Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 9

A SECURE DATA SELF DESTRUCTING

SCHEME IN ELUCIDATION INTERVENING


USERS
A PROJECT REPORT

Submitted by

N.MAMTHA
REG NO: 412813621320
Of
VALLIAMMAI ENGINEERING COLLEGE
Submitted to the
FACULTY OF INFORMATION AND COMMUNICATION
ENGINEERING
In partial fulfilment of the requirements
For the award of the degree
Of
MASTER OF COMPUTER APPLICATIONS

ANNA UNIVERSITY
CHENNAI 600 025
JUNE, 2016

BONAFIDE CERTIFICATE

Certified that this project report A SECURE DATA SELF-DESTRUCTING


SCHEME IN ELUCIDATION INTERVENING USERS is the bonafide
work of N.MAMTHA (REG NO: 412813621320) who carried out the
project work under my supervision. Certified further, that to the best of my
knowledge the work reported herein does not form part of any other project
report or dissertation on the basis of which a degree or award was conferred on
an earlier occasion on this or any other candidate.

Signature of the Guide

Signature of the Head of the Department

Mr.S.K.SARAVANAN

Prof.Dr.A.ABDUL RASHEED

Assistant professor (Sel.G.)

Head of the Department

Department of Computer

Department of Computer

Applications,

Applications,

Valliammai Engineering College,

Valliammai Engineering College

Kancheepuram District.

Kancheepuram District.

Submitted to the Anna university viva voce held on ___________________.

Internal Examiner

External Examiner

ACKNOWLEDGEMENT

My heartfelt gratitude and thanks to the Almighty god, my parents and


other family members and friends without whose support I could not have
made this career in Computer Applications.
My sincere thanks and profound sense of gratitude goes to our
respected Chairman, Dr. T.R Pachamuthu B.Sc., M.I.E., for providing us
with adequate infrastructure and congenial academic environment.
I like to express my gratitude to our Principal
Dr.B.Chidhambararajan M.E., Ph.D., and Head of Department of
Computer Applications Dr.A.Abdul Rasheed MCA.,ME.,Ph.D., for their
guidance and advice all through my tenure.
I take the privilege to extend my hearty thanks to my internal guide
Mr.S.K.Saravanan MCA.,M.Tech., Assistant Professor, Department of
Computer Applications, for spending his valuable time and energy in guiding
supporting and inspiring me to make this Project Report a successful one.
Finally with great enthusiasm I express my thanks to all my department
faculty members and technical staff members for providing necessary
information and their sustained interest in my part of successful completion.

TABLE OF CONTENTS
CHAPTER
NO

TITLE

PAGE
NO

ABSTRACT

VI

LIST OF TABLES

VII

LIST OF FIGURES

VIII

INTRODUCTION

1.1 OBJECTIVE OF THE PROJECT

1.2 PROBLEM STATEMENT

SYSTEM ANALYSIS

2.1 EXISTING SYSTEM

2.2 PROPOSED SYSTEM

2.3 FEASIBILITY STUDY

2.3.1 TECHNICAL FEASIBILITY

2.3.2 ECONOMICAL FEASIBILITY

2.3.3 OPERATIONAL FEASIBILITY

2.3.4 SOCIAL FEASIBILITY

SYSTEM SPECIFICATION

3.1 HARDWARE REQUIREMENTS

3.2 SOFTWARE REQUIREMENTS

3.3 SOFTWARE DESCRIPTION

3.3.1 JAVA

3.3.2 NETBEANS

3.3.3 MYSQL SERVER

CHAPTER
TITLE
NO
SYSTEM DESIGN
4

PAGE
NO
11

4.1 SYSTEM ARCHITECTURE

11

4.2 USE CASE DIAGRAM

12

4.3 SEQUENCE DIAGRAM

13

4.4 DATA FLOW DIAGRAM

14

4.5 DATABASE DIAGRAM

15

SYSTEM IMPLEMENTATION

17

5.1 PROJECT DESCRIPTION

17

5.1.1 MODULES

17

5.2 ALGORITHM

18

SYSTEM TESTING

20

6.1 TEST PLAN

20

6.1.1 SCOPE

21

6.1.2 TEST ITEMS

21

6.1.3 TESTING STRATEGIES

21

6.1.4 TEST CASE

23

CONCLUSION AND FUTURE


ENHANCEMENT

25

APPENDICES

26

APPENDIX 1:SAMPLE SOURCE CODE

26

APPENDIX 2:SCREEN SHOTS

35

REFERENCES

41

ABSTRACT

In recent times, more and more works and applications are rise in the
Internet, manifest sensitive data in the internet has become easier. Web works
causes personal data to be cached, copied, and archived by third parties, often
without our knowledge or control. We create a self-destructing concept for data
or file, which can protect a users sensitive data by making the sensitive and
important data automatically destructed after particular period of time. The file
is encrypted while sending. Every file is labelled with a time interval. The file
can only be decrypted if both the time instant is in the allowed time. It helps to
solve some important aegis problems by supporting user-defined authorization
period. Overall ratio of the aegis equity reveals that the strategy proposed by us
satisfies the aegis requirements and is superior to other current strategy.

LIST OF TABLES

TABLE NO

TITLE

PAGE NO

Table 4.5.1

REGISTRATION TABLE

16

Table 4.5.2

FILE DETAILS TABLE

16

Table 6.1.4.1

TEST CASE 1

23

Table 6.1.4.2

TEST CASE 2

24

Table 6.1.4.3

TEST CASE 3

24

LIST OF FIGURES

FIGURE NO

TITLE

PAGE NO

Fig 4.1.1

SYSTEM ARCHITECTURE

11

Fig 4.2.1

USECASE DIAGRAM

12

Fig 4.3.1

SEQUENCE DIAGRAM

13

Fig 4.4.1

DFD LEVEL 0 OVERALL DIAGRAM

14

Fig 4.4.2

DFD LEVEL 1- LOGIN DIAGRAM

14

Fig 4.4.3

DFD LEVEL 1 ENCRYPTION DIAGRAM

15

Fig 4.4.4

DFD LEVEL 1 - DECRYPTION DIAGRAM

15

Fig 5.1.1

SELF DESTRUCTING DATA MODEL DESIGN

17

Fig A2.1

REGISTRATION PAGE

35

Fig A2.2

LOGIN PAGE

35

Fig A2.3

ADMIN LOGIN PAGE

36

Fig A2.4

USER CONFIRMATION FORM

36

Fig A2.5

USER DETAILS PAGE

37

Fig A2.6

SELECT USER

37

Fig A2.7

SEND FILE WITH TIMEOUT

38

Fig A2.8

ENTER SECRET KEY

38

Fig A2.9

DOWNLOAD FILES

39

Fig A2.10

FILE DETAILS

39

Fig A2.11

FILE HAS EXPIRED

40

You might also like