* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download abstract - Chennaisunday.com
Cyber-security regulation wikipedia , lookup
Next-Generation Secure Computing Base wikipedia , lookup
Wireless security wikipedia , lookup
Information privacy law wikipedia , lookup
Unix security wikipedia , lookup
Trusted Computing wikipedia , lookup
Information security wikipedia , lookup
Computer security wikipedia , lookup
Access control wikipedia , lookup
Windows Update wikipedia , lookup
Computer and network surveillance wikipedia , lookup
Mobile security wikipedia , lookup
Security-focused operating system wikipedia , lookup
Authentication wikipedia , lookup
Security and safety features new to Windows Vista wikipedia , lookup
Electronic authentication wikipedia , lookup
Web of trust wikipedia , lookup
ABSTRACT We may want to keep sensitive information in a relational database hidden from a user or group thereof. We characterize sensitive data as the extensions of secrecy views. The database, before returning the answers to a query posed by a restricted user, is updated to make the secrecy views empty or a single tuple with null values. Then, a query about any of those views returns no meaningful information. Since the database is not supposed to be physically changed for this purpose, the updates are only virtual, and also minimal. Minimality makes sure that query answers, while being privacy preserving, are also maximally informative. The virtual updates are based on null values as used in the SQL standard. We provide the semantics of secrecy views, virtual updates, and secret answers to queries. The different instances resulting from the virtually updates are specified as the models of a logic program with stable model semantics, which becomes the basis for computation of the secret answers. MODULES: 1. Server Module 2. Null value Module 3. Authentication Module 4. User Module 5. Control query evaluation(CQE); Server Module: The applicant can select one of the following five processes: create new certificate, activation of the certificate, update information, check status of the certificate, and revoke the certificate. Fig. 4 shows the flowchart of creating a new certificate process. As a first step the applicant requests to create new certificate, the client computer sends this request to server. After that the server will send the web-page "Authentication of the applicant identity" to the client computer. Null value Module: This module is used to help the server to When a NULL is involved in a comparison operation, the result is unknown. This logic has been adopted by the SQL standard, and partially implemented in most common commercial DBMSs (with some variations). As a result, the semantics of NULL in both the SQL standard and the commercial DBMSs is not quite clear; in particular, for IC satisfaction in the presence of NULL. Authentication Module: The most important security services are confidentiality, integrity, authentication, and non-repudiation. When designing a communication system, the security services of this system must be defined. The Public-Key Infrastructure (PKI) is a technology that can meet these security services with itstechniques and standards. A PKI system works by having a Certificate Authority (CA) for issuing public-key certificates. The aim of this work is to design and implement a CA system that can create and assign public key certificates. Hence, the system enables secure communication and proper authentication. User Module: The applicant new submission is initially accepted by the CA system, the system tells him/her to visit the same site after a period of time to check if the request was accepted or rejected. Once the applicant is informed through the "Activation of the Certificate" webpage about the acceptance of the certificate request, the user can activate his/her certificate and use the assigned private key. The "Update Information" process is activated when the applicant wants to update some of his personnel information in the CA database. control query evaluation (CQE): Data privacy and access control in incomplete propositional databases has been studied. They take a different approach, control query evaluation (CQE), to finegrained access control. It is policy-driven, and aims to ensure confidentiality on the basis of a logical framework. A security policy specifies the facts that a certain user is not allowed to access. Each query posed to the database by that user is checked, as to whether the answers to it would allow the user to infer any sensitive information. Existing System: The Internet provides an excellent vehicle for extending the scope of communication and business. As all information sent to the Internet is basically public, the need for security becomes critical. The most critical element of security might be the ability to provide trust and confidence to transactions over the Internet. To accommodate the scale of transactions across the Internet, some of the few technologies that can accomplish this include Public Key Infrastructure (PKI). PKI can be viewed as critical not only to the commercial sector but also to the government sector. As a result, many aspects required for successful PKI, such as insurance and legal aspects, have been greatly improved. The Public-key system makes it possible for two parties to communicate securely without either having to know or trust the other party. However, this is only possible because a third party that both the other parties trust identifies them, and certifies that their keys are genuine [1]. Proposed System: They propose a secure and sound query evaluation algorithm in the case of cell-level disclosure policies, which determine for each cell whether the cell is allowed to be accessed or not. The algorithm is based on query modification, into one that returns less information than the original one. Those approaches propose query rewiring to enforce fine-grained access control in databases.the database is not supposed to be physically changed for this purpose, the updates are only virtual, and also minimal. Minimality makes sure that query answers, while being privacy preserving, are also maximally informative. The virtual updates are based on null values as used in the SQL standard. We provide the semantics of secrecy views, virtual updates, and secret answers to queries. The different instances resulting from the virtually updates are specified as the models of a logic program with stable model semantics, which becomes the basis for computation of the secret answers. the system. Hardware Requirements: • System : Pentium IV 2.4 GHz. • Hard Disk : 40 GB. • Floppy Drive : 1.44 Mb. • Monitor : 14’ Colour Monitor. • Mouse : Optical Mouse. • Ram : 512 Mb. • Keyboard : 101 Keyboard. Software Requirements: • Operating system : Windows 7 and IIS • Coding Language • Data Base : ASP.Net 4.0 with C# : SQL Server 2008.