You are on page 1of 27
HIG HLY CON FIDENT IAL SECURITY S YSTEM (Software Requirement Specification) Dr. M.G.R. EDUCATIONAL AND RESEARCH

HIG HLY CON FIDENT IAL SECURITY S YSTEM

HIG HLY CON FIDENT IAL SECURITY S YSTEM (Software Requirement Specification) Dr. M.G.R. EDUCATIONAL AND RESEARCH

(Software Requirement Specification)

HIG HLY CON FIDENT IAL SECURITY S YSTEM (Software Requirement Specification) Dr. M.G.R. EDUCATIONAL AND RESEARCH

Dr. M.G.R. EDUCATIONAL AND RESEARCH INSTITUTE

UNIVERSITY

(Declared U/S 3 of UGC Act 1956) Chennai-600095, Tamil Nadu

Team Members: IBM IMPULSE

HANSRAJ MUNKA 091061101170 JOHN CALVIN TIRKEY091061101042 RAVI JAISWAL 091061101159

Project Guide:- Mrs. Sumathy Eswaran

Asst. HOD Department of Computer Science and Engineering

Table of Contents

DescriptionPage No.

  • 1.0 Introduction

    • 1.1 Purpose………………………………………… ..3

    • 1.2 Scope…………………………………………….3

    • 1.3 Definition, Acronyms and Abbreviations……4-5

    • 1.4 References………………………………… … 5

..

..

  • 1.5 Technologies to be used……………………….6

  • 1.6 Overview……………………………………… 6-7 ..

  • 2.0 Overall Description

    • 2.1 Product Perspective……………………………7

    • 2.2 Software Interface……………………………

...

8

  • 2.3 Hardware Interface…………………………… 8

..

  • 2.4 Product Function……………………………… 8

..

  • 2.5 User Characteristics……………………………9

  • 2.6 Constraints………………………………………9

  • 2.7 Architecture Design……………………… … ..10

..

  • 2.8 Use Case Model Description…………….……11

  • 2.9 Class Diagram…………………

...

…….……….12

2.10Sequence Diagram……………………………13

2.11Dataflow Diagram……….…………………….14

3.0Database Design

3.1Schema……………………………………… 15-19

..

  • 4.0 Assumptions and Dependencies…………………20

  • 5.0 Specific Requirements

    • 5.1 Use Case Reports……………………………21-24

1.1 Purpose

HCSS (Highly confidential Security System) is a web

application used to store user’s confidential data.

Due to busy life style we can’t remember all confidential

data like:

Mail id

Password

Bank account no

Pan no

Driving license no

Some confidential images, text and videos

And many more.

So we can develop highly security web application(new

security algorithm and hardware system) to store all

confidential data in single credentials

It comes under network security system for a

personalized application.

Web application will be highly customizable and flexible

enough to easily deploy.

1.2Scope

To design a HCSS (highly confidential security system)

Based on SSL, Encryption, Multi-Level Security.

To enter the data at first we should have registered

user.

During sign up a set of security question should be

saved like answer to any personal question or image

recognition.

At the time of sign up in any other website question is

prompted to the user, do you want to enter the data

confidentially? (Y/n).

Then the personalized application comes into play.

The particular website links directly to the HCSS

application to save the data.

1.2 Definition, Acronyms a nd Abbreviations

HCS

S

Highly Confidential Security System.It’s

aweb application that helps user to save its

important data in an encrypted form in the

server which can be accessed from anywhere

around the world using SSL technique.

WASCE

Web Sphere Application Server Community

Edition.It is an application server that runsand

supports J2EE and web service applications.

DB

2

Database_2.A database management system

that provides

a flexible and efficient databaseplatform to

maintain records

JSP of user’s confidential data like text, pictures,

audio, video.

J2E

 

Java Server Pages.It is used to create

E

dynamic web content.

Java 2 Enterprise Edition.A programming

UM

platform which is a part of java platform

fordeveloping and running distributed java.

L

 

Unified Modeling Language is a standard

XM

language for writing software blueprints.

TheUML may be used to visualize, specify,

L

construct and document

Extensible Markup Language is a text based

HTT format that let developers describe, deliverand

P

exchange structured data between a range of

applications to client for display and

manipulation.

Hyper

Text

Transfer

Protoco

l.It’s a

service

protocol.

HTML

Hyper Text Markup Language.It is the main

markup

language for displaying web pages and other

information that can be displayed in a web

browser..

AJA

  • X Asynchronous JavaScript and XML. It is a Web applicationswhich can send data to, and

retrieve data from, a server asynchronously (in

the background) without interfering with the

display and behavior of the existing page.

CS

Cascading Style Sheets.It is a style sheet

language used for describing the presentation

S

semantics (the look and formatting) of a

document written in a markup language.

RA

Rational Application Developer is a

  • D development tool that helps to design web pagesand also helps to design the diagrams like ER, Database schema diagrams and to generate DDL.

1.3 References

Google Search.

IBM TGMC Sample Synopsis

A Simplified AES Algorithm: Presented by Joshua

Holden, Rose-Human Institute of Technology.

A Advanced Encryption Standard Lecture on Computer

and Network Security by Avi kak.

1.5 Technologies to be used

Relational Database Management System: DB2

Rational Application Developer:RAD

Websphere Application Server Community

Edition:WASCE

Backup Server: Tivoli

Modeler: Rational Rose

Secure Sockets Layer: SSL

Encryption algorithm: Advanced Encryption

Standard(AES)

1.6 Overview

Existing System

User can store their important data in the web but it’s not

safe.

Drawback

Only text can be stored

Proper tabulation is not present for storing data.

Data is not encrypted which can be hack by others.

Reliable connection is not been provided.

Proposed System

256 bit encryption technique is used.

SSL technique is used.

Multilevel security technique is used.

Different Lockers with symmetric key.

Lockers: Documentation, Image, Audio, Video.

Warning mail for incorrect password access will be sent.

Proper storage capacity is provided.

While registering in a new place a question Will prompt to

user whether to save the data in HCSS(Y/n).

Our Plan

To provide a user web based application where the user can

store its confidential data, in the form of text, picture, audio

and video with best possible encryption technique. Different

kinds of lockers will be provided with symmetric key. SSL

technique will be used to make the connection reliable and

maintain its privacy. Multi-Level security will be provided for

confidentiality.Warning mail will be sent to the user mail-ID

for incorrect password access. Proper storage capacity will

be provided for each lockers. And while registering for a new

account in any new website a question Will prompt to user

whether to save its detail in HCSS(Y/n).

2.0 Overall Description

2.1 Product Perspective

2.2

Software Interface

OPERATING SYSTEM- WINDOWS (Any)

WEB BROWSER (Any)

DATBASE- DB2

WEB SERVER–WEBSPHERE

BACKUP SERVER- TIVOLI

CODING-RAD

DESIGNING-RATIONAL ROSE, Visual Basic

LANGUAGES USED-HTML, XML, JAVA, AJAX, PHP, CSS

  • 2.3 Hardware Interface

PROCESSOR-PENTIUM IV (Min.)

RAM-1GB (Min.)

HARD DISK- 20 GB (Min.)

  • 2.4 Product Function

Functional

Log feature

Admin takes care of users authorization

Secure storing of data for remote access

It can store document, image, audio and video.

High level security with 256-bit encryption using SSL

technique.

Non-Functional

Backup and Recovery

24*7 accessibility

2.5

User Characteristics

Multi Lingual support (UTF-8).

Peopleon the move like reporters,one who presents

regular presentations or seminars, business purpose

travellers (geographical bound less).

It’s useful for tech savvy person

  • 2.6 Constraints

Login and password is used for the identification

of users.

Multiple Verification for login.

Multi-level Security for accessing the data.

Only registered users will be authorized to use

the services.

2.7 Architecture Design

2.8 Use Case Model Description

2.9 Class Diagram

2.10 Sequence Diagram

2.11 Dataflow Diagr a m

3.0 Database Design

3.1Schema

Personal Detail (both New User And Admin)

DESCRIPTION

DATATYPE

SIZ

FIRST NAME

STRIN

15

MIDDLE NAME

STRIN

15

LAST NAME

STRIN

15

DATE OF BIRTH

DAT

DD/MM/YYYY

GENDER

CHARACTER

1

PERMANENT ADDRESS

STRIN

50

CITY

STRIN

15

STATE

STRIN

15

PIN CODE

NUMBE

6

PRESENT ADDRESS

STRIN

50

CITY

STRIN

15

STATE

STRIN

15

PIN CODE

NUMBE

6

COUNTRY

STRIN

15

CONTACT NUMBER

NUMBE

10

EMAIL ADDRESS

STRIN

30

OCCUPATION

STRIN

20

User Name And Password (both New User And Admin)

DESCRPTION

DATATYPE

SIZ

USER ID

STRIN

25

EMAIL ADDRESS

STRIN

30

PASSWORD

STRIN

12

CONFIRMED PASSWORD

STRIN

12

DATE OF BIRTH

DAT

DD/MM/YYYY

FIRST SECURITY QUESTION

STRIN

25

SECOND SECURTITY QUESTION

STRIN

25

THIRD SECURITY QUESTION

STRIN

25

FIRST IMAGE RECOGNIZATION

IMAG

1 MB

SENCOND IMAGE RECOGNIZATION

IMAG

1 MB

THIRD IMAGE RECOGNIZATION

IMAG

1 MB

User Account Status

DESCRIPTION

DATATYPE

SIZ

USER ID

STRIN

25

USER FULL NAME

STRIN

30

EMAIL ADDRESS

STRIN

30

PASSWORD

STRIN

12

CONFIRMED PASSWORD

STRIN

12

DATE OF BIRTH

DAT

DD/MM/YYYY

CONTACT NUMBER

NUMBE

10

STATUS

STRIN

10

Documentation Locker

DESCRPTION

DATATYPE

SIZ

USER ID

STRIN

25

Encrypt./Decrypt. PASSWORD

STRIN

15

FORMAT

.DOC, .PDF, .TXT, .xlsx,

SIZE

FLOA

5 MB

Picture Locker

DESCRPTION

DATATYPE

SIZ

USER ID

STRIN

25

Encrypt./Decrypt. PASSWORD

STRIN

15

FORMAT

.

SIZE

FLOA

5 MB

USER ID

STRIN

25

Encrypt./Decrypt. PASSWORD

STRIN

15

FORMAT

MP3

SIZE

FLOA

10

Audio Locker

Video Locker

DESCRPTION

DATATYPE

SIZ

USER ID

STRIN

25

Encrypt./Decrypt. PASSWORD

STRIN

15

FORMAT

MP4,

SIZE

FLOA

20

4.0 Assumptions and Dependencies

Assumptions

Pin code can be sent through SMS to the user mobile for

login.

Encrypted password confirmation along with the

Encryption/Decryption password can be sent to the user’s

mobile through SMS

Dependencies

Unique User Name and Password is required.

Set of 3 security question have to be provided.

3 Image recognition has to be uploaded whom the

user can only identify.

5.0 Specific Requirements

5 .1 Use Case R eports

Registration Page:-

5.0 Specific Requirements 5 .1 Use Case R eports Registration Page:-

Admin Page:-

Login Page:-

Lockers:-

Thank

you