File Security System
Encryption of data is used to protect the data from the unauthorized people and to avoid modification and misuse of the sensitive data. A Software which tries to converts the originality of the text into some encrypted form is called File Security System.
The main objective of this proposed system is to provide the flexibility of transferring the information to the user, to implement the encryption standards as per the proposed algorithms & specification and store the important information in a form that is unreadable by the unauthorized users. The proposed system should have a reversal process and when the user makes proper request, this process will decrypt the encrypted data to its original format.
After Encryption and Decryption of data is done, this system should confirm the authorization of the user and the standards of authentication. The system should be user-friendly, it should have a self-learning mode for the end user and easy to use. This proposed system should provide all the functional standards of proper navigation within the environment to the user. It helps the users to have a smooth flow while working within the environment.
This system must provide proper menu based navigation for easier operation and navigation to the user. The system should be developed in such a way that as soon as it creates a Buffer and associate this buffer to some homogeneous data environment, the application should ask the user to provide Encryption Key details and it should start its functionality based on the logistics that are provided with this key. The key should be designed in such a way that it should avoid the misuse of the information by the unauthorized persons at any point of time.
At the other end, the Decryption application must be a reverse process and should be translated only when the receiver of the data applies the proper reversal key. The Decryption process should have a log-based methodology that handle the errors that may be encountered while the system is under utilization and it should store all those events which are above the general security standards.
We can produce the software requirement specification (SRS) at the culmination of the analysis task.The performance and functions allocated to the software are refined by a representation of system behavior, a complete information description, an indication of performance and design constrain, appropriate validation criteria, a detailed functional description and other information pertinent to requirements.
Operating System: Windows 2000/ XP (Client/Server)
Front-end: Java JDK 1.4, J2Sdk 1.1.4, Swings
Back End: Oracle 8i
Communication Architecture: JDBC
Processor: Minimum Pentium IV Processor with 1.9 GHz Clock Speed
RAM: 512 MB RAM or more
Hard Disk: Minimum 20 GB HDD
Monitor: Minimum 14 inch screen monitor
Mouse: 3 Button scroll/ Wireless mouse
Key Board: 101 Standard keys
CD/ROM Drive: 52 Bit
32 Bit PCI Ethernet Card
Buy this project: