Report of File Sharing..

Download as pdf or txt
Download as pdf or txt
You are on page 1of 11

GOVERNMENT ENGINEERING COLLEGE BHARATPUR

NH-11 VILL-SHYORANA, NEAR SEWAR, BHARATPUR

Project – Blockchain-based supply chain management System

SUBMITTED BY - SUBMITTED TO-

Name – Krishan Yadav &Krishna Patel Name - Sumit Kumar

Branch – Computer Science Branch – Computer Science

Roll No - 20EELCS26 & 20EELCS27


DECLARATION
we, Krishan Yadav and Krishna Patel, hereby declare that this report, titled "Blockchain-Based
Supply Chain Management System," is a comprehensive account of my own research and work
conducted under the guidance of Sumit Kumar. All information, data, and material utilized from
external sources have been appropriately acknowledged and cited in accordance with the
prescribed academic guidelines.

we affirm that this report is the result of my original effort and that it has not been previously
submitted in part or in its entirety for any other purpose or assessment. I further assert that the
content presented in this report is authentic, accurate, and reflective of the methodologies
employed and the findings obtained during the course of this project.

we acknowledge that any intellectual property rights associated with the development or
implementation of the blockchain-based supply chain management system described in this report
reside solely with the respective owners. Any references made to commercial products, services,
or organizations are for informational purposes only and do not imply endorsement or affiliation.

we understand that any failure to adhere to the principles of academic honesty, including but not
limited to plagiarism or misrepresentation of sources, may result in disciplinary action as per the
policies and regulations of GOVERNMENT ENGINEERING COLLEGE BHARATPUR.

Signature: Krishan Yadav and Krishna Patel

Date: 05-06-2023
ACKNOWLEDGEMENT
we would like to express my sincere gratitude to all individuals who have contributed to the
successful completion of this project and the preparation of this report.

First and foremost, we extend my deepest appreciation to my supervisor, Sumit Kumar, for their
invaluable guidance, support, and expertise throughout the entire duration of this project. Their
insightful feedback and constructive suggestions have been instrumental in shaping the direction
and quality of this work.

we also thankful to the faculty members of Computer Science Department for providing a
conducive academic environment and imparting the necessary knowledge and skills that have
greatly contributed to the development of this project.

we extend our heartfelt thanks to the participants and stakeholders who willingly shared their
insights and experiences, which enriched my understanding of the challenges and intricacies of
supply chain management in the context of blockchain technology.

Furthermore, we grateful to our friends and family for their unwavering encouragement,
understanding, and support during this endeavor. Their motivation and belief in my abilities have
been a constant source of inspiration.

Lastly, we would like to express my appreciation to all the authors, researchers, and contributors
whose works and publications have served as valuable references and sources of information for
this report.

This project would not have been possible without the collective efforts and support of all these
individuals, and we sincerely thankful for their contributions.

Signature: Krishan Yadav & Krishna patel

Date: 05-06-2023
INDEX
1 ABSTRACT
2 INTRODUCTION
3 RELATED WORK:
• PROJECT BACKGROUND
• PROJECT PERSPECTIVE
• FUNCTION
4 WEB APPLICTION LAYERS AND IMPLIMENTATION
REQUIRMENT

5 WEB APPLICATON LAYER


6 IMPLIMENTATION REQUIRMENT
7 APPLICATION AREAS
8 CHARACTERISTICS
9 CHALLENGES AND LIMITATION
10 CONCLUSION
LIST OF FIGURES
FIG. 1 SECURE FILE SHARING SYSTEM
FIG.2 FILE SHARING FLOW
FIG.3 FILE SHARING SYSTEM
ABSTRACT — The purpose of this project is to develop and put into use a safe file sharing system that puts user
privacy and data security first. The system will be developed using innovative encryption and security methods,
guaranteeing that user data is always protected. The system will also be built with the user's experience in mind,
offering a simple, user-friendly interface that makes file sharing effortless. To make sure the system satisfies the
highest standards of security and usability, the project will involve a great deal of testing and research. The goal of
this project is to create a file sharing system that is user-friendly and secure, giving users a dependable way to share
files online.

Keywords — File Sharing Server, Content Server

INTRODUCTION

File sharing has become a crucial aspect of our daily lives in the current digital era. There has never been a greater
need for a dependable, secure, and user-friendly file sharing system, whether it be for sharing pictures and videos with
friends or working together on business documents with co-workers. Users' data may be at risk when using
conventional file sharing techniques like email attachments or cloud storage due to security flaws.

We have taken on the challenge of creating and implementing a secure file sharing system that puts user privacy and
data protection first in order to allay these worries. Without compromising usability or functionality, our system will
make use of contemporary encryption and security techniques to guarantee that user data is always protected.

We will develop an application that satisfies the highest requirements for security and usability through extensive
research and testing. Our aim is to develop a file-sharing system that offers users a dependable and trustworthy
technique for exchanging files online while upholding the strictest standards of security and privacy.

We are eager to start this project and anticipate delivering a safe and convenient file-sharing platform that satisfies the
demands of today's users.

RELATED WORK -

PROJECT BACKGROUND-

We are creating a secure file sharing system that will have strong login and security features that put user privacy and
data protection first. Users must create an account and login using their credentials in order to access the system.
Protect the account's security, the system will ask users to confirm their email address after they log in. The admin
dashboard, which gives users access to their files while maintaining the highest levels of security, will be accessible
once their accounts have been verified. To prevent unauthorised readers and users from accessing or reading any files,
all files will be encrypted and kept in a secure location. Ensure that only authorised users have access to the files, the
system will also have a number of access controls and authentication mechanisms in place. This includes functions
like password requirements, two-factor authentication, and user role-based access controls. Additionally, the system
will keep track of all file-sharing activities, enabling users to see when and by whom their files have been accessed.
Users are always in control of their data thanks to this additional layer of security. The overall goal of our secure file
sharing system is to offer users a dependable and trustworthy way to share files online while upholding the strictest
standards of security and privacy.

PRODUCT PERSPECTIVE-

A web-based application that gives users a dependable and secure way to share files online is the secure file sharing
system we are creating. The system is made to be intuitive and user-friendly, giving users a simple interface that makes
the file sharing process easier. From a design standpoint, the system was created using innovative encryption and
security methods to guarantee that user data is always protected. Users have complete control over their data and who
has access to it thanks to features like user authentication, access controls, and activity tracking.
FUNCTIONS

1. User registration and authentication: Users can sign up for the system and create an account by delivering an
email address and a password. Ensure user security, the system will also have two-factor authentication and
password requirements.
2. File upload and storage: Users will be able to upload their files to the system and store them in a secure
location. The system will support various file types and sizes, and users will be able to organize their files
using tags and categories.
3. File sharing and access controls: Users will be able to share their files with others and control who has access
to them. The system will include features such as user role-based access controls and the ability to set
expiration dates for shared files.
4. Encryption and security: The system will use modern encryption techniques to ensure that user data is always
protected. All files will be encrypted both during transmission and at rest, ensuring that they are secure and
protected from unauthorized access.
5. Activity tracking and auditing: The system will keep a record of all file sharing activities, allowing users to
track who has accessed their files and when. This provides an additional layer of security and ensures that
users are always in control of their data.
6. Integration and customization: The system will be designed to be scalable and flexible, allowing it to integrate
with other systems and applications. It can also be customized to meet the specific needs of different users
and organizations.

WEB APPLICATION LAYERS AND IMPLEMENTATION REQUIREMENTS

Fig 1: Secure File Sharing System


WEB APPLICATION LAYERS

Presentation Layer: This layer oversees overseeing the system's user interface. It will be implemented using HTML,
CSS, and JavaScript and handle user input and output, such as forms and buttons.

Business Logic Layer: This layer oversees overseeing the fundamental operations of the system. It will take care of
things like access control, file encryption, and user authentication. Utilizing server-side programming languages like
JS or Python, this layer will be implemented.

Data Access Layer: This layer will be responsible for managing the system's data storage and retrieval. It will manage
tasks such as database queries and data modelling. This layer will be implemented using technologies such as MySQL
or MongoDB.

Fig 2: File Sharing flow

IMPLEMENTATION REQUIREMENTS:

• Server: To host the application, the system needs a web server. The server should be set up to support the
database and programming language being used.
• Frameworks and libraries: To support the web application layers, the development team must choose and
put into use the appropriate frameworks and libraries. This could include libraries like crypt, OpenSSL, or
jQuery, as well as frameworks like React, NodeJS.
• Security: To guarantee the confidentiality and integrity of user data, the system must be designed and
implemented with strong security measures. This might entail putting two-factor authentication into place,
using SSL encryption, and adhering to security best practises.
• Scalability: As the system expands, it should be designed to be scalable, supporting growing numbers of
users and files. This might entail putting in place caching systems, load balancing, and horizontal scaling.
• User Interface: The system's user interface needs to be simple to use and intuitive so that users can easily
navigate it. This might entail employing responsive design, using precise language, and giving users useful
feedback.
WEB APPLICATION ANALYSIS

Anyone can browse this web application and download any file they desire; however, a client can also register an
account with a username and password so that they can upload files in addition to downloading them.

Before files are made available to users, the administrator of the web application verifies them. He determines whether
the files are acceptable or not before deciding whether to enable them.

Anonymous Users: This web application is made accessible by anonymous users (anyone can view the content of the
web application). At this level, a user is permitted to view and download any file but not to upload any files or to leave
comments.

Registered Level: Anyone can register on the website and create an account with a username and password. Then,
using their username and password, they can access the website. Within this level, a user can download files, upload
files, and comment on other files.

Administration Level: The web application's administrator has a role in verification. When a user uploads a file, it is
not at once made available to other users. Instead, the administrator must first review the file and, if it is deemed
acceptable, enable it on the web application so that users can access it.

Fig 3: File Sharing System

APPLICATION AREAS

Ø Business: In a business setting, a secure file sharing system could be used to share confidential documents
and information with colleagues, partners, and clients in a secure and controlled manner.
Ø Education: In an education setting, a secure file sharing system could be used to share course materials and
assignments between students and faculty members. This would allow for seamless collaboration and
communication without compromising the security of sensitive information.

Ø Healthcare: In a healthcare setting, a secure file sharing system could be used to securely share medical
records, lab results, and other sensitive information between healthcare providers, patients, and their families.

Ø Legal: In a legal setting, a secure file sharing system could be used to share confidential documents, such as
contracts, court filings, and legal briefs, between attorneys, clients, and other parties involved in legal
proceedings.

Ø Government: In a government setting, a secure file sharing system could be used to share sensitive
information between government agencies, departments, and officials in a secure and controlled manner.

CHARACTERISTICS

• Security: The system is designed to be highly secure, using encryption and other security measures to protect
shared files from unauthorized access.
• User-friendly: The system is designed to be user-friendly and easy to use, with a simple and intuitive interface
that makes it easy for users to upload, share, and manage files.
• Scalable: The system is designed to be scalable, with the ability to handle a large number of users and files
without compromising performance or security.
• Customizable: The system is designed to be customizable, with the ability to be tailored to the specific needs
of different organizations and industries.
• Resolute: The system is designed to be reliable, with robust backup and recovery procedures in place to
ensure that files are always accessible and secure.
• Access control: The system has strong access control mechanisms in place, allowing administrators to
manage user access and permissions to ensure that files are only accessible to authorized users.

CHALLENGES AND LIMITATIONS

Despite the system's high level of security, there is always the possibility that there could be security flaws that an
attacker could take advantage of. To fix any potential vulnerabilities, the system must be continuously updated and
monitored.

Getting users to adopt the system and extensively use it may be a challenge. To help users comprehend the advantages
of using the system and how to use it effectively, this may require training and education.

There may be difficulties in ensuring compatibility and data synchronisation if the system needs to be integrated with
existing systems, such as document management systems or email systems.

As the system expands and more users sign up, scaling the system to meet the growing demand without sacrificing
security or performance may present difficulties.
The system may need to adhere to regulatory compliance standards, such as those governing data privacy or data
retention, depending on the industry or sector.

Creating and putting in place a secure file sharing system can be pricey, especially if it needs to be tailored to the
unique requirements of an organisation.

CONCLUSION

Finally, the "Design and Implement of a Secure File Sharing System" project seeks to address the demand for a safe,
comprehensible, and adaptable file sharing solution. The system is easy to use and customizable to meet the needs of
various organisations and industries, with a strong emphasis on security, scalability, reliability, and access control. As
with any technology project, there are obstacles and challenges that must be overcome, including scalability issues,
user adoption, regulatory compliance, cost, and security vulnerabilities. These difficulties can be overcome with
careful preparation, testing, ongoing surveillance, and maintenance. a secure file sharing system can give businesses
a strong tool for collaboration and data sharing while also guaranteeing that private information is shielded from
unauthorised access. Any organisation seeking to enhance its data management and collaboration capabilities would
benefit greatly from investing in a secure file sharing system.

REFERENCES

geeksforgeeks.org

researchgate.net

learn.microsoft.com

You might also like