Content services such as content filtering and transcoding adapt contents to meet system requirements, display capacities, or user preferences. Data security in such a framework is an important problem and crucial for many Web applications. In this paper, we propose an approach that addresses data integrity and confidentiality in content adaptation and caching by intermediaries. Our approach permits multiple intermediaries to simultaneously perform content services on different portions of the data. Our experimental results show that our approach is efficient and minimizes the amount of data transmitted across the network.
To achieve this concept we use proxies and the contents are retrieved from the server in a secured manner via proxies and we use access control system for deciding the proxy. Each proxy will do specific trascoding. In our project we implemented three transcoding for secured transformation of information. Those are adding watermark to the file, converting text file into pdf file, converting text into audio. According to the selection of trancoding proxy will be decided by access control system. Content adaptation is achieved by using mobile emulator.
1.2 System Overview:
System Objectives:
The main aim of the project is to create intermediaries for performing transcodings and retrieve a file form data server in secured manner with specified transcoding and adaptation of content.
System Benefits:
- Presents a parallel secure content service (PSCS) protocol for a cache proxy and analyze the properties of intermediaries with caching capacity.
- It allows data server to join and leave the network frequently to facilitate client to request file.
- It allows specifying transcoding and access control system that decides proxies.
· It allows performing transcoding like adding watermark to a file, converting text file into pdf and converting text into audio.
· Creates separate proxies for each transcoding to avoid network traffic and provide security.
Technology Used:
Front End: J2EE, J2ME
Back End: SQL Server2005
System Scope:
The scope of the system is to target the security for the file which is retrieved from the data server and reduce network traffic.
2.0 System Modules:
- Main page Module
- Adding and Removing Data Server
- Adding Transcoding
- Add and View Proxies
- Access control system
- Parallel secure content service
- Text to pdf conversion
- Adding watermark
- Text to speech conversion
- Content Adaption
Module Description:
2.1.1 Main page module:
Login:
The user is the admin; and the user can login to the system by entering authentication details.
2.1.2 Adding and Removing Data Server
The user can manually add data server which provides information to the client. If the user adds data server which does not belong to the group the system will not accept. The user can also delete the members from groups.
The elements of this module are:
- Add Data Server:
User can add the new data server by entering the IP address.
- Remove Data Server:
User can delete the data server by removing the IP address which is displayed in a dropdown list box.
2.1.3 Adding Transcoding:
User can add name of transcoding which is to be performed by the proxies.
The elements of this module are:
- Add Transcoding:
Name of transcoding which is to be performed by the proxies is added.
2.1.4 Add and View Proxies:
User can add proxy for the corresponding transocding which is already added by the user. The details of the transcoding and proxy which will perform the transcoding are displayed.
The elements of this module are:
- Add Proxy:
User can add the proxy by entering the IP address and selecting the transcoding which is to be performed the proxy.
- View transcode and proxy:
User can view all the transocding which can be performed and the proxy which is responsible the transcoding.
2.1.5 Access control system
Access control system decides which proxy has to perform which transcoding. Each DP has its own security policy related to its data. The access control system of each Data Server enforces which proxies and clients can access which data. The inputs to the access control system include a client’s request, the security policy and the intermediary profile which has information about transcoding and corresponding transcoding, and the data store.
User can send a request to search the files in data server from which he want to retrieves the file. The Data Server accepts the request and sends the search result to the client system.
Then the user has the select a file which he has to perform transcoding and type of transcoding and these details will be sent to the access control system which will forward the request the corresponding proxy which performs the transcoding.
The elements of this module are:
- search result:
Client requests for the files in the data server and the files in the data server are displayed. User has to select a file which is to be retrieved from data server and the type of transcoding will be sent to the access control system.
2.1.6 Parallel secure content service
In this module we can perform different types of transcoding that is transformation of file from one format to another. When the user sends the file and type of transcoding to the access control system it decides which proxy has to perform the transcoding and forward the file the corresponding proxy.
The proxy will cache the file that is it will store original file and transcoded file for future reference. Here three transcodings are performed Adding water mark to a file, converting text file into pdf and converting text to audio.
The proxy will cache the file that is it will store original file and transcoded file for future reference. Here three transcodings are performed Adding water mark to a file, converting text file into pdf and converting text to audio.
a) Watermark module
If watermark transcoding is selected a logo in background of the text will be appended. So that the receiver can get a authenticated information.
b) Text to PDF module
If text to pdf module is selected a word file will be converted to pdf at the receiver end. So that no change can be done in the file.
c) Text to speech conversion
If this module is selected when the file is transformed the content in the file will be converted to voice format and we can here the contents in the file.
Content Adaption
This module is developed using J2ME concept. Client request for the files in server, after the display of files the requested file from the server is displayed using mobile emulation . This will resemble a mobile.
3.0 System Analysis:
The System is analyzed to form a detailed overall picture. The analysis of entire system is segragated based on modules.
3.1 Data Objects (Entities):
1- Data server IP:
· IP Address
· System Name
2- User (Admin)
· Name
· Admin Id
· Password
3- File
· Data server Ip
· File Name
· Format
· Source Location
· Destination Location
· File size
4-Transcode
· Transcode (type)
· Proxy
5-Proxy
· IP Address
· Transcode
Data Objects Attributes (Entities):
Data Objects | Attributes | |||||
IP | IP Address | System Name | ||||
User | Name | Admin Id | Password | |||
File | Data server Ip | File Name | Destination location | Format | Source location | File size |
Transcode | Transcode (type) | Proxy | ||||
Hash | Hash code | |||||
Proxy | Proxy (ip address) | Transcode (type) |
4.2 Table Design:
Table Name: Login
Field Name | Data Type | Field Size | Constraints | Description |
Name | String | 30-Digits | Can not be Null | Name of the user(Admin) |
Pass | String | 20 Digits | Can not be Null | Password |
Table Name: Server IP
Field Name | Data Type | Field Size | Constraints | Description |
Server IP | String | 15-Digits | Primary Key | Ip Address of the System (data server) |
Sys-Name | String | 30 Digits | Can not be Null | Name of the System |
Table Name: Transcode
Field Name | Data Type | Field Size | Constraints | Description |
sno | Int | Digits | Auto increment | Serial number |
Proxy | String | 50 Digits | Can not be Null | Ip Address of the Proxy |
Transcode | String | 50 Digits | Can not be Null | Type of transcode |
Table Name: hash
Field Name | Data Type | Field Size | Constraints | Description |
sno | Int | Digits | Auto increment | Serial number |
hash | Int | 50 Digits | Can not be Null | Hash code generation for secure transfer |
No comments:
Post a Comment
leave your opinion