Professional Documents
Culture Documents
The project entitled “FILE SECURITY SYSTEM” the project is a completely user-
friendly system for easy information to retrieval for customers.
All of us have some files and folders that we consider private. They can be anything
from our business documents to pictures of friends and family. These are files that we don’t
want other people using our computer to know about. As Windows offers no way to protect
our private information, most of us get in awkward situations when these files are discovered
by unwanted people.
Folder Protector offers each user a protected folder that can only be opened by
entering the password in Folder Protector. Unlike most security programs, Folder Protector is
small in size(nearly 58KB) and does not show the folder that it is protecting. This gives an
additional advantage that people who don’t know the password do not have a target to try and
hack their way into. As the software is portable, you can hide it or even delete it after
protecting your folder and no one will have a clue that it was used. Then whenever we need
to access protected files, we can re-download the program from this page, enter the password
and access your protected files.
ii
0
1. INTRODUCTION
Encryption of data plays a vital role in the real time environment to keep the data out
of reach of unauthorized people, such that it is not altered and tampered. The File Security
System is software, which tries to alter the originality of the text into some encrypted form.
The major task of File Security System is to provide the user the flexibility of passing
the information implementing the encryption standards as per the specification and
algorithms proposed and store the information in a form that is unreadable. The Application
should have a reversal process as of which should be in a position to decrypt the data to its
original format upon the proper request by the user.
While the Encryption and Decryption is done the application should confirm the
standards of authentication and authorization of the user. The Entire application should strive
to achieve a user friendly Graphical User Interface, which need to be in a self-learning mode
for the end user. The System Should provide all the functional standards of proper navigation
with in the environment, which makes it possible for the users to have a smooth flow while
working under the environment.
The Overall system should provide proper menu based navigation for easier
navigation and operation. The Application should be designed in such a way that, as soon as
it starts create a Buffer and associate this buffer to some homogeneous data environment, the
application should ask the user for the Encryption Key details and should start its
functionality upon the logistics that are provided with in this key. The key should be designed
in such a way that it prevents the unauthorized persons from stealing the information at any
point of time.
The application of Decryption should be a reverse process at the other end and should
be translated only when the receiver of the data applies the proper reversal key. The
Decryption process should have a log-based methodology that will take care of any errors
that may be encountered while the system is under utilization and should record all those
events, which are above the general standards of security.
1
1.2. SYSTEM SPECIFICATION
2
SOFTWARE FEATURES
WINDOWS XP
The operating system is a special type of program that loads automatically when you
start your computer. The operating system allows you to use the advanced features of a
modern computer without having to learn all the details of how the hardware works.
The link between the hardware and you, the user. Makes the computer easy to use
without having to understand bits and bytes. Windows uses a system of drive letters for
different physical drives you have access to. To help organize your files it is possible to create
folders (also referred to as directories) to help divide and even sub-divide the files stored
within the various logical drives available. Finally, at the very end of this structure are the
various files that we use.
FEATURES OF WINDOWS XP
Windows uses a system of drive letters for different physical drives you have
access to.
Finally, at the very end of this structure are the various files that we use.
Reliable
High system uptime
Resilient to application failures
Dynamic system configuration
Manageable
Centralized management
3
VISUAL BASIC 6.0
4
ORACLE 9i
The Oracle Corporation was the first company to offer a true RDBMS commercially
that is portable and connectable. Oracle 9i is Microsoft strategic language for rapid
application development (RAD).It is targeted at programmers, who need to build enterprise
application quickly and without lot of hard work. Oracle 9i has been designed with focus on
certain key development areas.
FEATURUES OF ORACLE 9i
Oracle supports the largest of the database potentially terabytes in size. To make
efficient use of expensive hardware devices, it allows the full of space usage.
Oracle supports large numbers of concurrent users executing a variety of database
application operating on the same data. It minimizes the data convention and
guarantees data concurrency.
Oracle enforces data integrity. As a result, the cost of coding and managing checks
in many database applications is eliminated.
Oracle software is ported to work under different operating system. Application
developed for Oracle can be ported to any system with little or no modification.
Oracle maintains the preceding features with high degree of overall system
performance.
Oracle can be selectively control the availability of data, at the database level and
sub-database level.
Oracle has client-server environment with high availability and management
security.
Oracle software allows the use to replicate groups of tables and their supporting
objects to multiple sites. Oracle supports replication of both data and schema level
changes to these sites
5
2. SYSTEM STUDY
The existing system is only for the communication between the sender and receiver.
The information or messages are not send in a proper way. There is no protection with in the
sender and receiver. Although the sender and receiver belong to a single communication
network there should be proper protection facility within them. Security is a must because
only authorized and well known organization members should have the messages. All
existing system takes more times to process or it has less security level. In this existing
system there is no security to sending the files through the internet.
6
2.2 PROPOSED SYSTEM
Conversion methods are adopted from algorithm reduce time and cost
Different type of reports can be easily taken than the existing system
Current statement of the file is available to the user at any point of time
7
3. SYSTEM DESIGN AND DEVELOPMENT
Design is the first step into the development phase for the system of FILE
SECUIRTY SYSTEM .Design is a creative process. A good design is the key to effective
system. The term “design” is defined as “the process of applying various techniques and
principles for the purpose of defining a process or a system in sufficient detail to permit its
physical realization”. It may be defined as a process of applying various techniques and
principles for the purpose of defining a device, a process or a system in sufficient detail to
permit its physical realization. Software design sits at the technical kernel of the software
engineering process and is applied regardless of the development paradigm that is used. The
system design develops the architectural detail required to build a system or product. As in
the case of any systematic approach, this software too has undergone the best possible design
phase fine tuning all efficiency, performance and accuracy levels. The design phase is a
transition from a user oriented document to a document to the programmers or database
personnel. System design goes through two phases of development: Logical and Physical
Design.
LOGICAL DESIGN
The logical flow of FILE SECUIRTY SYSTEM and define the boundaries of a
system. It includes the following steps:
Reviews the current physical system – its data flows, file content, volumes ,
frequencies etc.
Prepares output specifications – that is, determines the format, content and frequency
of reports.
Prepares input specifications – format, content and most of the input functions.
Prepares edit, security and control specifications.
Specifies the implementation plan.
8
PHYSICAL DESIGN
Physical system produces the working of FILE SECUIRTY SYSTEM by defines the
design specifications that tell the programmers exactly what the candidate system must do. It
includes the following steps.
9
3.3 OUTPUT DESIGN
Outputs from computer systems are required FILE SECUIRTY SYSTEM primarily
to communicate the results of processing to users. They are also used to provide a permanent
copy of these result for latter consultation .Computer output is the most important and direct
source of information to the users. Designing computer output should proceed in an
organized well through out the manner. The right output must be available for the people who
find the system easy o use. The outputs have been defined during the logical design stage. If
not, they should defined at the beginning of the output designing terms of types of output
connect, format, response etc, Various types of outputs are
External outputs
Internal outputs
Operational outputs
Interactive outputs
Turn around outputs
All screens are informative and interactive in such a way that the user can full fill his
requirements through asking queries.
3.4 DATABASE DESIGN
Controlled Redundancy
Data independence
Accurate and integrating
More information at low cost
10
3.4.1 DESCRIPTION OF MODULES
STAFF PROFILE
OPERATIONS
REPORT
STUDENTS PROFILE
This module is used to maintain the basic information of student s database like
student id , name , major,branch, contact number , email id are details stored and
manipulated.
STAFF PROFILE
This module is used to maintain the basic information of staff s database like staff id ,
name , major,branch, contact number , email id are details stored and manipulated.
OPERATIONS
This module is used protect the folder .The Folder Protector offers each user a
protected folder that can only be opened by entering the password in Folder Protector. Unlike
most security programs, Folder Protector is small in size(nearly 58KB) and does not show the
folder that it is protecting.
REPORT
This module is used to view the students and staff report with the single page.
11
4.SYSTEM TESTING AND IMPLEMENTATION
1. Unit Testing
2. Integration Testing
3. Validation Testing
4. Acceptance Testing
1. UNIT TESTING
Unit test comprises of a set tests performed by an individual program prior to the
integration of the unit into large system. A program unit is usually the smallest free
functioning part of the whole system. Module unit testing should be as exhaustive as possible
to ensure that each representation handled by each module has been tested. All the units that
makeup the system must be tested independently to ensure that they work as required.
During unit testing some errors were raised and all of them were rectified and handled well.
The result was quiet satisfactory and it worked well.
2. INTEGRATION TESTING
Integration testing is a system technique for constructing the program structure while
at the same time conducting tests to uncover errors associated with interfacing. The objective
is to take unit tested modules and build a program structure that has been dictated by design.
Bottom-up integration is the traditional strategy used to integrate the components of a
software system into functioning whole. Bottom-up integration consists of unit test followed
12
by testing of the entire system. A sub-system consists of several modules that communicated
with other defined interface.
The system was done the integration testing. All the modules were tested for their
compatibility with other modules .They test was almost successful. All the modules coexisted
very well, with almost no bugs. All the modules were encapsulated very well so as to not
hamper the execution of other modules.
3. VALIDATION TESTING
After validation testing, software is completely assembled as a package, interfacing
errors that have been uncovered and corrected and the final series of software test; the
validation test begins. Steps taken during software design and testing can greatly improve the
probability of successful integration in the larger system. System testing is actually a series of
different tests whose primary purpose is to fully exercise the compute –based system.
4. ACCEPTANCE TESTING
User acceptance of the system is a key factor for the success of any system. The
system under consideration is tested for user acceptance by constantly keeping touch with
prospective system and user at the time of developing and making changes whenever
required.
This is done regarding to the following points.
Input Screen Design
Output Screen Design
Format of the report and other output
13
4.2 SYSTEM IMPLEMENTATION
Implementation is the stage, which is crucial in the life cycle of the new system
designed. The main stage in the implementation is planning, training, system testing. Every
developed system must be implemented to fulfill the mode of development. There are many
software implementation methods. In this system, direct change over from existing system to
computer system is carried.
This implementation plans involving planning, investigation of the current system and
its constraints on implementation, design the methods to achieve the change over and
evaluation to change over methods. After system is implemented, user conducts a review of
the system. It is used to gather information for the maintenance of the system. The basic
review method is a data collection method of questionnaire, interview etc.
14
5.CONCULSION
The project entitled” FILE SECUIRTY SYSTEM” entitled is highly interactive. The
system has been developed in Microsoft Visual Basic 6.0 as front end and MS-Access as back
end in Windows7 Professional platform. The database approach of developing the system was
helped.
The project has been developed in a structured manner which helps further
development which can be done very easily. The coding is done in a simplified and this is
understandable and flexible which helps in cooperating major changes also possible. While
designing the system all user requirements are considered and implemented in this system.
Thus no more changes are required in the present system at user point of view.
FUTURE ENHANCEMENT
Although this “FILE SECUIRTY SYSTEM” almost satisfies all the requirements of
the user and admin, there is further developed in this system into better form in the following
are:
Further security can be improved
The design of this package can be extended
15
BIBLIOGRAPHY
BOOK REFERENCE
1. A. Russell Jones, “Visual Studio 6.0”, “BPB Publications”, First Indian Edition,
2002.
2. Elias M. Awad, “System Analysis and Design”, Galgotia Publications Ltd, Second
Edition, 1997.
3. Ragu Ramakrishnan, Johannes Gehrke, “Database Management System”, Third
Edition, 1997.
4. Roger S. Pressman, “Software Engineering”, Tata McGraw Hill Publications, Fifth
Edition, 2001.
5. Tenkins G.M. and Walts D.G., “Spectral Analysis and Application”,
Sanfrancisco, CA Holder Day 1968.
URL REFERENCE
1. http://www.autoindia.com
2. http://www.allvbcodes.com
3. http://w3schools.com
4. http://vbtut.com
5. https://www.sourcecodester.com/
6. https://learn.oracle.com/
7. https://www.tutorialspoint.com
8. https://1000projects.org/
9. https://www.vbtutor.net/
10. https://www.oracle.com
16
APPENDIX
Admin
Student Staff
Student
Report
Report
Staff Details
Plain Text
Encipher with
Plain Text
Plain Text Cipher Text
Transmit
Cipher Text
17
B.TABLE STRUCTURE
1. Table name : Login
Purpose : This table stores the details about the login information.
18
3.Table Name: Staff
19
C.SAMPLE CODING
LOGIN FORM
Dim db As ADODB.Connection
Dim rs As ADODB.Recordset
rs.AddNew
rs(0) = Text1.Text
rs(1) = Text2.Text
rs.Update
MDIForm1.Show
End Sub
Unload Me
End Sub
con = "Provider=Microsoft.Jet.OLEDB.4.0;Data
Source=E:\folderlock\folderlock.mdb;Persist Security Info=False"
20
db.CursorLocation = adUseClient
db.Open con
Me.WindowState = 2
End Sub
STUDENTS PROFILE
Dim db As ADODB.Connection
Dim rs As ADODB.Recordset
rs.MoveLast
no = rs.Fields("stuid")
Text1.Text = no + 1
Text2.Text = ""
Text3.Text = ""
Text4.Text = ""
Text5.Text = ""
Text6.Text = ""
Text2.SetFocus
End Sub
Unload Me
End Sub
rs.AddNew
rs(0) = Text1.Text
rs(1) = Text2.Text
21
rs(2) = Text3.Text
rs(3) = Text4.Text
rs(4) = Text5.Text
rs(5) = Text6.Text
rs.Update
End Sub
Exit Sub
End If
rs.MoveFirst
Call display
Exit Sub
End If
rs.MoveNext
Wend
End Sub
rs(0) = Text1.Text
rs(1) = Text2.Text
22
rs(2) = Text3.Text
rs(3) = Text4.Text
rs(4) = Text5.Text
rs(5) = Text6.Text
rs.Update
End Sub
rs(0) = Text1.Text
rs(1) = Text2.Text
rs(2) = Text3.Text
rs(3) = Text4.Text
rs(4) = Text5.Text
rs(5) = Text6.Text
rs.Delete
End Sub
rs.MoveFirst
Text1.Text = rs.Fields(0)
Text2.Text = rs.Fields(1)
Text3.Text = rs.Fields(2)
Text4.Text = rs.Fields(3)
Text5.Text = rs.Fields(4)
Text6.Text = rs.Fields(5)
23
End Sub
rs.MoveNext
Exit Sub
End If
Text1.Text = rs.Fields(0)
Text2.Text = rs.Fields(1)
Text3.Text = rs.Fields(2)
Text4.Text = rs.Fields(3)
Text5.Text = rs.Fields(4)
Text6.Text = rs.Fields(5)
End Sub
rs.MovePrevious
Exit Sub
End If
Text1.Text = rs.Fields(0)
Text2.Text = rs.Fields(1)
Text3.Text = rs.Fields(2)
Text4.Text = rs.Fields(3)
Text5.Text = rs.Fields(4)
Text6.Text = rs.Fields(5)
End Sub
24
Private Sub Command9_Click()
rs.MoveLast
Text1.Text = rs.Fields(0)
Text2.Text = rs.Fields(1)
Text3.Text = rs.Fields(2)
Text4.Text = rs.Fields(3)
Text5.Text = rs.Fields(4)
Text6.Text = rs.Fields(5)
End Sub
con = "Provider=Microsoft.Jet.OLEDB.4.0;Data
Source=E:\folderlock\folderlock.mdb;Persist Security Info=False"
db.CursorLocation = adUseClient
db.Open con
Me.WindowState = 2
End Sub
25
D.SAMPLE INPUT
LOGIN
MAIN FORM
26
STUDENTS PROFILE
STAFF PROFILE
27
FILE SECUIRTY
28
SET SECURITY TO LOCK FILE
LOCK FILE
29
FILE SECURITY FORMAT
UNLOCK FILE
30
UNLOCK FILE
31
E.SAMPLE OUTPUT
STUDENTS REPORT
32
STAFF REPORT
33