SlideShare una empresa de Scribd logo
FILE ENCRYPTION AND DECRYPTION
Presented by
Arka Halder
Amit Saha
Subrata Mahata
Sumanta Mete
Sudip Mandol
IT
DEPARTMENT
GOVT. COLLEGE OF ENGINEERING &TEXTILE
TECHNOLOGY,SERAMPORE
ACKNOWLEDGEMENT
In completing this project we have been fortunate to have help,
support and encouragement from many people. We would like to
thank them for their cooperation.
First, we would like to thank our mentor Mr. Mainak Basu Roy, for
guiding us through each and every step of the process with
knowledge and support.
Thank you for your advice, guidance and assistance.
CONTENTS
• Overview of the project
• Objectives
• Recommended Software requirements.
• Software interface
• Hardware Requirements
• Hardware interface
• Functional Requirements
• Non-Functional Requirements
• Data-Flow-Diagram.
• E-R Diagram.
• Database- Structure.
• Snapshots of project.
• Testing
• Future Scope.
• Conclusion
• References
OVERVIEW OF THE PROJECT
• A E-commerce application, a web site where users can store their files
(irrespective of type ) without horrifying by security threats.
• Depending on the context, it’s been names as ‘safedrop.com’.
• User facilities
 A fresh user must sign up to create an account
 One has to log in using account information to access the
uploading and downloading(if any) facility
 There is a scope for resetting password if anyone forgets
 Once uploaded ,a file will be stored in encrypted version
 One can download only files uploaded by oneself in decrypted
form
 There is also provision for changing password ,updating one’s
profile picture and deleting account
OBJECTIVE
• Making a file uploading and downloading site.
• Assuring safety as much as possible.
• Providing user the scope to store file irrespective of the file type.
• To facilitate user to change password, update profile image and delete
account.
RECOMMENDED SOFTWARE REQUIREMENTS
Operating system : windows 7
Framework : .NET (4.0)
Application software : Microsoft Visual Studio 2012
Programming language : C#
Database : SQL Server
Technology : ASP.NET
Web Server : IIS 6.0
SOFTWARE INTERFACE
SERVER
• Windows 7
• IDE-Visual Studio 2012
• SQL server 2008
CLIENT
• Windows XP or above
• .NET Framework
• Web Browser like Microsoft
Internet Explorer, Mozilla
Firefox etc.
HARDWARE REQUIREMENT
• Intel Pentium IV or above
• 2 GB RAM or above
• 10 GB hard disk or above
• Network Interface
HARDWARE INTERFACE
SERVER
• Intel Pentium IV or more
• 2 GB RAM
• 10 GB hard disk
• Network Interface
CLIENT
• Intel Pentium III or more
• 2 GB RAM
• Network Interface
FUNCTIONAL REQUIREMENTS
• Opening accounts
 A new user must have to sign up initially to get access to the
website. Old users can log in directly with their email Id, password.
• Password reset
 Users can reset password if required.
• Upload and download
 Users can upload files and view a list of their uploaded files. They
can download it by selecting corresponding file name.
• Change password and profile picture
 Users can change their password , profile picture
NON-FUNCTIONAL REQUIREMENTS
• The system is an Web Application.
• This is Browser Independent
DFD - CONTEXT DIAGRAM
DFD – LEVEL 1 OF USER
ENTITY RELATIONSHIP DIAGRAM
DATABASE STRUCTURE
USER TABLE
DATABASE STRUCTURE
FILE DESCRIPTION TABLE
DATABASE STRUCTURE
FILE DESCRIPTION TABLE 2
DATABASE STRUCTURE
FEEDBACK TABLE
SNAPSHOTS OF PROJECT
HERE ARE SOME SNAPSHOTS OF
SAFEDROP.COM
STARTING PAGE
SIGNUP PAGE
LOGIN PAGE
HOME PAGE
DOWNLOAD PAGE
UPLOAD PAGE
PROFILE INFO
CHANGE PROFILE PICTURE
DELETE FILE
DELETE NEXT
DELETE PROFILE
FEEDBACK n LOGOUT
FEEDBACKs on START page
TESTING
Testing is an investigation conducted to provide stakeholders with
information about the quality of the product or service under test. Software
testing also provides an objective, independent view of the software to
allow the business to appreciate and understand the risks at
implementation of the software.
TEST CASES OF SafeDrop
TEST CASES OF SafeDrop
FUTURE SCOPE
The interaction procedure of user and the web application can be
further more improved to make it interactive and user friendly .The web
page layout may be improved .we are trying to upgrade it into a file
storage site as well as a file sharing site so that more users can be
attracted .We think more flexibility and interactive features can make it
more bigger.
CONCLUSION
After developing the application we have got a clear idea on web
development, especially in ms.net features, got a clear idea on how the
encryption or decryption takes place. We have come to know the pros &
cons of ms.net, the scopes of it and how it differs from other web
development techniques. I hope, in future, the experience will help us in
developing any web application and in career.
REFERENCES
http://msdn.microsoft.com/library/default.asp
www.w3schools.com
http://www.wikipedia.org
http://www.cooltext.com
Grid view control.
http://www.codeproject.com/KB/Grid/RSS
File encryption decryption

Más contenido relacionado

Similar a File encryption decryption

SadikulIslamDotNetResume
SadikulIslamDotNetResumeSadikulIslamDotNetResume
SadikulIslamDotNetResume
Sadikul Islam
 
Vivek_Ojha (1)
Vivek_Ojha (1)Vivek_Ojha (1)
Vivek_Ojha (1)
Vivek Ojha
 
Resume_Harikrishna_Tekkam (1)
Resume_Harikrishna_Tekkam (1)Resume_Harikrishna_Tekkam (1)
Resume_Harikrishna_Tekkam (1)
Harikrishna Snr
 
Introduction to Backend Development (1).pptx
Introduction to Backend Development (1).pptxIntroduction to Backend Development (1).pptx
Introduction to Backend Development (1).pptx
OsuGodbless
 

Similar a File encryption decryption (20)

DIGITAL TOLL TAX SYSTEM
DIGITAL TOLL TAX SYSTEMDIGITAL TOLL TAX SYSTEM
DIGITAL TOLL TAX SYSTEM
 
ONLINE PORTAL WITH COMPILER USING C#
ONLINE  PORTAL WITH COMPILER USING C#ONLINE  PORTAL WITH COMPILER USING C#
ONLINE PORTAL WITH COMPILER USING C#
 
SadikulIslamDotNetResume
SadikulIslamDotNetResumeSadikulIslamDotNetResume
SadikulIslamDotNetResume
 
demo
demo demo
demo
 
AIR - Framework ( Cairngorm and Parsley )
AIR - Framework ( Cairngorm and Parsley )AIR - Framework ( Cairngorm and Parsley )
AIR - Framework ( Cairngorm and Parsley )
 
Community platform for job seekers | web application for job seekers | case s...
Community platform for job seekers | web application for job seekers | case s...Community platform for job seekers | web application for job seekers | case s...
Community platform for job seekers | web application for job seekers | case s...
 
Vivek_Ojha (1)
Vivek_Ojha (1)Vivek_Ojha (1)
Vivek_Ojha (1)
 
Online Building Plan
Online Building PlanOnline Building Plan
Online Building Plan
 
Online Examination System in .NET & DB2
Online Examination System in .NET & DB2Online Examination System in .NET & DB2
Online Examination System in .NET & DB2
 
quiz half ppt
quiz half pptquiz half ppt
quiz half ppt
 
Quiz application system project report..pdf
Quiz application system project report..pdfQuiz application system project report..pdf
Quiz application system project report..pdf
 
E-Examination
E-ExaminationE-Examination
E-Examination
 
Chinnasamy Manickam
Chinnasamy ManickamChinnasamy Manickam
Chinnasamy Manickam
 
Web Performance Optimization
Web Performance OptimizationWeb Performance Optimization
Web Performance Optimization
 
Resume_Harikrishna_Tekkam (1)
Resume_Harikrishna_Tekkam (1)Resume_Harikrishna_Tekkam (1)
Resume_Harikrishna_Tekkam (1)
 
Introduction to Backend Development (1).pptx
Introduction to Backend Development (1).pptxIntroduction to Backend Development (1).pptx
Introduction to Backend Development (1).pptx
 
Mid-Term Presentation
Mid-Term Presentation Mid-Term Presentation
Mid-Term Presentation
 
Spm file33
Spm file33Spm file33
Spm file33
 
BadesahebKBichu
BadesahebKBichuBadesahebKBichu
BadesahebKBichu
 
Sudhir srivastava profile
Sudhir srivastava profileSudhir srivastava profile
Sudhir srivastava profile
 

Más de AmitSaha123

Más de AmitSaha123 (6)

Application of GIS and Remote Sensing in Flood Risk Management
Application of GIS and Remote Sensing in Flood Risk ManagementApplication of GIS and Remote Sensing in Flood Risk Management
Application of GIS and Remote Sensing in Flood Risk Management
 
Flood remedial mesures in gis
Flood remedial mesures in gisFlood remedial mesures in gis
Flood remedial mesures in gis
 
Flood risk assessment methodology
Flood risk assessment methodologyFlood risk assessment methodology
Flood risk assessment methodology
 
Presentation flood
Presentation floodPresentation flood
Presentation flood
 
Gfs final
Gfs finalGfs final
Gfs final
 
E recipe-managment
E recipe-managmentE recipe-managment
E recipe-managment
 

Último

audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkkaudience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
lolsDocherty
 
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
aagad
 
Production 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptxProduction 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptx
ChloeMeadows1
 
Article writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptxArticle writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptx
abhinandnam9997
 

Último (14)

ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
 
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkkaudience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
 
Premier Mobile App Development Agency in USA.pdf
Premier Mobile App Development Agency in USA.pdfPremier Mobile App Development Agency in USA.pdf
Premier Mobile App Development Agency in USA.pdf
 
The Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case StudyThe Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case Study
 
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
 
How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?
 
Production 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptxProduction 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptx
 
Pvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdfPvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdf
 
Statistical Analysis of DNS Latencies.pdf
Statistical Analysis of DNS Latencies.pdfStatistical Analysis of DNS Latencies.pdf
Statistical Analysis of DNS Latencies.pdf
 
Cyber Security Services Unveiled: Strategies to Secure Your Digital Presence
Cyber Security Services Unveiled: Strategies to Secure Your Digital PresenceCyber Security Services Unveiled: Strategies to Secure Your Digital Presence
Cyber Security Services Unveiled: Strategies to Secure Your Digital Presence
 
Article writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptxArticle writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptx
 
Case study on merger of Vodafone and Idea (VI).pptx
Case study on merger of Vodafone and Idea (VI).pptxCase study on merger of Vodafone and Idea (VI).pptx
Case study on merger of Vodafone and Idea (VI).pptx
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
Bug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's GuideBug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's Guide
 

File encryption decryption