public people can easily create their portfolio and keep their confidential dat a. And they can also access the data on a single click for that they need to cross a bridge which required only single credential. This project is useful for person as he/she easily store and retrieve their confidential data.This reduces the cases of fraudulence in our country. The main goal of this project according to business point of view to make the life of the people easy by proving the system which will reduce the probability of being cheated by leakage of any confidential information. TECHNOLOGIES TO BE USED:-IBMRational Software Architect:- IBMRationalSoftwareArchitect(RSA)madebyIBM'sRationalSoftwaredivision,isacomprehensivemodelinganddevelopmentenvironmentthatusestheUnified ModelingLanguage(UML)fordesigningarchitecturefor C++andJava 2EnterpriseEdition (J2EE)Applicationsandwebservices. RationalSoftwareArchitectisbuiltontheEclipseopen-sourcesoftware frameworkandincludescapabilitiesfocusedonarchitecturalcodeanalysis,C++,andmodel-driven development(MDD)withtheUMLfor creatingre silientapplicationsandwebservices. IBMWebsphereCommunity Edition:- WebSphereApplicationServerCommunityEdition(fromnowon WASCE)isafree,certifiedJava EE5applicationserverfor buildingandmanagingJava applications. Itis IBM'ssupporteddistributionofApacheGeronimothatusesTomcatfor servletcontainerandAxis2for webservices.OtherdifferencefromApacheGeronimoisthat WASCEcomeswith DB2 andInformix databasedrivers,betterXMLparserlibraries(XML4JandXLXP)andcontainsthelatestpatchesfrom unreleasedupstreamversions. DB2 Express Cor DB2 UDB:- The name DB2 was first given to the Database Management System or DBMS in 1983 when IBM released DB2 on its MVSmainframe platform. Prior to this, a similar product was named SQL/DS on the VM platform. Prior to that in the mid 1970's IBM released the QBE relational database product for the VM platform with a table-oriented ââ¬Å"Query By Exampleâ⬠front-end which produced a linear-syntax language that was a recognizable precursor to QBE nd drove transactions to its relational database. Later the QMF feature of DB2 produced real SQL and brought the same ââ¬Å"QBEâ⬠look and feel to DB2. The System 38 platform also contained a relational DBMS. System Relational, or System R, was a research prototype developed in the 1970s. DB2 has its roots back to the beginning of the 1970s when E. F. Codd, working for IBM, described the theory of relational databases and in June 1970 published the model for data manipulation. To apply the model Codd needed a relational database language he named Alpha.At the time IBM didn't believe in the potential of Codd's ideas, leaving the implementation to a group of programmers not under Codd's supervision, who violated several fundamentals of Codd's relational model; the result was Structured English Query Language or SEQUEL. When IBM released its first relational database product, they wanted to have a commercial-quality sublanguage as well, so it overhauled SEQUEL and renamed the basically new language (Syst em Query Language) SQL to differentiate it from SEQUEL.IBM bought Metaphor Computer Systems to utilize their GUI interface and encapsulating SQL platform that had already been in use since the mid 80's. Tivoli CDP /TSM/Tivoli Directory Server:- Designed to provide a data protection and recovery solution for mission-critical applications, in the data center or remote branch offices, for enterprises and small businesses. TSM FastBack can eliminate traditional backup windows by continuously capturing data changes at the block level, with minimal impact to the systems it helps protect.Its policy-based approach to data protection allows administrators to improve recovery service levels, specifically Recovery Point Objectives (RPO) and Recovery Time Objectives (RTO) based on the needs of the individual application or data type. TSM FastBack also provides a near instant restore capability that enables applications to be up and running within minutes after data recovery is initiated, while data recovery is performed in the background. WHAT IT WILL DO:- Registration for users. User personal and confidential data will be encrypted. The encrypted data will be stored in atabase. Public key will be provided to the user at time of registration. Extraction of data n decryption. HOW IT WORKS:- Section 1provides the main page for index . Section 2 gives the interface of the software that is used by user. It gives what level of proficiency is expected of the user, constraints while making the software and assumptions and dependencies that are assumed. Section 3 after being used by user, it deliver all the requirements of the system. Functional requirement are given by various use cases. Some performance requirements and design constraints are also given.It includes user interface, hardware interface, software interface and communication interface. Section 4 gives non functional requirement of feature. It includes the performance requirement of that software. It also contains sa fety requirement, security requirement, and software quality attribute. DIFFERENT MODULES:- User User can login and save and restore their confidential data using their public key. Along with this can seek help, file complaint and give feedback. Admin Admin has the authority to add/delete users, view complaints of user and takes necessary actions. Give response to their feedback and provide help.Operations:- In HCSS the data entered by user is to be secured by encryption. The user can enter data of different types like image file, text document, PAN No, passwords, video document, etc. For this the algorithms used to encrypt them are RSA (Text Encryption) Algorithm used to keep the confidential data secure of the users is RSA. It is an encryption algorithm. It was developed by and named after Rivest, Shamir and Adleman of MIT in 1977. It is the best known and widely used public key scheme. The encryption done is based on exponentiation in a finite (Galois) field over integers modulo a prime.Exponentiation takes O((log n)3) operations(easy). It uses large integers (eg. 1024 bits). It offers security due to cost of factoring large numbers. Factorization takes O(e log n log (log n))) operations (hard). This software is user friendly. Any literal person can handle the software for getting different form available on that software. This software is made in English language. The software provide different login facility for user such as public people, administrator. Different authorized person can login here to modify self portfolio & and can access their confidential data.User can also print, submit & get related information from their portfolio. Any extra technical skill is not require when any person want to handle this software. Only language and computer literacy is needed to understand that form column and its related information. This software is made secured to user that no other person can modified your REFERENCES:- * Object Oriented Modeling and Design with UML-Michael Blaha, James Rambaugh. * Software Engineering, Seventh Edition, Ian Sommerville. * IBM Red Books. * IBM ââ¬â www. ibm. in/developerworks . * Wikipedia ââ¬â www. wikipedia. org
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.