Online Secure Data Service

You might also like

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 20

PRESENTED BY

20-08-2009 SREEJU,S7 CSE 1


CONTENTS

INTRODUCTION.
EXISTING SYSTEM.
PROPOSED SYSTEM.
SERVICES PROVIDED.
ADVANTAGES AND DISADVANTAGES
FUTURE ENHANCEMENTS
CONCLUSION.

20-08-2009 SREEJU,S7 CSE 2


INTRODUCTION
Its examines the proliferation of threats to
Internet consumer privacy and security and
their adverse impact

access appropriate information in a more


secure and precise manner.

Some of the threats are real, others are fears


based on misconceptions.

20-08-2009 SREEJU,S7 CSE 3


EXISTING SYSTEM

Send mails or Receive mails without any


security

Not Reliable Data transfer.

Any Hacker read mails ie, Send or


Received.

20-08-2009 SREEJU,S7 CSE 4


PROPOSED SYSTEM

File Encryption & Decryption.

E-mail Encryption & Decryption.

File compression & File Decompression.

Provide Data Authentication & Integrity.

Provide both Online Store & Forward


Technology.
20-08-2009 SREEJU,S7 CSE 5
LOCAL FILE
The files in the client machine can be
encrypted or decrypted and can be stored either locally
or in the server itself.

NETWORK FILE

The files from any of the machine in the


network can be stored either locally or in the
server itself.

20-08-2009 SREEJU,S7 CSE 6


VIRTUAL DIRECTORY

Provide a consolidated view of user identity


without having to construct an entire directory
infrastructure
Receives queries and directs them to the
appropriate data sources.
When the user data comes back, the directory
presents the data to the enterprise application
Technology ideal for consolidating data stored
in a distributed environment.
20-08-2009 SREEJU,S7 CSE 7
ADVANTAGES OF VIRTUAL
DIRECTORIES

Faster deployment by avoiding synchronization

Influence in existing investments in security and high-


availability for reliable data stores

Provide application specific views of identity data

Allow a single view of identity data without violating


internal or external regulations

prevent denial of service attacks on the primary data-


storage

Changes made in authoritative sources are reflected in


real-time

20-08-2009 SREEJU,S7 CSE 8


FILE ENCRYPTION AND DECRYPTION
Sensitive information sent over the internet by encrypting the data first.

Useful for storing private documents and files on PC

Works with both text information and files

Generates random passwords of any length.

Helps to keep passwords and associated information in safe and secure


manner

Invisible mode feature present to hide the program from task bar and
icons from menu

20-08-2009 SREEJU,S7 CSE 9


E-MAIL ENCRYPTION/DECRYPTION
vendors / dealer offer products that encrypt e-mail
messages, are easy to use and provide the ability to send
private data, including e-mail attachments

work by sending a link to the recipient, who then clicks


on it and logs on to a secure e-mail server, which the
organization either owns or outsource to an
appropriate vendor / dealer .

non-Web-based technology that allows transportation


of secure messages from one person or organization to
another, the most common of which is
public key infrastructure (PKI)

20-08-2009 SREEJU,S7 CSE 10


FILE COMPRESSION AND
DECOMPRESSION

File compression reduces the size of a file by


minimizing redundant data.

Takes an existing file or files and produce a file or files


that are compressed versions of the originals.

Application can only operate on such files with the


assistance of a file compression library

Editing is typically not supported, and seeking is limited


if supported at all.

20-08-2009 SREEJU,S7 CSE 11


WHY COMPRESS FILES?

These utilities allow two or more related files to be combined into a


single file. Makes it possible to transfer multiple files with a single
command.

It reduce the size of a file (or group of files). Take up less storage space
on the host and less time to transfer over the network.

Used to convert binary files to an encoded format using only ASCII


characters.

possible to transfer binary files via electronic mail other transport


method that does not ordinarily support binary data.
20-08-2009 SREEJU,S7 CSE 12
DATA AUTHENTICATION
Allows a receiver to verify that the data really was sent
by the claimed sender.

In the two-party communication case, data


authentication can be achieved through a purely
symmetric mechanism:

The sender and the receiver share a secret key to


compute a message authentication code (MAC) of all
communicated data.

When a message with a correct MAC arrives, the


receiver knows that it must have been sent by the
sender

20-08-2009 SREEJU,S7 CSE 13


DATA INTEGRITY
Refers to the validity of data. Data integrity can be
affected in a number of ways:
Human errors when data is entered
Errors that occur when data is transmitted from
one computer to another
Software bugs or viruses
Hardware malfunctions, such as disk crashes
Natural disasters, such as fires and floods

20-08-2009 SREEJU,S7 CSE 14


THREATS TO DATA INTEGRITY

Backing up data regularly


Controlling access to data via security
mechanisms
Designing user interfaces that prevent the
input of invalid data
Using error detection and correction software
when transmitting data

20-08-2009 SREEJU,S7 CSE 15


STORE AND FORWARD

The temporary storage of a message for


transmission to its destination at a later time.

Store and forward techniques allow for


routing over networks that are not accessible
at all times.

20-08-2009 SREEJU,S7 CSE 16


ADVANTAGES AND DISADVANTAGES

Advantages: Disadvantages:

Less Control
Savings

Closure of Online Company


Global Accessible

Safety

20-08-2009 SREEJU,S7 CSE 17


THE FUTURE OF INTERNET
SECURITY

Legacy Systems Security Tools

Threat The Cost of Storage

Consciousness The Internet

Operating Systems
Cryptographic Methods

20-08-2009 SREEJU,S7 CSE 18


CONCLUSION
Traditional security measures such as password and
identification cards cannot satisfy every security
requirement.

Security and privacy are two major issues that continue


to raise concerns with all those involved with the
Internet.

Internet is a different area than most of us are used to


dealing with in our daily lives.

One of the things that make it so difficult is that it is


always "on" -- the Internet never sleeps.

20-08-2009 SREEJU,S7 CSE 19


20-08-2009 SREEJU,S7 CSE 20

You might also like