CYBORG Domain Independent Distributed Database Retrieval System Alok Khemka Kapil Assudani Kedar Fondekar Rahul Nabar.

Slides:



Advertisements
Similar presentations
1 Chapter 13 Securing an Access Application. 13 Chapter Objectives Learn about the elements of security Explore application-level security Use user-level.
Advertisements

1 SDMX Reference Infrastructure (SDMX-RI) Work in progress, status and plans Bengt-Åke Lindblad, Adam Wroński Eurostat Eurostat Unit B3 – IT and standards.
Execute Stored Procedure having Output Parameter and returning Result Set in Adeptia Server.
1Key – Report Creation with DB2. DB2 Databases Create Domain for DB2 Test Demo.
.NET Database Technologies: Open-Source Frameworks.
G O B E Y O N D C O N V E N T I O N WORF: Developing DB2 UDB based Web Services on a Websphere Application Server Kris Van Thillo, ABIS Training & Consulting.
15 Chapter 15 Web Database Development Database Systems: Design, Implementation, and Management, Fifth Edition, Rob and Coronel.
Design, Implementation, and Experimentation on Mobile Agent Security for Electronic Commerce Applications Anthony H. W. Chan, Caris K. M. Wong, T. Y. Wong,
Database Connectivity Rose-Hulman Institute of Technology Curt Clifton.
LYU9901-Travel Net LYU9901-Travel Net Supervisor: Prof. Michael R. Lyu Students: Ho Chi Ho Malcolm Lau Chi Ho Arthur (Presentation on )
Performed by:Gidi Getter Svetlana Klinovsky Supervised by:Viktor Kulikov 08/03/2009.
Chapter 9: The Client/Server Database Environment
SQL Forms Engine Koifman Eran Egri Ozi Supervisor: Ilana David.
Distributed Databases
Lecture The Client/Server Database Environment
The Client/Server Database Environment
Web Application Architecture: multi-tier (2-tier, 3-tier) & mvc
October 30, 2008 Extensible Workflow Management for Simmod ESUG32, Frankfurt, Oct 30, 2008 Alexander Scharnweber (DLR) October 30, 2008 Slide 1 > Extensible.
Supervisor: Victor Kulikov Oded Duek Aviv Grinblat Final presentation Spring 2010.
DEMIGUISE STORAGE An Anonymous File Storage System VIJAY KUMAR RAVI PRAGATHI SEGIREDDY COMP 512.
Configuration Management and Server Administration Mohan Bang Endeca Server.
Server-side Scripting Powering the webs favourite services.
Basics of Web Databases With the advent of Web database technology, Web pages are no longer static, but dynamic with connection to a back-end database.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Twelfth Edition.
COMP 410 & Sky.NET May 2 nd, What is COMP 410? Forming an independent company The customer The planning Learning teamwork.
CST203-2 Database Management Systems Lecture 2. One Tier Architecture Eg: In this scenario, a workgroup database is stored in a shared location on a single.
Roy Ernest Database Administrator Pinnacle Sports Worldwide SQL Server 2008 Transparent Data Encryption.
OracleAS Reports Services. Problem Statement To simplify the process of managing, creating and execution of Oracle Reports.
Eurotrace Hands-On The Eurotrace File System. 2 The Eurotrace file system Under MS ACCESS EUROTRACE generates several different files when you create.
Lecture Set 14 B new Introduction to Databases - Database Processing: The Connected Model (Using DataReaders)
Data and its manifestations. Storage and Retrieval techniques.
Csi315csi315 Client/Server Models. Client/Server Environment LAN or WAN Server Data Berson, Fig 1.4, p.8 clients network.
Massively Distributed Database Systems - Distributed DBS Spring 2014 Ki-Joune Li Pusan National University.
Copyright  Oracle Corporation, All rights reserved. 1 Oracle Architectural Components.
(Chapter 10 continued) Our examples feature MySQL as the database engine. It's open source and free. It's fully featured. And it's platform independent.
CVSQL 2 The Revenge of the SQL. The present Read-only access to CVS repository logs Language is a subset of SQL XML interface for returning results Built-in.
Copyright © Curt Hill, Client – Server Computing An important paradigm.
The Client/Server Database Environment Ployphan Sornsuwit KPRU Ref.
1 1 EPCC 2 Curtin Business School & Edinburgh University Management School Michael J. Jackson 1 Ashley D. Lloyd 2 Terence M. Sloan 1 Enabling Access to.
Lesson Overview 3.1 Components of the DBMS 3.1 Components of the DBMS 3.2 Components of The Database Application 3.2 Components of The Database Application.
Lecture Set 14 B new Introduction to Databases - Database Processing: The Connected Model (Using DataReaders)
Elmasri and Navathe, Fundamentals of Database Systems, Fourth Edition Copyright © 2004 Pearson Education, Inc. Slide 2-1 Data Models Data Model: A set.
ABSTRACT The JDBC (Java Database Connectivity) API is the industry standard for database- independent connectivity between the Java programming language.
Management Information Systems, 4 th Edition 1 Chapter 8 Data and Knowledge Management.
EGEE User Forum Data Management session Development of gLite Web Service Based Security Components for the ATLAS Metadata Interface Thomas Doherty GridPP.
DATABASE CONNECTIVITY TO MYSQL. Introduction =>A real life application needs to manipulate data stored in a Database. =>A database is a collection of.
1 Java Servlets l Servlets : programs that run within the context of a server, analogous to applets that run within the context of a browser. l Used to.
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
© FPT SOFTWARE – TRAINING MATERIAL – Internal use 04e-BM/NS/HDCV/FSOFT v2/3 JSP Application Models.
Web Services An Introduction Copyright © Curt Hill.
Designing a Middleware Server for Abstract Database Connection.
AFS/OSD Project R.Belloni, L.Giammarino, A.Maslennikov, G.Palumbo, H.Reuter, R.Toebbicke.
Copyright 2007, Information Builders. Slide 1 iWay Web Services and WebFOCUS Consumption Michael Florkowski Information Builders.
Retele de senzori Curs 2 - 1st edition UNIVERSITATEA „ TRANSILVANIA ” DIN BRAŞOV FACULTATEA DE INGINERIE ELECTRICĂ ŞI ŞTIINŢA CALCULATOARELOR.
ADO .NET from. ADO .NET from “ADO .Net” Evolution/History of ADO.NET MICROSOFT .NET “ADO .Net” Evolution/History of ADO.NET History: Most applications.
1 Example security systems n Kerberos n Secure shell.
7.5 Using Stored-Procedure and Triggers NAME MATRIC NUM GROUP Muhammad Azwan Bin Khairul Anwar CS2305A Muhammad Faiz Bin Badrol Shah CS2305B.
PROJECT SECME Carthik A. Sharma Juan Carlos Vivanco Majid Khan Santhosh Kumar Grandai. Software Engineering Fall 2002.
Zac Fenigshtien  Introduction: 3 Tier Architecture  SQL Injection ◦ Parameter Sandboxing ◦ Blacklisting, Whitelisting.
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
Managing, Storing, and Executing DTS Packages
The Client/Server Database Environment
Step 1 Create Database Info activity in Adeptia Server specifying the driver, URL and user credentials information for the database in which stored.
Server Concepts Dr. Charles W. Kann.
The Client/Server Database Environment
The Client/Server Database Environment
DUCKS – Distributed User-mode Chirp-Knowledgeable Server
Lecture 1: Multi-tier Architecture Overview
Introduction of Week 11 Return assignment 9-1 Collect assignment 10-1
Presentation transcript:

CYBORG Domain Independent Distributed Database Retrieval System Alok Khemka Kapil Assudani Kedar Fondekar Rahul Nabar

Project Goals: Application Domain Independence Database Independence Secure Communication

Application Domain Independence: Each application domain has it’s own database schema. Usually database schema used to be hard coded in the application developed. Defies Code Reusability: Different applications need to be developed for different application domain. Our application tackles this particular problem by acknowledging itself of the application domain database schema, dynamically at run time. Code Reusability: the same application can be run in different application domains, without worrying about the application domain database schema.

Database Heterogeneity: Usually applications are developed with the backend database type in mind. Extension of these applications for database type other than that one developed for, is difficult. Our application tackles this issue by providing modular classes, designed mainly to overcome these sort of problems only. Stores all the relevant details about a database type into “Database Parameters” class, abstracting the details of database type from the rest of the program.

Communication Security: To prevent the eavesdropping on the transaction details. Internally the transferred data is still naked, though the data is converted to common representation format. All the transaction (starting from connecting to the database to executing different queries to disconnecting to the database is encrypted before being transferred over the net and decrypted afterwards on the other side. The encryption algorithm used is DES (symmetric key algorithm) with 64 bit key size. The SPI used is one from SUN (SUNJCE).

Control Flow Diagram: Server Listener 1: The server listener starts and starts listening for the incoming client connection.

Control Flow Diagram: Server Listener 2: As soon as the client goes up, it connects with the main server, the main server spawns a New thread for servicing the client and all the further communication from the client occurs to this new Spawned thread. Client Process 1 Server Thread 2 3

Control Flow Diagram: Server Listener 3: The client gets the user id and password from the user, encrypts it using the security engine, sends the id and password to the server to connect to the database. Client Process Server Thread Client GUI Prompts user for Id and password Security Engine 1 Encrypts the id And password 2 3 connect

Control Flow Diagram: Server Listener 4: Server decrypts the id and password, connects to all the databases, gets the metadata from the databases, generates the XML file, encrypts it and sends it back to the client. 5: Client decrypts the metadata, parses the XML file and populates the user gui based on that metadata. Client Process Server Thread Client GUI Security Engine Security Engine Decrypts id And password 1 Database pool 2 3 metadata connect 4 5 metadata 6 Decrypts metadata 7 Populates gui

Control Flow Diagram: Server Listener 6: Users queries the database by selecting different gui components. Client process generates the sql query based on gui components value, encrypts the query and sends it to the server for execution. 7: server fires the query to the relevant database, gets the result, encrypts the result and sends it back to the client. Client Process Server Thread Client GUI Security Engine Security Engine Database pool 1 Generates Sql query 2 Encrypts Sql query 3 Execute query 4 Decrypts query 5 Query relevant database 6 results 7 Encrypt result 8 results 9 Decrypts results 10 Populate gui

Control Flow Diagram: Server Listener 8: when the user is done, s/he disconnects with the server. During disconnection server closes all the open connection with the database and the client application goes down. Client Process Server Thread Client GUI Database pool 1disconnect 2

Current Limitations: The current implementation is developed for Java 1.3 and the application will not work in a Java 1.4 and above environments. The DES is a symmetric key algorithm and puts an extra overhead of passing the keys to the clients before starting a session. (the key exchange algorithm is outside the scope of this application).

Tomorrow never dies … (future work) Make provisions for a horizontal split and a vertical split of tables in database. Enhance the database query set to accommodate more queries like delete table, delete record, join table, etc.

Thank You !!!