GLOBALSOFT TECHNOLOGIES 
IEEE PROJECTS & SOFTWARE DEVELOPMENTS 
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE 
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS 
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com 
Privacy-Enhanced Web Service Composition 
ABSTRACT: 
Data as a Service (DaaS) builds on service-oriented technologies to enable fast 
access to data resources on the Web. However, this paradigm raises several new 
privacy concerns that traditional privacy models do not handle. In addition, DaaS 
composition may reveal privacy-sensitive information. In this paper, we propose a 
formal privacy model in order to extend DaaS descriptions with privacy 
capabilities. The privacy model allows a service to define a privacy policy and a 
set of privacy requirements. We also propose a privacy-preserving DaaS 
composition approach allowing to verify the compatibility between privacy 
requirements and policies in DaaS composition. We propose a negotiation 
mechanism that makes it possible to dynamically reconcile the privacy capabilities 
of services when incompatibilities arise in a composition. We validate the 
applicability of our proposal through a prototype implementation and a set of 
experiments. 
EXISTING SYSTEM: 
A typical example of modeling privacy is the Platform for Privacy Preferences 
(P3P). However, the major focus of P3P is to enable only Web sites to convey their
privacy policies. In privacy only takes into account a limited set of data fields and 
rights. Data providers specify how to use the service (mandatory and optional data 
for querying the service), while individuals specify the type of access for each part 
of their personal data contained in the service: free, limited, or not given using a 
DAML-S ontology. 
DISADVANTAGES OF EXISTING SYSTEM: 
Two factors exacerbate the problem of privacy in DaaS. First, DaaS services 
collect and store a large amount of private information about users. Second, DaaS 
services are able to share this information with other entities. Besides, the 
emergence of analysis tools makes it easier to analyze and synthesize huge 
volumes of information, hence increasing the risk of privacy violation. In the 
following, we use our epidemiological scenario to illustrate the privacy challenges 
during service composition. 
Challenge 1: Privacy Specification. 
Challenge 2: Privacy within compositions. 
Challenge 3: Dealing with incompatible privacy policies in compositions. 
PROPOSED SYSTEM: 
We describe a formal privacy model for Web Services that goes beyond traditional 
data-oriented models. It deals with privacy not only at the data level (i.e., inputs 
and outputs) but also service level (i.e., service invocation). In this paper, we build 
upon this model two other extensions to address privacy issues during DaaS 
composition. The privacy model described in this paper is based on the model 
initially proposed
ADVANTAGES OF PROPOSED SYSTEM: 
 Privacy-aware Service Composition: We propose a compatibility matching 
algorithm to check privacy compatibility between component services within a 
composition. 
 Negotiating Privacy in Service Composition: In the case when any 
composition plan will be incompatible in terms of privacy, we introduce a novel 
approach based on negotiation to reach compatibility of concerned services 
(i.e., services that participate in a composition which are incompatible). 
SYSTEM ARCHITECTURE:
Fig 2-The Negotiation Process overview
Fig 3- Service Negotiation Strategy 
Fig 4-Mediator Negotiation Strategy 
Fig 4-Prototype Architecture
ALGORITHMS USED:
SYSTEM CONFIGURATION:- 
HARDWARE CONFIGURATION:- 
 Processor - Pentium –IV 
 Speed - 1.1 Ghz 
 RAM - 256 MB(min) 
 Hard Disk - 20 GB
 Key Board - Standard Windows Keyboard 
 Mouse - Two or Three Button Mouse 
 Monitor - SVGA 
SOFTWARE CONFIGURATION:- 
 Operating System : Windows XP 
 Programming Language : JAVA 
 Java Version : JDK 1.6 & above. 
REFERENCE: 
Salah-Eddine Tbahriti, Chirine Ghedira, Brahim Medjahed and Michael Mrissa 
“Privacy-Enhanced Web Service Composition”- IEEE TRANSACTIONS ON 
SERVICES COMPUTING, VOL. X, NO. Y, MARCH 2013.

More Related Content

DOCX
Privacy enhanced web service composition
DOCX
Privacy enhanced web service composition
DOCX
JPJ1452 Privacy-Enhanced Web Service Composition
PPTX
Operations network presentation
 
PPTX
DAPSI - Open Call #1 - Webinar #1
PDF
Privacy preserving multi-keyword ranked search over encrypted cloud data 2
DOCX
privacy-enhanced web service composition
DOCX
.Net projects 2011 by core ieeeprojects.com
Privacy enhanced web service composition
Privacy enhanced web service composition
JPJ1452 Privacy-Enhanced Web Service Composition
Operations network presentation
 
DAPSI - Open Call #1 - Webinar #1
Privacy preserving multi-keyword ranked search over encrypted cloud data 2
privacy-enhanced web service composition
.Net projects 2011 by core ieeeprojects.com

Similar to IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Privacy enhanced web service composition (20)

PDF
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
PDF
A Secure & Scalable Access Method in Cloud Computing
PDF
Hierarchical attribute based solution for flexible access control in cloud co...
PDF
Intro to big data and applications -day 3
PDF
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
PDF
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
DOC
Combining efficiency, fidelity, and flexibility in resource information services
PDF
1376843836 94879193
PDF
1376843836 94879193
PDF
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
DOCX
AN EFFICIENT AND FINE-GRAINED BIG DATA ACCESSCONTROL SCHEME WITH PRIVACY-PRES...
DOC
Privacy preserving multi-keyword ranked search over encrypted cloud data
DOC
Privacy preserving multi-keyword ranked search over encrypted cloud data
PDF
Hashtag Recommendation System in a P2P Social Networking Application
PDF
Cloud java titles adrit solutions
PDF
50120140507005 2
PDF
50120140507005
PDF
Iaetsd secured and efficient data scheduling of intermediate data sets
PDF
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS)
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
A Secure & Scalable Access Method in Cloud Computing
Hierarchical attribute based solution for flexible access control in cloud co...
Intro to big data and applications -day 3
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
Combining efficiency, fidelity, and flexibility in resource information services
1376843836 94879193
1376843836 94879193
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
AN EFFICIENT AND FINE-GRAINED BIG DATA ACCESSCONTROL SCHEME WITH PRIVACY-PRES...
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
Hashtag Recommendation System in a P2P Social Networking Application
Cloud java titles adrit solutions
50120140507005 2
50120140507005
Iaetsd secured and efficient data scheduling of intermediate data sets
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS)
Ad

More from IEEEFINALYEARSTUDENTPROJECTS (20)

DOCX
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...
DOCX
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Building a scalable system for steal...
DOCX
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Token mac a fair mac protocol for pa...
DOCX
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Tag sense leveraging smartphones for...
DOC
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Privacy preserving optimal meeting l...
DOCX
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Preserving location privacy in geo s...
DOCX
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Friendbook a semantic based friend r...
DOCX
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Efficient and privacy aware data agg...
DOCX
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...
DOCX
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS A low complexity algorithm for neigh...
DOCX
IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Hierarchical prediction and context ...
DOCX
IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Designing an-efficient-image encrypt...
DOCX
IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Click prediction-for-web-image-reran...
DOCX
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Web service recommendation via expl...
DOCX
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Scalable and accurate prediction of...
DOCX
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Decentralized enactment of bpel pro...
DOCX
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS A novel time obfuscated algorithm ...
DOCX
IEEE 2014 JAVA SOFTWARE ENGINEER PROJECTS Conservation of information softwar...
DOC
IEEE 2014 JAVA DATA MINING PROJECTS Xs path navigation on xml schemas made easy
DOCX
IEEE 2014 JAVA DATA MINING PROJECTS Web image re ranking using query-specific...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Building a scalable system for steal...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Token mac a fair mac protocol for pa...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Tag sense leveraging smartphones for...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Privacy preserving optimal meeting l...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Preserving location privacy in geo s...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Friendbook a semantic based friend r...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Efficient and privacy aware data agg...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS A low complexity algorithm for neigh...
IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Hierarchical prediction and context ...
IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Designing an-efficient-image encrypt...
IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Click prediction-for-web-image-reran...
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Web service recommendation via expl...
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Scalable and accurate prediction of...
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Decentralized enactment of bpel pro...
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS A novel time obfuscated algorithm ...
IEEE 2014 JAVA SOFTWARE ENGINEER PROJECTS Conservation of information softwar...
IEEE 2014 JAVA DATA MINING PROJECTS Xs path navigation on xml schemas made easy
IEEE 2014 JAVA DATA MINING PROJECTS Web image re ranking using query-specific...
Ad

Recently uploaded (20)

PDF
CELDAS DE COMBUSTIBLE TIPO MEMBRANA DE INTERCAMBIO PROTÓNICO.pdf
DOCX
ENVIRONMENTAL PROTECTION AND MANAGEMENT (18CVL756)
PPTX
Environmental studies, Moudle 3-Environmental Pollution.pptx
PDF
Project_Mgmt_Institute_-Marc Marc Marc .pdf
PPT
UNIT-I Machine Learning Essentials for 2nd years
PDF
VSL-Strand-Post-tensioning-Systems-Technical-Catalogue_2019-01.pdf
PPTX
Solar energy pdf of gitam songa hemant k
PPTX
Quality engineering part 1 for engineering undergraduates
PPTX
Wireless sensor networks (WSN) SRM unit 2
PPTX
DATA STRCUTURE LABORATORY -BCSL305(PRG1)
PPTX
CNS - Unit 1 (Introduction To Computer Networks) - PPT (2).pptx
PPTX
AI-Reporting for Emerging Technologies(BS Computer Engineering)
PPTX
MAD Unit - 3 User Interface and Data Management (Diploma IT)
PPTX
Agentic Artificial Intelligence (Agentic AI).pptx
PDF
Mechanics of materials week 2 rajeshwari
PDF
VTU IOT LAB MANUAL (BCS701) Computer science and Engineering
PDF
MACCAFERRY GUIA GAVIONES TERRAPLENES EN ESPAÑOL
PDF
AIGA 012_04 Cleaning of equipment for oxygen service_reformat Jan 12.pdf
PPTX
BBOC407 BIOLOGY FOR ENGINEERS (CS) - MODULE 1 PART 1.pptx
PPTX
Module1.pptxrjkeieuekwkwoowkemehehehrjrjrj
CELDAS DE COMBUSTIBLE TIPO MEMBRANA DE INTERCAMBIO PROTÓNICO.pdf
ENVIRONMENTAL PROTECTION AND MANAGEMENT (18CVL756)
Environmental studies, Moudle 3-Environmental Pollution.pptx
Project_Mgmt_Institute_-Marc Marc Marc .pdf
UNIT-I Machine Learning Essentials for 2nd years
VSL-Strand-Post-tensioning-Systems-Technical-Catalogue_2019-01.pdf
Solar energy pdf of gitam songa hemant k
Quality engineering part 1 for engineering undergraduates
Wireless sensor networks (WSN) SRM unit 2
DATA STRCUTURE LABORATORY -BCSL305(PRG1)
CNS - Unit 1 (Introduction To Computer Networks) - PPT (2).pptx
AI-Reporting for Emerging Technologies(BS Computer Engineering)
MAD Unit - 3 User Interface and Data Management (Diploma IT)
Agentic Artificial Intelligence (Agentic AI).pptx
Mechanics of materials week 2 rajeshwari
VTU IOT LAB MANUAL (BCS701) Computer science and Engineering
MACCAFERRY GUIA GAVIONES TERRAPLENES EN ESPAÑOL
AIGA 012_04 Cleaning of equipment for oxygen service_reformat Jan 12.pdf
BBOC407 BIOLOGY FOR ENGINEERS (CS) - MODULE 1 PART 1.pptx
Module1.pptxrjkeieuekwkwoowkemehehehrjrjrj

IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Privacy enhanced web service composition

  • 1. GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:[email protected] Privacy-Enhanced Web Service Composition ABSTRACT: Data as a Service (DaaS) builds on service-oriented technologies to enable fast access to data resources on the Web. However, this paradigm raises several new privacy concerns that traditional privacy models do not handle. In addition, DaaS composition may reveal privacy-sensitive information. In this paper, we propose a formal privacy model in order to extend DaaS descriptions with privacy capabilities. The privacy model allows a service to define a privacy policy and a set of privacy requirements. We also propose a privacy-preserving DaaS composition approach allowing to verify the compatibility between privacy requirements and policies in DaaS composition. We propose a negotiation mechanism that makes it possible to dynamically reconcile the privacy capabilities of services when incompatibilities arise in a composition. We validate the applicability of our proposal through a prototype implementation and a set of experiments. EXISTING SYSTEM: A typical example of modeling privacy is the Platform for Privacy Preferences (P3P). However, the major focus of P3P is to enable only Web sites to convey their
  • 2. privacy policies. In privacy only takes into account a limited set of data fields and rights. Data providers specify how to use the service (mandatory and optional data for querying the service), while individuals specify the type of access for each part of their personal data contained in the service: free, limited, or not given using a DAML-S ontology. DISADVANTAGES OF EXISTING SYSTEM: Two factors exacerbate the problem of privacy in DaaS. First, DaaS services collect and store a large amount of private information about users. Second, DaaS services are able to share this information with other entities. Besides, the emergence of analysis tools makes it easier to analyze and synthesize huge volumes of information, hence increasing the risk of privacy violation. In the following, we use our epidemiological scenario to illustrate the privacy challenges during service composition. Challenge 1: Privacy Specification. Challenge 2: Privacy within compositions. Challenge 3: Dealing with incompatible privacy policies in compositions. PROPOSED SYSTEM: We describe a formal privacy model for Web Services that goes beyond traditional data-oriented models. It deals with privacy not only at the data level (i.e., inputs and outputs) but also service level (i.e., service invocation). In this paper, we build upon this model two other extensions to address privacy issues during DaaS composition. The privacy model described in this paper is based on the model initially proposed
  • 3. ADVANTAGES OF PROPOSED SYSTEM:  Privacy-aware Service Composition: We propose a compatibility matching algorithm to check privacy compatibility between component services within a composition.  Negotiating Privacy in Service Composition: In the case when any composition plan will be incompatible in terms of privacy, we introduce a novel approach based on negotiation to reach compatibility of concerned services (i.e., services that participate in a composition which are incompatible). SYSTEM ARCHITECTURE:
  • 4. Fig 2-The Negotiation Process overview
  • 5. Fig 3- Service Negotiation Strategy Fig 4-Mediator Negotiation Strategy Fig 4-Prototype Architecture
  • 7. SYSTEM CONFIGURATION:- HARDWARE CONFIGURATION:-  Processor - Pentium –IV  Speed - 1.1 Ghz  RAM - 256 MB(min)  Hard Disk - 20 GB
  • 8.  Key Board - Standard Windows Keyboard  Mouse - Two or Three Button Mouse  Monitor - SVGA SOFTWARE CONFIGURATION:-  Operating System : Windows XP  Programming Language : JAVA  Java Version : JDK 1.6 & above. REFERENCE: Salah-Eddine Tbahriti, Chirine Ghedira, Brahim Medjahed and Michael Mrissa “Privacy-Enhanced Web Service Composition”- IEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. X, NO. Y, MARCH 2013.