Professional Documents
Culture Documents
A Secure Data Self Destructing Scheme in Elucidation Intervening Users
A Secure Data Self Destructing Scheme in Elucidation Intervening Users
Submitted by
N.MAMTHA
REG NO: 412813621320
Of
VALLIAMMAI ENGINEERING COLLEGE
Submitted to the
FACULTY OF INFORMATION AND COMMUNICATION
ENGINEERING
In partial fulfilment of the requirements
For the award of the degree
Of
MASTER OF COMPUTER APPLICATIONS
ANNA UNIVERSITY
CHENNAI 600 025
JUNE, 2016
BONAFIDE CERTIFICATE
Mr.S.K.SARAVANAN
Prof.Dr.A.ABDUL RASHEED
Department of Computer
Department of Computer
Applications,
Applications,
Kancheepuram District.
Kancheepuram District.
Internal Examiner
External Examiner
ACKNOWLEDGEMENT
TABLE OF CONTENTS
CHAPTER
NO
TITLE
PAGE
NO
ABSTRACT
VI
LIST OF TABLES
VII
LIST OF FIGURES
VIII
INTRODUCTION
SYSTEM ANALYSIS
SYSTEM SPECIFICATION
3.3.1 JAVA
3.3.2 NETBEANS
CHAPTER
TITLE
NO
SYSTEM DESIGN
4
PAGE
NO
11
11
12
13
14
15
SYSTEM IMPLEMENTATION
17
17
5.1.1 MODULES
17
5.2 ALGORITHM
18
SYSTEM TESTING
20
20
6.1.1 SCOPE
21
21
21
23
25
APPENDICES
26
26
35
REFERENCES
41
ABSTRACT
In recent times, more and more works and applications are rise in the
Internet, manifest sensitive data in the internet has become easier. Web works
causes personal data to be cached, copied, and archived by third parties, often
without our knowledge or control. We create a self-destructing concept for data
or file, which can protect a users sensitive data by making the sensitive and
important data automatically destructed after particular period of time. The file
is encrypted while sending. Every file is labelled with a time interval. The file
can only be decrypted if both the time instant is in the allowed time. It helps to
solve some important aegis problems by supporting user-defined authorization
period. Overall ratio of the aegis equity reveals that the strategy proposed by us
satisfies the aegis requirements and is superior to other current strategy.
LIST OF TABLES
TABLE NO
TITLE
PAGE NO
Table 4.5.1
REGISTRATION TABLE
16
Table 4.5.2
16
Table 6.1.4.1
TEST CASE 1
23
Table 6.1.4.2
TEST CASE 2
24
Table 6.1.4.3
TEST CASE 3
24
LIST OF FIGURES
FIGURE NO
TITLE
PAGE NO
Fig 4.1.1
SYSTEM ARCHITECTURE
11
Fig 4.2.1
USECASE DIAGRAM
12
Fig 4.3.1
SEQUENCE DIAGRAM
13
Fig 4.4.1
14
Fig 4.4.2
14
Fig 4.4.3
15
Fig 4.4.4
15
Fig 5.1.1
17
Fig A2.1
REGISTRATION PAGE
35
Fig A2.2
LOGIN PAGE
35
Fig A2.3
36
Fig A2.4
36
Fig A2.5
37
Fig A2.6
SELECT USER
37
Fig A2.7
38
Fig A2.8
38
Fig A2.9
DOWNLOAD FILES
39
Fig A2.10
FILE DETAILS
39
Fig A2.11
40