network security and cryptography – Digitalised Information Security in Data Communication in Organizational Flow

work-flow-signature

 

 

Request for  Project –   [email protected] ; [email protected] ;[email protected]

Contact Number – 7667668009 / 7667664842

Whatsapp  Number – 7667668009 / 7667664842

For complete project lists  –  final year project for cse

For internship – internship in chennai   &  inplant training in  chennai

ABSTRACT:

In cyber physical systems integrations, the request from the local servers will be processed remotely and the data needs to be model mapped. So that, no one can distract the data and its transfer. Inter-organizational process systems play a very important fundamental role in business relationships. We introduce the concept of organisation Behaviour. Not only can these authentication will be used to ensure authenticity but also it protect integrity of conceptual process data, but also to prove the sequence and logical relationships, such as AND-join(Combination of Data Models) and AND-split, of a conceptual process. Global model signatures can be electronic evidence useful for auditing, that is proving compliance of business processes against some regulatory requirements. Furthermore, signing keys can be used to grant permissions to perform tasks. The signing keys are issued on-the fly, authorization to execute a task within a conceptual process can be controlled and granted dynamically at run-time. In this paper, we propose a concrete CPS verification token scheme, which is based on hierarchical identity-based cryptography, to meet security properties required by inter-organizational conceptual processs. A multi-Level validation of data is done through multi key verification token binding on the messages. This will create a highly secure and competitive strength to the system. Data will be double encrypted in this research which made the tampering of data, a real complex one.

Existing system :

  • Addressing security issues using cyber-physical system particularly those related to authentication, integrity and audit is the core idea of the project.
  • Users from the source needs to send a message to the destination or second person using an identity-based verification token (IBS) scheme that makes use of users identity which will have lot of data heterogeneity due to variety of data which is sent in the industrial automation systems.
  • The promising solution for the heterogeneity reduction of CPSs is introduced by means of shared ontology Identity.
  • The cyber part in the CPS system can be divided for clarity into two layers
  • The first layer (platform layer) represents a system integration
  • The second layer (computational layer) represents the computational process. prefer ccna course or ccna internship  or ccna training in chennai

Proposed system :

  • Creating a clear hierarchy in validating the data in each business process flow is the core extract of the project. Various steps involved in our proposed system,
  • A business rules for a clear automation process flow needs to be defined to identify/segregate the source and destination points. In addition, the process involves AND Joins(Process done in parallel to get the exact outcome), OR Join(Either one of the process needs to be done), XOR joins (Finalizing the deciding point)
  • This project involves the encrypting the data and amend them as XML formats which provides high end fast processing and running system. It involves the “World First” anti tampering XML protection mechanism implementation is done.

SOFTWARE REQUIREMENTS  

     Platform  : DOTNET (VS2010) – dotnet internship  or dotnet training in chennai  or dotnet course

Dot net framework 4.0

     Database:  SQL Server  2008 R2

HARDWARE REQUIREMENTS  

        Processor : Core 2 duo

         Speed        : 2.2GHZ

         RAM         : 2GB

         Hard Disk  : 160GB

 

PROPOSED SYSTEM ALGORITHM :

Partial Disclosure Algorithm:

  • Avoiding disclosure of sensitive info, which includes suppressing all sensitive entries in a table along with a specific number of other entries in the table, which in turn referred as complementary suppression. The idea is to allow each table entry xi to be replaced by a convenient interval

[xi − z− i , xi + z+ i ] .

  • The extreme values of each interval have then to be determined so as to ensure the required protection for the sensitive entries, while minimizing the overall loss of information incurred.

In case of learning these technologies, you can opt for

Sample Code for – network security and cryptography

using System;
using System.Collections.Generic;
using System.ComponentModel;
using System.Data;
using System.Drawing;
using System.Linq;
using System.Text;
using System.Windows.Forms;
using ObjectAccess;
namespace PrivacyPresering
{
public partial class Login : Form
{
public Login()
{
InitializeComponent();
}
ObjectAccess.ConnectDB dbObject = new ConnectDB();
private void NewUserFormControlTransfer(object sender, System.EventArgs e)
{
NewUserForm NUF = new NewUserForm();
NUF.Show();
this.Hide();
}
private void LoginSuccessAdmin(object sender, System.EventArgs e)
{

}
private void LoginSuccessDatOwner(object sender, System.EventArgs e)
{

IntermediateForm IF = new IntermediateForm();
IF.Show();
//AliceAnonymousUpdates AAU = new AliceAnonymousUpdates();
//AAU.Show();
this.Hide();
}
private void LoginSuccessDataUpdater(object sender, System.EventArgs e)
{

BobAnonymousUpdate BA = new BobAnonymousUpdate();
BA.Show();
this.Hide();

}
private void LoginSuccessAnonymousUser(object sender, System.EventArgs e)
{

//AnonymousConnection AC = new AnonymousConnection();
//AC.Show();
//this.Hide();

}
private void Login_Load(object sender, EventArgs e)
{ }

private void loginControl1_Load(object sender, EventArgs e)
{ }

} }

AliceAnonymousUpdates.cs

using System;
using System.Collections.Generic;
using System.ComponentModel;
using System.Data;
using System.Drawing;
using System.Linq;
using System.Text;
using System.Windows.Forms;
using ObjectAccess;
using System.IO;
using System.Security.Cryptography;

using System.Security.Cryptography.Xml;
using System.Xml;

using System.Collections;

namespace PrivacyPresering
{
public partial class AliceAnonymousUpdates : Form
{
public AliceAnonymousUpdates()
{
InitializeComponent();
}
ObjectAccess.ConnectDB dbObject = new ConnectDB();
GenericTable Generics = new GenericTable();
private void AliceAnonymousUpdates_Load(object sender, EventArgs e)
{
dgProduct.DataSource = dbObject.GetProduct();
}

private void button1_Click(object sender, EventArgs e)
{
DataTable dt = new DataTable(Generics.NameGenerics());
dt.Columns.Add(“Id”);
dt.Columns.Add(“name”);
dt.Columns.Add(“value”);
string id, name, value;

int count = dgProduct.Rows.Count, initial = 0;
foreach (DataGridViewRow dgvr in dgProduct.Rows)
{

if (count > initial + 1)
{
id = dgvr.Cells[“id”].Value.ToString();
name = dgvr.Cells[“name”].Value.ToString();
value = dgvr.Cells[“value”].Value.ToString();
DataRow dr = dt.NewRow();
dr[0] = id;
dr[1] = EncryptFunction(name, dt.TableName);
dr[2] = EncryptFunction(value, dt.TableName);
dt.Rows.Add(dr);
initial++;
}
}

StreamWriter xml = new StreamWriter(@”C:tempPrivacy.xml”);
dt.WriteXml(xml);
xml.Close();
XMLContent.Url = new Uri(@”C:tempPrivacy.xml”);
}
public string EncryptFunction(string input, string TableName)
{
byte[] inputArray = UTF8Encoding.UTF8.GetBytes(input);
TripleDESCryptoServiceProvider tripleDES = new TripleDESCryptoServiceProvider();
string aa = TableName;
tripleDES.Key = UTF8Encoding.UTF8.GetBytes(aa);
tripleDES.Mode = CipherMode.ECB;
tripleDES.Padding = PaddingMode.PKCS7;
ICryptoTransform cTransform = tripleDES.CreateEncryptor();
byte[] resultArray = cTransform.TransformFinalBlock(inputArray, 0, inputArray.Length);
tripleDES.Clear();
string myEncrptedText = Convert.ToBase64String(resultArray, 0, resultArray.Length);

return myEncrptedText;
}

private void button2_Click(object sender, EventArgs e)
{
try
{

CspParameters cspParams = new CspParameters();
cspParams.KeyContainerName = “XML_DSIG_RSA_KEY”;
RSACryptoServiceProvider rsaKey = new RSACryptoServiceProvider(cspParams);
XmlDocument xmlDoc = new XmlDocument();
xmlDoc.PreserveWhitespace = true;
xmlDoc.Load(@”C:tempPrivacy.xml”);

SignXml(xmlDoc, rsaKey);

xmlDoc.Save(@”C:tempPrivacy.xml”);
xmlDoc.Save(@”C:tempInitialSent.xml”);
webBrowser1.Url = new Uri(@”C:tempPrivacy.xml”);

}
catch (Exception ex)
{
Console.WriteLine(ex.Message);
} }
public static void SignXml(XmlDocument xmlDoc, RSA Key)
{

if (xmlDoc == null)
throw new ArgumentException(“xmlDoc”);
if (Key == null)
throw new ArgumentException(“Key”);
SignedXml signedXml = new SignedXml(xmlDoc);
signedXml.SigningKey = Key;
Reference reference = new Reference();
reference.Uri = “”;
XmlDsigEnvelopedSignatureTransform env = new XmlDsigEnvelopedSignatureTransform();
reference.AddTransform(env);
signedXml.AddReference(reference);
signedXml.ComputeSignature();
XmlElement xmlDigitalVerification token = signedXml.GetXml();
xmlDoc.DocumentElement.AppendChild(xmlDoc.ImportNode(xmlDigitalSignature, true));

}

private void linkLabel1_LinkClicked(object sender, LinkLabelLinkClickedEventArgs e)
{
Login login = new Login(); login.Show(); this.Hide();
}

private void button3_Click(object sender, EventArgs e)
{
AmendData AD = new AmendData();
AD.Show();

}

private void button4_Click(object sender, EventArgs e)
{
dgProduct.DataSource = dbObject.GetProduct();
}

private void dgProduct_CellContentClick(object sender, DataGridViewCellEventArgs e)
{ }

} }

network security and cryptography – Screenshots :

network-security-workflow-signature

Request for  Project –   [email protected] ; [email protected] ;[email protected]

Contact Number – 7667668009 / 7667664842

Whatsapp  Number – 7667668009 / 7667664842

For complete project lists  –  final year project for cse

For internship – internship at chennai   &  inplant training in  chennai

× How can I help you?