DESIGN AND IMPLEMENTATION OF FOLDER LOCKER APPLICATION FOR WINDOWS

 

ABSTRACT

 

Nowadays, most users are having difficulty setting security to a folder so that unauthorised users cannot access it. Our folder will occasionally be damaged by viruses, which will corrupt our vital files. Putting all of these issues into action Using a password authentication approach, I created a model that will provide the best protection to a folder while also protecting it from viruses. A password-based system is one in which an alphanumeric password is used to secure it as a pass key. In most modern systems, alphanumeric passwords are used for authentication. These passwords are typically short and memorable, making them easily guessable by an attacker, whereas strong system-assigned passwords are difficult to recall. This study gives a thorough examination of the Persuasive Cued Click Points password system, which provides a high level of security and folder security in a platform-independent environment. This study also offers the SHA (secure hash algorithm) implementation utilized by the software for folder security in Java.

 

 

CHAPITRE ONE

 

Introduction

 

1.1 The Research’s Background

 

Because of the growing threat to computer systems and the information they store and process, they are precious resources that must be safeguarded. Authentication refers to approaches that require users to authenticate their claim of identity to the identifier. There are numerous approaches for authenticating users. Password authentication mechanisms include knowledge-based, token-based, and biometric. The knowledge-based authentication technique includes both text password-based and graphical password-based techniques. A text password is a secret word or string of characters used for user authentication or access approval to get access to a resource. The easier a password is for the owner to remember, the easier it is for an attacker to guess.

 

Passwords that are difficult to remember, on the other hand, may weaken system security because 1) the user may need to write down or electronically save the password, 2) users will require frequent password resets, and 3) users are more likely to re-use the same password. Unfortunately, intruders break these passwords mercilessly using numerous simple methods such as impersonating, Eavesdropping, and other crude methods such as dictionary assaults, shoulder surfing attacks, and social engineering attacks [25]. A graphical password is a promising alternative to textual passwords because, according to human psychology, the human brain can recall or remember visual things better than text[24]. Sequences of images are used in graphical password-based techniques because they are more remembered than sequences of letters. There are numerous graphical password schemes available. Cued-recall click-based graphical passwords are of particular importance in this context. Passpoint, cued click points, and compelling cued click points are some examples of systems. Guessing attacks and hotspot issues decrease the security of passpoints and cued click points[15]. To address this, we are attempting to create a persuasive cued click points technique, in which we use an image password for authentication and security, as well as SHA for encrypting the folder to provide additional security to the folder. The paper is organized as follows. We talk about graphical passwords, convincing cued click points, methods, module descriptions, applications, security, and conclusions.

 

Locking folders is the most effective approach to ensure that no one gains unintentional or intentional access to your financial, health, private, and personal information. Password-based systems have a number of associated inconveniences and concerns, such as the necessity for users to remember passwords, passwords that can be guessed or broken down using brute force, and the difficulty of non-repudiation. Image password appears to be a better option.

 

1.2 Research problem statement

 

Providing security to the folder is the most difficult task for developers to design so that crackers cannot access or decrypt it. Information seekers often handle a system and search all system folders for information from the system that they can use. Friends have turned out to be more of a treat than a friend, because because you provided them access to your system, they explored it and stole your critical credentials. As a result, the difficulty of constructing a folder locker with a safe and dependable source of authentication arises.

 

1.3 The study’s objectives

 

The researcher has set the following goals for this study based on the explanation of the research topic.

 

Create a safe system folder locker.

 

Create a new algorithm for the folder locker application’s security model.

 

Create a Windows application to secure any folder and its contents by assigning a pass key to that folder.

 

The new system design will include an image authentication method as well as an alphanumeric option.

 

1.4 Importance of the research

 

This research work is significant because of its core objectives and accomplishments. This works well to improve the security of one’s privacy on his system. It will be a one-step effort to the point where information is stolen from hackers.

 

The researcher will benefit from the research as well. This is due to the fact that the study would expose the researcher to so many linked areas during the course of his investigation. This will broaden the researcher’s experience, knowledge, and comprehension of real-world application and problem-solving strategies.

 

1.5 The study’s scope

 

This study focuses on a system application for security validation of folder access control and content. As a result, this study will only apply to a folder locker application that uses an image model or an alphanumeric pass key for validation or authentication.

 

1.6 Study Restrictions

 

Inaccessibility to some papers as a result of security restrictions put by management on some of the organization’s documents. It was also not able to conduct a thorough examination of these materials, which would have aided in the development of the project work.

 

Time was a major constraint for this write-up; there wasn’t enough time to study the intricacies of the many fields of the organization’s information department, and the textbook required for this write-up was not available in the institution library.

 

1.7 Study Motivation

 

Before embarking on my research project, I conducted a thorough investigation, including a feasibility analysis, and determined that my friends continue to have access to my private files in the folder where they are housed. What actually motivated me to carry out this work was the fact that I once visited a friend, a computer wizard, and he had put his trust in me and left me with his system, which I exploited by searching all of his system folders and files and exploring them, copying some of the project he is working on, and all of his data that I should not have access to. I copied all of the information from third sources. After that, on the off chance that someone else could do the same to me, I had to devise a folder vault where my personal data would be maintained and secured from anyone using my PC.

 

1.8 Potential contribution to knowledge

 

As the software for this research work will be developed using a complex programming language of object oriented, which is a high level program language, this research effort will expose the researcher and the readers to many abilities and boost their programming ability. As a result, more research writing skills, coding aptitude, and awareness of real-life problem solutions are added to the research. End users will profit greatly from it because it will reduce the number of errors caused by their manual processes, as well as methodically keeping track of sales, stocks, and sales inventories.

 

1.9 Terms Definition

 

Cryptography –

 

is the process of encoding messages or information such that it can only be viewed by authorized people.

 

Deciphering –

 

The process of decoding encrypted data into a secret format. Decryption necessitates the use of a secret key or password.

 

Lock –

 

a mechanical mechanism used to secure valuable goods.

 

A security code –

 

is a word or string of characters used for user authentication to prove identification or access approval in order to get access to a resource (for example, an access code is a type of password), which must be kept secret from those who are not authorized to access it.

 

Identification –

 

is the process of comparing the credentials presented to those stored in a database of authorized users’ information on a local operating system or within an authentication server.

 

Authentication –

 

is the act of ensuring that a user’s information fits their demands.

 

Software:

 

These are computer programs that allow specific tasks to be completed, such as word processing.

 

Hardware:

 

Computer hardware that performs input processing and system output activation.

Leave a Comment