Professional Documents
Culture Documents
Highly Confidential Security System SRS
Highly Confidential Security System SRS
Highly Confidential Security System SRS
Mentor
Prof. Swati. J. N
Team Members
12BIF0047 Hashim Khan
12BCE0033 Abhinav Prasad
Department: Computer Science and Engineering
College
Vellore University of Technology, Katpadi, Vellore 632014.
State: Tamil Nadu
Table of Contents
1.0 Introduction
1.1
1.2
1.3
1.4
1.5
1.6
1.7
Purpose
Scope
Definition, Acronyms and Abbreviations
References
Technologies to be Used
Tools to be used
Overview
1.
INTRODUCTION
HTTP
Hypertext Transfer Protocol is a transaction oriented client/server
protocol between web browser and a Web Server.
HTTPS
Secure Hypertext Transfer Protocol is a HTTP over SSL (secure socket
layer)
RAD
Rational Application Developer is a development tool that helps to
design web pages and also helps to design the diagrams like ER,
Database schema diagrams and to generate DDL.
WAS (Websphere Application Server)
It is an application server that runs business applications and
supports the J2EE and web services standards.
SOA: Service-Oriented Architecture is a set of principles and
methodologies for designing and developing software in the form of
interoperable services.
1.4 References
Software Engineering Theory and Practice (2nd Edition) - Shari
Lawrence Pfleeger
Java Complete Reference (7th Edition) Herbert Schildt.
Cryptography and Network Security William Stallings
Database Management Systems - Navathe.
2. OVERALL DESCRIPTIONS
2.1 Product Perspective
InCrypt is available for use by the administrator and the public.
The administrator and public will use the webpage as a front end. The
browser goes through an http server while the application server
manages the connection between the front end and backend. All
types of information and data that are necessary for the users are
stored in MySQL.
2.2 Software Interface
All users (Admin and Public) require internet connection for
communication.
Public : Web browser (any), operating system (any)
Administrator: Web browser (any), operating system (Windows)
Web Server: WASCE, Operating System (Windows)
Data Base Server: MySQL, operating system (Windows)
Development End: RAD (J2EE, java, java bean, Servlet, HTML,
XML, AJAX) operating system (Windows), Web Sphere (Web
Server)
2.3 Hardware Interface
Minimum Requirements
InCrypt (Server)
Processer
RAM
Storage
Intel Pentium
4 GB RAM
Space
IV
AMD Athlon (1.8 1 GB RAM
MySQL 6.2
GHz)
CE
Public (User)
Browser
Internet Explorer 7,
Firefox 13 with
Flash Plug-ins
Processer
Intel Pentium IV
AMD
Athlon (1.8 GHz)
Disk Space
5 TB
1 GB
RAM
1 GB RAM
Recommended Requirements
InCrypt (Server)
Processer
RAM
Storage
Intel Core
8 GB RAM
Space
Family (Any)
AMD Phenom
MySQL 6.2
2 GB RAM
(2.2 GHz)
CE
Public (User)
Browser
Latest Versions of
Browsers (any)
Processer
Intel Core Family
(Any)
AMD Phenom (2.2
GHz)
Disk Space
10 TB
2 GB
RAM
2 GB RAM
Public use the FTP protocol for uploading and downloading the
files to or from the server.
Administrator configures the SMTP (Simple Mail Transfer Protocol)
Server for sending the mail to the user.
2.6 Constraints
GUI is only in English.
Login and password is used for the identification of the public
and administrator.
Limited to HTTP, SMTP and FTP protocol.
Centralized server is used.
2.7 Assumptions and Dependencies
InCrypt is a platform independent web application. It is assumed
that the client or user computer has latest browser with JavaScript
enabled. In addition, Firefox and Internet Explorer need the flash plugins to play the media files. For configuring the SMTP Server it needs
the Linux operating system with at least kernel version 2.6.30, if
server is in windows then it may need Windows Server.
Sending the message (SMS) to the users mainly depends on the
network operator.
The file uploading and downloading speed are determined by the
network bandwidth and speed of the client.
changes in the service and also clarify the users doubts and
questions about the service in the FAQ (Frequently asked Questions).
System
While users are trying to create their account, InCrypt validates the
users details and post the message (success or failure) to them.
Server has the ability to send the Password reset link to the users
mail, if the user forgets the password to access their account. It
automatically blocks the abuse users. When users are uploading the
file, the system encrypts it by using a state of the art encryption
algorithm. When the users are downloading their file, the system
decrypts it.
3. SPECIFIC REQUIREMENTS
3.1 Use Case Report
3.1.1 Administrator
USECASE
Register
Login
Logout
Manage FAQ
View Profile
Update Profile
Push Notifications
Manage User Profiles
Manage Lockers
Generate Report
DESCRIPTION
The administrator create their account
for managing the service
The administrator can sign into account
to manage the service
Logging out from the server
The Admin may manage the Frequently
Asked Question page to clarify user
doubts
The admin can view their own profile
The Admin may update their own profile
The admin can send notifications to
registered users informing them of any
changes
The admin can manage the field
registered users profile
The admin may manage and maintain
the various security lockers
The admin may generate reports about
the service
3.1.1 Public
USECASE
Register
Login
Logout
FAQ
View Profile
Update Profile
View Notifications
Download from Lockers
Upload in Lockers
Generate Report
DESCRIPTION
The public can create their account for
using the service
The user can sign in into account and
use the service
Logging out from the server
The user can ask and answer questions
in the Frequently Asked Questions (FAQ)
page.
The user can view their own profile
The user may update their own profile
The user can view a notification from
the administrator
The user may securely download his
files from the various lockers
The user may store his confidential data
in various lockers
The user may generate reports about
the service
3.2.2 Login