Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries

Content services such as content filtering and transcoding adapt contents to meet system requirements, display capacities, or user preferences. Data security in such a framework is an important problem and crucial for many Web applications. In this paper, we propose an approach that addresses data integrity and confidentiality in content adaptation and caching by intermediaries. Our approach permits multiple intermediaries to simultaneously perform content services on different portions of the data. Our experimental results show that our approach is efficient and minimizes the amount of data transmitted across the network.
            To achieve this concept we use proxies and the contents are retrieved from the server in a secured manner via proxies and we use access control system for deciding the proxy.  Each proxy will do specific trascoding.  In our project we implemented three transcoding for secured transformation of information.  Those are adding watermark to the file, converting text file into pdf file, converting text into audio.  According to the selection of trancoding proxy will be decided by access control system. Content adaptation is achieved by using mobile emulator.
   

1.2 System Overview:
System Objectives:
      The main aim of the project is to create intermediaries for performing transcodings and retrieve a file form data server in secured manner with specified transcoding and adaptation of content.

System Benefits:
  • Presents a parallel secure content service (PSCS) protocol for a cache proxy and analyze the properties of intermediaries with caching capacity.
  • It allows data server to join and leave the network frequently to facilitate client to request file.
  • It allows specifying transcoding and access control system that decides proxies.
·         It allows performing transcoding like adding watermark to a file, converting text file into pdf  and converting text into audio.
·         Creates separate proxies for each transcoding to avoid network traffic and provide security.

Technology Used:
                        Front End: J2EE, J2ME
                        Back End: SQL Server2005

System Scope:
The scope of the system is to target the security for the file which is retrieved from the data server and reduce network traffic.
                       
2.0 System Modules:

  1. Main page Module
  2. Adding and Removing Data Server
  3. Adding Transcoding
  4. Add and View Proxies
  5. Access control system
  6. Parallel secure content service
    1. Text to pdf conversion
    2. Adding watermark
    3. Text to speech conversion
  7.  Content Adaption
Module Description:
2.1.1 Main page module:
Login:
The user is the admin; and the user can login to the system by entering authentication details.

2.1.2 Adding and Removing Data Server
The user can manually add data server which provides information to the client. If the user adds data server which does not belong to the group the system will not accept. The user can also delete the members from groups.

The elements of this module are:
- Add Data Server:
User can add the new data server by entering the IP address.

- Remove Data Server:
User can delete the data server by removing the IP address which is displayed in a dropdown list box.

2.1.3 Adding Transcoding:
User can add name of transcoding which is to be performed by the proxies.

The elements of this module are:
- Add Transcoding:
        Name of transcoding which is to be performed by the proxies is added.

     2.1.4 Add and View Proxies:
User can add proxy for the corresponding transocding which is already added by the user.  The details of the transcoding and proxy which will perform the transcoding are displayed.
The elements of this module are:
- Add Proxy:
User can add the proxy by entering the IP address and selecting the transcoding which is to be performed the proxy.

- View transcode and proxy:
User can view all the transocding which can be performed and the proxy which is responsible the transcoding.

2.1.5 Access control system
Access control system decides which proxy has to perform which transcoding.  Each DP has its own security policy related to its data. The access control system of each Data Server enforces which proxies and clients can access which data.  The inputs to the access control system include a client’s request, the security policy and the intermediary profile which has information about transcoding and corresponding transcoding, and the data store.
        User can send a request to search the files in data server from which he want to retrieves the file. The Data Server accepts the request and sends the search result to the client system.
       Then the user has the select a file which he has to perform transcoding and type of transcoding and these details will be sent to the access control system which will forward the request the corresponding proxy which performs the transcoding.

The elements of this module are:
-  search result:
Client requests for the files in the data server and the files in the data server are displayed. User has to select a file which is to be retrieved from data server and the type of transcoding will be sent to the access control system.

2.1.6        Parallel secure content service
In this module we can perform different types of transcoding that is transformation of file from one format to another. When the user sends the file and type of transcoding to the access control system it decides which proxy has to perform the transcoding and forward the file the corresponding proxy.        
            The proxy will cache the file that is it will store original file and transcoded file  for future reference.  Here three transcodings are performed  Adding water mark to a file, converting text file into pdf  and converting text to audio.
           
a) Watermark module
If watermark transcoding is selected a logo in background of the text will be appended. So that the receiver can get a authenticated information.
b) Text to PDF module
If text to pdf module is selected a word file will be converted to pdf at the receiver end. So that no change can be done in the file.
c) Text to speech conversion
If this module is selected when the file is transformed the content in the file will be converted to voice format and we can here the contents in the file.
Content Adaption
            This module is developed using J2ME concept. Client request for the files in server, after the display of files the requested file from the server is displayed using mobile emulation . This will resemble a mobile.

3.0 System Analysis:
            The System is analyzed to form a detailed overall picture. The analysis of entire system is segragated based on modules.

3.1 Data Objects (Entities):


1- Data server IP:
·      IP Address
·      System Name

2- User (Admin)
·      Name
·      Admin Id
·      Password

3- File
·      Data server Ip
·      File Name
·      Format
·      Source Location
·      Destination Location
·      File size

4-Transcode
·         Transcode (type)
·         Proxy
5-Proxy
·         IP Address
·         Transcode

            Data Objects Attributes (Entities):


Data Objects

Attributes
IP
IP Address
System Name






User
Name
Admin Id
Password



File
Data server Ip
File Name
Destination location
Format
Source location
File size
Transcode
Transcode (type)
Proxy




Hash
Hash code





Proxy
Proxy (ip address)
Transcode (type)







4.2 Table Design:
Table Name: Login
Field Name
Data Type
Field Size
Constraints
Description
Name
String
30-Digits
Can not be Null
Name of the user(Admin)
Pass
String
20 Digits
Can not be Null
Password



Table Name: Server  IP
Field Name
Data Type
Field Size
Constraints
Description
Server IP
String
15-Digits
Primary Key
Ip Address of the System (data server)
Sys-Name
String
30 Digits
Can not be Null
Name of the System



Table Name: Transcode
Field Name
Data Type
Field Size
Constraints
Description
sno
Int
Digits
Auto increment
Serial number
Proxy
String
50 Digits
Can not be Null
Ip Address of the Proxy
Transcode
String
50 Digits
Can not be Null
Type of transcode


Table Name: hash
Field Name
Data Type
Field Size
Constraints
Description
sno
Int
Digits
Auto increment
Serial number
hash
Int
50 Digits
Can not be Null
Hash code generation for secure transfer












No comments:

Post a Comment

leave your opinion