Sie sind auf Seite 1von 5

PROJECT SYNOPSIS

Project Title

: MULTIPARTY ACCESS CONTROL FOR ONLINE SOCIAL NETWORK

Name

Class

Roll Number

Introduction:
Implementation is the stage of the project when the theoretical design is turned out into a working system. Thus it can be
considered to be the most critical stage in achieving a successful new system and in giving the user, confidence that the
new system will work and be effective.
The implementation stage involves careful planning, investigation of the existing system and its constraints on
implementation, designing of methods to achieve changeover and evaluation of changeover methods.

Company Profile:
SCVENS is the leading India based software development company that provides software consulting, Resource
outsourcing, Enterprise application services and mobility.
SCVENS provides the smart solutions with strong relationships in the domain of schooling ERP and oil industries.

FEASIBILITY STUDY:
Preliminary investigation examine project feasibility, the likelihood the system will be useful to the organization.
The main objective of the feasibility study is to test the Technical, Operational and Economical feasibility for adding new
modules and debugging old running system. All system is feasible if they are unlimited resources and infinite time. There
are aspects in the feasibility study portion of the preliminary investigation:

Technical Feasibility

Operational Feasibility

Economical Feasibility

3.1. TECHNICAL FEASIBILITY:


The technical issue usually raised during the feasibility stage of the investigation includes the following:Does the
necessary technology exist to do what is suggested?
Do the proposed equipments have the technical capacity to hold the data required to use the new system?
Will the proposed system provide adequate response to inquiries, regardless of the number or location of users?
Can the system be upgraded if developed?
Are there technical guarantees of accuracy, reliability, ease of access and data security?
Earlier no system existed to cater to the needs of Secure Infrastructure Implementation System. The current system
developed is technically feasible. It is a web based user interface for audit workflow at NIC-CSD. Thus it provides an
easy access to the users. The databases purpose is to create, establish and maintain a workflow among various entities in
order to facilitate all concerned users in their various capacities or roles. Permission to the users would be granted based
on the roles specified. Therefore, it provides the technical guarantee of accuracy, reliability and security. The software
and hard requirements for the development of this project are not many and are already available in-house at NIC or are
available as free as open source. The work for the project is done with the current equipment and existing software
technology. Necessary bandwidth exists for providing a fast feedback to the users irrespective of the number of users
using the system.
3.2. OPERATIONAL FEASIBILITY:
Proposed projects are beneficial only if they can be turned out into information system. That will meet the organizations
operating requirements. Operational feasibility aspects of the project are to be taken as an important part of the project
implementation. Some of the important issues raised are to test the operational feasibility of a project includes the
following: Is there sufficient support for the management from the users?
Will the system be used and work properly if it is being developed and implemented?
Will there be any resistance from the user that will undermine the possible application benefits?
This system is targeted to be in accordance with the above-mentioned issues. Beforehand, the management issues and
user requirements have been taken into consideration. So there is no question of resistance from the users that can
undermine the possible application benefits.
The well-planned design would ensure the optimal utilization of the computer resources and would help in the
improvement of performance status.
3.3. ECONOMICAL FEASIBILITY:
A system can be developed technically and that will be used if installed must still be a good investment for the
organization. In the economical feasibility, the development cost in creating the system is evaluated against the ultimate
benefit derived from the new systems. Financial benefits must equal or exceed the costs.

The system is economically feasible. It does not require any addition hardware or software. Since the interface for this
system is developed using the existing resources and technologies available at NIC, There is nominal expenditure and
economical feasibility for certain.

OBJECTIVES :
We pursue a systematic solution to facilitate collaborative management of shared data in OSNs. We begin by examining
how the lack of multiparty access control for data sharing in OSNs can undermine the pro- tection of user data.
Some typical data sharing patterns with respect to multiparty authorization in OSNs are also identified. Based on these
sharing patterns, a multiparty access control (MPAC) model is formulated to capture the core features of multiparty
authorization requirements which have not been accommodated so far by existing access control systems and models for
OSNs.
Our model also contains a multiparty policy specification scheme. Meanwhile, since conflicts are inevitable in multiparty
authorization enforcement, a voting mechanism is further provided to deal with authorization and privacy conflicts in our
model.

Platform:
HARDWARE SPECIFICATION:

PIV 2.8 GHz Processor and Above

RAM 1 GB and Above

HDD 40 GB Hard Disk Space and Above

Visual studio 2010.

Sql server 2008.

Windows XP operating system.

Internet Explorer 6.0 browser.

SOFTWARE SPECIFICATION:

Modules:
After careful analysis the system has been identified to have the following modules:
1. Owner Module
2. Contributor Module

3. Stakeholder Module
4. Disseminator Module
5. MPAC Module

1.Owner Module:
In Owner module let d be a data item in the space m of a user u in the social network. The user u is called the owner of
d. The user u is called the contributor of d. We specifically analyze three scenariosprofile sharing, relationship sharing
and content sharingto understand the risks posted by the lack of collaborative control in OSNs. In this the owner and
the disseminator can specify access control policies to restrict the sharing of profile attributes. Thus, it enablesthe owner
to discover potential malicious activities in collaborative control. The detection of collusion behaviors in collaborative
systems has been addressed by the recentwork.
2.Contributor Module:
In Contributor module let d be a data item published by a user u in someone elses space in the social network. The
contributor publishes content to others space and the content may also have multiple stakeholders (e.g., tagged users).
The memory space for the user will be allotted according to user request for content sharing. A shared content is
published by a contributor
3.Stakeholder Module:
In Stakeholder module let d be a data item in the space of a user in the social network. Let T be the set of tagged users
associated with d. A user u is called a stakeholder of d, if u 2 T who has arelationship with another user called
stakeholder, shares the relationship with an accessor. In this scenario, authorization requirements from both the owner
and the stakeholder should be considered. Otherwise, the stakeholders privacy concern may be violated.A shared content
has multiple stakeholders.
4.Disseminator Module:
In Disseminator module let d be a data item shared by a user u from someone elses space to his/her space in the social
network. The user u is called a disseminator of d. A content sharing pattern where the sharing starts with an originator
(owner or contributor who uploads the content) publishing thecontent, and then a disseminator views and shares
thecontent. All access control policies defined by associated users should be enforced to regulate access of the contentin
disseminators space. For a more complicated case, the disseminated content may be further re-disseminated by
disseminators friends, where effective access control mechanisms should be applied in each procedure to regulate
sharing behaviors. Especially, regardless of how many steps the content has been re-disseminated, the original access
control policies should be always enforced to protect further dissemination of the content.
5.MPAC Module:
MPAC is used to prove if our proposed access control model is valid.To enable a collaborative authorization management
of data sharing in OSNs, it is essential for multiparty access control policies to be in place to regulate access over shared
data, representing authorization requirements from multiple associated users. Our policy specification scheme is built
upon the proposed MPAC model. Accessor Specification: Accessors are a set of users who are granted to access the

shared data. Accessors can be represented with a set of user names, asset of relationship names or a set of group names in
OSNs.

Das könnte Ihnen auch gefallen