0% found this document useful (0 votes)
13 views10 pages

Sudha Project Front Sheet

The document discusses the growing concern of personal data security in data mining applications and introduces a new technique called Truthfulness Preserving Data Mining (TPDM) that enhances data confidentiality using encryption and signatures. The performance of TPDM was evaluated against existing models, showing lower computation and communication overheads. Additionally, the document includes a project report on 'Medical Data Updating and Computing Using Cloud' submitted for a Bachelor of Technology degree, detailing various aspects of the project including system design, testing, and performance evaluation.

Uploaded by

Sudha jiiva
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views10 pages

Sudha Project Front Sheet

The document discusses the growing concern of personal data security in data mining applications and introduces a new technique called Truthfulness Preserving Data Mining (TPDM) that enhances data confidentiality using encryption and signatures. The performance of TPDM was evaluated against existing models, showing lower computation and communication overheads. Additionally, the document includes a project report on 'Medical Data Updating and Computing Using Cloud' submitted for a Bachelor of Technology degree, detailing various aspects of the project including system design, testing, and performance evaluation.

Uploaded by

Sudha jiiva
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 10

ABSTRACT

Data mining applications have obtained massive growth in today's internet era. It
eventually leads to a serious threat to the security of an individual's personal and sensitive
information. Raw data of millions of users are collected by the service provider's through data
contributors and they are shared with the data consumers. Existing systems use Privacy
Preserving data mining(PPDM) which modifies the data without compromising the security of
the sensitive information contained in the data. In this paper, we have proposed a new technique
called Truthfulness Preserving Data Mining(TPDM) which is structured as encrypt-then-sign
fashion. It uses partial homomorphic encryption and identity-based signature that provides batch-
verification and data confidentiality. Performance of the model was evaluated using Yahoo!
Music rating dataset and 2009 RECS dataset. Performance measures show that TPDM incurs low
computation and communication overheads when compared to existing models.

KEYWORDS—Natural hazards, DisasterResponse, Drones, Clustering, Flood Monitoring,


classification.
Medical Data Updating And Computing Using Cloud

PROJECT REPORT (PHASE – II)

Submitted by

B. SUDHARSANAN [15TD0872]

R. THIRUKUMARAN [15TD0879]

T. ARUN KUMAR JOTHI [15TD0808]

Under the guidance of

Mr. A. Selvakumar, M.Tech,(Ph.D.)

Assistant Professor

In partial fulfillment for the requirements of the award of the degree of

BACHELOR OF TECHNOLOGY
IN
COMPUTER SCIENCE AND ENGINEERING

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING


CHRIST COLLEGE OF ENGINEERING AND TECHNOLOGY
PONDICHERRY UNIVERSITY
PONDICHERRY, INDIA
APRIL 2019
BONAFIDE CERTIFICATE

This is to certify that this project work titled, “ Medical Data Updating And Computing

Using Cloud” is a bonafide work done by B. SUDHARSANAN [15TD0872], R.


THIRUKUMARAN [15TD0879], T.ARUN KUMAR JOTHI [15TD0808] in partial
fulfillment for the award of the degree of Bachelor of Technology in Computer Science and
Engineering by the Pondicherry University during the academic year 2018-19, and that this
work has not been submitted for the award of any other degree of this university.

PROJECT GUIDE HEAD OF THE DEPARTMENT

Submitted for the University Examination held on _________________

INTERNAL EXAMINER EXTERNAL EXAMINER


ACKNOWLEDGEMENT

I find great pleasure in thanking our Chairman and Managing Director Dr. S. R. S. Paul,
M.E., Ph.D., for all his support and encouragement and for providing us with a better
environment for studying as well as to equip myself to the learning environment.

It gives me great ecstasy of pleasure to convey my deep and sincere thanks to our
Director Dr. A. Ravichandran, M.E., Ph.D., M.I.S.T.E., M.I.E., for having given permission
to take up this project and for his kind patronage.

I wish to extend my sincere gratitude to the Head of the Department of Computer Science
and Engineering and my guide, Dr. M. Senthil, M.E., Ph.D., M.I.S.T.E., Professor and Dean,
School of Computing who has always been a constant source of inspiration and encouragement
during the course.

I would like to express my heartfelt thanks to our Project Coordinator Mr. K. Kishore
Anthuvan, M.Tech., (Ph.D.), for his guidance and support from the starting of the project
without which I might not have been able to succeed in my work.

I thank all faculty members, supporting teaching and non-teaching staffs for the help they
extended in completing my project phase-II. I also express my sincere thanks to my family
members and all my friends for their continuous support.

Last but not least, as everything begins and ends in Almighty GOD, I conclude this
acknowledgement by thanking GOD for everything.

T.HUMAMAHESWARI

R.NIVEDHA

I.RAJALAKSHMI
TABLE OF CONTENTS

CHAPTER TITLE PAGE

NO. NO.

ABSTRACT i

LIST OF TABLES v

LIST OF FIGURES vi

1. INTRODUCTION
1.1 INTRODUCTION 1
1.3 SCOPE OF THE PROJECT 4

2. LITERATURE SURVEY 6
2.1 LITERATURE SURVEY

3. EXISTING SYSTEM 13

3.1 EXISTING SYSTEM 13


3.2 DRAWBACKS OF EXISTING SYSTEM 16
4 SYSTEM ANALYSIS AND DESIGN 18

4.1 PROPOSED SYSTEM 18


4.1.1 ADVANTAGES OF PROPOSED SYSTEM 18
4.2 SYSTEM ARCHIETECTURE 19
4.2.1 MODULE AND DESCRIPTION 22
4.3 UML DIAGRAM 24
4.3.1.1 USECASE DIAGRAM 24
4.3.1.2 DATAFLOW DIAGRAM 25

4.3.1.3 ACTIVITY DIAGRAM 27


4.3.1.4 SEQUENCE DIAGRAM 28
4.3.1.5 CLASS DIAGRAM 29

5. SOFTWARE AND HARDWARE

REQUIREMENTS 30

5.1 INRODUCTION 30
5.1.1 HARDWARE REQUIREMENTS 30
5.1.2 SOFTWARE REQUIREMENTS 30
5.2 TECHNOLOGY USED 30
5.1.3 JAVA 31
5.1.3.1 INTRODUCTION TO JAVA 31

5.1.3.2 WORKING OF JAVA 32


5.1.3.3 THE JAVA PLATFORM 32
5.1.3.4 APACHE TOMCAT SERVER 34

6 TESTING 36

6.1 TEST PROCEDURE 36


6.2 THE DATA AND OUTPUT 36

6.2.1 UNIT TESTING 36

6.2.2 FUNCTIONAL TESTING 37

6.2.3 PERFORMANCE TESTING 37

6.2.4 STRESS TESTING 37

6.2.5 STRUCTURE TESTING 37

6.2.6 INTEGRATION TESTING 38

6.3 TESTING TECHNIQUES 38

6.3.1 TESTING 38

6.3.1.2 WHITE BOX TESTING 39


6.3.1.3 BLACKBO X TESTING 39

6.4 SOFTWARE TESTING STRATEGIES 40

6.4.1 INTEGRATION TESTING 40

6.4.2 PROGRAM TESTING 40

6.4.3 SECURITY TESTING 40

6.4.4 VALIDATION TESTING 40

6.4.5 USER ACCEPTANCE TESTING 40

7. PERFORMANCE EVALUATION 42

7.1 EVALUATION

8. CONCLUSION 43
APPENDIX
REFERENCE
CODING

SCREENSHOT

LIST OF TABLE

TABLE NO. DESCRIPTION PAGE NO.

2.1 LITERATURE SURVEY 6


LIST OF FIGURES

FIGURE NO. FIGURE NAME PAGE NO.

1.1.A KNOWLEDGE DISCOVERY PROCESS 1

1.1.B FUNCTIONALITY OF DATA MINING 2

4.2.A SYSTEM ARCHIETECTURE 19

4.3.1 USECASE DIAGRAM 24

4.3.2 DATAFLOW DIAGRAM 25

4.3.3 ACTIVITY DIAGRAM 27

4.3.4 SEQUENCE DIAGRAM 28

4.3.5 CLASS DIAGRAM 29

5.3.1.3A JAVA BYTE CODES 33

5.3.1.3B JAVA PLATFORM 34


LIST OF ABBREVATIONS

JDK Java Development Toolkit

DEX Dalvik Executables

TCP Transmission Control Protocol

IP Internet Protocol

HTTP Hyper Text Transfer Protocol

ADT Android Development Tool

TPDM Truthfullness Privacy preservation in Data Market

PPDM Privacy Preservation in Data Market

KDD Knowledge Discovery Process

UML Unified Modeling Language

You might also like