ENHANCING PRIVACY AND AUTHORIZATION CONTROL SCALABILITY IN THE GRID THROUGH ONTOLOGIE
#1

ENHANCING PRIVACY AND AUTHORIZATION CONTROL SCALABILITY IN THE GRID THROUGH ONTOLOGIES--INFORMATION TECHNOLOGY IN BIOMEDICINE

The use of data Grids for sharing relevant data has proven to be successful in many research disciplines. However, the use of these environments when personal data are involved (such as in health) is reduced due to its lack of trust. There are many approaches that provide encrypted storages and key shares to prevent the access from unauthorized users. However, these approaches are additional layers that should be managed along with the authorization policies. We present in this paper a privacy-enhancing technique that uses encryption and relates to the structure of the data and their organizations, providing a natural way to propagate authorization and also a framework that fits with many use cases. The paper describes the architecture and processes, and also shows results obtained in a medical imaging platform.

Technology to use:JAVA
Reply
#2
[attachment=3091]


Enhancing Privacy and Authorization Control Scalability in the Grid Through Ontology

Data Security and Privacy
Authorization through Virtual Organization
Grid Service through Ontology
DES Algorithm used for encryption and decryption of data

Objectives

To propose an on-the-fly cryptographic infrastructure to protect privacy from users with administrative privileges.
To provide a flexible architecture for organizing key management for long-term storage of encrypted data.
To propose a model applicable in different environments, compatible with current Grid middleware.
To provide an access control mechanism for encryption keys based on ontological groups and roles.


Security Model
Grid Architecture
Grid Security Infrastructure
VO Management and Ontology
Information Object Storage
Encryption and Decryption of Data

Access control relation among ontology-VO groups”information objects storage
Storage and Management Of Encrypted Data
Reconstruction of the decryption key
Reply
#3
Hi can any buddy help me to find report and ppt of the project topic Enhancing Privacy and Authorization Control
Scalability in the Grid Through Ontologies...........if u have the document plz mail it to my e-id vignesh.prabhu20[at]gmail.com
Hi, can u help me to find report and ppt of the project topic:: Enhancing Privacy and Authorization Control Scalability in the Grid Through Ontologies...........if u have the document plz mail it to my e-id vignesh.prabhu20[at]gmail.com
Reply
#4
Hi,do u have report of the project topic:: Enhancing Privacy and Authorization Control Scalability in the Grid Through Ontologies...........if u have the document plz mail it to my e-id vignesh.prabhu20[at]gmail.com
Reply
#5
Hi,
the ppt of this topic is posted in the second post of this thread. The full report pdf is available in ieee xplore:
http://ieeexplore.ieeeXplore/login.jsp?r...ision=-203

you will have to login to the ieee xplore site using your institution's subscription or probably of your friend.
Reply
#6
hi,

I'm doing M.Sc, and doing Project in this topic. If you have document pls send it to my email - id (srivenkatraman02[at]gmail.com). Thank you...
Reply
#7
hi
previous page containing a ppt file. please download it
Reply
#8
hi,
Can you please send the report of the project"ENHANCING PRIVACY AND AUTHORIZATION CONTROL SCALABILITY IN THE GRID THROUGH ONTOLOGIES" to sekar.s32[at]gmail.com if you have....
Reply
#9
Hi have a look on this report n if any changes plz update it....Smile
Reply
#10
hi,
Can you please send the implementation of the project"ENHANCING PRIVACY AND AUTHORIZATION CONTROL SCALABILITY IN THE GRID THROUGH ONTOLOGIES" to sekar.s32[at]gmail.com if you have....


Reply
#11
hi,
Can you please send the implementation of the project"ENHANCING PRIVACY AND AUTHORIZATION CONTROL SCALABILITY IN THE GRID THROUGH ONTOLOGIES" to sekar.s32[at]gmail.com if you have....
Reply
#12
hi
you can refer this page to get the details on enhancing privacy and authorisation control scalability in grid through ontologies


http://studentbank.in/report-enhancing-p...-ontologie
Reply
#13

[attachment=15448]
Enhancing Privacy and Authorization Control Scalability in the Grid through Ontologies
Objective and Scope:

In this paper a privacy-enhancing technique that uses encryption and relates to the structure of the data and their organizations, providing a natural way to propagate
authorization and also a framework that fits with many use cases is discussed.
In this paper a privacy-enhancing technique that uses encryption and relates to the structure of the data and their organizations, providing a natural way to propagate authorization and also a framework that fits with many use cases is discussed.
Data Grid depends on a set of widely distributed and untrusted storage nodes, therefore offering no guarantees about neither availability nor protection to the stored data
We propose a cryptographic protocol able to fulfill the storage security requirements related with a generic Desktop Data Grid scenario, which were identified after applying an analysis framework extended from our previous research on the Data Grid’s storage services.
Theoretical Background:
EXISTING SYSTEM:

One of the challenges for biomedical application is to provide efficient high-level interfaces, depending on the applications that enable access to Grids for nonexperts, ensuring transparent access to medical resources through services compatible with medical practice. As part of the interfaces, a flexible architecture for the management of the privacy of data is needed, compatible with medical practice and with preexisting Grid security systems are complex enough to be considered an obstacle in the successful Grid adoption.
Proposed System:
1) To propose an on-the-fly cryptographic infrastructure to protect privacy from users with administrative privileges.
2) To provide a flexible architecture for organizing key management for long-term storage of encrypted data.
3) To propose a model applicable in different environments, Compatible with current Grid middleware’s.
4) To provide an access control mechanism for encryption keys based on ontological groups and roles.
Definition of problem:
In existing there is no absolute protection guarantee for stored data .
Compatibility with various fields is not possible.
The nonexpert users are unable to use the interfaces.
The key Management is also a problem.
System Requirements:
Problem formulation:

User Login checking for authorization process. To avoid unauthorized person.
Applying Cryptography concept with DES Algorithm to solve Encryption and Decryption concept.
File Storage using Virtual Organization (VO) to choose lot of clients to avoid interruption process.
System Architecture:
Use case:
CLASS DIAGRAM:
Data Flow Diagram:
Modules:
GROUP CONSTRUCTION

FILE ENCRYPTION AND DECRYPTION
KEY DISTRIBUTION
VIRTUAL ORGANIZATION
GROUP CONSTRUCTION
Grid user must signup before login to give his\her details, the servers performing all the authentication and authorization processes for involved entities (users and resources). Based on the signup details user must use both username and password to login. User’s information is stored in database side to maintain separate server. User without login they can’t access any information for any sort of service every login information must protect by the data server as well as authentication. This process is maintained by grid service
FILE ENCRYPTION AND DECRYPTION
Encryption is the manipulation of data, based on a password (also known as a key), for security purposes. Once your data has been encrypted, a person can not make sense of your data without knowing the password.
Encryption  is a  process of coding information which could either be a file or  mail message  in into text  a form unreadable without a decoding key in order to prevent anyone except the intended recipient from reading that data.
Decryption is the reverse process of converting encoded data to its original un-encoded form, plaintext.
The most widely used symmetric key cryptographic method is the Advanced Encryption Standard (AES) is used in this process.
The algorithm is best suited to implementation in hardware, probably to discourage implementations in software, which tend to be slow by comparison.
AES is the most widely used symmetric algorithm in the world, despite claims that the key length is too short.(128 bits)
The two components required to encrypt data are an algorithm and a key.
KEY DISTRIBUTION  
The file is send to decryption process to get original file.
File system are usually managed in units called blocks or clusters.
When a file system is created, there is free space to store file blocks together contiguously. This allows for rapid sequential file reads and writes.
AES is the most widely used symmetric algorithm in the world, despite claims that the key length is too short. Ever since AES was first announced, controversy has raged about whether 128 bits is long enough to guarantee security. Key Distribution maintain the process to share the key from authorized users which is located in group distribution.
Virtual organisation:
Virtual computing (also called “peer-to-peer computing” or “global computing”) uses computers volunteered by the general public to do distributed.
Virtual computing uses Internet-connected computers, volunteered by their owners, as a source of computing power and storage.
Here VO is act as desktop it is used to maintain the files into various parts to protect and to return exact user who registered in grid service.
The common architecture of desktop grids consists of one or more central servers and a large number of clients.
ALGORITHM USED:[AES]
Data encryption is the mechanism of converting a message (plain text) into some other text (called ciphertext) however some authorized party can understand that ciphertext using the method called Decryption which converts the ciphertext into original message. As many software applications store sensitive personal data in databases, encryption has become a must. Ideally nobody (including the software developers) should not be able to view these user specific real data.
Implementation:
User Login checking for authorization process through group formation. To avoid unauthorized person.
Applying Cryptography concept with AES Algorithm to solve Encryption and Decryption concept.
File Storage using Virtual Organization (VO) to choose lot of clients to avoid interruption process.
ENHANCEMENT MAINTENANCE:
Now we applied only in Data Grid security. In future we can apply at any sort of business application to produce absolute development and with security enhancement.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: smart power grid control through pc project pdf, circuit diagram for power grid control through pc, temporal scalability matlab code, enhancing privacy and authorization control scalability in the grid through ontologie, privacy ontologie, matlab codes for temporal scalability, temporal scalability in mpeg2 video coding,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Privacy- and Integrity-Preserving Range Queries in Sensor Networks 1 855 15-02-2017, 04:10 PM
Last Post: jaseela123d
  Service-Oriented Architecture for Weaponry and Battle Command and Control Systems in 1 1,047 15-02-2017, 03:40 PM
Last Post: jaseela123d
  Enhancing VANET Performance by Joint Adaptation of Transmission Power and Contention 1 775 15-02-2017, 03:24 PM
Last Post: jaseela123d
  Protecting Location Privacy in Sensor Networks Against a Global Eavesdropper 1 788 15-02-2017, 11:01 AM
Last Post: jaseela123d
  Protecting Location Privacy in Sensor Networks Against a Global Eavesdropper 1 751 15-02-2017, 11:00 AM
Last Post: jaseela123d
  SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-He 1 895 14-02-2017, 03:49 PM
Last Post: jaseela123d
  ATM access control using fingerprint scanning smart paper boy 8 5,683 01-07-2016, 11:42 AM
Last Post: jaseela123d
  Privacy Preservation in Data Mining sajidpk123 3 2,948 13-11-2014, 10:48 PM
Last Post: jaseela123d
  Adaptive Forwarding Delay Control for VANET Data Aggregation Projects9 2 1,710 18-03-2014, 11:25 PM
Last Post: seminar report asees
  Privacy Preserving Decision Tree Learning Using Unrealized Data Sets Projects9 1 2,339 30-10-2013, 01:18 PM
Last Post: Guest

Forum Jump: