25-09-2012, 12:17 PM
CONTAINER INDEPENDENT SECURE DATA COMMUNICATION
modified documentation.pdf (Size: 1.52 MB / Downloads: 45)
ORGANIZATION PROFILE
The Computer Management and Technical Educational Society (CMTES) founded by a
young entrepreneurs started on a modest footing over 15 years. The society has entered into a
tie-up arrangement with the Small Industries Service Institute (SISI), Union Ministry of Industry,
Government of India, to provide software development data processing Services and training.
The result of extensive research work in Java and Web related technologies, gave it, the
impetus to start an exclusive Java And Internet training center, to cater to the ever growing
demands of the student and professional communities of Hyderabad. This center was named
CMTES INFORMATICS LIMITED Career Education and is a pioneering institute of its kind
and in short period established itself as a leader. It has conducted corporate training for
companies like Small Industries Service Institute.
Purpose
Implement a secure system that protects data from various types of hackers whose
intention is to see the data when transmitted on the network. The application defends the data
from being visible to third party or hackers.
Intended Audience and Reading Suggestions
Intended for Project Managers, Developers, End users and Quality Assurance engineers.
Suggested reading the document would be overall document description , product based
information gathering followed by Infrastructure requirement.
Product Perspective
In today’s scenario communication and networks play a vital role. Most business
establishments, industries, organizations and even the general public uses internet, intranet,
WAN, MAN etc to communicate. Most of the e-commerce site even allows buying, selling &
bidding across the network. The only threat to these types of users is how confidential is the data
they transmit.
In the present scenario technologies such as Cryptography and steganography are used to
provide security by and large. However these technologies too have their own limitations.
User Classes and Characteristics
Used by end users who are potential users of any network that uses the network as a
media of communication. The range of users could be those using e-mails, file attachments, file
upload & download, chat and messenger services. The sender and receiver can now participate in
securing the data.
Cryptography
Cryptography is the science of writing in secret code and is an ancient art; the first
documented use of cryptography in writing dates back to circa 1900 B.C. when an Egyptian
scribe used non-standard hieroglyphs in an inscription. Some experts argue that cryptography
appeared spontaneously sometime after writing was invented, with applications ranging from
diplomatic missives to war-time battle plans. It is no surprise, then, that new forms of
cryptography came soon after the widespread development of computer communications. In data
and telecommunications, cryptography is necessary when communicating over any non trusted
medium, which includes just about any network, particularly the Internet.
Steganography
Steganography or Stego as it is often referred to in the IT community, literally means,”
Covered writing" which is derived from the Greek language. Steganography is defined by
Markus Kahn [5] as follows, "Steganography is the art and science of communicating in a way
which hides the existence of the communication. In contrast to Cryptography, where the enemy
is allowed to detect, intercept and modify messages without being able to violate certain security
premises guaranteed by a cryptosystem, the goal of Steganography is to hide messages inside
other harmless messages in a way that does not allow any enemy to even detect that there is a
second message present".
In a digital world, Steganography and Cryptography are both intended to protect
information from unwanted parties. Both Steganography and Cryptography are excellent means
by which to accomplish this but neither technology alone is perfect and both can be broken. It is
for this reason that most experts would suggest using both to add multiple layers of security.
Steganography can be used in a large amount of data formats in the digital world of today. The
most popular data formats used are .bmp, .doc, .gif, .jpeg, .mp3, .txt and .wav.
Mainly because of their popularity on the Internet and the ease of use of the
steganographic tools that use these data formats. These formats are also popular because of the
relative ease by which redundant or noisy data can be removed from them and replaced with a
hidden message.
Economical feasibility
Economic analysis is the most frequently used method for evaluating the effectiveness of
a candidate system. More commonly known as cost/benefit analysis, the procedure is to
determine the benefits and savings that are expected from a candidate system and compare them
with costs. If benefits outweigh costs, then the decision is made to design and implement the
system. Otherwise, further justification or alterations in the proposed system will have to be
made if it is to have a chance of being approved. This is an ongoing effort that improves in
accuracy at each phase of the system life cycle
EXISTING SYSTEM
In today’s dynamic and information rich environment, information systems have become
vital for any organization to survive. With the increase in the dependence of the organization on
the information system, there exists an opportunity for the competitive organizations and
disruptive forces to gain access to other organizations information system. This hostile
environment makes information systems security issues critical to an organization. Current
information security literature either focuses on anecdotal information by describing the
information security attacks taking place in the world or it comprises of the technical literature
describing the types of security threats and the possible security systems.
PROPOSED SYSTEM
The algorithms present in the existing system was some what complicated. In
Cryptography, the meaning of data has been changed. So, it makes intention to the hacker to
hack or destroy the data. In our proposed system, we implement a new technology called
Stegnography for Network security. It not only change the meaning of data but also hides the
presence of data from the hackers.
PROTECTION
With Steganography `Stego Analysis' is the natural offshoot. Stego Analysis provides
means to detect and destroy steganographic messages. Any image can be manipulated with the
intent of destroying some hidden information whether an embedded message exists or not.
However, they suggest that detection should precede destruction to target such hidden messages,
which are not just innocuous copyright or ownership related info (known as `digital
watermarks'). Detection may also save wasted effortSteganography and cryptography
Steganography is different from cryptography. Cryptography uses encryption to change the
contents of digitised files using some known algorithm into something totally different. The
same algorithm can be used to restore it to its original form. Steganography does not alter the
message in any way. It simply hides it. To make detection almost impossible, encrypted
messages can be hidden using Steganography.