||International Journal of Computer Trends and Technology (IJCTT)||
|© 2016 by IJCTT Journal|
|Year of Publication : 2016|
|Authors : MrunaliWaghmare, AishwaryaLingaware, Neelam Padole, Priyanka Meghare|
|DOI : 10.14445/22312803/IJCTT-V33P105|
MrunaliWaghmare, AishwaryaLingaware, Neelam Padole, Priyanka Meghare "E-Locker". International Journal of Computer Trends and Technology (IJCTT) V33(1):25-28, March 2016. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.
Many times documents lost in certain mishaps like fire mishaps, natural calamities as earthquake, tsunami or any accident. Then it is very difficult to get these lost documents after those mishaps. Also when there is need to submit documents in the college or any office many times it happens that those physical documents may lost and procedure may get delay. Recently in Nepal earthquake people lost their documents and for rehabilitation there was need of documents to build their houses and for jobs. It was not easy to get their documents quickly. To overcome all these problems there is need of reliable and secure system. For this E-locker is good solution which provides secure dedicated personal electronic space for storing documents of students and staff member of college. It provides a dedicated personal e-storage space to each account linked to their enrollment number. Cloud Based E-Locker is a website where one can create a personalized web Gallery on cloud to store images, audio, video files, and other document.
 "DigiLocker-Online document storage facility“http://www.indian.gov. 16 July 2015
 DipikaKumari, Kumar.NP.Pandey ”Survey on Graphical User Authentication”Mechanical Engineering Department MWWWNNIIIIT Australia.
 Tamra Myers “Intoduction to Microsoft Azure Storage”http://www.googleweblight.com/azure.microsoft.com/d ocumentation/articles/storage-introduction. 30 June 2015
 “Steps in the AES Encryption Process::Appendix A. Overview of AES Block” http://etutorials.or g/Networking/Steps in AES.
Sudhakarchaudhary”Working in a Connected and Disconnected Enviroment” https://www.csharpcorner. com/UploadFile/9a3ae2/ Working in a Connected and Disconnected Enviroment. 25July 2012
 How does DigiLocker work? – DigiLocker” https://www.digitallocker.in/How does DigiLocker work 22 February 2015
 A Kak”Lecture 8:AES: The Advance Encryption Standard Lecture” https://engineering.purdue.edu/compsec 2015
 A. Adams and M. A. Sasse, "Users are not the enemy: why users compromise computer security mechanisms and how to take remedial measures," Communications of the ACM, vol. 42, pp. 41-46, 1999.
Ankita Sharma and Sonia Vatta “Cloud Computing: Taxonomy and Architecture” International Journal of Advance Research in Computer Science and Software Engineering. Volume 3, Issue 5, May 2013.
Cloud computing, Azure Storage,Puzzle Lock.