INTERNATIONAL JOURNAL FOR RESEARCH & DEVELOPMENT IN Volume-7,Issue-5, (May-17) TECHNOLOGY ISSN (O) :- 2349-3585

User Driven Access Control through ______Mr.Mulani K.S.1, Prof.Nimbekar S.B.2 Computer Engineering Department, SIT, Lonavala, India

Abstract – The popularity of the web is pushing against the MOTIVATION FOR THE WORK performance limits of today's underlying infrastructure that The Web Application is inspired from the famous web presenting a number of difficult challenges for the web as a EyeOs 2010. The Web Application is a system believe that resources such as connectivity, storage, embedded in a . The computation, latency and bandwidth are likely to remain purpose of the proposed system is to turn the desktop itself constrained in the future. Thus, building a higher level web into a service that runs on the internet and it provides many application that is more beneficial for all web users. Web more facilities to the user. Thus by making use of Web Application is designed to support highly available, Application, various types of applications can be accessed by incrementally scalable, self tuning, dynamically recognizing the user through Web Application over the internet. It is and geographically aware web services. This includes basically a virtual desktop on the web and has various built in mechanisms for naming web services, coherent data applications. So that on the other hand, a local OS is used only replication, efficient distribution of client requests across the for booting and connecting to the server through internet. It is wide area, safe execution of arbitrary executables on remote fully developed in java’s new technology java web start. It is sites and authentication for secure access to web resources. the new technology to build with best In popular use, web desktops are sometimes referred to user interface. Web Application is basically developed for thin incorrectly as WEB OS or simply WebApplication. It can be clients who cannot afford the costly software. used by thin clients, which cannot afford the costly software SUITABILITY OF JAVA PLATFORM application tools available in market. Web Application is A JAVA enabled browser can run the application without any used for accessing your own desktop applications so it is user relation to the hardware. Also its wide presence in most of friendly and easily maintained. today’s desktop environment Java Web Start (also known as Keywords - WEB OS, Web Application JavaWS) is a framework developed by that INTRODUCTION allows users to start application software for the Java Platform The Web related system is basically a web application in directly from the Internet using a web browser. which all the features are provided to client in single WEB SYSTEM DESIGN application only. The term Web Application is representing Fig. 1 shows the basic design of Web Application. The design the web desktop where all features are present for thin client comprises components such as SERVER; a remote computer or for those clients which does not afford the costly software’s for collecting data from different users and process it and presents in market. The Web Application provides readymade sending proper result to each user. The server maintains a storage space to user so that user no longer requires his/her database of the client details. This application get functionality personal computer for basic tasks which he/she perform in of WEB OS with the help of java enabled browser. Client can his/her day to day life. A web desktop or Web Application is a uses the various services of Web Application by desktop environment embedded in a web based client authenticating. Many clients in different places are connected application. The Web Application integrates web applications, to a server. Server store details of client such as the client’s web services, client-server applications, application servers, name, password etc. Web Application provides services like and user applications on the local client into a desktop Sending:mails/ sms, file encryption/ decryption, write notes, Environment using the . file uploader, image processing, bookmarks, RSS feeds.

666 All rights reserved by www.ijrdt.org Paper Title:- User Driven Access Control through Web Application

Some standard algorithms used for security & image processing in the sub-modules of main application such as, For Security

• SHA-1 ( For Digital Signature ) • RSA ( For Encryption / Decryption ) For Image Processing • Blurring of image • Conversion from color to grayscale • Threshold of image • Image edge detection algo

MATHAMATICAL MODULE Mathematical module for Web Application using Set Theory is as follows: Figure 1.Web Application Architecture • For set theory, consider a set S which consists of set of A.Software elements as follows: The Web Application has been developed and deployed in • S = ( I, WS, P, U, A, O ) java platform, the open source framework designed for • If I = set of i/p, O = set of o/p, U = set of users, desktop computers. It consists of an operating system, java • P = set of profiles, WS = Web Application Service. enabled browser and key programs. The Java SDK provides • For I = ( i1,i2,i3,.) where i = ( data, req, command) libraries needed to interface with hardware at a high level and • For O = ( o1,o2,o3,. ) where o = ( data, response ) to make and deploy java applications. Java applications are • A( Set of authentication ) coded in Java, XML is used for screen layouts and SQL • P( Set of profiles p1,p2,p3,... ) databases are used to store data. • U( Set of users u1,u2,u3,... ) B. Process Flow • Then, pj = A(uj ) The process flow of the Web Applicationis, when the • O = WS ( pj,ij ) application is launched, the app connects to the server then • ( ij, oj ) belongs to pj web connection is established. The user name and password are sent to the server for validation. If these are correct, the IMPLEMENTATION server sends the list of apps to client to use. Client can process The process is divided into two modules: a module for getting the data and stored on the server. and storing information into the database, a module for ALGORITHMS USED retrieving information from the server. A. Module for receiving and storing data The Web contains all the client data. When the app is being installed on the client desktop and the client supplies login information, a web connection is established with the server and login details validated. Next, the server supplies the details of the clients. B. Module for displaying data After validating all the information of client user client gets complete system access.

667 ISSN:-2349-3585 |www.ijrdt.org Paper Title:- User Driven Access Control through Web Application

RESULTS CONCLUSION This paper gives a survey and idea on recently proposed reactive web operating system over the internet. The proposed work focuses only on Web Technology based Web Application. The developing system will be basically a web application in which all the features are provided to client in single application. In future things to extend the applications and modules in the system. ACKNOWLEDGMENT Welcome Window I would like to thank the anonymous referees for their helpful guidance that have improved the quality of this paper. Also I would like to thank my Guide Prof. S. B. Nimbekar for his valuable guidance. REFERENCES [1]FranziskaRoesner, Tadayoshi Kohno, Alexander Moshchuk, Bryan Parno, Helen J. Wang, Crispin Cowan, “User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems”, IEEE Symposium on Security and Privacy, pp. 224-238, 2012. [2]HeshamAbusaimeh,“CloudWeb-Based OperatingSystem (Cloud Web Os)”, International Journal of ComputerScience

& Information Technology (IJCSIT) Vol 6, No 2, April 2014. Create Account Window [3] Chang-Hsing Wu, Yi-Lun Pan, Hsi-En Yu, Hui-Shan Chen, and Ching-Wen Yu, “One Click to Build An OnDemand Virtual Cluster in Cloud Web-based Operating System with Dynamic Loading Prediction Scheduling Algorithm”, CLOUD COMPUTING 2011 : The Second International Conference on Cloud Computing, GRIDs, and Virtualization, IARIA, 2011. [4] NoopurBardhan, Pooja Singh, “Operating System Used in Cloud Computing”, (IJCSIT) International Journal of

User Login Window Computer Science and Information Technologies, Vol. 6 (1), 2015, 542-544. [5]Mohammad Mosleh, Shahdad Shariatmadari, Saeed Javanmardi, “RESOURCE MANAGEMENT IN WEB OS BASED ON SEMANTIC WEB TECHNOLOGY”, Global Journal of Technology & Optimization, Volume 3, 2012. [6] VasiliosAndrikopoulos, Zhe Song and Frank Leymann, “Supporting the Migration of Applications to the Cloud through a Decision Support System”, IEEE SIXTH Main Application Window INTERNATIONAL CONFERNCE ON CLOUD

668 ISSN:-2349-3585 |www.ijrdt.org Paper Title:- User Driven Access Control through Web Application

COMPUTING YEAR 2013. [7] Pan-Lung Tsai, “Towards Ubiquitous Computing via Secure Desktop Service”, IEEE Catalogue No. 01 CH37239, 2001.

669 ISSN:-2349-3585 |www.ijrdt.org