highly confidential security system (srs)

33
HI G HLY CO N FIDEN T IAL SECURITY S Y S TEM (Software Requirement Specification) Dr. M.G.R. EDUCATIONAL AND RESEARCH INSTITUTE UNIVERSITY (Declared U/S 3 of UGC Act 1956) Chennai-600095, Tamil Nadu Team Members: IBM IMPULSE HANSRAJ MUNKA 091061101170 JOHN CALVIN TIRKEY091061101042 RAVI JAISWAL 091061101159

Upload: sundarshyam39

Post on 12-Apr-2016

44 views

Category:

Documents


3 download

DESCRIPTION

My project SRS copy

TRANSCRIPT

Page 1: Highly Confidential Security System (Srs)

HIG HLY CON FIDENT IAL SECURITY S YSTEM

(Software Requirement Specification)

Dr. M.G.R. EDUCATIONAL AND RESEARCH INSTITUTE

UNIVERSITY(Declared U/S 3 of UGC Act 1956)

Chennai-600095, Tamil Nadu

Team Members: IBM IMPULSEHANSRAJ MUNKA 091061101170

JOHN CALVIN TIRKEY091061101042RAVI JAISWAL 091061101159

Project Guide:-

Mrs. Sumathy EswaranAsst. HOD

Department of Computer Science and Engineering

Page 2: Highly Confidential Security System (Srs)

Table of Contents

DescriptionPage No.

1.0 Introduction1.1 Purpose…………………………………………..31.2 Scope…………………………………………….31.3 Definition, Acronyms and Abbreviations……4-51.4 References…………………………………..…..51.5 Technologies to be used……………………….61.6 Overview………………………………………..6-7

2.0 Overall Description2.1 Product Perspective……………………………72.2 Software Interface……………………………...82.3 Hardware Interface……………………………..82.4 Product Function………………………………..82.5 User Characteristics……………………………92.6 Constraints………………………………………92.7 Architecture Design………………………..…..102.8 Use Case Model Description…………….……112.9 Class Diagram…………………...…….……….122.10Sequence Diagram……………………………132.11Dataflow Diagram……….…………………….14

3.0Database Design3.1Schema………………………………………..15-19

4.0 Assumptions and Dependencies…………………20

5.0 Specific Requirements5.1 Use Case Reports……………………………21-24

Page 3: Highly Confidential Security System (Srs)

1.1 Purpose HCSS (Highly confidential Security System) is a web

application used to store user’s confidential data. Due to busy life style we can’t remember all confidential

data like: Mail id Password Bank account no Pan no Driving license no Some confidential images, text and videos And many more.

So we can develop highly security web application(new security algorithm and hardware system) to store allconfidential data in single credentials

It comes under network security system for a personalized application.

Web application will be highly customizable and flexibleenough to easily deploy.

1.2Scope To design a HCSS (highly confidential security system) Based on SSL, Encryption, Multi-Level Security. To enter the data at first we should have registered

user. During sign up a set of security question should be

saved like answer to any personal question or image recognition.

At the time of sign up in any other website question is prompted to the user, do you want to enter the data confidentially? (Y/n).

Then the personalized application comes into play. The particular website links directly to the HCSS

application to save the data.

Page 4: Highly Confidential Security System (Srs)

1.2 Definition, Acronyms a nd AbbreviationsHCSS

Highly Confidential Security System.It’s aweb application that helps user to save its important data in an encrypted form in the server which can be accessed from anywhere around the world using SSL technique.

WASCEWeb Sphere Application Server Community Edition.It is an application server that runsand supports J2EE and web service applications.

DB2

JSP

J2EE

UML

XML

HTTP

Database_2.A database management system that providesa flexible and efficient databaseplatform to maintain recordsof user’s confidential data like text, pictures, audio, video.

Java Server Pages.It is used to create dynamic web content.

Java 2 Enterprise Edition.A programming platform which is a part of java platform fordeveloping and running distributed java.

Unified Modeling Language is a standard language for writing software blueprints. TheUML may be used to visualize, specify, construct and document

Extensible Markup Language is a text based format that let developers describe, deliverand exchange structured data between a range of applications to client for display and manipulation.

Hyper Text Transfer Protocol.It’s a service protocol.

Page 5: Highly Confidential Security System (Srs)

HTMLHyper Text Markup Language.It is the main markuplanguage for displaying web pages and other information that can be displayed in a web browser..

AJAX

CSS

RAD

Asynchronous JavaScript and XML. It is a Web applicationswhich can send data to, and retrieve data from, a server asynchronously (in the background) without interfering with the display and behavior of the existing page.

Cascading Style Sheets.It is a style sheet language used for describing the presentation semantics (the look and formatting) of a document written in a markup language.

Rational Application Developer is a development tool that helps to design web pagesand also helps to design the diagrams like ER, Database schema diagrams and to generate DDL.

1.3 References Google Search.

IBM TGMC Sample Synopsis

A Simplified AES Algorithm: Presented by JoshuaHolden, Rose-Human Institute of Technology.

A Advanced Encryption Standard Lecture on Computer and Network Security by Avi kak.

Page 6: Highly Confidential Security System (Srs)

1.5 Technologies to be used

Relational Database Management System: DB2 Rational Application Developer:RAD Websphere Application Server Community Edition:WASCE Backup Server: Tivoli Modeler: Rational Rose Secure Sockets Layer: SSL Encryption algorithm: Advanced Encryption Standard(AES)

1.6 Overview

Existing System User can store their important data in the web but it’s not

safe.

Drawback Only text can be stored Proper tabulation is not present for storing data. Data is not encrypted which can be hack by others. Reliable connection is not been provided.

Proposed System 256 bit encryption technique is used. SSL technique is used. Multilevel security technique is used. Different Lockers with symmetric key. Lockers: Documentation, Image, Audio, Video. Warning mail for incorrect password access will be sent. Proper storage capacity is provided. While registering in a new place a question Will prompt to

user whether to save the data in HCSS(Y/n).

Page 7: Highly Confidential Security System (Srs)

Our PlanTo provide a user web based application where the user can store its confidential data, in the form of text, picture, audioand video with best possible encryption technique. Differentkinds of lockers will be provided with symmetric key. SSLtechnique will be used to make the connection reliable and maintain its privacy. Multi-Level security will be provided for confidentiality.Warning mail will be sent to the user mail-ID for incorrect password access. Proper storage capacity will be provided for each lockers. And while registering for a new account in any new website a question Will prompt to user whether to save its detail in HCSS(Y/n).

2.0 Overall Description

2.1 Product Perspective

Page 8: Highly Confidential Security System (Srs)

2.2 Software Interface

OPERATING SYSTEM- WINDOWS (Any) WEB BROWSER (Any) DATBASE- DB2 WEB SERVER–WEBSPHERE BACKUP SERVER- TIVOLI CODING-RAD DESIGNING-RATIONAL ROSE, Visual Basic LANGUAGES USED-HTML, XML, JAVA, AJAX, PHP, CSS

2.3 Hardware Interface

PROCESSOR-PENTIUM IV (Min.) RAM-1GB (Min.) HARD DISK- 20 GB (Min.)

2.4 Product Function Functional

Log feature Admin takes care of users authorization Secure storing of data for remote access It can store document, image, audio and video. High level security with 256-bit encryption using SSL

technique.Non-Functional

Backup and Recovery 24*7 accessibility

Page 9: Highly Confidential Security System (Srs)

2.5 User Characteristics Multi Lingual support (UTF-8). Peopleon the move like reporters,one who presents

regular presentations or seminars, business purposetravellers (geographical bound less).

It’s useful for tech savvy person

2.6 Constraints Login and password is used for the identification of users. Multiple Verification for login. Multi-level Security for accessing the data. Only registered users will be authorized to use the services.

Page 10: Highly Confidential Security System (Srs)

2.7Architecture Design

Page 11: Highly Confidential Security System (Srs)

2.8Use Case Model Description

Page 12: Highly Confidential Security System (Srs)

2.9Class Diagram

Page 13: Highly Confidential Security System (Srs)

2.10Sequence Diagram

Page 14: Highly Confidential Security System (Srs)

2.11Dataflow Diagr a m

Page 15: Highly Confidential Security System (Srs)

3.0 Database Design

3.1Schema

Personal Detail (both New User And Admin)

DESCRIPTION DATATYPE SIZEFIRST NAME STRING 15MIDDLE NAME STRING 15LAST NAME STRING 15DATE OF BIRTH DATE DD/MM/YYYYGENDER CHARACTER 1PERMANENT ADDRESS STRING 50CITY STRING 15STATE STRING 15PIN CODE NUMBER 6PRESENT ADDRESS STRING 50CITY STRING 15STATE STRING 15PIN CODE NUMBER 6COUNTRY STRING 15CONTACT NUMBER NUMBER 10EMAIL ADDRESS STRING 30OCCUPATION STRING 20

Page 16: Highly Confidential Security System (Srs)

User Name And Password (both New UserAnd Admin)

DESCRPTION DATATYPE SIZE

USER ID STRING 25

EMAIL ADDRESS STRING 30

PASSWORD STRING 12

CONFIRMED PASSWORD STRING 12

DATE OF BIRTH DATE DD/MM/YYYY

FIRST SECURITY QUESTION STRING 25

SECOND SECURTITY QUESTION STRING 25

THIRD SECURITY QUESTION STRING 25

FIRST IMAGE RECOGNIZATION IMAGE 1 MB

SENCOND IMAGE RECOGNIZATION IMAGE 1 MB

THIRD IMAGE RECOGNIZATION IMAGE 1 MB

Page 17: Highly Confidential Security System (Srs)
Page 18: Highly Confidential Security System (Srs)

User Account Status

DESCRIPTION DATATYPE SIZE

USER ID STRING 25

USER FULL NAME STRING 30

EMAIL ADDRESS STRING 30

PASSWORD STRING 12

CONFIRMED PASSWORD STRING 12

DATE OF BIRTH DATE DD/MM/YYYY

CONTACT NUMBER NUMBER 10

STATUS STRING 10

Page 19: Highly Confidential Security System (Srs)

Documentation Locker

DESCRPTION DATATYPE SIZE

USER ID STRING 25

Encrypt./Decrypt. PASSWORD STRING 15

FORMAT .DOC, .PDF, .TXT, .xlsx, .pptx, .rtf

SIZE FLOAT 5 MB

Picture Locker

DESCRPTION DATATYPE SIZE

USER ID STRING 25

Encrypt./Decrypt. PASSWORD STRING 15

FORMAT .JPEG

SIZE FLOAT 5 MB

DESCRPTION DATATYPE SIZE

Page 20: Highly Confidential Security System (Srs)

USER ID STRING 25

Encrypt./Decrypt. PASSWORD STRING 15

FORMAT MP3

SIZE FLOAT 10 MB

Audio Locker

Video Locker

DESCRPTION DATATYPE SIZE

USER ID STRING 25

Encrypt./Decrypt. PASSWORD STRING 15

FORMAT MP4, 3GPP

SIZE FLOAT 20 MB

Page 21: Highly Confidential Security System (Srs)

4.0 Assumptions and Dependencies

Assumptions Pin code can be sent through SMS to the user mobile for

login. Encrypted password confirmation along with the

Encryption/Decryption password can be sent to the user’s mobile through SMS

Dependencies Unique User Name and Password is required. Set of 3 security question have to be provided. 3 Image recognition has to be uploaded whom the user can only

identify.

Page 22: Highly Confidential Security System (Srs)

5.0 Specific Requirements

5 .1 Use Case R eports

Registration Page:-

Page 23: Highly Confidential Security System (Srs)

Admin Page:-

Page 24: Highly Confidential Security System (Srs)

Login Page:-

Page 25: Highly Confidential Security System (Srs)

Lockers:-

Page 26: Highly Confidential Security System (Srs)

Thank you