SCDA PPT Presentation
SCDA PPT Presentation
SCDA PPT Presentation
P.PRIYA
II-M.Sc [COMPUTER SCIENCE]
The aim of this system is generate a policies based on the
similar polices that are in the repository thereby using
mining concepts.
We also introduce a secure administration concept based on
the key generation and message passing strategies.
Large scale network applications involves more number of users
accessing the application. Care should be involved to deny unauthorized
user access into the system.
Our proposed approach verifies and analyzes existing similar
applications and arrives at new policies by collaborating with the
previous one, to enforce security to the applications.
The existing category based method performs worse as it does not fully
represent the application functionalities. Also it requires internet for
policy configurations.
The proposed text mining methodology proves to be simpler and
stronger, as more information about the application is not leaked out. It
requires prior permission by a user to track application information, thus
helping the policy admin to form an effective rule based system.
Existing System
The proposed system also contains JTAM to protect the database from
malicious modifications made by a multiple administrators(DBA’s).
Every DBA has to accept the modification whichever had been done in
the database. Then only the database object can be changed.
This system take actions on the intruder based upon the actions of the
intruder in multiple level of authentication.
We can protect the data from multi hand administration
Architecture Diagram
Similar policies Policy1
Policy2
Policy N
Policy Policy
Decision point Enforcement
Policy point
Making
V
Policy 1 Refine
Policy 2 e Execute Policy
On the User
r
i
Policy N Policy
Store
Admin
f
Analyse y
6. Object Change
reflected in the
Server Object
server
2.Apply private change
and public key
Object
Admin1 1.Public key changed
generation
5. Apply public
3. Send SMS using and private key
SMTP
Policy
Policy access
Enforcemnet
Enforcemnet administrator
policy administrator
point
point policy
repository
policies
similar
Generate
repository
Policy
Policy
Decesion
Decesion Policy
Policyanalysis
analysis
point Policy
point Policyrefine
refine
Policy
Policyverify
verify
Modules
Login Module
Policy analysis
Policy refine
Policy refine
Object Modify Module.
Policy analysis techniques provide the means for assessing policy
options and recommending the preferred course of action to achieve
various organizational, political, social or economic goals. Analysis
also provides a way to examine existing policies with an eye toward
recommending modifications or improvements.
Any modification that are to made follows a procedure of
cryptographic key security. RSA is an algorithm for public-key
cryptography that is based on the presumed difficulty of factoring
large integers, the factoring problem has been used to do the
modification.
adminN
admin2 Modificati
admin2
on
Message
admin1 Private Key
Policy
Enforcement
Access Point
policy
policy
Administrator
repository
repository
policies
similar
Generate
Policy
Decision
point
Policy analysis
Policy refine
Policy refine
RSA is an algorithm for public-key cryptography that is based on the
presumed difficulty of factoring large integers, the factoring problem .
The modifier (admin) are supposed to pass the information with the key
to the other admin so as to inform and get permission for proceeding
with the modification.
In this module, usage of key has been evolved that act as a confirmation
key from all admin to modify the policy.
Using RSA Algorithm
Policy Genarate
Genarate ac
Policy c ep
Modification
Modification Public
Publickey
key t
ac
ce
pt
Access adminN
policy
policy Administrator
repository
repository Modificati admin2
admin2
on
Message
Private Key
admin1
The safety definition in CPA with a quantified method is
investigated.
Moreover, we will improve the permission model with finer-
grained access control for Android, especially, for
INTERNET permission.
Finally we will strengthen the mathematics depth of the
definitions and analysis of CPA.
A text mining and the category mining based similarity
measure method to obtain similar policies is proposed.
This is how the similar policies are fetched and based on that
the policies are created.
The policy administrations is done by generating keys and
get the approved of all the same policy holders before the
data is deleted or modified.
Thank you