Traditional job search methods like newspaper ads and word-of-mouth referrals have become obsolete. Numerous online job portals offer opportunities but also raise fraud concerns. Users should prioritize trustworthy portals to protect their data. Another challenge is the lack of platforms that cater to both job seekers and employers, including freelancers and those transitioning roles. Mobile accessibility remains an issue for some portals. The “Job Portal System” student project seeks to address these issues by providing a comprehensive online platform for job seekers, complete with resources and support, to streamline the job search process and enhance the job market.
Nowadays smart gadgets including smart phones and tablets are gaining huge popularity. Comparing with conventional computer, smart phone is easily carried out and provides much computer functionality, such as processing, communication, data storage as well as many computers services such as web browser, video or audio player, video call, GPS, wireless network. However, smart phone have to come long way in terms of security. Encryption is used for security of information in data storage and transmission process. Various encryption algorithms like DES, 3DES, Blowfish, RSA and others are available to secure the data. In DES, key size is too small. In 3DES, key size is increase but the process is slower than other methods. We have used Advanced Encryption Standard algorithm to overcome above problems. AES algorithm is not only for security but also for great speed. It can be implemented on various platforms especially in small devices like mobile phone. Everyday data is shared, transmitted, stored for many purpose like banking, production, research and development. Hence, we need security for information. Encryption can provide security. This application allows user to run this application on android platform to encrypt the file before it is transmitted over the network. It is used for all type of file encryption such as text, docx,video,audio, pdf and image encryption. AES algorithm is used for encryption and decryption.
In most of the cases, stay in hospitals is not practical due to high expenses and lack of facilities in most of the hospitals. A smart phone act as a gateway for data transfer to the cloud and the data or records are stored in cloud. The data stored in cloud may not be secure. To prevent unauthorized access from intruders, security and privacy of the medical records need to be ensured. This is achieved using symmetric encryption algorithm. Medical reports may be generated in varied forms. The reports generated in the form of images may be of larger size which increases the delay time compared to text records. In order to compress it, image compression techniques are applied which reduces the delay time and provide quick response to the alerts generated. The overall system consumes fewer resources and results in a better performance.
Cloud computing has prompted interest in data outsourcing. Attribute-based encryption (ABE) enhances file access control in cloud storage. User revocation remains a key challenge. This article presents a ciphertext-policy ABE (CP-ABE) scheme for efficient user revocation in cloud storage. User groups manage revocation, reducing computation costs. The scheme resists collusion attacks and is secure under the Diffie-Hellman assumption. Experiments confirm low computation costs, making it suitable for resource-constrained devices.
Security stats reveal a surge in data leaks, often due to human errors. To combat this, a privacy-preserving data-leak detection method is proposed. It allows secure delegation of detection operations without disclosing sensitive data, offering a privacy-focused add-on service for Internet providers, with effective results in real-world scenarios.
Cloud computing offers new ways to access and store personal and business data via the internet but faces trust issues due to third-party involvement. Fog computing is a solution for data security. Despite cloud storage’s widespread use, security remains a major concern. Evolving communication and computing paradigms introduce new data security challenges. Existing cloud data protection methods fail to prevent data theft attacks. Fog computing utilizes User Behavior Profiling and Decoy Technology. The proposed CUSUM algorithm improves data theft detection by tracking user access pattern changes. User Behavior Profiling includes identifying users based on typing delays and using a simplified picture password.
The authority verifies user details. An algorithm with basic CP-ABE generates a public parameter and master key. It creates ciphertext for specific users based on access policies.
Apache server send the file to the requested user save user details ,Here re encrypt the file name
Upload the video file and encrypt send the file to the APACHE server.
User sends the request for file and secret key and can download the file by using encryption