You can get this project in a very 2 easy simple steps:
1.select the project titles.
2.pay for the project that's it......easy...
Available Options :
- ProJect abstract
- System requirement
- existing & proposed
Advanced Encryption System is the process of encoding messages or information in such a way that only authorized parties can read it. In this system, the message or information, referred to as plaintext, is encrypted using an advanced encryption algorithm, generating cipher text that can only be read if decrypted.
Encryption in networks is widely used in distributed systems. Networks can be divided into two categories: structured networks in which systems are connected by a regular topology, and unstructured networks in which the topology is arbitrary. The objective of the project is to design advanced encryption system for distributed data sharing which combines the advantages of both types of networks.
Advanced Encryption Standard (AES) maintains that periodically polls the file owner to update the file due to minimum number of replicas consistency overhead is very low. Top Caching (TC) algorithm helps to boost the system performance and to build a fully distributed cache for most popular information. Our caching scheme can deliver lower query delay, better load balance and higher cache hit ratios. It effectively relieves the over-caching problems for the most popular objects.
The front-end tools make the user interface with the system easier and also provide a user-friendly environment to the system. This rich language enables us to develop many different types of application. We can create programs that intersect with the hardware. Microsoft Visual Basic is an event driven programming language. The advantage of such an approach what that there were fewer bugs and lesser surprises enterprises. Building prototypes become very easy.
Existing System :
Public-key cryptography, also known as asymmetric cryptography, is a class of cryptographic algorithms which requires two separate keys, one of which is secret (or private) and one of which is public. Although different, the two parts of this key pair are mathematically linked. The public key is used to encrypt plaintext or to verify a digital signature; whereas the private key is used to decrypt cipher text or to create a digital signature. The term "asymmetric" stems from the use of different keys to perform these opposite functions, each the inverse of the other – as contrasted with conventional ("symmetric") cryptography which relies on the same key to perform both.
Proposed System :
Advanced Encryption System for distributed data sharing which combines the AES . The proposed system provides a low cost mechanism for encrypt files and share files between systems securely. AES involves a public key and a private key. The public key can be known by everyone and is used for encrypting messages. Messages encrypted with the public key can only be decrypted in a reasonable amount of time using the private key,security is enhanced in well manner.Users set the byte key manually.Reduce the damages of the files.Maximize the system performance.Minimum time needed for the various processing.