FTP Abstract
-
Upload
prashvirus -
Category
Documents
-
view
262 -
download
0
Transcript of FTP Abstract
-
7/29/2019 FTP Abstract
1/3
FTP and Data Security
Abstract
Data Security has become a necessity in a LAN based system. It is very easy for an intruder
to interrupt file transfer in a closed LAN system. There are number of clients connected to a
server in a closed network. The clients can easily intrude the files being sent between a
client and the server. In this project we will be using FTP to send encrypted and compressed
data to the server. The project is divided into modules. Clients can send shared data using
File Transfer Protocol. In order to maintain the security of the data clients can encrypt
confidential data into images and then transfer it to the server. Only server will have the
decryption system. Similarly clients can also send compressed data to the server. If
interrupted by any intruder, the compressed file will only contain a garbage value i.e. the
original data is secured. Only server will have the decompression system. For
communication purpose, we will be incorporating a client server based chat system.
Clients connected to the server can chat with each other and the server will get every detail
about it.
Existing System
The other two common forms of file transfer are HTTP and peer-to-peer (P2P). HTTP is a
website that users can use to either download files or save entire pages of information.
HTTP is the information you see in your web browser anytime you use HTTP at the
beginning of your web address bar. Unlike FTP, users cannot upload information to the HTTP
web server. This makes HTTP much more secure because it helps cut down on spam and
other irrelevant file uploads. The downside of using HTTP is that it's not the best way totransfer large files since the user will have to download each file separately, making it much
slower than FTP.
Peer to peer (P2P) does not have a server that holds all of the files available for transfer.
Instead, individual computers host the files and then other computers can access the files
on the other computers. This means that one computer can have many people downloading
files from it. For large based networks, P2P is not a desirable method of file transfer because
it can make computer systems run slower making it inefficient.
-
7/29/2019 FTP Abstract
2/3
Now FTP is the best data transfer protocol available. But security risks involving data
transfer is high. All the organisations use the simple FTP and a firewall for security. But when
the firewall of the system is down or hacked then it becomes easier for the intruder to hack
into the confidential database.
Proposed System
We propose a system of FTP after the failure of security protection like firewalls. While
transferring data we use the traditional method of cryptography and file compression to
avoid any security risks while transferring the confidential data from client to server. File
compression techniques is not only used to transfer files of large quantity but also the
garbage value it produces helps in data security. We also propose a simple client server chat
system that exists in an organisation.
Module Description
File Transfer Protocol:
File Transfer Protocol (FTP) is a standard Internet protocol for transmitting files between
computers on the Internet. It's commonly used to download programs and other files to
your computer from other servers. As a user, you can use FTP with a simple command line
interface (for example, from the Windows MS-DOS Prompt window) or with a commercial
program that offers a graphical user interface. In a closed network, the different clients can
send files to the server in order to communicate with it.
Image Steganography:
Steganography is the dark cousin of cryptography, the use of codes. While cryptography
provides privacy, Steganography is intended to provide secrecy. Privacy is what you need
when you use your credit card on the Internet -- you don't want your number revealed to
the public. For this, you use cryptography, and send a coded pile of gibberish that only the
web site can decipher. Though your code may be unbreakable, any hacker can look and see
you've sent a message. For true secrecy, you don't want anyone to know you're sending a
message at all. In a closed network, the clients cannot send confidential data to the server.
So the clients can encrypt the data into an image and transfer it to the server using FTP. In
-
7/29/2019 FTP Abstract
3/3
this way even if the transferred data is hacked the intruder can only see an image sent and
not the actual data. The server can decrypt the image for the data.
File Compression:
File compression is used to compress a large file being transferred in order to avoid traffic
congestion in a close network. In this project we are not only using the compressor for
transferring large quantity files but also used for the security of the data. The clients can
compress the secure data and send it to the server. In this way even if the transferred data
is hacked the intruder can only see a garbage value of the data sent as it is compressed. The
server can decompress the data later.
Client-Server Chat System:
Chat System is one of the most common features available in a networking environment.
Here the clients connected to a single server can easily communicate with each other. The
server will get a detailed report of the clients connected to the network and also about the
communication taking place between the clients.
System Requirements
Software Requirements:
Operating system : Windows XP Technology Used : C#.net IDE : Microsoft Visual Studio 2008, MS Access Tools used : .Net Framework
Hardware Requirements
Processor : Pentium P4 Motherboard : Genuine Intel RAM : Min 1 GB Hard Disk : 80 GB