File Security System Abstract
File Security System Abstract
Abstract
The Application should manage a portfolio to manage and maintain the user profiles
that has participated under the information generation and transfer. The application
should take care of the standards of bandwidth and the network jitters that may be
caused due to some unconditional constraints that may occur under the operational
standards. The application should also take care in protecting the standards used in
ciphering the text, and should manage the abstraction of the principles applied from
time to time.
Encryption of data plays a vital role in the real time environment to keep the
data out of reach of unauthorized people, such that it is not altered and tampered.
The File Security System is software, which tries to alter the originality of the text
into some encrypted form. The major task of the File Security System is to provide
the user the flexibility of passing the information implementing the encryption
standards as per the specification and algorithms proposed and store the
information in a form that is unreadable. The Application should have a reversal
process as of which should be in a position to decrypt the data to its original format
upon the proper request by the user. While the Encryption and Decryption is done
the application should confirm the standards of authentication and authorization of
the user.
We need to design software, which provides the users with the flexibility of
sending and receiving files or messages in a secured format. This software design
Software Requirements:
Operating System
Software requirements
Hardware Requirements:
System Configuration
Existing System
System definition is the process of obtaining a clear understanding of the problem space such as your business opportunities; user
needs, or market environment and defining an application or system to solve that problem.
In the existing system, file transfer is not a secured transaction. User Profiles
and access controls are not integrated to provide higher-level security in data
transfer. Encryption and decryption implementation through a character user
interface is a complicated process where the user or the administrator is to follow
some complex process.
In the traditional 2-tier architecture there existed only the server and the client. In most cases the server was only a data base server that
can only offer data. Therefore majority of the business logic i.e., validations etc. had to be placed on the clients system. This makes
maintenance expensive. Such clients are called as fat clients. This also means that every client has to be trained as to how to use the
application and even the security in the communication is also the factor to be considered.
Since the actual processing of the data takes place on the remote client the
data has to be transported over the network, which requires a secured format of
the transfer method. How to conduct transactions is to be controlled by the client
and advanced techniques implementing the cryptographic standards in the
executing the data transfer transactions. Present day transactions are considered to
be "un-trusted" in terms of security, i.e. they are relatively easy to be hacked.
Nevertheless, sensitive data transfer is to be carried out even if there is lack of an
alternative.
Network security in the existing system is the motivation factor for a new
system with higher-level security standards for the information exchange to provide
ease and secured file maintenance and management in a distributed environment.
Proposed System
The proposed system should have the following features. The transactions should take place in a secured format between various clients
in the network. The validation code should be placed on the server and not on the client such that file transfer takes place between only
the registered users only. This leads to a thin client, which is more desirable. The server should identify the type of request (GET/POST),
file access permissions and perform appropriate action. It should also identify the user and provide the communication according to the
prescribed level of security with transfer of the file requested and run the required process at the server if necessary. When responding to
the client, the server should send necessary information such as User authorization and authentication information, Encryption,
Decryption types and their level of hierarchy etc.