This document discusses a proposed system for adaptive resource sharing between banks. It involves developing an online application that allows employees to be temporarily allocated to other branches when needed, with time-based authentication to only allow access for the allocated time period. The system would also provide transaction security and allow employees on leave to check transaction status. It is being developed using ASP.Net on the front end and MS SQL Server on the back end.
This document discusses a proposed system for adaptive resource sharing between banks. It involves developing an online application that allows employees to be temporarily allocated to other branches when needed, with time-based authentication to only allow access for the allocated time period. The system would also provide transaction security and allow employees on leave to check transaction status. It is being developed using ASP.Net on the front end and MS SQL Server on the back end.
This document discusses a proposed system for adaptive resource sharing between banks. It involves developing an online application that allows employees to be temporarily allocated to other branches when needed, with time-based authentication to only allow access for the allocated time period. The system would also provide transaction security and allow employees on leave to check transaction status. It is being developed using ASP.Net on the front end and MS SQL Server on the back end.
The project Entitled as ADAPTIVE RESOURCE SHARING BETWEEN THE
BANKS is used to identifying and Recover the accessibility issues in banking sectors. In existing system banking access is troublesome because of number branches availed and other branches employees allocated to any other branch in same bank whether the absence of the employee. It has lots of insecurities during transaction. In proposed system is developed based on the access problem revival that the process is employee allocation with the convenience of authorization during employee deficiency. As well as it provides protection for particular transaction using the time based authentication protocol. It allows only fastidious process for alternative employee over the period of time. They should only work with that duration. Otherwise they cannot login into the others working progress. The secure and authentication working process is developed on online application under the consideration nature work of alternative employee. They can maintain both the work as parallel. The Presence of nonexistence employee also can get the information status about transaction whether they got a leave by this website. This highly sheltered website developed over the front end is ASP.Net and Back end is MS SQL Server.
1. INTRODUCTION
The proposed system involves using a mobile phone as a software token for one time password generation. The generated one time password is valid for only a short user- defined period of time and is generated by factors that are unique to both, the user and the mobile device itself. Additionally, an SMS-based mechanism is implemented as both a backup mechanism for retrieving the password and as a possible mean of synchronization This Project describes a method of implementing authentication process for alternative user using mobile phones. The First factor is focus on the Request level authentication that is when the alternative user request in to the administrator for the login code that will be send to the alternative user mobile after that request is trusted. The second level is this system will automatically detect the session period of user and disconnect the access and block the login id if the session is expired. This project is aimed at developing by using ASP.Net as front end and MS-SQLServer as Back end.
1.1 SYSTEM SPECIFICATION 1.2.1 HARDWARE SPECIFICATION Processor - Pentium III RAM - 128MB Hard Disk - 40 GB Floppy Disk Drive - 1.44 MB Motherboard - Mercury Intel chipset board Printer - HP Laser 6 plus Mouse - logitech two buttons Keyboard - 104 keys Keyboard Monitor - 15 SVGA Colour monitor
1.2.2 SOFTWARE SPECIFICATION Platform : Windows 7 Front end tool : ASP.Net Backend tool : MS-SQLServer
1.1.3 LANGUAGE DESCRIPTION FRONT END ASP.NET ASP.NET is a powerful web technology which is widely used today for creating dynamic web pages .It is a combination of two technologies: Active server page (ASP) and .NET Framework. Asp, also called as powerful and effective way of building dynamic web pages in the last few years.
On other hand, the .NET Framework is relatively a new technology developed by Micro soft with the aim of revolutionizing the way all programming development is done. ASP.NET is technology to create dynamic web pages by using the innovations present in the .NET Framework.
ASP.NET provides services to allow the creation, deployment, and execution of Web Applications and Web Services Like ASP, ASP.NET is a server-side technology Web Applications are built using Web Forms. ASP.NET comes with built-in Web Forms controls, which are responsible for generating the user interface. They mirror typical HTML widgets like text boxes or buttons. If these controls do not fit your needs, you are free to create your own user controls. Web Forms are designed to make building web-based applications as easy as building Visual Basic applications
ASP.NET Architecture ASP.NET is based on the fundamental architecture of .NET Framework. Visual studio provide a uniform way to combine the various features of this Architecture.
Architecture is explained from bottom to top in the following: At the bottom of the Architecture is Common Language Runtime .NET Framework common language runtime resides on top of the operating system services. The common language runtime loads and executes code that targets the runtime. This code is therefore called managed code. The runtime gives you, for example, the ability for cross-language integration. .NET Framework provides a rich set of class libraries. These include base classes, like networking and input/output classes, a data class library for data access, and classes for use by programming tools, such as debugging services. All of them are brought together by the Services Framework, which sits on top of the common language runtime. ADO.NET is Microsofts ActiveX Data Object (ADO) model for the .NET Framework. ADO.NET is not simply the migration of the popular ADO model to the managed environment but a completely new paradigm for data access and manipulation. ADO.NET is intended specifically for developing web applications.
This is evident from its two major design principles: 1. Disconnected DatasetsIn ADO.NET, almost all data manipulation is done outside the context of an open database connection. 2. Effortless Data Exchange with XMLDatasets can converse in the universal data format of the Web, namely XML. The 4th layer of the framework consists of the Windows application model and, in parallel, the Web application model. The Web application model-in the slide presented as ASP.NET-includes Web Forms and Web Services.
ASP.NET comes with built-in Web Forms controls, which are responsible for generating the user interface. They mirror typical HTML widgets like text boxes or buttons. If these controls do not fit your needs, you are free to create your own user controls.
Web Services brings you a model to bind different applications over the Internet. This model is based on existing infrastructure and applications and is therefore Standard- based, simple, and adaptable.
Web Services are software solutions delivered via Internet to any device. Today, that means Web browsers on computers, for the most part, but the device-agnostic design of .NET will eliminate this limitation.
The CLR and the .NET Frameworks in general, however, are designed in such a way that code written in one language can not only seamlessly be used by another language. Hence ASP.NET can be programmed in any of the .NET compatible language whether it is VB.NET, C#, Managed C++ or JScript.NET.
Components of .net framework
Common Language Runtime
The.NET Frameworks solution is called the Common Language Runtime (CLR). The CLR provides capability such as memory management, security and robust error handling to any language that work with the .NET Framework.
The CLR enables languages to interoperate with one another. Memory can be allocated by code written in one language and can be freed by code written in another language. Similarly errors can be raised in one language and processed in another language.
.NET Class Library
The.NET Framework provides many classes that help developers re-use code that .NET Class library contain code for programming topics such as threading , File I/O, database supports, XML parsing and data structure such as stacks and queues.
This entire class library is available for any programming languages that support the .NET Framework.
ASP.NET Environment
Active Server Pages were released by Microsoft to enable the creation of dynamic pages based on user input and interaction with the website.ASP.NET improves upon the original ASP by providing code-behind.
With ASP.NET and code-behind, the code and HTML can be separated.ASP.NET web services are XML - based services that are exposed on the internet that can be accessed by other web services and web services clients.
ADO.NET ADO introduced a simple object model that made accessing data in MS Windows program a straight - forward task in addition; ADO introduces the concept of disconnected record sets as way to transport data between the tries of distributed applications.
The low level API behind ADO is called OLE DB.ADO.NET. It was designed with the disconnected data in mind, because this stateless approach works best for distributed internet applications.
ADO.NET contains two set of similar classes. One set is a generic set of classes that can be used to access all databases that have OLEDB provider and a set of classes for Microsofts SQL Server.
ADO.NET Components
The ADO.NET components have been designed to factor data access from data manipulation. There are two central components of ADO.NET that accomplish the dataset, and the .NET data provider, which is a set of components including the connection command, Data Reader, and Data Adapter Object.
The ADO.NET Dataset is the core component of the disconnected architecture of ADO.NET. The dataset is explicitly designed for data access independent of any data source.
Web Services Web services are small units of code built to handle a limited task. Web services uses XML based communicating protocols. Its operating systems are independent. And programming languages also independent. Its connecting the people, system, and devices. Web services use the standard web protocols HTTP, XML, SOAP, WSDL, and UDDI. Benefits of Web Services
Easy to communicate between the application. Easy to reuse existing system. Rapid development. Easier to distribute information to more consumers. It can create new possibilities for many business because it provides an easy way to a large number of consumers.
Important Features of ASP.NET
Robust database-driven Functionality
ASP.NET is purely object-oriented makes it very powerful. ASP.NET allows developers to develop web applications that interact with the database.
ADO.NET (ADO stands for Activex Data Objects) is especially launched for ASP.NET for handling all types of database related queries.
Faster Web Applications
ASP.NET Web applications are faster due to two reasons: compiled code and caching. Earlier, the code was interpreted into machine language when website visitor used to view the page. Caching is the storing of information in a non-physical media for speeding up the processing for the future use. Web pages that are commonly visited by end-users are cached for a predefined period of time to improve the performance of website.
Memory Leak and Crash Protection
Now developers need not bother about error like deadlocks and memory leaks because ASP.NET can automatically recover from these errors and your website always remains available to the end-users.
Memory leak is a situation in which a program component fails to release the memory when the memory is no longer needed it.
A deadlock is a situation where each out of the two or more processors is waiting for some other process in the group to finish first and thus none of the processors finishes ever.
Easy Deployment
Development of web applications in asp.net is quiet easy because the configuration information is of built-in type.
Multiple development Language support
Developers can write their code in different .NET languages for example Visual Basic, Visual C#, Visual J#, etc.
Difference between ASP and ASP.NET
ASP:
1. ASP is Interpreted language based on scripting languages like Jscript or VBScript.
2. ASP has Mixed HTML and coding logic.
3. Limited development and debugging tools available.
4 Limited OOPS support.
5. Limited session and application state management.
6. Poor Error handling system.
7. No in-built support for XML.
8. No fully distributed data source support.
ASP.NET:
1. ASP.NET is supported by compiler and has compiled language support.
2. Separate code and design logic possible.
3. Variety of compilers and tools available including the Visual Studio.NET.
4. Completely Object Oriented.
5. Complete session and application state management.
6. Full proof error handling possible.
7. Full XML Support for easy data exchange.
8. Fully distributed data source support.
Reason for Selecting the ASP.NET
Web applications created with ASP.NET are easier to create, debug, and deploy because those tasks can all be performed within a single development environment Visual Studio .NET. Executable portions of a Web application compiled so they execute more quickly than interpreted scripts. On-the-fly updates of deployed Web applications without restarting the server. Access to the .NET Framework, which extends the Windows API.
Use of the widely known Visual Basic programming language, which has been enhanced to fully support object-oriented programming. Introduction of the new Visual C# programming language, which provides a type-safe, object-oriented version of the C programming language. Automatic state management for controls on a Web page (called server controls) so that they behave much more like Windows controls. The ability to create new, customized server controls from existing controls. Built-in security through the Windows server or through other authentication/authorization methods. Integration with Microsoft ADO.NET to provide database access and database design tools from within Visual Studio .NET. Full support for Extensible Markup Language (XML), cascading style sheets (CSS), and other new and established Web standards. Built-in features for caching frequently requested Web pages on the server, localizing content for specific languages and cultures, and detecting browser capabilities. BACK END USED
Microsoft SQL Server used as back end tool.
Microsoft SQL Server 2005
Microsoft SQL Server is an application used to create computer databases for the Microsoft windows family of server operating system. It provides an environment used to generate databases that can access workstations, the web or other media such as a Personal Digital Assistant (PDA).
Microsoft SQL Server is a probably the most accessible and the most documentation enterprise database environment right now. The following is a list of the features provided in SQL Server 2005.
User-defined functions Indexed views Distributed partitioned views Cascading RI constraints Multiple SQL Server instances XML support
User-Defined Functions
SQL Server has always provided the ability to store and execute SQL code routines via stored procedures. In addition, SQL Server has always supplied a number of built-in functions. Functions can be used almost anywhere. An expression can be specified in query.
SQL Server 2005introduces the long-awaited support for user-defined functions. User-defined functions can take zero or more input parameters and return a single value like the system-defined functions, or a table result.
Table valued functions can be used anywhere. Table or view expressions can be used in queries, and they can perform more complex logic than is allowed in a view. Indexed Views
Views are often used to simplify complex queries, and they can contain joins and aggregate functions. However, in the past, queries against views were resolved to queries against the underlying base table, and any aggregates were recalculated each time you ran a query against the view.
Indexed views can improve performance for the following types of queries:
Joins and aggregate that process many rows. Join and aggregation operations that performed frequently with in many queries. Decision support queries that rely on summarized, aggregated data that is infrequently updated.
Distributed partitioned views
SQL server 7.0 provided the ability to create partitioned views using the UNION ALL statement in a view definition. It was limited, however, in that all the tables had to reside within the same SQL Server where the view was defined. SQL Server 2005expands the ability to create partitioned views by allowing to horizontally partition tables across multiple SQL Servers.
The features helps to scale out one database server to multiple database servers, while making the data appear as if it comes from a single table on a single SQL Server. In addition, partitioned views are now able to be updated.
Cascading RI Constraints
In previous versions of SQL Server, referential integrity (RI) constraints were restrictive only. If an insert, update, or delete operation violated referential integrity, it was aborted with an error message.
SQL Server 2005 provides the ability to specify the action to take when a column referenced by a foreign key constrain is updated or deleted. You can still abort the update or delete if related foreign key records exist by specifying the NO ACTION option, or you can specify the new CASCADE option, which will cascade the update or delete operation to the related foreign key records.
Multiple SQL Server Instances
Previous versions of SQL Server supported the running of only a single instance of SQL Server at a time on a computer.
Running multiple instance or multiple versions of SQL Server required switching back and forth between the instances, requiring changes in the Windows registry. (The SQL Server Switch provides with 7.0 switches between 7.0 and 6.5 performed the registry changes for us.)
SQL Server 2005 provides support for running multiple instances of SQL Server on the same system. This allows you to simultaneously run one instance of SQL Server 6.5 or 7.0 along with one or more instances of SQL Server 2005.
Each SQL Server instance runs independently of the others and has its own set of system and user databases, security configuration and so on. Applications can connect to the different instance in the same way they connect to different SQL Servers on different machine.
XML Support
Extensible Markup Language has became a standard in web-related programming to describe the contents of a set of data and how the data should be output or displayed on a web page. XML, like HTML, is derived from the Standard Generalize Markup Language (SGML).
When linking a web application to SQL Server, a translation needs to take place from the result set returned from SQL Server to a format that can be understood and displayed web applications. Previously, this translation needed to be done in a client application.
SQL Server 2005 provides native support XML. These new features provide the ability to do the following:
Return query result sets directly in XML format.
Retrieve data from an XML document as it were a SQL Server table.
Access SQL Server through a URL using HTTP. Through Internet Information Services (IIS), you can define a virtual root that gives you HTTP access to the data and XML functionality of SQL Server 2000.
The features of the SQL Server 2005 It is a client-server architecture and not shared-file application as access.
Symmetric Multiprocessing (SMP) supports up to 32 simultaneous processors.
It can have database up to 1 terabyte (1024 GB) in size.
It can handle up to 32,767 simultaneous user connections.
It provides data integrity, data recovery and functionalities that are transparent to the developer.
SQL Server optimizes network resources. Only the data requested by the client needs to be sent across the network.
Security can be enforced at ones central location.
Benefits of SQL
SQL has become the database language of choice because it is flexible, powerful and easy to learn.
SQL is a non-procedural language.
Process sets of records rather than just one at a time and provides automatic navigation to the data.
SQL provides commands for a variety of tasks including: querying data, creating, updating and replacing and inserting, updating and deleting rows.
All major relational database management systems support SQL thus one can transfer all the skills gained with SQL from one RDBMS to another.
2. SYSTEM STUDY 2.1 EXISTING SYSTEM There is no specific tool in past developed for software developers to solve the issues while on developing application. In the existing system, there are limitations like inconsistency of data, lots of repetitive paper work and time consuming reference work. This haphazard fashion in maintenance leads to the problem of integrating the various departments. In general login request by the alternative user is very long process. They should wait for an hour it has lots of inconsistency 2.1.1 DRAWBACKS Have minimum level of security This transaction procedure has huge process and takes long time for virtual access Expensive for start-up level companies Lots of time is waste for wait for login. Analysis of trusted alternative user is long process. Alternative employees work as well as alternative work both are pending in few hours.
2.2 PROPOSED SYSTEM To overcome some of the pitfalls in existing system, this proposed system has been developed after careful study, as well as compared with existing system. Demerits in the existing system analyzed and checked carefully, and then we found solutions for those problems. The proposed system integrates SMS gateway model in account accessing and transaction module. To authenticate only the right person to access their online accounts, the registration process stores the users IP address from account activation machine. In login request process the administrator will be tested initially and the SMS will be sent if the user found to access rights for some others machines. 2.2.1 FEATURES High level of security is available. Authenticated employee only can be allow to access for absence of other employee. Time based login id only allowed for the alternative user access. Alternative worker do both the work on online. Response of login id from admin is fast access. Alternative employees all job of allocated works is always monitored by admin. All the work is reported to the whether they absent.
3. SYSTEM DESIGN AND DEVELOPMENT 3.1 INPUT DESIGN Internal design involves conceiving, planning out and specifying the internal structure and processing details of the software product. The goals of internal design are to specify the internal structure and processing details, to record design decisions and indicate why certain alternatives and tradeoffs were chosen, to elaborate the test and plan, and to provide a blueprint for implementation, testing and maintenance activities. The work products of internal design include a specification of architectural, the details of algorithms and data structures, and the test plan. Login form In this login form can allow the authorized person for entering and checking a reporting process. It can block the unauthorized access from this page. Employee Entry Details: The employee details must have some basic information regarding the customer like, employee id, employee name, and address and phone number and to details for future reference. This will be associated with employee entry. Branch entry Various branch information can be provided for branch availability employee allocation section. The main branches are recorded here for number of branches, number of employee available in each branch, the location of branch and so on. 3.2 OUTPUT DESIGN Computer output is the most important and direct information source to the user. Put it designs is a process that involves designing necessary outputs in the form of reports that should be given to users according to the requirements. Efficient, intelligible output design should improve the systems relationship with the user and help in divisions making. The details in the reports must be simple descriptive and clear to the user. So while designing output the following things are to be considered.
Employee Request details In this form shows the details of request available details for the accessing or for processing purpose. Session details In this form the admin can watch their allocated details of alternative login account information for authentication and integrity purpose. 3.3 DATABASE DESIGN The database design involves creation of tables. Tables are represented in physical database as stored files. They have their own independent existence. A table consists of rows and columns. Each column corresponds to a piece of information called field. A set of fields constitutes a record. The record contains all the information, specific to a particular item. Database is a collection of interrelated data, stored with minimum redundancy to serve many users quickly and efficiently. The database is organized, normalized in order to provide flexible manipulation of the files and quick retrieval of information. Database is designed as user friendly and easy access. The organization of the data in a database aims three major objectives namely data integration, data integrity and data dependence. The major objectives for maintaining such a database are: The database must reduce redundancy Enforce standards Share data and maintain integrity The data must be independent and consistent We must be able to apply security restrictions
Table: User Login Foreign Key: user_login_id
Field Name Data Type Size Description User_Login_ID numeric 12 Login ID User_Password varchar 20 User Password User_Level numeric 2 User Role User_Login_IP char 15 Users Login IP Address User_Last_Login smalldatetime 4 Users last Login Date User_Creation_Date smalldatetime 4 User Creation Date
Primary Key: req_id Foreign Key: user_login_id
Field Name Data Type Size Description Req_ID Numeric 12 Requests ID User_Login_ID Numeric 12 Login ID Req_Date Smalldatetime 4 Request Date Req_For text 50 Reason for Request Req_MobileNumber vrchar 50 Requester Mobile Number Req_Status varchar 10 Request status
3.4 SYSTEM DEVELOPMENT Methodology is defined as, The analysis of the principles of methods, rules, and postulates employed by a discipline The systematic study of methods that are, can be, or have been applied within a discipline or A particular procedure or set of procedures It should be noted that methodology is frequently used when method would be more accurate. For example, "Since students were not available to complete the survey about academic success, we changed our methodology and gathered data from instructors instead". In this instance the methodology (gathering data via surveys, and the assumption that this produces accurate results) did not change, but the method (asking teachers instead of students) did. Methodology includes the following concepts as they relate to a particular discipline or field of inquiry: A collection of theories, concepts or ideas; Comparative study of different approaches; and Critique of the individual methods Methodology refers to more than a simple set of methods; rather it refers to the rationale and the philosophical assumptions that underlie a particular study. This is why scholarly literature often includes a section on the methodology of the researchers. This section does more than outline the researchers methods (as in, We conducted a survey of 50 people over a two-week period and subjected the results to statistical analysis, etc.); it might explain what the researchers ontological or epistemological views are. Another key (though arguably imprecise) usage for methodology does not refer to research or to the specific analysis techniques. This often refers to anything and everything that can be encapsulated for a discipline or a series of processes, activities and tasks. Examples of this are found in software development, project management and business process fields. This use of the term is typified by the outline who, what, where, when, and why. In the documentation of the processes that make up the discipline, that is being supported by "this" methodology, that is where we would find the "methods" or processes. The processes themselves are only part of the methodology along with the identification and usage of the standards, policies, rules, etc. 3.4.1 MODULE DESCRIPTION a. Registration b. Upload File c. Admin Module d. TPA Module e. Download f. Key Generation Registration: This module is used to store the Customer Registration Details. The Registration details includes user name, password, address, phone number, E-mail, etc.. The verification code will be send to the customer mail id for authentication purpose. When the customer wants to enter this system he must enter this code. Upload File: This module is used to upload files to the cloud server on any time. When uploading the file the secret will be generated by using keygen algorithm. Each uploaded files will have unique key and this key is forwarded to the user registered mail id. Admin Module: The administrator is a primary user called as cloud owner. He will manage the entire application and storage device .He can monitor the entire files and users stored on the server at any time. But he cannot download user files without user permission. He can view files and content at any time but he cannot download file without user acceptance.If he want to download the file he will send the request information to the user through this system. After the response from the user only he can download the file because of privacy. TPA Module: The third party auditor is a user who verify the users and files stored on the cloud. He can audit those things but he cannot view the content or download the files stored on the cloud. The auditing is classified into two categories 1. Batch Auditing Module: With the establishment of privacy-preserving public auditing in Cloud Computing, TPA may concurrently handle multiple auditing delegations upon different users requests. The individual auditing of these tasks for TPA can be tedious and very inefficient. Batch auditing not only allows TPA to perform the multiple auditing tasks simultaneously, but also greatly reduces the computation cost on the TPA side. 2. Data Dynamics Module: Hence, supporting data dynamics for privacy-preserving public risk auditing is also of paramount importance. Now we show how our main scheme can be adapted to build upon the existing work to support data dynamics, including block level operations of modification, deletion and insertion. We can adopt this technique in our design to achieve privacy-preserving public risk auditing with support of data dynamics.
Download: It is used to download files But without secret key this system will not allow download the file. Key Generation: It is used to generate the secret key by using keygen algorithm and swill send to the personal mail is of the user. The secret key is must for uploading and download files on the cloud server.
BIBLIOGRAPHY
Reference books Greg Black ZRK ASP.NET Developer Guide, Fifth Edition, Addition Weslay Publication. Stephen Walher ASP.NET Unreleased Galgotia Publications, second Edition Janathan Gordyear Debugging in ASP.NET First Edition, BPB Publications. Roger S.Pressman,Software Engineering, Tata Mc Graw-Hill, 2000, Fifth Edition. Ellias M.Award,System Analysis and Design Galgotia Publications PVT Ltd 1997, Second Edition. NITTs Education Research and Development Group, Structured System Analysis and Design, Pace Education PVT Ltd 1993 Edition. Davin Reader Master SQL Server 2000 Third Edition BPB Publications.
Web sites www.aspdotnettutorials.com www.dotnetheaven.com www.sqlserver.com
APPENDIX A. DATAFLOW DIAGRAM
Level 0
Level 1
Admin Cloud Users Sharing Document Data sharing process in cloud Admin
Login View Users
View Group Files
User Details Files Details
TPA
Login
KeyRequestDb Download and Verify File
File Verification Download File View Files
File Details
Key Request
Cloud User
Login
Upload files
Files Send Key to user Mail
View Files
Files Input System
Download Files
Verify & Download
B. SYSTEMFLOW DIAGRAM Login User Exists Create Account No Authenticated User Key Generation Yes No Upload Files Download Files Display The Files Store into image Database Store into File Database Yes