File Security System


Encryption of data plays a vital role in the real time environment to keep the data out of reach of unauthorized people, such that it is not altered and tampered. The File Security System is software, which tries to alter the originality of the text into some encrypted form. The major task of File Security System is to provide the user the flexibility of passing the information implementing the encryption standards as per the specification and algorithms proposed and store the information in a form that is unreadable. The Application should have a reversal process as of which should be in a position to decrypt the data to its original format upon the proper request by the user.

While the Encryption and Decryption is done the application should confirm the standards of authentication and authorization of the user. The Entire application should strive to achieve a user friendly Graphical User Interface, which need to be in a self-learning mode for the end user. The System Should provide all the functional standards of proper navigation with in the environment, which makes it possible for the users to have a smooth flow while working under the environment.

The Overall system should provide proper menu based navigation for easier navigation and operation. The Application should be designed in such a way that, as soon as it starts create a Buffer and associate this buffer to some homogeneous data environment, the application should ask the user for the Encryption Key details and should start its functionality upon the logistics that are provided with in this key. The key should be designed in such a way that it prevents the unauthorized persons from stealing the information at any point of time.

The application of Decryption should be a reverse process at the other end and should be translated only when the receiver of the data applies the proper reversal key. The Decryption process should have a log-based methodology that will take care of any errors that may be encountered while the system is under utilization and should record all those events, which are above the general standards of security.

The software requirement specification can produce at the culmination of the analysis task. The function and performance allocated to software as part of system engineering are refined by established a complete information description, a detailed functional description, a representation of system behavior, an indication of performance and design constrain, appropriate validation criteria, and other information pertinent to requirements.



  • Operating System
  • Windows NT/2000 (Client/Server)
  • Front-end: Java JDK 1.4, J2Sdk 1.1.4, Swings.
  • Communication Architecture: JDBC.
  • Database maintenance: Oracle 8i
  • Pentium IV Processor with 1.9 GHz Clock Speed
  • 512 MB RAM, 20 GB HDD, 32 Bit PCI Ethernet Card


<< back

Related Projects : SMS Based Mobile Banking with Security ,SMS Based Student Intimation ,Social Networking With Advertisement ,Software Project Management ,SPAF: Stateless FSA-based Packet Filters ,Staying Connected in a Mobile Healthcare System ,Stealthy Attacks In Wireless Ad Hoc Networks ,Steganography In Audio Files ,Tanrox Work Force ,Text Encryption And Decryption ,Twitter Client For Android Based Smart Phone ,VAS for Hand Held Device ,Virtual Office Management ,Virtual Router Using Destination-Sequenced Distance Vector ,Voyage Management ,Web Enabled Automated Manufacturing System ,Web Alerts ,Web Blossom Bazzar ,Wireless Health Care System ,World Recipe ,Zeppelin Reservation



Copyright © V2computers 2006 through 2017