Blockchain Personal Sem 1

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 41

A

Project Report on

“Admission process using Blockchain”

SUBMITTED TO THE SAVITRIBAI PHULE UNIVERSITY, PUNE


IN THE PARTIAL FULFILMENT OF THE REQUIREMENTS
FOR THE AWARD OF THE DEGREE

OF

BACHELOR OF ENGINEERING (COMPUTER ENGINEERING)


(Academic Year: 2022-23)

SUBMITTED BY

Aakanksha Barkale (PRN NO: 72029905F)


Gayatri Suryawanshi (PRN NO: 72030168J)
Aniruddha Jeughale (PRN No: 72029998F)
Ujjwal jejurkar (PRN No: 72029997H)

Under the guidance of

Prof. K C kulkarni

DEPARTMENT OF COMPUTER ENGINEERING

MET’s Institute of Engineering,


Adgaon, Nashik-422003
SAVITRIBAI PHULE UNIVERSITY, PUNE

May, 2022
Certificate
This is to Certify that the project report entitles

“Admission process using Blockchain”


Aakanksha Barkale (PRN NO: 72029905F)
Gayatri Suryawanshi (PRN NO: 72030168J)
Aniruddha Jeughale (PRN No: 72029998F)
Ujjwal jejurkar (PRN No: 72029997H)

are bonafide students of this institute and the work has been carried
out by them under the guidance of Prof. K C kulkarni and it is approved
for the partial fulfillment of the requirement of Savitribai Phule Pune Uni-
versity for the award of the degree of Bachelor of Engineering (Computer
Engineering).

Guide H.O.D Principal


(Prof. K C kulkarni) (Dr.M.U.Kharat) (Dr.V.P.Wani)

Date: / /
Acknowledgement

We have taken efforts in this project. However, it would not have been possible
without the kind support and help of many individual and organizations. We would
like to extend our sincere thanks to all of them. It gives us proud privilege to complete
the project on “Admission process using Blockchain”. We are highly
indebted to our internal guide Prof. K C kulkarni for his guidance and constant
supervision as well as for providing necessary information regarding the project and also
for his support in completing the project.
We are also extremely grateful to our respected H.O.D. (Computer Department)
Dr. M. U. Kharat and Dr. P. N. Metange (Project Co-ordinator) for
providing all facilities and every help for smooth progress of project work.

Aakanksha Barkale
Gayatri Suryawanshi
Aniruddha Jeughale
Ujjwal Jejurkar

ii
Abstract

Project Title: Admission process using Blockchain


The recent increase in reported incidents of surveillance and security breaches
compromising user’s privacy call into question the current model, in which third-parties
collect and control massive amounts of personal data. Disclosure of user’s personal data
is a serious breach of privacy. Traditional database storage options have proven to be
quite inefficient in protecting such sensitive data. Records can be stolen and tampered
with on cloud based services. Our system proposes a decentralized system of storing user
personal data using a novel technology, Block chain. Block chain technology has thus far
been able to prevent unauthorized access with its secured cryptographic algorithms and
its immutability makes the data tamperproof. We are creating the smart system which is
based on data ownership, data transparency, auditability and fine-grained access control.
According to the results of this study, countries where national data protection authori-
ties have the power, and the resources, to enforce data protection laws in a consistent and
predictable manner represent a positive institutional environment for organizations. In
these contexts, organizations are more likely to develop a strong privacy culture, which
is a necessary condition to adopt fair information practices and respect data subject’s
rights. We are storing personal data using block chain to avoid unauthenticated modi-
fications and data stealing, Block chain provide features to overcome the draw backs of
existing system.

Keywords: Decentralized system, Block chain, Data, Transparency, access con-


trol.

iii
Contents

Acknowledgement i

1 Introduction 1
1.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.2 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2

2 Literature Survey 3
2.1 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4

3 Problem Definition 5
3.1 Need of Block Chain . . . . . . . . . . . . . . . . . . . . . . . . . . 5
3.2 Basic Concept . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
3.3 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6

4 Analysis 7
4.1 Project Plan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
4.1.1 Project Plan for semester I . . . . . . . . . . . . . . . . . . . 7
4.2 Requirement Analysis . . . . . . . . . . . . . . . . . . . . . . . . . 8
4.2.1 Necessary Functions . . . . . . . . . . . . . . . . . . . . . . . 8
4.2.2 Desirable Functions . . . . . . . . . . . . . . . . . . . . . . . 8
4.3 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

5 Design 10
5.1 Software Requirement Specifications . . . . . . . . . . . . . . . . . . 10
5.1.1 Project Scope . . . . . . . . . . . . . . . . . . . . . . . . . . 10
5.1.2 Operating Environment . . . . . . . . . . . . . . . . . . . . . 11
5.1.3 User Classes and Characteristics . . . . . . . . . . . . . . . . . 11
iv
Admission process using Blockchain

5.1.4 Design and Implementation Constraints . . . . . . . . . . . . . 11


5.1.5 Assumptions and Dependencies . . . . . . . . . . . . . . . . . 12
5.2 System Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . 12
5.3 Details of each module . . . . . . . . . . . . . . . . . . . . . . . . . 13
5.3.1 User login . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
5.3.2 Processing Modules: . . . . . . . . . . . . . . . . . . . . . . . 13
5.4 External Interface Requirement . . . . . . . . . . . . . . . . . . . . . 14
5.4.1 User Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . 14
5.4.2 Hardware Interfaces . . . . . . . . . . . . . . . . . . . . . . . 14
5.4.3 Communication Interfaces . . . . . . . . . . . . . . . . . . . . 14
5.5 Software System Attribute . . . . . . . . . . . . . . . . . . . . . . . 14
5.6 Nonfunctional Requirement . . . . . . . . . . . . . . . . . . . . . . . 15
5.7 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16

6 Modeling 17
6.1 Data Flow Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . 17
6.2 Use Case Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
6.3 Class Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
6.4 Sequence Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
6.5 Component Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . 26
6.6 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27

7 Technical Specifications 28
7.1 Advantages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
7.2 Limitations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
7.3 Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
7.3.1 Hardware Requirements . . . . . . . . . . . . . . . . . . . . . 29
7.3.2 Software Requirements . . . . . . . . . . . . . . . . . . . . . 30
7.4 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30

8 Conclusion 31

Bibliography 32

MET’s Institute of Engineering v


List of Figures

5.1 System diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13

6.1 Data Level 0 diagram . . . . . . . . . . . . . . . . . . . . . . . . . . 18


6.2 Data Level 1 diagram . . . . . . . . . . . . . . . . . . . . . . . . . . 19
6.3 Data Level 2 diagram . . . . . . . . . . . . . . . . . . . . . . . . . . 20
6.4 Use Case diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
6.5 Class diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
6.6 Sequence diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
6.7 Component diagram . . . . . . . . . . . . . . . . . . . . . . . . . . 27

vi
List of Tables

4.1 Planner and Progress Report I for project . . . . . . . . . . . . . . . . 8

vii
Chapter 1

Introduction

This chapter describes the term Block Chain and introduces the concept of Block
chain Framework. It also gives the overview of the Block Chain Framework which de-
scribes the deliverable of the project.

1.1 Overview
Data is often presented as “the new oil” of our (digital) world, a key asset with
both economic and social value [1]. The term “big data” is used to describe the massive
processing of high volumes of data produced very quickly by various sources. Despite the
opportunities, innovation and growth arising from this omnipresence of data, users find it
all the more difficult to have their privacy boundaries clearly delineated and respected in
the era of big data. Increasingly, the same sets of personal data are collected by different
service providers, each with their purpose and specific approach. Data subjects seeking
to access their own data must acquiesce to the terms imposed by these providers, which
dramatically decreases the effective control that users have over their personal data [2]
[3]. The big data landscape also poses other challenges, such as the increased frequency
of personal data breaches, the deployment of wide scale electronic surveillance systems,
or the profiling of users without their knowledge or consent.
The challenges outlined above, coupled with revelations on the existence of massive
governmental surveillance programs [4], have weakened the confidence of users in certain
aspects of the digital economy [5]. To this end, the European Commission (“EC”), in an
effort to restore users’ trust, has called for a more balanced relation between the interests
1
Admission process using Blockchain

of data controllers and the rights of end-users regarding the processing of personal data
[6]. The General Data Protection Regulation (“GDPR”) [7], which will replace Directive
95/46/EC [8] and is set to apply from 25 May 2018, is part of this reform.
Along the same line, ENISA, in its study “Privacy by design in big data”, under-
lined how crucial it is to shift the discussion from “big data versus privacy” to “big data
with privacy” [9]. The purpose of the study was to explore ways to address privacy issues
with the opportunities afforded by technology, focusing on strategies involving privacy
by design and privacy enhancing technologies (“PETs”) in big data analytics. Key areas
to explore, according to ENISA, are solutions that can increase transparency and control
for end users over their personal data.
Personal Data Clouds (“PDCs”) is one such privacy enhancing solution that
has recently garnered considerable attention1 . PDCs are data management and sharing
systems designed to empower individuals and help them regain control over their data.
The term “PDC” is sometimes used interchangeably with “Personal Data Vaults”, “Per-
sonal Data Stores”, or “Personal Data Services”. The origin of PDCs can be traced to
the development of personal information management systems, which in turn arose out
of the need to achieve better management of dispersed data. These systems, however,
were not primarily concerned with the preservation of privacy, which is why the idea of
PDCs is not only to enable individuals to collect, store, manage, use, and share their
personal data, but to do so according to their own levels of privacy comfort, trust and
needs. These developments have been bolstered by the appearance of technical stan-
dards, such as XDI (”eXtensible Data Interchange”), a semantic data interchange format
and protocol under development by the OASIS XDI Technical Committee.2

1.2 Summary
In this chapter we described the term Data Security and also highlighted the
concept of Data Security Framework. We also discussed the various deliverables of the
project Application.

MET’s Institute of Engineering 2


Chapter 2

Literature Survey

In this chapter we will see the various studies and research conducted in order to
identify the current scenarios and trends in digital Data Privacy and also the attempts
of introducing mobile devices in education.
• “Big Data Model of Security Sharing Based on Blockchain”, P Li Yue ; Huang
Junqin ; Qin Shengzhi ;is a author of this paper, this paper published in 2017.
Advantage of his project is, The rise of big data age in the Internet has led to
the explosive growth of data size. However, trust issue has become the biggest
problem of big data, leading to the difficulty in data safe circulation and industry
development. The blockchain technology provides a new solution to this problem
by combining non-tampering, traceable features with smart contracts that auto-
matically execute default instructions. In this paper, we present a credible big data
sharing model based on blockchain technology and smart contract to ensure the
safe circulation of data resources.

• “Blockchain: A game changer for securing IoT data” is paper of S Madhusudan


Singh ; Abhiraj Singh ; Shiho Kim National Conference on Emerging Trends in
Engineering Technology 2018 Internet of Things (IoT) is now in its initial stage
but very soon, it is going to influence almost every day-to-day items we use. The
more it will be included in our lifestyle, more will be the threat of it being misused.
There is an urgent need to make IoT devices secure from getting cracked. Very
soon IoT is going to expand the area for the cyber-attacks on homes and businesses
by transforming objects that were used to be offline into online systems. Existing
security technologies are just not enough to deal with this problem. Blockchain
has emerged as the possible solution for creating more secure IoT systems in the
time to come. In this paper, first an overview of the blockchain technology and its
implementation has been explained; then we have discussed the infrastructure of
IoT which is based on Blockchain network and at last a model has been provided
for the security of internet of things using blockchain.

• Sunghyun Cho ; Sejong Lee [1] in this paper described A network composed of
lightweight devices such as IoT has problems due to limited resources such as
3
Admission process using Blockchain

lack of storage space and low computing performance. These issues pose signif-
icant challenges in the application of robust security technologies, which reduces
network security performance. The blockchain with strong security is a suitable
technology to solve IoT problems with weak security. As a result, various research
is being carried out to increase security, lightness, and efficiency of the IoT network
by applying blockchain to IoT. This paper introduces the trend of research to apply
blockchain to IoT.

• The Blockchain is an emerging paradigm that could solve security and trust issues
for Internet of Things (IoT) platforms. We recently introduced in an IETF draft
(“Blockchain Transaction Protocol for Constraint Nodes”) the BIoT paradigm,
whose main idea is to insert sensor data in blockchain transactions. Because ob-
jects are not logically connected to blockchain platforms, controller entities for-
ward all information needed for transaction forgery. Never less in order to gen-
erate cryptographic signatures, object needs some trusted computing resources.
In previous papers we proposed the Four-Quater Architecture integrating general
purpose unit (GPU), radio SoC, sensors/actuators and secure elements including
TLS/DTLS stacks. These secure microcontrollers also manage crypto libraries re-
quired for blockchain operation. The BIoT concept has four main benefits: publi-
cation/duplication of sensors data in public and distributed ledgers, time stamping
by the blockchain infrastructure, data authentication, and non repudiation.

2.1 Summary
In this chapter we discussed the various researches conducted in order to achieve
a clear view of Data Secuity framework and also understand the needs of users who are
attracted towards digital education.

MET’s Institute of Engineering 4


Chapter 3

Problem Definition

This chapter explains the need of Blockchain Framework and also describes the
importance of high quality Security. It introduces the basic concept of the role of mobile
devices in learning.

3.1 Need of Block Chain


A blockchain is a decentralized, distributed, and oftentimes public, digital ledger
that is used to record transactions across many computers so that any involved record
cannot be altered retroactively, without the alteration of all subsequent blocks.[1][17] This
allows the participants to verify and audit transactions independently and relatively in-
expensively.[18] A blockchain database is managed autonomously using a peer-to-peer
network and a distributed timestamping server. They are authenticated by mass col-
laboration powered by collective self-interests.[19] Such a design facilitates robust work-
flow where participants’ uncertainty regarding data security is marginal. The use of a
blockchain removes the characteristic of infinite reproducibility from a digital asset. It
confirms that each unit of value was transferred only once, solving the long-standing
problem of double spending. A blockchain has been described as a value-exchange pro-
tocol.[20] A blockchain can maintain title rights because, when properly set up to detail
the exchange agreement, it provides a record that compels offer and acceptance.

5
Admission process using Blockchain

3.2 Basic Concept


Firstly, if privacy policies and relevant user preferences are not adequately embed-
ded in PDC solutions (e.g., if the options provided to the users are not flexible and/or
editable enough), the users might give away more personal data than they would oth-
erwise; A final aspect of PDCs relates to the very relationship between the individuals
and their personal data. In order to assume control, users may need to be actively in-
volved in the management of their data. Therefore, we must account for the possibility
that too much granularity in information management (for example, in access control
settings) may, in the end, overburden the users and alienate them from carrying out
adequate management of their data. Therefore, striking a balance between granularity
and usability may be of utmost importance in that respect.

3.3 Summary
In this chapter we introduced the basic concept of Block Chain Framework with
Personal Data and explained the need of Framework as well as the role of Security in
personal data.

MET’s Institute of Engineering 6


Chapter 4

Analysis

This chapter describes the project plan adopted and determines the requirement
analysis. We have implemented the project on the basis of Bock chain and Security. The
stake holders who participated in the requirement analysis process were the developers
who will be among the end users of the security data for building block chain applications.

4.1 Project Plan

4.1.1 Project Plan for semester I


The following Table 4.1 describes the project plan for semester I. It describes
the various activities and accountability of the developers for the respective modules.
Following are the major activities carried out in this plan :

• Identifying the functional requirements.

• Designing of the Framework.

• Studying the necessary development tools and technologies.

7
Admission process using Blockchain

Phase Activity Start Date End Date Group Mem-


bers
1 Selection of Project Topic 22-08-2022 24-08-2022 Team
1 Study literature survey in 25-08-2022 28-08-2022 Team
detail
1 Functional Requirement 29-08-2022 09-09-2022 Team
Specification(FRS)
1 Design Prototype 11-09-2022 21-09-2022 Team
1 Set Theory and Math 23-09-2022 06-09-2022 Team
Model
1 UML Diagram Prototype 23-09-2022 03-10-2022 Team
1 Project Problem Statement 08-10–2022 19-10-2022 Team
using NP Complete
1 UML Diagram in StarUML 05-10-2022 22-10-2022 Team
1 Paper Presentation 05-11-2022 05-11-2022 Team
1 Software Requirement 6-11-2022 10-11-2022 Team
Specification
1 Test Plan 11-11-2022 15-11-2022 Team

Table 4.1: Planner and Progress Report I for project

4.2 Requirement Analysis

4.2.1 Necessary Functions


• Deliver a reusable piece of code.

• Build an application and

• Deployment of application built on mobile devices .

4.2.2 Desirable Functions


• Social Networking Interface.

• Data Management.
MET’s Institute of Engineering 8
Admission process using Blockchain

• Blockchain integrity.

• PDF and PPT Reader.

4.3 Summary
In this chapter we described the implementation details of the project plan for
Semester I and Semester II. We also studied the necessary functions and the desirable
functions of our project.

MET’s Institute of Engineering 9


Chapter 5

Design

This chapter describes the Software Requirement Specification (SRS) to be imple-


mented for project. It also explains the architecture of the system and external interface
requirements. We have also described the Risk assessment strategy and the Data Flow
Diagram which explains the flow of the project.

5.1 Software Requirement Specifications


The Software Requirement Specification describes the scope of the project, op-
erating environment, user characteristics, design and constraints. It also elaborates the
system architecture of our project.

5.1.1 Project Scope


The recent increase in reported incidents of surveillance and security breaches
compromising user’s privacy call into question the current model, in which third-parties
collect and control massive amounts of personal data. Disclosure of user’s personal data
is a serious breach of privacy. Personal data represents a post-industrial opportunity. In
order to release the huge potential of personal data and enhance the rights of possession,
use, and disposal, a highly reliable, secure and available infrastructure is required. Re-
garding the personal data market, current solutions focus on data discovery and passive
privacy protection.

10
Admission process using Blockchain

5.1.2 Operating Environment


We propose an Framework for users to develop application with ease of operations
that will save the time for developing the application as the reusable piece of code will
be provided in our framework. Furthermore, this application can be used by the user for
Data security and anytime required with interactivity and portability.

5.1.3 User Classes and Characteristics


The user who is going to operate the system should have the tablet or phone
having android as the base operating system.

5.1.4 Design and Implementation Constraints


Using mobile devices like phones, tablets, and laptops (with touch interface) has
a very different set of challenges. The issue is not whether you have larger screen - but
fundamentally they are different.

Battery life, screen size, form factor, variations in keyboard availability and dynami-
cally changing orientation (horizontal or vertical positioning done by user) present using
set of issues to be dealt with.it was necessary to innovate the space where maximum
number of users would benefit. Mobile devices including phones and tablets are the most
prominent majority - and also have high projections for the future. So it is imperative
that we have to have good tools for content creation and dissemination. Teachers who
are our prime focus must have some superb tools to create their Data Security modules.
And students, who will eventually consume these modules, must have excellent tools to
use these Data Security units. Out of this exact need, Application was born. Application
must be extremely portable, FREE to use and open source. Our philosophy is to make
world a better place.
Following are the merits of the design implementation :

• Portability: As it is Data Security, on the move Data Privacy is achieved


anywhere and anytime.

• Delivery Mechanism: It is convenient to develop application and even very


easy to use.

MET’s Institute of Engineering 11


Admission process using Blockchain

• User-friendly: It is user-friendly due to the use of mobile devices like tablets.

5.1.5 Assumptions and Dependencies


The Framework is capable of allowing the user to provide security to personal
data with ease and import it on the tablet(Android OS) . This application developed by
the vendor will allow the user to use it with high power of interactivity and portability.
The commercialization of the tablets may take time. It incorporated best practice in
Data Security research into a practical framework of Data Security design requirements.

5.2 System Architecture


• We are creating a web application / android application for our user where he/she
will have to register himself/herself to our system.

• Each user will get unique username and password to user our system, we store user
information by using block chain to avoid the problems which is face by user today.

• Each user will create information with the information, and then send to the system
for processing, system will use block chain for data integrity. And secure the data.

MET’s Institute of Engineering 12


Admission process using Blockchain

Figure 5.1: System diagram

5.3 Details of each module

5.3.1 User login


• User login:
User login is used by user to login in our system.

5.3.2 Processing Modules:


• Data Access Modules :
Here we are creating a feature where user will request the data to super admin for
view purposed only

• Processing the data in blockchain:


Here we are storing the data using blockchain smart contract ans data will be
proceed for encyption process.

MET’s Institute of Engineering 13


Admission process using Blockchain

• Data Security:
Here we are using the blockchain technology which will be used for secuirity pur-
posed

5.4 External Interface Requirement

5.4.1 User Interfaces


• Application: Using the desktop application the end user will be able to pro-
vide the Data Security content for the application to be developed using the Data
Security Framework.

• Data Security Application: The Data Security application will provide


a Graphical User Interface which will consist of several screens which the end user
will be able to do it.

5.4.2 Hardware Interfaces


• Laptop: The Data Security applications built using the framework will be de-
ployed on mobile devices like smart-phones and tablets supporting Android oper-
ating system version 2.2 and above.

• SD card: The Data Security application will secure the data content stored on
the SD card.

5.4.3 Communication Interfaces


The Data Security application will be communicating through the internet via a
Transmission Control Protocol of the TCP/IP suite for Social Networking Interface(SNI)
and video streaming.

5.5 Software System Attribute


• Reliability: The Data Security applications built using the framewok should
ensure that the SD card is mounted on the device. Internet facility must be available
for using the feature of Social Networking Interface
MET’s Institute of Engineering 14
Admission process using Blockchain

• Availability: The Data Security application shall be available and running in


a stable state at all times.

• Maintainability: The Data Security framework shall be available to the de-


velopers for developing their own Data Security applications.

• Portability: The Data Security application can be used regardless of the time
and location constraints.

5.6 Nonfunctional Requirement


Today online and mobile users’ data are typically stored on several devices (desk-
top, mobile devices) and/or systems of different service providers, sometimes even without
the knowledge of the user. Personal data are thus fragmented and dispersed in various
locations, making it difficult for individuals to have a full overview and control over the
data they share.
There is a need to develop richer models for capturing and analysing NFRs in
Software Engineering. However this not a simple enterprise. Mobile personal data is so
new that we are only beginning to see the potential of mobile devices in training and
performance support.
Following are the Non Functional Requirements of Data Security Framework:

• Input capabilities: Input capabilities of some of these devices, questioning


students’ ability to enter large amounts of text into a device to take notes or answer
an essay-type question..

• Extremely Adaptable: Many of these devices, however, are extremely


adaptable and can be attached to a full-size folding keyboard that makes enter-
ing large amounts of information every bit as fast as with a conventional computer.

As mobile devices evolve and people discover new ways in which mobile devices
functionalities can be applied to training, mobile personal data will likely become some-
thing increasingly different from conventional personal data.

MET’s Institute of Engineering 15


Admission process using Blockchain

5.7 Summary
In this chapter we studied the operating environment and the user classes and
characteristics which describes the scope of the project. We have also described the
software system attributes and various nonfunctional requirements.

MET’s Institute of Engineering 16


Chapter 6

Modeling

This chapter includes the various modeling techniques which describes the various
users of the Data Security Framework and Data Security application. It also describes
the functionality of the different features of the Data Security framework.

6.1 Data Flow Diagram


The Data Flow Diagram of the Data Security Application developed using the
Data Security Framework is as shown in Figure 5.3. The Data Flow Diagram explains
the flow of information in the project that is it indicates from where information (data)
is reseived (inputs) and where information is send (outputs).

17
Admission process using Blockchain

Figure 6.1: Data Level 0 diagram

MET’s Institute of Engineering 18


Admission process using Blockchain

Figure 6.2: Data Level 1 diagram

MET’s Institute of Engineering 19


Admission process using Blockchain

Figure 6.3: Data Level 2 diagram

6.2 Use Case Diagram


A use case diagram is a type of behavioral diagram defined by the UML created
from a use case analysis. Its purpose is to present a graphical overview of the functional-
ity provided by a system in terms of actors, their goals represented as use case and any
dependencies between those use cases.
Four modeling elements make up the use case diagram; these are:

• Actors: Actors refer to a type of users, users are people who use the system. In
this case student, teacher developer are the users of the framework and application

MET’s Institute of Engineering 20


Admission process using Blockchain

• Use cases: A use case defines behavioral features of a system. Each use case
is named using a verb phrase that express a goal of the system. The name may
appear inside or outside the ellipse.

• Associations: An association is a relationship between an actor and a use case.


The relationship is represented by a line between an actor and a use case.

• The include relationship: It is analogous to a call between objects. One


use case requires some type of behavior which is fully defined in another use case.

MET’s Institute of Engineering 21


Admission process using Blockchain

Figure 6.4: Use Case diagram

MET’s Institute of Engineering 22


Admission process using Blockchain

6.3 Class Diagram


The class diagram shows the building blocks of any object oriented system. Class
diagram depicts a static view of the model or part of the model, describing what at-
tributes and behavior it has rather that the detailing the methods of achieving opera-
tions. Class diagrams are most useful in illustrating relationships between classes and
interfaces. Generalizations, aggregations, and associations are all valuable in reflecting
interface, composition or usage and connections receptively.
The Figure 6.2 illustrates aggregation relationships between classes. The lighter
aggregation indicates that the class ObjectExplorer used ThumbNail, but does not nec-
essarily contain an instance of it.The strong, composite aggregations by the other con-
nectors indicate ownership or containment of the source classes by the target. Class, for
example VideoPlayer values will be contained in TableOfContents.

MET’s Institute of Engineering 23


Admission process using Blockchain

Figure 6.5: Class diagram

6.4 Sequence Diagram


The sequence diagram is used primarily to show the interactions between objects
in the sequential order that those interactions occur. Developers typically think sequence
diagrams were meant exclusively for them. However, an organization’s business staff
can find sequence diagrams useful to communicate how the business currently works by
showing how various business objects interact.Sequence diagrams illustrate how objects
interact with each other. They focus on message sequences, that is, how messages are
sent and received between a number of objects. The main purpose of sequence diagram
is to show the order of events between the parts of system that are involved in particular
interaction.
The basic element of sequence diagram is collection of participants, that is, the
parts of the system that interact with each other during the sequence. The participants
are arranged horizontally with no two participants overlapping each other. in Figure
MET’s Institute of Engineering 24
Admission process using Blockchain

6.4 developer, framework, applications are some examples of participants. A message


is communication between objects that conveys information with the expectation that
action will be taken. An event is any point in an interaction where something occurs.
Message can flow in whatever direction makes sense for the required interaction from left
to right, right to left, or even back to the Message Caller itself.

Figure 6.6: Sequence diagram

MET’s Institute of Engineering 25


Admission process using Blockchain

6.5 Component Diagram


Component diagram are one of the two kinds of diagrams found in modeling the
physical aspects of object oriented systems. A component diagram shows organization
and dependencies among set of components. Component diagram can be seen to model
the static implementation view of a system. This involves modeling the physical things
that resides on a node, such as executable, libraries, tables, files and documents.
Component diagram shows a set of components and their relationships. Graph-
ically a component diagram is a collection of vertices and arcs. Component diagrams
commonly contain,

• Components

• Interfaces

• Dependency, generalization, association and realization re-


lationships.

MET’s Institute of Engineering 26


Admission process using Blockchain

Figure 6.7: Component diagram

6.6 Summary
Thus we saw the various modeling techniques used for the design of Data Security
Framework and the Data Security Applications.

MET’s Institute of Engineering 27


Chapter 7

Technical Specifications

In this chapter we will discuss the advantages and limitations of the Data Security
Framework. We will also go through the applications of the framework and have a brief
study about the technical requirements.

7.1 Advantages
A key benefit of Data Security is its potential for increasing productivity by mak-
ing Data Privacy available anywhere, anytime. Because mobile devices have the power
to make Data Privacy even more widely available and accessible, mobile devices are a
natural extension of eLearning. Data Security is the power of Data Privacy that is truly
“just-in-time” where you could actually access training at the precise place and time on
the job that you need. Our project provides the reusable piece of code that will help the
developers for developing multiple Data Security applications easily; one can also prepare
audio or textual notes on move. The greatest benefit of this delivery is the combination
of true interactivity coupled with portability.
Following are some more advantages of Data Security Framework:

• Secure:Data Privacy at the point of need.


• Ability to access Data Privacy (almost) everywhere:This means
down time can be leveraged for learning.

• Potential to be secure more data:Video, powerpoint, podcasts, and


quizes are all potential outputs to devices. This provides a great deal of flexibility
for mobile development.
28
Admission process using Blockchain

• Potential for location based learning:This means the phone can alert
the person when they are near a potential Data Privacy experience based in the
context in which the Data Privacy will be used–which potentially can help retention
and return on investment.

7.2 Limitations
To participate in mobile Data Privacy one must have a tablet or mobile devices
with android as its base operating system,these can have high ranges of cost, due to this
reason it cannot be affordable by everybody in todays world.
Another aspect to be considered is the size of the device, this is only a challenge if
one incorrectly plans mobile Data Privacy content to be nothing more than compressed
eLearning. If your users are already using their mobile device that you plan to push Data
Privacy to, your strategy should be what content do they need in the context of using
the device. Add to that, the greatly improved displays, such as the OLED display on
the DROID Incredible, and size isn’t a detriment any more, but an advantage.

7.3 Applications
The Data Security framework can be used in following areas:

• Institutions for teaching the Data Privacy material developed by the developer for
mobile learning.

• Students can study with ease.

• The education application developer can use this framework for developing number
of applications that can be imported on mobile devices.

7.3.1 Hardware Requirements


• AMD/Intel Processor

• 2GB RAM for application development

• Min. 16 GB Hard Disk

MET’s Institute of Engineering 29


Admission process using Blockchain

• Android Emulator for testing

7.3.2 Software Requirements


• HTML5

• Action Script

• PHP

7.4 Summary
In this chapter we were made aware of the various advantages of the framework and
also the limitations of the project. We also saw the hardware and software requirements
of the project.

MET’s Institute of Engineering 30


Chapter 8

Conclusion

Data Security concept was tossed during the early 1990’s but was never brought
in the implementations. We analyzed the need of the Data Security Framework and
conducted rigorous studies and researches. We understood the requirements of the Data
Security Application Developers and decided to design a framework which will match
their needs and will ease their task of developing the applications. We have developed
a Data Security Framework for multiple Android Platforms which includes Android 2.2
(Froyo), Android 2.3 (Gingerbread), Android 3.0 (Honeycomb) and 4.0 (Ice cream sand-
wich). We have successfully tested the Data Security applications developed using the
Data Security Framework on the above mentioned Android platforms.

31
Bibliography

[1] James Ball. Nsa’s prism surveillance program: how it works and what
it can do. The Guardian, 2013.

[2] Mobile Data Privacy in review: Michael Ben-Or, Shafi Goldwasser,


and Avi Wigderson. Completeness theorems for non-cryptographic
fault-tolerant distributed computation. In Proceedings of the twentieth
annual ACM symposium on Theory of computing, pages 1–10. ACM,
1988

[3] A Design Requirements Framework for Mobile Data Privacy Environ-


ments EUROPEAN COMMISSION. Commission proposes a comprehensive reform
of data protection rules to increase users’ control of their data and to cut costs for
businesses. 2012

[4] Mobile Data Privacy in the 21st century: Benefit for learners ;Geddes
S.,In The knowledge tree, December 2010.

[5] Mobile learning: A handbook for educators and trainers ;Kukulska-Hulme,


A., and Traxler, J.,In London: Routledge,2010.

[6] Moving mobile into the mainstream ;Stead, G.,In Proceedings of mLearn,2010.

[7] Mobile Data Privacy anytime everywhere ;Corlett and Sharples, In London:
Data Privacy and Skills Development Agency, 2010.

[8] Cooperative learning: Increasing college faculty instructional produc-


tivity ;Johnson, In Washington D.C.: School of Education and Human Development,
2011.

[9] Evolution towards Data Security,Marela Andres, EdTechie, 2011.


32
Admission process using Blockchain

[10] Managed Data Security, Greg Luckock, RPS, 2011.

MET’s Institute of Engineering 33

You might also like