2. INTRODUCTION
The project is a web based application to make sure that the data being transferred over the Internet
is secured and confidential.
File Transfer Web Application is used to upload any type of files like pdf, mp3, word, video, etc.)
into a database table and can download any type of files from the data base.
The web application is developed in 3 tier architecture involving user interface, controller and
database.
3. SYSTEM ANALYSIS
EXISTING SYSTEM:
The weaknesses of all encryption systems is that the form of the output data.
In this case, we assume that the intercept will be attacked, decrypted and the
information retrieved.
PROPOSED SYSTEM :
Encryption is the most effective way to achieve data security.
The encrypted file can only be opened and viewed after it has been decrypted to its
original file using the symmetric encryption key.
4. MODULES
Modules Description:
1.Admin:
In this application the admin is one of the Modules and here the admin can
directly login with the application.
2.User:
Here the user can view all the files and request for the file to download the
files.
Here using that file key the user can able to download the file.
6. INPUT AND OUTPUT DESIGN
To provide flexibility to the users, the interfaces have been developed that are
accessible through a browser. The GUI’S at the top level have been categorized as
1. Administrative user interface:
The ‘administrative user interface’concentrates on the consistent information that
is practically, part of the organizational activities and which needs proper
authentication for the data collection.
7. 2. The operational or generic user interface:
The ‘operational or generic user interface’ helps the end users of the system in
transactions through the existing data and required services.
8. IMPLIMENTATION
1. JAVA:
Java is a programmer’s language.
The primary motivation of this language was the need for a platform-
independent (i.e. architecture neutral)language that could be used to create
software.
2. Servlets/JSP:
A Servlet is a generic server extension .A java class that can be loaded
Dynamically to expand the functionality of a server.
Servlets operate solely within the domain of the server.
9. 3. JDBC:
JDBC is commonly known by Java Database Connectivity.
Using JDBC, it is easy to send SQL statements to virtually program will be
able to send SQL statements to the appropriate database.
4. SQL Server:
SQL Server is a relational database management system, or RDBMS,
developed and marketed by Microsoft.
SQL Server works exclusively on Windows environment for more than 20
years.
5.Apache Tomcat:
The Apache Tomcat software is an open source implementation of the Jakarta servlet.
The Apache Tomcat software is developed under the Apache license version2.
10. 6. HTML:
HTML is a Hypertext Markup Language , the languages of the world wide
web(WWW), allows users to produces web pages that included text, graphics
and pointer to other web pages .
HTML is not a programming language but it is an application of ISO Standard
8879, SGML(Standard Generalized Markup Language).
7.JAVA SCRIPT:
JavaScript is a compact , object-based scripting language for developing client
and server internet applications.
In a client application for Navigator, JavaScript statements embedded in an
HTML Page can recognize and respond to user events.
21. TESTING
Testing is a process, which reveals errors in the program.
During testing, the program is executed with a set of test cases and the
output of the program for the test cases is evaluated to determine if the
program is performing as it is expected to perform.
TESTING IN STRATEGIES:
In order to make sure that the system does not have errors, the different
levels of testing strategies that are applied at differing phases of software
development are: • Unit Testing.
• Black Box Testing.
• White Box Testing.
• Integration Testing.
• System Testing.
• Acceptance Testing.
22. conclusion
The File transferred securely from user to admin securely through web application. The data to be
uploaded is encrypted first at the admin side .When the admin logs in again he can see the files
which he uploaded and encrypted at the server side , which he can choose to upload on the web
server’s database.The User after Logging can search the uploaded files to select and send request to
admin. The advantage is that the file is encrypted. If the user wishes to download the file.In this way
the file is securely transferred to clients.
23. REFERENCES
References for the Project Development Were Taken From the following Books and
Web Sites.
• JAVA Complete Reference.
• JAVA Technologies.
• JAVA Script Programming by Yehuda Shiran.
• JAVA Security by Scotloaks.