networking technologies and security systems

Published:

The project is developed on the basis of Networking technologies and security systems. This project is basically focusing on the strong networking storage system. This project is developed in ASP.Net and C#.Net This project is going to explain the strong security scheme for Internet application server attached storage (NAS) that is based on capability and uses a key distributing scheme to keep Internet application server attached storage from performing key management. In this system cryptography is playing a vital roll to protect data from spoofing, tampering, eavesdropping and replay attacks and it also guarantees that the data stored on the storage which cannot be copied.

Scope

The project scope can be defined to the limitation of web browsers who wants to send some confidential documents to the other person will upload the file in encrypted format. This file can be accessed by the receiver by unlocking the folder which is kept in the Internet service provider's space. The objective of the project is to keep a strong security scheme for Internet network-attached storage system when we transfer a document to shared folders of servers resides in WEB, the data has to automatically store in the shared folders. The data which is stored in the shared folders should not be copied by any other system connected in the network to the server.

Lady using a tablet
Lady using a tablet

Professional

Essay Writers

Lady Using Tablet

Get your grade
or your money back

using our Essay Writing Service!

Essay Writing Service

Modules

  1. Encrypter
  2. Up loader
  3. Folder Lock
  4. Unlocking
  5. Decrypter
  1. Encrypter

This module encrypts the given text and converts the text into unreadable format. At the same time this module is going to generate a key for the user. This key is playing a vital roll in decrypting the unreadable format of the text in the future by the receiver of the document.

  1. Up Loader

This module will open the ftp site and open the folder where the document has to be uploaded. This module enables the user to upload the unreadable format to the specific folder.

  1. Folder Lock

This module will lock the folder available in the Web site server. This module will lock the folder once the encrypted format is uploaded into it.

  1. Unlocker

This module will unlock the folder with the code supplied at the time of encryption. This may me done by the user who locked the folder or by the receiver who has received the code from the user. This module unlock the folder and download the unreadable format to the receiver's PC.

  1. Decrypter

Decrypter is the module which can be used for encrypt the text into the original format. This module is playing vital roll to convert the document into readable format.

Distribution of Modules

The project is a stand alone application which will be configured in the clients place as well as receivers place as an attachment. This application will be working with the help of predominant module functionality.

The user who is accessing the shared folders of the server will try to keep the document in to it. As soon as the user place the document in the shared folders the SNARE will activate and spool the data into the application. The spooled data will be encrypted and stored in the shared folders location. As soon as the data is encrypted a key will be generated by the encryption mechanism. The key will be captured by the application and send the key to the client system which has placed the data into the server. The receiver of the key will again unlock the folder and decrypt the data and receive the original format of the text from the internet server.

The data stored in the internet servers will not be tampered, spoofed, copied by any other user with out inserting the key.

Lady using a tablet
Lady using a tablet

Comprehensive

Writing Services

Lady Using Tablet

Plagiarism-free
Always on Time

Marked to Standard

Order Now

Conclusion

SNARE will prevent the documents stored in the internet server shared folder from the spoofing or tapering of the documents by the other client systems. At this moment the mechanism will disable the user to spoofing the document. SNARE protect data from spoofing, tampering, eavesdropping and replay attacks and it also guarantees that the data stored on the storage which cannot be copied. SNARE is an internet network attached storage (NAS) that is based on capability and uses a key distributing scheme to keep network attached storage from performing key management. The application is developed in .net Technologies on Windows platform.