Download abstract - Chennaisunday.com

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Cyber-security regulation wikipedia , lookup

Next-Generation Secure Computing Base wikipedia , lookup

Wireless security wikipedia , lookup

Information privacy law wikipedia , lookup

Unix security wikipedia , lookup

Trusted Computing wikipedia , lookup

Information security wikipedia , lookup

Computer security wikipedia , lookup

Access control wikipedia , lookup

Windows Update wikipedia , lookup

Computer and network surveillance wikipedia , lookup

Mobile security wikipedia , lookup

Security-focused operating system wikipedia , lookup

Authentication wikipedia , lookup

Security and safety features new to Windows Vista wikipedia , lookup

Electronic authentication wikipedia , lookup

3-D Secure wikipedia , lookup

Web of trust wikipedia , lookup

HTTPS wikipedia , lookup

Cybercrime countermeasures wikipedia , lookup

Certificate authority wikipedia , lookup

Transcript
ABSTRACT
We may want to keep sensitive information in a relational database
hidden from a user or group thereof. We characterize sensitive data
as the extensions of secrecy views. The database, before returning
the answers to a query posed by a restricted user, is updated to
make the secrecy views empty or a single tuple with null values.
Then, a query about any of those views returns no meaningful
information. Since the database is not supposed to be physically
changed for this purpose, the updates are only virtual, and also
minimal. Minimality makes sure that query answers, while being
privacy preserving, are also maximally informative. The virtual
updates are based on null values as used in the SQL standard. We
provide the semantics of secrecy views, virtual updates, and secret
answers to queries. The different instances resulting from the
virtually updates are specified as the models of a logic program with
stable model semantics, which becomes the basis for computation of
the secret answers.
MODULES:
1. Server Module
2. Null value Module
3. Authentication Module
4. User Module
5. Control query evaluation(CQE);
Server Module:
The applicant can select one of the following five processes: create
new certificate, activation of the certificate, update information, check status of
the certificate, and revoke the certificate. Fig. 4 shows the flowchart of creating a
new certificate process. As a first step the applicant requests to create new
certificate, the client computer sends this request to server. After that the server
will send the web-page "Authentication of the applicant identity" to the client
computer.
Null value Module:
This module is used to help the server to When a NULL is involved in a
comparison operation, the result is unknown. This logic has been adopted by the
SQL standard, and partially implemented in most common commercial DBMSs
(with some variations). As a result, the semantics of NULL in both the SQL
standard and the commercial DBMSs is not quite clear; in particular, for IC
satisfaction in the presence of NULL.
Authentication Module:
The most important security services are confidentiality, integrity,
authentication, and non-repudiation. When designing a communication system,
the security services of this system must be defined. The Public-Key
Infrastructure (PKI) is a technology that can meet these security services with
itstechniques
and standards. A PKI system works by having a Certificate
Authority (CA) for issuing public-key certificates. The aim of this work is to
design and implement a CA system that can create and assign public key
certificates. Hence, the system enables secure communication and proper
authentication.
User Module:
The applicant new submission is initially accepted by the CA
system, the system tells him/her to visit the same site after a period of time to
check if the request was accepted or rejected. Once the applicant is informed
through the "Activation of the Certificate" webpage about the acceptance of the
certificate request, the user can activate his/her certificate and use the assigned
private key. The "Update Information" process is activated when the applicant
wants to update some of his personnel information in the CA database.
control query evaluation (CQE):
Data privacy and access control in incomplete propositional databases has been
studied. They take a different approach, control query evaluation (CQE), to finegrained access control. It is policy-driven, and aims to ensure confidentiality on
the basis of a logical framework. A security policy specifies the facts that a
certain user is not allowed to access. Each query posed to the database by that
user is checked, as to whether the answers to it would allow the user to infer any
sensitive information.
Existing System:
The Internet provides an excellent vehicle for extending the scope of
communication and business. As all information sent to the Internet is basically
public, the need for security becomes critical. The most critical element of
security might be the ability to provide trust and confidence to transactions over
the Internet. To accommodate the scale of transactions across the Internet, some
of
the
few
technologies
that
can
accomplish
this
include
Public
Key
Infrastructure (PKI). PKI can be viewed as critical not only to the commercial
sector but also to the government sector. As a result, many aspects required for
successful PKI, such as insurance and legal aspects, have been greatly
improved. The Public-key system makes it possible for two parties to
communicate securely without either having to know or trust the other party.
However, this is only possible because a third party that both the other parties
trust identifies them, and certifies that their keys are genuine [1].
Proposed System:
They propose a secure and sound query evaluation algorithm in the
case of cell-level disclosure policies, which determine for each cell
whether the cell is allowed to be accessed or not. The algorithm is
based on query modification, into one that returns less information
than the original one. Those approaches propose query rewiring to
enforce fine-grained access control in databases.the database is not
supposed to be physically changed for this purpose, the updates are
only virtual, and also minimal. Minimality makes sure that query
answers,
while
being privacy
preserving, are
also
maximally
informative. The virtual updates are based on null values as used in
the SQL standard. We provide the semantics of secrecy views, virtual
updates, and secret answers to queries. The different instances
resulting from the virtually updates are specified as the models of a
logic program with stable model semantics, which becomes the basis
for computation of the secret answers.
the system.
Hardware Requirements:
•
System
: Pentium IV 2.4 GHz.
•
Hard Disk
: 40 GB.
•
Floppy Drive : 1.44 Mb.
•
Monitor
: 14’ Colour Monitor.
•
Mouse
: Optical Mouse.
•
Ram
: 512 Mb.
•
Keyboard
: 101 Keyboard.
Software Requirements:
•
Operating system
: Windows 7 and IIS
•
Coding Language
• Data Base
: ASP.Net 4.0 with C#
: SQL Server 2008.