Highly Confidential Security System

Highly Confidential Security System ABSTRACT- Due to busy life style we can’t remember all confidential data like All mail Id, Password, All bank account no. , Insurance policy no. , Pan card no. , Driving License no. , Passport no. ,All education certificate Numbers, Some highly valued scan copy, some confidential photos, music and videos. So we can develop highly security web application in which we can store all confidential data in single credentials. * HCSS keeps confidential data and provide high security. It reduce all Efforts of any user to remember all id’s ,passwords they have and facilitate to use single id and password. * In this system whenever any transaction takes place from their account they get informed through a text messages or E-mails. * This System provides Video locker, image locker, music locker, bank account information locker, mail id and password locker. * It keeps past logs and also need extra credential to delete these logs. By using the past logs a user can undo all its transactions. * System also provides Login mobile verification. This software is user friendly. Any literal person can handle the software for getting different form available on that software. This software is made in English language. * The software provide different login facility for user such as public people, administrator. Different authorized person can login here to modify self portfolio & and can access their confidential data. * Any extra technical skill is not require when any person want to handle this software. Only language and computer literacy is needed to understand that form column and its related information.
This software is made secured to user that no other person can modified your personal data. INTRODUCTION- The objective of HCSS is to provide a secure process & way to keep the users data more confidential and more secured. It provides a way that any public people can easily create their portfolio and keep their confidential data. And they can also access the data on a single click for that they need to cross a bridge which required only single credential. This project is useful for person as he/she easily store and retrieve their confidential data.
This reduces the cases of fraudulence in our country. The main goal of this project according to business point of view to make the life of the people easy by proving the system which will reduce the probability of being cheated by leakage of any confidential information. TECHNOLOGIES TO BE USED:-IBMRational Software Architect:- IBMRationalSoftwareArchitect(RSA)madebyIBM’sRationalSoftwaredivision,isacomprehensivemodelinganddevelopmentenvironmentthatusestheUnified ModelingLanguage(UML)fordesigningarchitecturefor C++andJava 2EnterpriseEdition (J2EE)

Applicationsandwebservices. RationalSoftwareArchitectisbuiltontheEclipseopen-sourcesoftware frameworkandincludescapabilitiesfocusedonarchitecturalcodeanalysis,C++,andmodel-driven development(MDD)withtheUMLfor creatingresilientapplicationsandwebservices. IBMWebsphereCommunity Edition:- WebSphereApplicationServerCommunityEdition(fromnowon WASCE)isafree,certifiedJava EE5applicationserverfor buildingandmanagingJava applications. Itis IBM’ssupporteddistributionofApacheGeronimothatusesTomcatfor servletcontainerandAxis2for webservices.
OtherdifferencefromApacheGeronimoisthat WASCEcomeswith DB2 andInformix databasedrivers,betterXMLparserlibraries(XML4JandXLXP)andcontainsthelatestpatchesfrom unreleasedupstreamversions. DB2 Express Cor DB2 UDB:- The name DB2 was first given to the Database Management System or DBMS in 1983 when IBM released DB2 on its MVSmainframe platform. Prior to this, a similar product was named SQL/DS on the VM platform. Prior to that in the mid 1970’s IBM released the QBE relational database product for the VM platform with a table-oriented “Query By Example” front-end which produced a linear-syntax language that was a recognizable precursor to QBE nd drove transactions to its relational database. Later the QMF feature of DB2 produced real SQL and brought the same “QBE” look and feel to DB2. The System 38 platform also contained a relational DBMS. System Relational, or System R, was a research prototype developed in the 1970s. DB2 has its roots back to the beginning of the 1970s when E. F. Codd, working for IBM, described the theory of relational databases and in June 1970 published the model for data manipulation. To apply the model Codd needed a relational database language he named Alpha.
At the time IBM didn’t believe in the potential of Codd’s ideas, leaving the implementation to a group of programmers not under Codd’s supervision, who violated several fundamentals of Codd’s relational model; the result was Structured English Query Language or SEQUEL. When IBM released its first relational database product, they wanted to have a commercial-quality sublanguage as well, so it overhauled SEQUEL and renamed the basically new language (System Query Language) SQL to differentiate it from SEQUEL.
IBM bought Metaphor Computer Systems to utilize their GUI interface and encapsulating SQL platform that had already been in use since the mid 80’s. Tivoli CDP /TSM/Tivoli Directory Server:- Designed to provide a data protection and recovery solution for mission-critical applications, in the data center or remote branch offices, for enterprises and small businesses. TSM FastBack can eliminate traditional backup windows by continuously capturing data changes at the block level, with minimal impact to the systems it helps protect.
Its policy-based approach to data protection allows administrators to improve recovery service levels, specifically Recovery Point Objectives (RPO) and Recovery Time Objectives (RTO) based on the needs of the individual application or data type. TSM FastBack also provides a near instant restore capability that enables applications to be up and running within minutes after data recovery is initiated, while data recovery is performed in the background. WHAT IT WILL DO:- Registration for users. User personal and confidential data will be encrypted. The encrypted data will be stored in atabase. Public key will be provided to the user at time of registration. Extraction of data n decryption. HOW IT WORKS:- Section 1provides the main page for index . Section 2 gives the interface of the software that is used by user. It gives what level of proficiency is expected of the user, constraints while making the software and assumptions and dependencies that are assumed. Section 3 after being used by user, it deliver all the requirements of the system. Functional requirement are given by various use cases. Some performance requirements and design constraints are also given.
It includes user interface, hardware interface, software interface and communication interface. Section 4 gives non functional requirement of feature. It includes the performance requirement of that software. It also contains safety requirement, security requirement, and software quality attribute. DIFFERENT MODULES:- User User can login and save and restore their confidential data using their public key. Along with this can seek help, file complaint and give feedback. Admin Admin has the authority to add/delete users, view complaints of user and takes necessary actions. Give response to their feedback and provide help.
Operations:- In HCSS the data entered by user is to be secured by encryption. The user can enter data of different types like image file, text document, PAN No, passwords, video document, etc. For this the algorithms used to encrypt them are RSA (Text Encryption) Algorithm used to keep the confidential data secure of the users is RSA. It is an encryption algorithm. It was developed by and named after Rivest, Shamir and Adleman of MIT in 1977. It is the best known and widely used public key scheme. The encryption done is based on exponentiation in a finite (Galois) field over integers modulo a prime.
Exponentiation takes O((log n)3) operations(easy). It uses large integers (eg. 1024 bits). It offers security due to cost of factoring large numbers. Factorization takes O(e log n log (log n))) operations (hard). This software is user friendly. Any literal person can handle the software for getting different form available on that software. This software is made in English language. The software provide different login facility for user such as public people, administrator. Different authorized person can login here to modify self portfolio & and can access their confidential data.
User can also print, submit & get related information from their portfolio. Any extra technical skill is not require when any person want to handle this software. Only language and computer literacy is needed to understand that form column and its related information. This software is made secured to user that no other person can modified your REFERENCES:- * Object Oriented Modeling and Design with UML-Michael Blaha, James Rambaugh. * Software Engineering, Seventh Edition, Ian Sommerville. * IBM Red Books. * IBM – www. ibm. in/developerworks . * Wikipedia – www. wikipedia. org

Don't use plagiarized sources. Get Your Custom Essay on
Highly Confidential Security System
Just from $13/Page
Order Essay
Order a unique copy of this paper
(550 words)

Approximate price: $22

Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

At Solution Essays, we are determined to deliver high-quality papers to our clients at a fair price. To ensure this happens effectively, we have developed 5 beneficial guarantees. This guarantees will ensure you enjoy using our website which is secure and easy to use.

Money-back guarantee

Most companies do not offer a money-back guarantee but with Solution Essays, it’s either a quality paper or your money back. Our customers are assured of high-quality papers and thus there are very rare cases of refund requests due to quality concern.

Read more

Zero-plagiarism guarantee

All our papers are written from scratch and according to your specific paper instructions. This minimizes any chance of plagiarism. The papers are also passed through a plagiarism-detecting software thus ruling out any chance of plagiarism.

Read more

Free-revision policy

We offer free revisions in all orders delivered as long as there is no alteration in the initial order instruction. We will revise your paper until you are fully satisfied with the order delivered to you.

Read more

Privacy policy

All data on our website is stored as per international data protection rules. This ensures that any personal data you share with us is stored safely. We never share your personal data with third parties without your consent.

Read more

Fair-cooperation guarantee

Ordering and sending money to us is an indication that you are purchasing our products and services. To have business talks laid out in the official language, you can check on our terms and conditions and get more information about this.

Read more

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Order your essay today and save 20% with the discount code: LEMONADEPlace Order
Live Chat+1(978) 822-0999EmailWhatsApp