100% found this document useful (1 vote)
809 views76 pages

Project Report On An Efficient and Privacy Preserving Biometric Identification Scheme in Cloud Computing

This document discusses a project report on an efficient and privacy-preserving biometric identification scheme in cloud computing. The goal is to design a protocol that enables efficient and privacy-preserving biometric identification using the cloud. Existing solutions focus on privacy but ignore efficiency. The proposed solution aims to encrypt biometric data before outsourcing it to the cloud for storage. It would then allow an authorized party to generate an encrypted identification query that the cloud can run over the encrypted database to find matches, preserving privacy while enabling efficient identification. The report outlines the objectives, scope, literature review, requirements, technologies used, system design, components, and testing of the proposed solution.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
809 views76 pages

Project Report On An Efficient and Privacy Preserving Biometric Identification Scheme in Cloud Computing

This document discusses a project report on an efficient and privacy-preserving biometric identification scheme in cloud computing. The goal is to design a protocol that enables efficient and privacy-preserving biometric identification using the cloud. Existing solutions focus on privacy but ignore efficiency. The proposed solution aims to encrypt biometric data before outsourcing it to the cloud for storage. It would then allow an authorized party to generate an encrypted identification query that the cloud can run over the encrypted database to find matches, preserving privacy while enabling efficient identification. The report outlines the objectives, scope, literature review, requirements, technologies used, system design, components, and testing of the proposed solution.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 76

Project Report

On
AN EFFICIENT AND PRIVACY PRESERVING BIOMETRIC
IDENTIFICATION SCHEME IN CLOUD COMPUTING
Mini Project Report Submitted for partial fulfillment for the award of
Bachelor of Technology
In
Computer Science & Engineering
Submitted by
B. Srivani 16UQ1A0558

Under the Guidance of


B.PHIJIKMTECH,( Phd)
( Sr.Assistant Professor&Head of the Department)
Computer Science& Engineering

Vignan’s Institute of Technology and Aeronautical Engineering


Approved by AICTE, Affiliated to JNTU Hyderabad
Deshmukhi (V), Yadadri Bhuvanagiri Dist Telangana-508218
2019-2020
VIGNAN’S INSTITUTE OF TECHNOLOGY & AERONAUTICAL
ENGINEERING

CERTIFICATE
We here by declare that the work being presented in this report entitled

“AN EFFICIENT AND PRIVACY PRESERVING BIOMETRIC IDENTIFICATION SCHEME

IN CLOUD COMPUTING”isan authenticate record of B.Srivani(16UQ1A0558)

And it work carried out under the supervision of B.PHIJIK.The matter embodied in this

Report has not been submitted to any other university/Institute by us for the award of any

Other degree.

Department: This is to certify that the above statement made by the candidates is

correct to the best of our knowledge.

MR.B.PHIJIK MR.B.PHIJIK
Head of the Department AssistantProfessor
Computer Science& Engineering Computer Science &Engineering

(External examiner)
ACKNOWLEDGEMENT

The satisfaction that accompanies the successful completion of any task would be
incomplete without the mention of the people who made it possible and whose constant
encouragement and guidance has been a source of inspiration throughout the course of this
project. We take this opportunity to express our gratitude to all those who have helped us in this
project.

Our deep sense of gratitude and sincere thanks to Dr. C. Srinivasa Kumar Principal,
for having provided the facilities to undertake and complete this project.

We are deeply indebted B.Phijik, Head of the Department CSE for his ineffable encouragement
he provided.

Our sincere thanks to our internal guide B.Phijik, Asst.Prof Department of CSE, for his
guidance and constant supervision as well as for providing necessary information regarding the
project & also for his support in completing the project.

Last but not least I wish to avail myself of this opportunity, express a sense of gratitude
and thanks to my friends and my beloved parents for their manual support, strength and help.

B. Srivani 16UQ1A0558
Abstract

Biometric identification has become increasingly popular in recent years. With the development
of cloud computing, database owners are motivated to outsource the large size of biometric data
and identification tasks to the cloud to get rid of the expensive storage and computation costs,
which however brings potential threats to users’ privacy. In this paper, we propose an efficient
and privacy-preserving biometric identification outsourcing scheme. Specifically, the biometric
data is encrypted and outsourced to the cloud server. To execute a biometric identification, the
database owner encrypts the query data and submits it to the cloud. The cloud performs
identification operations over the encrypted database and returns the result to the database
owner. A thorough security analysis indicates the proposed scheme is secure even if attackers
can forge identification requests and collude with the cloud. Compared with previous protocols,
experimental results show the proposed scheme achieves a better performance in both
preparation and identification procedures.
Index
Topic page no

1.Introduction
1.1About Project 1
1.2 Objective 1
1.3 Scope 3
2.Literature Survey Report 4
2.1 Existing system 5
2.2 Proposed system 6
3. Requirement Specifications 7
3.1 Functional Requirements 8
3.2 Hardware and Software Requirements 9
4. Technologies Used 10
4.1description of the primary technology 11
4.2description about the secondary technology 13
4.3description about the environment 14
4.4description about the IDE 23
4.5description about the database 24
5. System Architectural Design 25
5.1system architecturediagram 26
5.2class diagram 26
5.3 usecase diagram 28
5.4sequence diagram 30
5.5dataflow diagram 31
5.6flowchart 32
5.7collaboration diagram 33
6. Detailed Description of Components 34
6.1 javascript 35
6.2jdbc 36
6.3java server page 37
Topic page no
7. Testing 40
8. Screen Shots 44
8.1home page 45
8.2 cloud server login page 46
8.3 cloud main page 48
8.4view all owners page 49
8.5View all users page 50
8.6 view all image files page 51
8.7 view all attackers page 52
8.8owner login page 53
8.9owner biometric identification page 54
8.10data owner main page 55
8.11 owner profile page 56
8.12upload image page 57
8.13upload image 58
8.14owner image files page 61
8.15image verification page 62
8.16user main page 63
8.17Search biometric images page 64
8.18view all consumer search history 66
9. Conclusion
9.1. Conclusion 67

10. Bibliography
References 68
FIGURES

Name of the Figure Page No

1.system Architecture 26

2.class diagram 27

3.use case diagram 28


4.sequence diagram 30
5.dataflow diagram 31
6.flowchart 32
7.collaboration diagram 33
INTRODUCTION
INTRODUCTION

1.1About project
Biometricidentificationhas raised increasingly attention since it provides a promising way
to identify users. Compared with traditional authentication methods based on passwords
and identification cards, biometric identification is consideredto bemore reliable and
convenient . Additionally, biometric identification has been widely applied in many fields
by using biometric traits such as fingerprint , iris , and facial patterns , which can be
collected from various sensors . In a biometric identification system, the database owner
such as the FBI who is responsible to manage the national fingerprints database, may
desire to outsource the enormous biometric data to the cloud server (e.g., Amazon) to get
rid of the expensive storage and computation costs. However, to preserve the privacy of
biometric data, the biometric data has to be encrypted before outsourcing. Whenever a
FBI’s partner (e.g., the police station) wants to authenticate an individual’s identity, he
turns to the FBI and generates an identification query by using the individual’s biometric
traits (e.g., fingerprints, irises, voice patterns, facial patterns etc.). Then, the FBI encrypts
the query and submits it to the cloud to find the close match.Thus,the challenging
problemis how todesigna protocol whichenablesefficientandprivacypreserving biometric
identification in the cloud computing.
A number of privacy-preserving biometric identification solutions have been
proposed. However, most of them mainly concentrate on privacy preservation but ignore
the efficiency, such as the schemes based on homomorphic encryption and oblivious
transfer in for fingerprintandface image identification respectively. Suffering from
performance problems of local devices, these schemes are not efficient once the size of
the database is larger than 10 MB. Later, Evans et al presented abiometric identification
scheme by utilizing circuit design and ciphertext packing techniques to achieve efficient
identification for aVOLUME 4, 2016 1IEEE Access and Transaction on Cloud
Computing,Volume:6,Issue Date:26.March.2018larger data base of upto
1GB.Additionally,Yuan and Yu proposed an efficient privacy preserving biometric
identification scheme.
Specifically ,they constructed three modules and designed a concrete protocol to achieve
the security of fingerprint trait. To improve the efficiency, in their scheme, the database

Vignan’s Institute Of Technology And Aerounatical Engineering Page 1


owner out sources identification matching tasks to the cloud.However,Zhuetal pointed
out that Yuan and Yu’s protocol can be broken by a collusion attack launched by a
malicious user and cloud. Wang et al. proposed the scheme Cloud BI- II which used
random diagonal matrices to realize biometric identification. However, their work was
proven insecure . In this paper, we propose an efficient and preservingbiometric
identification scheme which can resist the collusion attack launched by the users and the
cloud. Specifically, our main contributions can be summarized as follows: We examine
the biometric identification scheme and show its insufficiency sand security weakness
under the proposed level-3 attack. Specifically, we demonstrate that the attacker can
recover their secretkeys by colluding with the cloud,and the end encrypts the biometric
traits of all users. We present a novel efficient and privacy-preserving biometric
identification scheme. The detailed security analysis shows that the proposed scheme can
achieve a required level of privacy protection. Specifically, our scheme is secure under
the biometric identification outsourcing model and can also resist the attack proposed by
Compared with the existing biometric identification schemes, the performance analysis
shows that the proposed scheme provides a lower computational cost in both preparation
and identification procedures.

Figure:system model

Vignan’s Institute Of Technology And Aerounatical Engineering Page 2


1.2objective

In this paper, we propose an efficient and privacy-preserving biometric identification


outsourcing scheme. Specifically, the biometric data is encrypted and outsourced to the cloud
server. To execute a biometric identification, the database owner encrypts the query data and
submits it to the cloud. The cloud performs identification operations over the encrypted
database and returns the result to the database owner. A thorough security analysis indicates
the proposed scheme is secure even if attackers can forge identification requests and collude
with the cloud. Compared with previous protocols, experimental results show the proposed
scheme achieves a better performance in both preparation and identification procedures.

1.3Scope
Biometric identification has raised increasingly attention since it provides a promising
way to identify users. Compared with traditional authentication methods based on
passwords and identification cards, biometric identification is consideredto be more
reliable and convenient . Additionally, biometric identification has been widely applied in
many fields by using biometric traits such as fingerprint , iris , and facial patterns , which
can be collected from various sensors.

Vignan’s Institute Of Technology And Aerounatical Engineering Page 3


LITERATURE SURVEY
REPORT

Vignan’s Institute Of Technology And Aerounatical Engineering Page 4


2. Literature Survey Report

2.1Existing system

 Related works on privacy-preserving biometric identification are provided in this


section. Recently, some efficient biometric identification schemes have been
proposed. Wangand Hatzinakos proposed a privacy-preserving face recognition
scheme . Specifically, a face recognition method is designed by measuring the
similarity between sorted index numbers vectors. Wong and Kim proposed a
privacy preserving biometric matching protocol for iris codes verification. In their
protocol, it is computationally infeasible for a malicious user to impersonate as an
honest user.
 Barni et al. presented a Finger Code identification protocol based on the
Homomorphic Encryption technique. However, all distances are computed between
the query and sample Finger codes in the database, which introduces too much
burden as the size of fingerprints increases.
 To improve the efficiency, Evans et al. proposed a novel protocol which reduces the
identification time. They used an improved Homomorphic encryption algorithm to
compute the Euclidean distance and designed novel garbled circuits to find the
minimum distance. By exploiting a backtracking protocol, the best match Finger-
Code can be found. However, in the whole encrypted database has to be transmitted
to the user from the database server.
 Wong et al. proposed an identification scheme based on kNN to achieve secure
search in the encrypted database.

Disadvantages

 The system doesn’t implement Biometric Identification Scheme.


 There is no an affective privacy preserving encryption techniques in this system.

Vignan’s Institute Of Technology And Aerounatical Engineering Page 5


Proposed system:

 The proposed system examines the biometric identification scheme and shows its
insufficiencies and security weakness under the proposed level-3 attack. Specifically,
we demonstrate that the attacker can recover their secret keys by colluding with the
cloud, and then decrypt the biometric traits of all users.
 The system presents a novel efficient and privacy-preserving biometric identification
scheme. The detailed security analysis shows that the proposed scheme can achieve a
required level of privacy protection. Specifically, our scheme is secure under the
biometric identification outsourcing model and can also resist the attack proposed by
the proposed system.
 Compared with the existing biometric identification schemes, the performance
analysis shows that the proposed scheme provides a lower computational cost in both
preparation and identification procedures.

Advantages

 An efficient and privacy preserving biometric identification scheme which can resist
the collusion attack launched by the users.
 Attackers can only observe the encrypted data stored in the cloud. In order to avoid,
the well-known cipher text-only attack model has been implement.

Vignan’s Institute Of Technology And Aerounatical Engineering Page 6


REQUIREMENT SPECIFICATIONS

Vignan’s Institute Of Technology And Aerounatical Engineering Page 7


3.Requirement specifications

3.1 Functional requirements:

Data Owner
In this module, the data owner uploads their Biometric images with their
contents data to the Cloud server. For the security purpose the data owner assigns the digital
sign and then store in the Cloud and also performs the following operations such as Upload
Biometric image with its digital sign based on title, desc, List all uploaded Biometric images,
Verify Biometric image details, and Delete Biometric image details.

Cloud Server

The Cloud service provider manages a Cloud to provide data storage service.
And performs the following operations such as Store all Biometric image files with their
signature, View all Biometric image Files with its details, View all Biometric image
comments, View all Data owners and Users, and View all attackers.

User
The Cloud User who has a large amount of data to be stored in Cloud Servers and
have the permissions to access and manipulate stored Biometric image and its data. The
consumer will search the data and accessing the Biometric image data if he is authorized and
performs the following operations such as Search Biometric image , Access Biometric image
and its details, Download Biometric image & make comments.

Vignan’s Institute Of Technology And Aerounatical Engineering Page 8


3.2 Hardware And Software Requirements:

Hardware:

 Processor - Pentium –IV


 Speed - 3.5 Ghz
 Ram - 2 gb
 Hard Disk - 40 Gb
 Key Board - Standard Windows Keyboard
 Mouse - Two or Three Button Mouse
 Monitor - SVGA

Software :

 Operating System : Windows XP/ Later Version


 Coding Language : Java/J2EE
 Front End : HTML
 Database : MySql

System requirements:

Operating system:windows 10 or above

Vignan’s Institute Of Technology And Aerounatical Engineering Page 9


TECHNOLOGIES USED

Vignan’s Institute Of Technology And Aerounatical Engineering Page 10


4.Technology used

4.1Description of the primary technology

Hyper Text Markup Language

Hypertext Markup Language (HTML), the languages of the World Wide Web (WWW), allows
users to produces Web pages that include text, graphics and pointer to other Web pages
(Hyperlinks).

HTML is not a programming language but it is an application of ISO Standard 8879, SGML
(Standard Generalized Markup Language), but specialized to hypertext and adapted to the
Web. The idea behind Hypertext is that instead of reading text in rigid linear structure, we can
easily jump from one point to another point. We can navigate through the information based on
our interest and preference. A markup language is simply a series of elements, each delimited
with special characters that define how text or other items enclosed within the elements should
be displayed. Hyperlinks are underlined or emphasized works that load to other documents or
some portions of the same document.
HTML can be used to display any type of document on the host computer, which can be
geographically at a different location. It is a versatile language and can be used on any
platform or desktop.
HTML provides tags (special codes) to make the document look attractive. HTML tags are not
case-sensitive. Using graphics, fonts, different sizes, color, etc., can enhance the presentation
of the document. Anything that is not a tag is part of the document itself.
Basic HTML Tags :
<!-- --> Specifies comments
<A>……….</A>Creates hypertext links
<B>……….</B>Formats text as bold
<BIG>……….</BIG>Formats text in large font.
<BODY>…</BODY>Contains all tags and text in the HTML document
<CENTER>...</CENTER>Creates text
<DD>…</DD>Definition of a term
<DL>...</DL>Creates definition list
<FONT>…</FONT>Formats text with a particular font
<FORM>...</FORM>Encloses a fill-out form

Vignan’s Institute Of Technology And Aerounatical Engineering Page 11


<FRAME>...</FRAME>Defines a particular frame in a set of frames
<H#>…</H#>Creates headings of different levels
<HEAD>...</HEAD>Contains tags that specify information about a document
<HR>...</HR>Creates a horizontal rule
<HTML>…</HTML>Contains all other HTML tags
<META>...</META>Provides meta-information about a document
<SCRIPT>…</SCRIPT>Contains client-side or server-side script
<TABLE>…</TABLE>Creates a table
<TD>…</TD>Indicates table data in a table
<TR>…</TR>Designates a table row
<TH>…</TH>Creates a heading in a table

ADVANTAGES:

 A HTML document is small and hence easy to send over the net. It is small because it
does not include formatted information.
 HTML is platform independent.
 HTML tags are not case-sensitive.

Vignan’s Institute Of Technology And Aerounatical Engineering Page 12


4.2 Description about the secondary technology

Tomcat 6.0 web server

Tomcat is an open source web server developed by Apache Group. Apache

Tomcat is the servlet container that is used in the official Reference Implementation for the

Java Servlet and Java Server Pages technologies. The Java Servlet and Java Server Pages

specifications are developed by Sun under the Java Community Process. Web Servers like

Apache Tomcat support only web components while an application server supports web

components as well as business components (BEAs Weblogic, is one of the popular

application server).To develop a web application with jsp/servlet install any web server like

JRun, Tomcat etc to run your application.

Vignan’s Institute Of Technology And Aerounatical Engineering Page 13


4.3 Description about the packages/environment

Java Technology

Java technology is both a programming language and a platform.The Java programming


language is a high-level language that can be characterized by all of the following buzzwords:

 Simple
 Architecture neutral
 Object oriented
 Portable
 Distributed
 High performance
 Interpreted
 Multithreaded
 Robust
 Dynamic
 Secure

With most programming languages, you either compile or interpret a program so that
you can run it on your computer. The Java programming language is unusual in that a program
is both compiled and interpreted. With the compiler, first you translate a program into an
intermediate language calledJava byte codes —the platform-independent codes interpreted by
the interpreter on the Java platform. The interpreter parses and runs each Java byte code
instruction on the computer. Compilation happens just once; interpretation occurs each time
the program is executed. The following figure illustrates how this works.

Vignan’s Institute Of Technology And Aerounatical Engineering Page 14


You can think of Java byte codes as the machine code instructions for the Java Virtual Machine
(Java VM). Every Java interpreter, whether it’s a development tool or a Web browser that can
run applets, is an implementation of the Java VM. Java byte codes help make “write once, run
anywhere” possible. You can compile your program into byte codes on any platform that has a
Java compiler. The byte codes can then be run on any implementation of the Java VM. That
means that as long as a computer has a Java VM, the same program written in the Java
programming language can run on Windows 2000, a Solaris workstation, or on an iMac.

The Java Platform


A platform is the hardware or software environment in which a program runs. We’ve
already mentioned some of the most popular platforms like Windows 2000, Linux, Solaris, and
MacOS. Most platforms can be described as a combination of the operating system and
hardware. The Java platform differs frommost other platforms in that it’s a software-only
platform that runs on top of other hardware-based platforms.
The Java platform has two components:
 The Java Virtual Machine(Java VM)
 The Java Application Programming Interface (Java API)
You’ve already been introduced to the Java VM. It’s the base for the Java platform and is
ported onto various hardware-based platforms.
The Java API is a large collection of ready-made software components that provide many
useful capabilities, such as graphical user interface (GUI) widgets. The Java API is grouped
into libraries of related classes and interfaces; these libraries are known as packages. The next
section, What Can Java Technology Do? Highlights what functionality some of the packages in
the Java API provide.

Vignan’s Institute Of Technology And Aerounatical Engineering Page 15


The following figure depicts a program that’s running on the Java platform. As the figure
shows, the Java API and the virtual machine insulate the program from the hardware.

Native code is code that after you compile it, the compiled code runs on a specific
hardware platform. As a platform-independent environment, the Java platform can be a bit
slower than native code. However, smart compilers, well-tuned interpreters, and just-in-time
byte code compilers can bring performance close to that of native code without threatening
portability.

What Can Java Technology Do?


The most common types of programs written in the Java programming language areapplets
andapplications. If you’ve surfed the Web, you’re probably already familiar with applets. An
applet is a program thatadheres to certain conventions that allow it to run within a Java-enabled
browser.
However, the Java programming language is not just for writing cute, entertaining applets for
the Web. The general-purpose, high-level Java programming language is also a powerful
software platform. Using the generous API, you can write many types of programs.
An application is a standalone program that runs directly on the Java platform. A special kind
of application known as a server serves and supports clients on a network. Examples of servers
are Webservers, proxy servers, mail servers, and print servers. Another specialized program is
a servlet. A servlet can almost be thought of as an applet that runs on the server side. Java
Servlets are a popular choice for building interactive web applications, replacing the use of
CGI scripts. Servletsare similar to applets in that they are runtime extensions of applications.
Instead of working in browsers, though, servlets run within Java Web servers, configuring or
tailoring the server.
How does the API support all these kinds of programs? It does so with packages of software
components that provides a wide range of functionality. Every full implementation of the Java
platform gives you the following features:

Vignan’s Institute Of Technology And Aerounatical Engineering Page 16


 The essentials: Objects, strings, threads, numbers, input and output, data structures, system
properties, date and time, and so on.
 Applets: The set of conventions used by applets.
 Networking: URLs, TCP (Transmission Control Protocol), UDP (User Data gram Protocol)
sockets, and IP (Internet Protocol) addresses.
 Internationalization: Help for writing programs that can be localized for users worldwide.
Programs can automatically adapt to specific locals and be displayed in the appropriate
language.
 Security: Both low level and high level, including electronic signatures, public and private key
management, access control, and certificates.
 Software components: Known as JavaBeansTM, can plug into existing component
architectures.
 Object serialization: Allows lightweight persistence and communication via Remote Method
Invocation (RMI).
 Java Database Connectivity (JDBCTM): Provides uniform access to a wide range of
relational databases.
The Java platform also has APIs for 2D and 3D graphics, accessibility, servers, collaboration,
telephony, speech, animation, and more. The following figure depicts what is included in the
Java 2 SDK.

Vignan’s Institute Of Technology And Aerounatical Engineering Page 17


How Will Java Technology Change My Life?

We can’t promise you fame, fortune, or even a job if you learn the Java programming
language. Still, it is likely to make your programs better and requires less effort than other
languages. We believe that Java technology will help you do the following:

 Get started quickly: Although the Java programming language is a powerful object-oriented
language, it’s easy to learn, especially for programmers already familiar with C or C++.
 Write less code: Comparisons of program metrics (class counts, method counts, and so on)
suggest that a program written in the Java programming language can be four times smaller
than the same program in C++.
 Write better code: The Java programming language encourages good coding practices, and its
garbage collection helps you avoid memory leaks. Its object orientation, its JavaBeans
component architecture, and its wide-ranging, easily extendible API let you reuse other
people’s tested code and introduce fewer bugs.
 Develop programs more quickly: Your development time may be as much as twice as fast
versus writing the same program in C++. Why? You write fewer lines of code and it is a
simpler programming language than C++.
 Avoid platform dependencies with 100% Pure Java: You can keep your program portable
by avoiding the use of libraries written in other languages. The 100% Pure JavaTM Product
Certification Program has a repository of historical process manuals, white papers, brochures,
and similar materials online.
 Write once, run anywhere: Because 100% Pure Java programs are compiled into machine-
independent byte codes, they run consistently on any Java platform.
 Distribute software more easily: You can upgrade applets easily from a central server.
Applets take advantage of the feature of allowing new classes to be loaded “on the fly,”
without recompiling the entire program.
ODBC
Microsoft Open Database Connectivity (ODBC) is a standard programming interface
for application developers and database systems providers. Before ODBC became a de facto
standard for Windows programs to interface with database systems, programmers had to use
proprietary languages for each database they wanted to connect to. Now, ODBC has made the
choice of the database system almost irrelevant from a coding perspective, which is as it should
be. Application developers have much more important things to worry about than the syntax

Vignan’s Institute Of Technology And Aerounatical Engineering Page 18


that is needed to port their program from one database to another when business needs
suddenly change.
Through the ODBC Administrator in Control Panel, you can specify the particular
database that is associated with a data source that an ODBC application program is written to
use. Think of an ODBC data source as a door with a name on it. Each door will lead you to a
particular database. For example, the data source named Sales Figures might be a SQL Server
database, whereas the Accounts Payable data source could refer to an Access database. The
physical database referred to by a data source can reside anywhere on the LAN.
The ODBC system files are not installed on your system by Windows 95. Rather, they
are installed when you setup a separate database application, such as SQL Server Client or
Visual Basic 4.0. When the ODBC icon is installed in Control Panel, it uses a file called
ODBCINST.DLL. It is also possible to administer your ODBC data sources through a stand-
alone program called ODBCADM.EXE. There is a 16-bit and a 32-bit version of this program
and each maintains a separate list of ODBC data sources.
From a programming perspective, the beauty of ODBC is that the application can be
written to use the same set of function calls to interface with any data source, regardless of the
database vendor. The source code of the application doesn’t change whether it talks to Oracle
or SQL Server. We only mention these two as an example. There are ODBC drivers available
for several dozen popular database systems. Even
Excel spreadsheets and plain text files can be turned into data sources. The operating system
uses the Registry information written by ODBC Administrator to determine which low-level
ODBC drivers are needed to talk to the data source (such as the interface to Oracle or SQL
Server). The loading of the ODBC drivers is transparent to the ODBC application program. In
a client/server environment, the ODBC API even handles many of the network issues for the
application programmer.
The advantages of this scheme are so numerous that you are probably thinking there
must be some catch. The only disadvantage of ODBC is that it isn’t as efficient as talking
directly to the native database interface. ODBC has had many detractors make the charge that
it is too slow. Microsoft has always claimed that the critical factor in performance is the quality
of the driver software that is used. In our humble opinion, this is true. The availability of good
ODBC drivers has improved a great deal recently. And anyway, the criticism about
performance is somewhat analogous to those who said that compilers would never match the
speed of pure assembly language. Maybe not, but the compiler (or ODBC) gives you the

Vignan’s Institute Of Technology And Aerounatical Engineering Page 19


opportunity to writecleaner programs, which means you finish sooner. Meanwhile, computers
get faster every year.

JDBC
In an effort to set an independent database standard API for Java; Sun Microsystems
developed Java Database Connectivity, or JDBC. JDBC offers a generic SQL database access
mechanism that provides a consistent interface to a variety of RDBMSs. This consistent
interface is achieved through the use of “plug-in” database connectivity modules, or drivers. If
a database vendor wishes to have JDBC support, he or she must provide the driver for each
platform that the database and Java run on.
To gain a wider acceptance of JDBC, Sun based JDBC’s framework on ODBC. As you
discovered earlier in this chapter, ODBC has widespread support on a variety of platforms.
Basing JDBC on ODBC will allow vendors to bring JDBC drivers to
market much faster than developing a completely new connectivity solution.
JDBC was announced in March of 1996. It was released for a 90 day public review that
ended June 8, 1996. Because of user input, the final JDBC v1.0 specification was released soon
after.
The remainder of this section will cover enough information about JDBC for you to know what
it is about and how to use it effectively. This is by no means a complete overview of JDBC.
That would fill an entire book.
JDBC Goals
Few software packages are designed without goals in mind. JDBC is one that, because
of its many goals, drove the development of the API. These goals, in conjunction with early
reviewer feedback, have finalized the JDBC class library into a solid framework for building
database applications in Java.
The goals that were set for JDBC are important. They will give you some insight as to why
certain classes and functionalities behave the way they do. The eight design goals for JDBC are
as follows:

1. SQL Level API


The designers felt that their main goal was to define a SQL interface for Java. Although not
the lowest database interface level possible, it is at a low enough level for higher-level
tools and APIs to be created. Conversely, it is at a high enough level for application

Vignan’s Institute Of Technology And Aerounatical Engineering Page 20


programmers to use it confidently. Attaining this goal allows for future tool vendors to
“generate” JDBC code and to hide many of JDBC’s complexities from the end user.

1. SQL Conformance
SQL syntax varies as you move from database vendor to database vendor. In an effort to
support a wide variety of vendors, JDBC will allow any query statement to be passed through
it to the underlying database driver.
This allows the connectivity module to handle non-standard functionality in a manner that
is suitable for its users.
2. JDBC must be implemental on top of common database interfaces
The JDBC SQL API must “sit” on top of other common SQL level APIs.This goal allows
JDBC to use existing ODBC level drivers by the use of a software interface. This interface
would translate JDBC calls to ODBC and vice versa.

3. Provide a Java interface that is consistent with the rest of the Java system
Because of Java’s acceptance in the user community thus far, the designers feel that they
should not stray from the current design of the core Java system.

4. Keep it simple
This goal probably appears in all software design goal listings. JDBC is no exception. Sun
felt that the design of JDBC should be very simple, allowing for only one method of
completing a task per mechanism. Allowing duplicate functionality only serves to confuse the
users of the API.

5.Use strong, static typing wherever possible


Strong typing allows for more error checking to be done at compile time; also, less error
appear at runtime.

6.Keep the common cases simple


Because more often than not, the usual SQL calls used by the programmer are simple
SELECT’s, INSERT’s, DELETE’s andUPDATE’s, these queries should be simple to perform
with JDBC. However, more complex SQL statements should also be possible.
Finally we decided to proceed the implementation using JavaNetworking And for dynamically
updating the cache table we go for MS Access data. Java has two things: a programming
Vignan’s Institute Of Technology And Aerounatical Engineering Page 21
language and a platform. Java is a high-level programming language that is all of the following
.

Simple Architecture-neutral
Object-oriented Portable
Distributed High-performance
Interpreted multithreaded
Robust Dynamic
Secure

Java is also unusual in that each Java program is both compiled and
interpreted. With a compile you translate a Java program into an intermediate language called
Java byte codes the platform-independent code instruction is passed and run on the computer.

Compilation happens just once; interpretation occurs each time the program
is executed. The figure illustrates how this works.

You can think of Java byte codes as the machine code instructions for the Java Virtual
Machine (Java VM). Every Java interpreter, whether it’s a Java development tool or a Web
browser that can run Java applets, is an implementation of the Java VM. The Java VM can also
be implemented in hardware.

Java byte codes help make “write once, run anywhere” possible. You can compile your
Java program into byte codes on my platform that has a Java compiler. The byte codes can then
be run any implementation of the Java VM. For example, the same Java program can run
Windows NT, Solaris, and Macintosh.

Vignan’s Institute Of Technology And Aerounatical Engineering Page 22


4.4 Description about the IDE

An integrated development environment (IDE) is a software suit that consolidates


the basic tools developers need to write, test and debug code/software. Typically,
an IDE contains a code editor, a compiler or interpreter and a debugger that the developer
accesses through a single graphical user interface (GUI).

Features/components
An IDE typically contains a code editor, a compiler or interpreter, and a debugger,
accessed through a single graphical user interface (GUI).

Functions
IDE basically helps you write your code and view it with a Helpful editor with features

like code highlight , code fold , hint and error / warning marker, format it easily with built in

formatter, build it easily with built in maven/ ant/ gradlesupport, compile , run and debug

easily. Some of them helps you profile it as well. IDEalso provides better search tool to

navigate / search inside your code . They also provide powerful refactoring functionalityusing

which you can do refactoring easily.

Vignan’s Institute Of Technology And Aerounatical Engineering Page 23


4.5Description about the Database

MySQL

 MySQL is a very popular, open source DBMS


 MySQL databases are relational
 Officially pronounced “my Ess Que Ell” (not my sequel).
 Handles very large databases;
 very fast performance; reliable
 MySQL is compatible with standard SQL
 Why are we using MySQL?
 Free (much cheaper than Oracle!)
 Each student can install MySQL locally.
 Multi-user access to a number of databases offered
 Easy to use Shell for creating tables, querying tables, etc.
 Easy to use with Java JDBC
 MySQL is frequently used by PHP and Perl
 Commercial version of MySQL is also provided (including technical, support)

MySQL: characteristics

MySQL Server works in:

• client/server systems → a system that consists of a multi-threaded SQL server that supports

different backends, several different client programs and libraries, administrative tools, and a

wide range of application programming interfaces (APIs).

• embedded systems → provide MySQL Server as an embedded multi-threaded library that

can be linked into an application to get a smaller, faster, easier-to-manage standalone product.

MYSQL benefits:

 Scalability and flexibility


 High performance
 High availability
 Robust transactional support.
 Web and data warehouse strengths
 Strong data protection
 Management ease
 Lower totalcost of ownership.

Vignan’s Institute Of Technology And Aerounatical Engineering Page 24


System Architecture Design

Vignan’s Institute Of Technology And Aerounatical Engineering Page 25


5.System Architecture Design

5.2 UML Diagrams


A UML diagram is a diagram based on the UML (Unified Modeling Language) with the
purpose of visually representing a system along with its main actors, roles, actions, artifacts or
classes, in order to better understand, alter, maintain, or document information about the
system.

Vignan’s Institute Of Technology And Aerounatical Engineering Page 26


Class diagram:

Data owner cloud server

Upload biometric image Store all biometric image files


with its digital sign based with their signature,view all
methods on title,desc,list all methods biometric image files with its
uploaded biometric image details,view all biometric image
verify biometric image comments,view all data owners
details,delete biometric and users,view all attackers.
image details

Keyword,biometric Attacker
members image name members name,keyword,biometric image
contents,digital contents,digital sign
sign,skey,dt

logout

methods Login(),reset(),register()

members User name,password

end user register


View user
details(),biometric image Register(),reset()
search based on content
methods keyword(),comment on methods
biometric User name,password,e-
images,logout(). mail,mobile,address,dob,gender,
pincode,image
members members
Username,dob,address,co
ntact,keyword,biometric
image name,biometric
image contents

In software engineering, a class diagram in the unified modeling language(UML) is


a Type of static structure diagram that describes the structure of a system show in the
system's classes, their attributes, operations (or methods), and the relationships among objects.

Vignan’s Institute Of Technology And Aerounatical Engineering Page 27


The class diagram is the main building block of object-oriented modeling. It is
Used for general conceptual modeling of the structure of the application, and for detailed
Modeling translating the models into programming code. Class diagrams can also be used
for data modeling.The classes in a class diagram represent both the main elements,
interactions in the application, and the classes to be programmed.In the diagram, classes are
represented with boxes that contain three compartments:

 The top compartment contains the name of the class. It is printed in bold and centered, and the
first letter is capitalized.
 The middle compartment contains the attributes of the class. They are left-aligned and the first
letter is lowercase.
 The bottom compartment contains the operations the class can execute. They are also left-
aligned and the first letter is lowercase.
.
Usecase diagram:

Send image metadata


Store biometric
image files

Upload biometric image


owner cloud server View image files

Verify image files Find hackers


contents

Block hackers

Delete image
files User Request query

Search and receive


Upload image file query

Store query

Vignan’s Institute Of Technology And Aerounatical Engineering Page 28


A use case diagram at its simplest is a representation of a user's interaction with the system
that shows the relationship between the user and the different use cases in which the user is
involved. A use case diagram can identify the different types of users of a system and the
different use cases and will often be accompanied by other types of diagrams as well. The use
cases are represented by either circles or ellipses.
Use Case Diagram objects
Use case diagrams consist of 4 objects.

 Actor
 Use case
 System
 Package

Sequence diagram description:


A sequence diagram simply depicts interaction between objects in a

sequential order i.e. the order in which these interactions take place. We can also use the terms

event diagrams or event scenarios to refer to a sequence diagram. Sequence diagrams describe

how and in what order the objects in a system function. These diagrams are widely used by

businessmen and software developers to document and understand requirements for new and

existing systems.

Notations:

 Actors
 Lifelines
 Difference between lifeline and an actor
 Messages

Vignan’s Institute Of Technology And Aerounatical Engineering Page 29


Sequence diagram:

owner user Cloud server

Upload biometric image files with biometric imagecontent

Upload response

Send biometric image meta data

Meta data receive conformation

Search biometric image

Search biometric image details

access Biometric image anditsdetails

confirmation

biometric image&make comments

view data

download confirmation ownerfiles

verify biometric image file contents modifyfil

file verification status edetails

delete biometric image file viewfille


d contents

file deletion confirmation

Vignan’s Institute Of Technology And Aerounatical Engineering Page 30


Data flow diagram:

Upload image
with comments Cloud server
Data owner

Verify image
data
Data

integrity
Upload files
metadata user

description:
A data-flow is a path for data to move from one part of the information system to another. A
data-flow may represent a single data element such the Customer ID or it can represent a set
of data element (or a data structure).
Data flow diagrams are used to graphically represent the flow of data in a business
information system. DFD describes the processes that are involved in a system to transfer
data from the input to the file storage and reports generation.
Data flow diagrams can be divided into logical and physical. The logical data flow diagram
describes flow of data through a system to perform certain functionality of a business. The
physical data flow diagram describes the implementation of the logical data flow.

Vignan’s Institute Of Technology And Aerounatical Engineering Page 31


Flowchart:

Owner

Req biometric
image content Upload image files
verification

Checkserverc Send connection


NO failure
onnection?
Yes Check
connect
safestatus
?
Upload biometric Cloud server
no image contents

Checks file
File name or skey
name or
not correct
secret key

yes

Acess biometric images

users

Vignan’s Institute Of Technology And Aerounatical Engineering Page 32


Collaborationdiagram:
Collaboration diagrams (known as Communication Diagram in UML ) are used to show how

Objects interact to perform the behavior of a particular use case, or a part of a use case along

with sequence diagrams, collaboration are used by designers to define and clarify the roles

of theobjects that perform a particular flow of events of a use case. They are the primary

sourceof information used to determining class responsibilities and interfaces A

Collaboration is a collection of named objects and actors with links connecting them. They

Collaborate in performing some task.

 A Collaboration defines a set of participants and relationships that are meaningful for a given
set of purposes
 A Collaboration between objects working together provides emergent desirable
functionalities in Object-Oriented systems
 Each object (responsibility) partially supports emergent functionalities
 Objects are able to produce (usable) high-level functionalities by working together
 Objects collaborate by communicating (passing messages) with one another in order to work
together

diagram:

1.getfiles() 3.process()
al
Input document preprocessing taxonomy
2. 2.Stopword

removal()

4.feature()

Result Find d-pattern

5.incremental cluster

Vignan’s Institute Of Technology And Aerounatical Engineering Page 33


Detailed Description About The Technical
Components

Vignan’s Institute Of Technology And Aerounatical Engineering Page 34


6.Detailed description about the technical components

6.1 JAVASCRIPT
JavaScript is a script-based programming language that was developed by Netscape
Communication Corporation. JavaScript was originally called Live Script and renamed as
JavaScript to indicate its relationship with Java. JavaScript supports the development of both
client and server components of Web-based applications. On the client side, it can be used to
write programs that are executed by a Web browser within the context of a Web page. On the
server side, it can be used to write Web server programs that can process information submitted
by a Web browser and then updates the browser’s display accordingly.
Here are a few things we can do with JavaScript :
 Validate the contents of a form and make calculations.
 Add scrolling or changing messages to the Browser’s status line.
 Animate images or rotate images that change when we move the mouse over them.
 Detect the browser in use and display different content for different browsers.
 Detect installed plug-ins and notify the user if a plug-in is required.
We can do much more with JavaScript, including creating entire application.
Javascript vs java:
JavaScript and Java are entirely different languages. A few of the most glaring differences are:

 Java applets are generally displayed in a box within the web document; JavaScript can affect
any part of the Web document itself.
 While JavaScript is best suited to simple applications and adding interactive features to Web
pages; Java can be used for incredibly complex applications.
There are many other differences but the important thing to remember is that JavaScript and
Java are separate languages. They are both useful for different things; in fact they can be used
together to combine their advantages

ADVANTAGES:
 JavaScript can be used for Sever-side and Client-side scripting.
 It is more flexible than VBScript.
 JavaScript is the default scripting languages at Client-side since all the browsers supports it.

Vignan’s Institute Of Technology And Aerounatical Engineering Page 35


6.2Java Database Connectivity

What Is JDBC?

JDBC is a Java API for executing SQL statements. (As a point of interest, JDBC is a
trademarked name and is not an acronym; nevertheless, JDBC is often thought of as standing
for Java Database Connectivity. It consists of a set of classes and interfaces written in the Java
programming language. JDBC provides a standard API for tool/database developers and makes
it possible to write database applications using a pure Java API.
Using JDBC, it is easy to send SQL statements to virtually any relational database. One can
write a single program using the JDBC API, and the program will be able to send SQL
statements to the appropriate database. The combinations of Java and JDBC lets a programmer
write it once and run it anywhere.

What Does JDBC Do?

Simply put, JDBC makes it possible to do three things:


 Establish a connection with a database
 Send SQL statements
 Process the results.

JDBC versus ODBC and otherAPIs

At this point, Microsoft's ODBC (Open Database Connectivity) API is that probably the most
widely used programming interface for accessing relational databases. It offers the ability to
connect to almost all databases on almost all platforms.
So why not just use ODBC from Java? The answer is that you can use ODBC from Java, but

this is best done with the help of JDBC in the form of the JDBC-ODBC Bridge, which we will

cover shortly. The question now becomes "Why do you need JDBC?" There are several

answers to this question:

1. ODBC is not appropriate for direct use from Java because it uses a C interface. Calls from Java
to native C code have a number of drawbacks in the security, implementation, robustness, and
automatic portability of applications.
2. A literal translation of the ODBC C API into a Java API would not be desirable. For example,
Java has no pointers, and ODBC makes copious use of them, including the notoriously error-

Vignan’s Institute Of Technology And Aerounatical Engineering Page 36


prone generic pointer "void *". You can think of JDBC as ODBC translated into an object-
oriented interface that is natural for Java programmers.
3. ODBC is hard to learn. It mixes simple and advanced features together, and it has complex
options even for simple queries. JDBC, on the other hand, was designed to keep simple things
simple while allowing more advanced capabilities where required.
4. A Java API like JDBC is needed in order to enable a "pure Java" solution. When ODBC is
used, the ODBC driver manager and drivers must be manually installed on every client
machine. When the JDBC driver is written completely in Java, however, JDBC code is
automatically installable, portable, and secure on all Java platforms from network computers to
mainframes.

JDBCDriver Types

The JDBC drivers that we are aware of at this time fit into one of four categories:

 JDBC-ODBC bridge plus ODBC driver


 Native-API partly-Java driver
 JDBC-Net pure Java driver
 Native-protocol pure Java driver

6.3Java Server Pages (JSP)


Java server Pages is a simple, yet powerful technology for creating and maintaining dynamic-
content web pages. Based on the Java programming language, Java Server Pages offers proven
portability, open standards, and a mature re-usable component model .The Java Server Pages
architecture enables the separation of content generation from content presentation. This
separation not eases maintenance headaches, it also allows web team members to focus on
their areas of expertise. Now, web page designer can concentrate on layout, and web
application designers on programming, with minimal concern about impacting each other’s
work.

Features of JSP
Portability:
Java Server Pages files can be run on any web server or web-enabled application server that
provides support for them. Dubbed the JSP engine, this support involves recognition,
translation, and management of the Java Server Page lifecycle and its interaction components.

Vignan’s Institute Of Technology And Aerounatical Engineering Page 37


Components
It was mentioned earlier that the Java Server Pages architecture can include reusable Java
components. The architecture also allows for the embedding of a scripting language directly
into the Java Server Pages file. The components current supported include Java Beans, and
Servlets.

Processing
A Java Server Pages file is essentially an HTML document with JSP scripting or tags. The Java
Server Pages file has a JSP extension to the server as a Java Server Pages file. Before the page
is served, the Java Server Pages syntax is parsed and processed into a Servlet on the server
side. The Servlet that is generated outputs real content in straight HTML for responding to the
client.

Access Models:
A Java Server Pages file may be accessed in at least two different ways. A client’s request
comes directly into a Java Server Page. In this scenario, suppose the page accesses reusable
Java Bean components that perform particular well-defined computations like accessing a
database. The result of the Beans computations, called result sets is stored within the Bean as
properties. The page uses such Beans to generate dynamic content and present it back to the
client.

In both of the above cases, the page could also contain any valid Java code. Java Server Pages
architecture encourages separation of content from presentation.

Steps in the execution of a JSP Application:


1. The client sends a request to the web server for a JSP file by giving the name of the JSP file
within the form tag of a HTML page.

2. This request is transferred to the JavaWebServer. At the server side JavaWebServer receives
the request and if it is a request for a jsp file server gives this request to the JSP engine.
3. JSP engine is program which can understands the tags of the jsp and then it converts those tags
into a Servlet program and it is stored at the server side. This Servlet is loaded in the memory
and then it is executed and the result is given back to the JavaWebServer and then it is

Vignan’s Institute Of Technology And Aerounatical Engineering Page 38


transferred back to the result is given back to the JavaWebServer and then it is transferred back
to the client.

JDBC connectivity
The JDBC provides database-independent connectivity between the J2EE platform and a wide
range of tabular data sources. JDBC technology allows an Application Component Provider to:

 Perform connection and authentication to a database server


 Manager transactions
 Move SQL statements to a database engine for preprocessing and execution
 Execute stored procedures
 Inspect and modify the results from Select statement.

Vignan’s Institute Of Technology And Aerounatical Engineering Page 39


7.Testing
The purpose of testing is to discover errors. Testing is the process of trying to discover every
conceivable fault or weakness in a work product. It provides a way to check the functionality
of components, sub assemblies, assemblies and/or a finished product It is the process of
exercising software with the intent of ensuring that theSoftware system meets its requirements
and user expectations and does not fail in an unacceptable manner. There are various types of
test. Each test type addresses a specific testing requirement.

7.1 description about the testing methods


1.white box testing:
White Box Testing is a testing in which in which the software tester has knowledge of the
innerworkings, structure and language of the software, or at least its purpose. It is purpose. It is
used to test areas that cannot be reached from a black box level.
2.Black Box Testing:
Black Box Testing is testing the software without any knowledge of the inner workings,
structure or language of the module being tested. Black box tests, as most other kinds of tests,
must be written from a definitive source document, such as specification or requirements
document, such as specification or requirements document. It is a testing in which the software
under test is treated, as a black box .you cannot “see” into it. The test provides inputs and
responds to outputs without considering how the software works.

3.unit testing:
Unit testing involves the design of test cases that validate that the internal program logic is
functioning properly, and that program inputs produce valid outputs. All decision branches and
internal code flow should be validated. It is the testing of individual software units of the
application .it is done after the completion of an individual unit before integration. This is a
structural testing, that relies on knowledge of its construction and is invasive. Unit tests
perform basic tests at component level and test a specific business process, application, and/or
system configuration. Unit tests ensure that each unique path of a business process performs
accurately to the documented specifications and contains clearly defined inputs and expected
results.

Vignan’s Institute Of Technology And Aerounatical Engineering Page 40


4. Functional testing:
Functional tests provide systematic demonstrations that functions tested
are available as specified by the business and technical requirements, systemdocumentation,
and user manuals.
Functional testing is centered on the following items:
Valid Input : identified classes of valid input must be accepted.
Invalid Input : identified classes of invalid input must be rejected.
Functions : identified functions must be exercised.
Output : identified classes of application outputs must be exercised.
Systems/Procedures : interfacing systems or procedures must be invoked.
Organization and preparation of functional tests is focused on
requirements, key functions, or special test cases. In addition, systematic coverage pertaining
to identify Business process flows; data fields, predefined processes, and successive processes
must be considered for testing. Before functional testing is complete, additional tests are
identified and the effective value of current tests is determined.
6.Integration testing

Integration tests are designed to test integrated software components to determine if


they actually run as one program. Testing is event driven and is more concerned with the basic
outcome of screens or fields. Integration tests demonstrate that although the components were
individually satisfaction, as shown by successfully unit testing, the combination of components
is correct and consistent. Integration testing is specifically aimed at exposing the problems
that arise from the combination of components.

The following are the types of Integration Testing:

1)Top Down Integration

This method is an incremental approach to the construction of program structure.


Modules are integrated by moving downward through the control hierarchy, beginning with the
main program module. The module subordinates to the main program module are incorporated
into the structure in either a depth first or breadth first manner.

Vignan’s Institute Of Technology And Aerounatical Engineering Page 41


In this method, the software is tested from main module and individual stubs are replaced
when the test proceeds downwards.

2. Bottom-up Integration
This method begins the construction and testing with the modules at the lowest level in the
program structure. Since the modules are integrated from the bottom up, processing required
for modules subordinate to a given level is always available and the need for stubs is
eliminated. The bottom up integration strategy may be implemented with the following steps:
 A driver (i.e.) the control program for testing is written to coordinate test case input and output.
 The cluster is tested.
 Drivers are removed and clusters are combined moving upward in the program structure
The bottom up approaches tests each module individually and then each module is module is
integrated with a main module and tested for functionality.

7.System Testing:
System testing ensures that the entire integrated software system meets requirements. It tests a
configuration to ensure known and predictable results. An example of system testing is the
configuration oriented system integration test. System testing is based on process descriptions
and flows, emphasizing pre-driven process links and integration points.

8.Acceptance Testing:
User Acceptance Testing is a critical phase of any project and requires

significant participation by the end user. It also ensures that the system meets the functional

requirements.

9. Output Testing:
After performing the validation testing, the next step is output testing of the proposed system,
since no system could be useful if it does not produce the required output in the specified
format. Asking the users about the format required by them tests the outputs generated or
displayed by the system under consideration. Hence the output format is considered in 2 ways
– one is on screen and another in printed format.

Vignan’s Institute Of Technology And Aerounatical Engineering Page 42


10.Validation Checking
Validation checks are performed on the following fields.

Text Field:
The text field can contain only the number of characters lesser than or equal to its
size. The text fields are alphanumeric in some tables and alphabetic in other tables. Incorrect
entry always flashes and error message.

Numeric Field:
The numeric field can contain only numbers from 0 to 9. An entry of any character
flashes an error messages. The individual modules are checked for accuracy and what it has to
perform. Each module is subjected to test run along with sample data. The individually
tested modules are integrated into a single system. Testing involves executing the real data
information is used in the program the existence of any program defect is inferred from the
output. The testing should be planned so that all the requirements are individually tested.
A successful test is one that gives out the defects for the inappropriate data and
produces and output revealing the errors in the system.

Vignan’s Institute Of Technology And Aerounatical Engineering Page 43


Screenshots

Vignan’s Institute Of Technology And Aerounatical Engineering Page 44


8.1Home page

Vignan’s Institute Of Technology And Aerounatical Engineering Page 45


8.2 cloud server login page

Vignan’s Institute Of Technology And Aerounatical Engineering Page 46


cloud server login page

Vignan’s Institute Of Technology And Aerounatical Engineering Page 47


8.3Cloud server main page

Vignan’s Institute Of Technology And Aerounatical Engineering Page 48


8.4View all owners page

Vignan’s Institute Of Technology And Aerounatical Engineering Page 49


8.5View all users page

Vignan’s Institute Of Technology And Aerounatical Engineering Page 50


8.6View all biometric image files page

Vignan’s Institute Of Technology And Aerounatical Engineering Page 51


8.7 View all attackers page

Vignan’s Institute Of Technology And Aerounatical Engineering Page 52


8.8Owner login page

Vignan’s Institute Of Technology And Aerounatical Engineering Page 53


8.9owner biometric identification page

Vignan’s Institute Of Technology And Aerounatical Engineering Page 54


8.10Owner main page

Vignan’s Institute Of Technology And Aerounatical Engineering Page 55


8.10View owner profile page

Vignan’s Institute Of Technology And Aerounatical Engineering Page 56


8.11Upload biometric image page

Vignan’s Institute Of Technology And Aerounatical Engineering Page 57


8.12 upload biometric image

Vignan’s Institute Of Technology And Aerounatical Engineering Page 58


8.13Biometric image upload

Vignan’s Institute Of Technology And Aerounatical Engineering Page 59


Upload image successful or not

Vignan’s Institute Of Technology And Aerounatical Engineering Page 60


8.14Owner image files page

Vignan’s Institute Of Technology And Aerounatical Engineering Page 61


8.15Image Verification page

Vignan’s Institute Of Technology And Aerounatical Engineering Page 62


8.16User main page

Vignan’s Institute Of Technology And Aerounatical Engineering Page 63


8.17Search images page

Vignan’s Institute Of Technology And Aerounatical Engineering Page 64


8.17View all search biometric images page

Vignan’s Institute Of Technology And Aerounatical Engineering Page 65


8.18View all consumer search history page

Vignan’s Institute Of Technology And Aerounatical Engineering Page 66


Conclusion

In this paper, we proposed a novel privacy-preserving biometric identification scheme in the


cloud computing. To realize the efficiency and secure requirements, we have designed a new
encryption algorithm and cloud authentication certification. The detailed analysis shows it can
resist the potential attacks. Besides, through performance evaluations, we further demonstrated
the proposed scheme meets the efficiency need well.

Vignan’s Institute Of Technology And Aerounatical Engineering Page 67


Reference

[1] A. Jain, L. Hong and S. Pankanti, “Biometric identification,” Communications of the ACM,
vol. 43, no. 2, pp. 90-98, 2000.
[2] R. Allen, P. Sankar and S. Prabhakar, “Fingerprint identification technology,” Biometric
Systems, pp. 22-61, 2005.
[3] J. de Mira, H. Neto, E. Neves, et al., “Biometric-oriented Iris Identification Based on
Mathematical Morphology,” Journal of Signal Processing Systems, vol. 80, no. 2, pp. 181-195,
2015.
[4] Y. Xiao, V. Rayi, B. Sun, X. Du, F. Hu, and M. Galloway, “A survey of key management
schemes in wireless sensor networks,” Journal of Computer Communications, vol. 30, no. 11-
12, pp. 2314-2341, 2007.
[5] X.Du,Y.Xiao,M.Guizani,andH.H.Chen,“Aneffectivekeymanagement scheme for
heterogeneous sensor networks,” Ad Hoc Networks, vol. 5, no. 1, pp. 24-34, 2007.
[6] X. Du and H. H. Chen, “Security in wireless sensor networks,” IEEE Wireless
Communications Magazine, vol. 15, no. 4, pp. 60-66, 2008.
[7] X.Hei,andX.Du,“Biometric-basedtwo-levelsecureaccesscontrolforimplantable medical
devices during emergency,” in Proc. of IEEE INFOCOM 2011, pp. 346-350, 2011.
[8] J.YuanandS.Yu,“Efficientprivacy-preservingbiometricidentificationin
cloudcomputing,”inProc.ofIEEEINFOCOM2013,pp.2652-2660,2013.
[9] Q.Wang,S.Hu,K.Ren,etal.,“CloudBI:Practicalprivacy-preservingoutsourcing of biometric
identification in the cloud,” in European Symposium on Research in Computer Security, pp.
186-205, 2015.
[10] Y.Zhu,Z.WangandJ.Wang,“Collusion-resistingsecurenearestneighbor query over encrypted
data in cloud,” In Quality of Service (IWQoS), 2016 IEEE/ACM 24th International
Symposium on, pp. 1-6, 2016.
[11] S. Pan, S. Yan, and W. Zhu, “Security analysis on privacy-preserving cloud aided
biometric identification schemes,” in Australasian Conference on Information Security and
Privacy, pp. 446-453, 2016.
[12] C. Zhang, L. Zhu and C. Xu, “PTBI: An efficient privacy-preserving biometric
identification based on perturbed term in the cloud,” Information Sciences, vol. 409, pp. 56-67,
2017.

Vignan’s Institute Of Technology And Aerounatical Engineering Page 68

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy