You are on page 1of 3

FILE SECURITY SYSTEM

Abstract

The File Security System is an application, which concentrates on the


standards of data security and content authentication of any system. The standard
of the system should discuss the issues of encryption and decryption standards of
data management. The issues of the cipher text need to be dealt as per the
standards given by the client. The proposed algorithms need to be worked out in
formal way to come through the conclusions of implementations.

The Application should manage a portfolio to manage and maintain the user profiles
that has participated under the information generation and transfer. The application
should take care of the standards of bandwidth and the network jitters that may be
caused due to some unconditional constraints that may occur under the operational
standards. The application should also take care in protecting the standards used in
ciphering the text, and should manage the abstraction of the principles applied from
time to time.

Encryption of data plays a vital role in the real time environment to keep the
data out of reach of unauthorized people, such that it is not altered and tampered.
The File Security System is software, which tries to alter the originality of the text
into some encrypted form. The major task of the File Security System is to provide
the user the flexibility of passing the information implementing the encryption
standards as per the specification and algorithms proposed and store the
information in a form that is unreadable. The Application should have a reversal
process as of which should be in a position to decrypt the data to its original format
upon the proper request by the user. While the Encryption and Decryption is done
the application should confirm the standards of authentication and authorization of
the user.

We need to design software, which provides the users with the flexibility of
sending and receiving files or messages in a secured format. This software design

CreativeSoft (Corporate Office)


# 412, Annpurna Block,Aditya Enclave,Ameerpet,Hyderabad
500016 Tel : +91-40-40159158Mobile : 91-9247249455
includes the encryption and decryption algorithms for converting the normal text to
cipher text for a secured transfer.

Software Requirements:

Operating System

Windows NT/2000 (Client/Server).

Software requirements

Front-end: Java JDK 1.4, J2Sdk 1.1.4, Swings.

Communication Architecture: JDBC.

Database maintenance: Oracle 8i.

Hardware Requirements:

System Configuration

Pentium IV Processor with 1.9 GHz Clock Speed

512 MB RAM, 20 GB HDD, 32 Bit PCI Ethernet Card.

Existing System

System definition is the process of obtaining a clear understanding of the problem space such as your business opportunities; user
needs, or market environment and defining an application or system to solve that problem.

In the existing system, file transfer is not a secured transaction. User Profiles
and access controls are not integrated to provide higher-level security in data
transfer. Encryption and decryption implementation through a character user
interface is a complicated process where the user or the administrator is to follow
some complex process.

CreativeSoft (Corporate Office)


# 412, Annpurna Block,Aditya Enclave,Ameerpet,Hyderabad
500016 Tel : +91-40-40159158Mobile : 91-9247249455
The information generated at the client side while under the standard of
transfer should be secure enough and protected by any intrusions and interceptions
that may occur while the information is transferred. The overall system should
concentrate on the best algorithm that can be implemented for al the resource
standards that can be implemented as per the standards of the technical quality.

In the traditional 2-tier architecture there existed only the server and the client. In most cases the server was only a data base server that
can only offer data. Therefore majority of the business logic i.e., validations etc. had to be placed on the clients system. This makes
maintenance expensive. Such clients are called as fat clients. This also means that every client has to be trained as to how to use the
application and even the security in the communication is also the factor to be considered.

Since the actual processing of the data takes place on the remote client the
data has to be transported over the network, which requires a secured format of
the transfer method. How to conduct transactions is to be controlled by the client
and advanced techniques implementing the cryptographic standards in the
executing the data transfer transactions. Present day transactions are considered to
be "un-trusted" in terms of security, i.e. they are relatively easy to be hacked.
Nevertheless, sensitive data transfer is to be carried out even if there is lack of an
alternative.

Network security in the existing system is the motivation factor for a new
system with higher-level security standards for the information exchange to provide
ease and secured file maintenance and management in a distributed environment.

Proposed System

The proposed system should have the following features. The transactions should take place in a secured format between various clients
in the network. The validation code should be placed on the server and not on the client such that file transfer takes place between only
the registered users only. This leads to a thin client, which is more desirable. The server should identify the type of request (GET/POST),
file access permissions and perform appropriate action. It should also identify the user and provide the communication according to the
prescribed level of security with transfer of the file requested and run the required process at the server if necessary. When responding to
the client, the server should send necessary information such as User authorization and authentication information, Encryption,
Decryption types and their level of hierarchy etc.

CreativeSoft (Corporate Office)


# 412, Annpurna Block,Aditya Enclave,Ameerpet,Hyderabad
500016 Tel : +91-40-40159158Mobile : 91-9247249455

You might also like