highly confidential security system (srs)
DESCRIPTION
My project SRS copyTRANSCRIPT
HIG HLY CON FIDENT IAL SECURITY S YSTEM
(Software Requirement Specification)
Dr. M.G.R. EDUCATIONAL AND RESEARCH INSTITUTE
UNIVERSITY(Declared U/S 3 of UGC Act 1956)
Chennai-600095, Tamil Nadu
Team Members: IBM IMPULSEHANSRAJ MUNKA 091061101170
JOHN CALVIN TIRKEY091061101042RAVI JAISWAL 091061101159
Project Guide:-
Mrs. Sumathy EswaranAsst. HOD
Department of Computer Science and Engineering
Table of Contents
DescriptionPage No.
1.0 Introduction1.1 Purpose…………………………………………..31.2 Scope…………………………………………….31.3 Definition, Acronyms and Abbreviations……4-51.4 References…………………………………..…..51.5 Technologies to be used……………………….61.6 Overview………………………………………..6-7
2.0 Overall Description2.1 Product Perspective……………………………72.2 Software Interface……………………………...82.3 Hardware Interface……………………………..82.4 Product Function………………………………..82.5 User Characteristics……………………………92.6 Constraints………………………………………92.7 Architecture Design………………………..…..102.8 Use Case Model Description…………….……112.9 Class Diagram…………………...…….……….122.10Sequence Diagram……………………………132.11Dataflow Diagram……….…………………….14
3.0Database Design3.1Schema………………………………………..15-19
4.0 Assumptions and Dependencies…………………20
5.0 Specific Requirements5.1 Use Case Reports……………………………21-24
1.1 Purpose HCSS (Highly confidential Security System) is a web
application used to store user’s confidential data. Due to busy life style we can’t remember all confidential
data like: Mail id Password Bank account no Pan no Driving license no Some confidential images, text and videos And many more.
So we can develop highly security web application(new security algorithm and hardware system) to store allconfidential data in single credentials
It comes under network security system for a personalized application.
Web application will be highly customizable and flexibleenough to easily deploy.
1.2Scope To design a HCSS (highly confidential security system) Based on SSL, Encryption, Multi-Level Security. To enter the data at first we should have registered
user. During sign up a set of security question should be
saved like answer to any personal question or image recognition.
At the time of sign up in any other website question is prompted to the user, do you want to enter the data confidentially? (Y/n).
Then the personalized application comes into play. The particular website links directly to the HCSS
application to save the data.
1.2 Definition, Acronyms a nd AbbreviationsHCSS
Highly Confidential Security System.It’s aweb application that helps user to save its important data in an encrypted form in the server which can be accessed from anywhere around the world using SSL technique.
WASCEWeb Sphere Application Server Community Edition.It is an application server that runsand supports J2EE and web service applications.
DB2
JSP
J2EE
UML
XML
HTTP
Database_2.A database management system that providesa flexible and efficient databaseplatform to maintain recordsof user’s confidential data like text, pictures, audio, video.
Java Server Pages.It is used to create dynamic web content.
Java 2 Enterprise Edition.A programming platform which is a part of java platform fordeveloping and running distributed java.
Unified Modeling Language is a standard language for writing software blueprints. TheUML may be used to visualize, specify, construct and document
Extensible Markup Language is a text based format that let developers describe, deliverand exchange structured data between a range of applications to client for display and manipulation.
Hyper Text Transfer Protocol.It’s a service protocol.
HTMLHyper Text Markup Language.It is the main markuplanguage for displaying web pages and other information that can be displayed in a web browser..
AJAX
CSS
RAD
Asynchronous JavaScript and XML. It is a Web applicationswhich can send data to, and retrieve data from, a server asynchronously (in the background) without interfering with the display and behavior of the existing page.
Cascading Style Sheets.It is a style sheet language used for describing the presentation semantics (the look and formatting) of a document written in a markup language.
Rational Application Developer is a development tool that helps to design web pagesand also helps to design the diagrams like ER, Database schema diagrams and to generate DDL.
1.3 References Google Search.
IBM TGMC Sample Synopsis
A Simplified AES Algorithm: Presented by JoshuaHolden, Rose-Human Institute of Technology.
A Advanced Encryption Standard Lecture on Computer and Network Security by Avi kak.
1.5 Technologies to be used
Relational Database Management System: DB2 Rational Application Developer:RAD Websphere Application Server Community Edition:WASCE Backup Server: Tivoli Modeler: Rational Rose Secure Sockets Layer: SSL Encryption algorithm: Advanced Encryption Standard(AES)
1.6 Overview
Existing System User can store their important data in the web but it’s not
safe.
Drawback Only text can be stored Proper tabulation is not present for storing data. Data is not encrypted which can be hack by others. Reliable connection is not been provided.
Proposed System 256 bit encryption technique is used. SSL technique is used. Multilevel security technique is used. Different Lockers with symmetric key. Lockers: Documentation, Image, Audio, Video. Warning mail for incorrect password access will be sent. Proper storage capacity is provided. While registering in a new place a question Will prompt to
user whether to save the data in HCSS(Y/n).
Our PlanTo provide a user web based application where the user can store its confidential data, in the form of text, picture, audioand video with best possible encryption technique. Differentkinds of lockers will be provided with symmetric key. SSLtechnique will be used to make the connection reliable and maintain its privacy. Multi-Level security will be provided for confidentiality.Warning mail will be sent to the user mail-ID for incorrect password access. Proper storage capacity will be provided for each lockers. And while registering for a new account in any new website a question Will prompt to user whether to save its detail in HCSS(Y/n).
2.0 Overall Description
2.1 Product Perspective
2.2 Software Interface
OPERATING SYSTEM- WINDOWS (Any) WEB BROWSER (Any) DATBASE- DB2 WEB SERVER–WEBSPHERE BACKUP SERVER- TIVOLI CODING-RAD DESIGNING-RATIONAL ROSE, Visual Basic LANGUAGES USED-HTML, XML, JAVA, AJAX, PHP, CSS
2.3 Hardware Interface
PROCESSOR-PENTIUM IV (Min.) RAM-1GB (Min.) HARD DISK- 20 GB (Min.)
2.4 Product Function Functional
Log feature Admin takes care of users authorization Secure storing of data for remote access It can store document, image, audio and video. High level security with 256-bit encryption using SSL
technique.Non-Functional
Backup and Recovery 24*7 accessibility
2.5 User Characteristics Multi Lingual support (UTF-8). Peopleon the move like reporters,one who presents
regular presentations or seminars, business purposetravellers (geographical bound less).
It’s useful for tech savvy person
2.6 Constraints Login and password is used for the identification of users. Multiple Verification for login. Multi-level Security for accessing the data. Only registered users will be authorized to use the services.
2.7Architecture Design
2.8Use Case Model Description
2.9Class Diagram
2.10Sequence Diagram
2.11Dataflow Diagr a m
3.0 Database Design
3.1Schema
Personal Detail (both New User And Admin)
DESCRIPTION DATATYPE SIZEFIRST NAME STRING 15MIDDLE NAME STRING 15LAST NAME STRING 15DATE OF BIRTH DATE DD/MM/YYYYGENDER CHARACTER 1PERMANENT ADDRESS STRING 50CITY STRING 15STATE STRING 15PIN CODE NUMBER 6PRESENT ADDRESS STRING 50CITY STRING 15STATE STRING 15PIN CODE NUMBER 6COUNTRY STRING 15CONTACT NUMBER NUMBER 10EMAIL ADDRESS STRING 30OCCUPATION STRING 20
User Name And Password (both New UserAnd Admin)
DESCRPTION DATATYPE SIZE
USER ID STRING 25
EMAIL ADDRESS STRING 30
PASSWORD STRING 12
CONFIRMED PASSWORD STRING 12
DATE OF BIRTH DATE DD/MM/YYYY
FIRST SECURITY QUESTION STRING 25
SECOND SECURTITY QUESTION STRING 25
THIRD SECURITY QUESTION STRING 25
FIRST IMAGE RECOGNIZATION IMAGE 1 MB
SENCOND IMAGE RECOGNIZATION IMAGE 1 MB
THIRD IMAGE RECOGNIZATION IMAGE 1 MB
User Account Status
DESCRIPTION DATATYPE SIZE
USER ID STRING 25
USER FULL NAME STRING 30
EMAIL ADDRESS STRING 30
PASSWORD STRING 12
CONFIRMED PASSWORD STRING 12
DATE OF BIRTH DATE DD/MM/YYYY
CONTACT NUMBER NUMBER 10
STATUS STRING 10
Documentation Locker
DESCRPTION DATATYPE SIZE
USER ID STRING 25
Encrypt./Decrypt. PASSWORD STRING 15
FORMAT .DOC, .PDF, .TXT, .xlsx, .pptx, .rtf
SIZE FLOAT 5 MB
Picture Locker
DESCRPTION DATATYPE SIZE
USER ID STRING 25
Encrypt./Decrypt. PASSWORD STRING 15
FORMAT .JPEG
SIZE FLOAT 5 MB
DESCRPTION DATATYPE SIZE
USER ID STRING 25
Encrypt./Decrypt. PASSWORD STRING 15
FORMAT MP3
SIZE FLOAT 10 MB
Audio Locker
Video Locker
DESCRPTION DATATYPE SIZE
USER ID STRING 25
Encrypt./Decrypt. PASSWORD STRING 15
FORMAT MP4, 3GPP
SIZE FLOAT 20 MB
4.0 Assumptions and Dependencies
Assumptions Pin code can be sent through SMS to the user mobile for
login. Encrypted password confirmation along with the
Encryption/Decryption password can be sent to the user’s mobile through SMS
Dependencies Unique User Name and Password is required. Set of 3 security question have to be provided. 3 Image recognition has to be uploaded whom the user can only
identify.
5.0 Specific Requirements
5 .1 Use Case R eports
Registration Page:-
Admin Page:-
Login Page:-
Lockers:-
Thank you