Sei sulla pagina 1di 27

HIGHLY CONFIDENTIAL

SECURITY SYSTEM
(Software Requirement
Specification)

Dr. M.G.R. EDUCATIONAL AND


RESEARCH INSTITUTE

UNIVERSITY
(Declared U/S 3 of UGC Act 1956)
Chennai-600095, Tamil Nadu

Team Members: IBM IMPULSE


HANSRAJ MUNKA 091061101170
JOHN CALVIN TIRKEY091061101042
RAVI JAISWAL 091061101159

Project Guide:Mrs. Sumathy Eswaran


Asst. HOD
Department of Computer Science and Engineering

Table of Contents
DescriptionPage No.
1.0 Introduction
1.1 Purpose..3
1.2 Scope.3
1.3 Definition, Acronyms and Abbreviations4-5
1.4 References....5
1.5 Technologies to be used.6
1.6 Overview..6-7
2.0 Overall Description
2.1 Product Perspective7
2.2 Software Interface...8
2.3 Hardware Interface..8
2.4 Product Function..8
2.5 User Characteristics9
2.6 Constraints9
2.7 Architecture Design....10
2.8 Use Case Model Description.11
2.9 Class Diagram.....12
2.10Sequence Diagram13
2.11Dataflow Diagram..14
3.0Database Design
3.1Schema..15-19
4.0 Assumptions and Dependencies20
5.0 Specific Requirements
5.1 Use Case Reports21-24

1.1 Purpose
HCSS (Highly confidential Security System) is a web
application used to store users confidential data.
Due to busy life style we cant remember all confidential
data like:
Mail id
Password
Bank account no
Pan no
Driving license no
Some confidential images, text and videos
And many more.
So we can develop highly security web application(new
security algorithm and hardware system) to store all
confidential data in single credentials
It comes under network security system for a
personalized application.
Web application will be highly customizable and flexible
enough to easily deploy.

1.2Scope
To design a HCSS (highly confidential security system)
Based on SSL, Encryption, Multi-Level Security.
To enter the data at first we should have registered
user.
During sign up a set of security question should be
saved like answer to any personal question or image
recognition.
At the time of sign up in any other website question is
prompted to the user, do you want to enter the data
confidentially? (Y/n).
Then the personalized application comes into play.
The particular website links directly to the HCSS
application to save the data.

1.2 Definition, Acronyms and Abbreviations


HCS
S
Highly Confidential Security System.Its
aweb application that helps user to save its
important data in an encrypted form in the
server which can be accessed from anywhere
around the world using SSL technique.
WASCE
Web Sphere Application Server Community
Edition.It is an application server that runsand
supports J2EE and web service applications.
DB
2
Database_2.A database management system
that provides
a flexible and efficient databaseplatform to
maintain records
JSP of users confidential data like text, pictures,
audio, video.
J2E
Java Server Pages.It is used to create
E
dynamic web content.
Java 2 Enterprise Edition.A programming
UM platform which is a part of java platform
fordeveloping and running distributed java.
L
Unified Modeling Language is a standard
XM language for writing software blueprints.
TheUML may be used to visualize, specify,
L
construct and document
Extensible Markup Language is a text based
HTT format that let developers describe, deliverand
P
exchange structured data between a range of
applications to client for display and
manipulation.

Hyper
Text
Transfer
Protoco
l.Its a
service
protocol.

HTML
Hyper Text Markup Language.It is the main
markup
language for displaying web pages and other
information that can be displayed in a web
browser..
AJA
X Asynchronous JavaScript and XML. It is a
Web applicationswhich can send data to, and
retrieve data from, a server asynchronously (in
the background) without interfering with the
display and behavior of the existing page.
CS Cascading Style Sheets.It is a style sheet
language used for describing the presentation
semantics (the look and formatting) of a
S
document written in a markup language.
RA
Rational Application Developer is a
D development tool that helps to design web
pagesand also helps to design the diagrams
like ER, Database schema diagrams and to
generate DDL.

1.3 References
Google Search.
IBM TGMC Sample Synopsis
A Simplified AES Algorithm: Presented by Joshua
Holden, Rose-Human Institute of Technology.
A Advanced Encryption Standard Lecture on Computer
and Network Security by Avi kak.

1.5 Technologies to be used


Relational Database Management System: DB2
Rational Application Developer:RAD
Websphere Application Server Community
Edition:WASCE
Backup Server: Tivoli
Modeler: Rational Rose
Secure Sockets Layer: SSL
Encryption algorithm: Advanced Encryption
Standard(AES)

1.6 Overview
Existing System
User can store their important data in the web but its not
safe.
Drawback
Only text can be stored
Proper tabulation is not present for storing data.
Data is not encrypted which can be hack by others.
Reliable connection is not been provided.
Proposed System
256 bit encryption technique is used.
SSL technique is used.
Multilevel security technique is used.
Different Lockers with symmetric key.
Lockers: Documentation, Image, Audio, Video.
Warning mail for incorrect password access will be sent.
Proper storage capacity is provided.
While registering in a new place a question Will prompt to
user whether to save the data in HCSS(Y/n).

Our Plan
To provide a user web based application where the user can
store its confidential data, in the form of text, picture, audio
and video with best possible encryption technique. Different
kinds of lockers will be provided with symmetric key. SSL
technique will be used to make the connection reliable and
maintain its privacy. Multi-Level security will be provided for
confidentiality.Warning mail will be sent to the user mail-ID
for incorrect password access. Proper storage capacity will
be provided for each lockers. And while registering for a new
account in any new website a question Will prompt to user
whether to save its detail in HCSS(Y/n).

2.0 Overall Description


2.1 Product Perspective

2.2 Software Interface

OPERATING SYSTEM- WINDOWS (Any)


WEB BROWSER (Any)
DATBASE- DB2
WEB SERVERWEBSPHERE
BACKUP SERVER- TIVOLI
CODING-RAD
DESIGNING-RATIONAL ROSE, Visual Basic
LANGUAGES USED-HTML, XML, JAVA, AJAX, PHP, CSS

2.3 Hardware Interface


PROCESSOR-PENTIUM IV (Min.)
RAM-1GB (Min.)
HARD DISK- 20 GB (Min.)

2.4 Product Function


Functional
Log feature
Admin takes care of users authorization
Secure storing of data for remote access
It can store document, image, audio and video.
High level security with 256-bit encryption using SSL
technique.
Non-Functional
Backup and Recovery
24*7 accessibility

2.5 User Characteristics


Multi Lingual support (UTF-8).
Peopleon the move like reporters,one who presents
regular presentations or seminars, business purpose
travellers (geographical bound less).
Its useful for tech savvy person

2.6 Constraints
Login and password is used for the identification
of users.
Multiple Verification for login.
Multi-level Security for accessing the data.
Only registered users will be authorized to use
the services.

2.7Architecture Design

2.8Use Case Model Description

2.9Class Diagram

2.10Sequence Diagram

2.11Dataflow Diagram

3.0 Database Design


3.1Schema
Personal Detail (both New User And Admin)
DESCRIPTION
FIRST NAME
MIDDLE NAME
LAST NAME
DATE OF BIRTH
GENDER
PERMANENT ADDRESS
CITY
STATE
PIN CODE
PRESENT ADDRESS
CITY
STATE
PIN CODE
COUNTRY
CONTACT NUMBER
EMAIL ADDRESS
OCCUPATION

DATATYPE
STRIN
G
STRIN
G
STRIN
G
DAT
E
CHARACTER

SIZ
E
15
15
15
DD/MM/YYYY
1

STRIN
G
STRIN

50

G
STRIN
G
NUMBE

15

R
STRIN
G
STRIN

50

G
STRIN
G
NUMBE

15

R
STRIN
G
NUMBE

15

R
STRIN
G
STRIN

30

15
6
15
6
10
20

User Name And Password (both New User


And Admin)

DESCRPTION
USER ID
EMAIL ADDRESS
PASSWORD
CONFIRMED PASSWORD
DATE OF BIRTH
FIRST SECURITY QUESTION
SECOND SECURTITY QUESTION
THIRD SECURITY QUESTION
FIRST IMAGE RECOGNIZATION
SENCOND IMAGE RECOGNIZATION
THIRD IMAGE RECOGNIZATION

DATATYPE
STRIN
G
STRIN
G
STRIN
G
STRIN
G
DAT
E
STRIN
G
STRIN
G
STRIN
G
IMAG
E
IMAG
E
IMAG
E

SIZ
E
25
30
12
12
DD/MM/YYYY
25
25
25
1 MB
1 MB
1 MB

User Account Status

DESCRIPTION
USER ID
USER FULL NAME
EMAIL ADDRESS
PASSWORD
CONFIRMED PASSWORD
DATE OF BIRTH
CONTACT NUMBER
STATUS

DATATYPE
STRIN
G
STRIN
G
STRIN
G
STRIN
G
STRIN
G
DAT
E
NUMBE
R
STRIN
G

SIZ
E
25
30
30
12
12
DD/MM/YYYY
10
10

Documentation Locker

DESCRPTION

DATATYPE

SIZ
E

USER ID

STRIN
G

25

Encrypt./Decrypt. PASSWORD

STRIN
G

15

FORMAT
SIZE

.DOC, .PDF, .TXT, .xlsx,


.pptx, .rtf
FLOA
T

5 MB

Picture Locker

DESCRPTION

DATATYPE

SIZ
E

USER ID

STRIN
G

25

Encrypt./Decrypt. PASSWORD

STRIN
G

15

FORMAT

.
JPEG

SIZE

FLOA
T

DESCRPTION

DATATYPE

5 MB

SIZE

USER ID

STRIN
G

25

Encrypt./Decrypt. PASSWORD

STRIN
G

15

FORMAT

MP3

SIZE

FLOA
T

10
MB

Audio Locker

Video Locker

DESCRPTION

DATATYPE

SIZ
E

USER ID

STRIN
G

25

Encrypt./Decrypt. PASSWORD

STRIN
G

15

FORMAT

MP4,
3GPP

SIZE

FLOA
T

20
MB

4.0 Assumptions and Dependencies


Assumptions
Pin code can be sent through SMS to the user mobile for
login.
Encrypted password confirmation along with the
Encryption/Decryption password can be sent to the users
mobile through SMS

Dependencies
Unique User Name and Password is required.
Set of 3 security question have to be provided.
3 Image recognition has to be uploaded whom the
user can only identify.

5.0 Specific Requirements


5.1 Use Case Reports
Registration Page:-

Admin Page:-

Login Page:-

Lockers:-

Thank
you

Potrebbero piacerti anche