Secure Multipart File Transfer
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
projectsofme
Active In SP
**

Posts: 1,124
Joined: Jun 2010
#1
11-10-2010, 04:49 PM



.doc   Secure Multipart File Transfer Final.doc (Size: 1.46 MB / Downloads: 149)
Secure Multipart File Transfer Final



Abstract
Encryption of data plays a vital role in the real time environment to keep the data out of reach of unauthorized people, such that it is not altered and tampered. But sending the large amount of data through the network is also takes lot of time. The File Splitter is software, which tries to alter the originality of the text into some encrypted form and split the encrypted file into user specified size. Then the splitted files can easily send through the network in very less time. The major task of the File splitter is to provide the user the flexibility of passing the information implementing the encryption standards as per the specification and algorithms proposed and store the information in a form that is unreadable. The Application should have a reversal process as of which should be in a position to decrypt the data to its original format upon the proper request by the user. While the Encryption and Decryption is done the application should confirm the standards of authentication and authorization of the user. Before decrypting the file the user has to merge the files.
We need to design software, which provides the users with the flexibility of sending and receiving files or messages in a secured format. This software design includes the encryption and decryption algorithms for converting the normal text to cipher text for a secured transfer and splitting the file will make the user to transfer the files very easily. File Splitter is software, which is used to split the user-specifying file according to the user specifying size. It is very difficult to transfer one big file from one end to another through any media like Internet or small storage like Floppy, Pen drive etc.

Introduction - Synopsis
Encryption of data plays a vital role in the real time environment to keep the data out of reach of unauthorized people, such that it is not altered and tampered and sending the in splitted format is most secured way to transfer the data through the network. The File Splitter is software, which tries to alter the originality of the file into some encrypted form and split the file into user specified size. Then the users can easily and securely carry the data where ever he wants. The major task of the File splitter is to provide the user the flexibility of passing the information implementing the encryption standards as per the specification and algorithms proposed and store the information in a form that is unreadable. The Application should have a reversal process as of which should be in a position to merge the splitted files and decrypt the data to its original format upon the proper request by the user. While the Encryption and Decryption is done the application should confirm the standards of authentication and authorization of the user.
The Entire application should strive to achieve a user friendly Graphical User Interface, which need to be in a self-learning mode for the end user. The System Should provide all the functional standards of proper navigation with in the environment, which makes it possible for the users to have a smooth flow while working under the environment. The Overall system should provide proper menu based navigation for easier navigation and operation. The Application should be designed in such a way that, as soon as it starts create a Buffer and associate this buffer to some homogeneous data environment, the application should ask the user for the Encryption Key details and should start its functionality upon the logistics that are provided with in this key. The key should be designed in such a way that it prevents the unauthorized persons from stealing the information at any point of time.
The application of Merging and Decryption should be a reverse process at the other end and should be translated only when the receiver of the data applies the proper reversal key. The Decryption process should have a log-based methodology that will take care of any errors that may be encountered while the system is under utilization and should record all those events, which are above the general standards of security.
Reply
kiran mohite
Active In SP
**

Posts: 4
Joined: Oct 2010
#2
29-10-2010, 08:48 PM

SIR PLZ WANT THIS PROJECT
I SAW ALL D SCREEN SHOTS
REALLY NICE
PLZ SEND PROJECT ON
keyrun.html@gmail.com

or send me link wer i can get this project and implimentation
Reply
smart paper boy
Active In SP
**

Posts: 2,053
Joined: Jun 2011
#3
30-07-2011, 12:16 PM


.docx   abstract.docx (Size: 306.73 KB / Downloads: 48)
Abstract
Encryption of data plays a vital role in the real time environment to keep the data out of reach of unauthorized people, such that it is not altered and tampered. But sending the large amount of data through the network is also takes lot of time. The File Splitter is software, which tries to alter the originality of the text into some encrypted form and split the encrypted file into user specified size. Then the spitted files can easily send through the network in very less time. The major task of the File splitter is to provide the user the flexibility of passing the information implementing the encryption standards as per the specification and algorithms proposed and store the information in a form that is unreadable. The Application should have a reversal process as of which should be in a position to decrypt the data to its original format upon the proper request by the user. While the Encryption and Decryption is done the application should confirm the standards of authentication and authorization of the user. Before decrypting the file the user has to merge the files.
We need to design software, which provides the users with the flexibility of
Sending and receiving files or messages in a secured format. This software design
Includes the encryption and decryption algorithms for converting the normal text to
Cipher text for a secured transfer and splitting the file will make the user to transfer
The files very easily. File Splitter is software, which is used to split the user-
Specifying file according to the user specifying size. It is very difficult to transfer
one big file from one end to another through any media like Internet or small
storage like Floppy, Pen drive etc
Existing System:
In the traditional architecture there existed only the server and the client. In most cases the server was only a data base server that can only offer data. Therefore majority of the business logic i.e., validations etc. had to be placed on the clients system. This makes maintenance expensive. Such clients are called as ‘fat clients’. This also means that every client has to be trained as to how to use the application and even the security in the communication is also the factor to be considered.
Since the actual processing of the data takes place on the remote client the data has to be transported over the network, which requires a secured format of the transfer method. How to conduct transactions is to be controlled by the client and advanced techniques implementing the cryptographic standards in the executing the data transfer transactions. Present day transactions are considered to be "un-trusted" in terms of security, i.e. they are relatively easy to be hacked. And also we have to consider the transfer the large amount of data through the network will give errors while transferring. Nevertheless, sensitive data transfer is to be carried out even if there is lack of an alternative. Network security in the existing system is the motivation factor for a new system with higher-level security standards for the information exchange.
Reply
narasimharajuin
Active In SP
**

Posts: 1
Joined: Mar 2012
#4
26-03-2012, 01:55 PM

sir i want full project and implimentation code required


yours
narasimharajuAngel
Reply
Guest
Thinking To Register

 
#5
27-06-2012, 01:25 PM

sir plzz.. can u provide UML daigrams for dis project and implimentation.[/font] plzz plzz urgent sir.
Reply
littlepeter
Active In SP
**

Posts: 15
Joined: Jun 2012
#6
27-06-2012, 03:29 PM

Secure is becoming more and more importmant......HAHA ....
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  ThreeDimensional Password for More Secure Authentication pdf project girl 1 721 11-05-2014, 09:43 PM
Last Post: 1pradeep1
  Developing a web application to transfer image and patient information project report maker 2 4,964 17-03-2014, 03:03 PM
Last Post: MichaelKa
  Bridging Domains Using World Wide Knowledge For Transfer Learning PPT seminar projects maker 0 331 19-09-2013, 04:58 PM
Last Post: seminar projects maker
  THREE DIMENSIONAL PASSWORD FOR MORE SECURE AUTHENTICATION A MAIN PROJECT REPORT study tips 0 429 29-08-2013, 02:15 PM
Last Post: study tips
  Secure Access for MANET Using Authorization Enforcement Facility Report study tips 0 337 27-08-2013, 12:56 PM
Last Post: study tips
  Toward publicly auditable secure cloud data storage services Abstract study tips 0 326 16-08-2013, 04:59 PM
Last Post: study tips
  A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding Abstract study tips 0 350 16-08-2013, 04:57 PM
Last Post: study tips
  A New Approach for Secure Data Transfer based on Wavelet Transform Report study tips 0 390 02-08-2013, 04:15 PM
Last Post: study tips
  Inter Bank Fund Transfer in Distributed Network smart paper boy 1 1,416 01-08-2013, 03:07 PM
Last Post: Guest
  Scalable and Secure Sharing of Personal Health Records in Cloud Computing seminar flower 1 1,970 01-08-2013, 02:06 PM
Last Post: Guest