Professional Documents
Culture Documents
TABLE OF CONTENTS
CHAPTER NO. TITLE
PAGE NO.
ABSTRACT (ENGLISH)
LIST OF FIGURES
LIST OF ABBREVIATIONS
1
INTRODUCTION
1.1 Role Based Access Control and Privacy Definitions
1.2 Access Control for Relational Data
1.3 Predicate Evaluation and Imprecision
1.4 Top down Selection Mondrian
LITERATURE SURVEY
2.1 Database Security Concepts and Challenges
2.2 Protecting Respondents Identities in Microdata
2.3 Privacy-Preserving Data Publishing
2.4 L-Diversity: Privacy Beyond k-anonymity
2.5 Workload-Aware Anonymization Techniques
2.6 K-Anonymization as Spatial Indexing
SYSTEM ORGANIZATION
3.1 System Architecture Design
3.2 Feature Extraction
SYSTEM ANALYSIS
4.1 Existing System
4.2 Proposed System
REQUIREMENT SPECIFICATION
5.1 System Requirements
5.1.1 Hardware Required
5.1.2 Software Required
5.2 MICROSOFT.NET FRAMEWORK
IMPLEMENTATION RESULT
6.1 Coding
6.2 Screen Shots
CONCLUSION
REFERENCES
CHAPTER 1
INTRODUCTION
query region, all tuples in the equivalence class are part of the query result.
Uncertainty in query evaluation arises when a partition overlaps the query
region but is not fully enclosed. In this case, there can be many possible
semantics. We discuss the following three choices:
1. Uniform. Assuming the uniform distribution of tuples in the overlapping
partitions, include tuples from all partitions according to the ratio of overlap
between the query and the partition. Query evaluation under this option might
under-count or overcount the query result depending upon the original
distribution of tuples in the partition region. Most of the literature uses this
uniform distribution semantics to compare anonymity techniques over selection
tasks. However, the choice of the sensitive attribute value for the selected tuples
from an overlapping partition is not defined under uniform semantics. For
access control, a tuples QI attribute values along with the sensitive attribute
value need to be returned.
2. Overlap. Include all tuples in all partitions that overlap the query region. This
option will add false positives to the original query result.
3. Enclosed. Discard all tuples in all partitions that partially overlap the query
region. This option will have false negatives with respect to the original query
result.
1.4. TOP DOWN SELECTION MONDRIAN
Top Down Selection Mondrian (TDSM) algorithm is proposed by LeFevre
et al. for a given query workload. This is the current state of the art for
queryworkload- based anonymization. The objective of TDSM is to minimize the
total imprecision for all queries while the imprecision bounds for queries have not
been considered. The anonymization for a given query workload with imprecision
bounds has not investigated before to the best of our knowledge. We compare our
results with DSM in the experiments section. The algorithm presented in is similar
to the kd-tree construction.TDSM starts with the whole tuple space as one partition
and then partitions are recursively divided till the time new partitions meet the
privacy requirement. To divide a partition, two decisions need to be made, i)
Choosing a split value along each dimension, and ii) Choosing a dimension along
which to split. In the TDSM algorithm the split value is chosen along the median
and then the dimension is selected along which the sum of imprecision for all
queries is minimum. The time complexity of TDSM has not been reported in and is
OdjQjnlgn, where d is the number of dimensions of a tuple, Q is the
CHAPTER 2
LITERATURE SURVEY
Literature survey is the most important step in software development
process. Before developing the tool it is necessary to determine the time factor,
economy and company strength. Once these things are satisfied, then the next step
is to determine which operating system and language can be used for developing
the tool. Once the programmers start building the tool the programmers need lot of
external support. This support can be obtained from senior programmers, from
book or from websites. Before building the system the above consideration are
taken into account for developing the proposed system.
The major part of the project development sector considers and fully survey
all the required needs for developing the project. For every project Literature
survey is the most important sector in software development process. Before
developing the tools and the associated designing it is necessary to determine and
survey the time factor, resource requirement, man power, economy, and company
strength. Once these things are satisfied and fully surveyed, then the next step is to
determine about the software specifications in the respective system such as what
type of operating system the project would require, and what are all the necessary
software are needed to proceed with the next step such as developing the tools, and
the associated operations.
2.1
DATABASE
SECURITY-CONCEPTS,
APPROACHES,
CHALLENGES - E. BERTINO AND R. SANDHU - 2005
AND
tailored to database systems must be adopted. In this respect, over the years the
database security community has developed a number of different techniques and
approaches to assure data confidentiality, integrity, and availability. However,
despite such advances, the database security area faces several new challenges.
Factors such as the evolution of security concerns, the "disintermediation of
access to data, new computing paradigms and applications, such as grid-based
computing and on-demand business, have introduced both new security
requirements and new contexts in which to apply and possibly extend current
approaches. In this paper, we first survey the most relevant concepts underlying the
notion of database security and summarize the most well-known techniques. We
focus on access control systems, on which a large body of research has been
devoted, and describe the key access control models, namely, the discretionary and
mandatory access control models, and the role-based access control (RBAC)
model. We also discuss security for advanced data management systems, and cover
topics such as access control for XML. We then discuss current challenges for
database security and some preliminary approaches that address some of these
challenges.
2.2 PROTECTING RESPONDENTS IDENTITIES IN MICRODATA
RELEASE - P. SAMARATI - 2005
Today's globally networked society places great demand on the
dissemination and sharing of information. While in the past released information
was mostly in tabular and statistical form, many situations call today for the release
of specific data (microdata). In order to protect the anonymity of the entities
(called respondents) to which information refers, data holders often remove or
encrypt explicit identifiers such as names, addresses, and phone numbers.
Deidentifying data, however, provides no guarantee of anonymity. Released
information often contains other data, such as race, birth date, sex, and ZIP code,
that can be linked to publicly available information to reidentify respondents and
inferring information that was not intended for disclosure. In this paper we address
the problem of releasing microdata while safeguarding the anonymity of the
respondents to which the data refer. The approach is based on the definition of kanonymity. A table provides k-anonymity if attempts to link explicitly identifying
information to its content map the information to at least k entities. We illustrate
how k-anonymity can be provided without compromising the integrity (or
K-ANONYMITY
A.
FOR
Finally, we show that the anonymizations generated by the R-tree approach do not
sacrifice quality in their search for efficiency; in fact, by several previously
proposed quality metrics, the compact partitioning properties of R-trees generate
anonymizations superior to those generated by previously proposed anonymization
algorithms.
CHAPTER 3
SYSTEM ARCHITECTURE DESIGN
Admin
View
View Receivers
Senders
Sender
Select
the
Receiver
Send
Processing
Decryption
for
Verify the Receiver mail-id
toKey
Send
Message
Decryption
to
Receiver
Key
STOP
to Send
Message
Encrypt
the
Message to
Receiver
Message
View
Receive
Message
Message
and
Received
Decrypted
Enter Decryption
Decrypt
Message
Valid
Invalid
Block the Message
to Decrypt
CHAPTER 4
SYSTEM ANALYSIS
4.1. EXISTING SYSTEM
Organizations collect and analyze consumer data to improve their services.
Access Control Mechanisms (ACM) are used to ensure that only authorized
information is available to users. However, sensitive information can still be
misused by authorized users to compromise the privacy of consumers. The concept
CHAPTER 5
REQUIREMENT SPECIFICATION
5.1 System Requirements
5.1.1 Hardware Requirements
System
Hard Disk
: 40 GB
Floppy Drive
: 1.44 Mb
Monitor
: 15 VGA Colour
Mouse
: Logitech
Ram
: 512 Mb
: Windows XP
Technology Used
: Microsoft .NET
Backend Used
: SQL Server
runtime, which enables types in one language to interoperate with types in another
language, including cross-language exception handling. As well as ensuring that
types are only used in appropriate ways, the runtime also ensures that code doesnt
attempt to access memory that hasnt been allocated to it.
Common Language Specification
The CLR provides built-in support for language interoperability. To ensure
that you can develop managed code that can be fully used by developers using any
programming language, a set of language features and rules for using them called
the Common Language Specification (CLS) has been defined. Components that
follow these rules and expose only CLS features are considered CLS-compliant.
THE CLASS LIBRARY
.NET provides a single-rooted hierarchy of classes, containing over
7000 types. The root of the namespace is called System; this contains basic types
like Byte, Double, Boolean, and String, as well as Object. All objects derive from
System. Object. As well as objects, there are value types. Value types can be
allocated on the stack, which can provide useful flexibility. There are also efficient
means of converting value types to object types if and when necessary.
The set of classes is pretty comprehensive, providing collections, file,
screen, and network I/O, threading, and so on, as well as XML and database
connectivity.
The class library is subdivided into a number of sets (or namespaces),
each providing distinct areas of functionality, with dependencies between the
namespaces kept to a minimum.
LANGUAGES SUPPORTED BY .NET
Visual Basic .NET has been updated to include many new and
improved language features that make it a powerful object-oriented programming
language. These features include inheritance, interfaces, and overloading, among
others. Visual Basic also now supports structured exception handling, custom
attributes and also supports multi-threading.
Visual Basic .NET is also CLS compliant, which means that any CLScompliant language can use the classes, objects, and components you create in
Visual Basic .NET.
Managed Extensions for C++ and attributed programming are just
some of the enhancements made to the C++ language. Managed Extensions
simplify the task of migrating existing C++ applications to the new .NET
Framework.
C# is Microsofts new language. Its a C-style language that is
essentially C++ for Rapid Application Development. Unlike other languages, its
specification is just the grammar of the language. It has no standard library of its
own, and instead has been designed with the intention of using the .NET libraries
as its own.
Microsoft Visual J# .NET provides the easiest transition for Javalanguage developers into the world of XML Web Services and dramatically
improves the interoperability of Java-language programs with existing software
written in a variety of other programming languages.
Active State has created Visual Perl and Visual Python, which
enable .NET-aware applications to be built in either Perl or Python. Both products
can be integrated into the Visual Studio .NET environment. Visual Perl includes
support for Active States Perl Dev Kit.
Other languages for which .NET compilers are available include
FORTRAN
COBOL
Eiffel
ASP.NET
XML
Windows Forms
WEB
SERVICES
Base Class Libraries
Common Language Runtime
Operating System
GARBAGE COLLECTION
Garbage Collection is another new feature in C#.NET. The .NET Framework
monitors allocated resources, such as objects and variables. In addition, the
.NET Framework automatically releases memory for reuse by destroying
objects that are no longer in use. In C#.NET, the garbage collector checks for
the objects that are not currently in use by applications. When the garbage
collector comes across an object that is marked for garbage collection, it
releases the memory occupied by the object.
OVERLOADING
Overloading is another feature in C#. Overloading enables us to define
multiple procedures with the same name, where each procedure has a different
set of arguments. Besides using overloading for procedures, we can use it for
constructors and properties in a class.
MULTITHREADING:
C#.NET also supports multithreading. An application that supports
multithreading can handle multiple tasks simultaneously, we can use
multithreading to decrease the time taken by an application to respond to user
interaction.
STRUCTURED EXCEPTION HANDLING
C#.NET supports structured handling, which enables us to detect and
remove errors at runtime. In C#.NET, we need to use TryCatchFinally
statements to create exception handlers. Using TryCatchFinally statements,
we can create robust and effective exception handlers to improve the
performance of our application.
CHAPTER 6
IMPLEMENTATION AND RESULTS
6.1 CODING
REGISTRATION
Imports System.Data.SqlClient
Partial Class Register
Inherits System.Web.UI.Page
Dim S As String = ""
Dim Ws As New CodeClass
Protected Sub Page_Load(ByVal sender As Object, ByVal e As
System.EventArgs) Handles Me.Load
If Page.IsPostBack = False Then
Clear()
P1.Visible = True
P2.Visible = False
P3.Visible = False
End If
End Sub
Protected Sub CmdSubmit_Click(ByVal sender As Object, ByVal e As
System.EventArgs) Handles CmdSubmit.Click
Dim Str As String = ""
If Trim(TxtName.Text) = "" Then
Str += "Enter Name\n"
End If
If Trim(TxtMail.Text) = "" Then
Str += "Enter Mail-ID\n"
End If
If Trim(TxtMobile.Text) = "" Then
Str += "Enter Mobile Number\n"
End If
If Val(TxtAge.Text) <= 0 Then
Str += "Enter Age\n"
End If
If Trim(TxtDOB.Text) = "" Then
Str += "Enter Date Of Birth\n"
End If
If Trim(TxtCity.Text) = "" Then
Str += "Enter City\n"
End If
If Trim(TxtState.Text) = "" Then
Str += "Enter State\n"
End If
If Trim(TxtCntry.Text) = "" Then
Str += "Enter Country\n"
End If
Dim Cn As New SqlConnection(Ws.Con)
Cn.Open()
Dim Cmd As SqlCommand
S = "Select Mail From Register Where Mail=@Ml"
Cmd = New SqlCommand(S, Cn)
Cmd.Parameters.Add(New SqlParameter("@Ml", TxtMail.Text))
If Convert.ToString(Cmd.ExecuteScalar) = TxtMail.Text Then
Str += "Mail-ID Already Exist...\n"
End If
Cmd.Dispose()
Cmd.Parameters.Clear()
ClientScript.RegisterStartupScript(Me.GetType(), "myalert",
"alert('Invalid Security Code');", True)
End If
End Sub
End Class
SEND MESSAGE
Imports System.Data.SqlClient
Imports Microsoft.Office.Interop
Partial Class ShareResources
Inherits System.Web.UI.Page
Dim Ws As New CodeClass
Dim S As String = ""
Dim a As String = ""
End If
If Trim(TxtSubject.Text) = "" Then
Str += "Enter Subject\n"
End If
If Trim(TxtDesc.Text) = "" Then
Str += "Enter Description\n"
End If
If FileUpload1.FileName.ToString() = "" Then
Str += "Select Attachment\n"
End If
Ext = System.IO.Path.GetExtension(FileUpload1.PostedFile.FileName)
If Ext <> ".txt" And Ext <> ".doc" And Ext <> ".docx" Then
Str += "Invalid File Format\n"
End If
If Trim(Str) <> "" Then
ClientScript.RegisterStartupScript(Me.GetType(), "myalert",
"alert('" & Str & "');", True)
Exit Sub
End If
Dim Cn As New SqlConnection(Ws.Con)
Cn.Open()
Dim Cmd As SqlCommand
Dim Subj As String = ""
Dim Descr As String = ""
Dim FileContent As String = ""
Subj = Ws.Encrypt(UCase(TxtSubject.Text))
Descr = Ws.Encrypt(TxtDesc.Text)
Dim FilePath As String = Request.PhysicalApplicationPath + "Uploads/"
+ System.IO.Path.GetFileName(FileUpload1.FileName)
FileUpload1.SaveAs(FilePath)
Dim filebytes As Byte() = New
Byte(FileUpload1.PostedFile.InputStream.Length - 1) {}
FileUpload1.PostedFile.InputStream.Read(filebytes, 0,
filebytes.Length)
Dim filesiz As String = CSng(FileUpload1.PostedFile.ContentLength) /
1024
Dim splitfilesize As String = Convert.ToString(filesiz)
Dim binary1 As String = ""
For i As Integer = 0 To splitfilesize.Length - 1
Dim c As Char = splitfilesize(i)
Dim binary As String = c
binary1 = binary1 & binary
Next
Dim Src As String = ""
If Ext = ".txt" Then
Dim tr As IO.TextReader = New IO.StreamReader(FilePath)
Src = tr.ReadToEnd
tr.Close()
ElseIf Ext = ".doc" Or Ext = ".docx" Then
Dim word As New Microsoft.Office.Interop.Word.Document
pos = l + 2
Loop
Return strText
End Function
VIEW MESSAGES
Imports System.Data.SqlClient
Imports System.Data
Partial Class ViewSharedResources
Inherits System.Web.UI.Page
Dim
Dim
Dim
Dim
S As String = ""
Ws As New CodeClass
a As String = ""
EmpID As Long = 0
DG.Rows(i).Cells(0).Text = dt.Rows(i).Item(0).ToString()
DG.Rows(i).Cells(1).Text = dt.Rows(i).Item(1).ToString()
DG.Rows(i).Cells(2).Text = dt.Rows(i).Item(2).ToString()
DG.Rows(i).Cells(3).Text = dt.Rows(i).Item(3).ToString()
DG.Rows(i).Cells(4).Text = dt.Rows(i).Item(4).ToString()
DG.Rows(i).Cells(5).Text = dt.Rows(i).Item(5).ToString()
DG.Rows(i).Cells(6).Text = dt.Rows(i).Item(6).ToString()
DG.Rows(i).Cells(7).Text = "<a href='" &
dt.Rows(i).Item(7).ToString() & "' target='sds' Style='textdecoration:none;'><font color='red'>View</font></a>"
Next
DG.Columns(0).Visible = False
DG.Columns(2).Visible = False
Cn.Close()
End Sub
End Class
6.2.2 Registration
CHAPTER 7
CONCLUSION
An accuracy-constrained privacy-preserving access control framework for
relational data has been proposed. The framework is a combination of access
control and privacy protection mechanisms. The access control mechanism allows
only authorized query predicates on sensitive data. The privacy preserving module
CHAPTER 8
REFERENCES
[1] E. Bertino and R. Sandhu, Database Security-Concepts, Approaches, and
Challenges, IEEE Trans. Dependable and Secure Computing, vol. 2, no. 1, pp. 219, Jan.-Mar. 2005.