EPLQ Full - Document
EPLQ Full - Document
EPLQ Full - Document
ABSTRACT................................................................................................................................................2
CHAPTER 1 – INTRODUCTION..............................................................................................................3
1.1 Objectives....................................................................................................................................4
1.2 System Specifications..................................................................................................................4
CHAPTER 2 – LITERATURE REVIEW...................................................................................................5
2.1Existing Solution:...............................................................................................................................6
2.2 Proposed Solution:.............................................................................................................................6
CHAPTER 3 OVERALL DESCRIPTION OF THE PROPOSED SYSTEM..............................................6
3.1 Module Description...........................................................................................................................6
CHAPTER 4 – DESIGN.............................................................................................................................8
4.1UML Diagrams:..................................................................................................................................8
4.1.1Usecase Diagrams:......................................................................................................................9
4.1.2 Sequence Diagram:..................................................................................................................10
4.1.3 Collaboration Diagram:............................................................................................................12
CHAPTER 5 - OUTPUT SCREENSHOTS..............................................................................................13
CHAPTER 6 – IMPLEMENTATION DETAILS.....................................................................................14
6.1 PHP..............................................................................................................................................14
6.2 MySQL........................................................................................................................................15
6.3 ANGULAR JAVA SCRIPT........................................................................................................15
CHAPTER 7- SYSTEM STUDY..............................................................................................................17
CHAPTER 8-TECHNICAL FEASIBILITY.............................................................................................18
CHAPTER 9-SYSTEM TESTING...........................................................................................................21
CHAPTER 10– CONCLUSIONS.............................................................................................................26
CHAPTER 11- REFERENCES.................................................................................................................27
ABSTRACT
Windows Desktop
Software Requirements: -
There are already some solutions for privacypreservingspatial range query [1]–[6].
However, as elaborated in Section VIII later, existing solutions cannot address all
above challenges. Aiming at these, in this paper, we propose an efficient solution
for privacy-preserving spatial range query named EPLQ, which allows queries
over encrypted LBS data without disclosing user locations to the cloud or LBS
provider. To protect the privacy of user location in EPLQ, we design a novel
predicate-only encryption scheme for inner product range (IPRE scheme for short),
which, to the best of our knowledge, is the first predicate/predicate-only scheme of
this kind. To improve the performance, we also design a privacy preserving index
structure named ˆ ss-tree. Specifically, the main contributions of this paper are
three folds:
First, we propose a novel predicate-only encryptionscheme for inner product
range named IPRE, which allows testing whether the inner product of two vectors
is within a given range without disclosing the vectors. In
predicate encryption, the key corresponding to a predicate, f, can decrypt a
ciphertext if and only if the attribute of the ciphertext, x, satisfies the predicate, i.e.
f(x) = 1. Predicate-only encryption is a special type of predicate encryption not
designed for encrypting/decrypting messages. Instead, it reveals that whether f(x) =
1 or not.
Predicate-only encryption schemes supporting different types of predicates [7], [8]
have been proposed for privacy-preserving query on outsourced data. To the best
our knowledge, there does not exist predicate/predicate only scheme supporting
inner product range. Though our scheme is used for privacy-preserving spatial
range queryin this paper, it may be applied in other applications as well.
2.1Existing Solution:
Exist system has no location based query.
There is no security level and chance to hacksomeone data.
In the life of the software development, problem analysis provides a base for
design and development phase. The problem is analyzed so that sufficient
matter is provided to design a new system. Large problems are sub-divided
into smaller once to make them understandable and easy for finding solutions.
Same in this project all the task are sub-divided and categorized.
System Modules:
ADMIN
Register
Login
Upload Data
USER
Register
Login
Search Data(Decrypt data)
3.3 MODULES:
ADMIN:
Register and login:
Admin register their own details and enter this system.
Upload Data:
Admin can upload their data to this system. These data are
stored todatabase through Encrypted.
USER:
Register and login:
User registers their details and enters this system with location
details.
Search Data:
User enter this system and search their data like Restaurant,
Bank, Police Station and etc.,
CHAPTER 4 – DESIGN
Design is the first step in the development phase for any techniques and principles
for the purpose of defining a device, a process or system in sufficient detail to
permit its physical realization.
Once the software requirements have been analyzed and specified the software
design involves three technical activities - design, coding, implementation and
testing that are required to build and verify the software.
The design activities are of main importance in this phase, because in this activity,
decisions ultimately affecting the success of the software implementation and its
ease of maintenance are made. These decisions have the final bearing upon
reliability and maintainability of the system. Design is the only way to accurately
translate the customer’s requirements into finished software or a system.
4.1UML Diagrams:
UML stands for Unified Modeling Language. UML is a language for specifying,
visualizing and documenting the system. This is the step while developing any
product after analysis. The goal from this is to produce a model of the entities
involved in the project which later need to be built. The representation of the
entities that are to be used in the product being developed need to be designed.
Register
Login
Admin
Upload Data
register Location
<<extend>>
login
User
search data
Use case diagram consists of use cases and actors and shows the interaction
between the use case and actors.
The purpose is to show the interactions between the use case and
actor.
To represent the system requirements from user’s perspective.
An actor could be the end-user of the system or an external system.
4.1.2 Sequence Diagram:
3 : Upload data()
4 : Encrypt data()
5 : Search data()
6 : Decrypt data()
4.1.3 Collaboration Diagram:
6.1 PHP
PHP is a server-side scripting language designed primarily for web
development but also used as a general-purpose programming language. Originally
created by RasmusLerdorf in 1994,[5] the PHP reference implementation is now
produced by The PHP Development Team.[6] PHP originally stood for Personal
Home Page,[5] but it now stands for the recursive acronym PHP: Hypertext
Preprocessor.[7]
The feasibility of the project is analyzed in this phase and business proposal is
put forth with a very general plan for the project and some cost estimates.
During system analysis the feasibility study of the proposed system is to be
carried out. This is to ensure that the proposed system is not a burden to the
company. For feasibility analysis, some understanding of the major
requirements for the system is essential.
ECONOMICAL FEASIBILITY
TECHNICAL FEASIBILITY
SOCIAL FEASIBILITY
ECONOMICAL FEASIBILITY
This study is carried out to check the economic impact that the system will
have on the organization. The amount of fund that the company can pour into the
research and development of the system is limited. The expenditures must be
justified. Thus the developed system as well within the budget and this was
achieved because most of the technologies used are freely available. Only the
customized products had to be purchased.
CHAPTER 8-TECHNICAL FEASIBILITY
This study is carried out to check the technical feasibility, that is, the
technical requirements of the system. Any system developed must not have a high
demand on the available technical resources. This will lead to high demands on the
available technical resources. This will lead to high demands being placed on the
client. The developed system must have a modest requirement, as only minimal or
null changes are required for implementing this system.
SOCIAL FEASIBILITY
The aspect of study is to check the level of acceptance of the system by the user.
This includes the process of training the user to use the system efficiently. The user
must not feel threatened by the system, instead must accept it as a necessity. The
level of acceptance by the users solely depends on the methods that are employed
to educate the user about the system and to make him familiar with it. His level of
confidence must be raised so that he is also able to make some constructive
criticism, which is welcomed, as he is the final user of the system.
8.1Non Functional Requirements
8.2 Accuracy:
The system will be accurate and reliable based on the design architecture. If there
is any problem in the accuracy then the system will provide alternative ways to
solve the problem.
8.3 Usability:
The proposed system will be simple and easy to use by the users. The users will
comfort in order to communicate with the system. The user will be provided with
an easy interface of the system.
8.4 Accessibility:
The system will be accessible through internet and there should be no any known
problem.
8.5Performance:
The system performance will be at its best when performing the functionality of
the system.
8.6Reliability:
The proposed system will be reliable in all circumstances and if there is any
problem that will be affectively handle in the design.
8.7Security:
The proposed system will be highly secured; every user will be required
registration and username/password to use the system. The system will do the
proper authorization and authentication of the users based on their types and their
requirements. The proposed system will be designed persistently to avoid any
misuse of the application.
CHAPTER 9-SYSTEM TESTING
Software system meets its requirements and user expectations and does not fail in
an unacceptable manner. There are various types of test. Each test type addresses a
specific testing requirement.
TYPES OF TESTS
Unit testing
Unit testing involves the design of test cases that validate that the internal
program logic is functioning properly, and that program inputs produce valid
outputs. All decision branches and internal code flow should be validated. It is the
testing of individual software units of the application .it is done after the
completion of an individual unit before integration. This is a structural testing, that
relies on knowledge of its construction and is invasive. Unit tests perform basic
tests at component level and test a specific business process, application, and/or
system configuration. Unit tests ensure that each unique path of a business process
performs accurately to the documented specifications and contains clearly defined
inputs and expected results.
Integration testing
Integration tests are designed to test integrated software components to
determine if they actually run as one program. Testing is event driven and is more
concerned with the basic outcome of screens or fields. Integration tests
demonstrate that although the components were individually satisfaction, as shown
by successfully unit testing, the combination of components is correct and
consistent. Integration testing is specifically aimed at exposing the problems that
arise from the combination of components.
Functional test
Functional tests provide systematic demonstrations that functions tested are
available as specified by the business and technical requirements, system
documentation, and user manuals.
System Test
System testing ensures that the entire integrated software system meets
requirements. It tests a configuration to ensure known and predictable results. An
example of system testing is the configuration oriented system integration test.
System testing is based on process descriptions and flows, emphasizing pre-driven
process links and integration points.
Unit testing is usually conducted as part of a combined code and unit test
phase of the software lifecycle, although it is not uncommon for coding and unit
testing to be conducted as two distinct phases.
Test objectives
All field entries must work properly.
Pages must be activated from the identified link.
The entry screen, messages and responses must not be delayed.
Features to be tested
Verify that the entries are of the correct format
No duplicate entries should be allowed
All links should take the user to the correct page
9.2 Integration Testing
Test Results: All the test cases mentioned above passed successfully. No defects
encountered.
Test Results: All the test cases mentioned above passed successfully. No defects
encountered.
CHAPTER 10– CONCLUSIONS