Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 36

Enhanced Security for Online Exams Using Group Cryptography

INTERNAL GUIDE: DR.K.CHANDRASEKHARAIAH (Professor in CSE(SIT)

Coordinator Sri Suresh Babu ASSISTANT PROFESSOR IN (SIT)

B.NAGULU-M.TECH(CS) (2009-11) 09031D0522

I.

Introduction

Online exam can be rapidly increased in the world. Difficulty to attend the exam in the particular time and place can be over come by the online exam. In this online exam student can misuses this facility by cheating the exam in various way like, getting the answer from local hard disk, chatting with the friends and searching the answer in the internet.

Purpose

The main purpose for preparing this document is to give a general insight into the analysis and requirements of the existing system or situation and for determining the operating characteristics of the system.

Scope

This Document plays a vital role in the development life cycle (SDLC) and it describes the complete requirement of the system.
It

is meant for use by the developers and will be the basic during testing phase. Any changes made to the requirements in the future will have to go through formal change approval process.

Objective

Online

exam is field that is very popular and made many security assurances. Then also it fails to control cheating In this system we are using the cryptography method. This can maintain the online exam question and answer in the much secured way.

Existing System
Different cheating patterns exists in current system including copying the answers of others, exchanging answers, searching the Internet for answers, using the data and software saved on the students local computer and discussing the exam by e-mail, external storage devices.

Advantages

Online exam management system having some monitoring method to prevent and to detect cheating. Without regard to location and time. Avoid intercepting or interfering with communications during an online exam.

Disadvantages

Level of communication between teachers and students decreases. The tendency to cheat by students increases. The system must rely on students honesty or their having an honor code

SYSTEM-ARCHITECTURE

Context Diagram shows the interaction between the system and external agents which act as data sources and data sinks. It shows the entire system as a single process.

Algorithms: The DES (Data Encryption Standard) algorithm is the most widely used encryption algorithm in the world. For many years, and among many people, "secret code making and DES have been synonymous. And despite the recent coup by the Electronic Frontier Foundation in creating a $220,000 machine to crack DES-encrypted messages, DES will live on in government and banking for years to come through a life- extending version called "triple-DES. How does DES work? This article explains the various steps involved in DES-encryption, illustrating each step by means of a simple example. Since the creation of DES, many other algorithms (recipes for changing data) have emerged which are based on design principles similar to DES. Once you understand the basic transformations that take place in DES, you will find it easy to follow the steps involved in these more recent algorithms. But first a bit of history of how DES came about is appropriate, as well as a look toward the future.

The DES Algorithm Illustrated DES is ablock cipher -meaning it operates on plaintext blocks of a given size (64bits)and returns cipher text blocks of the same size. Thus DES results in a permutation among the 2^64 (read this as: "2 to the 64th power") possible arrangements of 64 bits, each of which may be either 0 or 1. Each block of 64 bits is divided into two blocks of 32 bits each, a left half block Land a right half R . (This division is only used in certain operations.)

Example: Let M be the plain text message M= 0123456789ABCDEF, where Misin hexa decimal (base 16) format. Re writing Min binary format, we get the 64bit block of text :M= 0000 0001 0010 0011 0100 0101 0110 0111 1000 1001 1010 1011 1100 1101 11101111L= 0000 0001 0010 0011 0100 0101 0110 0111R = 1000 1001 1010 1011 1100 1101 1110 1111The first bit of Mis "0". The last bit is "1". We read from left to right. DES operates on the 64-bit blocks using 64 bits long, but every 8th bit in the key is not used (i.e. bits numbered 8, 16, 24,32, 40, 48, 56, and 64). However, we will nevertheless number the bits from 1 to 64,going left to right, in the following calculations. But, as you will see, the eight bits just mentioned get eliminated when we create sub keys.

II. ANALYSIS

1. Proposed System

This project proposes a solution to the issue of security and cheating for online exams. This solution uses an enhanced Security Control system in the Online Exam (SeCOnE) which is based on e-monitoring scheme.

The e-monitoring provides a proctor function to remote examinees to prevent cheating, and thus removes the requirement of having to go to a fixed location. The target of this project is online exams of any type and exams in online university courses with students at remote locations.

2. Modules
Admin

Staff

New user registration Upload the new exam


Candidate

Exam registration Online Exam


Result

3. Module description
Login: It will check the login name and password It allows the authorized user to use these pages. Admin: It can allow the authorized person into admin page. In this module admin can maintain the online exam. It monitors the candidate during the online exam period. Staff: It can allow the authorized persons enter into this page. If new staff they want to register their details here. They can schedule the exam for the student. They have to upload the questions and answer into this.

Candidate: Authorized candidate can login into this page. New candidate can register their details here. User wants to register for the online exam. Exam: In this registered candidate can attend the online exam. Result will be displayed at end of the exam. If the candidate try to get the answer by any malpractice then the candidate will be restrict to continue the exam.

4. FEASIBILITY-REPORT
Preliminary

investigation examine project feasibility, the likelihood the system will be useful to the organization. The main objective of the feasibility study is to test the Technical, Operational and Economical feasibility for adding new modules and debugging old running system. THERE ARE 3 TYPPES Technical Feasibility Operational Feasibility Economical Feasibility

4.1. TECHNICAL FEASIBILITY

The

technical issue usually raised during the feasibility stage of the investigation includes the following: Does the necessary technology exist to do what is suggested? Do the proposed equipments have the technical capacity to hold the data required to use the new system? Will the proposed system provide adequate response to inquiries, regardless of the number or location of users? Can the system be upgraded if developed?

4.2.OPERATIONAL FEASIBILITY
Operational

feasibility aspects of the project are to be taken as an important part of the project implementation Some of the important issues raised are to test the operational feasibility of a project includes the following: Is there sufficient support for the management from the users? Will the system be used and work properly if it is being developed and implemented? Will there be any resistance from the user that will undermine the possible application benefits?

4.3. ECONOMICAL FEASIBILITY

In

the economical feasibility, the development cost in creating the system is evaluated against the ultimate benefit derived from the new systems. Financial benefits must equal or exceed the costs. The system is economically feasible. It does not require any addition hardware or software. Since the interface for this system is developed using the existing resources and technologies available at NIC, There is nominal expenditure and economical feasibility for certain.

4. Software Requirements
Operating

system :- Windows XP Professional Front End :- Visual Studio 2008, ASP. net, C# Backend :- SQL Server 2005

5. Hardware Requirements
SYSTEM

HARD
RAM

DISK

: Pentium IV : 40 GB : 512 MB

III. DESIGN
DESIGN 1.

ARE THREE TYPES

ER-DIAGRAMS 2.DATAFLOW DIAGRAMS 3.UML DIAGRAMS

1.ER- DIAGRAMS

2.DATAFLOW DIAGRAMS

3.UML DIAGRAMS
Use Case Diagram:
Use Case Diagram:

ACTIVITY-DIAGRAMS

SEQUENCE DIAGRAMS

Conclusion
This system can secure online exam management, scheme for the prevention and detection of cheating using e-monitoring. This method can be achieved by using the Sec One System. This system can identify who they tried to find the answer from the internet or local system data. This system cant restrict the exam time and the exam location. It can allow the candidate to attend the exam whenever they have a time. The examiner no need to monitor the exams for the cheating, the system can monitor that who they attempt to cheat. A powerful feature is that Sec One can be applied to an exam administered at different times.

REFERENCES

[1] Golden Gate University [Online]. Available: http://www.ggu.edu/cybercampus/DegreesCourses/ClassSchedule [2] Univ. Phoenix Online [Online]. Available: http://online.phoenix.edu/Degree_Programs.asp [3] New York University [Online]. Available: http://www.scps.nyu.edu/areas-of-study/online/ [4] C.-R. Jordi, H.-J. Jordi, and D.-J. Aleix, A secure E-exam management system, in Proc. 1st Int. Conf. Avilabil., Reliab. Security, 2006. [5] TOEFL [Online]. Available: http://www.ets.org/bin/getprogram.cgi? Source=toefl&newRegURL=&test=TOEFL&greClosed=new&gre ClosedCountry=China&browserType=Other&toeflType=&redirect =&t_country1=group_Korea%28Rok%29 [6] N. Rowe, Cheating in online student assessment: beyond plagiarism, The Online J. Distance Learn. Administr., vol. 7, no. 2, 2004.

You might also like