Top Banner
Highly Confidential Security System Version 1.0 Software Requirements Specification 20-12-2012 Sole Survivors Sole Survivors | Hindusthan College of Engineering and Technology 1 solesurvivors Highly Confidential Security System Software Requirements Specification Version 1.0 Mentor Mr.R.Jayaraj (Asst. Professor), Department of CSE Members Arun Prasath.S - 090105107008 Jojy George - 100405107005 Prabhu.E - 100405107013 Vivek Andrew Sha - 090105107121 College - Hindusthan College of Engineering and Technology, Coimbatore 641032 Department - Computer Science and Engineering State - Tamil Nadu
34

Highly confidential security system - sole survivors - SRS

May 07, 2015

Download

Technology

Arun prasath

In day-to-day life it is quite hard to remember all confidential data like Mail Id, Password, bank account number, Insurance policy number, PAN number, Driving License number, education certificate Numbers, Some highly value scan copy, some confidential photo, music and videos. Crypto Locker is a
highly secure web application to store all confidential data in single credential.
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
  • 1.Highly Confidential Security System Software Requirements Specification Sole SurvivorsVersion 1.0 20-12-2012solesurvivors Highly Confidential Security System Software Requirements SpecificationVersion 1.0Mentor Mr.R.Jayaraj (Asst. Professor), Department of CSE Members Arun Prasath.S-090105107008Jojy George-100405107005Prabhu.E-100405107013Vivek Andrew Sha -090105107121College - Hindusthan College of Engineering and Technology, Coimbatore 641032 Department - Computer Science and Engineering State - Tamil NaduSole Survivors | Hindusthan College of Engineering and Technology1

2. Highly Confidential Security System Software Requirements Specification Sole SurvivorsVersion 1.0 20-12-2012Revision History DateVersionDescriptionAuthor20-12-20121.0Initial ReleaseSole SurvivorsSole Survivors | Hindusthan College of Engineering and Technology2 3. Highly Confidential Security System Software Requirements Specification Sole SurvivorsVersion 1.0 20-12-2012Table of Contents DescriptionPage No1. Introduction4-91.1 Methodology 4 1.2 Purpose .. .. 5 1.3 Scope . .. 5 1.4 Definitions, Acronyms and Abbreviations .. 6 1.5 References .. 7 1.6 Technologies to be used ..71.7 Tools to be used . . 7 1.8 Overview .. 92. Overall Description9 - 182.1 Product Perspective . 9 2.2 Product Functions. 10 2.3 Software Interface . 10 2.4 Hardware Interface . 11 2.5 User Characteristics . 12 2.6 Constraints .. 12 2.7 Assumptions and Dependencies 12 2.8 Architecture Design . 13 2.9 Use Case Model Survey ... 14 2.10 Database Design.. 15 2.11 ER diagram. 163. Specific Requirements17 - 333.1 Use Case Reports . 17 3.2 Activity Diagrams 20 3.3 Sequence Diagrams . 294. Supporting Information344.1 Index. 34Sole Survivors | Hindusthan College of Engineering and Technology3 4. Highly Confidential Security System Software Requirements Specification Sole SurvivorsVersion 1.0 20-12-20121. Introduction In day-to-day life it is quite hard to remember all confidential data like Mail Id, Password, bank account number, Insurance policy number, PAN number, Driving License number, education certificate Numbers, Some highly value scan copy, some confidential photo, music and videos. Crypto Locker is a highly secure web application to store all confidential data in single credential.1.1 Methodology The Rational Unified Process brings together elements from all of the generic process models, supports iteration and illustrates good practice in specification and design. The RUP is normally described from three perspectives: A dynamic perspective that shows the phases of the model over timeA static perspective that shows the process activities that are enactedA practice perspective that suggests good practices to be used during the processSole Survivors | Hindusthan College of Engineering and Technology4 5. Highly Confidential Security System Software Requirements Specification Sole SurvivorsVersion 1.0 20-12-2012Inception The goal of the inception phase is to establish a business case for the system. Identifying all external entities that will interact with the system and defining these interactions. This information is used to assess the contribution of system to business.Elaboration The goals of the elaboration phase are to develop an understanding of the problem domain, establish an architectural framework, develop project plan and identify key project risks.Construction This phase is concerned with system design, programming and testing. Parts of the system are developed in parallel and integrated during this phase.Transition This is the final phase of RUP and is concerned with moving the system from the development community to the user community and making it work in real environment.1.2 Purpose Crypto Locker is a web application developed for secure and easy access of data. Crypto Locker is a useful and convenient application that spares you the trouble of remembering the passwords and securing the files. This application helps people to store their passwords and various types of files like photos, music and videos in a secure and efficient manner. The application which we develop here uses state of the art encryption technology to secure files and access over anywhere in the world using the internet.1.3 Scope There are two basic users Administrator, User.All users have their own profile in Crypto Locker.Administrator has an ability to manage the registered user profiles and organize the files stored in the server.Administrator has the ability to provide the notification message to the logged users via webpage.Public peoples are the users used this web application to protect their important details in single credentials.Citizens (users) can access their files through internet from anywhere in the world.Sole Survivors | Hindusthan College of Engineering and Technology5 6. Highly Confidential Security System Software Requirements Specification Sole SurvivorsVersion 1.0 20-12-20121.4 Definitions, Acronyms and Abbreviations AJAX - Asynchronous JavaScript and XML is about updating parts of a web page, without reloading the whole page.Database platform (DB2) - DB2 Database is the database management system that delivers a flexible and cost effective database platform to build robust on demand business applications and supports the J2EE and web services standards.WASCE - Websphere Application Server Community Edition is an application server that runs and supports J2EE and web service applications.UML - Unified Modeling Language is a standard language for writing software blueprints. The UML may be used to visualize, specify, construct and documentXML - eXtensible Markup Language is a text based format that let developers describe, deliver and exchange structured data between a range of applications to client for display and manipulation.JSP - Java Server Pages is used to create dynamic web content. J2EE - Java 2 Enterprise Edition is a programming platform which is a part of java platform for developing and running distributed java.HTTP - Hypertext Transfer Protocol is a transaction oriented client/server protocol between web browser and a Web Server.HTTPS - Secure Hypertext Transfer Protocol is a HTTP over SSL (secure socket layer). RAD - Rational Application Developer is a development tool that helps to design web pages and also helps to design the diagrams like ER, Database schema diagrams and to generate DDL.WAS (Websphere Application Server) - It is an application server that runs business applications and supports the J2EE and web services standards.Sole Survivors | Hindusthan College of Engineering and Technology6 7. Highly Confidential Security System Software Requirements Specification Sole SurvivorsVersion 1.0 20-12-2012SOA: Service-Oriented Architecture is a set of principles and methodologies for designing and developing software in the form of interoperable services.1.5 References IBM TGMC Sample Synopsis.Software Engineering Theory and Practice (2nd Edition) - Shari Lawrence PfleegerDatabase Management Systems - Navathe.Object Oriented Modeling and Design with UML (2nd Edition) - Michael Blaha, James Rambaugh.Java Complete Reference (7th Edition) Herbert Schildt.Cryptography and Network Security William Stallings1.6 Technologies to be used J2EE : Programming Platform for developing and running distributed JavaAJAX : Updating parts of a web page, without reloading the whole page.SOA : Set of principles and methodologies for designing and developing software in the form of interoperable services. UML : Standard for writing software blueprints, and used to visualize, specify, construct and document. XML : XML is a text based format that let developers describe, deliver and exchange structured data between a range of applications to client for display and manipulation.Jasper: Jasper Reports is an open source Java reporting tool that can write to a variety of targets, such as: screen, a printer, into PDF, HTML, Microsoft Excel, RTF, ODT, Commaseparated values or XML files.1.7 Tools to be used Rational Rose Rational Rose is an object-oriented programming (OOP) and unified modeling language (UML) tool to design enterprise-level software applications and components. It creates visual software application models under object-oriented principles. Example application models include the creation of actors, use cases, relationships, entities, etc. It uses classical UML concepts to graphically model software applications. This facilitates documenting the environment, requirements and overall design. Sole Survivors | Hindusthan College of Engineering and Technology7 8. Highly Confidential Security System Software Requirements Specification Sole SurvivorsVersion 1.0 20-12-2012Eclipse Eclipse is a multi-language software development environment comprising an integrated development environment (IDE) and an extensible plug-in system.WPS WPS stands for Wi-Fi Protected Setup and was designed to simplify the process of configuring security on wireless networks.Rational Software Architect (RSA) IBM Rational Software Architect, (RSA) made by IBM's Rational Software division, is a comprehensive modeling and development environment that uses the Unified Modeling Language (UML) for designing architecture for C++ and Java 2 Enterprise Edition (J2EE) applications and web services.Development tool RAD IBM Rational Application Developer for Web Sphere Software (RAD) is an integrated development environment (IDE), made by IBM's Rational Software division, for visually designing, constructing, testing, and deploying Web services, portals, and Java (J2EE) applications.Websphere Application Server (WAS) IBM Websphere Application Server (WAS), a software application server, is the flagship product within IBM's Websphere brand. WAS is built using open standards such as Java EE, XML, and Web Services.Web server WASCE Websphere Application Server Community Edition (from now on WASCE) is a free, certified Java EE 5 server for building and managing Java applications. It is IBM's supported distribution of Apache Geronimo that uses Tomcat for servlet container and Axis 2 for web services. Over 15 WASCE developers are committers in the Apache Geronimo project.DB2 (Database 2) DB2 is a family of relational database products provides an open database environment that runs on a wide variety of computing platforms. A DB2 database can grow from a small single-user application to a large multi-user system. Sole Survivors | Hindusthan College of Engineering and Technology8 9. Highly Confidential Security System Software Requirements Specification Sole SurvivorsVersion 1.0 20-12-20121.8 Overview The SRS will include two sections, namely: Overall Description This section will describe major components of the system, interconnections, and external interfaces. Specific Requirements This section will describe the functions of actors, their roles in the system and the constraints faced by the system.2. Overall Descriptions 2.1 Product Perspective The Crypto Locker is available for use by the administrator and the user. The administrator and users will use the webpage as a front end. The browser goes through an http server. Application server manages the connection between the front end and backend, all types of information and data, that are necessary for the users are stored in DB2.Sole Survivors | Hindusthan College of Engineering and Technology9 10. Highly Confidential Security System Software Requirements Specification Sole SurvivorsVersion 1.0 20-12-20122.2 Product Functions The Crypto Locker service provides the user interface (UI) to user and administrator for creating their profiles.This product has the ability to send the Account verification link to the users mail, while creating their account.This product has the ability to send Password Reset link to the users mail, if the user forgets the password for accessing the account.This product is able to detect the users browsers.This product provides the users to create the locker facilities for Bank account information, Music, Video and Image files.This product allows the registered users to store their important details on a server in an encrypted format and while downloading, it is automatically decrypted.This product provides the facility for administrators to generate the reports on users logs in .PDF and Microsoft Excel formats.It ask the accounts current password from the user when they want their personal credentials from our server as a report (PDF and Excel).2.3 Software Interface (All users require internet for communication)Public People (users) Web browser (any), operating system (any)Administrator Web browser (any), operating system (Windows)Web Server WASCE, Operating System (Windows)Data Base Server DB2, operating system (Windows)Development End RAD (J2EE, java, java bean, Servlet, HTML, XML, AJAX) operating system (Windows), Web Sphere (Web Server)Sole Survivors | Hindusthan College of Engineering and Technology10 11. Highly Confidential Security System Software Requirements Specification Sole SurvivorsVersion 1.0 20-12-20122.4 Hardware Interface 2.4.1 Minimum RequirementsCrypto Locker (Server)Processor Storage SpaceRAMDisk SpaceIntel Pentium IV 4 GB RAM5 TB1 GB RAM1 GBAMD Athlon (1.8 GHz) DB2 9.72Users (Public People)BrowserProcessorRAMInternet Explorer 7, Firefox 13 withIntel Pentium IV AMD1 GB RAMFlash Plug-insAthlon (1.8 GHz)2.4.2 Recommended RequirementsCrypto Locker (Server)Processor Storage SpaceRAMDisk SpaceIntel Core Family (Any)8 GB RAM10 TB2 GB RAM2 GB AMD Phenom DB2 9.72(2.2 GHz)Users (Public People)BrowserRAMIntel Core Family (Any) Latest Versions of Browsers (any)Processor2 GB RAMAMD Phenom (2.2 GHz)Sole Survivors | Hindusthan College of Engineering and Technology11 12. Highly Confidential Security System Software Requirements Specification Sole SurvivorsVersion 1.0 20-12-20122.5 User Characteristics Both users and administrator on internet will be using HTTP protocol.Users use the FTP protocol for uploading and downloading the files from or to the server.Administrator configures the SMTP Server for sending the mail to the user.2.6 Constraints GUI is only in English.Login and password is used for the identification of the user (public people) and administrator.Limited to HTTP, SMTP and FTP protocol.Centralized server is used.2.7 Assumptions and Dependencies Crypto Locker is a platform independent web application. It is assumed that the client or user computer has latest browser with JavaScript enabled. In addition, Firefox and Internet Explorer need the flash plug-ins to play the media files. For configuring the SMTP Server it needs the Linux operating system with at least kernel version 2.6.30, if server is in windows then it may need Windows Server. Sending the message (SMS) to the users mainly depends on the network operator.Sole Survivors | Hindusthan College of Engineering and Technology12 13. Highly Confidential Security System Software Requirements Specification Sole SurvivorsVersion 1.0 20-12-20122.8 Architecture DesignSole Survivors | Hindusthan College of Engineering and Technology13 14. Highly Confidential Security System Software Requirements Specification Sole SurvivorsVersion 1.0 20-12-20122.9 Use Case Model Survey2.9 Use Case Model SurveyUsers (Public People) Users can upload their files in their own personal locker. The locker includes various subsets like Music locker, Image locker, Video locker, Password locker and Bank Account Information locker. Users can access their personal (uploaded) files through internet. Users can participate in forum discussions to clarify their doubts and also able to view the notifications sent from the administrator.Sole Survivors | Hindusthan College of Engineering and Technology14 15. Highly Confidential Security System Software Requirements Specification Sole SurvivorsVersion 1.0 20-12-2012Administrator Administrator has the ability to manage the registered users profile. Administrator can send the notification to the logged user about any changes in the service and also clarify the users doubts and questions about the service.System While users are trying to create their account, Crypto System validates the users details and post the message (success or failure) to them. Server has the ability to send the Password reset link to the users mail, if the user forgets the password to access their account. It automatically blocks the abuse users. When users are uploading the file, the system encrypts it by using the algorithm, when the users are downloading their file, the system decrypts it.2.10 Database DesignSole Survivors | Hindusthan College of Engineering and Technology15 16. Highly Confidential Security System Software Requirements Specification Sole SurvivorsVersion 1.0 20-12-20122.11 ER DiagramSole Survivors | Hindusthan College of Engineering and Technology16 17. Highly Confidential Security System Software Requirements Specification Sole SurvivorsVersion 1.0 20-12-20123. Specific Requirements 3.1 Use Case Reports 3.1.1 Administrator3.1.1 Use Case Report for AdministratorUSECASE Register Username Verification Sign In Validate Password Profiles Update Profile Manage user Profiles Push Notification Generate Reports Manage FAQ Sign outDESCRIPTION The administrator create their account for managing the service It checks the provided name with already existing name during registration The admin can sign in into account and manage the service The server validates the password and lets the admin use the service The admin can view their own profile The admin can update their own profile in case of any changes The admin can manage the field registered users profile The admin can push/send the notification in case of any changes The admin can able to generate the reports about the service The admin may clarify the doubts from clients Logged out from the serverSole Survivors | Hindusthan College of Engineering and Technology17 18. Highly Confidential Security System Software Requirements Specification Sole SurvivorsVersion 1.0 20-12-20123.1.2 Public People3.1.2 Use Case Report for Public People (Users)USECASE Register Username Verification Sign In Validate Password Profiles Update Profile FAQ View Notifications Download File Generate Reports Upload File Encryption/Decryption Lockers Sign outDESCRIPTION Citizens can create their account for using the service It checks the provided name with already existing name during registration The user can sign in into account and use the service The server validates the password and lets the user use the service The user can view his profile The user can update his current status about the case The user can able to post and reply their answers in the forum like page The user receive the notification message from the administrator The user can download their personal data using the secret key The user can generate report from remote location. The user can upload their personal data into the server All data can be securely transmitted and received using Encryption algorithm It includes image, video, music, password and bank account details Logged out from the serviceSole Survivors | Hindusthan College of Engineering and Technology18 19. Highly Confidential Security System Software Requirements Specification Sole SurvivorsVersion 1.0 20-12-20123.1.3 Crypto System3.1.3 Use Case Report for Crypto SystemUSECASE Encryption Decryption Block abuse user Validate Registration Send Mail Send Password TokenDESCRIPTION The system encrypts the files from the users disk when he/she want to upload The system decrypts the files from the server when the user want to download Sever automatically blocks the lazy and abuse users based on the rules Server Validates the user details and registers it into the database Server sends the verification link to the user for the confirmation Server sends the password token in case the user forgets the passwordSole Survivors | Hindusthan College of Engineering and Technology19 20. Highly Confidential Security System Software Requirements Specification Sole SurvivorsVersion 1.0 20-12-20123.2 Activity Diagrams 3.2.1 User Registration The user is made to fill all the mandatory fields, each user must choose a unique user name. If the user has filled a name that is already present in the database, then the user will be prompted to fill in a different username. After this the user must enter the new password twice. When the user clicks the submit button the database verifies all the mandatory fields are filled or not. When all the fields are filled the verification mail is automatically send to users mail, after click the verification link the user is registered, otherwise the user is made to fill the fields again.3.2.1 User Registration Activity Sole Survivors | Hindusthan College of Engineering and Technology20 21. Highly Confidential Security System Software Requirements Specification Sole SurvivorsVersion 1.0 20-12-20123.2.2 Validate Registration The user enters the registration details. The system validates the details and if the details are found invalid the system rejects it else the system sends the verification mail to the user. The user needs to follow the verification link to complete his registration.3.2.2 Validate RegistrationSole Survivors | Hindusthan College of Engineering and Technology21 22. Highly Confidential Security System Software Requirements Specification Sole SurvivorsVersion 1.0 20-12-20123.2.3 Login Activity The user enters the login credentials. The System validates the login credentials. If the login credentials are valid then the system detects the type of user. If user is a member then the system redirects to the members home page. If the user is administrator then the system redirects to the administrators home page.3.2.3 Login Activity Sole Survivors | Hindusthan College of Engineering and Technology22 23. Highly Confidential Security System Software Requirements Specification Sole SurvivorsVersion 1.0 20-12-20123.2.4 Password Reset If the user forgets his password then he should click on the Forget password link. Then the system prompts him to enter his Mail ID. The system validates the Mail ID. If the Mail ID is valid then the system sends the password reset mail to that Mail ID. If the Mail ID is invalid then the system displays the error message.3.2.4 Password Reset Activity Sole Survivors | Hindusthan College of Engineering and Technology23 24. Highly Confidential Security System Software Requirements Specification Sole SurvivorsVersion 1.0 20-12-20123.2.5 Public People The public people (user) can login to the website using a supplied username and password. After logging in the user can perform several tasks such as generate reports, access lockers, participate in FAQ center, edit profiles and view the notifications sent from the administrator.3.2.5 Public People (users) on WebSole Survivors | Hindusthan College of Engineering and Technology24 25. Highly Confidential Security System Software Requirements Specification Sole SurvivorsVersion 1.0 20-12-20123.2.6 FAQ Page The administrator and the user participate in the FAQ (Discussion forum) for clarifying their doubts. Both admin and citizen can view the posts and may reply to the post, or may be post the questions from the remote location.3.2.6 FAQ Sole Survivors | Hindusthan College of Engineering and Technology25 26. Highly Confidential Security System Software Requirements Specification Sole SurvivorsVersion 1.0 20-12-20123.2.7 Access Lockers A crypto Locker service is provided for the users, who need to store their confidential details in a single password. To access the lockers first he/she need to enter their Crypto Locker credential to login. After that he has the ability to open locker and manage that by uploading and downloading the files. He is also able to generate the reports about their activity for a certain period in a .PDF format documented file.3.2.7 User Access the LockersSole Survivors | Hindusthan College of Engineering and Technology26 27. Highly Confidential Security System Software Requirements Specification Sole SurvivorsVersion 1.0 20-12-20123.2.8 Administrator The administrator login into their accounts home page and manage the overall activity of the application like user management, own profile management, frequently asked Questions i.e., Discussion forum management, notifications management and finally generate the reports.3.2.8 Administrator on WebSole Survivors | Hindusthan College of Engineering and Technology27 28. Highly Confidential Security System Software Requirements Specification Sole SurvivorsVersion 1.0 20-12-20123.2.9 Crypto System The web application has the automatic controls itself. While registration the server system validate the user details, if there is any issues then it automatically denies the registration process, and during the upload, download process encryption and decryption process starts with the help of key provided by the user. Also it blocks the abuse user to prevent the server from any misbehavior activities.3.2.9 Server systems ActivitySole Survivors | Hindusthan College of Engineering and Technology28 29. Highly Confidential Security System Software Requirements Specification Sole SurvivorsVersion 1.0 20-12-20123.3 Sequence Diagrams 3.3.1 User RegistrationSole Survivors | Hindusthan College of Engineering and Technology29 30. Highly Confidential Security System Software Requirements Specification Sole SurvivorsVersion 1.0 20-12-20123.3.2 Login SequenceSole Survivors | Hindusthan College of Engineering and Technology30 31. Highly Confidential Security System Software Requirements Specification Sole SurvivorsVersion 1.0 20-12-20123.3.3 Password ResetSole Survivors | Hindusthan College of Engineering and Technology31 32. Highly Confidential Security System Software Requirements Specification Sole SurvivorsVersion 1.0 20-12-20123.3.4 Upload FilesSole Survivors | Hindusthan College of Engineering and Technology32 33. Highly Confidential Security System Software Requirements Specification Sole SurvivorsVersion 1.0 20-12-20123.3.5 Download FilesSole Survivors | Hindusthan College of Engineering and Technology33 34. Highly Confidential Security System Software Requirements Specification Sole SurvivorsVersion 1.0 20-12-20124. Supporting Information 4.1 Index AISAbbreviations - 6Inception - 5Scope - 5Acronyms 6Interface 10, 11Sequence Diagrams 29Activity Diagrams 20Introduction - 4SOA - 7Administrator 10, 15 AJAX - 6, 7 Architecture Design - 13J J2EE 6, 7Software 10 Specific Requirements -9, 17JSP - 6TMTechnologies - 7Methodology - 4Tools 7Minimum Requirements - 11Transition - 5OUAssumptions - 12C Constraints 12 Construction - 5 Crypto Locker - 9Operating System- 10, 12DOverview 9Database Design 15Overall Descriptions - 9Database platform 6UML 6, 7 Use Case Model - 14 Use Case Reports 17PUser - 14DB2 - 6, 8Product Perspective 9User Characteristics - 12Definitions - 6Product Functions 10WDependencies - 12Public People - 14WASCE 6, 8Development Tool - 8Purpose - 5WAS 6, 8ERWPS 8Eclipse 8RAD - 6Web Server 10Elaboration - 5Rational Rose - 7XER Diagram - 16RSA 8XML 6, 7HRecommended - 11Hardware - 11References - 7Development End - 10HTTP - 6Sole Survivors | Hindusthan College of Engineering and Technology34