FTP Abstract

download FTP Abstract

of 3

Transcript of FTP Abstract

  • 7/29/2019 FTP Abstract

    1/3

    FTP and Data Security

    Abstract

    Data Security has become a necessity in a LAN based system. It is very easy for an intruder

    to interrupt file transfer in a closed LAN system. There are number of clients connected to a

    server in a closed network. The clients can easily intrude the files being sent between a

    client and the server. In this project we will be using FTP to send encrypted and compressed

    data to the server. The project is divided into modules. Clients can send shared data using

    File Transfer Protocol. In order to maintain the security of the data clients can encrypt

    confidential data into images and then transfer it to the server. Only server will have the

    decryption system. Similarly clients can also send compressed data to the server. If

    interrupted by any intruder, the compressed file will only contain a garbage value i.e. the

    original data is secured. Only server will have the decompression system. For

    communication purpose, we will be incorporating a client server based chat system.

    Clients connected to the server can chat with each other and the server will get every detail

    about it.

    Existing System

    The other two common forms of file transfer are HTTP and peer-to-peer (P2P). HTTP is a

    website that users can use to either download files or save entire pages of information.

    HTTP is the information you see in your web browser anytime you use HTTP at the

    beginning of your web address bar. Unlike FTP, users cannot upload information to the HTTP

    web server. This makes HTTP much more secure because it helps cut down on spam and

    other irrelevant file uploads. The downside of using HTTP is that it's not the best way totransfer large files since the user will have to download each file separately, making it much

    slower than FTP.

    Peer to peer (P2P) does not have a server that holds all of the files available for transfer.

    Instead, individual computers host the files and then other computers can access the files

    on the other computers. This means that one computer can have many people downloading

    files from it. For large based networks, P2P is not a desirable method of file transfer because

    it can make computer systems run slower making it inefficient.

  • 7/29/2019 FTP Abstract

    2/3

    Now FTP is the best data transfer protocol available. But security risks involving data

    transfer is high. All the organisations use the simple FTP and a firewall for security. But when

    the firewall of the system is down or hacked then it becomes easier for the intruder to hack

    into the confidential database.

    Proposed System

    We propose a system of FTP after the failure of security protection like firewalls. While

    transferring data we use the traditional method of cryptography and file compression to

    avoid any security risks while transferring the confidential data from client to server. File

    compression techniques is not only used to transfer files of large quantity but also the

    garbage value it produces helps in data security. We also propose a simple client server chat

    system that exists in an organisation.

    Module Description

    File Transfer Protocol:

    File Transfer Protocol (FTP) is a standard Internet protocol for transmitting files between

    computers on the Internet. It's commonly used to download programs and other files to

    your computer from other servers. As a user, you can use FTP with a simple command line

    interface (for example, from the Windows MS-DOS Prompt window) or with a commercial

    program that offers a graphical user interface. In a closed network, the different clients can

    send files to the server in order to communicate with it.

    Image Steganography:

    Steganography is the dark cousin of cryptography, the use of codes. While cryptography

    provides privacy, Steganography is intended to provide secrecy. Privacy is what you need

    when you use your credit card on the Internet -- you don't want your number revealed to

    the public. For this, you use cryptography, and send a coded pile of gibberish that only the

    web site can decipher. Though your code may be unbreakable, any hacker can look and see

    you've sent a message. For true secrecy, you don't want anyone to know you're sending a

    message at all. In a closed network, the clients cannot send confidential data to the server.

    So the clients can encrypt the data into an image and transfer it to the server using FTP. In

  • 7/29/2019 FTP Abstract

    3/3

    this way even if the transferred data is hacked the intruder can only see an image sent and

    not the actual data. The server can decrypt the image for the data.

    File Compression:

    File compression is used to compress a large file being transferred in order to avoid traffic

    congestion in a close network. In this project we are not only using the compressor for

    transferring large quantity files but also used for the security of the data. The clients can

    compress the secure data and send it to the server. In this way even if the transferred data

    is hacked the intruder can only see a garbage value of the data sent as it is compressed. The

    server can decompress the data later.

    Client-Server Chat System:

    Chat System is one of the most common features available in a networking environment.

    Here the clients connected to a single server can easily communicate with each other. The

    server will get a detailed report of the clients connected to the network and also about the

    communication taking place between the clients.

    System Requirements

    Software Requirements:

    Operating system : Windows XP Technology Used : C#.net IDE : Microsoft Visual Studio 2008, MS Access Tools used : .Net Framework

    Hardware Requirements

    Processor : Pentium P4 Motherboard : Genuine Intel RAM : Min 1 GB Hard Disk : 80 GB