Online Secure File TransferSystem

ABSTRACT

Secure File Upload is a web utility for the admin to store data/text files securely on a web server, The data to be uploaded is encrypted first at the admin side and stored in the database in an online mode .It efficiently makes use of HTML 5 local storage for caching the data and retain it after the admin has logged-off, When the admin logs in again he can see the files which he uploaded and encrypted at the server side , which he can choose to upload on the web server’s database and thus can remotely backup the file on a remote machine. The User after Logging can search the uploaded files to select and send request to admin. The advantage is that the file is encrypted. If the user wishes to download the file he can do so by clicking at the download button should enter the key given by admin to be matched, in order to segregate the unauthorized users. In which the file is downloaded and to be stored thus can be decrypted by the user and can be viewed by him.

EXISTING SYSTEM

The weaknesses of all encryption systems is that the form of the output data (the text), if intercepted, alerts the intruder to the fact that the information being transmitted may have some importance and that it is therefore worth attacking and attempting to decrypt it. This aspect of cipher text transmission can beused to propagate disinformation, achieved by encrypting information that is specifically designed to be intercepted and decrypted. In this case, we assume that the intercept will be attacked, decrypted and the information retrieved. There is no security when transmitting the data from one end to another.

PROPOSED SYSTEM

Encryption is the most effective way to achieve data security. The process of Encryption hides thecontents of a message in a way that the original information is recovered only through adecryption process The purpose of Encryption is to prevent unauthorized parties fromviewing or modifying the data Encryption occurs when the data is passed through somesubstitute technique, shifting technique, table references or mathematical operations. All thoseprocesses generate a different form of that data. The unencrypted data is referred to as theplaintext and the encrypted data as the ciphertext, which is representation of the original data in adifferent form. A symmetric Encryption key is used for this application, which means the same key is shared forboth Encryption and decryption. The encrypted file can only be opened and viewed after it has beendecrypted to its original file using the symmetric encryption key.

PROCESS FLOW:

MODULE DESCRIPTION:

Number of Modules

After careful analysis the system has been identified to have the following modules:

  1. Admin FileUpload
  1. User Search
  1. File Encryption
  1. Decryption

1.Admin File Upload:

The Admin will upload an encrypted file onto the server by clicking the upload button, before uploading the file the admin must encrypt it; it is a pre-requisite for uploading. Once the file gets uploaded it gets stored in the File Database. When the user send request for their selected file, admin will send response withthe encrypted key according to the file request. Admin maintain the user details,file download details in the database.

2. User Search:

Users searchthe uploaded files, in order to select and send request to the admin. Admin would view the user selected files and send response according to the filename in which the user request. The file will send along with the encrypted key.Only the authenticated user can login and search files and send request to the admin. Authorized user would view the encrypted key in order to download the file.On Clicking of the download button the user should enter the encrypted key in order to decrypt. Encryption is used to ensure the secure passing of messages and other sensitive documents and information. The encrypted file can only be opened and viewed after it has beendecrypted to its original file using the symmetric encryption key.

3.File Encryption:

The process of Encryption hides thecontents of a message in a way that the original information is recovered only through adecryption process. The unencrypted data is referred to as the plaintext and the encrypted data as the ciphertext, which is representation of the original data in a different form. A symmetric Encryption key is used for this application, which means the same key is shared for both Encryption and decryption. The encrypted file can only be opened and viewed after it has beendecrypted to its original file using the symmetric encryption key.The purpose of Encryption is to prevent unauthorized parties from viewing or modifying the data Encryption occurs when the data is passed through some substitute technique, shifting technique, table references or mathematical operations. All those processes generate a different form of that data.

4. Decryption:

When the data is unscrambled by the use of a key, that is what is known as 'decryption'. It is the opposite of encryption and the 'described method' of scrambling is basically applied in reverse, so as to unscramble it. Hence, the jumbled and unreadable text becomes readable once again. When the private key has been decrypted immediately the file can be download. Then the user can download and save the file.

Software requirements:

Operating System: Windows

Technology: Java and J2EE

Web Technologies: Html, JavaScript, CSS

IDE : My Eclipse

Web Server: Tomcat

Database: My SQL

Java Version : J2SDK1.5

Hardware requirements:

Hardware - Pentium

Speed - 1.1 GHz

RAM - 1GB

Hard Disk - 20 GB

Floppy Drive - 1.44 MB

Key Board - Standard Windows Keyboard

Mouse - Two or Three Button Mouse

Monitor - SVGA