Вы находитесь на странице: 1из 3

ABSTRACT In this project we are conducting the investigation studies over the IT auditing for assuming the security

for cloud computing. During this investigation, we are implementing working of IT auditing mechanism over the cloud computing framework in order to assure the desire level of security. In the IT auditing mechanism, the concept of checklists are prepared for the cloud computing application and their lifecycle. Those checklists are prepared on the basis of models of cloud computing such as deployment models and services models. With this project our main concern is to present the cloud computing implications for large enterprise applications like Customer elationship !anagement and achieving the desired level of security with design and implementation of IT auditing techni"ue. #s results from practical investigation of IT auditing over the cloud computing framework, we claim that IT auditing assuring the desired level of security, regulations, compliance for the enterprise applications like Customer elationship !anagement.
EXISTING SYSTEM:

$ere the customer sending file information is stored in the encrypted format in database. Then the user can be decrypted to download the file from database, it is only possible for authori%ed user.
PROPOSED SYSTEM:

In the &ncryption techni"ue, if new user is to send the file with the private key, in this file is saved in encrypted format in table. 'o this private information is not known to any other user .so it is better security to our application. #lso we have provided the decryption techni"ue for the user to read the information is correct or not by showing it on below the encryption table. This data is known to only that user which is login.

MODULE

(. &ncryption !odule ). Decryption !odule Module 1: Encryp !on Module The user to send the file in encrypted format using '# algorithm and then that file is stored in our database with uni"ue private key and public key. Then the authori%ed download user only to view that private key after to access that file using the private key. Module ": Decryp !on Module This module is used to download the file in plain te*t format using cryptography techni"ues. The sender, send the private key to the receiver, when the receivers to enter the public key that time to display our private key to the receiver.

SYSTEM RE#UIREMENTS $%rd&%re Re'u!re(en ): +rocessor $ard Disk 1loppy Drive !onitor !ouse #! , , , , , , Intel Duel Core. -. /0. (.22 !b. 3CD Colour. 4ptical !ouse. 5() !b.

So* &%re Re'u!re(en ): 4perating system Coding 3anguage Data 0ase , , , Windows 6+. #'+.7et with C8 9'+(: ';3 'erver )..5

Вам также может понравиться