Submit Search
Upload
IRJET- Document Management System, Open Source and Secure
•
0 likes
•
30 views
IRJET Journal
Follow
https://www.irjet.net/archives/V6/i4/IRJET-V6I4741.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 4
Download now
Download to read offline
Recommended
Identity based secure distributed data storage schemes
Identity based secure distributed data storage schemes
Sahithi Naraparaju
Secure Data Storage and Forwarding in Cloud Using AES and HMAC
Secure Data Storage and Forwarding in Cloud Using AES and HMAC
IRJET Journal
Improving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-Cloud
IJTET Journal
El35782786
El35782786
IJERA Editor
E041212224
E041212224
IOSR-JEN
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET Journal
Reactive Data Centric Architectures with DDS
Reactive Data Centric Architectures with DDS
Angelo Corsaro
Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235
Editor IJARCET
Recommended
Identity based secure distributed data storage schemes
Identity based secure distributed data storage schemes
Sahithi Naraparaju
Secure Data Storage and Forwarding in Cloud Using AES and HMAC
Secure Data Storage and Forwarding in Cloud Using AES and HMAC
IRJET Journal
Improving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-Cloud
IJTET Journal
El35782786
El35782786
IJERA Editor
E041212224
E041212224
IOSR-JEN
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET Journal
Reactive Data Centric Architectures with DDS
Reactive Data Centric Architectures with DDS
Angelo Corsaro
Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235
Editor IJARCET
Prompt Detection of Transformed Data Brench
Prompt Detection of Transformed Data Brench
IRJET Journal
PPT FOR IDBSDDS SCHEMES
PPT FOR IDBSDDS SCHEMES
Sahithi Naraparaju
IRJET- Secure Data Protection in Cloud Computing
IRJET- Secure Data Protection in Cloud Computing
IRJET Journal
Paper2
Paper2
Vikas Khairnar
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET Journal
OMG Data-Distribution Service Security
OMG Data-Distribution Service Security
Gerardo Pardo-Castellote
Identity Based Secure Distributed Storage Scheme
Identity Based Secure Distributed Storage Scheme
Venkatesh Devam ☁
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
IRJET Journal
Paper id 712019116
Paper id 712019116
IJRAT
IJSRED-V2I2P10
IJSRED-V2I2P10
IJSRED
Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...
eSAT Publishing House
Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...
eSAT Journals
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
IRJET Journal
Achieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing report
Kiran Girase
Preventing Distributed Denial of Service Attacks in Cloud Environments
Preventing Distributed Denial of Service Attacks in Cloud Environments
IJITCA Journal
Systematic Review Automation in Cyber Security
Systematic Review Automation in Cyber Security
YogeshIJTSRD
Virtual Data Room Brochure
Virtual Data Room Brochure
franciscolorca
Data Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud Application
IJSRD
710201940
710201940
IJRAT
Paper1
Paper1
Vikas Khairnar
IRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on Cloud
IRJET Journal
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
IRJET Journal
More Related Content
What's hot
Prompt Detection of Transformed Data Brench
Prompt Detection of Transformed Data Brench
IRJET Journal
PPT FOR IDBSDDS SCHEMES
PPT FOR IDBSDDS SCHEMES
Sahithi Naraparaju
IRJET- Secure Data Protection in Cloud Computing
IRJET- Secure Data Protection in Cloud Computing
IRJET Journal
Paper2
Paper2
Vikas Khairnar
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET Journal
OMG Data-Distribution Service Security
OMG Data-Distribution Service Security
Gerardo Pardo-Castellote
Identity Based Secure Distributed Storage Scheme
Identity Based Secure Distributed Storage Scheme
Venkatesh Devam ☁
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
IRJET Journal
Paper id 712019116
Paper id 712019116
IJRAT
IJSRED-V2I2P10
IJSRED-V2I2P10
IJSRED
Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...
eSAT Publishing House
Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...
eSAT Journals
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
IRJET Journal
Achieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing report
Kiran Girase
Preventing Distributed Denial of Service Attacks in Cloud Environments
Preventing Distributed Denial of Service Attacks in Cloud Environments
IJITCA Journal
Systematic Review Automation in Cyber Security
Systematic Review Automation in Cyber Security
YogeshIJTSRD
Virtual Data Room Brochure
Virtual Data Room Brochure
franciscolorca
Data Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud Application
IJSRD
710201940
710201940
IJRAT
Paper1
Paper1
Vikas Khairnar
What's hot
(20)
Prompt Detection of Transformed Data Brench
Prompt Detection of Transformed Data Brench
PPT FOR IDBSDDS SCHEMES
PPT FOR IDBSDDS SCHEMES
IRJET- Secure Data Protection in Cloud Computing
IRJET- Secure Data Protection in Cloud Computing
Paper2
Paper2
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
OMG Data-Distribution Service Security
OMG Data-Distribution Service Security
Identity Based Secure Distributed Storage Scheme
Identity Based Secure Distributed Storage Scheme
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
Paper id 712019116
Paper id 712019116
IJSRED-V2I2P10
IJSRED-V2I2P10
Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
Achieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing report
Preventing Distributed Denial of Service Attacks in Cloud Environments
Preventing Distributed Denial of Service Attacks in Cloud Environments
Systematic Review Automation in Cyber Security
Systematic Review Automation in Cyber Security
Virtual Data Room Brochure
Virtual Data Room Brochure
Data Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud Application
710201940
710201940
Paper1
Paper1
Similar to IRJET- Document Management System, Open Source and Secure
IRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on Cloud
IRJET Journal
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
IRJET Journal
Cloud Storage System like Dropbox
Cloud Storage System like Dropbox
IRJET Journal
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key Exposure
IRJET Journal
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
IRJET Journal
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET Journal
IRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET Journal
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET Journal
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
IRJET Journal
IRJET- Protection of Personal Data on Distributed Cloud using Biometrics
IRJET- Protection of Personal Data on Distributed Cloud using Biometrics
IRJET Journal
AWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption System
IRJET Journal
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET Journal
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
IRJET Journal
IRJET - Virtual Data Auditing at Overcast Environment
IRJET - Virtual Data Auditing at Overcast Environment
IRJET Journal
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET Journal
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
IRJET Journal
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET Journal
IRJET- Highly Secure Data Chip for Highly Sensitive Data
IRJET- Highly Secure Data Chip for Highly Sensitive Data
IRJET Journal
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET Journal
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET Journal
Similar to IRJET- Document Management System, Open Source and Secure
(20)
IRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on Cloud
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
Cloud Storage System like Dropbox
Cloud Storage System like Dropbox
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key Exposure
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
IRJET- Protection of Personal Data on Distributed Cloud using Biometrics
IRJET- Protection of Personal Data on Distributed Cloud using Biometrics
AWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption System
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
IRJET - Virtual Data Auditing at Overcast Environment
IRJET - Virtual Data Auditing at Overcast Environment
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET- Highly Secure Data Chip for Highly Sensitive Data
IRJET- Highly Secure Data Chip for Highly Sensitive Data
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
pranjaldaimarysona
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Call Girls in Nagpur High Profile
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Dr.Costas Sachpazis
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
RajkumarAkumalla
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
Soham Mondal
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
upamatechverse
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
Asst.prof M.Gokilavani
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
slot gacor bisa pakai pulsa
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Dr.Costas Sachpazis
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
SIVASHANKAR N
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
rknatarajan
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
rakeshbaidya232001
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
Suhani Kapoor
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
ranjana rawat
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
rknatarajan
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
Recently uploaded
(20)
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
IRJET- Document Management System, Open Source and Secure
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3496 Document Management System, Open Source and Secure Shraddha More1, Snehal Pagare2, Shivani pawar3, Prof. S.K. Gondhalekar4 1,2,3,4UG Students, Computer Engineering Dept, KKWCOE & R,Nashik , Maharashtra, India 5Assistant Professor, Computer Engineering Dept, KKWCOE & R,Nashik , Maharashtra, India ----------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - : There are various documents that are generating on daily basis in fields like education, government sectors, medical etc. There are various applications available for storing and managing these generated documents. The data generated by these applications are large in amount. So it is necessary to buildthe system which will storethe dataoncloudand on standalone server. The proposed system will let the user to scan, upload or import documents to Document Management System. The system will facilitate compression without quality or data loss and provide authentication and authorization mechanism using OAuth2and two-factor authentication. System willstore the documents in PDF format at designated sever locations (cloud)andusercanviewdocumentswithinthe system i.e. in Web Application. It will categorize files based upon Date etc. Usercan share files using links with password protectionandlimitedtime access.Thesystem will use Tortoise CVS for version control of documents. It will track changes of each and every activity of logged in user.Our aim isto develop system forhealthcarepurpose toefficientlystoreandaccessdocuments,savingtimeand resources in open source environment where document security is important. Key Words: Index Terms—OAuth2, RSA algorithm, Tortoise CVS, Cloud, Open source. 1. INTRODUCTION The Open Source Document Management system (DMS) is a document management system for organizations forefficient managementofdocuments in their organization. Up till now,there has not been a proper solution for managing documents that is open source. Documents are still transferred from one department to another by physical means (such as pen-drives, compact disc or are mailed via some web services (Email, file sharing solutions etc.). Evenif the organization has a file-server and a Local Area Network setup, it still is not the most efficient way to manage the documents.Thus,therearisesaneedfora Document Management System for effective document management for various enterprises. Various software solutions like Domain, Share point (from Microsoft), Secure Doc came into existence to solve this need but they are not Open Source and Cost efficient. Thus, in our paper, we are designing and giving a layout ofa nefficient Document Management System as solution that addresses the needs of the organizations in today’s competitive world in a cost effective manner. The proposed Document management system will give user opportunity to retrieval documents and information fast and without wasting time. DMS have features like uploadingdocument inany format, storing,searching and retrieving it in PDF documents, as well as advanced features such asVersionandaccesscontrol. DMS help user to have a space for storing and sharing documents with other users in system using link password protection. The proposed DMS will provide Security by using O-Auth2 Authentication and authorization framework. The documents are stored incompressed format without losing datathussaving the space for storage. 1.1 ARCHITECTURE fig . System Architecture A. Java Development Toolkit The Java DevelopmentKit(JDK)isanimplementationon the Java Platform. The JDK has asitsprimarycomponentsas collection of java programming tools such as javac, java, applet etc.
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3497 B. Plug-in Development Environment The Plug-in Development Environment (PDE) provides tools to create, develop, test, debug, build and deploy plug- ins, fragments, features, updatesitesandRCPproducts.PDE also provides comprehensive OSGi tooling, which makes it an ideal environment for component programming. C. Client Platform Client able to upload, view, download documents. Whereas client is able to access his own platform only. D. User Management • OAuth2 : The O Auth version 2 protocols or framework allows third-party applications to grant limited accessto an HTTP service, either on behalf of a resourceowner or byallowing the third-party application to obtain access on its own behalf. • Version Control : Version control is the process by which different drafts and versions of a document or record are managed. Integrated Tortoise CVS will be used for version control. • Document Security: Stored files will encrypted and provide encryption in transit. Files to be encrypted with an RSA based 2048- bit key created through perfect forward secret key. • Document Compression: System will provide compression if size of documents exceeds than the limit of storage. System will achieve this without data as well as quality loss. • User Operations: – View: System will view uploaded PDF documents within the system. – Update: System will update documents if required. – Share: System will Share file using links with pass- word protection and limited time access • Admin Control Panel – Audit: Tracking changes of each and every activity of logged in user. – User rights: System will provide User rights to accessdocuments. • Cloud server Cloud is provided as physical or virtual infrastructure that per-forms application- and information- processing storage. • Database Server A database server houses a database application that provides database services to client. 2. SPECIAL SYSTEM FEATURES The core task of any Document Management System is the storage and retrieval of documents from one or various sources in a centralized manner. The DMS improves on this basic model by providing certain other features that are very important in today’s world A. Encrypted Document Transfer This feature allows the user to send their documents over to the main server for storage purposes in the organization. However, before the file can be transferred it must be encrypted for security purposes [5]. This is one of the most crucial functions of the system. The Document(s) chosen forthe transferarethemselvesencrypted usingRSA asymmetric encryption algorithm We shall elaborate on this below. 2.1. Rivest-Shamir-Adleman(RSA) Algorithm: The RSA cryptosystem is the most widely-used public key cryptography algorithm in the world. It can be used to encrypta message without the need toexchangeasecretkey separately. The RSA algorithm can be used for both public key encryption and digital signatures. Its security is based onthe difficulty of factoringlarge integers.Party Acansend an encrypted message to party B without any prior exchange ofsecret keys. A just usesB’spublickeytoencrypt the message and B decrypts it using the private key, which only he knows. RSA can also be used to sign a message, so A can sign a message using their privatekeyandBcanverify it using A’spublic key. Key Generation Algorithm: 1. Generate two large random primes, p and q, of approximately equal size such that their product n = pq is of the required bit length, e.g. 1024 bits. 2. Compute n = pq and = (p1) (q1). 3. Choose an integer e, 1¡e¡1¡e¡, such that gcd (e,)=1gcd(e,)=1. 4. Compute the secret exponent dd, 1¡d¡1¡d¡, such that ed1moded1mod. 4. The public key is (n,e) (n,e) and the private key (d,p,q) (d,p,q). Keep all the values d, p, q and secret. [Sometimes the private key is written as (n,d) (n,d) because you need the value of n when using d. Other times wemight writethe key pair as((N,e),d)((N,e),d). n is known as the modulus. e is known as the public exponent or encryption exponent or just the exponent. d is known as the secret exponent or decryption exponent
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3498 Encryption: Sender A does the following:- 1. Obtains the recipient B’s public key (n,e)(n,e). 2. Represents the plaintext message as a positive integer mm with 1¡m¡n1¡m¡n 3. Computes the ciphertext c= mem odn. 4. Sends the ciphertext c to B. Decryption: Recipient B does the following:- 1. Uses his private key (n,d)(n,d) to compute m=cd mod nm= cd mod n. 2. Extracts the plaintext from the message representative mm. B. Document (file) Compression This featureshall compress the size of the encryptedfile which resides over on the server. The encrypted file has a size that is larger than the plaintext file. Thus compression shall allow us to optimize the size of the encrypted document. C. File Versioning This featureof the systemkeepsthetrackoftheversions of a particular document over time. User viewing particular document may want to revert to a previous version of the same document. For this the server will keeps multiple copies of the same document on it. Fig shows the directory structure which provides the file versioning capability. Every Document has a hidden folder (in the same parent directory) of the same name. D. Searching Technique Every good Document ManagementSystemmustprovide a search feature that enables its users to quickly find a particular file kept in the system. So a general approach would be to keep all the file information (file name, location, user, etc in a table inside the backend Postgress SQL, whenever a user will search for a file, its entry would be checked in that table. And the file would be retrieved for the user, depending on relevance to the user that asked for it. 3. GENERAL SYSTEM REQUIREMENTS 1) Database Requirements: Postgress SQL 2) Software Requirements: 1. AngularJS , Jquery, Spring Boot Framework 2. Tortoise CVS version control 3. Spring Boot Framework 4. Operating System: Windows or Linux 3) Hardware Requirements: 1.Database Server 2. Cloud ADVANTAGES A. Reduced Storage Space Commercial property costs are increasing and so is theexpense to store paper documents. A software-based documentmanagementsystem(DMS)thatcanreducethe need forfilecabinets, boxes and storage bins isavaluable asset to any enterprise, freeing up precious office space. B. Enhanced Security Document security is vital to many enterprises. DMS provides better control oversensitive documents.Accessto documents can be controlled at the folder level for different groups or individuals. Also, a DMS leaves an audit trail of who has viewed a document,when itwasaccessed,andhow it may have been modified. Managed documents are highly traceable and can be tagged to allow for automated alerts. User posts a fresh version ofa particular file, the system not only replaces the old file but also places a copy of the file in the hidden folder associated with that particular file. The files inside the Hidden Folder maintain the versions of the file with the date of posting concatenated with the actual name of the file. C. Easier Retrieval Searching forand retrievingdocumentscanbeverytime consuming. A document management solution, specific for your enterprise, can be a powerful, time-saving tool. Depend- ing on the solution implemented, a DMS can retrieve files by a word or phrase in a document full text search, or DMScan apply index categories to a document or folder. Easier integration with business applications facilitates access to critical information. DMS also gives the opportunity to access documents remotely. As long as
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3499 there is internet connection, documents can be accessed from virtually anywhere. D. Better Collaboration With DMS, information sharing and collaborationcanbe a lot easier. Documents captured from differentsourcescan be accessed from multiple locations. Electronic imaging makes sharing documents over a network via email or the Internet possible.DMSprovidesgreatervisibilitytobusiness processes and can allow for better work-flow monitoring. Authorized access by external users can be allowed and monitored.DMS also offers VersionControlwhichallowsfor older versions of the same document to be recovered if needed. This feature is important if several parties work on the same document and there are changes made to a document that were not authorized or meant to happen. E. Better Backup and Disaster Recovery Any document management solution should include a data backup and disaster recovery plan. With a DMS, documents are highly traceable and can be tracked withina range of criteria. Also, because imaged documents are centrally stored they cannot be lost or misplaced after viewing. Documents are less likely to be misfiled, and if so they areeasiertolocatewithcross-indexing.Documentscan be digitized and archived at their point of entry into the system. 4. CONCLUSION AND FUTURE WORK The proposed system i.eDMSensuresthatdocumentsissafe, accurate, and securely accessible. It will works as an open source System that stores and manage documents of users. System will provide version control, authentication mechanism, security mechanism, compression functionality to users. In future we can develop same type of System for Android and IOS users. REFERENCES 1. V. L. Orlov, E. A. Kurako Electronic document management systems and distributed large- scale systems, published in 16 November 2017 on IEEE Explorer.. 2. Sengol mary J, Usha S WEB BASED DOCUMENT MANAGEMENT SYSTEMS IN LIFE SCIENCE ORGANIZATION, published in 19 April 2016 on IEEE Explorer. 3. Tongjin Lee, Jun Iio Document Management System Based on ISAD(G), ,published in 10 December 2015 on IEEE Explorer. 4. Yeong-Tae Song, Sungchul HonJ, Jinie Pak Empowering Patients using Cloud Based Personal Health Record System, publishedin 06 August 2015 on IEEE Explorer. 5. Hediyeh Baban,Salimah Mokhtar An Enhanced Document Management System for SME, published in 20 August 2012 on IEEE Explorer. 6. Hediyeh Baban, Salimah Mokhtar Online Document Management Sys- tem for Academic Institutes, published in 20 January2011onIEEE Explorer.. 7. Mohamed Amin Sakkar, Bruno Defude, and Jorge Tellez EDocument Provenance in the Cloud: Constraints and Challenges, published in 10 october 2010 on IEEE Explorer. 8. Kyrene G. Alberto, Camille M. Abella, Ma. Gracia Corazon E. Sicat, Jasmin D. Niguidula , Jonathan M. Caballero Compiling Remote Files:Redefining Electronic Document Management System Infrastructure (CReED), published in 15 January 2010 on IEEE Explorer. 9. Hu Ye, Hu Tao Secure documents management in supply chain system, published in 22 April 2003 on IEEE Explorer. 10. Changtao Qu, Thomas Engel, Christoph Meinel Implementation Of A Document Management System Based On WEBDAV Protocol, pub- lished in 06 August 2002 on IEEE Explorer.
Download now