SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3496
Document Management System, Open Source and Secure
Shraddha More1, Snehal Pagare2, Shivani pawar3, Prof. S.K. Gondhalekar4
1,2,3,4UG Students, Computer Engineering Dept, KKWCOE & R,Nashik , Maharashtra, India
5Assistant Professor, Computer Engineering Dept, KKWCOE & R,Nashik , Maharashtra, India
----------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - : There are various documents that are
generating on daily basis in fields like education,
government sectors, medical etc. There are various
applications available for storing and managing these
generated documents. The data generated by these
applications are large in amount. So it is necessary to
buildthe system which will storethe dataoncloudand on
standalone server. The proposed system will let the user
to scan, upload or import documents to Document
Management System. The system will facilitate
compression without quality or data loss and provide
authentication and authorization mechanism using
OAuth2and two-factor authentication. System willstore
the documents in PDF format at designated sever
locations (cloud)andusercanviewdocumentswithinthe
system i.e. in Web Application. It will categorize files
based upon Date etc. Usercan share files using links with
password protectionandlimitedtime access.Thesystem
will use Tortoise CVS for version control of documents. It
will track changes of each and every activity of logged in
user.Our aim isto develop system forhealthcarepurpose
toefficientlystoreandaccessdocuments,savingtimeand
resources in open source environment where document
security is important.
Key Words: Index Terms—OAuth2, RSA
algorithm, Tortoise CVS, Cloud, Open source.
1. INTRODUCTION
The Open Source Document Management system
(DMS) is a document management system for
organizations forefficient managementofdocuments
in their organization. Up till now,there has not been a
proper solution for managing documents that is open
source. Documents are still transferred from one
department to another by physical means (such as
pen-drives, compact disc or are mailed via some web
services (Email, file sharing solutions etc.). Evenif the
organization has a file-server and a Local Area
Network setup, it still is not the most efficient way to
manage the documents.Thus,therearisesaneedfora
Document Management System for effective
document management for various enterprises.
Various software solutions like Domain, Share point
(from Microsoft), Secure Doc came into existence to
solve this need but they are not Open Source and Cost
efficient. Thus, in our paper, we are designing and
giving a layout ofa nefficient Document Management
System as solution that addresses the needs of the
organizations in today’s competitive world in a cost
effective manner. The proposed Document
management system will give user opportunity to
retrieval documents and information fast and
without wasting time. DMS have features like
uploadingdocument inany format, storing,searching
and retrieving it in PDF documents, as well as
advanced features such asVersionandaccesscontrol.
DMS help user to have a space for storing and sharing
documents with other users in system using link
password protection. The proposed DMS will provide
Security by using O-Auth2 Authentication and
authorization framework. The documents are stored
incompressed format without losing datathussaving
the space for storage.
1.1 ARCHITECTURE
fig . System Architecture
A. Java Development Toolkit
The Java DevelopmentKit(JDK)isanimplementationon
the Java Platform. The JDK has asitsprimarycomponentsas
collection of java programming tools such as javac, java,
applet etc.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3497
B. Plug-in Development Environment
The Plug-in Development Environment (PDE) provides
tools to create, develop, test, debug, build and deploy plug-
ins, fragments, features, updatesitesandRCPproducts.PDE
also provides comprehensive OSGi tooling, which makes it
an ideal environment for component programming.
C. Client Platform
Client able to upload, view, download documents.
Whereas client is able to access his own platform only.
D. User Management
• OAuth2 :
The O Auth version 2 protocols or framework allows
third-party applications to grant limited accessto an HTTP
service, either on behalf of a resourceowner or byallowing
the third-party application to obtain access on its own
behalf.
• Version Control :
Version control is the process by which different drafts
and versions of a document or record are managed.
Integrated Tortoise CVS will be used for version control.
• Document Security:
Stored files will encrypted and provide encryption in
transit. Files to be encrypted with an RSA based 2048- bit
key created through perfect forward secret key.
• Document Compression:
System will provide compression if size of documents
exceeds than the limit of storage. System will achieve this
without data as well as quality loss.
• User Operations:
– View: System will view uploaded PDF
documents within the system.
– Update: System will update documents if
required.
– Share: System will Share file using links with
pass- word protection and limited time access
• Admin Control Panel
– Audit: Tracking changes of each and every
activity of logged in user.
– User rights: System will provide User rights to
accessdocuments.
• Cloud server Cloud is provided as physical or
virtual infrastructure that per-forms application-
and information- processing storage.
• Database Server A database server houses a
database application that provides database
services to client.
2. SPECIAL SYSTEM FEATURES
The core task of any Document Management System is
the storage and retrieval of documents from one or various
sources in a centralized manner. The DMS improves on this
basic model by providing certain other features that are
very important in today’s world
A. Encrypted Document Transfer
This feature allows the user to send their documents
over to the main server for storage purposes in the
organization. However, before the file can be transferred it
must be encrypted for security purposes [5]. This is one of
the most crucial functions of the system. The Document(s)
chosen forthe transferarethemselvesencrypted usingRSA
asymmetric encryption algorithm
We shall elaborate on this below.
2.1. Rivest-Shamir-Adleman(RSA) Algorithm:
The RSA cryptosystem is the most widely-used public
key cryptography algorithm in the world. It can be used to
encrypta message without the need toexchangeasecretkey
separately. The RSA algorithm can be used for both public
key encryption and digital signatures. Its security is based
onthe difficulty of factoringlarge integers.Party Acansend
an encrypted message to party B without any prior
exchange ofsecret keys. A just usesB’spublickeytoencrypt
the message and B decrypts it using the private key, which
only he knows. RSA can also be used to sign a message, so
A can sign a message using their privatekeyandBcanverify
it using A’spublic key.
Key Generation Algorithm:
1. Generate two large random primes, p and q, of
approximately equal size such that their product n =
pq is of the required bit length, e.g. 1024 bits.
2. Compute n = pq and = (p1) (q1).
3. Choose an integer e, 1¡e¡1¡e¡, such that
gcd (e,)=1gcd(e,)=1. 4. Compute the
secret exponent dd, 1¡d¡1¡d¡, such that
ed1moded1mod.
4. The public key is (n,e) (n,e) and the private key (d,p,q)
(d,p,q). Keep all the values d, p, q and secret.
[Sometimes the private key is written as (n,d) (n,d)
because you need the value of n when using d. Other
times wemight writethe key pair as((N,e),d)((N,e),d).
n is known as the modulus.
e is known as the public exponent or encryption
exponent or just the exponent.
d is known as the secret exponent or decryption
exponent
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3498
Encryption: Sender A does the following:-
1. Obtains the recipient B’s public key (n,e)(n,e).
2. Represents the plaintext message as a positive
integer mm with 1¡m¡n1¡m¡n
3. Computes the ciphertext c= mem odn.
4. Sends the ciphertext c to B.
Decryption: Recipient B does the following:-
1. Uses his private key (n,d)(n,d) to compute m=cd
mod nm= cd mod n.
2. Extracts the plaintext from the message
representative mm.
B. Document (file) Compression
This featureshall compress the size of the encryptedfile
which resides over on the server. The encrypted file has a
size that is larger than the plaintext file. Thus compression
shall allow us to optimize the size of the encrypted
document.
C. File Versioning
This featureof the systemkeepsthetrackoftheversions
of a particular document over time. User viewing particular
document may want to revert to a previous version of the
same document. For this the server will keeps multiple
copies of the same document on it.
Fig shows the directory structure which provides the
file versioning capability. Every Document has a hidden
folder (in the same parent directory) of the same name.
D. Searching Technique
Every good Document ManagementSystemmustprovide
a search feature that enables its users to quickly find a
particular file kept in the system. So a general approach
would be to keep all the file information (file name, location,
user, etc in a table inside the backend Postgress SQL,
whenever a user will search for a file, its entry would be
checked in that table. And the file would be retrieved for the
user, depending on relevance to the user that asked for it.
3. GENERAL SYSTEM REQUIREMENTS
1) Database Requirements: Postgress SQL
2) Software Requirements:
1. AngularJS , Jquery, Spring
Boot Framework
2. Tortoise CVS version control
3. Spring Boot Framework
4. Operating System: Windows
or Linux
3) Hardware Requirements: 1.Database Server
2. Cloud
ADVANTAGES
A. Reduced Storage Space
Commercial property costs are increasing and so is
theexpense to store paper documents. A software-based
documentmanagementsystem(DMS)thatcanreducethe
need forfilecabinets, boxes and storage bins isavaluable
asset to any enterprise, freeing up precious office space.
B. Enhanced Security
Document security is vital to many enterprises. DMS
provides better control oversensitive documents.Accessto
documents can be controlled at the folder level for different
groups or individuals. Also, a DMS leaves an audit trail of
who has viewed a document,when itwasaccessed,andhow
it may have been modified. Managed documents are highly
traceable and can be tagged to allow for automated alerts.
User posts a fresh version ofa particular file, the system not
only replaces the old file but also places a copy of the file in
the hidden folder associated with that particular file. The
files inside the Hidden Folder maintain the versions of the
file with the date of posting concatenated with the actual
name of the file.
C. Easier Retrieval
Searching forand retrievingdocumentscanbeverytime
consuming. A document management solution, specific for
your enterprise, can be a powerful, time-saving tool.
Depend- ing on the solution implemented, a DMS can
retrieve files by a word or phrase in a document full text
search, or DMScan apply index categories to a document
or folder. Easier integration with business applications
facilitates access to critical information. DMS also gives
the opportunity to access documents remotely. As long as
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3499
there is internet connection, documents can be accessed
from virtually anywhere.
D. Better Collaboration
With DMS, information sharing and collaborationcanbe
a lot easier. Documents captured from differentsourcescan
be accessed from multiple locations. Electronic imaging
makes sharing documents over a network via email or the
Internet possible.DMSprovidesgreatervisibilitytobusiness
processes and can allow for better work-flow monitoring.
Authorized access by external users can be allowed and
monitored.DMS also offers VersionControlwhichallowsfor
older versions of the same document to be recovered if
needed. This feature is important if several parties work on
the same document and there are changes made to a
document that were not authorized or meant to happen.
E. Better Backup and Disaster Recovery
Any document management solution should include a
data backup and disaster recovery plan. With a DMS,
documents are highly traceable and can be tracked withina
range of criteria. Also, because imaged documents are
centrally stored they cannot be lost or misplaced after
viewing. Documents are less likely to be misfiled, and if so
they areeasiertolocatewithcross-indexing.Documentscan
be digitized and archived at their point of entry into the
system.
4. CONCLUSION AND FUTURE WORK
The proposed system i.eDMSensuresthatdocumentsissafe,
accurate, and securely accessible. It will works as an open
source System that stores and manage documents of users.
System will provide version control, authentication
mechanism, security mechanism, compression functionality
to users. In future we can develop same type of System for
Android and IOS users.
REFERENCES
1. V. L. Orlov, E. A. Kurako Electronic document
management systems and distributed large-
scale systems, published in 16 November 2017
on IEEE Explorer..
2. Sengol mary J, Usha S WEB BASED DOCUMENT
MANAGEMENT SYSTEMS IN LIFE SCIENCE
ORGANIZATION, published in 19 April 2016 on
IEEE Explorer.
3. Tongjin Lee, Jun Iio Document Management
System Based on ISAD(G), ,published in 10
December 2015 on IEEE Explorer.
4. Yeong-Tae Song, Sungchul HonJ, Jinie Pak
Empowering Patients using Cloud Based
Personal Health Record System, publishedin 06
August 2015 on IEEE Explorer.
5. Hediyeh Baban,Salimah Mokhtar An Enhanced
Document Management System for SME,
published in 20 August 2012 on IEEE Explorer.
6. Hediyeh Baban, Salimah Mokhtar Online
Document Management Sys- tem for Academic
Institutes, published in 20 January2011onIEEE
Explorer..
7. Mohamed Amin Sakkar, Bruno Defude, and Jorge
Tellez EDocument Provenance in the Cloud:
Constraints and Challenges, published in 10
october 2010 on IEEE Explorer.
8. Kyrene G. Alberto, Camille M. Abella, Ma. Gracia
Corazon E. Sicat, Jasmin D. Niguidula , Jonathan
M. Caballero Compiling Remote Files:Redefining
Electronic Document Management System
Infrastructure (CReED), published in 15 January
2010 on IEEE Explorer.
9. Hu Ye, Hu Tao Secure documents management in
supply chain system, published in 22 April 2003
on IEEE Explorer.
10. Changtao Qu, Thomas Engel, Christoph
Meinel Implementation Of A Document
Management System Based On WEBDAV
Protocol, pub- lished in 06 August 2002 on IEEE
Explorer.

More Related Content

What's hot

Prompt Detection of Transformed Data Brench
Prompt Detection of Transformed Data BrenchPrompt Detection of Transformed Data Brench
Prompt Detection of Transformed Data BrenchIRJET Journal
 
IRJET- Secure Data Protection in Cloud Computing
IRJET-  	  Secure Data Protection in Cloud ComputingIRJET-  	  Secure Data Protection in Cloud Computing
IRJET- Secure Data Protection in Cloud ComputingIRJET Journal
 
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...IRJET Journal
 
Identity Based Secure Distributed Storage Scheme
Identity Based Secure Distributed Storage SchemeIdentity Based Secure Distributed Storage Scheme
Identity Based Secure Distributed Storage SchemeVenkatesh Devam ☁
 
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud MembersAn Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud MembersIRJET Journal
 
Paper id 712019116
Paper id 712019116Paper id 712019116
Paper id 712019116IJRAT
 
IJSRED-V2I2P10
IJSRED-V2I2P10IJSRED-V2I2P10
IJSRED-V2I2P10IJSRED
 
Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...eSAT Publishing House
 
Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...eSAT Journals
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesIRJET Journal
 
Achieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing reportAchieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing reportKiran Girase
 
Preventing Distributed Denial of Service Attacks in Cloud Environments
Preventing Distributed Denial of Service Attacks in Cloud Environments Preventing Distributed Denial of Service Attacks in Cloud Environments
Preventing Distributed Denial of Service Attacks in Cloud Environments IJITCA Journal
 
Systematic Review Automation in Cyber Security
Systematic Review Automation in Cyber SecuritySystematic Review Automation in Cyber Security
Systematic Review Automation in Cyber SecurityYogeshIJTSRD
 
Virtual Data Room Brochure
Virtual Data Room BrochureVirtual Data Room Brochure
Virtual Data Room Brochurefranciscolorca
 
Data Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud ApplicationData Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud ApplicationIJSRD
 
710201940
710201940710201940
710201940IJRAT
 

What's hot (20)

Prompt Detection of Transformed Data Brench
Prompt Detection of Transformed Data BrenchPrompt Detection of Transformed Data Brench
Prompt Detection of Transformed Data Brench
 
PPT FOR IDBSDDS SCHEMES
PPT FOR IDBSDDS SCHEMESPPT FOR IDBSDDS SCHEMES
PPT FOR IDBSDDS SCHEMES
 
IRJET- Secure Data Protection in Cloud Computing
IRJET-  	  Secure Data Protection in Cloud ComputingIRJET-  	  Secure Data Protection in Cloud Computing
IRJET- Secure Data Protection in Cloud Computing
 
Paper2
Paper2Paper2
Paper2
 
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
 
OMG Data-Distribution Service Security
OMG Data-Distribution Service SecurityOMG Data-Distribution Service Security
OMG Data-Distribution Service Security
 
Identity Based Secure Distributed Storage Scheme
Identity Based Secure Distributed Storage SchemeIdentity Based Secure Distributed Storage Scheme
Identity Based Secure Distributed Storage Scheme
 
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud MembersAn Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
 
Paper id 712019116
Paper id 712019116Paper id 712019116
Paper id 712019116
 
IJSRED-V2I2P10
IJSRED-V2I2P10IJSRED-V2I2P10
IJSRED-V2I2P10
 
Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...
 
Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
 
Achieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing reportAchieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing report
 
Preventing Distributed Denial of Service Attacks in Cloud Environments
Preventing Distributed Denial of Service Attacks in Cloud Environments Preventing Distributed Denial of Service Attacks in Cloud Environments
Preventing Distributed Denial of Service Attacks in Cloud Environments
 
Systematic Review Automation in Cyber Security
Systematic Review Automation in Cyber SecuritySystematic Review Automation in Cyber Security
Systematic Review Automation in Cyber Security
 
Virtual Data Room Brochure
Virtual Data Room BrochureVirtual Data Room Brochure
Virtual Data Room Brochure
 
Data Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud ApplicationData Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud Application
 
710201940
710201940710201940
710201940
 
Paper1
Paper1Paper1
Paper1
 

Similar to IRJET- Document Management System, Open Source and Secure

IRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on CloudIRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on CloudIRJET Journal
 
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...IRJET Journal
 
Cloud Storage System like Dropbox
Cloud Storage System like DropboxCloud Storage System like Dropbox
Cloud Storage System like DropboxIRJET Journal
 
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET Journal
 
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud DataA Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud DataIRJET Journal
 
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud SystemsIRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud SystemsIRJET Journal
 
IRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET-Using Downtoken Secure Group Data Sharing on CloudIRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET-Using Downtoken Secure Group Data Sharing on CloudIRJET Journal
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...IRJET Journal
 
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDSDATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDSIRJET Journal
 
IRJET- Protection of Personal Data on Distributed Cloud using Biometrics
IRJET- Protection of Personal Data on Distributed Cloud using BiometricsIRJET- Protection of Personal Data on Distributed Cloud using Biometrics
IRJET- Protection of Personal Data on Distributed Cloud using BiometricsIRJET Journal
 
AWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption SystemAWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption SystemIRJET Journal
 
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET Journal
 
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingIRJET Journal
 
IRJET - Virtual Data Auditing at Overcast Environment
IRJET - Virtual Data Auditing at Overcast EnvironmentIRJET - Virtual Data Auditing at Overcast Environment
IRJET - Virtual Data Auditing at Overcast EnvironmentIRJET Journal
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET Journal
 
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...IRJET Journal
 
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET-  	  Privacy Preserving Encrypted Keyword Search SchemesIRJET-  	  Privacy Preserving Encrypted Keyword Search Schemes
IRJET- Privacy Preserving Encrypted Keyword Search SchemesIRJET Journal
 
IRJET- Highly Secure Data Chip for Highly Sensitive Data
IRJET- Highly Secure Data Chip for Highly Sensitive DataIRJET- Highly Secure Data Chip for Highly Sensitive Data
IRJET- Highly Secure Data Chip for Highly Sensitive DataIRJET Journal
 
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET-  	  Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET-  	  Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET Journal
 
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET Journal
 

Similar to IRJET- Document Management System, Open Source and Secure (20)

IRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on CloudIRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on Cloud
 
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
 
Cloud Storage System like Dropbox
Cloud Storage System like DropboxCloud Storage System like Dropbox
Cloud Storage System like Dropbox
 
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key Exposure
 
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud DataA Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
 
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud SystemsIRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
 
IRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET-Using Downtoken Secure Group Data Sharing on CloudIRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET-Using Downtoken Secure Group Data Sharing on Cloud
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
 
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDSDATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
 
IRJET- Protection of Personal Data on Distributed Cloud using Biometrics
IRJET- Protection of Personal Data on Distributed Cloud using BiometricsIRJET- Protection of Personal Data on Distributed Cloud using Biometrics
IRJET- Protection of Personal Data on Distributed Cloud using Biometrics
 
AWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption SystemAWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption System
 
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
 
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
 
IRJET - Virtual Data Auditing at Overcast Environment
IRJET - Virtual Data Auditing at Overcast EnvironmentIRJET - Virtual Data Auditing at Overcast Environment
IRJET - Virtual Data Auditing at Overcast Environment
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
 
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
 
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET-  	  Privacy Preserving Encrypted Keyword Search SchemesIRJET-  	  Privacy Preserving Encrypted Keyword Search Schemes
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
 
IRJET- Highly Secure Data Chip for Highly Sensitive Data
IRJET- Highly Secure Data Chip for Highly Sensitive DataIRJET- Highly Secure Data Chip for Highly Sensitive Data
IRJET- Highly Secure Data Chip for Highly Sensitive Data
 
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET-  	  Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET-  	  Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
 
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 

Recently uploaded (20)

Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 

IRJET- Document Management System, Open Source and Secure

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3496 Document Management System, Open Source and Secure Shraddha More1, Snehal Pagare2, Shivani pawar3, Prof. S.K. Gondhalekar4 1,2,3,4UG Students, Computer Engineering Dept, KKWCOE & R,Nashik , Maharashtra, India 5Assistant Professor, Computer Engineering Dept, KKWCOE & R,Nashik , Maharashtra, India ----------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - : There are various documents that are generating on daily basis in fields like education, government sectors, medical etc. There are various applications available for storing and managing these generated documents. The data generated by these applications are large in amount. So it is necessary to buildthe system which will storethe dataoncloudand on standalone server. The proposed system will let the user to scan, upload or import documents to Document Management System. The system will facilitate compression without quality or data loss and provide authentication and authorization mechanism using OAuth2and two-factor authentication. System willstore the documents in PDF format at designated sever locations (cloud)andusercanviewdocumentswithinthe system i.e. in Web Application. It will categorize files based upon Date etc. Usercan share files using links with password protectionandlimitedtime access.Thesystem will use Tortoise CVS for version control of documents. It will track changes of each and every activity of logged in user.Our aim isto develop system forhealthcarepurpose toefficientlystoreandaccessdocuments,savingtimeand resources in open source environment where document security is important. Key Words: Index Terms—OAuth2, RSA algorithm, Tortoise CVS, Cloud, Open source. 1. INTRODUCTION The Open Source Document Management system (DMS) is a document management system for organizations forefficient managementofdocuments in their organization. Up till now,there has not been a proper solution for managing documents that is open source. Documents are still transferred from one department to another by physical means (such as pen-drives, compact disc or are mailed via some web services (Email, file sharing solutions etc.). Evenif the organization has a file-server and a Local Area Network setup, it still is not the most efficient way to manage the documents.Thus,therearisesaneedfora Document Management System for effective document management for various enterprises. Various software solutions like Domain, Share point (from Microsoft), Secure Doc came into existence to solve this need but they are not Open Source and Cost efficient. Thus, in our paper, we are designing and giving a layout ofa nefficient Document Management System as solution that addresses the needs of the organizations in today’s competitive world in a cost effective manner. The proposed Document management system will give user opportunity to retrieval documents and information fast and without wasting time. DMS have features like uploadingdocument inany format, storing,searching and retrieving it in PDF documents, as well as advanced features such asVersionandaccesscontrol. DMS help user to have a space for storing and sharing documents with other users in system using link password protection. The proposed DMS will provide Security by using O-Auth2 Authentication and authorization framework. The documents are stored incompressed format without losing datathussaving the space for storage. 1.1 ARCHITECTURE fig . System Architecture A. Java Development Toolkit The Java DevelopmentKit(JDK)isanimplementationon the Java Platform. The JDK has asitsprimarycomponentsas collection of java programming tools such as javac, java, applet etc.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3497 B. Plug-in Development Environment The Plug-in Development Environment (PDE) provides tools to create, develop, test, debug, build and deploy plug- ins, fragments, features, updatesitesandRCPproducts.PDE also provides comprehensive OSGi tooling, which makes it an ideal environment for component programming. C. Client Platform Client able to upload, view, download documents. Whereas client is able to access his own platform only. D. User Management • OAuth2 : The O Auth version 2 protocols or framework allows third-party applications to grant limited accessto an HTTP service, either on behalf of a resourceowner or byallowing the third-party application to obtain access on its own behalf. • Version Control : Version control is the process by which different drafts and versions of a document or record are managed. Integrated Tortoise CVS will be used for version control. • Document Security: Stored files will encrypted and provide encryption in transit. Files to be encrypted with an RSA based 2048- bit key created through perfect forward secret key. • Document Compression: System will provide compression if size of documents exceeds than the limit of storage. System will achieve this without data as well as quality loss. • User Operations: – View: System will view uploaded PDF documents within the system. – Update: System will update documents if required. – Share: System will Share file using links with pass- word protection and limited time access • Admin Control Panel – Audit: Tracking changes of each and every activity of logged in user. – User rights: System will provide User rights to accessdocuments. • Cloud server Cloud is provided as physical or virtual infrastructure that per-forms application- and information- processing storage. • Database Server A database server houses a database application that provides database services to client. 2. SPECIAL SYSTEM FEATURES The core task of any Document Management System is the storage and retrieval of documents from one or various sources in a centralized manner. The DMS improves on this basic model by providing certain other features that are very important in today’s world A. Encrypted Document Transfer This feature allows the user to send their documents over to the main server for storage purposes in the organization. However, before the file can be transferred it must be encrypted for security purposes [5]. This is one of the most crucial functions of the system. The Document(s) chosen forthe transferarethemselvesencrypted usingRSA asymmetric encryption algorithm We shall elaborate on this below. 2.1. Rivest-Shamir-Adleman(RSA) Algorithm: The RSA cryptosystem is the most widely-used public key cryptography algorithm in the world. It can be used to encrypta message without the need toexchangeasecretkey separately. The RSA algorithm can be used for both public key encryption and digital signatures. Its security is based onthe difficulty of factoringlarge integers.Party Acansend an encrypted message to party B without any prior exchange ofsecret keys. A just usesB’spublickeytoencrypt the message and B decrypts it using the private key, which only he knows. RSA can also be used to sign a message, so A can sign a message using their privatekeyandBcanverify it using A’spublic key. Key Generation Algorithm: 1. Generate two large random primes, p and q, of approximately equal size such that their product n = pq is of the required bit length, e.g. 1024 bits. 2. Compute n = pq and = (p1) (q1). 3. Choose an integer e, 1¡e¡1¡e¡, such that gcd (e,)=1gcd(e,)=1. 4. Compute the secret exponent dd, 1¡d¡1¡d¡, such that ed1moded1mod. 4. The public key is (n,e) (n,e) and the private key (d,p,q) (d,p,q). Keep all the values d, p, q and secret. [Sometimes the private key is written as (n,d) (n,d) because you need the value of n when using d. Other times wemight writethe key pair as((N,e),d)((N,e),d). n is known as the modulus. e is known as the public exponent or encryption exponent or just the exponent. d is known as the secret exponent or decryption exponent
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3498 Encryption: Sender A does the following:- 1. Obtains the recipient B’s public key (n,e)(n,e). 2. Represents the plaintext message as a positive integer mm with 1¡m¡n1¡m¡n 3. Computes the ciphertext c= mem odn. 4. Sends the ciphertext c to B. Decryption: Recipient B does the following:- 1. Uses his private key (n,d)(n,d) to compute m=cd mod nm= cd mod n. 2. Extracts the plaintext from the message representative mm. B. Document (file) Compression This featureshall compress the size of the encryptedfile which resides over on the server. The encrypted file has a size that is larger than the plaintext file. Thus compression shall allow us to optimize the size of the encrypted document. C. File Versioning This featureof the systemkeepsthetrackoftheversions of a particular document over time. User viewing particular document may want to revert to a previous version of the same document. For this the server will keeps multiple copies of the same document on it. Fig shows the directory structure which provides the file versioning capability. Every Document has a hidden folder (in the same parent directory) of the same name. D. Searching Technique Every good Document ManagementSystemmustprovide a search feature that enables its users to quickly find a particular file kept in the system. So a general approach would be to keep all the file information (file name, location, user, etc in a table inside the backend Postgress SQL, whenever a user will search for a file, its entry would be checked in that table. And the file would be retrieved for the user, depending on relevance to the user that asked for it. 3. GENERAL SYSTEM REQUIREMENTS 1) Database Requirements: Postgress SQL 2) Software Requirements: 1. AngularJS , Jquery, Spring Boot Framework 2. Tortoise CVS version control 3. Spring Boot Framework 4. Operating System: Windows or Linux 3) Hardware Requirements: 1.Database Server 2. Cloud ADVANTAGES A. Reduced Storage Space Commercial property costs are increasing and so is theexpense to store paper documents. A software-based documentmanagementsystem(DMS)thatcanreducethe need forfilecabinets, boxes and storage bins isavaluable asset to any enterprise, freeing up precious office space. B. Enhanced Security Document security is vital to many enterprises. DMS provides better control oversensitive documents.Accessto documents can be controlled at the folder level for different groups or individuals. Also, a DMS leaves an audit trail of who has viewed a document,when itwasaccessed,andhow it may have been modified. Managed documents are highly traceable and can be tagged to allow for automated alerts. User posts a fresh version ofa particular file, the system not only replaces the old file but also places a copy of the file in the hidden folder associated with that particular file. The files inside the Hidden Folder maintain the versions of the file with the date of posting concatenated with the actual name of the file. C. Easier Retrieval Searching forand retrievingdocumentscanbeverytime consuming. A document management solution, specific for your enterprise, can be a powerful, time-saving tool. Depend- ing on the solution implemented, a DMS can retrieve files by a word or phrase in a document full text search, or DMScan apply index categories to a document or folder. Easier integration with business applications facilitates access to critical information. DMS also gives the opportunity to access documents remotely. As long as
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3499 there is internet connection, documents can be accessed from virtually anywhere. D. Better Collaboration With DMS, information sharing and collaborationcanbe a lot easier. Documents captured from differentsourcescan be accessed from multiple locations. Electronic imaging makes sharing documents over a network via email or the Internet possible.DMSprovidesgreatervisibilitytobusiness processes and can allow for better work-flow monitoring. Authorized access by external users can be allowed and monitored.DMS also offers VersionControlwhichallowsfor older versions of the same document to be recovered if needed. This feature is important if several parties work on the same document and there are changes made to a document that were not authorized or meant to happen. E. Better Backup and Disaster Recovery Any document management solution should include a data backup and disaster recovery plan. With a DMS, documents are highly traceable and can be tracked withina range of criteria. Also, because imaged documents are centrally stored they cannot be lost or misplaced after viewing. Documents are less likely to be misfiled, and if so they areeasiertolocatewithcross-indexing.Documentscan be digitized and archived at their point of entry into the system. 4. CONCLUSION AND FUTURE WORK The proposed system i.eDMSensuresthatdocumentsissafe, accurate, and securely accessible. It will works as an open source System that stores and manage documents of users. System will provide version control, authentication mechanism, security mechanism, compression functionality to users. In future we can develop same type of System for Android and IOS users. REFERENCES 1. V. L. Orlov, E. A. Kurako Electronic document management systems and distributed large- scale systems, published in 16 November 2017 on IEEE Explorer.. 2. Sengol mary J, Usha S WEB BASED DOCUMENT MANAGEMENT SYSTEMS IN LIFE SCIENCE ORGANIZATION, published in 19 April 2016 on IEEE Explorer. 3. Tongjin Lee, Jun Iio Document Management System Based on ISAD(G), ,published in 10 December 2015 on IEEE Explorer. 4. Yeong-Tae Song, Sungchul HonJ, Jinie Pak Empowering Patients using Cloud Based Personal Health Record System, publishedin 06 August 2015 on IEEE Explorer. 5. Hediyeh Baban,Salimah Mokhtar An Enhanced Document Management System for SME, published in 20 August 2012 on IEEE Explorer. 6. Hediyeh Baban, Salimah Mokhtar Online Document Management Sys- tem for Academic Institutes, published in 20 January2011onIEEE Explorer.. 7. Mohamed Amin Sakkar, Bruno Defude, and Jorge Tellez EDocument Provenance in the Cloud: Constraints and Challenges, published in 10 october 2010 on IEEE Explorer. 8. Kyrene G. Alberto, Camille M. Abella, Ma. Gracia Corazon E. Sicat, Jasmin D. Niguidula , Jonathan M. Caballero Compiling Remote Files:Redefining Electronic Document Management System Infrastructure (CReED), published in 15 January 2010 on IEEE Explorer. 9. Hu Ye, Hu Tao Secure documents management in supply chain system, published in 22 April 2003 on IEEE Explorer. 10. Changtao Qu, Thomas Engel, Christoph Meinel Implementation Of A Document Management System Based On WEBDAV Protocol, pub- lished in 06 August 2002 on IEEE Explorer.