You are on page 1of 2

1.4.

1 Advantages of Proposed System


 Ensures data integrity and confidentiality.
 Instead of transmitting the key required to decrypt the ciphertext of first level, values
required to generate key are shuffled and transmitted. So it is quite difficult for the
intruder to hack the key.
 Since protection is provided in two levels, suppose if any one key is compromised it
is difficult to obtain the original data for the intruder.

1.5 Organization of the Project

 Chapter 1 deals about the issue articulation, existing and proposed frameworks.

 Chapter 2 manages all the discoveries and perceptions which are led as plausibility study
before genuine advancement of the venture. The section likewise manages the
clarification of existing methodologies

 Chapter 3 records the hardware and programming determination for this task. It
additionally depicts the general portrayal of project.

 Chapter 4 manages the propelled software designing where the whole stream of the
project is represented to by expert data flow diagrams and sequence diagrams.

 Chapter 5 segment clarifies coding rules and framework maintenance for the project.

 Chapter 6 manages the different sorts of experiments to demonstrate the legitimacy of the
project.

 Chapter 7 clarifies in insights about the result of the investigation and contrasts it with the
outcome got in existing framework

 Conclusion and Future work- This area portray the outline of the related work and
future improvements of the proposed framework.
 References- This area primarily highlights all the journals and contextual investigation
papers being eluded for the advancement cycle of the project.
 Appendix - It contains the depiction that chiefly manages the graphical yield and client
interface of the application, test code for the undertaking acronyms utilized as a part of
the report and publication details.

You might also like