ONLINE SECURE DATA SERVICE
#1

[attachment=13488]
INTRODUCTION
Its examines the proliferation of threats to Internet consumer privacy and security and their adverse impact
access appropriate information in a more secure and precise manner.
Some of the threats are real, others are fears based on misconceptions.
EXISTING SYSTEM
Send mails or Receive mails without any security
Not Reliable Data transfer.
Any Hacker read mails ie, Send or Received.
PROPOSED SYSTEM
File Encryption & Decryption.
E-mail Encryption & Decryption.
File compression & File Decompression.
Provide Data Authentication & Integrity.
Provide both Online Store & Forward Technology.
LOCAL FILE
The files in the client machine can be encrypted or decrypted and can be stored either locally or in the server itself.
NETWORK FILE
The files from any of the machine in the network can be stored either locally or in the server itself.
VIRTUAL DIRECTORY
Provide a consolidated view of user identity without having to construct an entire directory infrastructure
Receives queries and directs them to the appropriate data sources.
When the user data comes back, the directory presents the data to the enterprise application
Technology ideal for consolidating data stored in a distributed environment.
ADVANTAGES OF VIRTUAL DIRECTORIES
Faster deployment by avoiding synchronization
Influence in existing investments in security and high-availability for reliable data stores
Provide application specific views of identity data
Allow a single view of identity data without violating internal or external regulations
prevent denial of service attacks on the primary data-storage
Changes made in authoritative sources are reflected in real-time
FILE ENCRYPTION AND DECRYPTION
Sensitive information sent over the internet by encrypting the data first.
Useful for storing private documents and files on PC
Works with both text information and files
Generates random passwords of any length.
Helps to keep passwords and associated information in safe and secure manner
Invisible mode feature present to hide the program from task bar and icons from menu
E-MAIL ENCRYPTION/DECRYPTION
vendors / dealer offer products that encrypt e-mail messages, are easy to use and provide the ability to send private data, including e-mail attachments
work by sending a page link to the recipient, who then clicks on it and logs on to a secure e-mail server, which the organization either owns or outsource to an appropriate vendor / dealer .
non-Web-based technology that allows transportation of secure messages from one person or organization to another, the most common of which is public key infrastructure (PKI)
FILE COMPRESSION AND DECOMPRESSION
File compression reduces the size of a file by minimizing redundant data.
Takes an existing file or files and produce a file or files that are compressed versions of the originals.
Application can only operate on such files with the assistance of a file compression library
Editing is typically not supported, and seeking is limited if supported at all.
WHY COMPRESS FILES?
These utilities allow two or more related files to be combined into a single file. Makes it possible to transfer multiple files with a single command.
It reduce the size of a file (or group of files). Take up less storage space on the host and less time to transfer over the network.
Used to convert binary files to an encoded format using only ASCII characters.
possible to transfer binary files via electronic mail other transport method that does not ordinarily support binary data.
DATA AUTHENTICATION
Allows a receiver to verify that the data really was sent by the claimed sender.
In the two-party communication case, data authentication can be achieved through a purely symmetric mechanism:
The sender and the receiver share a secret key to compute a message authentication code (MAC) of all communicated data.
When a message with a correct MAC arrives, the receiver knows that it must have been sent by the sender
DATA INTEGRITY
Refers to the validity of data. Data integrity can be affected in a number of ways:
Human errors when data is entered
Errors that occur when data is transmitted from one computer to another
Software bugs or viruses
Hardware malfunctions, such as disk crashes
Natural disasters, such as fires and floods
THREATS TO DATA INTEGRITY
Backing up data regularly
Controlling access to data via security mechanisms
Designing user interfaces that prevent the input of invalid data
Using error detection and correction software when transmitting data
STORE AND FORWARD
The temporary storage of a message for transmission to its destination at a later time.
Store and forward techniques allow for routing over networks that are not accessible at all times.
ADVANTAGES AND DISADVANTAGES
Advantages:

Savings
Global Accessible
Safety
Disadvantages:
Less Control
Closure of Online Company
THE FUTURE OF INTERNET SECURITY
Legacy Systems
Threat
Consciousness
Operating Systems
Security Tools
The Cost of Storage
The Internet
Cryptographic Methods
CONCLUSION
Traditional security measures such as password and identification cards cannot satisfy every security requirement.
Security and privacy are two major issues that continue to raise concerns with all those involved with the Internet.
Internet is a different area than most of us are used to dealing with in our daily lives.
One of the things that make it so difficult is that it is always "on" -- the Internet never sleeps.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: 4g wireless data service, online secure data storagesecure data,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Block Chain and Data Science jntuworldforum 0 8,039 06-10-2018, 12:15 PM
Last Post: jntuworldforum
  Data Encryption Standard (DES) seminar class 2 9,353 20-02-2016, 01:59 PM
Last Post: seminar report asees
  Skin Tone based Secret Data hiding in Images seminar class 9 7,016 23-12-2015, 04:18 PM
Last Post: HelloGFS
  “ONLINE VOTING SYSTEM” seminar class 7 12,272 10-06-2015, 04:12 PM
Last Post: seminar report asees
  service oriented architecture full report project report tiger 12 14,755 27-04-2015, 01:48 PM
Last Post: seminar report asees
Brick XML Data Compression computer science crazy 2 2,387 07-10-2014, 09:26 PM
Last Post: seminar report asees
  3D PASSWORD FOR MORE SECURE AUTHENTICATION full report computer science topics 116 82,105 03-04-2014, 11:39 PM
Last Post: seminar report asees
  Data Security in Local Network using Distributed Firewalls computer science crazy 10 14,917 30-03-2014, 04:40 AM
Last Post: Guest
  GREEN CLOUD -A Data Center Approach computer topic 0 1,536 25-03-2014, 10:13 PM
Last Post: computer topic
  General Packet Radio Service (Download Full Seminar Report) Computer Science Clay 10 15,737 22-03-2014, 12:46 PM
Last Post: MichaelPn

Forum Jump: