You are on page 1of 13

Major Project Proposal

Submitted by
Sidharth Mittal 08IT68
Anumit Sasidharan 08IT11
Under Guidance of
Mr Dinesh Naik
IV !A" #$Tech %IT&
Department o' In'ormation Technolo()
National Institute o' Technolo() *arnataka
2011 2012
+,NT!NTS
Abstract
Introduction
Literature Survey
Problem Statement
Methodology

Conclusion
References
A#ST"A+T
The product idea is to create one website from which a user can have complete control over all
its data on the cloud This website will have a database which will store all user data !ther sites
will communicate with this website to access data and function The user will have a login to this
site through which he will be able to loc" data at will #e may allow e$ternal websites different
levels of data access The user may allow only basic details to some random website but may
give more detailed information to the user may also choose to control data access by time periods
also% for e$ample bloc"ing data older than & months to a social networ"ing site
'ata Security and Privacy is the first priority This idea attempts to give users complete control
over his data on the cloud
All the user data will be stored at the server of this website (hen a user allows another website
access to his information the third party website re)uests the website for information It is not
allowed to save this information *ach time it needs any user data% it is re)uired to re)uest and
retrieve the data from the site
INT",D-+TI,N
In today+s world of cloud computing and social networ"ing data privacy is a ma,or concern
Anybody with basic "nowledge of data mining can access user data The vulnerability is even
more due to the interest of large corporations who are willing to pay good money for internet
usage patterns and trends
Amongst social networ"ing sites the danger is even more 'ata privacy has been an issue even
with -aceboo" . the largest most popular social networ"ing site All user information right from
creation of a user account is property of -aceboo" This information is stored even after you
delete your account
.IT!"AT-"! S-"V!
The following papers were found on the concerns regarding privacy of social
networking sites:
Information Revelation and Privacy in Online Social Networks (The ace!ook
case" !y Ralph #ross and $lessandro $c%uisti (&''(" )*+
Trust and Privacy Concern (ithin Social /etwor"ing Sites0 A Comparison of -aceboo" and MySpace
1y Catherine 'wyer% Starr #ilt2 and 3atia Passerini456678 95:
ace!ook: Threats to Privacy !y ,arvey -ones. -ose ,iram Soltren(&''/" )0+
A privacy parado$0 Social networ"ing in the ;nited States by Susan 1 1arnes4566<8 9=:
The -ourth Amendment and Privacy Issues on the /ew Internet0 -aceboo"com and
Myspacecom% by #odge% Matthew > 4566?8 97:
Solutions to Security and Privacy Issues in 1o!ile Social Networking !y $aron
2each. 1ike #artrell. and Richard ,an(&'*'" )3+
,owever. after e4tensive search. no academic paper was found on the 5e4is
data!ases. #oogle Scholar. Social Science Research Network. etc6 for a
system in which we!sites. for instance e7retail sites or social networking sites
did not retain any user data !ut instead used the data from a secure private
site that kept all the user data granting full control to the user6
P",#.!M STAT!M!NT
8hen social networking sites !egan to assert their prominence in the
internet world a few years ago. the novelty of the idea and the initial
e4citement lead to the privacy details going unnoticed6 Nearly ('' million
people across the world have all their information at the mercy of the social
networking sites6 9oncerns were raised in the last two years when it was
noticed that multi7!illion dollar companies were found to !e using this
private data to conduct product studies etc6 It was then that the so called
private data of users were availa!le to anyone who could access the social
networking sites: servers6 $dditionally it was found that the sites retained the
data even if you have personally deleted it from your account6 $nd to add to
it. it was recently noticed that networking sites keep all your data even if you
delete your account on the prete4t of ;for when you decide to come !ack<6
=ata privacy and security are areas of ma>or and growing concern6 ?ven
we!sites such as ace!ook have !een sued multiple times since &''@
regarding privacy of user data. !ut have !een stalling using loopholes in the
legal system6 $nother ma>or concern is security of data. and it:s vulnera!ility
to mining and !reaches6 $ study !y students of 1assachusetts Institute of
Technology proved that the data stored !y ace!ook was insecure and could
!e accessed !y anyone with a deep knowledge of data mining6 The privacy
settings provided in this case !ecome redundant as the actual data stored on
the ace!ook storage is !eing accessed !y attacking the ace!ook servers6
In order to keep data safe on the cloud. sites that have !een developed over
the past few years that keep your data securely via encryption on their
servers and give the user complete access to the data on the server6 $ site
=rop!o4 is an e4ample that does this6
!ur pro,ect is to attempt to create a website which manages all data for a user on the cloud and
gives the user complete control over it using simple controls This site will store all data for a
user in a secure manner giving him total control over accessibility to this data to other websites
The data will be stored in a secure fashion It will have different levels of access The user can
give different levels of access to different websites The user also will have a choice loc"ing
specific data distinguished by time% li"e securing data older than < months etc% domain% etc
To demonstrate we will create another basic site which will use this site to access user data and
operate
M!T/,D,.,0
01T
Google Web Toolkit is an open source set of tools that allows web developers to create and
maintain comple$ >avaScript front.end applications in >ava !ther than a few native libraries%
everything is >ava source that can be built on any supported platform with the included @(T Ant
build files It is licensed under the Apache License version 56
@(T emphasi2es reusable% efficient solutions to recurring A,a$ challenges% namely
asynchronous remote procedure calls% history management% boo"mar"ing% internationali2ation
and cross.browser portability
;sing @(T% developers can rapidly develop and debug A,a$ applications in the >ava language
using the >ava development tools of their choice (hen the application is deployed% the @(T
cross.compiler translates the >ava application to standalone >avaScript files that are optionally
obfuscated and deeply optimi2ed
@(T does not revolve only around user interface programmingA it is a general set of tools for
building any sort of high.performance client.side >avaScript functionality In live presentations%
the developers of @(T emphasi2e that B@(T is not its librariesB and that it only includes a
library but is not fundamentally yet another A,a$ library This open.ended philosophy sometimes
surprises developers new to @(T who e$pect it to provide an end.to.end Bon railsB application
framewor" Indeed% many "ey architectural decisions are left completely to the developer The
@(T mission statement clarifies the philosophical brea"down of @(TCs role versus the
developerCs role #istory is an e$ample of such0 although @(T manages history to"ens as users
clic" 1ac" or -orward in the browser% it does not prescribe how to map history to"ens to an
application state
@(T applications can be run in two modes0
'evelopment mode 4formerly #osted mode80 The application is run as >ava bytecode
within the >ava Dirtual Machine 4>DM8 This mode is typically used for development%
supporting hot swapping of code and debugging
Production mode 4formerly (eb mode80 The application is run as pure >avaScript and
#TML% compiled from the >ava source This mode is typically used for deployment
Several open.source plugins are available for ma"ing @(T development easier with other I'*s
*g% @(T=/1 for /et1eans% Cypal Studio for @(T% *clipse and >'eveloper etc The @oogle
Plugin for *clipse handles most @(T related tas"s in the I'*% including creating pro,ects%
invo"ing the @(T compiler% creating @(T launch configurations% validations% synta$
highlighting% etc
The major GWT components include:
GWT Java-to-JavaScript Compiler
Translates the Java programming language to the JavaScript programming language.
GWT Development Mode
Allows the developers to run and execute GWT applications in development mode (the
app runs as Java in the JV without compiling to JavaScript!. "rior to #.$% GWT hosted
mode provided a special&purpose 'hosted (rowser' to de(ug )our GWT code. *n #.$% the
we( page (eing de(ugged is viewed within a regular (rowser. +evelopment mode is
supported through the use o, a native&code plugin called the Google We( Tool-it
+eveloper "lugin ,or man) popular (rowsers.
JRE emulation library
JavaScript implementations o, the commonl) used classes in the Java standard class
li(rar) (such as most o, the java.lang pac-age classes and a su(set o, the java.util
pac-age classes!.
GWT Web UI class library
A set o, custom inter,aces and classes ,or creating widgets.
MV+ Desi(n Pattern
(e plan to use MDC design pattern This basically divides the code into & different layers
M . M!'*L
D . DI*(
C . C!/TR!LL*R
The model manages the behaviour and data of the application domain% responds to re)uests for
information about its state 4usually from the view8% and responds to instructions to change state
4usually from the controller8 In event.driven systems% the model notifies observers 4usually
views8 when the information changes so that they can react
The view renders the model into a form suitable for interaction% typically a user interface
element Multiple views can e$ist for a single model for different purposes A viewport typically
has a one to one correspondence with a display surface and "nows how to render to it
The controller receives user input and initiates a response by ma"ing calls on model ob,ects A
controller accepts input from the user and instructs the model and a viewport to perform actions
based on that input
Though MDC comes in different flavors% control flow is generally as follows0
*6 The user interacts with the user interface in some way 4for e$ample% by pressing a mouse
button8
&6 The controller handles the input event from the user interface% often via a
registered handler or callbac"% and converts the event into an appropriate user action%
understandable for the model
06 The controller notifies the model of the user action% possibly resulting in a change in the
modelCs state 4-or e$ample% the controller updates the userCs shopping cart8

A6 A view )ueries the model in order to generate an appropriate user interface 4for e$ample
the view lists the shopping cartCs contents8 The view gets its own data from the model In
some implementations% the controller may issue a general instruction to the view to
render itself In others% the view is automatically notified by the model of changes in state
4!bserver8 that re)uire a screen update
(6 The user interface waits for further user interactions% which restarts the control flow
cycle
+,N+.-SI,N
(e aim to create this website using the aforementioned technologies To demonstrate it+s
wor"ing we will build another basic website which will communicate with our website for
accessing user data in a secure manner
"!2!"!N+!S
)*+ Information Revelation and Privacy in Online Social Networks (The ace!ook case" !y
Ralph #ross and $lessandro $c%uisti (&''("
http:BBwww6heinC6cmu6eduBDac%uistiBpapersBprivacy7face!ook7gross7ac%uisti6pdf
)&+ Trust and Privacy Concern (ithin Social /etwor"ing Sites0 A Comparison of -aceboo" and MySpace
1y Catherine 'wyer% Starr #ilt2 and 3atia Passerini
http:BBciteseer46ist6psu6eduBviewdocBdownloadE
doiF*'6*6*6*A@6G0@@HrepFrep*HtypeFpdf
9&: ace!ook: Threats to Privacy !y ,arvey -ones. -ose ,iram Soltren(&''/"
http:BBgroups6csail6mit6eduBmacBclassesB36@'(Bstudent7papersBfall'(7
papersBface!ook6pdf
)A+ A privacy parado$0 Social networ"ing in the ;nited States by Susan 1 1arnes4566<8
http:BBIrstmonday6orgBht!inBcgiwrapB!inBo>sBinde46phpBfmBarticleBview$rticleB*0GA
)(+ The -ourth Amendment and Privacy Issues on the /ew Internet0 -aceboo"com and Myspacecom% by
#odge% Matthew > 4566?8 http:BBheinonline6orgB,O5B5andingPageE
collectionF>ournalsHhandleFhein6>ournalsBsiul>0*HdivF**HidFHpageF
)3+ Solutions to Security and Privacy Issues in 1o!ile Social Networking !y $aron 2each.
1ike #artrell. and Richard ,an(&'*'"
http:BBwww6cs6colorado6eduBDrhanBPapersBsmw'GJsolutionsJsecurityJprivacy6pdf

You might also like