0% found this document useful (0 votes)
67 views6 pages

Enforcing Secure and Privacy Preserving Information Brokering System

This document is a project report submitted for the degree of Bachelor of Technology in Computer Science and Engineering. It proposes a system to enforce secure and privacy-preserving information brokering. The system would share the secure query routing function among a set of brokering servers while preserving privacy and with reasonable overhead. It first discusses existing systems and the proposed system. It then covers a literature survey, presents the proposed system and its requirements. The report details the system's modules, design including dataflow and UML diagrams, and implementation using .NET and SQL Server with sample code and screenshots. It concludes with future work possibilities and a bibliography.

Uploaded by

Avinash Avii
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
67 views6 pages

Enforcing Secure and Privacy Preserving Information Brokering System

This document is a project report submitted for the degree of Bachelor of Technology in Computer Science and Engineering. It proposes a system to enforce secure and privacy-preserving information brokering. The system would share the secure query routing function among a set of brokering servers while preserving privacy and with reasonable overhead. It first discusses existing systems and the proposed system. It then covers a literature survey, presents the proposed system and its requirements. The report details the system's modules, design including dataflow and UML diagrams, and implementation using .NET and SQL Server with sample code and screenshots. It concludes with future work possibilities and a bibliography.

Uploaded by

Avinash Avii
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

A Project Report on

ENFORCING SECURE AND PRIVACY PRESERVING


INFORMATION BROKERING SYSTEM
Submitted in Partial Fulfillment of requirements
For the award of the degree of
BACHELOR OF TECHNOLOGY
IN
COMPUTER SCIENCE & ENGINEERING

By
K.SRILATHA 13U31A0512
D.NAVEEN 13U31A0508
G.BIXAPATHI 13U31A0510
SK.SUHAIL ALI 12U31A0526
UNDER THE GUIDANCE
OF
Mrs. Y.PRAVEENA M. Tech
Associate Professor

Department Of Computer Science & Engineering


BOMMA INSTITUTE OF TECHNOLOGY & SCIENCE
(Approved by A.I.C.T.E, Affiliated to J.N.T.U, Hyderabad)
Allipuram, Khammam-507318, Telangana State.
2013-17
BOMMA INSTITUTE OF TECHNOLOGY & SCIENCE
(Approved by A.I.C.T.E, Affiliated to J.N.T.U, Hyderabad)
Allipuram, Khammam-507318, Telangana State.
Department Of Computer Science & Engineering

CERTIFICATE
This is to certify that the main project entitled “ENFORCING SECURE AND
PRIVACY PRESERVING INFORMATION BROKERING SYSTEM ” Is being
carried by
K.SRILATHA 13U31A0512
D.NAVEEN 13U31A0508
G.BIXAPATHI 13U31A0510
SK.SUHAIL ALI 13U31A0520
In partial fulfillment of the requirements for the award of the degree of Bachelor of
Technology in Computer Science & Engineering, BOMMA INSTITUTE OF
TECHNOLOGY AND SCIENCE to the JAWAHARLAL NEHRU
TECHNOLOGICAL UNIVERSITY HYDERABAD, is a record of bonafied work
carried out by her under my guidance and supervision.

INTERNAL GUIDE HEAD OF THE DEPARTMENT


Mrs. Y.PRAVEENA M. Tech Mr. V. REDYA JAVDAV M. Tech (Ph .D)
EXTERNAL EXAMINER

DECLARATION
We hereby declare that the Technical Report entitled “ENFORCING SECURE
AND PRIVACY PRESERVING INFORMATION BROKERING SYSTEM” is done
by us, submitted in partial fulfillment of the requirements for the award of the degree in
BACHELOR OF TECHNOLOGY in COMPUTER SCIENCE & ENGINEERING
for the year 2013-17.

DATE:

PLACE: KHAMMAM

K.SRILATHA 13U31A0512

D.NAVEEN 13U31A0508

G.BIXAPATHI 13U31A0510

SK.SUHAIL ALI 12U31A0526


ACKNOWLEDGEMENT
We render my thanks to Sri. BOMMA RAJESHWARA RAO , Chairman of
Bomma Group of Institutions, for his encouragement.

We thank and express my gratitude to Mr. V. REDYA JADAV, M. Tech,


(Ph.D), Head of the Department, for providing with both time and amenities to make
this project a success with in schedule.

We take unique privilege to express my thanks to Mrs. Y.PRAVEENA, M. Tech,


Internal Guide, for his valuable guidance and encouragement given to me throughout
this seminar.

We special thanks to our PARENTS.

We extend our thanks to all the people, who have helped me a lot directly or
indirectly in the completion of academic project.

ABSTRACT
To facilitate extensive collaborations, today’s organizations raise increasing
needs for information sharing via on-demand information access. Information
Brokering System (IBS) atop a peer-to-peer overlay has been proposed to support
information sharing among loosely federated data sources. It consists of diverse
data servers and brokering components, which help client queries to locate the
data servers. However, many existing IBSs adopt server side access control
deployment and honest assumptions on brokers, and shed little attention on
privacy of data and metadata stored and exchanged within the IBS.

In this article, we study the problem of privacy protection in information


brokering process. We first give a formal presentation of the threat models with a
focus on two attacks: attribute-correlation attack and inference attack. Then, we
propose a broker-coordinator overlay, a well as two schemes, automaton
segmentation scheme and query segment encryption scheme, to share the secure
query routing function among a set of brokering servers. With comprehensive
analysis on privacy, end to - end performance, and scalability, we show that the
proposed system can integrate security enforcement and query routing

While preserving system-wide privacy with reasonable overhead.

CONTENTS
CHAPTERS Page No.

1. INTRODUCTION 1
1.1Existing System 1
1.2Proposed System 1
2. LITERATURE SURVEY 2
2.1 Feasibility Study 3-4
3. PRESENT WORK
3.1 Proposed System 5
3.2 System Requirements Specification 5
4. MODULE DESCRIPTION
4.1 Modules 6
4.2 Module description 6
5. DESIGN
5.1 Introduction 7
5.2 Dataflow Diagram 7-14
5.3 UML diagram 14-19
6. IMPLEMENTATION 20
6.1 Features of .NET 20
6.2 The .NET Framework 21
6.3 Managed Code 21
6.4 The Class Library 22
6.5 Languages Supported by .NET 23
6.6 Constructors and Destructors 25
6.7 Garbage Collection 25
6.8 Multithreading 25
6.9 Features of Sql Server 26-27
7. RESULT ALONG WITH TEST CASES
7.1 Sample Code 28-34
7.2 Sample Screen Shots 35-40
7.3 Introduction to Software Testing 41-44
8. CONCLUSION 45
9. FUTURE WORK 46-47
10. BIBILIOGRAPHY 48-49

You might also like