Computer Science Project Topics

Design and Implementation of File Sharing Management System

Design and Implementation of File Sharing Management System

Design and Implementation of File Sharing Management System

Chapter One

Purpose of the Project

The project is fully integrated with an Employee Relationship Management (ERM) solution and developed in a manner that is easily manageable, time-saving and relieving one form manual. The purpose of this system is to manage file sharing.  The Company can create an employee’s database, each one with his assigned folder.  Within this folder, the employee can upload their files or download the one already in the folder already uploaded by the company itself.  When the company uploads a file in a employee’s folder, the employee will receive an email alerting him of the new file and with a link to download it without logging in the File Sharing System.  The employee can also log into the system at any time and lock for previously uploaded files.

CHAPTER TWO

REVIEW OF RELATED SYSTEM

 Introduction

This chapter introduced the definition of the cloud computing beyond its specification, characteristic and uses with a little summary to papers and research done in the previous years.

Historical background in cloud computing

“The most compelling reason for most people to buy a computer for the home will be to link it into a nationwide communications network. We’re just in the beginning stages of what will be a truly remarkable breakthrough for most people— as remarkable as the telephone.” (Steve Jobs, 1985)

The Concept of cloud computing comes back from the 1960’s from John McCarthy, a computer scientist, brought up the idea that “computation may someday be organized as a public utility”. In 90’s comes the idea that revolutionized cloud computing, which is the combination of grid and utility computing, the first term grid computing works in staffing the organization to achieve a certain goal using computational power from different resources within the organization, making accessing computer power just like an electrical power grid, and utility computing is allowing people to essentially rent computing services such as Internet access which cut back on cost and makes computing more attainable for smaller businesses.

The next step was taken in the late 90’s by creating the first wave of Internet enabled applications. An ASP (application service provider) would license a commercial software application to multiple customers. This made it possible for companies to outsource some of their IT needs such as servers and software, saving those companies the time and money spent on everyday IT management. By benefitting from combining those three techniques {grid, utility and ASP} the concept of cloud computing started shaping and became formal to any collection of services delivered via the Internet and customized specifically for a business’s size, industry or current needs.

Definitions of cloud computing

In September 2011, the US National Institute for Standards and Technology (NIST) issued a special release document regarding the definition of cloud computing which states that “cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction”. The Expert Group Report advising the European Commission on matters of opportunities related to cloud computing resume to present a very broad definition of cloud. Therefore, they define the term cloud as “an elastic execution environment of resources involving multiple stakeholders and providing a metered service at multiple granularities for a specified level of quality (of service)”. (Björk, 2002)

Furthermore, representative sources from the business sector such as Gartner revised their definition of cloud computing once they identified possibilities of improving the way cloud computing should be looked at. In Gartner’s current view, cloud computing is “a style of Computing where scalable and elastic IT capabilities are provided as a service to multiple customers using Internet technologies” In search for a reference document that would balance the visions expressed by practice, industry and scholars, we indicate RAND Europe’s technical report as a valuable working tool because it presents cloud computing terms and concepts in a manner clearer for layman. However useful this document might be, we acknowledge at the same time that NIST‟s definition and presentation of types, deployment models and characteristics provide a more comprehensive description of the paradigm.

 

CHAPTER THREE

SYSTEM ANALYSIS AND DESIGN

INTRODUCTION

In this chapter the design process is laid out, the technical issues are figured out and the methodology for the design is made known. We give full details of the development process using unified modeling languages like flow diagrams, module diagrams, flow charts and architectural diagrams.

FEASIBILITY STUDY

Preliminary investigation examines project feasibility; the likelihood the system will be useful to the organization. The main objective of the feasibility study is to test the Technical, Operational and Economical feasibility for adding new modules and debugging old running system. All system is feasible if they are unlimited resources and infinite time. There are aspects in the feasibility study portion of the preliminary investigation: Technical Feasibility, Operational Feasibility and Economic Feasibility

Technical Feasibility

The technical issue usually raised during the feasibility stage of the investigation includes the following:

  1. Does the necessary technology exist to do what is suggested? •
  2. Do the proposed equipments have the technical capacity to hold the data required to use the new system?
  3. Will the proposed system provide adequate response to inquiries, regardless of the number or location of users?

CHAPTER FOUR

SYSTEM IMPLEMENTATION

INTRODUCTION

This system was implemented with two interfaces; for users and for admin with online access control. Admin can use their interface to create users and default folders. Users interface is used for employers to view and download files in real time. Admin and users have login name and a password. It is possible to upload, edit and delete files or docs and other media materials including pdf docs etc. the framework is that it is created a real time interactivity between employers and admin to enhance file sharing.

CHAPTER FIVE

SUMMARY, CONCLUSION AND RECOMMENDATION

This chapter gives a summary of results, conclusion and recommendation based on the results and findings of the work. This chapter gives suggestion for future research related to this work.

Summary of Result

This work “File sharing management System” has being designed and implemented. The work sought to eliminate the problem related to file sharing, improve security and credibility of document by automated system as the ministry is expected to handle/possess quite a number of documents which need to be kept safe and credible. The project gave the organization the opportunity to uniquely secure document and yet ensure that limited space is used. An accredited user can login using the organizations URL to access or Upload files i.e. the user must be duly registered to access the system. The encryption decryption and archiving functions of the system is fully automated as all files uploaded into the system will be automatically encrypted and any file needed to be downloaded will be automatically decrypted while a user can also download a compressed version of their file or an archived version (as the case may be) uploaded into the system.

 Conclusion

According to the document management needs, this work designs and implements a system that facilitates secure documentation, fast retrieval, space management and longtime storage assurance. This work developed ausable, maintainable web application (Encodoc) which work fine with the documentation requirements of our case study. This study emphasizes the practices used to build a usable and maintainable secure document management system. The practices of this thesis work show that carefully designed usability evaluation is an effective way to locate the usability problems of an application (if any) and could consequently improve the application’s usability. Considering the various advantages of the improved EDMS, it will not be out of place to say that the improved cloud-based document management system will be of immense advantage to the teeming clients, users and the organization as a whole.

Recommendation

Considering the geometrical advancement in the information technology world and the large number of documents that are being handled by organizations daily combine with the need for accountability and proper document management, it is therefore highly recommended that the organization implement Encodoc. There are high economic advantages attached to this software on the part of the organization and users. Above all, it is user-friendly and documentation should be checked in case of future modification.

Contribution to the Knowledge

This work will lay a sound background for further research related to PHP Version of File Sharing System with improve security and space management features. This work will enhance the understanding and need for users to ensure security and integrity of document used by them. It will allow user the choice of picking from either the java based EDMS or the new PHP based improved EDMS. Also, this work will protect document from unauthorized access and malicious attack thereby creating room for accountability (since document will secure, untampered and can be accessed by only authorized personnel over time) and give confidence and reliability to individuals and organization using the EDMS.

 Suggestion for Future Research

The suggestion made here is that fingerprint verification can be researched to be added as authentication mode of accessing the system such that the user authentication medium will be by fingerprint scanning, because user might be careless with the password and should a user who is an admin be careless with his password he will void the effectiveness of the system.

REFERENCE

  • Akashah, P. A., Syamsul, R., Jusoff, K. &Christon, E. (2011). Electronic Document Management System. World Applied Sciences Journal (Special Issue on Computer Applications & Knowledge Management), 12: 55-58.
  • Alessandro, A. (2004). Online Auction System, Unpublished bachelor thesis, University of Bolzano/Bozen.
  • Almelkar, M. &Gandhe, S. T. (2014). Implementation of Lossless Image Compression Using FPGA. International Journal of Emerging Technology and Advanced Engineering. Vol 4: 2250-2459
  • Amir, M. B. S. (2007). Document Management System Portal (E-Tanah).
  • Anderson, R. J. (2001):Security Engineering: a guide to building dependable distributed systems. First edition. Wiley Computer Publishing.
  • Anwar, M. A. & Naseer, A. (2013). An e-Course file management system: A green campus initiative. Vol.3, No.1.
  • Bishop, M. (2003): Computer Security – Art and Science. First edn. Addison Wesley.
  • Björk, B. C. (2002). Cloud-based management System in Construction. ITcon Journal, 8: 105-118.
  • Cakiroglu, M. (2010).Software Implementation and Performance Comparison of Popular Block Ciphers on 8-bit Low-Cost Microcontroller. International Journal of the Physical Sciences. Vol. 5: 1338-1343.
WeCreativez WhatsApp Support
Our customer support team is here to answer your questions. Ask us anything!