Académique Documents
Professionnel Documents
Culture Documents
An entertainment and utility service generally accessible Location Based Service (LBS) have
become an immensely valuable source of real-time information and guidance. Location-based
services (LBS) are a general class of computer program-level services that use location data to
control features. As such LBS is an information service and has a number of uses in social
networking today as an entertainment service, which is accessible with mobile devices such as,
mobile phones, GPS devices, pocket PCs, and operating through a mobile network, which uses
information on the geographical position of the mobile device.
Location Based Service can offer many services to the users based on the geographical position
of their mobile device. The services provided by LBS are typically based on a point of interest
database. By retrieving the Points Of Interest (POIs) from the database server, the user can get
answers to various location based queries, which include but are not limited to discovering the
nearest ATM machine, gas station, hospital, or police station. In recent years there has been a
dramatic increase in the number of mobile devices querying location servers for information
about POIs. Among many challenging barriers to the wide deployment of such application,
privacy assurance is a major issue. For instance, users may feel reluctant to disclose their
locations to the LBS, because it may be possible for a location server to learn who is making a
certain query by linking these locations with a residential phone book database, since users are
likely to perform many queries from home.
LBS include parcel tracking and vehicle tracking services. LBS can include mobile
commerce when taking the form of coupons or advertising directed at customers based on their
current location. They include personalized weather services and even location-based games.
They are an example of telecommunication convergence.
Basically when user used specific location based service or registered for that, then LBS
can provide number of other services like delivery coupons or other marketing information to
customer who is in a specific geographical area. Now a days as increasing number of
communication devices (e.g., mobile phones, PDAs), feature positioning capabilities (e.g., GPS).
Users can ask location-dependent queries, such as “find the nearest hospital”, which are
answered by Location Based Services (LBS) like MapQuest or Google Maps.
But there are certain problems while using LBS that it may collect and use vast amount of
information about consumer for a wide range of purpose. Location information is sensitive and
users don’t want to share such information to untrustworthy LBS servers. Because number of
malicious adversaries may obtain more private knowledge of the users. Also, queries fire by the
user having sensitive information about individuals, including health condition, lifestyle habits.
So he doesn’t want to disclose it. Privacy concerns are expected to rise as LBSs become more
common. Location privacy means data privacy. So here privacy assurance is measure issue. On
the other, location server has their own database in which, number of point of interest records are
located. So server has to prevent database access from unauthorized user and also user who have
not pay for that service.
1.1 PROBLEM STATEMENT
The problems of Location Based Service such as a user wants to query a database of location
data, known as Points Of Interest (POIs), and does not want to reveal his/her location to the
server due to privacy concerns; And also the owner of the location data, that is, the location
server, does not want to simply distribute its data to all users.
1.2 MOTIVATION
In the Location Based Queries, the user and the Location Provider /server both are do not
want to reveal their details to all due to privacy issues. Here providing security to both parties is
plays a vital role. The location server desires to have some control over its data, since the data is
its asset, as well as user desires to maintain security to his/her sensitive information.
1.3 SCOPE
The Scope of the project is to improve the User and the Server privacy protection. Here we
Propose a cache management techniques to avoid the CPU burden and also increasing processing
speed. And also presenting basic information of the Location. Giving ranks to the Locations
based on its searching rate.
1.4 OUTLINE
This project is deployed on Data Mining. Data mining process is to extract information from
a data set and transform it into an understandable structure for further use. It involves
database and data management aspects. Therefore we can easily store and manage the
locations.
2 LITERATURE SURVEY
CONCLUSION
In this paper we have initiated an investigation of the protection of query privacy for
continuous LBS queries. We proposed DUMMY-Q, a dummy query generation scheme which
takes into account the user’s motion model and the query context information as identified from
the historical query logs. We proved that the problem of achieving both utility and privacy
guarantee for dummy insertion is NP-complete, and devised POOL-BUILDER on heuristic to
generate the dummy queries.
Conclusion
This paper presented novel cache management techniques which can be applied in location
cloakers. Significantly, our solution can further improve user privacy protection, save
computational resources, and decrease communication costs. The experiment results indicate
that our method can increase cache hit ratio remarkably.
2.3 Private Queries in Location Based Services
An increasing number of communication devices (e.g., mobile phones, PDAs), feature
positioning capabilities (e.g., GPS). Users can ask location-dependent queries, such as “find the
nearest hospital”, which are answered by Location Based Services (LBS) like MapQuest or
Google Maps. However, queries may disclose sensitive information about individuals, including
health condition, lifestyle habits, political and religious affiliations, or may result in unsolicited
advertisement (i.e., spam). Privacy concerns are expected to rise as LBSs become more common.
Existing methods have several drawbacks: (i) The anonymizer is a single point of attack:
if an attacker gains access to it, the privacy of all users is compromised. (ii) A large number of
users must subscribe to the service, otherwise CR cannot be constructed. It is assumed that all
users are trustworthy. However, if some of them are malicious, they can easily collude to
compromise the privacy of a targeted user. (iii) It is assumed that the attacker has no background
information about the users, but in practice it is difficult to model the exact knowledge. (iv)
Privacy is guaranteed only within a static snapshot of user locations; users are not protected
against correlation attacks.
Description
We propose a framework for private location-dependent queries that solves these problems.
Our framework is based on the theory of Private Information Retrieval (PIR) and does not need
an anonymizer. Recent research on PIR resulted in protocols that allow a client to privately
retrieve information from a database, without the database server learning what particular
information the client has requested.
CONCLUSIONS
In this paper, we employed the Private Information Retrieval theory to guarantee privacy in
location-dependent queries. To the best of our knowledge, this is the first work to provide a
practical PIR implementation with optimizations that achieve reasonable communication and
CPU cost. Compared to previous work, our architecture is simpler, more secure (i.e., does not
require an anonymizer or collaborating trustworthy users), and is the first one to protect against
correlation attacks.
3 SYSTEM ANALYSES
The Location Server (LS), which offers some LBS, spends its resources to compile
information about various interesting POIs. Hence, it is expected that the LS would not disclose
any information without fees. Therefore the LBS has to ensure that LS’s data is not accessed by
any unauthorized user. During the process of transmission the users should not be allowed to
discover any information for which they have not paid. It is thus crucial that solutions be devised
that address the privacy of the users issuing queries, but also prevent users from accessing
content to which they do not have authorization.
Among many challenging barriers to the wide deployment of such application, privacy
assurance is a major issue
The user can get answers to various location based queries,
In this paper, we propose a novel protocol for location based queries that have major
performance improvements. Our protocol is organized, as the server can activate the valid
users. Then those users are acts as authorized users. These authorized users only able to
access the service of the Location Based Queries. The Location details are managed by
the server. Here Server plays a vital role to provide Details of Location. Unauthorized
users can’t able to access the Locations.
Our protocol thus provides protection for both the user and the server. The user is
protected because the server is unable to determine his/her location. Similarly, the
server’s data is protected since unauthorized users can’t get the details of the Location.
MODULES DESCRIPTION:
Users:
The users in our model use some location-based service provided by the
location server.For example, User can enter a query like” find the universi
4 SOFTWARE REQUIREMENT SPECIFICATION
This Chapter describes about the requirements. It specifies the hardware and software
requirements that are required in order to run the application properly. The Software
Requirement Specification (SRS) is explained in detail, which includes overview of this
dissertation as well as the functional and non-functional requirement of this dissertation.
Functional Admin login by using valid user name & password, admin
can view the user details, add contents, providing general
key & personalized key to users, admin can recover the
attacked contents, Data sharing between Admin to user, user
login by using authorized user name & password, User can
process the queries related to locations.
Admin, users.
Functional Requirement defines a function of a software system and how the system must
behave when presented with specific inputs or conditions. These may include calculations, data
manipulation and processing and other specific functionality. In this system following are the
functional requirements:-
1. The Admin has to login by using valid user name and password.
2. After login successful he can do some operations such as add products, view all products, list all
searching history, list ranking of products, update products, view list of all users, activate or
deactivate the users and logout.
3. The admin can add n-number of products. If the admin want to add a new product, then admin
will enter a URL, name of the product, famous, category, description, related images of the
particular product, then submit and that data will stored in data base.
4. The Admin can view list of all users. Here all register users are stored with the details such as user
ID, user name, E mail ID, mobile no, Location, address, pin code.
5. There are n numbers of users are present. User should register before doing some operations.
After registration successful he has to login if and only if admin can activate them.They can
logged in by using authorized user name and password.
6. Login successful user will do some operations such as view my details, query search, by entering
any related information stored in Database Ex.famous, description, name of product etc.,.
7. Then the user get the details of that particular product and as well as the Location of the product
using Google Maps.
8. Here the Products are sorted by descending order depending upon the number of times they are
get searched by users, so here we are maintaining rankings of the products.
4.2 Non – Functional Requirements
Non – Functional requirements, as the name suggests, are those requirements that are not
directly concerned with the specific functions delivered by the system. They may relate to
emergent system properties such as reliability response time and store occupancy. Alternatively,
they may define constraints on the system such as the capability of the Input Output devices and
the data representations used in system interfaces. Many non-functional requirements relate to
the system as whole rather than to individual system features. This means they are often critical
than the individual functional requirements. The following non-functional requirements are
worthy of attention.
1. Security: The system should allow a secured communication between server, Admin and users.
2. Energy Efficiency: The Energy consumed by the Users to receive the File information from the
server and admin.
3. Reliability: The system should be reliable and must not degrade the performance of the existing
system and should not lead to the hanging of the system.
5
5 SOFTWARE DESIGN
Login
Registration
Activate User
Deactivate User
<<User>>
Add Product
Update Product
<<include>>
View Product
<<extend>>
View Map
Search Product
Logout
CLASS DIAGRAM:
In software engineering, a class diagram in the Unified Modeling Language (UML) is a type
of static structure diagram that describes the structure of a system by showing the system's
classes, their attributes, operations (or methods), and the relationships among the classes. It
explains which class contains information.
+AppDAO
+AppController
-Connection:connection
-appService:AppService +login(string username,string
+login():void password):string
+register():void. +register(UserForm,UserForm):string
+addProduct():void +addProduct(product Product):int
+updateProduct():void +updateProduct(product ,Product):int
+deleteProduct():void +deleteProduct(int productid):int
+activateUser():void +activateUser(string userName,string
+viewUserInfo():void status):int
+viewUserProductInfo():void +deactivateUser(string userName,string
+viewUserSesitiveInfo():void status):int
+searchProduct():void +AppService +viewUserInfo():list<UserForm>
+viewProduct():void +viewUserProductInfo():list<Product>
+logout():void -appDAO:AppDAO +viewUserSensitiveInfo():list<userForm
+login(string username,string >
password):string +searchProduct(string
+register(UserForm,UserForm):string query):list<product>
+addProduct(product Product):string +viewProduct(int productId):product
+updateProduct(product ,Product):string
+deleteProduct(int productid):string
+activateUser(string userName,string
status):string
+deactivateUser(string userName,string
status):string
+viewUserInfo():list<UserForm> +MyConnection
+viewUserProductInfo():list<Product> -Connection:connection
+viewUserSensitiveInfo():list<userForm>
+getConnection():Connection
+searchProduct(string query):list<product>
+viewProduct(int productId):product
Activity Diagram:
Activity diagram is another important diagram in UML to describe dynamic aspects of the
system. Activity diagram is basically a flow chart to represent the flow form one activity to another
activity. The activity can be described as an operation of the system.
So the control flow is drawn from one operation to another. This flow can be sequential,
branched or concurrent. Activity diagrams deals with all type of flow control by using different
elements like fork, join etc.
User Admin
Register
Login
If User If Admin
Search Product Add Product View User Information View User Search List
Delete Product
Update Product
Logout
In the Activity Diagram Admin and User performs action with the condition like if it is
Admin the he can directly Login to the Site. Otherwise if it is User then he have to Starts His
action by performing Registration himself, Admin can view the list of users and activate/deactivate
the users. User can able to login himself if and only if Admin Activates User. Coming to the
Product Database, Admin can Add the products to the Database, view the Added products, Delete
the Products, Updates the Product. User can search the Product, View the Basic info given by
admin about Product and also view the map. Admin can also view the Search List of the User but
he can’t get the User details while viewing the Search History List.
SEQUENCE DIAGRAM:
The input design is the link between the information system and the user. It comprises the
developing specification and procedures for data preparation and those steps are necessary to put
transaction data in to a usable form for processing can be achieved by inspecting the computer to
read data from a written or printed document or it can occur by having people keying the data
directly into the system. The design of input focuses on controlling the amount of input required,
controlling the errors, avoiding delay, avoiding extra steps and keeping the process simple. The
input is designed in such a way so that it provides security and ease of use with retaining the
privacy. Input Design considered the following things:
OBJECTIVES
1. Input Design is the process of converting a user-oriented description of the input into a
computer-based system. This design is important to avoid errors in the data input process and
show the correct direction to the management for getting correct information from the
computerized system.
2. It is achieved by creating user-friendly screens for the data entry to handle large volume of
data. The goal of designing input is to make data entry easier and to be free from errors. The data
entry screen is designed in such a way that all the data manipulates can be performed. It also
provides record viewing facilities.
3. When the data is entered it will check for its validity. Data can be entered with the help of
screens. Appropriate messages are provided as when needed so that the user will not be in maize
of instant. Thus the objective of input design is to create an input layout that is easy to follow.
6.2 OUTPUT DESIGN
A quality output is one, which meets the requirements of the end user and presents the
information clearly. In any system results of processing are communicated to the users and to
other system through outputs. In output design it is determined how the information is to be
displaced for immediate need and also the hard copy output. It is the most important and direct
source information to the user. Efficient and intelligent output design improves the system’s
relationship to help user decision-making.
1. Designing computer output should proceed in an organized, well thought out manner; the right
output must be developed while ensuring that each output element is designed so that people will
find the system can use easily and effectively. When analysis design computer output, they
should Identify the specific output that is needed to meet the requirements.
3. Create document, report, or other formats that contain information produced by the system.
The output form of an information system should accomplish one or more of the following
objectives.
6.3 IMPLEMENTATION
MODULES DESCRIPTION:
Users:
The users in our model use some location-based service provided by the location server.For
example, User can enter a query like” find the universi
6.4 Coding
package com.lp.dao;
import java.sql.PreparedStatement;
import java.sql.ResultSet;
import java.sql.SQLException;
import java.util.ArrayList;
import java.util.HashMap;
import java.util.List;
import java.util.ListIterator;
import java.util.Map;
import java.util.Set;
import java.util.TreeSet;
import com.lp.form.Product;
import com.lp.form.UserForm;
{ int roleId=0;
String status="activated";
try { ResultSet
rs=MyConnection.getConnection().createStatement().executeQuery("select role_id from login
where username='"+username+"' and password='"+password+"' and status='"+status+"'");
while (rs.next()) {
roleId=rs.getInt(1);
} catch (SQLException e) {
e.printStackTrace();
}return roleId;
{ int role_id=0;
try {
ResultSet
rs=MyConnection.getConnection().createStatement().executeQuery("select role_id from login
where username='"+userName+"'");
while(rs.next())
role_id=rs.getInt("role_id");
} catch (SQLException e) {
e.printStackTrace();
} return role_id;
}
public int updatePassword(String username,String oldPassword,String newPassword)
{ int result=0;
try {
PreparedStatement
ps=MyConnection.getConnection().prepareStatement("update login set password=? where
username=? and password=?");
ps.setString(1,newPassword);
ps.setString(2,username);
ps.setString(3,oldPassword);
result=ps.executeUpdate();
} catch (SQLException e) {
e.printStackTrace();
}return result;
{ int ret=0;
try{
catch(Exception e){
e.printStackTrace();
} return ret;
int result=0;
try {
} catch (SQLException e) {
e.printStackTrace();
}return result;
int result=0;
try {
ResultSet
rs=MyConnection.getConnection().createStatement().executeQuery("select count(*) from login
where username='"+username+"'");
while (rs.next()) {
result=rs.getInt(1);
} catch (SQLException e) {
e.printStackTrace();
return result;
try {
ResultSet
rs=MyConnection.getConnection().createStatement().executeQuery("select product_id from
userproducts where username='"+userName+"'");
while(rs.next())
prodcutsIdList.add(rs.getInt("product_id"));
} catch (SQLException e) {
e.printStackTrace();}
ListIterator<Integer> iterator=prodcutsIdList.listIterator();
while(iterator.hasNext())
int productId=iterator.next();
try {
ResultSet
rs=MyConnection.getConnection().createStatement().executeQuery("select * from product
where product_id='"+productId+"'");
while(rs.next())
product.setName(rs.getString("name"));
product.setFamous(rs.getString("famous"));
product.setAddress(rs.getString("address"));
product.setCategoryId(rs.getInt("category_id"));
product.setDescription(rs.getString("description"));
product.setImage(rs.getString("image"));
productsList.add(product);
} catch (SQLException e) {
e.printStackTrace();
}}
return productsList;
int result=0;
try {
PreparedStatement
ps=MyConnection.getConnection().prepareStatement("insert into product
values(?,?,?,?,?,?,?,?)");
ps.setInt(1,0);
ps.setString(2,product.getName());
ps.setString(3,product.getFamous());
ps.setString(4,product.getAddress());
ps.setInt(5,product.getCategoryId());
ps.setString(6,product.getDescription());
ps.setString(7,product.getImage());
ps.setString(8,product.getUrl());
ps.executeUpdate();
int rank=0;
MyConnection.getConnection().createStatement().executeUpdate("insert
into ranking values(null,'"+rank+"')");
result=1;
} catch (SQLException e) {
e.printStackTrace();
}return result;
}
7 SOFTWARE ENVIRONMENT
Simple
Architecture neutral
Object oriented
Portable
Distributed
High performance
Interpreted
Multithreaded
Robust
Dynamic
Secure
With most programming languages, you either compile or interpret a program so that you
can run it on your computer. The Java programming language is unusual in that a program is
both compiled and interpreted. With the compiler, first you translate a program into an
intermediate language called Java byte codes —the platform-independent codes interpreted by
the interpreter on the Java platform. The interpreter parses and runs each Java byte code
instruction on the computer. Compilation happens just once; interpretation occurs each time the
program is executed. The following figure illustrates how this works.
You can think of Java byte codes as the machine code instructions for the Java Virtual
Machine (Java VM). Every Java interpreter, whether it’s a development tool or a Web browser
that can run applets, is an implementation of the Java VM. Java byte codes help make “write
once, run anywhere” possible. You can compile your program into byte codes on any platform
that has a Java compiler. The byte codes can then be run on any implementation of the Java VM.
That means that as long as a computer has a Java VM, the same program written in the Java
programming language can run on Windows 2000, a Solaris workstation, or on an iMac.
Native code is code that after you compile it, the compiled code runs on a specific
hardware platform. As a platform-independent environment, the Java platform can be a
bit slower than native code. However, smart compilers, well-tuned interpreters, and just-
in-time byte code compilers can bring performance close to that of native code without
threatening portability.
We can’t promise you fame, fortune, or even a job if you learn the Java programming
language. Still, it is likely to make your programs better and requires less effort than
other languages. We believe that Java technology will help you do the following:
From a programming perspective, the beauty of ODBC is that the application can be
written to use the same set of function calls to interface with any data source, regardless of the
database vendor. The source code of the application doesn’t change whether it talks to Oracle or
SQL Server. We only mention these two as an example. There are ODBC drivers available for
several dozen popular database systems. Even Excel spreadsheets and plain text files can be
turned into data sources. The operating system uses the Registry information written by ODBC
Administrator to determine which low-level ODBC drivers are needed to talk to the data source
(such as the interface to Oracle or SQL Server). The loading of the ODBC drivers is transparent
to the ODBC application program. In a client/server environment, the ODBC API even handles
many of the network issues for the application programmer.
The advantages of this scheme are so numerous that you are probably thinking there must
be some catch. The only disadvantage of ODBC is that it isn’t as efficient as talking directly to
the native database interface. ODBC has had many detractors make the charge that it is too slow.
Microsoft has always claimed that the critical factor in performance is the quality of the driver
software that is used. In our humble opinion, this is true. The availability of good ODBC drivers
has improved a great deal recently. And anyway, the criticism about performance is somewhat
analogous to those who said that compilers would never match the speed of pure assembly
language. Maybe not, but the compiler (or ODBC) gives you the opportunity to write cleaner
programs, which means you finish sooner. Meanwhile, computers get faster every year.
JDBC
In an effort to set an independent database standard API for Java; Sun Microsystems
developed Java Database Connectivity, or JDBC. JDBC offers a generic SQL database access
mechanism that provides a consistent interface to a variety of RDBMSs. This consistent interface
is achieved through the use of “plug-in” database connectivity modules, or drivers. If a database
vendor wishes to have JDBC support, he or she must provide the driver for each platform that the
database and Java run on.
To gain a wider acceptance of JDBC, Sun based JDBC’s framework on ODBC. As you
discovered earlier in this chapter, ODBC has widespread support on a variety of platforms.
Basing JDBC on ODBC will allow vendors to bring JDBC drivers to market much faster than
developing a completely new connectivity solution.
JDBC was announced in March of 1996. It was released for a 90 day public review that
ended June 8, 1996. Because of user input, the final JDBC v1.0 specification was released soon
after.
The remainder of this section will cover enough information about JDBC for you to know what it
is about and how to use it effectively. This is by no means a complete overview of JDBC. That
would fill an entire book.
JDBC Goals
Few software packages are designed without goals in mind. JDBC is one that, because of
its many goals, drove the development of the API. These goals, in conjunction with early
reviewer feedback, have finalized the JDBC class library into a solid framework for building
database applications in Java.
The goals that were set for JDBC are important. They will give you some insight as to why
certain classes and functionalities behave the way they do. The eight design goals for JDBC are
as follows:
Simple Architecture-neutral
Object-oriented Portable
Distributed High-performance
Interpreted multithreaded
Robust Dynamic
Secure
Java is also unusual in that each Java program is both compiled and interpreted.
With a compile you translate a Java program into an intermediate language called Java
byte codes the platform-independent code instruction is passed and run on the
computer.
Compilation happens just once; interpretation occurs each time the program is
executed. The figure illustrates how this works.
Compilers My Program
You can think of Java byte codes as the machine code instructions for the Java Virtual
Machine (Java VM). Every Java interpreter, whether it’s a Java development tool or a
Web browser that can run Java applets, is an implementation of the Java VM. The Java
VM can also be implemented in hardware.
Java byte codes help make “write once, run anywhere” possible. You can compile
your Java program into byte codes on my platform that has a Java compiler. The byte
codes can then be run any implementation of the Java VM. For example, the same
Java program can run Windows NT, Solaris, and Macintosh.
Networking
TCP/IP stack
The TCP/IP stack is shorter than the OSI one:
Deployment Descriptor
web.xml file is the deployment descriptor of the web application and contains mapping
for servlets (prior to 3.0), welcome pages, security configurations, session timeout settings etc.
Thats all for the java web application startup tutorial, we will explore Servlets and JSPs more in
future posts.
MySQL:
MySQL, the most popular Open Source SQL database management system, is developed,
distributed, and supported by Oracle Corporation.
The MySQL Web site (http://www.mysql.com/) provides the latest information about MySQL
software.
MySQL is a database management system.
A database is a structured collection of data. It may be anything from a simple shopping
list to a picture gallery or the vast amounts of information in a corporate network. To add,
access, and process data stored in a computer database, you need a database management
system such as MySQL Server. Since computers are very good at handling large amounts
of data, database management systems play a central role in computing, as standalone
utilities, or as parts of other applications.
MySQL databases are relational.
A relational database stores data in separate tables rather than putting all the data in one
big storeroom. The database structures are organized into physical files optimized for speed.
The logical model, with objects such as databases, tables, views, rows, and columns, offers a
flexible programming environment. You set up rules governing the relationships between
different data fields, such as one-to-one, one-to-many, unique, required or optional, and
“pointers” between different tables. The database enforces these rules, so that with a well-
designed database, your application never sees inconsistent, duplicate, orphan, out-of-date, or
missing data.
The SQL part of “MySQL” stands for “Structured Query Language”. SQL is the most
common standardized language used to access databases. Depending on your programming
environment, you might enter SQL directly (for example, to generate reports), embed SQL
statements into code written in another language, or use a language-specific API that hides the
SQL syntax.
SQL is defined by the ANSI/ISO SQL Standard. The SQL standard has been evolving
since 1986 and several versions exist. In this manual, “SQL-92” refers to the standard released in
1992, “SQL:1999” refers to the standard released in 1999, and “SQL:2003” refers to the current
version of the standard. We use the phrase “the SQL standard” to mean the current version of the
SQL Standard at any time.
MySQL Server was originally developed to handle large databases much faster than
existing solutions and has been successfully used in highly demanding production environments
for several years. Although under constant development, MySQL Server today offers a rich and
useful set of functions. Its connectivity, speed, and security make MySQL Server highly suited
for accessing databases on the Internet.
Index Page
Registration Page
Login Page
Add Product
VIEW USERS LIST
View Sensitive Info
View Products
View Map
Update Product(admin)
User Home Page
View Website
9. SYSTEM TESTING
The purpose of testing is to discover errors. Testing is the process of trying to discover
every conceivable fault or weakness in a work product. It provides a way to check the
functionality of components, sub-assemblies, assemblies and/or a finished product It is the
process of exercising software with the intent of ensuring that the Software system meets its
requirements and user expectations and does not fail in an unacceptable manner. There are
various types of test. Each test type addresses a specific testing requirement.
TYPES OF TESTS
Unit testing
Unit testing involves the design of test cases that validate that the internal program logic is
functioning properly, and that program inputs produce valid outputs. All decision branches and
internal code flow should be validated. It is the testing of individual software units of the
application .it is done after the completion of an individual unit before integration. This is a
structural testing, that relies on knowledge of its construction and is invasive. Unit tests perform
basic tests at component level and test a specific business process, application, and/or system
configuration. Unit tests ensure that each unique path of a business process performs accurately
to the documented specifications and contains clearly defined inputs and expected results.
Integration testing
Integration tests are designed to test integrated software components to determine if they
actually run as one program. Testing is event driven and is more concerned with the basic
outcome of screens or fields. Integration tests demonstrate that although the components were
individually satisfaction, as shown by successfully unit testing, the combination of components is
correct and consistent. Integration testing is specifically aimed at exposing the problems that
arise from the combination of components.
Functional test
Functional tests provide systematic demonstrations that functions tested are available as
specified by the business and technical requirements, system documentation, and user manuals.
System Test
System testing ensures that the entire integrated software system meets requirements. It tests a
configuration to ensure known and predictable results. An example of system testing is the
configuration oriented system integration test. System testing is based on process descriptions
and flows, emphasizing pre-driven process links and integration points.
Test objectives
The task of the integration test is to check that components or software applications, e.g.
components in a software system or – one step up – software applications at the company level –
interact without error.
Test Results: All the test cases mentioned above passed successfully. No defects encountered.
Test Results: All the test cases mentioned above passed successfully. No defects encountered.
9 SYSTEM CONCLUSION
REFERENCES
[1] (2011, Jul. 7) Openssl [Online]. Available:http://www.openssl.org/
[7] M. Damiani, E. Bertino, and C. Silvestri, “The PROBE framework for the
personalized cloaking of private locations,” Trans. Data Privacy, vol. 3, no. 2, pp.
123–148, 2010.
[8] M. Duckham and L. Kulik, “A formal model of obfuscation and negotiation for
location privacy,” in Proc. 3rd Int. Conf. Pervasive Comput., H. Gellersen, R.
Want, and A. Schmidt, Eds., 2005, pp. 243–251, LNCS 3468.
[9] T. ElGamal, “A public key cryptosystem and a signature scheme based on
discrete logarithms,” IEEE Trans. Inform. Theory, vol. 31, no. 4, pp. 469–472, Jul.
1985.
[23] L. Marconi, R. Pietro, B. Crispo, and M. Conti, “Time warp: How time affects
privacy in LBSs,” in Proc. ICICS, Barcelona, Spain, 2010, pp. 325–339.
[25] M. F. Mokbel, C.-Y. Chow, and W. G. Aref, “The new casper: Query
processing for location services without compromising privacy,” in Proc. VLDB,
Seoul, Korea, 2006, pp. 763–774.
[26] M. Naor and B. Pinkas, “Oblivious transfer with adaptive queries,” in Proc.
CRYPTO, vol. 1666, Santa Barbara, CA, USA, 1999, pp. 791–791.
[30] S. Pohlig and M. Hellman, “An improved algorithm for computing logarithms
over GF(p) and its cryptographic significance (corresp.),” IEEE Trans. Inform.
Theory, vol. 24, no. 1, pp. 106–110, Jan. 1978.
[31] V. Shoup, (2011, Jul. 7). Number thoery library [Online]. Available:
http://www.shoup.net/ntl/