ENHANCING PRIVACY AND AUTHORIZATION CONTROL SCALABILITY IN THE GRID THROUGH ONTOLOGIE
#13
[attachment=15448]
Enhancing Privacy and Authorization Control Scalability in the Grid through Ontologies
Objective and Scope:

In this paper a privacy-enhancing technique that uses encryption and relates to the structure of the data and their organizations, providing a natural way to propagate
authorization and also a framework that fits with many use cases is discussed.
In this paper a privacy-enhancing technique that uses encryption and relates to the structure of the data and their organizations, providing a natural way to propagate authorization and also a framework that fits with many use cases is discussed.
Data Grid depends on a set of widely distributed and untrusted storage nodes, therefore offering no guarantees about neither availability nor protection to the stored data
We propose a cryptographic protocol able to fulfill the storage security requirements related with a generic Desktop Data Grid scenario, which were identified after applying an analysis framework extended from our previous research on the Data Grid’s storage services.
Theoretical Background:
EXISTING SYSTEM:

One of the challenges for biomedical application is to provide efficient high-level interfaces, depending on the applications that enable access to Grids for nonexperts, ensuring transparent access to medical resources through services compatible with medical practice. As part of the interfaces, a flexible architecture for the management of the privacy of data is needed, compatible with medical practice and with preexisting Grid security systems are complex enough to be considered an obstacle in the successful Grid adoption.
Proposed System:
1) To propose an on-the-fly cryptographic infrastructure to protect privacy from users with administrative privileges.
2) To provide a flexible architecture for organizing key management for long-term storage of encrypted data.
3) To propose a model applicable in different environments, Compatible with current Grid middleware’s.
4) To provide an access control mechanism for encryption keys based on ontological groups and roles.
Definition of problem:
In existing there is no absolute protection guarantee for stored data .
Compatibility with various fields is not possible.
The nonexpert users are unable to use the interfaces.
The key Management is also a problem.
System Requirements:
Problem formulation:

User Login checking for authorization process. To avoid unauthorized person.
Applying Cryptography concept with DES Algorithm to solve Encryption and Decryption concept.
File Storage using Virtual Organization (VO) to choose lot of clients to avoid interruption process.
System Architecture:
Use case:
CLASS DIAGRAM:
Data Flow Diagram:
Modules:
GROUP CONSTRUCTION

FILE ENCRYPTION AND DECRYPTION
KEY DISTRIBUTION
VIRTUAL ORGANIZATION
GROUP CONSTRUCTION
Grid user must signup before login to give his\her details, the servers performing all the authentication and authorization processes for involved entities (users and resources). Based on the signup details user must use both username and password to login. User’s information is stored in database side to maintain separate server. User without login they can’t access any information for any sort of service every login information must protect by the data server as well as authentication. This process is maintained by grid service
FILE ENCRYPTION AND DECRYPTION
Encryption is the manipulation of data, based on a password (also known as a key), for security purposes. Once your data has been encrypted, a person can not make sense of your data without knowing the password.
Encryption  is a  process of coding information which could either be a file or  mail message  in into text  a form unreadable without a decoding key in order to prevent anyone except the intended recipient from reading that data.
Decryption is the reverse process of converting encoded data to its original un-encoded form, plaintext.
The most widely used symmetric key cryptographic method is the Advanced Encryption Standard (AES) is used in this process.
The algorithm is best suited to implementation in hardware, probably to discourage implementations in software, which tend to be slow by comparison.
AES is the most widely used symmetric algorithm in the world, despite claims that the key length is too short.(128 bits)
The two components required to encrypt data are an algorithm and a key.
KEY DISTRIBUTION  
The file is send to decryption process to get original file.
File system are usually managed in units called blocks or clusters.
When a file system is created, there is free space to store file blocks together contiguously. This allows for rapid sequential file reads and writes.
AES is the most widely used symmetric algorithm in the world, despite claims that the key length is too short. Ever since AES was first announced, controversy has raged about whether 128 bits is long enough to guarantee security. Key Distribution maintain the process to share the key from authorized users which is located in group distribution.
Virtual organisation:
Virtual computing (also called “peer-to-peer computing” or “global computing”) uses computers volunteered by the general public to do distributed.
Virtual computing uses Internet-connected computers, volunteered by their owners, as a source of computing power and storage.
Here VO is act as desktop it is used to maintain the files into various parts to protect and to return exact user who registered in grid service.
The common architecture of desktop grids consists of one or more central servers and a large number of clients.
ALGORITHM USED:[AES]
Data encryption is the mechanism of converting a message (plain text) into some other text (called ciphertext) however some authorized party can understand that ciphertext using the method called Decryption which converts the ciphertext into original message. As many software applications store sensitive personal data in databases, encryption has become a must. Ideally nobody (including the software developers) should not be able to view these user specific real data.
Implementation:
User Login checking for authorization process through group formation. To avoid unauthorized person.
Applying Cryptography concept with AES Algorithm to solve Encryption and Decryption concept.
File Storage using Virtual Organization (VO) to choose lot of clients to avoid interruption process.
ENHANCEMENT MAINTENANCE:
Now we applied only in Data Grid security. In future we can apply at any sort of business application to produce absolute development and with security enhancement.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: scalability answer from ec2050, applience control through matlab, high scalability blog, enhancing privacy and authorization control scalability in the grid through ontologies abstract and basepaper, enhancing privacy and authorization control scalability in the grid through ontologies abstract, power grid control through pc project synopsis, authorization using biometrics and tokens,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
RE: ENHANCING PRIVACY AND AUTHORIZATION CONTROL SCALABILITY IN THE GRID THROUGH ONTOLOGIE - by smart paper boy - 24-08-2011, 02:45 PM

Possibly Related Threads...
Thread Author Replies Views Last Post
  Privacy- and Integrity-Preserving Range Queries in Sensor Networks 1 864 15-02-2017, 04:10 PM
Last Post: jaseela123d
  Service-Oriented Architecture for Weaponry and Battle Command and Control Systems in 1 1,060 15-02-2017, 03:40 PM
Last Post: jaseela123d
  Enhancing VANET Performance by Joint Adaptation of Transmission Power and Contention 1 781 15-02-2017, 03:24 PM
Last Post: jaseela123d
  Protecting Location Privacy in Sensor Networks Against a Global Eavesdropper 1 800 15-02-2017, 11:01 AM
Last Post: jaseela123d
  Protecting Location Privacy in Sensor Networks Against a Global Eavesdropper 1 762 15-02-2017, 11:00 AM
Last Post: jaseela123d
  SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-He 1 907 14-02-2017, 03:49 PM
Last Post: jaseela123d
  ATM access control using fingerprint scanning smart paper boy 8 5,726 01-07-2016, 11:42 AM
Last Post: jaseela123d
  Privacy Preservation in Data Mining sajidpk123 3 2,974 13-11-2014, 10:48 PM
Last Post: jaseela123d
  Adaptive Forwarding Delay Control for VANET Data Aggregation Projects9 2 1,730 18-03-2014, 11:25 PM
Last Post: seminar report asees
  Privacy Preserving Decision Tree Learning Using Unrealized Data Sets Projects9 1 2,351 30-10-2013, 01:18 PM
Last Post: Guest

Forum Jump: