SlideShare a Scribd company logo
1 of 7
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 4011
SCRUTINIZE THE UTILITY OF PRESERVED DATA WITH PRIVACY
Mrs. SABITHA 1, C.P.SHAJIN 2, SUBAASH PON 3,S.SUGANTHAN 4
1 Assistant Professor, Dept. of IT, Jeppiaar SRR Engineering College, Chennai, Tamil Nadu
2,3B.TECH., Dept. of IT, Jeppiaar SRR Engineering College, Chennai, Tamil Nadu
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - A large amount of data which has been handled
over a sector in note to that the data which has been collected
from the source will be stored in a database. The admin has
the authority of approving the manager so that after the
approval of admin the manager can access the application.
Once the manager gets declined by the admin the can't able to
login in that process the manager won’t be able to access the
application. The details which have been stored can be
retrieved later in case of using those details or viewing those
information. The admin and the manager is one who can able
to view the actions performed by the employees. By handling
these data by the admin. The admin can view the data. In case
of loss of data or theft of data in a form of attack the manager
and the admin can view the details of the employee who has
been attacked in the form of tables. The action can be
performed here. The details can be attacked by four methods
such as a data linkage attack, attribute attack, table linkage
attack and probabilistic attack. By these attacks, we can
attack the details of an individual by gettingtheiridwhich has
been published. By this action the manager and theadmincan
view the details of the employee who has been attacked .
1. INTRODUCTION:
A security system identifies and mitigates the system
vulnerabilities or restricting access toa verysmall group.The
competition between inventing new security measures to
protect data and inventing hacking techniquesinconjunction
with discovering and leveragingpreexistingvulnerabilitiesis
infinite. Therefore, securing data and resources is becoming
more and more challenging day by day. Nevertheless, there
exist several different techniques to secure the data being
transferred over network and also that on a user machine.
Specializes in securing data in motion through the use of the
patented REL-ID based mutual authentication scheme. Itcan
be used to ensure that the end user is secured as well as the
tunnel. It uses techniques of authentication to assure to each
end user that it is communicating with an authorized user
and not a fake one. Such security measures used to secure
data in motion, meaning data that has been shared between
computers.
2. SYSTEM ANALYSIS:
After analyzing requirement of the task to be
performed, the next step is to analyzing the problem in the
module and understand the context. The first activity in the
phase is studying existing system and another one is
understand the requirement and domain of the new system.
Both the activities equally important in the system, but the
first activity serve as a basis of giving the functional
specifications .Understanding the properties and
requirements of a new system is more difficulties and
understanding the existing running system is difficult,
improper understanding of the present system can lead
diversion from the solution.
2.1. SYSTEM REQUIREMENTS:
2.1.1. HARDWARE REQUIREMENTS:
 RAM 4GB
 Dual-Core 2.8 GHz Processor and Above
 HDD 80 GB Hard Disk Space in the Hardware
2.1.2. SOFTWARE REQUIREMENTS:
 WINDOWS OS (7 /XP and above)
 Visual Studio .Net 2015
 Visual Studio .Net Framework 4.5
 SQL Server 2014
2.2. MODULE DESCRIPTION:
2.2.1.ADMIN MODULE:
The process of admin is to monitor each and every
action in an organization and to proceed with the action in
Admin. Part of the admin set up is users management which
allows users to be set up with definable access level, access
to a single or multiple branches. Admin can also set up
overall system security settings such as required password
strength, inactive sessiontimeout,inactiveaccountslockout,
a password reset period, etc. An important partofsecurity is
processed any changes in the system are logged here.
2.2.2. MANAGER MODULE:
The manager module allows userstoregister,login,
and log out. They benefit from being able to sign on because
these associates content they create with their account and
allows various permissions to be set for their roles. The
manager module support user roles, which set up with fine-
grained permissions allowing each role to do only what the
administrator permits. Each user is assigned one or more
roles. By default, there are three roles in the module:
anonymous (a user who has not logged in) andauthenticated
(a user who is registered), and administrator (a signed-in
user who will be assigned site administrator permissions).
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 4012
2.2.3. EMPLOYEE MODULE:
Gonna replace it with some other data without the
knowledge of the employees. Andthosemodifieddata will be
shown only to the manager and the admin. Admin is the one
has given the authority to handle those changed data in the
database.so retrieving of data can be done onlybytheadmin
in this application.
2.2.4. AUTHORIZATION MODULE:
In authorization the admin will be The employee is
the actor added by the manager with certain terms.Oncethe
employee has been added those details will be shown to the
manager and the admin. they will be having complete
information of the employee. The manager can able view
only the persons who have been added and they will be
given some task to performed by the manager. A complete
information about the employees and managers will be
shown only to the manager in their database.
2.2.5. THIRD-PARTY MODULE:
The third party is the one who will be gettingsomedetails of
those employees and they will perform some actions in the
local host with the collection of those data. Without the
knowledge of employees, they are going to make some
changes in the application they are going to theft the data
and authorizing the manager in formofapproval anddecline
the manager will be having registration once the manager
registered the details will be shown to admin by this the
admin will be authorizing the manager. once the admin
declines the manager will not be able to login if admin
approves the manager can able to login.
2.2.6. PROFILE MODULE:
In profile the manager can able to view the
particular applicants who login in the application they can
able view the id, designation and some other details. Where
the admin can able to view the complete details.
2.2.7.ADD EMPLOYEE MODULE
The Employees module consists of various features
allowing you to perform general management tasks such as
employee history, perks and incident reports and all the
forms and reports necessary to keep track of all your
employee data, including age, certificates, personal details..
Any information needed is available at the click of a button
with comprehensive reporting features.
3. FUNCTIONAL REQUIREMENTS:
Following is a list of functionalities of the browsing enabled
system in the requirements.
 An Activity with a UI that allows you to browser
settings. Provide a second Activity that allowsusers
to access the share with permission from the
administrator. Handle activity lifecycle
appropriately. A precondition for any points in this
part of the grade is code that compiles and runs.
 Your application should allow a user to browse the
shares, buy and sell the shares with specific
metadata. The assignment requires you to create a
UI for browsing and a UI for integrating the two.
3.1. NON-FUNCTIONAL REQUIREMENTS:
 Each member should have a separate system. The
system should ask the username and password to
open the application in the given requirements. It
doesn’t permit to unregistereduserstoaccessinthe
System. The system should have the Role based
System functions access. Approval Processhas tobe
defined. The system should have the Modular
customization components so that they can be
reused across the implementation.
 These are the mainly following:
 Secure access of confidential data (employee’s
details). 24 X 7 availability.
 Better component design to get better performance
at peak time in the requirements.
3.2. PERFORMANCE REQUIREMENTS:
Performance is measured in terms of the output in the
requirements provided by the application. Requirement
specification plays an important role in the analysis of the
system. Only when the required specifications are properly
given, it is possible to design a system, which will fit into
required environment. It rests largely inthepartoftheusers
of the existing system to give the required specifications
because they are the people who finally use the system. It is
very difficult to modify the system once it has designed and
on the other hand designing a system, which does not cater
to the requirements of the user, is of no use.
4. SYSTEM DEVELOPEMENT ENVIRONMENT:
4.1. THE .NET FRAMEWORK ARCHITECTURE:
The .NET Framework isa framework wasdeveloped
by the Microsoft Company that runs in the Microsoft
Windows for pc. It includes a class library called as
Framework Class Library (FCL) and provides language
interoperability across several programming languages.
Programs written for the .NET Framework execute in the
software environments, called as the Common Language
Runtime (CLR), that application virtual machine that
provides service such as securities, memory control
managements and exception handlings, FCL and the CLR
together constitute .NET Framework.
FCL provides interfaces, data accessinthedtabases,
database connectivities, cryptographies, web applications
developments, numeric algorithms, and network
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 4013
communications. Programmers produced the software by
combining their own source code with the .NET Framework
and other libraries. The .NET Framework isintendedtoused
by most application created for the Windows platforms.
Microsoft also produced the integrated development
environment largely for .NET software called Visual Studios.
The first level is the representation of the operating
system; the .NET layer is located between system and
applications. The second level is one of the runtime such as
Common Language Runtime (CLR), which provides the part
of the .NET Framework. We discuss the CLR later in this
chapter. The next level is one of the library such as Base
Class Library (BCL), which provides all .NET objects that are
used both in your code and by Visual Basic when creating
applications. The BCL also provides the infrastructure of
several technology that used in the building applications,
such as WPF, Windows Form, ASP.NET, WCF, and etc. The
last level is represented by applications that the previous
layers.
– CLS is one of the agreements among language
designers and class library designers about the features and
usage conventions that can be relied upon.
• Example: public names should not in the case for
uniqueness.
Since some languages are not case sensitive.
• This does not mean all languages are not case
sensitive in the above the CLR.
The Common Type System
• At the core of the Framework is a universal type system
called the .NET Common Type System (CTS)?
• Everything is an object - but efficient
– Boxing and Unboxing
• All types fall into two types of categories - Value types and
Reference types.
– Value types contain the actual datas (cannot be
null).
– Stored on the stack databases.
– Three kinds of value types in the stack: Primitives,
structures, and enumerations.
•Compilers map keywords to the primitive types. For
Example, the C# “int” is mapped to the System.Int32.
4.2. SQL SERVER 2014:
SQL is a relational database management system (RDBMS)
that runs the multi-user access to a numberofthedatabases.
It is a popular choice of database for the use in web
applications and is an open source product.
The process of settingupa SQLdatabasevariesfrom
host to host, however, we will end up with a database name,
a user name and a password. Before using our data in the
database, we must create a table.
We will then be taken to a setup screen where you
must create the fields in the database.
SQL is used to communicate with a database.
According to ANSI (American National Standards Institute),
it is the standard language for the relational database in the
management systems.
SQL statements are used to perform tasks such as
update the data in the database, or retrieve data from the
database. Some common relational database management
systems that use the statements SQL are: Oracle, Sybase,
Microsoft SQL Server, Access, Ingres, etc.
5. SYSTEM DESIGN:
Software designs in the software engineering
process and technical process and applied for the
development paradigm. Design is the first step in the
development phase for engineered product and system.The
designer’s goal is produce a model or representation of an
entity that will later be built. System requirements has
specified or analyzed, system design has three technical
activities -design, code and test that is required to build and
verify software.
Software design serves as a foundation for all b
software engineering steps that follow. Without strong
design we building an unstable system – one that will be
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 4014
difficult to test, one whose quality cannot be assessed until
the last stage.
During design, progressive refinement of the data
structure, programstructures,andprocedural aredeveloped
reviewed and documented. System design can be viewed
from either technical and project management perspective.
From the technical point of view, design is four activities –
architectural design, data structure design, interface design
and procedural design.
5. 1.NORMALIZATION:
It is a process of converting relation to standard
form. The process is used to handle the problems, i.e.
repetition of datas in that databases, maintain data integrity
as well as handling problems that can arise due to insert,
Update, delete anomalies.
Insertion anomaly: Inability to add datas to that databases
due to absence of other datas.
Deletion anomaly: Unintended loss of data due to deletion
of other datas.
Update anomaly: Data inconsistency resultings from data
redundancy and partial updates.
Normal Forms: These are the rule for structuring relation
that eliminate anomalies.
5.1.1. FIRST NORMAL FORM:
A relation is said to be in first normal form if the
values in that relation are atomic for every attribute in the
relation. By this we mean simply no attribute value can be a
set of values or, as it is sometimes expressed, a repeating
group.
5.1.2. SECOND NORMAL FORM:
A relation is said to be in the second normal form is
it is in first normal form and it should satisfy any one of the
following rules.
 The primary key is a not a composite
primary key
 No, non key attributes are present
 Every non key attribute isfullyfunctionally
dependent on a full set of primary key.
5.1.3. THIRD NORMAL FORM:
A relation is said to be third normal formiftheirexit
no transitive dependencies.
Transitive Dependency: If two non key attributes depends
on the each other as well as the primary key, then they are
said to be transitively dependent.
The above normalization principles are applied to
decompose the data in multiple tables, thereby making the
data to be maintained in a consistent stat
6. SYSTEM ARCHITECTURE:
6.1. E – R DIAGRAMS:
 The relations are upon the system is structuredthrough
the conceptual Entity Relatioship-Diagram, which not
only specifics the existing entities, but also the standard
relations through which the system exists and the
cardinalities are necessary for the system state to
continue.
 The Entity Relationship Diagram (ERD) depicts the
relationship between data objects. The ERD is the
notation that is used conduct, the date modelingactivity
the attributes of each data object noted, is the ERD can
be described resign a data object description.
 The set of primary components are identified by the
ERD are
 Data object
 Relationships
 Attributes
 Various types of indicators.
The primary purpose of the ERD is represent data objects
and their relationships.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 4015
6.2. USE CASE DIAGRAM:
6.3. SEQUENCE DIAGRAM:
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 4016
6.4. CLASS DIAGRAM:
6.5. ACTIVITY DIAGRAM
6.6. DEPLOYMENT DIAGRAM:
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 4017
7. CONCLUSION & FUTURE ENHANCEMENT:
The important goal of this work is to preserve the
privacy of the multiple Sensitive data and to improve the
utility of published dataIt discusses the analyzing approach
in brief along with a comparison of its different values.Data
analyzing is an efficient approach to the utility of published
data with privacy to protect the privacy of published data
which modifies the dataset to prevent sensitiveinformation.
This yields the means for the prevention of privacy threats
like membership, identity and data disclosure. Also, this
method can be used to operate for any number of Sensitive
information in an efficient manner. In the future, the slicing
of secured data with the flow of details is attacked and to
reduce the time further through increased processor speed
and memory with privacy.
8. REFERENCES:
[1] A Survey on Learning to Hash, J. Wang, T. Zhang,02 May
2017, https://www.microsoft.com/en-us/research/wp-
content/uploads/2017/01/LTHSurvey.pdf
[2] Binary Multi View Clustering, Zheng Zhang, Ling Shao
,July 2019,https://ieeexplore.ieee.org/document/8387526
[3] Compressed K-Means for Large-ScaleClustering,X.Chen,
W.Liu.,2017,
https://www.semanticscholar.org/paper/Compressed-K-
Means-for-Large-Scale-Clustering-Shen-
Liu/93c03ff9421c49b74c234d6486e8884b6d744b54
[4] Fast K-Means with Accurate Bounds,J. Newling, F.
Fleuret,Sep 2016, https://arxiv.org/pdf/1602.02514.pdf
[5] Learning Short Binary Codes for Large-scale Image
Retrieval, Li Liu, Mengyang Yu.,11 January 2017,
https://www.freeprojectsforall.com/wp-
content/uploads/2018/09/Learning-Short-Binary-Codes-
for-Large-scale-Image-Retrieval.pdf
[6] Multiview Alignment Hashing for EfficientImageSearch,
Mengyang Yu,12 January 2015,
https://ieeexplore.ieee.org/abstract/document/7006770
[7] Multi-View Clustering via Joint Non-negative Matrix
Factorization,JialuLiu , Chi Wang , Jing Gao, and Jiawei
Han,May-2013,
https://www.researchgate.net/publication/279953559
Multi_View_Clustering_via_Joint_Nonnegative_Matrix_Factori
zation
[8] Unsupervised Deep Hashing with Similarity-Adaptive
and Discrete Optimization,FuminShen, YanXu,Yang Yang,05
January-2018,
https://ieeexplore.ieee.org/abstract/document/8247210.

More Related Content

What's hot

CSEC630_TeamAssignment_TeamBlazer_FINAL
CSEC630_TeamAssignment_TeamBlazer_FINALCSEC630_TeamAssignment_TeamBlazer_FINAL
CSEC630_TeamAssignment_TeamBlazer_FINALRonald Jackson, Jr
 
IRJET- Application Backup and Restore across Multiple Devices
IRJET-	 Application Backup and Restore across Multiple DevicesIRJET-	 Application Backup and Restore across Multiple Devices
IRJET- Application Backup and Restore across Multiple DevicesIRJET Journal
 
IRJET- Detection of Intrinsic Intrusion and Auspice System by Utilizing Data ...
IRJET- Detection of Intrinsic Intrusion and Auspice System by Utilizing Data ...IRJET- Detection of Intrinsic Intrusion and Auspice System by Utilizing Data ...
IRJET- Detection of Intrinsic Intrusion and Auspice System by Utilizing Data ...IRJET Journal
 
IRJET- Analysis of using Software Defined and Service Coherence Approach
IRJET- Analysis of using Software Defined and Service Coherence ApproachIRJET- Analysis of using Software Defined and Service Coherence Approach
IRJET- Analysis of using Software Defined and Service Coherence ApproachIRJET Journal
 
Development of Farm Records Software
Development of Farm Records SoftwareDevelopment of Farm Records Software
Development of Farm Records SoftwareOyeniyi Samuel
 
Social Security Admin FISMA Audit
Social Security Admin FISMA AuditSocial Security Admin FISMA Audit
Social Security Admin FISMA AuditDavid Sweigert
 
Cyb 610 Motivated Minds/newtonhelp.com
Cyb 610 Motivated Minds/newtonhelp.comCyb 610 Motivated Minds/newtonhelp.com
Cyb 610 Motivated Minds/newtonhelp.comamaranthbeg55
 
Srs template
Srs templateSrs template
Srs templatemuqeet19
 
Cst 610 Motivated Minds/newtonhelp.com
Cst 610 Motivated Minds/newtonhelp.comCst 610 Motivated Minds/newtonhelp.com
Cst 610 Motivated Minds/newtonhelp.comamaranthbeg53
 
Remote administration of bms through android application
Remote administration of bms through android applicationRemote administration of bms through android application
Remote administration of bms through android applicationeSAT Journals
 
Bug Tracking System (BTS)
Bug Tracking System (BTS)Bug Tracking System (BTS)
Bug Tracking System (BTS)IRJET Journal
 
Tr computer hardware servicing nc ii
Tr computer hardware servicing nc iiTr computer hardware servicing nc ii
Tr computer hardware servicing nc iiJoanVecilla
 
User Provisioning, Comparison of Common Methodologies, Cloud Provisioning
User Provisioning, Comparison of Common Methodologies, Cloud ProvisioningUser Provisioning, Comparison of Common Methodologies, Cloud Provisioning
User Provisioning, Comparison of Common Methodologies, Cloud ProvisioningDave Wippich
 
Bml 303 past papers pack
Bml 303 past papers packBml 303 past papers pack
Bml 303 past papers packSan King
 

What's hot (18)

CSEC630 individaul assign
CSEC630 individaul assignCSEC630 individaul assign
CSEC630 individaul assign
 
CSEC630_TeamAssignment_TeamBlazer_FINAL
CSEC630_TeamAssignment_TeamBlazer_FINALCSEC630_TeamAssignment_TeamBlazer_FINAL
CSEC630_TeamAssignment_TeamBlazer_FINAL
 
IRJET- Application Backup and Restore across Multiple Devices
IRJET-	 Application Backup and Restore across Multiple DevicesIRJET-	 Application Backup and Restore across Multiple Devices
IRJET- Application Backup and Restore across Multiple Devices
 
IRJET- Detection of Intrinsic Intrusion and Auspice System by Utilizing Data ...
IRJET- Detection of Intrinsic Intrusion and Auspice System by Utilizing Data ...IRJET- Detection of Intrinsic Intrusion and Auspice System by Utilizing Data ...
IRJET- Detection of Intrinsic Intrusion and Auspice System by Utilizing Data ...
 
IRJET- Analysis of using Software Defined and Service Coherence Approach
IRJET- Analysis of using Software Defined and Service Coherence ApproachIRJET- Analysis of using Software Defined and Service Coherence Approach
IRJET- Analysis of using Software Defined and Service Coherence Approach
 
Development of Farm Records Software
Development of Farm Records SoftwareDevelopment of Farm Records Software
Development of Farm Records Software
 
Social Security Admin FISMA Audit
Social Security Admin FISMA AuditSocial Security Admin FISMA Audit
Social Security Admin FISMA Audit
 
IRS_Tier_2_Compiler_Policy_V3
IRS_Tier_2_Compiler_Policy_V3IRS_Tier_2_Compiler_Policy_V3
IRS_Tier_2_Compiler_Policy_V3
 
Cyb 610 Motivated Minds/newtonhelp.com
Cyb 610 Motivated Minds/newtonhelp.comCyb 610 Motivated Minds/newtonhelp.com
Cyb 610 Motivated Minds/newtonhelp.com
 
Srs template
Srs templateSrs template
Srs template
 
Cst 610 Motivated Minds/newtonhelp.com
Cst 610 Motivated Minds/newtonhelp.comCst 610 Motivated Minds/newtonhelp.com
Cst 610 Motivated Minds/newtonhelp.com
 
Remote administration of bms through android application
Remote administration of bms through android applicationRemote administration of bms through android application
Remote administration of bms through android application
 
Database Security - IK
Database Security - IKDatabase Security - IK
Database Security - IK
 
Bug Tracking System (BTS)
Bug Tracking System (BTS)Bug Tracking System (BTS)
Bug Tracking System (BTS)
 
Tr computer hardware servicing nc ii
Tr computer hardware servicing nc iiTr computer hardware servicing nc ii
Tr computer hardware servicing nc ii
 
User Provisioning, Comparison of Common Methodologies, Cloud Provisioning
User Provisioning, Comparison of Common Methodologies, Cloud ProvisioningUser Provisioning, Comparison of Common Methodologies, Cloud Provisioning
User Provisioning, Comparison of Common Methodologies, Cloud Provisioning
 
Bml 303 past papers pack
Bml 303 past papers packBml 303 past papers pack
Bml 303 past papers pack
 
Documentation
DocumentationDocumentation
Documentation
 

Similar to IRJET - Scrutinize the Utility of Preserved Data with Privacy

Large Scale User Provisioning with Hitachi ID Identity Manager
Large Scale User Provisioning with Hitachi ID Identity ManagerLarge Scale User Provisioning with Hitachi ID Identity Manager
Large Scale User Provisioning with Hitachi ID Identity ManagerHitachi ID Systems, Inc.
 
IRJET- Smart Mobile Attendance System using Bluetooth Technology
IRJET-  	  Smart Mobile Attendance System using Bluetooth TechnologyIRJET-  	  Smart Mobile Attendance System using Bluetooth Technology
IRJET- Smart Mobile Attendance System using Bluetooth TechnologyIRJET Journal
 
IRJET- Employee Task Management System with High Authentication
IRJET- Employee Task Management System with High AuthenticationIRJET- Employee Task Management System with High Authentication
IRJET- Employee Task Management System with High AuthenticationIRJET Journal
 
School management System
School management SystemSchool management System
School management SystemHATIM Bhagat
 
IRJET- Android Application for Employee Monitoring and Tracking System.
IRJET- Android Application for Employee Monitoring and Tracking System.IRJET- Android Application for Employee Monitoring and Tracking System.
IRJET- Android Application for Employee Monitoring and Tracking System.IRJET Journal
 
Android Application For Employee Monitoring And Tracking System
Android Application For Employee Monitoring And Tracking SystemAndroid Application For Employee Monitoring And Tracking System
Android Application For Employee Monitoring And Tracking SystemSheila Sinclair
 
IRJET - College Event Management System
IRJET - College Event Management SystemIRJET - College Event Management System
IRJET - College Event Management SystemIRJET Journal
 
Cake shop billing system
Cake shop billing systemCake shop billing system
Cake shop billing systemAkshita Pillai
 
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET-  	  Secure Scheme For Cloud-Based Multimedia Content StorageIRJET-  	  Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET- Secure Scheme For Cloud-Based Multimedia Content StorageIRJET Journal
 
Bus information live monitoring system
Bus information live monitoring systemBus information live monitoring system
Bus information live monitoring systemVenkat Projects
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...IRJET Journal
 
major project report Property Management
 major project report Property Management major project report Property Management
major project report Property Managementankonline
 
IRJET - Leave Management System for AIKTC
IRJET - Leave Management System for AIKTCIRJET - Leave Management System for AIKTC
IRJET - Leave Management System for AIKTCIRJET Journal
 
IRJET - Employee Monitoring and Tracking System
IRJET -  	  Employee Monitoring and Tracking SystemIRJET -  	  Employee Monitoring and Tracking System
IRJET - Employee Monitoring and Tracking SystemIRJET Journal
 
Cross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokensCross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokenseSAT Journals
 
Cross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokensCross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokenseSAT Publishing House
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesIRJET Journal
 
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...IRJET Journal
 

Similar to IRJET - Scrutinize the Utility of Preserved Data with Privacy (20)

Large Scale User Provisioning with Hitachi ID Identity Manager
Large Scale User Provisioning with Hitachi ID Identity ManagerLarge Scale User Provisioning with Hitachi ID Identity Manager
Large Scale User Provisioning with Hitachi ID Identity Manager
 
IRJET- Smart Mobile Attendance System using Bluetooth Technology
IRJET-  	  Smart Mobile Attendance System using Bluetooth TechnologyIRJET-  	  Smart Mobile Attendance System using Bluetooth Technology
IRJET- Smart Mobile Attendance System using Bluetooth Technology
 
IRJET- Employee Task Management System with High Authentication
IRJET- Employee Task Management System with High AuthenticationIRJET- Employee Task Management System with High Authentication
IRJET- Employee Task Management System with High Authentication
 
Srs template ieee se-1
Srs template ieee se-1Srs template ieee se-1
Srs template ieee se-1
 
School management System
School management SystemSchool management System
School management System
 
IRJET- Android Application for Employee Monitoring and Tracking System.
IRJET- Android Application for Employee Monitoring and Tracking System.IRJET- Android Application for Employee Monitoring and Tracking System.
IRJET- Android Application for Employee Monitoring and Tracking System.
 
Android Application For Employee Monitoring And Tracking System
Android Application For Employee Monitoring And Tracking SystemAndroid Application For Employee Monitoring And Tracking System
Android Application For Employee Monitoring And Tracking System
 
IRJET - College Event Management System
IRJET - College Event Management SystemIRJET - College Event Management System
IRJET - College Event Management System
 
Cake shop billing system
Cake shop billing systemCake shop billing system
Cake shop billing system
 
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET-  	  Secure Scheme For Cloud-Based Multimedia Content StorageIRJET-  	  Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
 
Bus information live monitoring system
Bus information live monitoring systemBus information live monitoring system
Bus information live monitoring system
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
 
SRS CPP LAB.docx
SRS CPP LAB.docxSRS CPP LAB.docx
SRS CPP LAB.docx
 
major project report Property Management
 major project report Property Management major project report Property Management
major project report Property Management
 
IRJET - Leave Management System for AIKTC
IRJET - Leave Management System for AIKTCIRJET - Leave Management System for AIKTC
IRJET - Leave Management System for AIKTC
 
IRJET - Employee Monitoring and Tracking System
IRJET -  	  Employee Monitoring and Tracking SystemIRJET -  	  Employee Monitoring and Tracking System
IRJET - Employee Monitoring and Tracking System
 
Cross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokensCross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokens
 
Cross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokensCross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokens
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
 
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 

Recently uploaded (20)

OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 

IRJET - Scrutinize the Utility of Preserved Data with Privacy

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 4011 SCRUTINIZE THE UTILITY OF PRESERVED DATA WITH PRIVACY Mrs. SABITHA 1, C.P.SHAJIN 2, SUBAASH PON 3,S.SUGANTHAN 4 1 Assistant Professor, Dept. of IT, Jeppiaar SRR Engineering College, Chennai, Tamil Nadu 2,3B.TECH., Dept. of IT, Jeppiaar SRR Engineering College, Chennai, Tamil Nadu ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - A large amount of data which has been handled over a sector in note to that the data which has been collected from the source will be stored in a database. The admin has the authority of approving the manager so that after the approval of admin the manager can access the application. Once the manager gets declined by the admin the can't able to login in that process the manager won’t be able to access the application. The details which have been stored can be retrieved later in case of using those details or viewing those information. The admin and the manager is one who can able to view the actions performed by the employees. By handling these data by the admin. The admin can view the data. In case of loss of data or theft of data in a form of attack the manager and the admin can view the details of the employee who has been attacked in the form of tables. The action can be performed here. The details can be attacked by four methods such as a data linkage attack, attribute attack, table linkage attack and probabilistic attack. By these attacks, we can attack the details of an individual by gettingtheiridwhich has been published. By this action the manager and theadmincan view the details of the employee who has been attacked . 1. INTRODUCTION: A security system identifies and mitigates the system vulnerabilities or restricting access toa verysmall group.The competition between inventing new security measures to protect data and inventing hacking techniquesinconjunction with discovering and leveragingpreexistingvulnerabilitiesis infinite. Therefore, securing data and resources is becoming more and more challenging day by day. Nevertheless, there exist several different techniques to secure the data being transferred over network and also that on a user machine. Specializes in securing data in motion through the use of the patented REL-ID based mutual authentication scheme. Itcan be used to ensure that the end user is secured as well as the tunnel. It uses techniques of authentication to assure to each end user that it is communicating with an authorized user and not a fake one. Such security measures used to secure data in motion, meaning data that has been shared between computers. 2. SYSTEM ANALYSIS: After analyzing requirement of the task to be performed, the next step is to analyzing the problem in the module and understand the context. The first activity in the phase is studying existing system and another one is understand the requirement and domain of the new system. Both the activities equally important in the system, but the first activity serve as a basis of giving the functional specifications .Understanding the properties and requirements of a new system is more difficulties and understanding the existing running system is difficult, improper understanding of the present system can lead diversion from the solution. 2.1. SYSTEM REQUIREMENTS: 2.1.1. HARDWARE REQUIREMENTS:  RAM 4GB  Dual-Core 2.8 GHz Processor and Above  HDD 80 GB Hard Disk Space in the Hardware 2.1.2. SOFTWARE REQUIREMENTS:  WINDOWS OS (7 /XP and above)  Visual Studio .Net 2015  Visual Studio .Net Framework 4.5  SQL Server 2014 2.2. MODULE DESCRIPTION: 2.2.1.ADMIN MODULE: The process of admin is to monitor each and every action in an organization and to proceed with the action in Admin. Part of the admin set up is users management which allows users to be set up with definable access level, access to a single or multiple branches. Admin can also set up overall system security settings such as required password strength, inactive sessiontimeout,inactiveaccountslockout, a password reset period, etc. An important partofsecurity is processed any changes in the system are logged here. 2.2.2. MANAGER MODULE: The manager module allows userstoregister,login, and log out. They benefit from being able to sign on because these associates content they create with their account and allows various permissions to be set for their roles. The manager module support user roles, which set up with fine- grained permissions allowing each role to do only what the administrator permits. Each user is assigned one or more roles. By default, there are three roles in the module: anonymous (a user who has not logged in) andauthenticated (a user who is registered), and administrator (a signed-in user who will be assigned site administrator permissions).
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 4012 2.2.3. EMPLOYEE MODULE: Gonna replace it with some other data without the knowledge of the employees. Andthosemodifieddata will be shown only to the manager and the admin. Admin is the one has given the authority to handle those changed data in the database.so retrieving of data can be done onlybytheadmin in this application. 2.2.4. AUTHORIZATION MODULE: In authorization the admin will be The employee is the actor added by the manager with certain terms.Oncethe employee has been added those details will be shown to the manager and the admin. they will be having complete information of the employee. The manager can able view only the persons who have been added and they will be given some task to performed by the manager. A complete information about the employees and managers will be shown only to the manager in their database. 2.2.5. THIRD-PARTY MODULE: The third party is the one who will be gettingsomedetails of those employees and they will perform some actions in the local host with the collection of those data. Without the knowledge of employees, they are going to make some changes in the application they are going to theft the data and authorizing the manager in formofapproval anddecline the manager will be having registration once the manager registered the details will be shown to admin by this the admin will be authorizing the manager. once the admin declines the manager will not be able to login if admin approves the manager can able to login. 2.2.6. PROFILE MODULE: In profile the manager can able to view the particular applicants who login in the application they can able view the id, designation and some other details. Where the admin can able to view the complete details. 2.2.7.ADD EMPLOYEE MODULE The Employees module consists of various features allowing you to perform general management tasks such as employee history, perks and incident reports and all the forms and reports necessary to keep track of all your employee data, including age, certificates, personal details.. Any information needed is available at the click of a button with comprehensive reporting features. 3. FUNCTIONAL REQUIREMENTS: Following is a list of functionalities of the browsing enabled system in the requirements.  An Activity with a UI that allows you to browser settings. Provide a second Activity that allowsusers to access the share with permission from the administrator. Handle activity lifecycle appropriately. A precondition for any points in this part of the grade is code that compiles and runs.  Your application should allow a user to browse the shares, buy and sell the shares with specific metadata. The assignment requires you to create a UI for browsing and a UI for integrating the two. 3.1. NON-FUNCTIONAL REQUIREMENTS:  Each member should have a separate system. The system should ask the username and password to open the application in the given requirements. It doesn’t permit to unregistereduserstoaccessinthe System. The system should have the Role based System functions access. Approval Processhas tobe defined. The system should have the Modular customization components so that they can be reused across the implementation.  These are the mainly following:  Secure access of confidential data (employee’s details). 24 X 7 availability.  Better component design to get better performance at peak time in the requirements. 3.2. PERFORMANCE REQUIREMENTS: Performance is measured in terms of the output in the requirements provided by the application. Requirement specification plays an important role in the analysis of the system. Only when the required specifications are properly given, it is possible to design a system, which will fit into required environment. It rests largely inthepartoftheusers of the existing system to give the required specifications because they are the people who finally use the system. It is very difficult to modify the system once it has designed and on the other hand designing a system, which does not cater to the requirements of the user, is of no use. 4. SYSTEM DEVELOPEMENT ENVIRONMENT: 4.1. THE .NET FRAMEWORK ARCHITECTURE: The .NET Framework isa framework wasdeveloped by the Microsoft Company that runs in the Microsoft Windows for pc. It includes a class library called as Framework Class Library (FCL) and provides language interoperability across several programming languages. Programs written for the .NET Framework execute in the software environments, called as the Common Language Runtime (CLR), that application virtual machine that provides service such as securities, memory control managements and exception handlings, FCL and the CLR together constitute .NET Framework. FCL provides interfaces, data accessinthedtabases, database connectivities, cryptographies, web applications developments, numeric algorithms, and network
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 4013 communications. Programmers produced the software by combining their own source code with the .NET Framework and other libraries. The .NET Framework isintendedtoused by most application created for the Windows platforms. Microsoft also produced the integrated development environment largely for .NET software called Visual Studios. The first level is the representation of the operating system; the .NET layer is located between system and applications. The second level is one of the runtime such as Common Language Runtime (CLR), which provides the part of the .NET Framework. We discuss the CLR later in this chapter. The next level is one of the library such as Base Class Library (BCL), which provides all .NET objects that are used both in your code and by Visual Basic when creating applications. The BCL also provides the infrastructure of several technology that used in the building applications, such as WPF, Windows Form, ASP.NET, WCF, and etc. The last level is represented by applications that the previous layers. – CLS is one of the agreements among language designers and class library designers about the features and usage conventions that can be relied upon. • Example: public names should not in the case for uniqueness. Since some languages are not case sensitive. • This does not mean all languages are not case sensitive in the above the CLR. The Common Type System • At the core of the Framework is a universal type system called the .NET Common Type System (CTS)? • Everything is an object - but efficient – Boxing and Unboxing • All types fall into two types of categories - Value types and Reference types. – Value types contain the actual datas (cannot be null). – Stored on the stack databases. – Three kinds of value types in the stack: Primitives, structures, and enumerations. •Compilers map keywords to the primitive types. For Example, the C# “int” is mapped to the System.Int32. 4.2. SQL SERVER 2014: SQL is a relational database management system (RDBMS) that runs the multi-user access to a numberofthedatabases. It is a popular choice of database for the use in web applications and is an open source product. The process of settingupa SQLdatabasevariesfrom host to host, however, we will end up with a database name, a user name and a password. Before using our data in the database, we must create a table. We will then be taken to a setup screen where you must create the fields in the database. SQL is used to communicate with a database. According to ANSI (American National Standards Institute), it is the standard language for the relational database in the management systems. SQL statements are used to perform tasks such as update the data in the database, or retrieve data from the database. Some common relational database management systems that use the statements SQL are: Oracle, Sybase, Microsoft SQL Server, Access, Ingres, etc. 5. SYSTEM DESIGN: Software designs in the software engineering process and technical process and applied for the development paradigm. Design is the first step in the development phase for engineered product and system.The designer’s goal is produce a model or representation of an entity that will later be built. System requirements has specified or analyzed, system design has three technical activities -design, code and test that is required to build and verify software. Software design serves as a foundation for all b software engineering steps that follow. Without strong design we building an unstable system – one that will be
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 4014 difficult to test, one whose quality cannot be assessed until the last stage. During design, progressive refinement of the data structure, programstructures,andprocedural aredeveloped reviewed and documented. System design can be viewed from either technical and project management perspective. From the technical point of view, design is four activities – architectural design, data structure design, interface design and procedural design. 5. 1.NORMALIZATION: It is a process of converting relation to standard form. The process is used to handle the problems, i.e. repetition of datas in that databases, maintain data integrity as well as handling problems that can arise due to insert, Update, delete anomalies. Insertion anomaly: Inability to add datas to that databases due to absence of other datas. Deletion anomaly: Unintended loss of data due to deletion of other datas. Update anomaly: Data inconsistency resultings from data redundancy and partial updates. Normal Forms: These are the rule for structuring relation that eliminate anomalies. 5.1.1. FIRST NORMAL FORM: A relation is said to be in first normal form if the values in that relation are atomic for every attribute in the relation. By this we mean simply no attribute value can be a set of values or, as it is sometimes expressed, a repeating group. 5.1.2. SECOND NORMAL FORM: A relation is said to be in the second normal form is it is in first normal form and it should satisfy any one of the following rules.  The primary key is a not a composite primary key  No, non key attributes are present  Every non key attribute isfullyfunctionally dependent on a full set of primary key. 5.1.3. THIRD NORMAL FORM: A relation is said to be third normal formiftheirexit no transitive dependencies. Transitive Dependency: If two non key attributes depends on the each other as well as the primary key, then they are said to be transitively dependent. The above normalization principles are applied to decompose the data in multiple tables, thereby making the data to be maintained in a consistent stat 6. SYSTEM ARCHITECTURE: 6.1. E – R DIAGRAMS:  The relations are upon the system is structuredthrough the conceptual Entity Relatioship-Diagram, which not only specifics the existing entities, but also the standard relations through which the system exists and the cardinalities are necessary for the system state to continue.  The Entity Relationship Diagram (ERD) depicts the relationship between data objects. The ERD is the notation that is used conduct, the date modelingactivity the attributes of each data object noted, is the ERD can be described resign a data object description.  The set of primary components are identified by the ERD are  Data object  Relationships  Attributes  Various types of indicators. The primary purpose of the ERD is represent data objects and their relationships.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 4015 6.2. USE CASE DIAGRAM: 6.3. SEQUENCE DIAGRAM:
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 4016 6.4. CLASS DIAGRAM: 6.5. ACTIVITY DIAGRAM 6.6. DEPLOYMENT DIAGRAM:
  • 7. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 4017 7. CONCLUSION & FUTURE ENHANCEMENT: The important goal of this work is to preserve the privacy of the multiple Sensitive data and to improve the utility of published dataIt discusses the analyzing approach in brief along with a comparison of its different values.Data analyzing is an efficient approach to the utility of published data with privacy to protect the privacy of published data which modifies the dataset to prevent sensitiveinformation. This yields the means for the prevention of privacy threats like membership, identity and data disclosure. Also, this method can be used to operate for any number of Sensitive information in an efficient manner. In the future, the slicing of secured data with the flow of details is attacked and to reduce the time further through increased processor speed and memory with privacy. 8. REFERENCES: [1] A Survey on Learning to Hash, J. Wang, T. Zhang,02 May 2017, https://www.microsoft.com/en-us/research/wp- content/uploads/2017/01/LTHSurvey.pdf [2] Binary Multi View Clustering, Zheng Zhang, Ling Shao ,July 2019,https://ieeexplore.ieee.org/document/8387526 [3] Compressed K-Means for Large-ScaleClustering,X.Chen, W.Liu.,2017, https://www.semanticscholar.org/paper/Compressed-K- Means-for-Large-Scale-Clustering-Shen- Liu/93c03ff9421c49b74c234d6486e8884b6d744b54 [4] Fast K-Means with Accurate Bounds,J. Newling, F. Fleuret,Sep 2016, https://arxiv.org/pdf/1602.02514.pdf [5] Learning Short Binary Codes for Large-scale Image Retrieval, Li Liu, Mengyang Yu.,11 January 2017, https://www.freeprojectsforall.com/wp- content/uploads/2018/09/Learning-Short-Binary-Codes- for-Large-scale-Image-Retrieval.pdf [6] Multiview Alignment Hashing for EfficientImageSearch, Mengyang Yu,12 January 2015, https://ieeexplore.ieee.org/abstract/document/7006770 [7] Multi-View Clustering via Joint Non-negative Matrix Factorization,JialuLiu , Chi Wang , Jing Gao, and Jiawei Han,May-2013, https://www.researchgate.net/publication/279953559 Multi_View_Clustering_via_Joint_Nonnegative_Matrix_Factori zation [8] Unsupervised Deep Hashing with Similarity-Adaptive and Discrete Optimization,FuminShen, YanXu,Yang Yang,05 January-2018, https://ieeexplore.ieee.org/abstract/document/8247210.