Loading...

File Security System Java Project

5,985 views

Loading...

Loading...

Loading...

Rating is available when the video has been rented.
This feature is not available right now. Please try again later.
Published on Jan 4, 2016

FILE SECURITY SYSTEM

Abstract
The File Security System is an application, which concentrates on the standards of data security and content authentication of any system. The standard of the system should discuss the issues of encryption and decryption standards of data management. The issues of the cipher text need to be dealt as per the standards given by the client. The proposed algorithms need to be worked out in formal way to come through the conclusions of implementations.
The Application should manage a portfolio to manage and maintain the user profiles that has participated under the information generation and transfer. The application should take care of the standards of bandwidth and the network jitters that may be caused due to some unconditional constraints that may occur under the operational standards. The application should also take care in protecting the standards used in ciphering the text, and should manage the abstraction of the principles applied from time to time.
Encryption of data plays a vital role in the real time environment to keep the data out of reach of unauthorized people, such that it is not altered and tampered. The File Security System is software, which tries to alter the originality of the text into some encrypted form. The major task of the File Security System is to provide the user the flexibility of passing the information implementing the encryption standards as per the specification and algorithms proposed and store the information in a form that is unreadable. The Application should have a reversal process as of which should be in a position to decrypt the data to its original format upon the proper request by the user. While the Encryption and Decryption is done the application should confirm the standards of authentication and authorization of the user.

Software Requirements:
• Operating System
Windows NT/2000 (Client/Server).
• Software requirements
Front-end: Java JDK 1.4, J2Sdk 1.1.4, Swings.
Communication Architecture: JDBC.
Database maintenance: Oracle 8i.

Existing System
System definition is the process of obtaining a clear understanding of the problem space such as your business opportunities; user needs, or market environment and defining an application or system to solve that problem.




In the existing system, file transfer is not a secured transaction. User Profiles and access controls are not integrated to provide higher-level security in data transfer. Encryption and decryption implementation through a character user interface is a complicated process where the user or the administrator is to follow some complex process.
The information generated at the client side while under the standard of transfer should be secure enough and protected by any intrusions and interceptions that may occur while the information is transferred. The overall system should concentrate on the best algorithm that can be implemented for al the resource standards that can be implemented as per the standards of the technical quality.


Proposed System
The proposed system should have the following features. The transactions should take place in a secured format between various clients in the network. The validation code should be placed on the server and not on the client such that file transfer takes place between only the registered users only. This leads to a thin client, which is more desirable. The server should identify the type of request (GET/POST), file access permissions and perform appropriate action. It should also identify the user and provide the communication according to the prescribed level of security with transfer of the file requested and run the required process at the server if necessary. When responding to the client, the server should send necessary information such as User authorization and authentication information, Encryption, Decryption types and their level of hierarchy etc.

  • Category

  • License

    • Standard YouTube License

Loading...

Advertisement
When autoplay is enabled, a suggested video will automatically play next.

Up next


to add this to Watch Later

Add to

Loading playlists...