ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login


Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.9, No. 4)

Publication Date:

Authors : ; ; ; ;

Page : 44-48

Keywords : Confidentiality; Advanced Encryption Standard (AES); Symmetric Key; Authorized Access;

Source : Downloadexternal Find it from : Google Scholarexternal


Many Organizations share data through the network which provides numerous security vulnerabilities. In the existing systems, when a person wants to transfer details, they may send data over the network where data breaches may occur. So, we create a system that allows all the members of an organization to upload and retrieve data using Key based data access. Initially, they must register themselves and then login to the system. They can upload a file and for each file, system will generate a unique key using random class. After data is uploaded in the database, it is encrypted using symmetric key encryption technique called Advanced Encryption Standard (AES). This algorithm is more secure and supports larger key sizes than triple data encryption standard and other algorithms. AES is faster in both hardware and software. To download a file of other branch, they should send request and the request will be processed by the admin and key will be sent to their email id. Here, we use Simple mail transfer protocol as mail transfer agent and use port number 587 for transport layer security to send e-mail. With this key, file can be decrypted and then provided to the user. Unbreakable security, effective storage and transmission, quicker processing and overall improved efficiency of this system makes it ideal for the enormous data handling in present day.

Last modified: 2020-04-30 00:39:31