File Transfer using Cryptography Techniques
ABSTRACT
In this project we are conducting the investigation studies over the IT auditing for
assuming the security for cloud computing. During this investigation, we are
implementing working of IT auditing mechanism over the cloud computing framework in
order to assure the desire level of security. In the IT auditing mechanism, the concept of
checklists are prepared for the cloud computing application and their lifecycle. Those
checklists are prepared on the basis of models of cloud computing such as deployment
models and services models. With this project our main concern is to present the cloud
computing implications for large enterprise applications like Customer Relationship
Management and achieving the desired level of security with design and implementation
of IT auditing technique. As results from practical investigation of IT auditing over the
cloud computing framework, we claim that IT auditing assuring the desired level of
security, regulations, compliance for the enterprise applications like Customer
Relationship Management.
EXISTING SYSTEM:
Here the customer sending file information is stored in the encrypted format in
database. Then the user can be decrypted to download the file from database, it is
only possible for authorized user.
PROPOSED SYSTEM:
In the Encryption technique, if new user is to send the file with the private
key, in this file is saved in encrypted format in table. So this private information
is not known to any other user .so it is better security to our application.
Also we have provided the decryption technique for the user to read the
information is correct or not by showing it on below the encryption table. This
data is known to only that user which is login.
MODULE
1. Encryption Module
2. Decryption Module
Module 1: Encryption Module
The user to send the file in encrypted format using RSA algorithm and then
that file is stored in our database with unique private key and public key. Then
the authorized download user only to view that private key after to access that file
using the private key.
Module 2: Decryption Module
This module is used to download the file in plain text format using
cryptography techniques. The sender, send the private key to the receiver, when
the receivers to enter the public key that time to display our private key to the
receiver.
SYSTEM REQUIREMENTS
Hardware Requirements:
Processor : Intel Duel Core.
Hard Disk : 60 GB.
Floppy Drive : 1.44 Mb.
Monitor : LCD Colour.
Mouse : Optical Mouse.
RAM : 512 Mb.
Software Requirements:
Operating system : Windows XP.
Coding Language : ASP.Net with C# (SP1)
Data Base : SQL Server 2005

File transfer using cryptography techniques

  • 1.
    File Transfer usingCryptography Techniques ABSTRACT In this project we are conducting the investigation studies over the IT auditing for assuming the security for cloud computing. During this investigation, we are implementing working of IT auditing mechanism over the cloud computing framework in order to assure the desire level of security. In the IT auditing mechanism, the concept of checklists are prepared for the cloud computing application and their lifecycle. Those checklists are prepared on the basis of models of cloud computing such as deployment models and services models. With this project our main concern is to present the cloud computing implications for large enterprise applications like Customer Relationship Management and achieving the desired level of security with design and implementation of IT auditing technique. As results from practical investigation of IT auditing over the cloud computing framework, we claim that IT auditing assuring the desired level of security, regulations, compliance for the enterprise applications like Customer Relationship Management. EXISTING SYSTEM: Here the customer sending file information is stored in the encrypted format in database. Then the user can be decrypted to download the file from database, it is only possible for authorized user. PROPOSED SYSTEM: In the Encryption technique, if new user is to send the file with the private key, in this file is saved in encrypted format in table. So this private information is not known to any other user .so it is better security to our application. Also we have provided the decryption technique for the user to read the information is correct or not by showing it on below the encryption table. This data is known to only that user which is login.
  • 2.
    MODULE 1. Encryption Module 2.Decryption Module Module 1: Encryption Module The user to send the file in encrypted format using RSA algorithm and then that file is stored in our database with unique private key and public key. Then the authorized download user only to view that private key after to access that file using the private key. Module 2: Decryption Module This module is used to download the file in plain text format using cryptography techniques. The sender, send the private key to the receiver, when the receivers to enter the public key that time to display our private key to the receiver.
  • 3.
    SYSTEM REQUIREMENTS Hardware Requirements: Processor: Intel Duel Core. Hard Disk : 60 GB. Floppy Drive : 1.44 Mb. Monitor : LCD Colour. Mouse : Optical Mouse. RAM : 512 Mb. Software Requirements: Operating system : Windows XP. Coding Language : ASP.Net with C# (SP1) Data Base : SQL Server 2005