Privilege Level Concurrency Document System Shilpa Raut , Pradnya Sontkke

advertisement
International Journal of Engineering Trends and Technology (IJETT) – Volume 20 Number 3 – Feb 2015
Privilege Level Concurrency Document System
Shilpa Raut1, Pradnya Sontkke2 , Priya Hande3, Snehal Bele4
VIII IT SRMCEW, Nagpur RTMNU , INDIA
5
Prof. A. M. Kuthe
HOD of department CSE/IT,SRMCEW, RTMNU, INDIA
AbstractNow a day, in company there is need of privilege level
access[2] and concurrency control[1] .It plays very important role
for an any organization. The concept of privilege level access is
mainly used for providing the permission to an employees of the
organization. So, by using this concept it can be cleared that which
user of the company is having which kind of permission to perform
certain operation on the confidential data of the company. The
second term is the concurrency control which provide accurate data
at the receiver site. Concurrency control[1] doesn't allow multiple
accessing of the confidential data of the company. It doesn't allow to
perform multiple operation (i.e. read or write or delete) on a single
file simultaneously.
Keywords- centralized database system, redundancy, integrity,
concurrency control, privilege, access control, locking protocol[1].
I.
INTRODUCTION-
In Previous days, user has to maintain data manually in company.
If any user wanted to access the data he has to contact with the top
management. Time was required for this process is more. To
avoid this situation the centralized database system[3] is
implemented. By using centralized database system, all the
confidential data or information of the organization is stored
inside this system so it can be accessed by user easily.
But, there is many issues related to centralized database
system[5]. For example, user A and user B are working in the
company. They belong to the same department. User A is
working on exe.txt file and making some changes in that file. At
the same time user B also doing some changes in the same file
simultaneously. So, the final result of exe.txt file will conflict and
not get the correct output. So, to avoid this situation privilege
level access[2] is used. Privilege level access[4] which mean
that permission to perform certain action on the confidential data.
In centralized database system, it is difficult to maintain
consistency which having multiple users, for this concurrency
control[3] concept is developed. Concurrency control ensures
that correct result for concurrent operations which are generated
by user, while getting those result as quickly as possible.
Operation consistency[1] and correctness should be achieved
with as good as possible efficiency, without reducing
performance below reasonable.
II. DEPLOYMENT OF APPLICATION ON SERVERThe application which is being created has two users one
is admin and other is user.
ISSN: 2231-5381
Admin will able to add, modify, delete, upload and can
view the data. This paper satisfies the three security
parameters such as Authentication, Encryption and
separation of duties. Authentication is used to provide the
identity of the particular user which requires creating the
user ID and password. For the deployment of application on
server will have to follow certain steps:
First will have to create the environment and select the tools
that we required
 Apache Tomcat 7.0.32
 Java 7.0
 MySQL 5.1
While creating the server environment, store all the
information about the organization into it so that user can easily
access it.
II.
PROPOSED METHODOLOGY
A. Authentication
In this module, user authentication is done according to the role
based access control. A new user has to register for access the
content of our system. Registered user logins with the registered
username and password.
The system consist of users that have multiple roles i.e.
programmer, tester and admin. User will be created by
administrator which will notify user about his/her account in the
system. User can then use the system by using his/her credentials.
Authentication is done according to the login with Gmail
verification. In which, user has to log in by entering his email id
and correct password to get access for the data files.
B. Provide privilege level to access the file
There are multiple users of the system such as programmer, tester
and admin. Programmer has permission to read, write and search
a file. Tester has privilege only to read a file. Admin has privilege
to read, write, search a file, update and delete a file.
C. Lock based protocols
Database systems, which provides lock-based protocols[1]
mechanism by which any transaction cannot read or write data
until it acquires appropriate write lock on it first.
Locks are of two kinds:

Binary: Provided to one user only.
http://www.ijettjournal.org
Page 139
International Journal of Engineering Trends and Technology (IJETT) – Volume 20 Number 3 – Feb 2015

Shared: This type of locking mechanism differentiates
lock based on their uses. If a lock is acquired on a data
item to perform a write operation, it is exclusive lock.
Because allowing more than one transactions to write on
same data item would lead the database into an
inconsistent state. Read locks can share data value.
There are various types of lock protocols available:

Simplistic Lock Protocol
Simplistic lock based protocols allow transaction to
obtain lock on every object before 'write' operation is
performed. As soon as 'write' has been done,
transactions unlock the data item.



step3:Divide the input message into 512 bit block size.
step4:In this step 4 variables are initialized they are
called A,B,C,D each of this is 32 bit number.
 step5:Copy the four chaining variables into four
corresponding variables i.e. a,b,c,d
a= A, b=B, c=C, d=D.
The algorithm consider the combination of
a,b,c,d as 128 bit. It is specially used for holding intermediate as
well as final result. Divide current 512 bit block into 16 sub block
and each sub block contains 32 bits.
 step6:MD5 uses 4 rounds, all 16 sub blocks,
Pre-claiming Lock Protocol
In this protocol, a transactions evaluations its operations
and creates a list of data items on which it needs locks.
Before starting the execution, transaction requests the
system for all locks it needs beforehand. If all the locks
are granted, the transaction executes and releases all the
locks when all its operations are over. Else if all the
locks are not granted, the transaction rolls back and
waits until all locks are granted.
variables (i.e. a,b,c,d) and some constant.
a = b + (( a + process(b,c,d) + m[i] + t[k] ) <<< s
where,
a, b, c, d
->chaining variables
process p -> non-linear operation
m[i] -> message sub block
t[k]
-> constant
<<< s
-> circular left shift by s-bit.
III.
CHALLENGES AND SECURITY ISSUES
There are many security issues in centralized database system
which occurs during the transmission of data from sender to
receiver site. following are the security issues:
 Encryption:-When sender sends the original message
to receiver, the original message is being encrypted in
such a way that no one(i.e. third party) can hack or
misuse the data.
 Intrusion Detection and Prevention:-Data that is
being entered and going out of the network has to know.
 Location of Data:-Every organization will have
different requirements and their access control on their
data to be placed.
V. MESSAGE DIGEST ALGORITHM VERSION 5(MD5)Message Digest Algorithm is developed by Ron Rivest. Original
message digest algorithm was called MD[6]. MD5 is quite fast
and produce 128 bit as the message digest.
Working: step1: First step in MD5 is to add padding bits to the
original message. Main goal of this step is to make the
length of original message[6] is equal to the value which
is 64 bit less than exact multiple of 512 bit.
 step2:After padding[6] bits are added, next step is to
calculate the length of original message and add it to the
original message.
ISSN: 2231-5381
VI.
SYSTEM ARCHITECTURE-
In our project, there is centralized database system
which act as server of the system.
This server contain all information about the organization. If user
want to access the data of the company then he can easily access
it. Here, admin provide the role based access control so that only
authorized user can access the confidential data of the company.
http://www.ijettjournal.org
Page 140
International Journal of Engineering Trends and Technology (IJETT) – Volume 20 Number 3 – Feb 2015
Role based access control can be provided by admin
using login with Gmail verification. This login verification
module provides user id and password., link will be sent to user
mail and user need to click on it to verify himself in the system. A
mailing module is also developed for forgot password facility.
Whenever a user clicks on forget password, system will generate
a temporary password and will send it to user. User need to login
to system using temporary password and change password.
We provide concurrency control in this System.
Concurrency control ensures that correct result for concurrent
operations which are generated by user, while getting those result
as quickly as possible.
In this system, users are created by system. Users are group Into
structure called as group manager. Group manager is the person
who is managed and allocated the group to user. One user can be
a member of one or many groups.



Group manager has privilege to allocate permission to the
user according to their roles. For example, programmer has
privilege to read and write the file, Tester has privilege to
only read the file.
ISSN: 2231-5381


VII.
ADVANTAGES
Easy project team generation.
File can be accessed by using privileged level access.
In this Encryption is used, so that no one can hack
confidential data.
Login with Gmail verification is provided for security.
Concurrency control is used for accurate data.




VIII. APPLICATION
Social Networking Sites.
IT company.
Cloud Storage.
Remote data access.
http://www.ijettjournal.org
Page 141
International Journal of Engineering Trends and Technology (IJETT) – Volume 20 Number 3 – Feb 2015
IX.
CONCLUSION
After analyzing previous research papers, issues identified in the
survey are being recovered in this proposed work. The issues
related to the concurrency[5] control and privilege level access
have being recovered. The modules that are going to be
implemented in the proposed system like the login module. In
this project we will implement software as web based system. At
the same time we will implement a concurrency based locking
protocol that will preserve integrity of data. Users can upload as
well as download files. Each user in system can download files
according to permission assigned to them.
X.
REFERENCES
[1] Concurrency Control and Recovery in Database Systems, Philip A. Bernstein,
Vassos Hadzilacos, Nathan Goodman (1987Addison Wesley Publishing
Company, 1987, ISBN 0-201-10715-5
[2] Privilege Constants, http: //www.Microsoft.com
[3] User rights include logon rights and privileges. User Rights, Microsoft
TechNet Library, http://www.Microsoft.co.in/TechNet Library
[4] Privilege Rights, Microsoft MSDN Library.
[5] Database Systems, Beynon-Davies P. (2004). Palgrave, Basingstoke,
UK.ISBN 1-4039-1601-2Jump up.
[6] Cryptanalysis of MD5 compress, Hans Dobbertin, Announcement on
Internet, May 1996. "CiteSeerX". Citeseer.ist.psu.edu. Retrieved 9 August 2010.
ISSN: 2231-5381
http://www.ijettjournal.org
Page 142
Download