You are on page 1of 1

Architecture Diagram

Admin

1. Login, View Users and


authorize
2. View all uploaded documents
3. scan all Droids(Malwares) and
Normal documents and alert to
corresponding end users about
malware details
4. List all Droid(Malwares)
affected files and its ratio in
total files
5. View all data integrity
attackers with date and time
6. List all all transactions
End User 7. Block the users those who
spread droid (Malwares).
8. View all no. Of
droid(Malwares) files and
normal files in chart ()

1. Register and Login


2. Add all Documents with digital sign
3. Verify data integrity and recover
3. View and share all documents to other users
and categorize droid (Malwares) effected files
4. Search for documents based on contents’
keyword and display all related documents after
scanning droid files and download the file

You might also like