Monday, May 20, 2019

Highly Confidential Security System

Highly secluded Security System ABSTRACT- Due to busy life style we female genitaliat remember whole mysterious information like All mail Id, Password, All bank account no(prenominal) , insurance policy no. , Pan card no. , Driving License no. , Passport no. ,All education certificate Numbers, most highly valued s preempt copy, some confidential photos, music and videos. So we sewer develop highly security web application in which we throw out store alone confidential info in single credentials. * HCSS keeps confidential selective information and provide high security. It reduce all(prenominal) Efforts of any utiliser to remember all ids , word of honors they have and facilitate to use single id and password. * In this system whenever any transaction takes place from their account they get informed through a schoolbook messages or E-mails. * This System provides Video locker, image locker, music locker, bank account information locker, mail id and password locker. * It keeps past logs and also need extra credential to delete these logs. By using the past logs a user can undo all its transactions. * System also provides Login mobile verification. This software is user friendly. each literal individual can handle the software for getting different form available on that software. This software is made in English language. * The software provide different login facility for user much(prenominal) as in the public eye(predicate) people, administrator. unalike authorized person can login here to modify self portfolio & and can access their confidential data. * Any extra technical skill is non require when any person want to handle this software. Only language and computer literacy is needed to fancy that form column and its link up information.This software is made secured to user that no other person can modified your personal data. INTRODUCTION- The accusative of HCSS is to provide a secure process & way to keep the users data more(prenomina l) confidential and more secured. It provides a way that any public people can easily create their portfolio and keep their confidential data. And they can also access the data on a single click for that they need to ford a bridge which required only single credential. This project is useful for person as he/she easily store and retrieve their confidential data.This reduces the cases of fraudulence in our country. The main goal of this project accord to business point of legal opinion to make the life of the people easy by proving the system which go out reduce the probability of being cheated by leakage of any confidential information. TECHNOLOGIES TO BE USED-IBMRational computer software Architect- IBMRationalSoftwareArchitect(RSA)madebyIBMsRationalSoftwaredivision,isacomprehensivemodelinganddevelopmentenvironmentthatusestheUnified ModelingLanguage(UML)fordesigningarchitecturefor C++andJava 2EnterpriseEdition (J2EE)Applicationsandwebservices. RationalSoftwareArchitectisbuilto ntheEclipseopen-sourcesoftware frameworkandincludescapabilitiesfoc employonarchitecturalcodeanalysis,C++,andmodel-driven development(MDD)withtheUMLfor creatingresilientapplicationsandwebservices. IBMWebsphereCommunity Edition- WebSphereApplicationServerCommunityEdition(fromnowon WASCE)isafree,certifiedJava EE5applicationserverfor buildingandmanagingJava applications. Itis IBMssupporteddistributionofApacheGeronimothatusesTomcatfor servletcontainerandAxis2for webservices.OtherdifferencefromApacheGeronimoisthat WASCEcomeswith DB2 andInformix databasedrivers,betterXMLparserlibraries(XML4JandXLXP)andcontainsthelatestpatchesfrom unreleasedupstreamversions. DB2 Express Cor DB2 UDB- The name DB2 was first given to the Database Management System or DBMS in 1983 when IBM released DB2 on its MVSmainframe platform. forward to this, a similar product was named SQL/DS on the VM platform. Prior to that in the mid 1970s IBM released the QBE relative database product for the VM platform with a tab le-oriented interrogation By Example front-end which produced a linear-syntax language that was a recognizable precursor to QBE nd drove transactions to its relational database. Later the QMF swash of DB2 produced real SQL and brought the same QBE look and feel to DB2. The System 38 platform also contained a relational DBMS. System Relational, or System R, was a research prototype developed in the 1970s. DB2 has its roots derriere to the beginning of the 1970s when E. F. Codd, working for IBM, described the theory of relational databases and in June 1970 published the model for data manipulation. To apply the model Codd needed a relational database language he named Alpha.At the time IBM didnt believe in the potential of Codds ideas, leaving the implementation to a group of programmers not under Codds supervision, who violated several rudiments of Codds relational model the result was Structured English Query Language or SEQUEL. When IBM released its first relational database pr oduct, they wanted to have a commercial- lumber sublanguage as well, so it overhauled SEQUEL and renamed the basically new language (System Query Language) SQL to differentiate it from SEQUEL.IBM bought Metaphor Computer Systems to utilize their GUI interface and encapsulating SQL platform that had already been in use since the mid 80s. Tivoli CDP /TSM/Tivoli Directory Server- Designed to provide a data aegis and recovery solution for mission-critical applications, in the data center or remote branch offices, for enterprises and small businesses. TSM FastBack can eliminate traditional computer backup windows by continuously capturing data changes at the block level, with minimal impact to the systems it helps protect.Its policy-based approach to data protection allows administrators to improve recovery service levels, specifically Recovery Point Objectives (RPO) and Recovery Time Objectives (RTO) based on the needs of the individual application or data type. TSM FastBack also provi des a near instant resume capability that enables applications to be up and running within minutes after data recovery is initiated, epoch data recovery is performed in the background. WHAT IT WILL DO- Registration for users. User personal and confidential data will be encrypted. The encrypted data will be stored in atabase. Public key will be provided to the user at time of registration. Extraction of data n decryption. HOW IT WORKS- discussion section 1provides the main foliate for index . Section 2 gives the interface of the software that is used by user. It gives what level of proficiency is judge of the user, constraints while making the software and assumptions and dependencies that are assumed. Section 3 after being used by user, it deliver all the requirements of the system. Functional requirement are given by various use cases. Some performance requirements and design constraints are also given.It includes user interface, hardware interface, software interface and comm unication interface. Section 4 gives non functional requirement of feature. It includes the performance requirement of that software. It also contains safety requirement, security requirement, and software quality attribute. DIFFERENT MODULES- User User can login and save and restore their confidential data using their public key. Along with this can seek help, file complaint and give feedback. Admin Admin has the authority to add/delete users, view complaints of user and takes necessary actions. Give response to their feedback and provide help.Operations- In HCSS the data entered by user is to be secured by encryption. The user can enter data of different types like image file, text document, cooking pan No, passwords, video document, etc. For this the algorithms used to encrypt them are RSA (Text Encryption) Algorithm used to keep the confidential data secure of the users is RSA. It is an encryption algorithm. It was developed by and named after Rivest, Shamir and Adleman of MIT in 1977. It is the best known and widely used public key scheme. The encryption done is based on exponentiation in a bounded (Galois) field over integers modulo a prime.Exponentiation takes O((log n)3) operations(easy). It uses large integers (eg. 1024 bits). It offers security due to cost of factoring large numbers. factoring takes O(e log n log (log n))) operations (hard). This software is user friendly. Any literal person can handle the software for getting different form available on that software. This software is made in English language. The software provide different login facility for user such as public people, administrator. Different authorized person can login here to modify self portfolio & and can access their confidential data.User can also print, submit & get related information from their portfolio. Any extra technical skill is not require when any person want to handle this software. Only language and computer literacy is needed to understand that form column an d its related information. This software is made secured to user that no other person can modified your REFERENCES- * Object Oriented Modeling and Design with UML-Michael Blaha, James Rambaugh. * Software Engineering, Seventh Edition, Ian Sommerville. * IBM Red Books. * IBM www. ibm. in/developerworks . * Wikipedia www. wikipedia. org

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.