You are on page 1of 25

DATA SECURITY

SYSTEM

ABSTRACT

The Data Security Systemis an application, which concentrates on


the standards of data security and content authentication of any
system. The standard of the system should discuss the issues of
encryption and decryption standards of data management. The
issues of the cipher text need to be dealt as per the standards given
by the client. The proposed algorithms need to be worked out in
formal way to come through the conclusions of implementations.

Encryption of data plays a vital role in the real time environment to


keep the data out of reach of unauthorized people, such that it is not
altered and tampered. The Data Security Systemis software, which
tries to alter the originality of the text into some encrypted form.

EXISTING SYSTEM

In the existing system, file transfer is not a secured transaction.


User Profiles and access controls are not integrated to provide
higher-level security in data transfer. Encryption and decryption
implementation through a character user interface is a complicated
process where the user or the administrator is to follow some
complex process. In the traditional 2-tier architecture there existed
only the server and the client. In most cases the server was only a
data base server that can only offer data. Therefore majority of the
business logic i.e., validations etc. had to be placed on the clients
system. This makes maintenance expensive.

DRAWBACKS

Since the actual processing of the data takes place on the remote
client the data has to be transported over the network, which
requires a secured format of the transfer method. How to conduct
transactions is to be controlled by the client and advanced
techniques implementing the cryptographic standards in the
executing the data transfer transactions. Present day transactions
are considered to be "un-trusted" in terms of security, i.e. they are
relatively easy to be hacked. Nevertheless,sensitive data transfer
is to be carried out even if there is lack of an alternative.

PROPOSED SYSTEM

The proposed system should have the following features. The


transactions should take place in a secured format between
various clients in the network. File encryption can use any
symmetric encryption algorithm. The release of EFS uses the Data
Encryption Standard X, or DESX (128 bit in North America and
40 bit International) as the encryption algorithm. Future releases
will allow alternate encryption schemes.EFS supports encryption
and decryption of files stored on local drives as well as those
stored on remote file servers. The validation code should be
placed on the server and not on the client such that file transfer
takes place between only the registered users only.

ADVANTAGES

It should also identify the user and provide the communication


according to the prescribed level of security with transfer of the
file requested and run the required process at the server if
necessary. When responding to the client, the server should send
necessary

information

such

as

User

authorization

and

authentication information, Encryption, Decryption types and


their level of hierarchy etc.

HARDWARE & SOFTWARE CONFIGURATION

Memory Requirements

128MB

Processor Specifications

686 MHz

Hard disk space

50 MB

Operating System

windows X, Unix, Linux

Screen Resolution

800 x 600 and above.

Programming Language

jdk 1.1, Java Runtime

MODULES

Encrypt
Decrypt
Send
Information

ENCRYPT

This accepts the location of the file with its name to be encrypted.
It also takes the key. This buttons connects to the algorithm
implementation and gives an encrypted format (cipher text) of the
original file. Then it accepts the location of the file to be stored. If
the system finds the given location of the file then it executes
successfully, otherwise the system shoots the error to client giving
invalidity of mentioned file.

DECRYPT

This button when activated accepts the file path and its name,
which needs to be decrypted. The input must be an encrypted file.
If a wrong path is entered then the system directs the client with
path mismatch error. The correct path takes the location of the
decrypted file to be stored.

SEND

The action performed by this button is sending the client file to


the destination mentioned. The address of the destination is
accepted in 32-bit format (IP address). The data is sent onto the
network. If the data (client file) is sent successfully then the
message is displayed to client indicating successful file transfer.

INFORMATION

The information folder contains the details of the choice on the


key used with the specifications.

SYSTEM DESIGN

USE CASE DIAGRAM

SEQUENCE DIAGRAM

COMPONENT DIAGRAM

FLOW CHART DIAGRAM

CLASS DIAGRAM

DATA FLOW DIAGRAM (LEVEL-0)

DATA FLOW DIAGRAM (LEVEL-1)

DATA FLOW DIAGRAM (LEVEL-2)

Data flow diagram (Level3)

DATA FLOW DIAGRAM (LEVEL-4)

ACTIVITY DIAGRAM

CONCLUSION

The entire project has been developed and implemented as per the
requirements stated by the user, it is found to be bug free as per
the testing standards that is implemented.

Any specification-

untraced errors will be concentrated in the coming versions,


which are planned to be developed in near future. The system at
present does not take care of lower level check constraints in
accessing the file types in distributed environments, which is to be
considered in the future up gradations.

You might also like