SECURED ONLINE MATRIMONIAL SYSTEM

Similar documents
A SECURE NFC APPLICATION FOR CREDIT TRANSFER USING MOBILE PHONES

CHIRANTAN DIXIT 12/12/2018 Name Aim Total teaching experience

TIMETABLE SCHEDULING USING GENETIC ALGORITHM

Block Ciphers and the Data Encryption Standard (DES) Modified by: Dr. Ramzi Saifan

AN EFFECTIVE SEARCH ON WEB LOG FROM MOST POPULAR DOWNLOADED CONTENT

OMICS Publishing Group Online Submission System

Raunak Rathi 1, Prof. A.V.Deorankar 2 1,2 Department of Computer Science and Engineering, Government College of Engineering Amravati

Group User Revocation in Cloud for Shared Data

Indoor Location Based Services using Bluetooth Low Energy

Self Destruction Of Data On Cloud Computing

IT322 Software Engineering I Student Textbook Exchange System Software Requirements Specification. Prepared by

A Software System for Secure Computer Aided Exams

Academic Editor Tutorial

Visual Guide to Editorial Manager

Secure Image Sharing on Shared Web Sites Using Adaptive Privacy Policy Prediction System

128 Bit ECB-AES Crypto Core Design using Rijndeal Algorithm for Secure Communication

Block Cipher Involving Key Based Random Interlacing and Key Based Random Decomposition

ACKNOWLEDGEMENT. my PhD Supervisor Dr. Vidhyacharan Bhaskar, Professor, Department of

LUMINATE ONLINE: FUNDAMENTALS-MANAGING CONSTITUENTS

MPLEMENTATION OF DIGITAL LIBRARY USING HDFS AND SOLR

Cryptography and Network Security. Sixth Edition by William Stallings

Defenses against Large Scale Online Password Guessing by Using Persuasive Cued Click Points

Graphical password authentication using Pass faces

ISSN: (Online) Volume 2, Issue 10, October 2014 International Journal of Advance Research in Computer Science and Management Studies

ISSN: (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies

Komal Patiyal 1, Sanjay 2 1,2 Computer Science & Engineering, Himachal Pradesh Technical University,Hamirpur. IJRASET: All Rights are Reserved

C.P.Ronald Reagan, S.Selvi, Dr.S.Prasanna Devi, Dr.V.Natarajan

Syrvey on block ciphers

UCEAP Connect User Guide October 2017

EVAL Module v. 2.0 User Manual for Contractors

Enhancing the Security of Caesar Cipher Substitution Method using a transposition technique for more Secure Communication

Iteration Reduction K Means Clustering Algorithm

User Task Automator. Himanshu Prasad 1, P. Geetha Priya 2, S.Manjunatha 3, B.H Namratha 4 and Rekha B. Venkatapur 5 1,2,3&4

SDD: A Novel Technique for Enhancing Cloud Security with Self Destructing Data

Table of Contents. Getting Started Guide 3. Setup Your Profile 4. Setup Your First Office Hours Block 5. Respond to a Progress Survey 6

Results and Discussions on Transaction Splitting Technique for Mining Differential Private Frequent Itemsets

Data Protection. Plugging the gap. Gary Comiskey 26 February 2010

Implementation of Habit sensitive login system An approach to strengthen the login security

ABSTRACT. system, specifically on a network and the internet. Developing applications using data

A Technical Analysis of Market Basket by using Association Rule Mining and Apriori Algorithm

A WEB BASED QUALITY FUNCTION INFORMATION MANAGEMENT, 1,2

ENHANCED AES ALGORITHM FOR STRONG ENCRYPTION

Comparison of FP tree and Apriori Algorithm

DISCOVERING INFORMATIVE KNOWLEDGE FROM HETEROGENEOUS DATA SOURCES TO DEVELOP EFFECTIVE DATA MINING

online portal Presenting A dedicated Matrimonial Portal for Muslims

COMPANY SETTINGS A MANUAL

Security server using CAPTCHA. Introduction to CAPTCHA

INDEX 1. ABSTRACT 1 2. ACKNOWLEDGEMENT 2

Implementation of Databox

1 Shorten Your Sales Cycle - Copyright Roundpeg 2015 All rights Reserved

Computer and Data Security. Lecture 3 Block cipher and DES

The Transpose Technique to Reduce Number of Transactions of Apriori Algorithm

Smart-card-loss-attack and Improvement of Hsiang et al. s Authentication Scheme

Team : Let s Do This CS147 Assignment 7 (Low-fi Prototype) Report

Go! Guide: Editing Patient Activities

Emily Kofoid Dawne Tortorella

ABSTRACT I. INTRODUCTION

Dynamic Birthmark for Theft Detection of JavaScript Programs

Web Based Share Tracker

Open enrollment in Workday

Give Free Virtual StrongBoxes to Every Member Using It s Me 247

Web Gate Keeper: Detecting Encroachment in Multi-tier Web Application

UNIT - II Traditional Symmetric-Key Ciphers. Cryptography & Network Security - Behrouz A. Forouzan

Gerri Holden Ministries Executive Summary Student Consultant, Kate Stepp Community Partner, Gerri Holden

ADVANCES in NATURAL and APPLIED SCIENCES

WDD Fall 2016Group 4 Project Report

SMART PROCTOR SYSTEM

Perfect Timing. Alejandra Pardo : Manager Andrew Emrazian : Testing Brant Nielsen : Design Eric Budd : Documentation

CHAPTER 18: CLIENT COMMUNICATION

Data Preprocessing Method of Web Usage Mining for Data Cleaning and Identifying User navigational Pattern

Oblivious Text Retrieval from Untrusted Database Model

BSc (Hons) Marketing with Digital Technologies (F/T) LM324 (3 Years)

CLIENT ONBOARDING PLAN & SCRIPT

Smart Student Attendance System Using Face Detection

Introduction. Welcome to PeopleAdmin 7, the new and improved Online Employment System. This system allows applicants to:

Symmetric Key Algorithms. Definition. A symmetric key algorithm is an encryption algorithm where the same key is used for encrypting and decrypting.

ONLINE REGISTRATION: A STEP-BY-STEP GUIDE

Simple Text Based Colour Shuffling Graphical Password Scheme

A Modified Playfair Encryption Using Fibonacci Numbers

IJMIE Volume 2, Issue 6 ISSN:

Data Virtualization Implementation Methodology and Best Practices

CLIENT ONBOARDING PLAN & SCRIPT

Suspicious Detection System via Triple DES Algorithm: Cryptography Approach

Alcohol Detection using Pic Microcontroller

INSTALLATION AND USER S GUIDE OfficeCalendar for Microsoft Outlook

Performance Evaluation of Sequential and Parallel Mining of Association Rules using Apriori Algorithms

ABSTRACT I. INTRODUCTION. Telangana, India 2 Professor, Department of Computer Science & Engineering, Shadan College of Engineering & Technology,

Brill s Editorial Manager (EM) Manual for Authors Contents

Ontology Based Prediction of Difficult Keyword Queries

ISSN: Page 320

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

S. Indirakumari, A. Thilagavathy

Product Documentation SAP Business ByDesign February Marketing

Hardware Implementation of Cryptosystem by AES Algorithm Using FPGA

Sharing Data with Your Accountant or Your Client

A Study on Website Quality Models

YMCA OF GREATER NEW YORK SUMMER CAMP REGISTRATION FORM

KinX. Bringing families together. Brandon Development Jackie Design Tony User Testing / Documentation Shahab Manager

Architecture Diagram. Figure 1 : Architecture Diagram

Monitoring Tool Made to Measure for SharePoint Admins. By Stacy Simpkins

Transcription:

Journal homepage: www.mjret.in ISSN:2348 6953 SECURED ONLINE MATRIMONIAL SYSTEM Akshay Baheti, Abhilash Gonpalliwar, Ajay Date, Yuvraj Deokar Department of Computer Engineering Marathwada Mitra Mandals College of Engineering Pune, India akshaybaheti.comp@mmcoe.edu.in, abhilashgonpalliwar.comp@mmcoe.edu.in, ajaydate.comp@mmcoe.edu.in. Abstract: The main objective of Secured Online Matrimonial System is to provide Grooms and Brides with excellent matchmaking experience by exploring the opportunities and resources to meet true to potential partner. The drawback of existing system is that searching a good life partner in this world is the times Consuming and cost effective. Online matrimonial system is used to overcome these drawbacks. This Secured Online Matrimonial System is a useful for a person of any religion who wishes to find a suitable life partner for himself or herself. This website is very useful as it provides a fast searching of numerous suitable profiles. It also Provide Recommendation with the help of Apriori algorithm to find the Perfect match. This site mainly focus on the Security aspects by using AES security Encryption algorithm [1]. Therefore, He or she can create his or her profile and can communicate with the existing members. Keywords: Advanced Encryption Standard, Apriori, Data mining. 1. INTRODUCTION Online Matrimonial System provide platform to a lot of Bride/Groom for finding perfect match. The drawback of existing system is that searching a good life partner in this world is the times Consuming and cost effective. Online matrimonial system is used to overcome these drawbacks. This Secured Online Matrimonial System is a useful for a person of any religion who wishes to find a suitable life partner for himself or her Matrimonial Web Application will allow a new user to register and after successfully registration user can get email confirmation, after completing registration users profile will be visible to other users. Bride/Groom can directly search Partner according to their required criteria. 575 P a g e

2. EXISTING SYSTEM The existing system was an automated system but It was found to be inefficient in meeting the growing demands of population and different online matrimonial take a lot of time and money for searching a suitable match. But still they are not able to provide a good life partner 2.1. Drawbacks in the existing system The existing system is not user-friendly system. Time Consuming to search a Perfect Match. Lack of security. The existing system does not implement restriction for users to access the data. Secured online matrimonial system is designed to overcome the drawbacks of existing system. It also provides fast searching for a life partner and sending his/her contact or communicates with the existing members. As both the members will agree they meet together for the marriage. A person can search for a bride or a groom of any religion of any caste. 3. PROPOSED SCHEME Secured online matrimonial system is designed to overcome the drawbacks of existing system. It also provides fast searching for a life partner and sending his/her contact or communicates with the existing members. As both the members will agree they meet together for the marriage. A person can search for a bride or a groom of any religion of any caste. 3.1. Methodology (Design and implementation) 3.1.1. Overall Description The ONLINE MATRIMONIAL SYSTEM is growing as the internet emerges as the best Technology which provides a fast and efficient access to any information about anything. Difficulty in Keeping the details of each user and their partners, delay in sending messages to them and spending so much money for finding a good life partner causes the appearance of this website. The Project concentrates on to surmount these difficulties. 3.1.2. Main Aspects: Security: For Security purpose we are going to use AES algorithm. AES is based on a design principle known as a substitution-permutation network, combination of both substitution and permutation, and is fast in both software and hardware. Unlike its predecessor DES, AES does not use a Feistel network. AES is a variant of Rijndael which has a fixed block size of 128 bits, and a key size of 128, 192, or 256 bits. By contrast, the Rijndael specification per se is specified with block and key sizes that may be any multiple of 32 bits, both with a minimum of 128 and a maximum of 256 bits. 576 P a g e

Comparison of AES with other Algorithms [5]: Factor AES 3DES DES Reference Key length Block size Cryptanalysis resistance Security 128,192,or 256 bits 128,192,or Strong 256 bits Considered secure 168 or112 bits 56 bits 64 bits 64 bits Vulnerable to differential and brute force attack Secure than DES Implantation Faster Better than DES Vulnerable Proven inadequate Medium Table 3.1.2 (a) Comparison of AES with other Algorithms Comparative Study of AES with DES or 3 DES Recommendation [2]: This system will provide fast searching as we implement Apriori algorithm. Apriori is an algorithm for frequent item set mining and association rule learning over transactional databases. It proceeds by identifying the frequent individual items in the database and extending them to larger and larger item sets as long as those item sets appear sufficiently often in the database. Comparison with other Algorithms : Factors Apriori K-means O-cluster Reference Item set Frequent Item Countable Countable Association rules mining set using heavy itemsets. Data & Knowledge Engineering, 61, 93 113. Clustering Distance-based Grid-based Grid-based Recommendation by twostep modified Apriori data mining algorithm No of User-specified Userspecified Automatic Cluster Database One or more Only one Only one Table 3.1.2 (b) Comparison with other Algorithms Overall flow of our project is shown in Fig.1 577 P a g e

Log-in/Signup Secured log-in using AES Database Apriori Algorithm Pattern Matching Recommendation Fig.1: System Architecture Keeping in mind with the Users perspective and usability, we are providing various unique features such as Recommendation through Mail Alerts. This application also provides a search utility which helps those users who have a certain criteria of qualities in mind to make online matrimonial easier. 3.2. System Features Maintainability: There will be no maintenance requirement for the Secured Online matrimonial System. The database is provided by the administrator and user and therefore is maintained by this Admin. This website is automated. Portability: The system is developed to work on any environment so it can be portable. Availability: This system will available on any system. 3.3. User Interfaces: The software provides good graphical interface for the user any administrator can operate on the system, performing the required task such as create, update, and viewing the details of firms. 578 P a g e

3.4. Mathematical Model Fig.2: Class Diagram Sr. No Symbols Description 1. A Admin 2. U User 3. P Profile 4. D+ Delete any profile 5. D* Delete own profile 6. R Recommend 7. DV Data validation 8. Up Upload 9. Ud Update 10. V View 11. I Show interest 12. Db Database Fig.3: Abbreviation Table Set Theory: Let S be the System Such that S = {U,A,O} 579 P a g e

U is the Set of Users such that U = {U1,U2,...Un} A = {A} P is the Set of profiles of users such that P = {P1,P2,...Pn} O is the Set of Operations such that O = {D*,D+,R, DV, Up, Ud, V, I} Relation between User and Operations A = {D+, R, DV} U = {D*,Up, Ud, I, V} 4. CONCLUSION Secured Online Matrimonial System provides Grooms and Brides with excellent matchmaking experience by exploring the opportunities and resources to meet true to potential partner. It secures information provided by user using standard encryption algorithms such as Advanced Encryption Standard (AES). It provides a Recommendation through Apriori algorithm. In short our system is best as compare to existing system because it provide higher security by using AES algorithm and fast searching through Apriori algorithm. 5. FUTURE SCOPE Matrimonial website provide platform to a lot of Bride/Groom for finding perfect match. There are different sectors like Registration, Partner, Search, etc. So the Bride/Groom can get their interest for find their partner. Bride/Groom can directly search Partner according to their required criteria. The Bride/Groom can use match By Email functionality so he/she can get directly E- mail alert for the match which fulfill their required criteria. ACKNOWLEGEMENT I feel immense pleasure in expressing my deepest sense of gratitude to my guide Mrs. Pradnya Mehta, for her encouragement and enlightened comments throughout this project work. Her appreciative suggestion always motivated me for putting most willing efforts on my study during project report. My special thanks to our head of department Prof. Harmit Khanuja for providing co-operation. Last but not least, I express my thanks to all staff members of Computer laboratory for their enthusiasm and constant reminders to complete the work as soon as possible. I am also thankful to everyone in this college who directly or indirectly helped me in completing our project. 580 P a g e

REFERENCES [1]. A.A.Zaidan, B.B.Zaidan, Anas Majeed, "High Securing Cover-File of Hidden Data Using Statistical Technique and AES Encryption Algorithm", World Academy of Science Engineering and Technology (WASET), Vol.54,ISSN : 2070-3724, P.P 468-479. [2]. J. Farrell and H. Lausen. Semantic Annotations for WSDL and W3c recommendation, W3C Recommendation 28 August 2007, June 2007. [3]. Palshikar, G. K., Kale, M. S., & Apte, M. M. (2007). Association rules mining using heavy itemsets. Data & Knowledge Engineering, 61, 93 113. [4]. M. Alam,W. Badawy, G. Jullien, A novel pipelined threads architecture for AES encryption algorithm, in: The IEEE International Conference on Application- Specific Systems, Architectures and Processors, 2002, pp. 296 302. [5]. New Comparative Study Between DES,3DES and AES within Nine Factors,2010. 581 P a g e