You are on page 1of 51

SECURE PHOTO SHARING IN SOCIAL NETWORKS

ABSTRACT
Nowadays, in a ubiquitous world where everything is connected to the Internet
and where social networks play an important role in our lives, security and
privacy is a must. Billions of pictures are uploaded daily to social networks and,
with them, parts of our private life are disclosed. In this work, we propose a
practical solution for secure photo sharing on social network with independence
of its architecture which can be either centralised or distributed. This solution
solves the inconsistencies that appear in distributed social network as a
consequence of treating photos and access policies separately. Specifically, we
solve this open problem by attaching an access policy to the images and thus,
each time a photo is re-shared, the access policy will travel together with the
image.
SECURE ATM CARD USING BIOMETRIC IN MOBILE
TECHNOLOGY
An autonomous atm host has a right to use any bank. There is no safety
measures layer is implemented in the atm card except for pin number. It is very
expensive for the bank to scanner. We supervise the position of the atm usage,
time taken for the user to accessing the atm machine, sequence of events
processed by the user and expected amount of withdrawal by the user. These
entire factors are verified for the verification rationale of the user along with
atm scanning and biometric confirmation. If any of the above said, parameter
are differing and then the link is generated to the user’s mobile number for
further more secure authentication system. In the modification phase, an
automation user internet (bank server) recognition model using mobile is
designed to enhance the user comfort and detection of the time span spend by
the user in the atm machine.
ANTICIPATED SECURITY MODEL FOR SESSION TRANSFER AND
SERVICES USING OTP

Internet safety measures is a branch of computer sciences often involving


browser security, system safety measures, and application and functioning
systems to keep the internet as a protected channel to swap in order by sinking
the risk and attacks. There are figures of studies that have been conducted in
this field consequential in the growth of various safety measures models to
attain internet safety measures. However, episodic safety measures information
and earlier studies show that the most protected systems are not resistant from
risk and much attempt is necessary to get better internet safety measures. This
paper planned an effortless safety measures representation to progress internet
applications defence and services protections, particular admittance control,
cryptographic, cookies and session managements, defence programming
practices, care for security from early stage on expansion life cycle.
PREDICTING USER BEHAVIOUR THROUGH SESSIONS USING THE
WEB MINING

It is the method to extract the user sessions from the created session file. And
depending on the sessions created the user behaviour is predicted by displaying
them most visited page or the product. Usability is defined as the satisfaction,
efficiency and effectiveness with which specific users can complete specific
tasks in a particular environment. This process includes 3 stages, namely Data
cleaning, User identification, and Session identification. In this paper, we are
implementing these three phases. Depending upon the frequency of users
visiting each page mining is performed. By finding the session of the user we
can analyze the user behaviour by the time spend on a particular page.
TRUSTWORTHY CONVEY FOR SENSOR NETWORKS WITH
MOBILE SINK

The vehicles speed to prevent crashes occurrence and reduce the impact when
they occur, lessening the severity of injuries sustained by the victims. I propose
a modern and an efficient methodology for detecting and reporting illegal
speeds. The system alerts the driver if he exceeded the allowed speed limit. An
infraction is reported against him if he didn’t slow down within a predefined
amount of time. The infractions are sent to a central database and are displayed
in a webpage. The system was implemented in a local network, so an ethernet
cable sufficed for the communication purpose. Over speeding has been
identified as a major cause for traffic accidents. The accidents due to high speed
result in crashes, dangerous injuries and death.
A CROWD SOURCING WORKER QUALITY EVALUATION
ALGORITHM ON MAP REDUCE FOR BIG DATA APPLICATIONS
Crowd sourcing is a new emerging distributed computing and business model
on the backdrop of internet blossoming. With the development of crowd
sourcing systems, the data size of crowd sources, contractors and tasks grows
rapidly. The worker quality evaluation based on big data analysis technology
has become a critical challenge. This paper first proposes a general worker
quality evaluation algorithm that is applied to any critical tasks such as tagging,
matching, filtering, categorization and many other emerging applications,
without wasting resources. Second, we realize the evaluation algorithm in the
.net platform using the map reduce parallel programming model. Finally, to
effectively verify the accuracy and the effectiveness of the algorithm in a wide
variety of big data scenarios, we conduct a series of experiments. The
experimental results demonstrate that the proposed algorithm is accurate and
effective. It has high computing performance and horizontal scalability. And it
is suitable for large-scale worker quality evaluations in a big data environment.
AUTHENTICATED DATA EXCHANGE WITHOUT KEY PROTOCOLS
FOR PARALLEL NETWORK FILE SYSTEMS

Information division in the cloud is a practice that allows users to expediently


right to use information in excess of the cloud. The data possessor outsources
their information in the cloud owing to cost decrease and the huge conveniences
provided by cloud services. Data possessor is not able to control over their data,
since cloud service provider is third party provider. The major crisis with data
division in the cloud is the seclusion and safety measures issues. Data possessor
has lot of information on the cloud it should be categorized depends on
important of data. In third party user request data possessor, to right to use a
cloud it division a otp key to right to use cloud data within a duration they can
get data, if secret file means third-party fling request to data possessor, through
mail. Data possessor recognizes the request then only third party right to use the
data. This paper proposes a technique that allows user to accumulate and right
to use the data firmly from the cloud storage.
RANSOMWARE: CURRENT TREND, CHALLENGES, AND
RESEARCH DIRECTIONS
Ransom ware attacks have become a global incidence, with the primary aim of
making monetary gains through illicit means. The attack started through e-mails
and has expanded through spamming and phishing. Ransom ware encrypts
targets’ files and display notifications, requesting for payment before the data
can be unlocked. Ransom demand is usually in form of virtual currency, bit
coin, because it is difficult to track. In this paper, we give a brief overview of
the current trend, challenges, and research progress in the bid to finding lasting
solutions to the menace of ransom ware that currently challenge computer and
network security, and data privacy.
SECURE FINE GRAINED SCRUTINIZE DATA IN CLOUD
Cloud computing, outsources the encrypted sensitive data to multiple fog nodes
to decrease latency and network congestion. However, the existing cipher text
retrieval schemes rarely focus on the fog computing environment and most of
them still impose high computational and storage overhead on resource-limited
end users. Fog computing by extending cipher text-policy attribute-based
encryption (CP-ABE) and searchable encryption (SE) technologies, which can
achieve fine-grained access control and keyword search simultaneously. The
LFGS can shift partial computational and storage overhead from end users to
chosen fog nodes. Furthermore, the basic LFGS system is improved to support
conjunctive keyword search and attribute update to avoid returning irrelevant
search results and illegal accesses.
E-PETITION SYSTEM

This application will help the common people under the jurisdiction of a
municipal corporation to register their grievances about day to day problems in
their ward through a mobile application. It will provide a common man to
deliver his complaints and problems to municipal authority as well as let the
municipal authorities to address the problem in a short period of time. This
application provides an interface to register one’s complained and follow it up.
It provides a camera module which helps clicking up a picture of any problem
that people are facing and upload its image along with the complaint.
ONLINE PRISONERS MANAGEMENT SYSTEM

Automated prison management system is the collection of register cases for


each prisoner entering the prison for automated release diary generator. A good
system for prison service should be automated, because it enhances the
administrative and experience to design, develop and implement a prison
management system for prison defence and security. 
In spite of the benefits of the use of computer to provide timely and accurate
information, which is absent in most of Nigeria prison, it is not all problem
arises as to how computer can be utilize that is programmed to achieve desire
result. The introduction of computer has brought many changes to various
fields, such as prison, health sector, hotel, and bank and in business sector
generally. Just because it helps to carry out complex and lengthy analytical
operation very rapidly to effective communication system, it is also time saving,
versatile, flexible storage of large information and reduce human labour.
ONLINE VOTING SYSTEM

Fingerprint based voting project is an application where the user is recognized


by his finger pattern. Since the finger pattern of each human being is different,
the voter can be easily authenticated. The system allows the voter to vote
through his fingerprint. Finger print is used to uniquely identify the user. The
finger print minutiae features are different for each human being. Finger print is
used as a authentication of the voters.
Voter can vote the candidate only once, the system will not allow the
candidate to vote for the second time. The system will allow admin to add the
candidate name and candidate photo who are nominated for the election. Admin
only has the right to add candidate name and photo who are nominated. Admin
will register the voters name by verifying voter. Admin will authenticate the
user by verifying the user’s identity proof and then admin will register the voter.
The number of candidate added to the system by the admin will be
automatically deleted after the completion of the election.
Admin has to add the date when the election going to end. Once the user has got
the user id and password from the admin the user can login and vote for the
candidate who are nominated. The system will allow the user to vote for only
one candidate. The system will allow the user to vote for one time for a
particular election. Admin can add any number of candidates when the new
election will be announced. Admin can view the election result by using the
election id. Even user can view the election result.
EMPLOYEE MANAGEMENT INFORMATION SYSTEM FOR
COLLEGE
This project entitled “employee management system” has been designed
towards improving the management of employee information in the field. It
maintains seniority, leave records, transfer & postings and other basic
information of employee. Various mis reports can be generated through it viz.
leave order, seniority list, vacancy position and cr status etc. It is a web-based
application; it will be accessed simultaneously from many fields. Field offices
are supposed to enter information of employee of their region. This information
is compiled and used at headquarter level for mis purposes.
ELECTRONIC COMPLAINT MANAGEMENT SYSTEM FOR
MUNICIPAL CORPORATION
This project mainly focuses on sanitation and development of a municipal
corporation. To make it possible, the people who belong to the municipal
corporation are provided with an opportunity of raising a complaint regarding
any issue that take place in their locality. The issues are garbage management,
water supply, electricity management, road repairs or layering of roads and
threatening of animals. To raise the complaints through electronic complaint
management system (ECMS) for municipal corporation regarding the above
categories, a simplified solution is designed where the different type of
complaints made by people are integrated.
POLICE E- COMPLIANT MANAGEMENT SYSTEM
E-police system is an e-government related service and it makes the
communication process a possibility, a great success for modern era which
increases the professional efficiency for the government police administration.
In this paper we focus on the infrastructure of an e-police system as well as its
steps, challenges of implementation and its necessity. E-police is intended to
provide total computerized information system support for the work of the
police. This system registers the complaints from people through online and is
helpful to the police department for further process. The aim of this project is to
develop an e-police reporting and management system which is easily
accessible to the public, police department and the administrative department.
E-police would also help provide division heads and senior officers with
management information about crime control, and about administration and
support services such as accounting and personnel management. This helps to
higher authorities of police to have an overview about the progress of the
investigation; feature is made available to public for interaction with police
indirectly.
AUTOMATED POLICE INFORMATION SYSTEMS
A police information system consists of people, computer equipment and
related programs, a dynamic data base, and institutional procedures interacting
in a prescribed systems pattern. It is designed to collect, store, update, and
facilitate the automated use of data on a continuing basis. Such data and its
processing and analysis are related to both the internal affairs of the police
organization and the external environment. The manifold purposes of such an
information system are to meet operational requirements; to facilitate various
summarizing or analytical techniques relevant to the definition of community
problems; to assist the search for program goals; to generate cybernetic flows
for evaluation and control; and to permit the exchange of information among
governmental units (other law enforcement agencies, criminal justice agencies,
and non-law enforcement government organizations) and with the public.
VEHICLE INSURANCE AUTOMATED SYSTEM

Insurance management system project is implemented in java platform using


oracle as backend application. Main aim of this project is to develop an online
application for insurance company to atomize work procedure, using these
system agents and policy holders can know details about present policies,
schemes, policy specifications, terms and conditions on policy, policy
registration by the customers. Agent’s commission is based upon customer
policy registration and target agent achieves for every month or year. This
system maintains information of branch managers who can deal with agents and
customers. In existing system manual procedure is followed where records are
used to maintain data which is a time taking process and require more man
power and calculating commissions dues...etc are done manually. In present
system there is no need of human interference in calculating any details. Total
work is done using management system which will save time and less paper
work and even human resource.
AGRI INFORMATION SHARING USING ANDROID
So, the paper presented here suggest various ways in which a farmer can utilize
mobile computing (mc) on their handsets using application called “agri info”, to
assist them for relatively better cultivation and merchandise. The main
awareness of this work is focused on indian farmers as it addresses the key
problems of getting the market updates of different products, weather updates
and information about the rain and also provides multiple language support.
This will effectively help farmers to sell their product in global market and earn
remarkable profit. Hence, this framework uses mc, which in effect, puts power
into a farmer’s hand. The experimental setup uses tools like android sdk. In this
research an android based mobile devices are used for testing.
SECURE YOUR DATA USING ANDROID APP

Android has the biggest market share among all Smartphone operating
system. Security is one of the main concerns for Smartphone users today. As the
power and features of Smartphone’s increase, so has their vulnerability for
attacks by viruses etc. Perhaps android is more secured operating system than
any other Smartphone operating system today. Android has very few
restrictions for developer, increases the security risk for end users. In this paper
we have reviewed android security model, application level security and
security issues in the android based Smartphone.
A COLLEGE CAMPUS RECRUITMENT SYSTEM

A college campus recruitment system that consists of a student login, company


login and an admin login. The project is beneficial for college students, various
companies visiting the campus for recruitment and even the college placement
officer. The software system allows the students to create their profiles and
upload all their details including their marks onto the system. The admin can
check each student details and can remove faulty accounts. The system also
consists of a company login where various companies visiting the college can
view a list of students in that college and also their respective resumes. The
software system allows students to view a list of companies who have posted
for vacancy. The admin has overall rights over the system and can moderate and
delete any details not pertaining to college placement rules. The system handles
student as well as company data and efficiently displays all this data to
respective sides.
CIVIL REGISTRY

A critical problem which characterizes developing countries is the


implementation of an EFFECTIVE CIVIL REGISTRATION SYSTEM. The
primary objective of this web site is to give awareness about the government or
legal documents and its registration details as well as to help to register or apply
for those documents. This also acts as a consultancy agency to assist the public.
The main purpose of the web site is to reduce the effort by the candidate and
save his time and avoid unwanted rushes at the government offices and assure a
smooth working schedule at government offices. The project civil registry still
requires more development of it solutions and its applications to improve the
issuance of copies of government certificates and legal documents. Civil
registry team trying to get more affiliation to government offices and
departments. Now civil registry team acting as an agency to help the public.
COLLEGE SOCIAL WEBSITE

This paper discusses about the project implementation of social networking site
for teaching and learning purposes. The type of social space available to users
can provide a more personalized and interactive experience for educative
purpose. The growing demand of engineers in the industry makes it very
important for the students to know about the practical use of technologies that
are taught in the college and also to know about the latest technology and
projects that the industry works with. Thus, a platform where students can
interact with the industry professionals would prove to be a great benefit for
them. In this project a social networking site exclusive for the college has been
created whereby students, faculty and selective people from the industry would
be able to socialize and share their knowledge. Also it would be a hub to share
information about all the ongoing activities in the college campus. This paper
describes the features implemented in this project and presents a glimpse of how
the website works.
DATA TRANSFER WITHOUT NET

This paper is about sending data without using internet or Bluetooth because
these days Smartphone’s acquiring the whole world via android OS where one
uses apps to fulfill their needs. But for sending SMS or data either they will
have to send message by normal manner or by using e-mail or apps. This
application works on the same paradigm as e-mail does. What happen if internet
balance get finished unfortunately at that time when he or she is in great need of
that, than one can’t send data from any app , at that time this app can be proved
to be a boon for the person, sometimes government has to send guidelines via e-
mail to their employees, villagers etc. Or any catastrophe occurs than doctors
could help the people by sending guidelines where mostly internet connection
not available at that point of time this app can be fruitful and one can send files
through SMS to remote area also. With this low-cost application a user can send
attached file like .txt, .pdf, .doc etc. With maximum characters as compared to
normal SMS. This paper proposes a SMS application through which a user can
attach a file from the sd-card (retrieve) just like e-mail and send it to the
recipient to the remote area. And nominal charge will be deducted from the user
who sends data to the recipient.
ONLINE MISSING VEHICLE TRACKING SYSTEM

Online missing vehicle tracking system application for police department


project provides knowledge about the latest technology in developing
application, this application has to web enabled application and it provides more
knowledge about client server technology how they are communicating in a
sufficient manner. Thousands of automobiles are missing every year, usually
these automobiles recovered by police, actually the problem is to find the lost of
vehicle was totally change. The police have to be tried to trace out actual
owners of vehicle by considering RTO based license and chassis number. But
this ia a lengthy process time consuming is very high to check the records of
RTO, because of this delay the vehicles are reached to their owner has taking
long-time.
ONLINE EXAM FOR LICENSE
Technology has supported online examinations successfully for a number of
years, and has progressively enhanced the online examination process over the
years. However, some company’s particularly public tertiary offices in
developing countries are still involved in the conventional manual system of
writing examination. This manual system of writing examination has a lot of
demerits. The manual process of taking examinations is not only time-
consuming and tedious, but cumbersome, hence the need for a better, faster and
more reliable means of examining applicants. The objective of this paper is to
provide a report on the implementation of a web-based examination system for
RTO office purpose of license test.
PC AND LAPTOP CAN BE CONTROLLED FROM REMOTE PLACE
WITH SMARTPHONE
This paper represents how your pc and laptop can be controlled from remote
place with smartphone using internet. It basically turns your smart phone into
wireless keyboard and mouse with touchpad. This application can be performed
with some wireless connection between the pc or laptop and the Smartphone
with android operating system. By accessing the ip address of pc, we can
establish a connection between them using wi-fi connection. This application
not only turns your Smartphone into wireless keyboard and mouse but it also
provides various other features including voice to text conversion. The
implemented application consists of two parts; the first one is an application for
android Smartphone and the second one is a server application that executes the
command selected by user’s application. The outcome of this implementation is
a handy, easy-to-use application.
RESULT ALERT THROUGH EMAIL

With the advent of mobile network communication system, users have been
offered lots of services such as ability to send multimedia messages like sms,
video, data files, images etc. This paper describes the design and
implementation of a system (result alert system) that conveniently provides
examination results to students with the use of email and sms technology via
their mobile phones and devices. Mobile phones and devices are necessary
assets, most especially to students as it makes communication and the spread of
information a lot easier.
SEARCH ENGINE FOR USER ENHANCEMENT

Search engine optimization (seo) is important for websites to improve the rank
for search results and get more page views requested by the user. This search
engine ranks provide the better and optimized result to user, which will help
them to view the popular page among the number of pages available in the
search results. Apart from this search engine ranking, it also enables the
websites to compete with other rival’s website as each and every website owner
expect to see their own website on the list before other’s websites. This paper
puts forward idea about seo principles and basic strategies. It also expresses
different techniques that are employed by search engines to improve its results.
Also it presents the observation section, which gives the comparative analysis of
seo techniques. Update concepts sent to concern seo search member.
SIGN BOARD DETECTION IN ROADWAYS

Very often we see many road accidents taking place, which could be due to
many reasons like drivers ignorance of seeing the signboard, invisible sign
board during bad weather conditions or even due to the damaged signboards.
Road signboard information system is one such approach where the driver gets
the information about the upcoming hurdles. At night time and even during fog
and rainy season it is difficult for the driver to keep track of signboards .one
such solution for these problem is the road signboard information system, where
in image is displayed in the android app and voice alert system helps the driver
to concentrate on the road without even worrying about the signboards.
 ANDROID BASED ATTENDANCE SYSTEM USING SESSION OTP

Students are the important part of the institution that matters. The attendance of
the students is also as important. It is the factor that matters a lot to the people in
their career. There are situations where students need to struggle if there is
shortage of attendance. It might go the extreme level also. There have been
technologies that have been introduced in order to reduce the work of the
faculties. Even the pen paper method of taking attendance can be reduced.
The android based attendance system using session otp is an application that
will allow the user to mark the attendance based on the otp sent. This will help
in managing the attendance of students of the institutions in a well organized
way.
UID – (UNIQUE IDENTIFICATION)

Unique id management is an engineering project for which we provide flexible


and efficient way to provide the unique id in RTO. Our project on “unique id
management” provides the information about the citizen in any country. A
citizen has unique id to find out the personal information in each and every
department or service wherever a citizen goes. This information can be found
out by the unique id of the citizen. If any citizen wants to utilize the services or
utilities by the government, he has to go to each and every department with
different id for that particular department. In unique id the citizen will perform
the all rto details basing on id.
BLOOD AND ORGAN DONOR ONLINE

Blood and organ is an important aspect for all living things. It proves to be a
lifesaving component in case of emergency requirement. In this users can view
all the information provided. The main aim of developing this application is to
reduce the time to a great extend that is spent in searching for the right donor
and the availability of blood and organ required. As well as user can register
himself for his/her organ donation after his/her death to the needed ones.
E- BUS PASS REGISTER AND RENEWAL

Bus pass registration is useful for passengers who are facing problems with the
current manual work of bus pass registration and renewal. His/her renewal or
registration can be done through credit card. In the manual system the user has
to go on particular date and time if they fail then the renewal cannot be done.
This online bus pass registration application will help candidates to save their
time and renewal bus pass without standing in a line for hours near counters.
Initially uses need to register with the application by submitting their details
through online. The administrator will verify the candidate details and if they
are satisfied they will approve bus pass. The candidate can login with their
username and password and renewal is performed. The renewal process is
carried by paying the money using the credit card. The candidate can give their
valuable feedback for further enhancement of this project.
ANDROID BASED SUBURBAN TRAIN TICKET BOOKING SYSTEM

Sometimes instead of excessive waiting in the queue, people prefer to travel by


their own vehicle or sometimes they just cancel down their journey due to the
problems they have to face, for buying tickets only. Booking ticket via ticket
counter after killing time on the ticket window, may sometimes lead to missing
up of the train as well. A local train ticketing system project for local trains that
allows users to book local train tickets and get ticket receipt online. This local
train project provides login rights for normal users and admin. A normal user
may login and get a ticket online, print it and travel by train. The ticketing
process consists of a ticket booking form. The form allows the user to choose
his source and destination. The source is the station from where the user will be
boarding the train. Destination is the station he needs to get down at. The
project database is already filled with stations on mumbai western central and
harbor line. It can be modified for any other city as needed. The system also
consists of an option to select weather ticket is a single journey or a return ticket
and the journey will be commenced on first class or a second class. It also
consists of an admin account. The admin may recharge user account balance
and check for various journey tickets processed in the system.
AUTOMATIC TIME TABLE GENERATION USING ANDROID
Many colleges use manual way of preparing timetables with large number of
students is very time consuming. This usually ends up with various courses
clashing this may be either at same room or with same teachers having more
than one course at a time. These are just due to common human errors which are
very difficult to prevent in the processes. To avoid these problems people
usually taking the previous years’ timetable and modifying it but still it is a
difficult job to do incorporate changes. To overcome all these problems we
propose this system. This system will take various inputs like details of
students, subjects and classrooms and teachers available, depending upon these
input it will generate possible timetable, making the utilization of all of these
resources in a way that will best suit any of constrains of college rules.
CRIMINAL RECORDS FOUND

The proposed system applies to all police stations across the country and
specifically looks into the subject of crime records management. It is well
understood that crime prevention, detection and conviction of criminals depend
on a highly responsive backbone of information management. The efficiency of
the police function and the effectiveness with which it tackles crime depend on
what quality of information it can derive from its existing records and how fast
it can have access to it.

It is proposed to centralize information management in crime for the purposes


of fast and efficient sharing of critical information across all police stations
across the territory. Initially, the system will be implemented across cities and
towns and later on, be interlinked so that a police detective can access
information across all records in the state thus helping speedy and successful
completion to cases. The system would also be used to generate information for
pro-active and preventive measures for fighting crime.
SMART RATION SHOP SYSTEM USING BIOMETRIC
Report on a new approach on enhancing advancements in certain user
recognition applications which is to provide better ration systems with easy to
use user interface and payment features. The existing system uses smart cards
where we propose to use user recognition devices for authentication and
payment features for billing process.
 
TO NEAREST PLACES FINDER USING TRAJECTORY DATA
Report on a new approach on enhancing advancements in certain detection
applications which is to provide better efficiency using location awareness
system. The existing system provides uses clustering methods to find places
nearby but the proposed system allows the user to experience the places with
the help of pattern recognition and trajectory data calculations.
SMART FARE AND PASSENGER MANAGEMENT SYSTEM
Report on a new approach on enhancing advancements in certain user
recognition applications which is to provide better management system on
passenger and fare management using recognition devices for better
authentication with message notification for passengers. The existing system
allows only reservations but the proposed system enhances real time fare
management with dropping point notification to passengers.
ONLINE EXAM AUTHENTICATION SYSTEM USING FACE
RECOGNITION
Report on a new approach on enhancing advancements in certain user
recognition applications which is to provide better authentication using
recognition devices. The existing system provides authentication using
traditional username password fields but the proposed system allows facial
recognition for better authentication in the online system.
ATTRIBUTE BASED DATA TRANSFER WITH GENERAL POLICIES
With the popularity of cloud computing, there have been increasing concerns
about its security and privacy. Since the cloud computing environment is
distributed and untrusted, data owners have to encrypt outsourced data to
enforce confidentiality. Therefore, how to achieve practicable access control of
encrypted data in an untrusted environment is an urgent issue that needs to be
solved. Attribute-based methods provide authorization to parties based on
whether their set of attributes (e.g., name, mail id, mobile number, etc.) Fulfills
a policy. In this paper, we combine elements of abe and abcs together with
garbled circuits to construct attribute-based data transfer (abdt). Our focus is on
an interactive solution involving a client that holds a certificate (issued by an
authority) vouching for that client’s attributes and a server that holds a policy
computable on such a set of attributes.
CONTENT-BASED INFORMATION RETRIEVAL TECHNIQUES
Distributed information retrieval methods are growing rapidly because of the
rising need to access and search distributed digital documents. However, the
content based information retrieval (CBIR) is concentrated to extract and
retrieve the information from massive digital libraries, which require a huge
amount of computing and storage resources. The grid computing provides the
reliable infrastructure for effective and efficient retrieval on these large
collections. In order to build an effective and efficient cbir technique, varieties
of architectures were developed based on grid technologies. The goal of such
architecture is to solve interoperability and heterogeneous resource issues, and
increase the efficiency and effectiveness of information retrieval (IR)
techniques by harnessing the grid computing capabilities. This paper reviews
and analyzes latest research carried out in the domain of large-scale dataset IR
based on a grid. The evaluation is based on scalability, response time, scope,
data type, search technique, middleware, and query type. The contribution is to
illustrate the features, capabilities, and shortages of current solutions that can
guide the researchers in this evolving area.
SECURE INFORMATION SHARING USING STEGNOGRAPHY AND
CRYPTOGRAPHY
Steganography techniques are used to address digital copyrights management,
protect information, and conceal secrets. Steganography and cryptography are
two popular ways of sending vital information in a secret way. One hides the
existence of the message and the other distorts the message itself. This paper
discussed a technique used on the advanced LSB (least significant bit) and RSA
algorithm. By matching data to an image, there is less chance of an attacker
being able to use steganalysis to recover data. Before hiding the data in an
image the application first encrypts it.
DEVELOPMENT OF WEB PORTAL FOR HEALTH CENTRE
The objectives were to provide a complete informative website for aromas users
with the option to make an appointment for a vaccination or health certificate,
order prescriptions and get update information directly published by aromas
staff. And to give the staff of aroma a graphical web interface to manage the
content and the booking system. The report goes through the basic language
used and why. Further it takes up it how works and how the final product looks
and behaves.
A DATA SHARING PROTOCOL TO MINIMIZE SECURITY AND
PRIVACY RISKS IN CLOUD STORAGE
Data sharing in the cloud is a technique that allows users to conveniently access
data over the cloud. The data owner outsources their data in the cloud due to
cost reduction and the great conveniences provided by cloud services. Data
owner is not able to control over their data, because cloud service provider is a
third party provider. The main crisis with data sharing in the cloud is the
privacy and security issues. Various techniques are available to support user
privacy and secure data sharing. This paper focus on various schemes to deal
with secure data sharing such as Data sharing with forward security, secure data
sharing for dynamic groups, Attribute based data sharing, encrypted data
sharing and Shared Authority Based Privacy-Preserving Authentication
Protocol for access control of outsourced data.
FACE RECOGNITION ACROSS NON-UNIFORM MOTION BLUR,
ILLUMINATION, AND POSE
Abstract—Existing methods for performing face recognition in the presence of
blur are based on the convolution model and cannot handle non-uniform
blurring situations that frequently arise from tilts and rotations in hand-held
cameras. In this paper, we propose a methodology for face recognition in the
presence of space-varying motion blur comprising of arbitrarily-shaped kernels.
We model the blurred face as a convex combination of geometrically
transformed instances of the focused gallery face, and show that the set of all
images obtained by non-uniformly blurring a given image forms a convex set.
We first propose a non uniform blur-robust algorithm by making use of the
assumption of a sparse camera trajectory in the camera motion space to build an
energy function with l1-norm constraint on the camera motion. The framework
is then extended to handle illumination variations by exploiting the fact that the
set of all images obtained from a face image by non-uniform blurring and
changing the illumination forms a bi-convex set. Finally, we propose an elegant
extension to also account for variations in pose.
DETECT ONLINE SPREAD OF TERRORISM USING DATA MINING

Abstract: Terrorism has grown its roots quite deep in certain parts of the world. With
increasing terrorist activities, it has become important to curb terrorism and stop its spread
before a certain time. So as identified internet is a major source of spreading terrorism
through speeches and videos. Terrorist organizations use internet to brain wash individuals
and promote terrorist activities through provocative web pages that inspire helpless people to
join terrorist organizations. So here we propose an efficient web data mining system to detect
such web properties and flag them automatically for human review.
ANDROID BASED COLLEGE NOTIFICATION SYSTEM

Abstract: Our aim to replace the traditional notice board with E-notice board. Now no need to
maintain numbers of account for sharing information, exchange of notes and all college
related news, now it will be accessible anywhere anytime just on a single click on your
android device. Just install “E-Notice Board App” on your android device and you can access
all notices of your college. We have developing for staff add notes, experiments dates,
submission and for students upload and download tutorials, experiments, question paper and
notes in an easy and efficient manner. This project includes major activity entities: add
notices, add staff record, and add student record which is handled by Admin. The Admin can
add, delete, and update them simultaneously on the online system. These can then be viewed
by the students.
AN IOT BASED CAR ACCIDENT PREVENTION AND DETECTION
SYSTEM

Car accidents are considered one of the most destructive phenomena. Though there are many
different reasons behind car accidents, most accidents occur due to driver's unawareness and
uncontrolled speed. Also, there seems to be a problem reaching the spot of accident in time
for lack of awareness. As a solution, the advent of Internet of Things (IoT) technologies can
reduce the number of accidents. In this paper, a smart system is described that alerts and
controls the speed of a vehicle, also notifies the individuals accordingly when an accident
occurs. This system always monitors the distance between vehicles and obstacles that are in
front, using distance sensor. It will alert the driver to control the speed and reduce the speed
by itself when a critical distance comes. Whenever an accident takes place for uncertain
condition, an email alert will be sent to the accountable individual with car details.
AN INVESTIGATION OF FAMILIARITY, TRUST AND AWARENESS
IMPACT TOWARDS ONLINE FRAUD
Online business and consumers are vulnerable towards online fraud due to the increased
amount of usage on online transactions. The study aims to investigate the factors that
contribute towards online purchases from the experience of online fraud victims. Factors
examined include trust, familiarity and awareness towards online products of which a semi
structured interview was designed based on these factors. The qualitative study analyses
experience of online fraud victims in order to gain insight to individual behaviour and
determine the reason why they are induced in making the online purchase. The samples used
in this study are the online fraud victims of E-commerce. Through seven phone interviews of
online fraud victims, the study conclude that people with higher levels of familiarity,
confidence and trust seems to have higher levels of trustworthiness to e-commerce. The
awareness of the surroundings on the other hand does not affect people's inclination to
purchase. The main contribution of this study is from an observation on cybercrime when
globalisation of the Internet is rapidly moving forward.
Android Based Circular Notification System
Abstract: Our aim to replace the traditional circular system. Now no need to maintain
numbers of account for sharing information, exchange of all college related news, now it will
be accessible anywhere anytime just on a single click on your android device. Just install “E-
Circular App” on your android device and you can access all notices of your college. We
have developing for staff easy to exchange the information. This project includes major
activity entities: add notices which are handled by Admin. The Admin can add, delete, and
update them simultaneously on the online system. These can then be viewed by the all staffs.
Teacher can get their meetings and extra additional notices from principal and HOD’s on its
android device.

You might also like