SCDA PPT Presentation

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 20

Presented by

P.PRIYA
II-M.Sc [COMPUTER SCIENCE]
 The aim of this system is generate a policies based on the
similar polices that are in the repository thereby using
mining concepts.
 We also introduce a secure administration concept based on
the key generation and message passing strategies.
 Large scale network applications involves more number of users
accessing the application. Care should be involved to deny unauthorized
user access into the system.
 Our proposed approach verifies and analyzes existing similar
applications and arrives at new policies by collaborating with the
previous one, to enforce security to the applications.
 The existing category based method performs worse as it does not fully
represent the application functionalities. Also it requires internet for
policy configurations.
 The proposed text mining methodology proves to be simpler and
stronger, as more information about the application is not leaked out. It
requires prior permission by a user to track application information, thus
helping the policy admin to form an effective rule based system.
Existing System

 The system for Joint Threshold Administration is more complicated and


the data security between multiple admin is not that much efficient.
 We don’t have the system to get the permission from all the database users.
Standard database security mechanisms, such as access control,
authentication, and encryption, are not of much help when it comes to
preventing data theft from insiders.
 We can’t take actions on the intruder based on the actions of the intruder.
 The updation is not efficient in this system and we can retrieve the data
easily.
Proposed System

 The proposed system also contains JTAM to protect the database from
malicious modifications made by a multiple administrators(DBA’s).
 Every DBA has to accept the modification whichever had been done in
the database. Then only the database object can be changed.
 This system take actions on the intruder based upon the actions of the
intruder in multiple level of authentication.
 We can protect the data from multi hand administration
Architecture Diagram
Similar policies Policy1
Policy2
Policy N
Policy Policy
Decision point Enforcement
Policy point
Making
V
Policy 1 Refine
Policy 2 e Execute Policy
On the User
r
i
Policy N Policy
Store
Admin
f
Analyse y

6. Object Change
reflected in the
Server Object
server
2.Apply private change
and public key
Object
Admin1 1.Public key changed
generation

5. Apply public
3. Send SMS using and private key
SMTP

Admin2 4. Apply private key and


Show public Key
Requirements
Data
Genarate
flow diagram
acc
:
Genarate accep ept
publickey
publickey t adminN
Modificati
on admin2
admin2
Message
Policy
Policy Private Key
Modification
Modification
admin1

Policy
Policy access
Enforcemnet
Enforcemnet administrator
policy administrator
point
point policy
repository

policies
similar
Generate
repository
Policy
Policy
Decesion
Decesion Policy
Policyanalysis
analysis
point Policy
point Policyrefine
refine
Policy
Policyverify
verify
Modules

 Login Module

 Policy define Admin Module .

 Profile Load Module (High Profile, Medium Profile, Low


Profile modules). 
 Policy view Admin Module. 

 Object Modify Module.

 Key Apply Module.


Login Module:
Authentication is the process of determining whether someone or
something is, in fact, who or what it is declared to be. In private and
public computer networks (including the Internet), authentication is
commonly done through the use of logon passwords.
Knowledge of the password is assumed to guarantee that the user is
authentic. Each user registers initially using an assigned or self-declared
password.
 On each subsequent use, the user must know and use the previously
declared password
In this module authentication by means of username and password
credentials are evolved in order to make a secure entry to the system.
An registered user can login into the system through this module.
Authentication
Access
administrator policy
policy
administrator
repository
repository
access
policy
policy
Administrator repository
repository
Generate similar
policies

Policy analysis
Policy refine
Policy refine
Object Modify Module.
Policy analysis techniques provide the means for assessing policy
options and recommending the preferred course of action to achieve
various organizational, political, social or economic goals. Analysis
also provides a way to examine existing policies with an eye toward
recommending modifications or improvements.
Any modification that are to made follows a procedure of
cryptographic key security. RSA is an algorithm for public-key
cryptography that is based on the presumed difficulty of factoring
large integers, the factoring problem has been used to do the
modification.
adminN
admin2 Modificati
admin2
on
Message
admin1 Private Key

Policy
Enforcement
Access Point
policy
policy
Administrator
repository
repository
policies
similar
Generate

Policy
Decision
point
Policy analysis
Policy refine
Policy refine
 RSA is an algorithm for public-key cryptography that is based on the
presumed difficulty of factoring large integers, the factoring problem .
 The modifier (admin) are supposed to pass the information with the key
to the other admin so as to inform and get permission for proceeding
with the modification.
 In this module, usage of key has been evolved that act as a confirmation
key from all admin to modify the policy.
Using RSA Algorithm

Policy Genarate
Genarate ac
Policy c ep
Modification
Modification Public
Publickey
key t
ac
ce
pt

Access adminN
policy
policy Administrator
repository
repository Modificati admin2
admin2
on
Message
Private Key

admin1
 The safety definition in CPA with a quantified method is
investigated.
 Moreover, we will improve the permission model with finer-
grained access control for Android, especially, for
INTERNET permission.
 Finally we will strengthen the mathematics depth of the
definitions and analysis of CPA.
 A text mining and the category mining based similarity
measure method to obtain similar policies is proposed.
 This is how the similar policies are fetched and based on that
the policies are created.
 The policy administrations is done by generating keys and
get the approved of all the same policy holders before the
data is deleted or modified.
Thank you

You might also like