International Journal of Technology Enhancements and Emerging Engineering Research (ISSN 2347-4289)

IJTEEE >> Volume 2 - Issue 3, March 2014 Edition

International Journal of Technology Enhancements and Emerging Engineering Research  
International Journal of Technology Enhancements and Emerging Engineering Research

Website: http://www.ijteee.org

ISSN 2347-4289

Secured File Management Over Internet

[Full Text]



Balasaheb B. Gite, Shailesh Navghare, Abhishek Gupta, Siddharth Jain



Keywords : Primary key; P ublic key; Cryptography; Digital Signature; Encryption; Decryption (keywords)



ABSTRACT: Today’s economy is increasingly based on information flow. Getting the right information to the right person at the right time is the key strategy for secured file transfer. It is critical that the execution of this strategy ensures that the storage and transfer of information is reliable and secure. File transfer must provide end-to-end visibility, security and compliance management. A secure and managed file transfer approach can help the user to meet the challenge of safely and reliably exchanging electronic information. The purpose of this project is to present an online platform to manage and share files. Different categories of users use various medium to manage and transfer files over internet. The project presents a solution so that users can communicate and exchange the important files in a secured way. The abstract presents Secured File Management and Sharing System over the internet developed using the J2EE technologies. (Abstract)



[1] Secure file management system over internet by Hua Zhang, Jun – Fen Diao, Qiao – Yan Wen, university of posts and telecommunication (2008)

[2] P2P applied for CMS for advertising by Oliver Batz,Carston Kleiner- Arnekosehel FH Hannover – Uni-versity of App. Sci and Arts(2009)

[3] Secure File Sharing in JXTA using Digital Signature – Erita Skendag, Marenglen Biba – University of NY Tira-na(2012)

[4] Information security of Remote File transfer with mobile Devices – Sami Noponen, Kaarina Karppnen(2008)

[5] Network Traffic Monitoring Using Intrusion Detection System by Prof. Radha S Shirbate, Prof. Pallavi Patil(2012).

[6] Analytical framework for measuring network security using exploit dependency graph by P.Bhattacharya,S K Ghosh(2012).

[7] Moving towards network security and firewalls for protecting and preserving private resources on Internet by Dr.S.S. Riaz Ahmed(2008)

[8] Research On File transfer task scheduling method Ingrid environment by wenshung wang, Nengfu Xie

[9] Three Tier encryption algorithm for secured file transfer by Bhargav balakrishnan(2010)

[10] Design and implementation of file transfer and web service guard employing cryptographically secured XML security labels by Andreas Thunnel, member,IEEE and Knut Eckstein(2006).