Вы находитесь на странице: 1из 34

SYNOPSIS

The project entitled “FILE SECURITY SYSTEM” the project is a completely user-
friendly system for easy information to retrieval for customers.

All of us have some files and folders that we consider private. They can be anything
from our business documents to pictures of friends and family. These are files that we don’t
want other people using our computer to know about. As Windows offers no way to protect
our private information, most of us get in awkward situations when these files are discovered
by unwanted people.

Folder Protector offers each user a protected folder that can only be opened by
entering the password in Folder Protector. Unlike most security programs, Folder Protector is
small in size(nearly 58KB) and does not show the folder that it is protecting. This gives an
additional advantage that people who don’t know the password do not have a target to try and
hack their way into. As the software is portable, you can hide it or even delete it after
protecting your folder and no one will have a clue that it was used. Then whenever we need
to access protected files, we can re-download the program from this page, enter the password
and access your protected files.

The project entitled “FILE SECURITY SYSTEM” is a complete Software package


under Windows environment using Visual Basic 6.0 as the Front-end tool and Oracle9i as the
Back-end tool.

ii

0
1. INTRODUCTION

1.1ABOUT THE PROJECT

Encryption of data plays a vital role in the real time environment to keep the data out
of reach of unauthorized people, such that it is not altered and tampered. The File Security
System is software, which tries to alter the originality of the text into some encrypted form.

The major task of File Security System is to provide the user the flexibility of passing
the information implementing the encryption standards as per the specification and
algorithms proposed and store the information in a form that is unreadable. The Application
should have a reversal process as of which should be in a position to decrypt the data to its
original format upon the proper request by the user.

While the Encryption and Decryption is done the application should confirm the
standards of authentication and authorization of the user. The Entire application should strive
to achieve a user friendly Graphical User Interface, which need to be in a self-learning mode
for the end user. The System Should provide all the functional standards of proper navigation
with in the environment, which makes it possible for the users to have a smooth flow while
working under the environment.

The Overall system should provide proper menu based navigation for easier
navigation and operation. The Application should be designed in such a way that, as soon as
it starts create a Buffer and associate this buffer to some homogeneous data environment, the
application should ask the user for the Encryption Key details and should start its
functionality upon the logistics that are provided with in this key. The key should be designed
in such a way that it prevents the unauthorized persons from stealing the information at any
point of time.

The application of Decryption should be a reverse process at the other end and should
be translated only when the receiver of the data applies the proper reversal key. The
Decryption process should have a log-based methodology that will take care of any errors
that may be encountered while the system is under utilization and should record all those
events, which are above the general standards of security.

1
1.2. SYSTEM SPECIFICATION

1.2.1 HARDWARE SPECIFICATION

PROCESSOR : PENTIUM IV 1.8 GHZ AND ABOVE

RAM : 1024 MB DDR3

HARD DISK : 40 GB HDD

PRINTER : DOT MATRIX PRINTER

POWER SUPPLY : POWER BACKUP

1.2.2 SOFTWARE SPECIFICATION

OPERATING SYSTEM : WINDOWS XP

FRONT END : VISUAL BASIC 6.0

BACK END : ORACLE-9i

2
SOFTWARE FEATURES

WINDOWS XP

The operating system is a special type of program that loads automatically when you
start your computer. The operating system allows you to use the advanced features of a
modern computer without having to learn all the details of how the hardware works.
The link between the hardware and you, the user. Makes the computer easy to use
without having to understand bits and bytes. Windows uses a system of drive letters for
different physical drives you have access to. To help organize your files it is possible to create
folders (also referred to as directories) to help divide and even sub-divide the files stored
within the various logical drives available. Finally, at the very end of this structure are the
various files that we use.
FEATURES OF WINDOWS XP
 Windows uses a system of drive letters for different physical drives you have
access to.
 Finally, at the very end of this structure are the various files that we use.
 Reliable
 High system uptime
 Resilient to application failures
 Dynamic system configuration
 Manageable
 Centralized management

3
VISUAL BASIC 6.0

Visual basic is powerful programming system for developing sophisticated,


graphical, application for Microsoft window environment. Its productivity has been enhanced
by addition of a complete set of tools to simplify rapid application development and Internet
tacking.
Features such as easier comprehension, user friendliness, faster application
development and many other aspects such as introduction to ActiveX Technology and
internet features make Visual Basic 6.0 an interesting tool to work with.
Visual Basic 6.0 was developed from the BASIC programming language. In 1970’s
Microsoft got its start by developing ROM-based interpreted BASIC for the early
microprocessor based computers. In 1982, Microsoft Quick Basic revolutionized Basic and
legitimized as a serious development language for MS-DOS environment.

FEATURES OF VISUAL BASIC 6.0

The features included newly in Visual Basic 6.0 are,

 Own Visual basic Code


 Create ActiveX Controls
 Multithreaded Document Link Library’s
 Internal Transfer Control
 Join Photograph Expert Group and GIF support
 Create ActiveX Document

4
ORACLE 9i
The Oracle Corporation was the first company to offer a true RDBMS commercially
that is portable and connectable. Oracle 9i is Microsoft strategic language for rapid
application development (RAD).It is targeted at programmers, who need to build enterprise
application quickly and without lot of hard work. Oracle 9i has been designed with focus on
certain key development areas.

FEATURUES OF ORACLE 9i

 Oracle supports the largest of the database potentially terabytes in size. To make
efficient use of expensive hardware devices, it allows the full of space usage.
 Oracle supports large numbers of concurrent users executing a variety of database
application operating on the same data. It minimizes the data convention and
guarantees data concurrency.
 Oracle enforces data integrity. As a result, the cost of coding and managing checks
in many database applications is eliminated.
 Oracle software is ported to work under different operating system. Application
developed for Oracle can be ported to any system with little or no modification.
 Oracle maintains the preceding features with high degree of overall system
performance.
 Oracle can be selectively control the availability of data, at the database level and
sub-database level.
 Oracle has client-server environment with high availability and management
security.
 Oracle software allows the use to replicate groups of tables and their supporting
objects to multiple sites. Oracle supports replication of both data and schema level
changes to these sites

5
2. SYSTEM STUDY

The development of “FILE SECUIRTY SYSTEM” is done by following, the system


development life cycle method and structured analysis method. The system development
deals with analysis and design of the system. The system development and implementation of
the system.
The software to be developed is aimed to satisfy the requirement of the user. The
project will be flexible and easily adaptable to the feature changes. Three key consideration
involved in the feasibility analysis re operational technical and economical.

2.1 EXISTING SYSTEM

The existing system is only for the communication between the sender and receiver.
The information or messages are not send in a proper way. There is no protection with in the
sender and receiver. Although the sender and receiver belong to a single communication
network there should be proper protection facility within them. Security is a must because
only authorized and well known organization members should have the messages. All
existing system takes more times to process or it has less security level. In this existing
system there is no security to sending the files through the internet.

2.1.1 DRAWBACKS OF EXISTING SYSTEM

 Requires lot of overheads to hide the text

 Secret information is stolen by the thefts

 Breaking the password of the other user

 Takes more time to encryption and decryption

 Error occurrences is highly possible due to human negligence

6
2.2 PROPOSED SYSTEM

The project entitled FILE SECUIRTY SYSTEM is designed in a user friendly


manner. The user is required to select the encrypt and decrypt options depending upon their
requirement. The main objective of this project is to hide the text files in unreadable form and
then provide more security to the end use. The overhead of encrypt the files is very less and it
also takes less time. It is easy to use. There is no change to leap the original content. Secret
key maintains the secured files.

2.2.1 FEATURES OF PROPOSED SYSTEM

 It provides high security and reliability occurs

 For the sending messages, it can receive the proper acknowledgement

 The authorization is highly provided

 Quickly encrypt and decrypt

 Easily used and maintained

 User friendliness and reliability one

 No one break the key values

 Conversion methods are adopted from algorithm reduce time and cost

 Different type of reports can be easily taken than the existing system

 Current statement of the file is available to the user at any point of time

7
3. SYSTEM DESIGN AND DEVELOPMENT

3.1 FILE DESIGN

Design is the first step into the development phase for the system of FILE
SECUIRTY SYSTEM .Design is a creative process. A good design is the key to effective
system. The term “design” is defined as “the process of applying various techniques and
principles for the purpose of defining a process or a system in sufficient detail to permit its
physical realization”. It may be defined as a process of applying various techniques and
principles for the purpose of defining a device, a process or a system in sufficient detail to
permit its physical realization. Software design sits at the technical kernel of the software
engineering process and is applied regardless of the development paradigm that is used. The
system design develops the architectural detail required to build a system or product. As in
the case of any systematic approach, this software too has undergone the best possible design
phase fine tuning all efficiency, performance and accuracy levels. The design phase is a
transition from a user oriented document to a document to the programmers or database
personnel. System design goes through two phases of development: Logical and Physical
Design.

LOGICAL DESIGN

The logical flow of FILE SECUIRTY SYSTEM and define the boundaries of a
system. It includes the following steps:

 Reviews the current physical system – its data flows, file content, volumes ,
frequencies etc.
 Prepares output specifications – that is, determines the format, content and frequency
of reports.
 Prepares input specifications – format, content and most of the input functions.
 Prepares edit, security and control specifications.
 Specifies the implementation plan.

8
PHYSICAL DESIGN

Physical system produces the working of FILE SECUIRTY SYSTEM by defines the
design specifications that tell the programmers exactly what the candidate system must do. It
includes the following steps.

 Design the physical system.


 Specify input and output media.
 Design the database and specify backup procedures.
 Design physical information flow through the system and a physical design Walk
through.
 Plan system implementation.
 Prepare a conversion schedule and target date.
 Determine training procedures, courses and timetable.
 Devise a test and implementation plan and specify any new hardware/software.
 Update benefits , costs , conversion date and system constraints

3.2 INPUT DESIGN

Input design is the process of converting user-oriented input to a computer based


format. Input design is a part of overall system design of FILE SECUIRTY SYSTEM,
which requires very careful attention .Often the collection of input data is the most expensive
part of the system. The main objectives of the input design are …
 Produce cost effective method of input
 Achieve highest possible level of accuracy
 Ensure that the input is acceptable to and understood by the staff.

9
3.3 OUTPUT DESIGN
Outputs from computer systems are required FILE SECUIRTY SYSTEM primarily
to communicate the results of processing to users. They are also used to provide a permanent
copy of these result for latter consultation .Computer output is the most important and direct
source of information to the users. Designing computer output should proceed in an
organized well through out the manner. The right output must be available for the people who
find the system easy o use. The outputs have been defined during the logical design stage. If
not, they should defined at the beginning of the output designing terms of types of output
connect, format, response etc, Various types of outputs are

 External outputs
 Internal outputs
 Operational outputs
 Interactive outputs
 Turn around outputs

All screens are informative and interactive in such a way that the user can full fill his
requirements through asking queries.
3.4 DATABASE DESIGN

The general theme behind a database is to handle information as an integrated whole.


A database is a collection of interrelated data stored with minimum redundancy to serve many
users quickly and effectively. After designing input and output, the analyst must concentrate
on database design or how data should be organized around user requirements. The general
objective is to make information access, easy quick, inexpensive and flexible for other users.
During database design the following objectives are concerned.

 Controlled Redundancy
 Data independence
 Accurate and integrating
 More information at low cost

10
3.4.1 DESCRIPTION OF MODULES

FILE SECUIRTY SYSTEM is an integrated software deals with overall Folder


Protector offers each user a protected folder that can only be opened by entering the password
in Folder Protector.
ADMIN
 STUDENTS PROFILE

 STAFF PROFILE

 OPERATIONS

 REPORT

STUDENTS PROFILE

This module is used to maintain the basic information of student s database like
student id , name , major,branch, contact number , email id are details stored and
manipulated.

STAFF PROFILE

This module is used to maintain the basic information of staff s database like staff id ,
name , major,branch, contact number , email id are details stored and manipulated.

OPERATIONS

This module is used protect the folder .The Folder Protector offers each user a
protected folder that can only be opened by entering the password in Folder Protector. Unlike
most security programs, Folder Protector is small in size(nearly 58KB) and does not show the
folder that it is protecting.

REPORT

This module is used to view the students and staff report with the single page.

11
4.SYSTEM TESTING AND IMPLEMENTATION

4.1 SYSTEM TESTING


The system is used experimentally to ensure that the software will run according to
the specification and in the way the user expects. Each test case is designed with the intent of
finding errors in the way the system will process it.
Testing plays a very critical role in determining the reliability and efficiency of
software and hence is a very important stage in software development. Software testing is
done at different levels. They are the unit testing and system testing which comprises of
integration testing and acceptance testing.

1. Unit Testing
2. Integration Testing
3. Validation Testing
4. Acceptance Testing

1. UNIT TESTING

Unit test comprises of a set tests performed by an individual program prior to the
integration of the unit into large system. A program unit is usually the smallest free
functioning part of the whole system. Module unit testing should be as exhaustive as possible
to ensure that each representation handled by each module has been tested. All the units that
makeup the system must be tested independently to ensure that they work as required.

During unit testing some errors were raised and all of them were rectified and handled well.
The result was quiet satisfactory and it worked well.

2. INTEGRATION TESTING

Integration testing is a system technique for constructing the program structure while
at the same time conducting tests to uncover errors associated with interfacing. The objective
is to take unit tested modules and build a program structure that has been dictated by design.
Bottom-up integration is the traditional strategy used to integrate the components of a
software system into functioning whole. Bottom-up integration consists of unit test followed

12
by testing of the entire system. A sub-system consists of several modules that communicated
with other defined interface.

The system was done the integration testing. All the modules were tested for their
compatibility with other modules .They test was almost successful. All the modules coexisted
very well, with almost no bugs. All the modules were encapsulated very well so as to not
hamper the execution of other modules.

3. VALIDATION TESTING
After validation testing, software is completely assembled as a package, interfacing
errors that have been uncovered and corrected and the final series of software test; the
validation test begins. Steps taken during software design and testing can greatly improve the
probability of successful integration in the larger system. System testing is actually a series of
different tests whose primary purpose is to fully exercise the compute –based system.

4. ACCEPTANCE TESTING

User acceptance of the system is a key factor for the success of any system. The
system under consideration is tested for user acceptance by constantly keeping touch with
prospective system and user at the time of developing and making changes whenever
required.
This is done regarding to the following points.
 Input Screen Design
 Output Screen Design
 Format of the report and other output

13
4.2 SYSTEM IMPLEMENTATION

In proposed system it is design to provide a solution for drawback of present system.


Here private file and folder lock will be perform only by an authorized person. There only
have the rights to the customer.

Implementation is the stage, which is crucial in the life cycle of the new system
designed. The main stage in the implementation is planning, training, system testing. Every
developed system must be implemented to fulfill the mode of development. There are many
software implementation methods. In this system, direct change over from existing system to
computer system is carried.

This implementation plans involving planning, investigation of the current system and
its constraints on implementation, design the methods to achieve the change over and
evaluation to change over methods. After system is implemented, user conducts a review of
the system. It is used to gather information for the maintenance of the system. The basic
review method is a data collection method of questionnaire, interview etc.

14
5.CONCULSION

The project entitled” FILE SECUIRTY SYSTEM” entitled is highly interactive. The
system has been developed in Microsoft Visual Basic 6.0 as front end and MS-Access as back
end in Windows7 Professional platform. The database approach of developing the system was
helped.
The project has been developed in a structured manner which helps further
development which can be done very easily. The coding is done in a simplified and this is
understandable and flexible which helps in cooperating major changes also possible. While
designing the system all user requirements are considered and implemented in this system.
Thus no more changes are required in the present system at user point of view.

FUTURE ENHANCEMENT

Although this “FILE SECUIRTY SYSTEM” almost satisfies all the requirements of
the user and admin, there is further developed in this system into better form in the following
are:
 Further security can be improved
 The design of this package can be extended

15
BIBLIOGRAPHY

BOOK REFERENCE
1. A. Russell Jones, “Visual Studio 6.0”, “BPB Publications”, First Indian Edition,
2002.
2. Elias M. Awad, “System Analysis and Design”, Galgotia Publications Ltd, Second
Edition, 1997.
3. Ragu Ramakrishnan, Johannes Gehrke, “Database Management System”, Third
Edition, 1997.
4. Roger S. Pressman, “Software Engineering”, Tata McGraw Hill Publications, Fifth
Edition, 2001.
5. Tenkins G.M. and Walts D.G., “Spectral Analysis and Application”,
Sanfrancisco, CA Holder Day 1968.

URL REFERENCE

1. http://www.autoindia.com

2. http://www.allvbcodes.com

3. http://w3schools.com

4. http://vbtut.com

5. https://www.sourcecodester.com/

6. https://learn.oracle.com/

7. https://www.tutorialspoint.com

8. https://1000projects.org/

9. https://www.vbtutor.net/

10. https://www.oracle.com

16
APPENDIX

A.DATA FLOW DIAGRAM

Admin

Student Staff

Student

Report

Student Details Staff

Report
Staff Details

Plain Text

Encipher with
Plain Text
Plain Text Cipher Text

Transmit
Cipher Text

17
B.TABLE STRUCTURE
1. Table name : Login
Purpose : This table stores the details about the login information.

S.NO FIELDNAME DATA TYPE SIZE CONSTRAINTS DESCRIPTION

1 Username Varchar2 10 Not Null Username

2 Pwd Varchar2 15 Not Null Password

2.Table Name: Student

FIELD DATA TYPE SIZE CONSTRAINTS DESCRIPTION


NAME
Stu-id Number 10 Primary key Student identification
Stu-name Varchar2 25 Not Null Student name
Dept Varchar2 20 Not Null Department
Major Varchar2 10 Not Null Major
Cno Number 10 Not Null Contact Number
E-mail Varchar2 30 Not Null E-mail

Purpose : This table is used to store Student details

18
3.Table Name: Staff

Purpose :This table is used to store staff details

FIELD NAME DATA TYPE SIZE CONSTRAINTS DESCRIPTION


Staff-id Number 10 Primary key Staff identification
Staff-name Text 25 Not Null Staff name
Dept Text 20 Not Null Department
Major Text 10 Not Null Major
Cno Number 10 Not Null Contact Number
E-mail Text 30 Not Null E-mail

19
C.SAMPLE CODING

LOGIN FORM
Dim db As ADODB.Connection

Dim rs As ADODB.Recordset

Dim con As String

Private Sub Command1_Click()

rs.AddNew

rs(0) = Text1.Text

rs(1) = Text2.Text

rs.Update

MsgBox "Login Succeed"

MDIForm1.Show

End Sub

Private Sub Command2_Click()

Unload Me

End Sub

Private Sub Form_Load()

con = "Provider=Microsoft.Jet.OLEDB.4.0;Data
Source=E:\folderlock\folderlock.mdb;Persist Security Info=False"

Set db = New ADODB.Connection

Set rs = New ADODB.Recordset

20
db.CursorLocation = adUseClient

db.Open con

rs.Open "select *from login", db, adOpenDynamic, adLockPessimistic

Me.WindowState = 2

End Sub

STUDENTS PROFILE
Dim db As ADODB.Connection

Dim rs As ADODB.Recordset

Dim con As String

Private Sub Command1_Click()

rs.MoveLast

no = rs.Fields("stuid")

Text1.Text = no + 1

Text2.Text = ""

Text3.Text = ""

Text4.Text = ""

Text5.Text = ""

Text6.Text = ""

Text2.SetFocus

End Sub

Private Sub Command10_Click()

Unload Me

End Sub

Private Sub Command2_Click()

rs.AddNew

rs(0) = Text1.Text

rs(1) = Text2.Text

21
rs(2) = Text3.Text

rs(3) = Text4.Text

rs(4) = Text5.Text

rs(5) = Text6.Text

rs.Update

MsgBox "Record Saved"

End Sub

Private Sub Command3_Click()

X = InputBox("Enter the Student ID you want to search for", search)

If Trim(X) = " " Then

MsgBox ("The Student Number Must Be Give")

Exit Sub

End If

rs.MoveFirst

While Not rs.EOF

If UCase(Trim(X)) = UCase(Trim(rs(0))) Then

Call display

Exit Sub

End If

rs.MoveNext

Wend

MsgBox "Please Verify The Number"

End Sub

Private Sub Command4_Click()

rs(0) = Text1.Text

rs(1) = Text2.Text

22
rs(2) = Text3.Text

rs(3) = Text4.Text

rs(4) = Text5.Text

rs(5) = Text6.Text

rs.Update

MsgBox "Modified Record Successfully"

End Sub

Private Sub Command5_Click()

rs(0) = Text1.Text

rs(1) = Text2.Text

rs(2) = Text3.Text

rs(3) = Text4.Text

rs(4) = Text5.Text

rs(5) = Text6.Text

rs.Delete

MsgBox "Record Deleted"

End Sub

Private Sub Command6_Click()

rs.MoveFirst

Text1.Text = rs.Fields(0)

Text2.Text = rs.Fields(1)

Text3.Text = rs.Fields(2)

Text4.Text = rs.Fields(3)

Text5.Text = rs.Fields(4)

Text6.Text = rs.Fields(5)

MsgBox "This is the first record"

23
End Sub

Private Sub Command7_Click()

rs.MoveNext

If (rs.EOF = True) Then

MsgBox "No more record"

Exit Sub

End If

Text1.Text = rs.Fields(0)

Text2.Text = rs.Fields(1)

Text3.Text = rs.Fields(2)

Text4.Text = rs.Fields(3)

Text5.Text = rs.Fields(4)

Text6.Text = rs.Fields(5)

End Sub

Private Sub Command8_Click()

rs.MovePrevious

If (rs.BOF = True) Then

MsgBox "no more record"

Exit Sub

End If

Text1.Text = rs.Fields(0)

Text2.Text = rs.Fields(1)

Text3.Text = rs.Fields(2)

Text4.Text = rs.Fields(3)

Text5.Text = rs.Fields(4)

Text6.Text = rs.Fields(5)

End Sub

24
Private Sub Command9_Click()

rs.MoveLast

Text1.Text = rs.Fields(0)

Text2.Text = rs.Fields(1)

Text3.Text = rs.Fields(2)

Text4.Text = rs.Fields(3)

Text5.Text = rs.Fields(4)

Text6.Text = rs.Fields(5)

MsgBox "This is the last record"

End Sub

Private Sub Form_Load()

con = "Provider=Microsoft.Jet.OLEDB.4.0;Data
Source=E:\folderlock\folderlock.mdb;Persist Security Info=False"

Set db = New ADODB.Connection

Set rs = New ADODB.Recordset

db.CursorLocation = adUseClient

db.Open con

rs.Open "select *from student", db, adOpenDynamic, adLockPessimistic

Me.WindowState = 2

End Sub

25
D.SAMPLE INPUT
LOGIN

MAIN FORM

26
STUDENTS PROFILE

STAFF PROFILE

27
FILE SECUIRTY

SELECT FILE TO LOCK

28
SET SECURITY TO LOCK FILE

LOCK FILE

29
FILE SECURITY FORMAT

UNLOCK FILE

30
UNLOCK FILE

31
E.SAMPLE OUTPUT
STUDENTS REPORT

32
STAFF REPORT

33

Вам также может понравиться