SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1331
ONLINE JAVA COMPILER WITH SECURITY EDITOR
Shubham Chourasiya1, Sneha Gadhave2, Renuka Kulthe3 ,Tushar Bhatt4, Prof. Sunita Patil5
1Shubham Chourasiya ,BE IT at DYPCOE, ambi , Pune , Maharashtra, India
2Sneha Gadhave BE IT at DYPCOE, ambi , Pune, Maharashtra, India
3Renuka Kulthe ,BE IT at DYPCOE, ambi Pune, Maharashtra, India
4Tushar Bhatt BE IT at DYPCOE, ambi Pune, Maharashtra, India
5Professor: Sunita Patil , Dept. of IT Engineering, DYPCOE , Maharashtra , India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - As it may be a competitive world and really quick world, everything within the universes is to be net. During this net
world all the items square measure on-line. Therefore we have a tendency to created packagereferredtoas“On-linejavacompiler
with security editor”. The most aim of this project we will simply to put in writing a java program and compile it and rectify in on-
line. The shopper machine doesn’t having java Development Kit . The Shopper machine solely connected to the server. The server
having java Compiler. So server executes the java code and turn out the error message to the acceptableshoppermachine. During
this project is additionally making a security editor. This editor performs encode and decrypts the file. Cryptography and coding
method perform victimization MD5 Algorithms. There's heap of security algorithms square measure there, however MD5
algorithmic rule is incredibly economical to encode and decode the file. during this project is employedtolookatallvarietyof java
API .It is terribly helpful for writing the java program simply, as an example if any error within the format of API suggests that we
are able to read API throw this modules.)
KEY WORDS: Text mining, classification, software repositories, compiler, software projects, triaging, feature extraction
1.INTRODUCTION
Data mining is that the method of extracting helpful info through informationanalysis. It'sconjointlyreferredtoasinformation
discovery. Helpful information obtained as a results of data processing are often use to chop prices, increaserevenuesoreach.
Target information for mining purpose is categorical andnumerical havinginformationsortslikewhole number,decimal,float,
char, varchar2 etc. the most aim of this project is we are able to simply write a java program compile it and correct in on-line.
The consumer machine doesn’t have java development kit .The consumer machine is just connected to the server having java
compiler ,so server executes the java code produces the errormessagetotheacceptableconsumermachine.during thisproject
is additionally creates a security editor. This editor performs cryptography and decoding of the file. These processesarea unit
performed exploitation MD5 Algorithms. there's ton of security algorithms, however MD5 formula is most effective to during
this project it's accustomed read all style of java API .It is terribly helpful for writing the java program simply, as an example if
any error within the format of API there's an occasion to look at API throw through this module.
1.1 Purpose Of The Project:
The purpose of the project is to compile the java program online which provides java API additionally by providing security
mechanisms through MD5 algorithm without having any java development tool kit.
1.2 Vision:
This project is developed for compiling the java programs on-line. TheONLINE-COMPILERFORJAVAWITHSECURITYEDITOR
is a web based application that can be accessed throughout the world.
1.3 Scope:
This system may be used for assembling java programs on-line, additionally save that file on the online, we are able to access
the java API categories and that we may perform coding and secret writing operations.
1.4 Overview: Here
user sign in into the applying, once he's registered then he will directly log into the applying with correct user id and
countersign.
2. Literature Survey
2.1 Online C, C++, Java Compiler Using cloud computing - a survey:
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1332
Cloud Priyadarashani doke, Surabhi Shingote, Sneha Kalbhor, Anumeha Singh, Heena Yeole definethatcomputing model isfor
enabling convenient moreover as on-demand network accesstoa sharedpool ofconfigurablecomputingresourcesthatmaybe
quickly provisioned and free with minimum management efforts. In today’sworldwideuseofnet.Duringthisnetworld all the
items are on-line. So we have a tendency to produce code on-line compiler.
This project main aim is we are able to simply write program and compile and debug it in on-line. Duringthispaper,wehavea
tendency to compare 3 on-line compilers, namely, Online C, C++ compiler mistreatment cloud computing that reduces the
matter of mobility and space for storing by creating the utilization of cloud computing, centralized c# compiler mistreatment
cloud computing that facilitate to reduces drawback of your time, cost, storage space by mistreatment cloud computing idea,
on-line java compiler mistreatment cloud computing, that provides most convenient tool to compile code and take away the
errors.
2.2 Secure Compilation to Modern
Pieter Agten , Raoul Strackx, Bart Jacobs and Frank Piessens define that We are present a secure (fully abstract) compilation
scheme to compile associate object-based problem-oriented language to low-level machine language.
Full abstraction is achieved by wishing on a fine-grained program counter-based operation protection scheme , that is an
element of our low-level target language. We discuss why customary compilers fail to supply full abstraction and introduce
enhancements required to realize this goal.
We prove that our increased compilation theme provides full abstraction from our high-level linguistic communicationtoour
low-level target language. Lastly, we have a tendency to show by suggests that of a model implementation that our low-level
language with fine-grained memory access management will be accomplished withefficiencyontrendycommodityplatforms.
2.3 Automating Efficient RAM-Model Secure Computation
Chang Liu, Yan Huang, Elaine Shi, Jonathan Katz, Michael Hicks proposed that we have a tendency to describe the primary
machine-driven approach for RAM-model secure computation within the semi-honest model. We have a tendency to outline
Associate in Nursing intermediate illustration referred to as SCVM and a corresponding kind system fitted to RAM-model
secure computation
Leverage compile-time optimizations, our approach achieves order-of-magnitude speedups compared to both circuit-model
secure computation and therefore the state-of-art RAM-model secure computation.
2.4 Mashic Compiler: Mashup Sandboxing based on Inter-frame Communication:
Zhengqin Luo INRIA, Tamara Rezk INRIA propose a fresh compiler, called Mashic, for theautomatic generation of secure
Javascript-based mashups from existing mashup code. The Mashic compiler can effortlessly be applied to existing mashups
supported a wide-range of appliance Apis. It offers security and correctness guarantees.
Security is achieved via constant Origin Policy. Correctness is ensured within the presence of benign gadgets, that satisfy
confidentiality and integrity constrains with relation to the measuringsystemcode.
The compiler has been successfully appliedtoplanetmashups supportedGooglemaps,Bingmaps,YouTube,andZwibblerApis.
2.5 Design and Evaluation of Automated Scoring Java Programming Assignments:
Yuki Akahane, Hiroki Kitaya, and Ushio Inoue proposed that this paper presents a web-based automatic evaluationsystemfor
Java programming assignments, and reports analysis results in associateactual programmingcourse.Thesystem receivesJava
application programs submitted by students and returns the take a look at results now. The take a look at consists of compiler
check, JUnit test, and result take a look at.
The result take a look at is extremely helpful for assignments in elementary programming courses, as a result of a typical
program is composed of solely a main methodology that reads/writes knowledge from/to the standard input/outputdevices.
The system was used and evaluated in associate actual course of our university.
we have a tendency to confirmed that the system is very useful for college students to enhance their programming skills.
Especially, several students noticed and corrected their mistakes by repeating submission of their programs once moremany
times
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1333
3. PROBLEM FORMULATION
ONLINE-COMPILER FOR JAVA WITH SECURITY EDITOR is a web based application that can be accessedthroughout theworld
3.1 Existing System:
The existing system is that the manual system. The manual system is liable to error. it's time overwhelming. it's terribly tough
for someone to provide the report. There area unit possibilities for dynamical the theme report and do malpractice. this
technique involves plenty of manual entries with the applications to perform the specified task.
3.2 Limitations in Existing System:
• info retrieval may be a terribly massive method.
• Lack of organization of the files could rise to info loss owing to accidental deletion of files.
• No security as a result of the files visible to the users.
• Report generation are going to be a square measure giant task
.
3.3 Proposed System:
The planned system is intended to eliminate the issues within the existingsystem.the mostaimofthisproject we will simplyto
jot down a java program and compile it and rectify in on-line. The shopper machine doesn’t having java development kit .The
shopper machine solely connected to the server.
The server having java compiler .so server executes the java code and manufacture the error message to the suitable shopper
machine
3.4 Advantages over Existing System:
 On-line access is provided for the saved files.
 No have to be compelled to install jdk in our own system.
 we will compile and run our java program on-line.
4. PROJECT SOLUTION MODULES
4.1 Java File creation:
In this module we will produce a java file and put it aside in our native classification system. Any consumer will producea java
file victimisation this web content. The consumer will produce as several java files and put it aside.The web page conjointly
used as Associate in Nursing editor for the purchasers to form java files. Victimisation this shopper will simply produce a java
file. it's conjointly user friendly for the purchasers.
4.2 Java File Compilation:
In this module, we are able to compile any java application that we havea tendencyto aremaking.Theconsumermachineisn't
needed to possess the JDK put in on their machines. The consumer will use this net applicationandhe will compilethejava file.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1334
The consumer machines java application is compiled with the assistance of the JDK put in within the server machine. The JDK
put in within the server machine
4.3 Java API Information In this module, we are able to understand the knowledge of all the API (Application
programming Interface) obtainable in java. Victimisation this module we are able to understand all the strategies that are
obtainable associate exceedingly in a very category or an interface. the applying programming interfacecouldbea assortment
of categories and interfaces obtainable in an exceedingly package.
It is impracticable for a computer coder to recollect all the ways out there during a exceedingly in a very category or an
interface out there in a very package thus at that point the Programmer will create use of those JAVA API.
4.4 Encryption:
In this module, we are doing encryption using MD5 Algorithm. We are encrypting the file with the help of MD5 Algorithm.For
encrypting a file, we need to get binary number from the user. With the help of these binary numbers we are encrypting the
file. Now the actual text of the file is converted to a cipher text. So it will not be visible for the user. It will not be in the known
format.
4.5 Decryption:
In this module, we are doing decryption using MD5 Algorithm. We are decrypting the file with the help of MD5 Algorithm.
For decrypting a file, we need to get binary number from the user. With the help of these binary numbers we are
decrypting the file. Now the actual text of the file is converted to a original text. So it will be visible for the user. It will not
be in the known format.
Fig:1 System Structure
5. SYSTEM ANALYSIS
Below design diagram represents principally flow of requests from users to info through servers. During this situationoverall
system is intended in 3 tires on an individual basis exploitation 3 layers referred to as presentation layer, business logic layer
and circuit layer.
This project was developed exploitation 3-tire design.URL pattern represents however the requestsarea unitflowingthrough
one layer to a different layer and the way the responses have gotten by different layers to presentation layer throughserverin
design diagram.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1335
Fig:2 URL Diagram
Preliminary investigation examines project feasibility; the probabilityofthesystemaregoingtobehelpful tothe organization.
The most objective of the practicable study is to check the Technical, Operational and Economical practicable for adding new
modules and debugging recent running system.
All systems square measure possible if they're given unlimited resources and infinite time.All systems unit of measurement
potential if they are given unlimited resources and infinite time.There area unit aspects within thepracticabilitystudyportion
of the preliminary investigation:
• Technical Feasibility
• Operation Feasibility
• Economic Feasibility
6. MD5 Algorrithm:
MD5 uses a buffer that is made up of four words that are each 32 bits long. These words are called A, B, C and D.
They are initialized as:
word A: 01 23 45 67
word B: 89 ab cd ef
word C: fe dc ba 98
word D: 76 54 32 10
User
Create
Javafile
Compile
Javafile
View
JavaAPI
Encrypti
on
Decrypti
on
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1336
MD5 further uses a table K that has 64 elements. Element number i is indicated as Ki. The table is computed beforehand to
speed up the computations. The elements are computed using the mathematical sin function:
Ki = abs(sin(i + 1)) * 232
Four auxiliary functions:
In addition MD5 uses four auxiliary functions that each take as input three 32-bit words and produce as output one 32-bit
word. They apply the logical operators and, or, not and xor to the input bits.
 F(X,Y,Z) = (X and Y) or (not(X) and Z)
 G(X,Y,Z) = (X and Z) or (Y and not(Z))
 H(X,Y,Z) = X xor Y xor Z
 I(X,Y,Z) = Y xor (X or not(Z))
Processing the blocks:
The contents of the four buffers (A, B, C and D) are now mixed with the words of the input, using thefourauxiliaryfunctions(F,
G, H and I). There are four rounds, each involves 16 basic operations. One operation is illustrated in the figure below.
Fig:3 MD5
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1337
One operation performed in a round of the MD5 function.The figure shows how the auxiliary function F is applied to the four
buffers (A, B, C and D), using message word Mi and constant Ki. The item "<<<s" denotes a binary left shift by s bits.
The output:
After all rounds have been performed, the buffers A, B, C and D contain the MD5 digest of the original input.
7. CONCLUSION
In this project we are able to simply to write down a java program andcompileitandrightinon-line.Theusermachinedoesn’t
having java development kit .The user machine solely connected to the server. The server having java compiler .so server
executes the java code and turn out the error message to the acceptable user's machine.
The proposal which is used to provide such forms of application which might execute thejava program on mobile using cloud
server, earlier picture demonstrate the system architecture of operating vogue of defined compiler. MD 5 is the used for
encoding and secret writing on cloud server.
In addition MD5 uses four auxilary function that's take as input3thirtytwobitswordsandturnout asoutput132bitswords
they apply the logical operaters AND , OR , NOT and XOR to the input bits.After all rounds are performed , the buffersA,B,C and
D contain the MD5 digest of the original input
8.REFERENCES
[1] S. Diehl, H. C. Gall and A. E. Hassan, "Special issue on mining software repositories," in Empirical Software Engineering An
International Journal © Springer .Science+Business Media, 2009.
[2] O. B. Michael and G. C. Robin, "A Bug You Like: A Framework for Automated Assignment of Bugs.," IEEE 17th international
conference, 2009.
[3]A. Hotho, A. Nürnberger and G. Paaß, "A Brief Survey of Text Mining," vol. 20, GLDV Journal for Computational Linguistics
and Language Technology, 2005, pp. 19-62.
[4]A. E. Hassan, "The Road Ahead for Mining Software Repositories," IEEE Computer society, pp. 48-57, 2008.
[5]C. Zhang, H. Joshi, S. Ramaswamy and C. Bayrak, "A Dynamic Approach to Software Bug Estimation," in SpringerLink,2008.
[6]L. Yu, C. Kong, L. Xu, J. Zhao and H. Zhang, "Mining Bug Classifier and Debug Strategy Association Rules for Web-Based
Applications," in 08 Proceedings of the 4th international conference on Advanced Data Mining and Applications , 2008.
[7]N. Jalbert and W. Weimer, "Automated Duplicate Detection for Bug Tracking Systems," in IEEE computer society, 2008.
[8]T. Bruckhaus, C. X. Ling, N. H. Madhavji and S. Sheng, "Software EscalationPredictionwithData Mining,"inDataMining, Fifth
IEEE International Conference, 2006.
[9][Online]. Available: https://bugzilla.mozilla.org/. [10][Online].Available:https://bugs.eclipse.org/bugs/

More Related Content

PDF
IRJET- Obfuscation: Maze of Code
PDF
Dynamic Multi Levels Java Code Obfuscation Technique (DMLJCOT)
PDF
IDENTIFICATION OF PROMOTED ECLIPSE UNSTABLE INTERFACES USING CLONE DETECTION ...
PDF
IDENTIFICATION OF PROMOTED ECLIPSE UNSTABLE INTERFACES USING CLONE DETECTION ...
DOCX
Training report
DOCX
DOC
6 Weeks Project Based Summer Training
PPT
Industrial training presentation
IRJET- Obfuscation: Maze of Code
Dynamic Multi Levels Java Code Obfuscation Technique (DMLJCOT)
IDENTIFICATION OF PROMOTED ECLIPSE UNSTABLE INTERFACES USING CLONE DETECTION ...
IDENTIFICATION OF PROMOTED ECLIPSE UNSTABLE INTERFACES USING CLONE DETECTION ...
Training report
6 Weeks Project Based Summer Training
Industrial training presentation

What's hot (19)

PPTX
Summer internship report
PDF
Virtual Classroom(Android Application for Accessing Server using Wi-Fi Services)
PPTX
6 Weeks Summer Training on Java By SSDN Technologies
PDF
IRJET- A Novel Approach – Automatic paper evaluation system
DOC
Mahesh - Resume - Paypal
PDF
IRJET- Speech Based Answer Sheet Evaluation System
PDF
IRJET- E-Governance Via Online and Offline Server
DOCX
Automated card recharge android application
PDF
The distinct advantages of using PHP-Symfony Framework
PDF
Why is Python becoming indispensable in IoT Industry
PDF
Integration of java ee applications on c – based implementations
PDF
SECTZG629T_FR_2012HZ78512
DOCX
Aman Sharma
PDF
Automated server-side model for recognition of security vulnerabilities in sc...
DOC
Gajendra_RESUME
PDF
IRJET- An Effective Analysis of Anti Troll System using Artificial Intell...
DOC
Semi-Automated Security Testing of Web applications
PDF
Sukumar-Resume
PDF
Offline Sms Internet
Summer internship report
Virtual Classroom(Android Application for Accessing Server using Wi-Fi Services)
6 Weeks Summer Training on Java By SSDN Technologies
IRJET- A Novel Approach – Automatic paper evaluation system
Mahesh - Resume - Paypal
IRJET- Speech Based Answer Sheet Evaluation System
IRJET- E-Governance Via Online and Offline Server
Automated card recharge android application
The distinct advantages of using PHP-Symfony Framework
Why is Python becoming indispensable in IoT Industry
Integration of java ee applications on c – based implementations
SECTZG629T_FR_2012HZ78512
Aman Sharma
Automated server-side model for recognition of security vulnerabilities in sc...
Gajendra_RESUME
IRJET- An Effective Analysis of Anti Troll System using Artificial Intell...
Semi-Automated Security Testing of Web applications
Sukumar-Resume
Offline Sms Internet
Ad

Viewers also liked (20)

PDF
Analysis of 24×7 Water Distribution Network of Gabbur zone in Hubballi city, ...
PDF
­­Construction Quality Auditing
PDF
Microcontroller Based automatic AQUAPONICS SYSTEM
PDF
A novel approach for solving Optimal Economic load dispatch problem in power ...
PDF
Modification of Material Handling Process Using Automated Guided Vehicle (AGV)
PDF
Design and Analysis of Aqua Silencer
PDF
Efficiently Detecting and Analyzing Spam Reviews Using Live Data Feed
PDF
Survey on Medical Data Sharing Systems with NTRU
PDF
Privacy Recommendations and Ranking of User Images on Content Sharing Sites
PDF
Sag/Swell Compensation by using BES DVR in Industrial Drives Applications
PDF
Biofuel Generation from Grass
PDF
Review on Automation Tool for ERD Normalization
PDF
Review on low power high speed 32 point cyclotomic parallel FFT Processor
PDF
Performance Analysis of DSR, STAR, ZRP Routing Protocols for a Dynamic Ad-Hoc...
PDF
Portable voice communication system on raspberry pi
PDF
Localization of wireless sensor network
PDF
A Geo-PFM Model for Point Of Interest Recommendation
PDF
Automatic pneumatic bumper
PDF
Design and demonstration of heat pipe based waste heat recovery system
PDF
A novel four wire inverter system using SVPWM technique for ups applications
Analysis of 24×7 Water Distribution Network of Gabbur zone in Hubballi city, ...
­­Construction Quality Auditing
Microcontroller Based automatic AQUAPONICS SYSTEM
A novel approach for solving Optimal Economic load dispatch problem in power ...
Modification of Material Handling Process Using Automated Guided Vehicle (AGV)
Design and Analysis of Aqua Silencer
Efficiently Detecting and Analyzing Spam Reviews Using Live Data Feed
Survey on Medical Data Sharing Systems with NTRU
Privacy Recommendations and Ranking of User Images on Content Sharing Sites
Sag/Swell Compensation by using BES DVR in Industrial Drives Applications
Biofuel Generation from Grass
Review on Automation Tool for ERD Normalization
Review on low power high speed 32 point cyclotomic parallel FFT Processor
Performance Analysis of DSR, STAR, ZRP Routing Protocols for a Dynamic Ad-Hoc...
Portable voice communication system on raspberry pi
Localization of wireless sensor network
A Geo-PFM Model for Point Of Interest Recommendation
Automatic pneumatic bumper
Design and demonstration of heat pipe based waste heat recovery system
A novel four wire inverter system using SVPWM technique for ups applications
Ad

Similar to Online java compiler with security editor (20)

PDF
IRJET- Online Compiler for Computer Languages with Security Editor
PDF
Review Paper on Online Java Compiler
PDF
Crime File System
PDF
IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...
PDF
IRJET - Code Compiler Shell
PDF
2012 ieee projects software engineering @ Seabirds ( Trichy, Chennai, Pondich...
PDF
IRJET- Development of Uncrackable Software
PDF
Dairy management system project report..pdf
DOC
Online Attendance Management System
PDF
Deepcoder to Self-Code with Machine Learning
PDF
IRJET- Online Programming Environment
PDF
IRJET- Machine Learning based Network Security
PDF
Multi step automated refactoring for code smell
PDF
Multi step automated refactoring for code smell
PDF
IRJET- Lost: The Horror Game
PDF
Vulnerability Management in IT Infrastructure
PDF
Parameter Estimation of GOEL-OKUMOTO Model by Comparing ACO with MLE Method
PDF
Java remote control for laboratory monitoring
PDF
Voice Controlled News Web Based Application With Speech Recognition Using Ala...
PDF
IRJET- Build a Secure Web based Code Editor for C Programming Language
IRJET- Online Compiler for Computer Languages with Security Editor
Review Paper on Online Java Compiler
Crime File System
IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...
IRJET - Code Compiler Shell
2012 ieee projects software engineering @ Seabirds ( Trichy, Chennai, Pondich...
IRJET- Development of Uncrackable Software
Dairy management system project report..pdf
Online Attendance Management System
Deepcoder to Self-Code with Machine Learning
IRJET- Online Programming Environment
IRJET- Machine Learning based Network Security
Multi step automated refactoring for code smell
Multi step automated refactoring for code smell
IRJET- Lost: The Horror Game
Vulnerability Management in IT Infrastructure
Parameter Estimation of GOEL-OKUMOTO Model by Comparing ACO with MLE Method
Java remote control for laboratory monitoring
Voice Controlled News Web Based Application With Speech Recognition Using Ala...
IRJET- Build a Secure Web based Code Editor for C Programming Language

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PDF
composite construction of structures.pdf
PDF
Well-logging-methods_new................
PPTX
Geodesy 1.pptx...............................................
PPTX
additive manufacturing of ss316l using mig welding
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PPTX
Construction Project Organization Group 2.pptx
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PDF
Digital Logic Computer Design lecture notes
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPT
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
PPTX
bas. eng. economics group 4 presentation 1.pptx
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
composite construction of structures.pdf
Well-logging-methods_new................
Geodesy 1.pptx...............................................
additive manufacturing of ss316l using mig welding
Operating System & Kernel Study Guide-1 - converted.pdf
Construction Project Organization Group 2.pptx
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
Digital Logic Computer Design lecture notes
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
bas. eng. economics group 4 presentation 1.pptx
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
CYBER-CRIMES AND SECURITY A guide to understanding
UNIT-1 - COAL BASED THERMAL POWER PLANTS

Online java compiler with security editor

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1331 ONLINE JAVA COMPILER WITH SECURITY EDITOR Shubham Chourasiya1, Sneha Gadhave2, Renuka Kulthe3 ,Tushar Bhatt4, Prof. Sunita Patil5 1Shubham Chourasiya ,BE IT at DYPCOE, ambi , Pune , Maharashtra, India 2Sneha Gadhave BE IT at DYPCOE, ambi , Pune, Maharashtra, India 3Renuka Kulthe ,BE IT at DYPCOE, ambi Pune, Maharashtra, India 4Tushar Bhatt BE IT at DYPCOE, ambi Pune, Maharashtra, India 5Professor: Sunita Patil , Dept. of IT Engineering, DYPCOE , Maharashtra , India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - As it may be a competitive world and really quick world, everything within the universes is to be net. During this net world all the items square measure on-line. Therefore we have a tendency to created packagereferredtoas“On-linejavacompiler with security editor”. The most aim of this project we will simply to put in writing a java program and compile it and rectify in on- line. The shopper machine doesn’t having java Development Kit . The Shopper machine solely connected to the server. The server having java Compiler. So server executes the java code and turn out the error message to the acceptableshoppermachine. During this project is additionally making a security editor. This editor performs encode and decrypts the file. Cryptography and coding method perform victimization MD5 Algorithms. There's heap of security algorithms square measure there, however MD5 algorithmic rule is incredibly economical to encode and decode the file. during this project is employedtolookatallvarietyof java API .It is terribly helpful for writing the java program simply, as an example if any error within the format of API suggests that we are able to read API throw this modules.) KEY WORDS: Text mining, classification, software repositories, compiler, software projects, triaging, feature extraction 1.INTRODUCTION Data mining is that the method of extracting helpful info through informationanalysis. It'sconjointlyreferredtoasinformation discovery. Helpful information obtained as a results of data processing are often use to chop prices, increaserevenuesoreach. Target information for mining purpose is categorical andnumerical havinginformationsortslikewhole number,decimal,float, char, varchar2 etc. the most aim of this project is we are able to simply write a java program compile it and correct in on-line. The consumer machine doesn’t have java development kit .The consumer machine is just connected to the server having java compiler ,so server executes the java code produces the errormessagetotheacceptableconsumermachine.during thisproject is additionally creates a security editor. This editor performs cryptography and decoding of the file. These processesarea unit performed exploitation MD5 Algorithms. there's ton of security algorithms, however MD5 formula is most effective to during this project it's accustomed read all style of java API .It is terribly helpful for writing the java program simply, as an example if any error within the format of API there's an occasion to look at API throw through this module. 1.1 Purpose Of The Project: The purpose of the project is to compile the java program online which provides java API additionally by providing security mechanisms through MD5 algorithm without having any java development tool kit. 1.2 Vision: This project is developed for compiling the java programs on-line. TheONLINE-COMPILERFORJAVAWITHSECURITYEDITOR is a web based application that can be accessed throughout the world. 1.3 Scope: This system may be used for assembling java programs on-line, additionally save that file on the online, we are able to access the java API categories and that we may perform coding and secret writing operations. 1.4 Overview: Here user sign in into the applying, once he's registered then he will directly log into the applying with correct user id and countersign. 2. Literature Survey 2.1 Online C, C++, Java Compiler Using cloud computing - a survey:
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1332 Cloud Priyadarashani doke, Surabhi Shingote, Sneha Kalbhor, Anumeha Singh, Heena Yeole definethatcomputing model isfor enabling convenient moreover as on-demand network accesstoa sharedpool ofconfigurablecomputingresourcesthatmaybe quickly provisioned and free with minimum management efforts. In today’sworldwideuseofnet.Duringthisnetworld all the items are on-line. So we have a tendency to produce code on-line compiler. This project main aim is we are able to simply write program and compile and debug it in on-line. Duringthispaper,wehavea tendency to compare 3 on-line compilers, namely, Online C, C++ compiler mistreatment cloud computing that reduces the matter of mobility and space for storing by creating the utilization of cloud computing, centralized c# compiler mistreatment cloud computing that facilitate to reduces drawback of your time, cost, storage space by mistreatment cloud computing idea, on-line java compiler mistreatment cloud computing, that provides most convenient tool to compile code and take away the errors. 2.2 Secure Compilation to Modern Pieter Agten , Raoul Strackx, Bart Jacobs and Frank Piessens define that We are present a secure (fully abstract) compilation scheme to compile associate object-based problem-oriented language to low-level machine language. Full abstraction is achieved by wishing on a fine-grained program counter-based operation protection scheme , that is an element of our low-level target language. We discuss why customary compilers fail to supply full abstraction and introduce enhancements required to realize this goal. We prove that our increased compilation theme provides full abstraction from our high-level linguistic communicationtoour low-level target language. Lastly, we have a tendency to show by suggests that of a model implementation that our low-level language with fine-grained memory access management will be accomplished withefficiencyontrendycommodityplatforms. 2.3 Automating Efficient RAM-Model Secure Computation Chang Liu, Yan Huang, Elaine Shi, Jonathan Katz, Michael Hicks proposed that we have a tendency to describe the primary machine-driven approach for RAM-model secure computation within the semi-honest model. We have a tendency to outline Associate in Nursing intermediate illustration referred to as SCVM and a corresponding kind system fitted to RAM-model secure computation Leverage compile-time optimizations, our approach achieves order-of-magnitude speedups compared to both circuit-model secure computation and therefore the state-of-art RAM-model secure computation. 2.4 Mashic Compiler: Mashup Sandboxing based on Inter-frame Communication: Zhengqin Luo INRIA, Tamara Rezk INRIA propose a fresh compiler, called Mashic, for theautomatic generation of secure Javascript-based mashups from existing mashup code. The Mashic compiler can effortlessly be applied to existing mashups supported a wide-range of appliance Apis. It offers security and correctness guarantees. Security is achieved via constant Origin Policy. Correctness is ensured within the presence of benign gadgets, that satisfy confidentiality and integrity constrains with relation to the measuringsystemcode. The compiler has been successfully appliedtoplanetmashups supportedGooglemaps,Bingmaps,YouTube,andZwibblerApis. 2.5 Design and Evaluation of Automated Scoring Java Programming Assignments: Yuki Akahane, Hiroki Kitaya, and Ushio Inoue proposed that this paper presents a web-based automatic evaluationsystemfor Java programming assignments, and reports analysis results in associateactual programmingcourse.Thesystem receivesJava application programs submitted by students and returns the take a look at results now. The take a look at consists of compiler check, JUnit test, and result take a look at. The result take a look at is extremely helpful for assignments in elementary programming courses, as a result of a typical program is composed of solely a main methodology that reads/writes knowledge from/to the standard input/outputdevices. The system was used and evaluated in associate actual course of our university. we have a tendency to confirmed that the system is very useful for college students to enhance their programming skills. Especially, several students noticed and corrected their mistakes by repeating submission of their programs once moremany times
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1333 3. PROBLEM FORMULATION ONLINE-COMPILER FOR JAVA WITH SECURITY EDITOR is a web based application that can be accessedthroughout theworld 3.1 Existing System: The existing system is that the manual system. The manual system is liable to error. it's time overwhelming. it's terribly tough for someone to provide the report. There area unit possibilities for dynamical the theme report and do malpractice. this technique involves plenty of manual entries with the applications to perform the specified task. 3.2 Limitations in Existing System: • info retrieval may be a terribly massive method. • Lack of organization of the files could rise to info loss owing to accidental deletion of files. • No security as a result of the files visible to the users. • Report generation are going to be a square measure giant task . 3.3 Proposed System: The planned system is intended to eliminate the issues within the existingsystem.the mostaimofthisproject we will simplyto jot down a java program and compile it and rectify in on-line. The shopper machine doesn’t having java development kit .The shopper machine solely connected to the server. The server having java compiler .so server executes the java code and manufacture the error message to the suitable shopper machine 3.4 Advantages over Existing System:  On-line access is provided for the saved files.  No have to be compelled to install jdk in our own system.  we will compile and run our java program on-line. 4. PROJECT SOLUTION MODULES 4.1 Java File creation: In this module we will produce a java file and put it aside in our native classification system. Any consumer will producea java file victimisation this web content. The consumer will produce as several java files and put it aside.The web page conjointly used as Associate in Nursing editor for the purchasers to form java files. Victimisation this shopper will simply produce a java file. it's conjointly user friendly for the purchasers. 4.2 Java File Compilation: In this module, we are able to compile any java application that we havea tendencyto aremaking.Theconsumermachineisn't needed to possess the JDK put in on their machines. The consumer will use this net applicationandhe will compilethejava file.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1334 The consumer machines java application is compiled with the assistance of the JDK put in within the server machine. The JDK put in within the server machine 4.3 Java API Information In this module, we are able to understand the knowledge of all the API (Application programming Interface) obtainable in java. Victimisation this module we are able to understand all the strategies that are obtainable associate exceedingly in a very category or an interface. the applying programming interfacecouldbea assortment of categories and interfaces obtainable in an exceedingly package. It is impracticable for a computer coder to recollect all the ways out there during a exceedingly in a very category or an interface out there in a very package thus at that point the Programmer will create use of those JAVA API. 4.4 Encryption: In this module, we are doing encryption using MD5 Algorithm. We are encrypting the file with the help of MD5 Algorithm.For encrypting a file, we need to get binary number from the user. With the help of these binary numbers we are encrypting the file. Now the actual text of the file is converted to a cipher text. So it will not be visible for the user. It will not be in the known format. 4.5 Decryption: In this module, we are doing decryption using MD5 Algorithm. We are decrypting the file with the help of MD5 Algorithm. For decrypting a file, we need to get binary number from the user. With the help of these binary numbers we are decrypting the file. Now the actual text of the file is converted to a original text. So it will be visible for the user. It will not be in the known format. Fig:1 System Structure 5. SYSTEM ANALYSIS Below design diagram represents principally flow of requests from users to info through servers. During this situationoverall system is intended in 3 tires on an individual basis exploitation 3 layers referred to as presentation layer, business logic layer and circuit layer. This project was developed exploitation 3-tire design.URL pattern represents however the requestsarea unitflowingthrough one layer to a different layer and the way the responses have gotten by different layers to presentation layer throughserverin design diagram.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1335 Fig:2 URL Diagram Preliminary investigation examines project feasibility; the probabilityofthesystemaregoingtobehelpful tothe organization. The most objective of the practicable study is to check the Technical, Operational and Economical practicable for adding new modules and debugging recent running system. All systems square measure possible if they're given unlimited resources and infinite time.All systems unit of measurement potential if they are given unlimited resources and infinite time.There area unit aspects within thepracticabilitystudyportion of the preliminary investigation: • Technical Feasibility • Operation Feasibility • Economic Feasibility 6. MD5 Algorrithm: MD5 uses a buffer that is made up of four words that are each 32 bits long. These words are called A, B, C and D. They are initialized as: word A: 01 23 45 67 word B: 89 ab cd ef word C: fe dc ba 98 word D: 76 54 32 10 User Create Javafile Compile Javafile View JavaAPI Encrypti on Decrypti on
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1336 MD5 further uses a table K that has 64 elements. Element number i is indicated as Ki. The table is computed beforehand to speed up the computations. The elements are computed using the mathematical sin function: Ki = abs(sin(i + 1)) * 232 Four auxiliary functions: In addition MD5 uses four auxiliary functions that each take as input three 32-bit words and produce as output one 32-bit word. They apply the logical operators and, or, not and xor to the input bits.  F(X,Y,Z) = (X and Y) or (not(X) and Z)  G(X,Y,Z) = (X and Z) or (Y and not(Z))  H(X,Y,Z) = X xor Y xor Z  I(X,Y,Z) = Y xor (X or not(Z)) Processing the blocks: The contents of the four buffers (A, B, C and D) are now mixed with the words of the input, using thefourauxiliaryfunctions(F, G, H and I). There are four rounds, each involves 16 basic operations. One operation is illustrated in the figure below. Fig:3 MD5
  • 7. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1337 One operation performed in a round of the MD5 function.The figure shows how the auxiliary function F is applied to the four buffers (A, B, C and D), using message word Mi and constant Ki. The item "<<<s" denotes a binary left shift by s bits. The output: After all rounds have been performed, the buffers A, B, C and D contain the MD5 digest of the original input. 7. CONCLUSION In this project we are able to simply to write down a java program andcompileitandrightinon-line.Theusermachinedoesn’t having java development kit .The user machine solely connected to the server. The server having java compiler .so server executes the java code and turn out the error message to the acceptable user's machine. The proposal which is used to provide such forms of application which might execute thejava program on mobile using cloud server, earlier picture demonstrate the system architecture of operating vogue of defined compiler. MD 5 is the used for encoding and secret writing on cloud server. In addition MD5 uses four auxilary function that's take as input3thirtytwobitswordsandturnout asoutput132bitswords they apply the logical operaters AND , OR , NOT and XOR to the input bits.After all rounds are performed , the buffersA,B,C and D contain the MD5 digest of the original input 8.REFERENCES [1] S. Diehl, H. C. Gall and A. E. Hassan, "Special issue on mining software repositories," in Empirical Software Engineering An International Journal © Springer .Science+Business Media, 2009. [2] O. B. Michael and G. C. Robin, "A Bug You Like: A Framework for Automated Assignment of Bugs.," IEEE 17th international conference, 2009. [3]A. Hotho, A. Nürnberger and G. Paaß, "A Brief Survey of Text Mining," vol. 20, GLDV Journal for Computational Linguistics and Language Technology, 2005, pp. 19-62. [4]A. E. Hassan, "The Road Ahead for Mining Software Repositories," IEEE Computer society, pp. 48-57, 2008. [5]C. Zhang, H. Joshi, S. Ramaswamy and C. Bayrak, "A Dynamic Approach to Software Bug Estimation," in SpringerLink,2008. [6]L. Yu, C. Kong, L. Xu, J. Zhao and H. Zhang, "Mining Bug Classifier and Debug Strategy Association Rules for Web-Based Applications," in 08 Proceedings of the 4th international conference on Advanced Data Mining and Applications , 2008. [7]N. Jalbert and W. Weimer, "Automated Duplicate Detection for Bug Tracking Systems," in IEEE computer society, 2008. [8]T. Bruckhaus, C. X. Ling, N. H. Madhavji and S. Sheng, "Software EscalationPredictionwithData Mining,"inDataMining, Fifth IEEE International Conference, 2006. [9][Online]. Available: https://bugzilla.mozilla.org/. [10][Online].Available:https://bugs.eclipse.org/bugs/