Guilty Agent Detection

Only available on StudyMode
  • Topic: Java, Java Servlet, JavaServer Pages
  • Pages : 20 (3833 words )
  • Download(s) : 143
  • Published : January 31, 2013
Open Document
Text Preview
GUILTY AGENT DETECTION USING DATA ALLOCATION STATREGIES

A PROJECT REPORT

Submitted by

JOSEPHINE SHERRINA FERNANDO (31708205050)

S.M.JOY MERCY (31708205051)

In partial fulfillment for the award of the degree
of

BACHELOR OF TECHNOLOGY

in

INFORMATION TECHNOLOGY
ST. JOSEPH’S COLLEGE OF ENGINEERING, CHENNAI

ANNA UNIVERSITY: CHENNAI 600 025
APRIL 2012
ANNA UNIVERSITY: CHENNAI 600 025

BONAFIDE CERTIFICATE

Certified that this project report “GUILTY AGENT DETECTION USING DATA ALLOCATION STRATEGIES” is the bonafide work of “JOSEPHINE SHERRINA FERNANDO (31708205050) and S.M.JOY MERCY (31708205051)”who carried out the project work under my supervision.

SIGNATURE SIGNATURE

Mrs. G.Lathaselvi M.E.,(Ph.D.)Mrs. J.PADMA
HEAD OF THE DEPARTMENT SUPERVISOR
Assistant Professor Assistant Professor Department Of Information Technology, Department Of Information Technology, St.Joseph’s College of Engineering St.Joseph’s College of Engineering Chennai-600 119Chennai-600 119

Submitted for the Viva-Voce held on _______________

(INTERNAL EXAMINER)(EXTERNAL EXAMINER)

ACKNOWLEDGEMENT

We hereby place on record our deep sense of gratitude and happiness to our beloved chairman Dr.Thiru. Jeppiaar, M.A., B.L.,Ph.D., St. Joseph’s College of Engineering, for the keen interest and affection shown towards us throughout the course.

We take this panorama to extend our hearty thanks to our honorable director Dr. B. BabuManoharan, M.A., M.B.A., Ph.D., for all his effort in educating me in a premier institution.

We convey our sincere thanks to Dr. Jolly Abraham, M.E., Ph.D., Principal, St.Joseph’s College of Engineering, for her interest towards us throughout the course.

We extend our hearty thanks to Mrs.G.Lathaselvi, M.E., (Ph.D.), The Head of the Department,for her dauntless support and encouragement in the completion of the project with perfection.

We wish to thank our project guide Mrs. J.Padma, ,for guiding us to take up this project and for his enthusiasm shown towards this project. His efforts in establishing methodical work routine have lead to the successful completion of this project.

We express our gratitude to parents and friends for their encouragement and support ABSTRACT

A certain sensitive data is given by a data distributer to a set of trustedagents. Some of the data are leaked and found in some unauthorizedplace. The data distributor must now find out the leaked data, for that wepropose data allocation strategies. We inject realistic but fake objects toidentify the guilty party instead of altering the original data.

TABLE OF CONTENTS

CHAPTER NOTITLEPAGE

ABSTRACT
LIST OF FIGURES
LIST OF ABBREVIATIONS

1. INTRODUCTION
2.SYSTEM ANALYSIS 2.1.Existing System
2.2. Proposed System
3. REQUIREMENT ANALYSIS 3.1.Software Requirements
3.2. Hardware Requirements
3.3. Technologies Used 3.3.1. Java
3.3.2.JSP
3.3.3. Servlet 3.3.4 .MYSQL
4. Project Scope AND Features
4.1.Resources Required
4.2. Overview of Project
4.2.1.Problem Setup and Notation
4.3. Algorithm

5.SYSTEM DESIGN
5.1.ArchitectureDiagram 5.2.Class Diagram
5.3.Use case Diagram
5.4.Activity Diagram
5.5.Sequence Diagram
5.6.Data flow Diagram
6. MODULES
6.1.List Of Modules 6.1.2. Data Allocation Module
6.1.3. Fake Object Module
6.1.4. Optimization...
tracking img