Document Management System With Enhanced Security
Document Management System With Enhanced Security
Document Management System With Enhanced Security
org
ABSTRACT : This paper provides the design of a Document Management System designed for a Small to
Medium scale enterprises with a special emphasis on security, it also describes a new symmetric encryption algorithm Secured Quick Crypt and its unique block chaining mechanism. Along with this, various other small enhancements in terms of Compression, Abstraction and File Versioning have also been described in the paper.
Keywords compression; document management system; file versioning; level of abstraction; security I. INTRODUCTION
The Enhanced Document Management system is a document management system for small to medium organizations for efficient management of electronic documents in their organization. Up till now, there has not been a proper solution for managing documents that is affordable for small and medium sized enterprises. Documents are still transferred from one department to another by physical means (such as pen-drives and CDs), or are mailed via some web services (Email, file sharing solutions etc). Even if the organization has a file-server and a LAN setup, it still is not the most efficient way to manage the documents. Thus, there arises a need for a Document Management System [1] for effective document management for various enterprises and government agencies. Various software solutions like documentum (from EMC Corporation) and sharepoint (from Microsoft) came into existence to solve this need. However these existing systems are all web based and dont offer many benefits in terms of security, abstraction (level), compression [2, 3, 4], and affordability for small and medium scale organization. Thus, in our paper, we are designing and giving a layout of an efficient Document Management System as solution that addresses the needs of the organizations in todays competitive world in a cost effective manner.
II.
ARCHITECHTURE
In the following Architecture diagram we show how client machines are connected to the central server in order to perform different functionality for EDMS (Enhanced Document Management System) .The clients machine may be connected through wireless connection or wired connection to the server .The central server contain different module such as web server, database, third party server and secondary storage.
Fig A.1 Architecture Diagram of the EDMS Although a simple Client/Server Model has been followed for the architecture, some of the features that are provided to enhance its capability will make it a unique and affordable system for the SME enterprises
III.
18 | Page
After performing these 5 Steps, we receive a block of the cipher text (in Unicode). Only one round is applied for each block. We are also providing a chaining mechanism by sending the current round key to be the cipher key of the next round. The method to generate the round key is as follows: 1. Swap the first and last columns of the cipher key. 2. Right rotate 2nd row of the cipher key once. 3. Left rotate 3rd row of the cipher key twice. 4. XOR First and last rows of the cipher key.
PLAINTEXT BLOCK 1 ENCRYPTION RK1 PLAINTEXT BLOCK 2 ENCRYPTION RK2
K1
K2
CIPHERTEXT
CIPHERTEXT
CIPHERTEXT
Fig A.3 Block Diagram of the Secured Quick Crypt Encryption As seen in Figure 3, the mode of operation is slightly different from the usual modes. Since we have to compensate for the less number of rounds that each block of plaintext undergoes, we are sending the round key of the last round to be the cipher key of the next round. Thus a level of pseudo-randomness is generated amongst the entire text. A Crypt analyst would find different Cipher text for the same plaintext repeated in the course of document [8]. Another major advantage of have this unique mode of cipher is because unlike Code Block Chaining (CBC), we can parallelize the operation of encrypting or decrypting the file while keeping the pseudo randomness intact. Let us now see how it would benefit us in the chaining operation. We shall consider the overview of the entire encryption process:
www.iosrjournals.org
19 | Page
Given below is a table that compares our Secured Quick Crypt Technique with the standard AES encryption technique. TABLE I
COMPARISION BETWEEN SQC AND AES
Requires 10 Rounds per Block : Slower Converts hexadecimal values (0-FF) to different hexadecimal values(0-FF) : no diffusion Loop unrolling not present : no CPU optimization Complicated mix column step Normal mode of operation :
Requires 1 Round per Block : Faster Converts hexadecimal values (0-FF) to Unicode values in range (0-FFFF) : diffusion
Loop unrolling is present : CPU cycle optimization Simpler mix column step
www.iosrjournals.org
20 | Page
According to the comparison, Secured Quick Crypt works more effectively than the Advanced Encryption Standard in terms of the diversity that the output gets, thus we see the avalanche effect. The table below is an example of the encryption outputs of Secured Quick Crypt and AES for the same key : 880079511D768FA81C3D93901BDFB3C8. TABLE II
ENCRYPTION EXAMPLE OF SQC
B. Data (file) Compression This feature shall compress the size of the encrypted file which resides over on the server. The encrypted file has a size that is larger than the plaintext file. Thus compression shall allow us to optimize the size of the encrypted document. The system uses the gzip compression technique as it gives us a fair ratio of the size of the data (file) and the time required to compress it when compared with other popular compression techniques. C. Level of Abstraction This feature ensures that the document access is restricted to the authorized department (even within the organization) and for the authorized employee only.
Fig A.4 Hierarchy of the Directories used for storing files on server Fig.4 shows the fundamental structure of directories for the central server used for the purpose of file storage. An Employee working on a client machine will store and retrieve documents within his/her own directory stored inside the department. The system allows an employee access to only his/her files and not of any other employee. Also files from one particular department will not be authorized for employees of the other department. Documents that are common to all departments should be put in a common directory to which every employee has access. For E.g.: A Marketing employee cannot access files from the Engineering Department of an organisations. However files containing public information must be put in the common directory folder, so that all the employees from all the departments can have access of it. D. File Versioning
www.iosrjournals.org
21 | Page
Fig A.5 Directory structure for File Versioning E. Searching Technique Every good Document Management System must provide a search feature that enables its users to quickly find a particular file kept in the system. So a general approach would be to keep all the file information (file name, location, user,etc) in a table inside the backend DBMS, whenever a user will search for a file, its entry would be checked in that table. And the file would be retrieved for the user, depending on relevance to the user that asked for it. This approach has a drawback; as the number of files in the system keeps on increasing, the time taken to fetch a file increases as well. We have a simple and cost effective solution for the above shortcoming. In EDMS, we are using a searching technique whose idea is taken from hash partitioning. The goal is to increase the speed of searching a file kept centrally. In general circumstances, there will be 36 tables from a-z/A-Z and 0-9 which will store the file(s) according to their initial alphabet or number into appropriate table. E.g. a file named sales_q4 will be saved in table S. Whenever user will enter the file name for searching, the system will check the first character of file name with table and the list of files starting from that character will be displayed. System will go on matching the file name with existing file character by character within the table. To simulate the efficiency of this technique, we have taken a list of 2468 entries in a single table, and also created three different tables containing entries from the original table starting with A, M and Y respectively. We shall now compare the time taken to execute the query for search on the big single table and in the separate tables. TABLE III
COMPARISON OF SEARCHING TECHNIQUES
From the table, you can see that even the worst case (entry beginning with A) is 1.69 times faster than search done on a single table. The entry beginning with M is searched twice as fast as in the single table (average case). And finally, the entry beginning with Y is searched 2.14 times faster (best case).
www.iosrjournals.org
22 | Page
IV.
V.
CONCLUSIONS
In this paper, the authors wish to design and implement a document management system for a small to medium scale organization. This paper acknowledges the fact that merely having a simple storage/retrieval system is not enough, and hence we have stressed upon some features to enhance the basic DMS that are very useful in terms of security, optimal disk usage, level of abstraction and productivity of the employees within an organization. In summary we provide a collection of features that enhance the traditional document management systems in such a way that is relevant to todays organizational needs.
ACKNOWLEDGMENT
It is with great pleasure that we are presenting this paper. This paper aims to explain such a system, along with its goal, in a simple language. Firstly, we would like to thank all people who have contributed to this effort. We are deeply indebted to our Principal Dr. S.D.Lokhande for providing us all the required facilities. We are thankful to our Head of Department Prof.P.R.Futane for his support. We owe our sincere gratitude to our project guide Prof.M.K.Kodmelwar, for his valuable Guidance and co-operation. He has been of great help with his valuable and timely inputs to the Project .Last but not the least we would like to thank all the staff members from department and my colleagues for their indispensable help all time.
REFERENCES
[1] [2] [3] [4] [5] [6] [7] [8] [9] [10] HEDIYEH BABAN,SALIMAH MOKHTAR, O NLINE DOCUMENT MANAGEMENT SYSTEM FOR ACADEMIC I NSTITUTES, 28 NOV. 2010, VOLUME : 4,315-319 Konecki, M.; Kudelic, R.; Lovrencic, A., Efficiency of lossless data compression,23-27 May 2011, 810-815 Zia, Z.K.; Rahman, D.F.; Rahman, C.M., Two-Level Dictionary-Based Text Compression Scheme, 24-27 Dec. 2008, 13 18 Jonghyun Lee, Marianne Winslett, Xiaosong Ma, Shengke Yu, Enhancing Data Migration Performance via Parallel Data Compression, 2002, 444 451 Xin Zhou ; Xiaofei Tang, Research and implementation of RSA algorithm for encryption and decryption, 22-24 Aug. 2011, Volume : 2, 1118 1121 Bhargav Balakrishnan, Three Tier Encryption Algorithm for Secured File,19-21 Mar 2010, Volume : 2, 259 263 Gang Hu, Study of File Encryption and Decryption System using Security Key,16-18 April 2010, Volume : 7, V7-121 - V7-124 Hiroki Endo, Yoshihiro Kawahara, and Tohru Asami, A Self-Encryption Based Private Storage System Over P2P Distribution File Sharing Infrastrure, 12-13 May 2008, 69 76 Xiang Xiao-Jia; Shu Ji-Wu; Xue Wei; Zheng Wei-Min, Design and Implementation of an Efficient Multi-version File System, 29-31 July 2007, 277 278 Maohua Lu; Chiueh, T., File Versioning for Block-Level Continuous Data Protection, 22-26 June 2009, 327 - 334
www.iosrjournals.org
23 | Page