Home » Highly Confidential Security System

Highly Confidential Security System

Highly Confidential Security System ABSTRACT- Due to busy life style we can’t remember all confidential data like All mail Id, Password, All bank account no. , Insurance policy no. , Pan card no. , Driving License no. , Passport no. ,All education certificate Numbers, Some highly valued scan copy, some confidential photos, music and videos. So we can develop highly security web application in which we can store all confidential data in single credentials. * HCSS keeps confidential data and provide high security. It reduce all Efforts of any user to remember all id’s ,passwords they have and facilitate to use single id and password. * In this system whenever any transaction takes place from their account they get informed through a text messages or E-mails. * This System provides Video locker, image locker, music locker, bank account information locker, mail id and password locker. * It keeps past logs and also need extra credential to delete these logs. By using the past logs a user can undo all its transactions. * System also provides Login mobile verification. This software is user friendly. Any literal person can handle the software for getting different form available on that software. This software is made in English language. * The software provide different login facility for user such as public people, administrator. Different authorized person can login here to modify self portfolio & and can access their confidential data. * Any extra technical skill is not require when any person want to handle this software. Only language and computer literacy is needed to understand that form column and its related information.
This software is made secured to user that no other person can modified your personal data. INTRODUCTION- The objective of HCSS is to provide a secure process & way to keep the users data more confidential and more secured. It provides a way that any public people can easily create their portfolio and keep their confidential data. And they can also access the data on a single click for that they need to cross a bridge which required only single credential. This project is useful for person as he/she easily store and retrieve their confidential data.
This reduces the cases of fraudulence in our country. The main goal of this project according to business point of view to make the life of the people easy by proving the system which will reduce the probability of being cheated by leakage of any confidential information. TECHNOLOGIES TO BE USED:-IBMRational Software Architect:- IBMRationalSoftwareArchitect(RSA)madebyIBM’sRationalSoftwaredivision,isacomprehensivemodelinganddevelopmentenvironmentthatusestheUnified ModelingLanguage(UML)fordesigningarchitecturefor C++andJava 2EnterpriseEdition (J2EE)

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Applicationsandwebservices. RationalSoftwareArchitectisbuiltontheEclipseopen-sourcesoftware frameworkandincludescapabilitiesfocusedonarchitecturalcodeanalysis,C++,andmodel-driven development(MDD)withtheUMLfor creatingresilientapplicationsandwebservices. IBMWebsphereCommunity Edition:- WebSphereApplicationServerCommunityEdition(fromnowon WASCE)isafree,certifiedJava EE5applicationserverfor buildingandmanagingJava applications. Itis IBM’ssupporteddistributionofApacheGeronimothatusesTomcatfor servletcontainerandAxis2for webservices.
OtherdifferencefromApacheGeronimoisthat WASCEcomeswith DB2 andInformix databasedrivers,betterXMLparserlibraries(XML4JandXLXP)andcontainsthelatestpatchesfrom unreleasedupstreamversions. DB2 Express Cor DB2 UDB:- The name DB2 was first given to the Database Management System or DBMS in 1983 when IBM released DB2 on its MVSmainframe platform. Prior to this, a similar product was named SQL/DS on the VM platform. Prior to that in the mid 1970’s IBM released the QBE relational database product for the VM platform with a table-oriented “Query By Example” front-end which produced a linear-syntax language that was a recognizable precursor to QBE nd drove transactions to its relational database. Later the QMF feature of DB2 produced real SQL and brought the same “QBE” look and feel to DB2. The System 38 platform also contained a relational DBMS. System Relational, or System R, was a research prototype developed in the 1970s. DB2 has its roots back to the beginning of the 1970s when E. F. Codd, working for IBM, described the theory of relational databases and in June 1970 published the model for data manipulation. To apply the model Codd needed a relational database language he named Alpha.
At the time IBM didn’t believe in the potential of Codd’s ideas, leaving the implementation to a group of programmers not under Codd’s supervision, who violated several fundamentals of Codd’s relational model; the result was Structured English Query Language or SEQUEL. When IBM released its first relational database product, they wanted to have a commercial-quality sublanguage as well, so it overhauled SEQUEL and renamed the basically new language (System Query Language) SQL to differentiate it from SEQUEL.
IBM bought Metaphor Computer Systems to utilize their GUI interface and encapsulating SQL platform that had already been in use since the mid 80’s. Tivoli CDP /TSM/Tivoli Directory Server:- Designed to provide a data protection and recovery solution for mission-critical applications, in the data center or remote branch offices, for enterprises and small businesses. TSM FastBack can eliminate traditional backup windows by continuously capturing data changes at the block level, with minimal impact to the systems it helps protect.
Its policy-based approach to data protection allows administrators to improve recovery service levels, specifically Recovery Point Objectives (RPO) and Recovery Time Objectives (RTO) based on the needs of the individual application or data type. TSM FastBack also provides a near instant restore capability that enables applications to be up and running within minutes after data recovery is initiated, while data recovery is performed in the background. WHAT IT WILL DO:- Registration for users. User personal and confidential data will be encrypted. The encrypted data will be stored in atabase. Public key will be provided to the user at time of registration. Extraction of data n decryption. HOW IT WORKS:- Section 1provides the main page for index . Section 2 gives the interface of the software that is used by user. It gives what level of proficiency is expected of the user, constraints while making the software and assumptions and dependencies that are assumed. Section 3 after being used by user, it deliver all the requirements of the system. Functional requirement are given by various use cases. Some performance requirements and design constraints are also given.
It includes user interface, hardware interface, software interface and communication interface. Section 4 gives non functional requirement of feature. It includes the performance requirement of that software. It also contains safety requirement, security requirement, and software quality attribute. DIFFERENT MODULES:- User User can login and save and restore their confidential data using their public key. Along with this can seek help, file complaint and give feedback. Admin Admin has the authority to add/delete users, view complaints of user and takes necessary actions. Give response to their feedback and provide help.
Operations:- In HCSS the data entered by user is to be secured by encryption. The user can enter data of different types like image file, text document, PAN No, passwords, video document, etc. For this the algorithms used to encrypt them are RSA (Text Encryption) Algorithm used to keep the confidential data secure of the users is RSA. It is an encryption algorithm. It was developed by and named after Rivest, Shamir and Adleman of MIT in 1977. It is the best known and widely used public key scheme. The encryption done is based on exponentiation in a finite (Galois) field over integers modulo a prime.
Exponentiation takes O((log n)3) operations(easy). It uses large integers (eg. 1024 bits). It offers security due to cost of factoring large numbers. Factorization takes O(e log n log (log n))) operations (hard). This software is user friendly. Any literal person can handle the software for getting different form available on that software. This software is made in English language. The software provide different login facility for user such as public people, administrator. Different authorized person can login here to modify self portfolio & and can access their confidential data.
User can also print, submit & get related information from their portfolio. Any extra technical skill is not require when any person want to handle this software. Only language and computer literacy is needed to understand that form column and its related information. This software is made secured to user that no other person can modified your REFERENCES:- * Object Oriented Modeling and Design with UML-Michael Blaha, James Rambaugh. * Software Engineering, Seventh Edition, Ian Sommerville. * IBM Red Books. * IBM – www. ibm. in/developerworks . * Wikipedia – www. wikipedia. org

Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more
Live Chat+1 763 309 4299EmailWhatsApp

We Can Handle your Online Class from as low as$100 per week