JAVA 2013 IEEE DATAMINING PROJECT Access policy consolidation for event processing systems


Published on

To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - Our Website:

Published in: Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

JAVA 2013 IEEE DATAMINING PROJECT Access policy consolidation for event processing systems

  1. 1. Access Policy Consolidation for Event Processing Systems ABSTRACT Current event processing systems lack methods to preserve privacy constraints of incoming event streams in a chain of subsequently applied stream operations. This is a problem in large-scale distributed applications like a logistic chain where event processing operators may be spread over multiple security domains. An adversary can infer from legally received outgoing event streams confidential input streams of the event processing system. This paper presents a fine- grained access management for complex event processing. Each incoming event stream can be protected by the specification of an access policy and is enforced by algorithms for access consolidation. The utility of the event processing system is increased by providing and computing in a scalable manner a measure for the obfuscation of event streams. An obfuscation threshold as part of the access policy allows to ignore access requirements and deliver events which have achieved a sufficient high obfuscation level. . EXISTING SYSTEM On the one hand, sampling techniques can be used to estimate the conditional probabilities of the Bayesian network. However, their precision depends strongly on the number of samples taken from the network, and no approximation scheme exists that allows to draw samples in polynomial time to achieve a certain precision. This makes the approximate algorithms infeasible for security applications, since no guarantees can be made in appropriate time. On the other hand the complexity of calculating exact inference can be reduced by storing partial results of the inference GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: Mail
  2. 2. calculation which otherwise would have to be calculated multiple times. However, the benefit of these optimizations is heavily dependent on the structure of the Bayesian network. PROPOSED SYSTEM A role-based access control is proposed. Pesonen et al. and Bacon et al. discuss how publish/subscribe systems can be secured by introducing access control policies in a multi-domain architecture. They describe how event communication between the domains can be supported. Opyrchal et al. present the concept of event owners that can be specified. These are used to provide access to their events. Tariq et al. propose a solution to provide authentication and confidentiality in broker-less content-based publish/subscribe systems. Our work is based on the previous work which make event communication secure among different entities in the system a. We assume the presence of a system that can handle access control on events. Based on this, we use policy composition in order to derive the necessary access policies at any point during the event processing steps. MODULE DESCRIPTION: 1. Event Processing 2. Manufacturer 3. Shipping Company 4. Customer Event processing Event processing systems respond to events in the system’s environment or user interface. The key characteristic of event processing systems is that the timing of events is unpredictable and the system must be able to cope with these events when they occur. Manufacturer In this module manufacturer, insert the product details and also view product request from shipping company. Send details to shipping company to delivery date and pickup time.
  3. 3. Ship Company In this module ship company, view product request from customer. Then company forward the request to manufacturer or reject the request. Customer In this module customer, product order from Ship Company and also views the order from Ship Company. Customer views the import details. System Configuration:- H/W System Configuration:- Processor - Pentium –III Speed - 1.1 Ghz RAM - 256 MB(min) Hard Disk - 20 GB Floppy Drive - 1.44 MB Key Board - Standard Windows Keyboard
  4. 4. Mouse - Two or Three Button Mouse Monitor - SVGA S/W System Configuration:- Operating System :Windows95/98/2000/XP Application Server : Tomcat5.0/6.X Front End : HTML, Java, Jsp Scripts : JavaScript. Server side Script : Java Server Pages. Database : Mysql Database Connectivity : JDBC. CONCLUSION This paper addressed the inheritance and consolidation of access policies in heterogeneous CEP systems. We identified a lack of security in multi-hop event processing networks and proposed a solution to close this gap. More specific, we presented an approach that allows the inheritance of access requirements, when events are correlated to complex events. Our algorithm includes the obfuscation of information, which can happen during the correlation process, and uses the obfuscation value as a decision-making basis whether inheritance is needed. We presented an implementation of our approach, based on Bayesian Network calculations. The analysis and evaluations show that the approach is computation-intensive, once the Bayesian Network grows, hence rising the processing time of an event. To deal with the calculation cost, we introduced a local approach, where every participant calculates local obfuscation achieved during the correlation process. We use a variable elimination optimization to further reduce the computational effort for calculating obfuscation. Future work will concentrate on enhancing the obfuscation calculation and methods to increase the Bayesian Network size so we are able to measure obfuscation over more than one correlation steps.