SlideShare a Scribd company logo
1 of 24
presented by:
K.Naveen
G.Prabhath
G.Saikiran
ONLINE SECURE FILE TRANSFER
SYSTEM
INTRODUCTION
 The project is a web based application to make sure that the data being transferred over the Internet
is secured and confidential.
 File Transfer Web Application is used to upload any type of files like pdf, mp3, word, video, etc.)
into a database table and can download any type of files from the data base.
 The web application is developed in 3 tier architecture involving user interface, controller and
database.
SYSTEM ANALYSIS
EXISTING SYSTEM:
 The weaknesses of all encryption systems is that the form of the output data.
 In this case, we assume that the intercept will be attacked, decrypted and the
information retrieved.
PROPOSED SYSTEM :
 Encryption is the most effective way to achieve data security.
 The encrypted file can only be opened and viewed after it has been decrypted to its
original file using the symmetric encryption key.
MODULES
Modules Description:
1.Admin:
 In this application the admin is one of the Modules and here the admin can
directly login with the application.
2.User:
 Here the user can view all the files and request for the file to download the
files.
 Here using that file key the user can able to download the file.
SYSTEM DESIGN
Architecture:
INPUT AND OUTPUT DESIGN
 To provide flexibility to the users, the interfaces have been developed that are
accessible through a browser. The GUI’S at the top level have been categorized as
1. Administrative user interface:
 The ‘administrative user interface’concentrates on the consistent information that
is practically, part of the organizational activities and which needs proper
authentication for the data collection.
2. The operational or generic user interface:
 The ‘operational or generic user interface’ helps the end users of the system in
transactions through the existing data and required services.
IMPLIMENTATION
1. JAVA:
 Java is a programmer’s language.
 The primary motivation of this language was the need for a platform-
independent (i.e. architecture neutral)language that could be used to create
software.
2. Servlets/JSP:
 A Servlet is a generic server extension .A java class that can be loaded
Dynamically to expand the functionality of a server.
 Servlets operate solely within the domain of the server.
3. JDBC:
 JDBC is commonly known by Java Database Connectivity.
 Using JDBC, it is easy to send SQL statements to virtually program will be
able to send SQL statements to the appropriate database.
4. SQL Server:
 SQL Server is a relational database management system, or RDBMS,
developed and marketed by Microsoft.
 SQL Server works exclusively on Windows environment for more than 20
years.
5.Apache Tomcat:
 The Apache Tomcat software is an open source implementation of the Jakarta servlet.
 The Apache Tomcat software is developed under the Apache license version2.
6. HTML:
 HTML is a Hypertext Markup Language , the languages of the world wide
web(WWW), allows users to produces web pages that included text, graphics
and pointer to other web pages .
 HTML is not a programming language but it is an application of ISO Standard
8879, SGML(Standard Generalized Markup Language).
7.JAVA SCRIPT:
 JavaScript is a compact , object-based scripting language for developing client
and server internet applications.
 In a client application for Navigator, JavaScript statements embedded in an
HTML Page can recognize and respond to user events.
Fig 1:Home Page.
OUTPUT SCREENS
Fig 2: User Registration.
Fig 3: User Login.
Fig 4: Admin Login
Fig 5: Admin page View
Fig 6: Upload Files
Fig 7: Files View
Fig 8: Request of Files
Fig 9: Request accepted by admin
Fig 10: Downloaded Files using key
TESTING
 Testing is a process, which reveals errors in the program.
 During testing, the program is executed with a set of test cases and the
output of the program for the test cases is evaluated to determine if the
program is performing as it is expected to perform.
TESTING IN STRATEGIES:
 In order to make sure that the system does not have errors, the different
levels of testing strategies that are applied at differing phases of software
development are: • Unit Testing.
• Black Box Testing.
• White Box Testing.
• Integration Testing.
• System Testing.
• Acceptance Testing.
conclusion
The File transferred securely from user to admin securely through web application. The data to be
uploaded is encrypted first at the admin side .When the admin logs in again he can see the files
which he uploaded and encrypted at the server side , which he can choose to upload on the web
server’s database.The User after Logging can search the uploaded files to select and send request to
admin. The advantage is that the file is encrypted. If the user wishes to download the file.In this way
the file is securely transferred to clients.
REFERENCES
References for the Project Development Were Taken From the following Books and
Web Sites.
• JAVA Complete Reference.
• JAVA Technologies.
• JAVA Script Programming by Yehuda Shiran.
• JAVA Security by Scotloaks.
Thank you…

More Related Content

Similar to mini proj_batch1.pptx online secure file transfer system

SoftwareRequirements (1).doc
SoftwareRequirements (1).docSoftwareRequirements (1).doc
SoftwareRequirements (1).docMadihaKhalid43
 
Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2Raghu Vamsy Sirasala
 
Mail server_Synopsis
Mail server_SynopsisMail server_Synopsis
Mail server_SynopsisManmeet Sinha
 
Operating system concepts ninth edition (2012), chapter 2 solution e1
Operating system concepts ninth edition (2012), chapter 2 solution e1Operating system concepts ninth edition (2012), chapter 2 solution e1
Operating system concepts ninth edition (2012), chapter 2 solution e1Navid Daneshvaran
 
OPEN TEXT ADMINISTRATION
OPEN TEXT ADMINISTRATIONOPEN TEXT ADMINISTRATION
OPEN TEXT ADMINISTRATIONSUMIT KUMAR
 
Desktop applicationtesting
Desktop applicationtestingDesktop applicationtesting
Desktop applicationtestingAkss004
 
Network Software, System Software, Hardware, Software, Firmware, App
Network Software, System Software, Hardware, Software, Firmware, AppNetwork Software, System Software, Hardware, Software, Firmware, App
Network Software, System Software, Hardware, Software, Firmware, AppAfsanaAkterRubi
 
Transparent proxy - SIP - 2014 - NCC LAB
Transparent proxy - SIP - 2014 - NCC LABTransparent proxy - SIP - 2014 - NCC LAB
Transparent proxy - SIP - 2014 - NCC LABBenith T
 
127801976 mobile-shop-management-system-documentation
127801976 mobile-shop-management-system-documentation127801976 mobile-shop-management-system-documentation
127801976 mobile-shop-management-system-documentationNitesh Kumar
 
BUILDING A CONTINUOUSLY INTEGRATING SYSTEM WITH HIGH SAFETY
BUILDING A CONTINUOUSLY INTEGRATING SYSTEM WITH HIGH SAFETYBUILDING A CONTINUOUSLY INTEGRATING SYSTEM WITH HIGH SAFETY
BUILDING A CONTINUOUSLY INTEGRATING SYSTEM WITH HIGH SAFETYIJNSA Journal
 
Project report for final year project
Project report for final year projectProject report for final year project
Project report for final year projectsuneel singh
 
IRJET - Code Compiler Shell
IRJET -  	  Code Compiler ShellIRJET -  	  Code Compiler Shell
IRJET - Code Compiler ShellIRJET Journal
 
FAST PHRASE SEARCH FOR ENCRYPTED CLOUD STORAGE.pptx
FAST PHRASE SEARCH FOR ENCRYPTED CLOUD STORAGE.pptxFAST PHRASE SEARCH FOR ENCRYPTED CLOUD STORAGE.pptx
FAST PHRASE SEARCH FOR ENCRYPTED CLOUD STORAGE.pptxgattamanenitejeswar
 
A two stage feature selection method for text categorization
A two stage feature selection method for text categorizationA two stage feature selection method for text categorization
A two stage feature selection method for text categorizationParag Tamhane
 

Similar to mini proj_batch1.pptx online secure file transfer system (20)

SoftwareRequirements (1).doc
SoftwareRequirements (1).docSoftwareRequirements (1).doc
SoftwareRequirements (1).doc
 
Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2
 
Mail server_Synopsis
Mail server_SynopsisMail server_Synopsis
Mail server_Synopsis
 
Internship msc cs
Internship msc csInternship msc cs
Internship msc cs
 
Operating system concepts ninth edition (2012), chapter 2 solution e1
Operating system concepts ninth edition (2012), chapter 2 solution e1Operating system concepts ninth edition (2012), chapter 2 solution e1
Operating system concepts ninth edition (2012), chapter 2 solution e1
 
Documentation
DocumentationDocumentation
Documentation
 
OPEN TEXT ADMINISTRATION
OPEN TEXT ADMINISTRATIONOPEN TEXT ADMINISTRATION
OPEN TEXT ADMINISTRATION
 
Anti Key Logging And Real Time Encryption Software
Anti Key Logging And Real Time Encryption SoftwareAnti Key Logging And Real Time Encryption Software
Anti Key Logging And Real Time Encryption Software
 
Desktop applicationtesting
Desktop applicationtestingDesktop applicationtesting
Desktop applicationtesting
 
Network Software, System Software, Hardware, Software, Firmware, App
Network Software, System Software, Hardware, Software, Firmware, AppNetwork Software, System Software, Hardware, Software, Firmware, App
Network Software, System Software, Hardware, Software, Firmware, App
 
Transparent proxy - SIP - 2014 - NCC LAB
Transparent proxy - SIP - 2014 - NCC LABTransparent proxy - SIP - 2014 - NCC LAB
Transparent proxy - SIP - 2014 - NCC LAB
 
E farming
E farmingE farming
E farming
 
127801976 mobile-shop-management-system-documentation
127801976 mobile-shop-management-system-documentation127801976 mobile-shop-management-system-documentation
127801976 mobile-shop-management-system-documentation
 
503 434-438
503 434-438503 434-438
503 434-438
 
BUILDING A CONTINUOUSLY INTEGRATING SYSTEM WITH HIGH SAFETY
BUILDING A CONTINUOUSLY INTEGRATING SYSTEM WITH HIGH SAFETYBUILDING A CONTINUOUSLY INTEGRATING SYSTEM WITH HIGH SAFETY
BUILDING A CONTINUOUSLY INTEGRATING SYSTEM WITH HIGH SAFETY
 
Project report for final year project
Project report for final year projectProject report for final year project
Project report for final year project
 
IRJET - Code Compiler Shell
IRJET -  	  Code Compiler ShellIRJET -  	  Code Compiler Shell
IRJET - Code Compiler Shell
 
FAST PHRASE SEARCH FOR ENCRYPTED CLOUD STORAGE.pptx
FAST PHRASE SEARCH FOR ENCRYPTED CLOUD STORAGE.pptxFAST PHRASE SEARCH FOR ENCRYPTED CLOUD STORAGE.pptx
FAST PHRASE SEARCH FOR ENCRYPTED CLOUD STORAGE.pptx
 
KMS (1)
KMS (1)KMS (1)
KMS (1)
 
A two stage feature selection method for text categorization
A two stage feature selection method for text categorizationA two stage feature selection method for text categorization
A two stage feature selection method for text categorization
 

More from KorbanMaheshwari

C programming basic concepts of mahi.pptx
C programming basic concepts of mahi.pptxC programming basic concepts of mahi.pptx
C programming basic concepts of mahi.pptxKorbanMaheshwari
 
Plant shopping on web.pptx.it is based o
Plant shopping on web.pptx.it is based oPlant shopping on web.pptx.it is based o
Plant shopping on web.pptx.it is based oKorbanMaheshwari
 
CRIME ANALYSIS MAPPING INTRUSION DETECTION-USING DATA MINING.pptx
CRIME ANALYSIS MAPPING INTRUSION DETECTION-USING DATA MINING.pptxCRIME ANALYSIS MAPPING INTRUSION DETECTION-USING DATA MINING.pptx
CRIME ANALYSIS MAPPING INTRUSION DETECTION-USING DATA MINING.pptxKorbanMaheshwari
 
TPIP-1.pptx front end development of css
TPIP-1.pptx front end development of cssTPIP-1.pptx front end development of css
TPIP-1.pptx front end development of cssKorbanMaheshwari
 
nandini_pharmacy presentation on the ppt
nandini_pharmacy presentation on the pptnandini_pharmacy presentation on the ppt
nandini_pharmacy presentation on the pptKorbanMaheshwari
 
Loctrainreservation based on the train.ppt
Loctrainreservation based on the train.pptLoctrainreservation based on the train.ppt
Loctrainreservation based on the train.pptKorbanMaheshwari
 
_86c448dfa47cdab170075f16cd25c650_PeerReviewforUpload.pptx
_86c448dfa47cdab170075f16cd25c650_PeerReviewforUpload.pptx_86c448dfa47cdab170075f16cd25c650_PeerReviewforUpload.pptx
_86c448dfa47cdab170075f16cd25c650_PeerReviewforUpload.pptxKorbanMaheshwari
 
Basic Concepts of C Language.pptx
Basic Concepts of C Language.pptxBasic Concepts of C Language.pptx
Basic Concepts of C Language.pptxKorbanMaheshwari
 
GREEN COMPUTING PPT (1).pptx
GREEN COMPUTING PPT (1).pptxGREEN COMPUTING PPT (1).pptx
GREEN COMPUTING PPT (1).pptxKorbanMaheshwari
 

More from KorbanMaheshwari (10)

C programming basic concepts of mahi.pptx
C programming basic concepts of mahi.pptxC programming basic concepts of mahi.pptx
C programming basic concepts of mahi.pptx
 
Plant shopping on web.pptx.it is based o
Plant shopping on web.pptx.it is based oPlant shopping on web.pptx.it is based o
Plant shopping on web.pptx.it is based o
 
CRIME ANALYSIS MAPPING INTRUSION DETECTION-USING DATA MINING.pptx
CRIME ANALYSIS MAPPING INTRUSION DETECTION-USING DATA MINING.pptxCRIME ANALYSIS MAPPING INTRUSION DETECTION-USING DATA MINING.pptx
CRIME ANALYSIS MAPPING INTRUSION DETECTION-USING DATA MINING.pptx
 
TPIP-1.pptx front end development of css
TPIP-1.pptx front end development of cssTPIP-1.pptx front end development of css
TPIP-1.pptx front end development of css
 
nandini_pharmacy presentation on the ppt
nandini_pharmacy presentation on the pptnandini_pharmacy presentation on the ppt
nandini_pharmacy presentation on the ppt
 
Loctrainreservation based on the train.ppt
Loctrainreservation based on the train.pptLoctrainreservation based on the train.ppt
Loctrainreservation based on the train.ppt
 
_86c448dfa47cdab170075f16cd25c650_PeerReviewforUpload.pptx
_86c448dfa47cdab170075f16cd25c650_PeerReviewforUpload.pptx_86c448dfa47cdab170075f16cd25c650_PeerReviewforUpload.pptx
_86c448dfa47cdab170075f16cd25c650_PeerReviewforUpload.pptx
 
silentsoundtechppt.pptx
silentsoundtechppt.pptxsilentsoundtechppt.pptx
silentsoundtechppt.pptx
 
Basic Concepts of C Language.pptx
Basic Concepts of C Language.pptxBasic Concepts of C Language.pptx
Basic Concepts of C Language.pptx
 
GREEN COMPUTING PPT (1).pptx
GREEN COMPUTING PPT (1).pptxGREEN COMPUTING PPT (1).pptx
GREEN COMPUTING PPT (1).pptx
 

Recently uploaded

Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 

Recently uploaded (20)

OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 

mini proj_batch1.pptx online secure file transfer system

  • 2. INTRODUCTION  The project is a web based application to make sure that the data being transferred over the Internet is secured and confidential.  File Transfer Web Application is used to upload any type of files like pdf, mp3, word, video, etc.) into a database table and can download any type of files from the data base.  The web application is developed in 3 tier architecture involving user interface, controller and database.
  • 3. SYSTEM ANALYSIS EXISTING SYSTEM:  The weaknesses of all encryption systems is that the form of the output data.  In this case, we assume that the intercept will be attacked, decrypted and the information retrieved. PROPOSED SYSTEM :  Encryption is the most effective way to achieve data security.  The encrypted file can only be opened and viewed after it has been decrypted to its original file using the symmetric encryption key.
  • 4. MODULES Modules Description: 1.Admin:  In this application the admin is one of the Modules and here the admin can directly login with the application. 2.User:  Here the user can view all the files and request for the file to download the files.  Here using that file key the user can able to download the file.
  • 6. INPUT AND OUTPUT DESIGN  To provide flexibility to the users, the interfaces have been developed that are accessible through a browser. The GUI’S at the top level have been categorized as 1. Administrative user interface:  The ‘administrative user interface’concentrates on the consistent information that is practically, part of the organizational activities and which needs proper authentication for the data collection.
  • 7. 2. The operational or generic user interface:  The ‘operational or generic user interface’ helps the end users of the system in transactions through the existing data and required services.
  • 8. IMPLIMENTATION 1. JAVA:  Java is a programmer’s language.  The primary motivation of this language was the need for a platform- independent (i.e. architecture neutral)language that could be used to create software. 2. Servlets/JSP:  A Servlet is a generic server extension .A java class that can be loaded Dynamically to expand the functionality of a server.  Servlets operate solely within the domain of the server.
  • 9. 3. JDBC:  JDBC is commonly known by Java Database Connectivity.  Using JDBC, it is easy to send SQL statements to virtually program will be able to send SQL statements to the appropriate database. 4. SQL Server:  SQL Server is a relational database management system, or RDBMS, developed and marketed by Microsoft.  SQL Server works exclusively on Windows environment for more than 20 years. 5.Apache Tomcat:  The Apache Tomcat software is an open source implementation of the Jakarta servlet.  The Apache Tomcat software is developed under the Apache license version2.
  • 10. 6. HTML:  HTML is a Hypertext Markup Language , the languages of the world wide web(WWW), allows users to produces web pages that included text, graphics and pointer to other web pages .  HTML is not a programming language but it is an application of ISO Standard 8879, SGML(Standard Generalized Markup Language). 7.JAVA SCRIPT:  JavaScript is a compact , object-based scripting language for developing client and server internet applications.  In a client application for Navigator, JavaScript statements embedded in an HTML Page can recognize and respond to user events.
  • 12. Fig 2: User Registration.
  • 13. Fig 3: User Login.
  • 14. Fig 4: Admin Login
  • 15. Fig 5: Admin page View
  • 16. Fig 6: Upload Files
  • 17. Fig 7: Files View
  • 18. Fig 8: Request of Files
  • 19. Fig 9: Request accepted by admin
  • 20. Fig 10: Downloaded Files using key
  • 21. TESTING  Testing is a process, which reveals errors in the program.  During testing, the program is executed with a set of test cases and the output of the program for the test cases is evaluated to determine if the program is performing as it is expected to perform. TESTING IN STRATEGIES:  In order to make sure that the system does not have errors, the different levels of testing strategies that are applied at differing phases of software development are: • Unit Testing. • Black Box Testing. • White Box Testing. • Integration Testing. • System Testing. • Acceptance Testing.
  • 22. conclusion The File transferred securely from user to admin securely through web application. The data to be uploaded is encrypted first at the admin side .When the admin logs in again he can see the files which he uploaded and encrypted at the server side , which he can choose to upload on the web server’s database.The User after Logging can search the uploaded files to select and send request to admin. The advantage is that the file is encrypted. If the user wishes to download the file.In this way the file is securely transferred to clients.
  • 23. REFERENCES References for the Project Development Were Taken From the following Books and Web Sites. • JAVA Complete Reference. • JAVA Technologies. • JAVA Script Programming by Yehuda Shiran. • JAVA Security by Scotloaks.