SlideShare une entreprise Scribd logo
1  sur  3
Télécharger pour lire hors ligne
9
CHAPTER-3
SYSTEM ANALYSIS
System analysis is used to analyze the project by using feasibility
study. In this project system meets requirements that storage servers
independently perform encoding and re-encryption and key servers
independently perform partial decryption.
3.1 Study of the system
Assuming that a new system is to be developed, the next phase is
system analysis involved a detailed study of the current system, leading to
specification of a new system. Analysis is a detailed study of various
operations performed by a system and their relationship within and outside
the system. During analysis, data are collected on the available files, decision
points and transactions handled by the present system. Interviews, on-site
observation and questionnaire are the tools used for system analysis. Using
the following steps it becomes easy to draw the exact boundary of the new
system under consideration.
 Keeping in view the problems and new requirements.
 Workout the pros and cons including new areas of the system.
3.1.1 Feasibility Report
Feasibility report is conducted once the problem is clearly understood.
The feasibility study which is a high level capsule version of the entire system
analysis and design process.
Fact Finding Techniques
The system we are going to develop a simulation of providing security
for the data in the clouds.
WINDS OF CHANGE FROM VENDOR SYSTEM ANALYSIS
LOCK-IN TO THE META CLOUD
10
3.2 Feasibility Study
A feasibility study is a high-level capsule version of the entire System
analysis and Design Process. The study begins by classifying the problem
definition. Feasibility is to determine if it’s worth doing. Once an acceptance
problem definition has been generated, the analyst develops a logical model
of the system. A search for alternatives is analyzed carefully. There are 3
parts in feasibility study
3.2.1 Operational Feasibility
The characteristics as follows,
 Will the system be used if it developed and implemented.
 If there was sufficient support for the project from the management
and from the users.
 Will the system produce poorer result in any respect or area?
 This system can be implemented in the organization because there is
adequate support from management and users. Being developed in
java so that the necessary operations are carried out automatically.
3.2.2 Technical Feasibility
 Does the necessary technology exist to do what is been suggested
 Does the proposed equipment have the technical capacity for using
the new system?
 Are there technical guarantees of accuracy, reliability and data
security?
 The project is developed on Pentium III with 256 MB RAM.
 The environment required in the development of system is any
windows platform
 The language used in the development is JAVA 1.4.0, Amcat1.6.0 &
Windows Environment
WINDS OF CHANGE FROM VENDOR SYSTEM ANALYSIS
LOCK-IN TO THE META CLOUD
11
3.2.3 Financial and Economical Feasibility
The system developed and installed will be good benefit to the
organization whoever is going to posses this. The system will be developed
and operated in the existing hardware and software infrastructure. So there is
no need of additional hardware and software for the system. With this system
the organization people can have better idea regarding mobile networks which
could help them in developing such network solutions.
3.2.4 System Description
The File security system is designed basically in three different
modules they are GUI module, Authorization and authentication module,
Connection Manager Module, Security System module
GUI Module basically deals with the design of the interface which
include the service of providing the user with the flexibility of accessing the file
system and selecting the required file for the transfer. It should also provide
the system to collect the information from the user to check the authorization
in providing the access to the file system. The interface is also to consider the
design, which includes the services of sending and receiving of the files with
encryption and decryption standards.
Authentication and Authorization Services module deals with the
checking of user name and corresponding password from the authentication
server, the backend database where the table containing the required
information is stored. If the authentication server validates the user then he is
provided with the File Encryption/decryption and transfer services.
The Connection Manager deals with the architecture, which supports
the system to identify the end users for the communication and establish the
communication. Connection and disconnection of the communication channel
between the users for the access of file system and file transfer services. The
Connection Manager receives the IP address to be connected and the file to
be sent then establishes the connection and transfers the file.
Security implementation module considers the implementation of the
encryptions and decryption standards in transfer the files from one system to
another in a distributed environment.

Contenu connexe

Tendances

Cis 349 final exam guide set 2
Cis 349 final exam guide set 2Cis 349 final exam guide set 2
Cis 349 final exam guide set 2lifesgood13
 
report on network security fundamentals
report on network security fundamentalsreport on network security fundamentals
report on network security fundamentalsJassika
 
Design for security in operating system
Design for security in operating systemDesign for security in operating system
Design for security in operating systemBhagyashree Barde
 
Sensitive Data Protection in DBaaS
Sensitive Data Protection in DBaaSSensitive Data Protection in DBaaS
Sensitive Data Protection in DBaaSKAMLESH HINGWE
 
Security System Design for an Intelligent Building
Security System Design for an Intelligent BuildingSecurity System Design for an Intelligent Building
Security System Design for an Intelligent BuildingKyle Zheng
 
Session 11 Tp 11
Session 11 Tp 11Session 11 Tp 11
Session 11 Tp 11githe26200
 
System protection in Operating System
System protection in Operating SystemSystem protection in Operating System
System protection in Operating Systemsohaildanish
 
Stayer cis 349 final exam guide set 2 new
Stayer cis 349 final exam guide set 2 newStayer cis 349 final exam guide set 2 new
Stayer cis 349 final exam guide set 2 newTristanmillerr
 
Uop cis 349 final exam guide set 2 new
Uop cis 349 final exam guide set 2 newUop cis 349 final exam guide set 2 new
Uop cis 349 final exam guide set 2 newmatthewtaylorliam12
 
Stayer cis 349 final exam guide set 2 new
Stayer cis 349 final exam guide set 2 newStayer cis 349 final exam guide set 2 new
Stayer cis 349 final exam guide set 2 newshyaminfo17
 
Uop cis 349 final exam guide set 2 new
Uop cis 349 final exam guide set 2 newUop cis 349 final exam guide set 2 new
Uop cis 349 final exam guide set 2 newuopassignment
 
Operating system security (a brief)
Operating system security (a brief)Operating system security (a brief)
Operating system security (a brief)cnokia
 
Windows Security in Operating System
Windows Security in Operating SystemWindows Security in Operating System
Windows Security in Operating SystemMeghaj Mallick
 

Tendances (15)

Cis 349 final exam guide set 2
Cis 349 final exam guide set 2Cis 349 final exam guide set 2
Cis 349 final exam guide set 2
 
report on network security fundamentals
report on network security fundamentalsreport on network security fundamentals
report on network security fundamentals
 
Design for security in operating system
Design for security in operating systemDesign for security in operating system
Design for security in operating system
 
OSCh18
OSCh18OSCh18
OSCh18
 
Sensitive Data Protection in DBaaS
Sensitive Data Protection in DBaaSSensitive Data Protection in DBaaS
Sensitive Data Protection in DBaaS
 
Security System Design for an Intelligent Building
Security System Design for an Intelligent BuildingSecurity System Design for an Intelligent Building
Security System Design for an Intelligent Building
 
Session 11 Tp 11
Session 11 Tp 11Session 11 Tp 11
Session 11 Tp 11
 
System protection in Operating System
System protection in Operating SystemSystem protection in Operating System
System protection in Operating System
 
Stayer cis 349 final exam guide set 2 new
Stayer cis 349 final exam guide set 2 newStayer cis 349 final exam guide set 2 new
Stayer cis 349 final exam guide set 2 new
 
Uop cis 349 final exam guide set 2 new
Uop cis 349 final exam guide set 2 newUop cis 349 final exam guide set 2 new
Uop cis 349 final exam guide set 2 new
 
Stayer cis 349 final exam guide set 2 new
Stayer cis 349 final exam guide set 2 newStayer cis 349 final exam guide set 2 new
Stayer cis 349 final exam guide set 2 new
 
Hari proposal
Hari proposalHari proposal
Hari proposal
 
Uop cis 349 final exam guide set 2 new
Uop cis 349 final exam guide set 2 newUop cis 349 final exam guide set 2 new
Uop cis 349 final exam guide set 2 new
 
Operating system security (a brief)
Operating system security (a brief)Operating system security (a brief)
Operating system security (a brief)
 
Windows Security in Operating System
Windows Security in Operating SystemWindows Security in Operating System
Windows Security in Operating System
 

Similaire à 9.system analysis

Secure Authorised De-duplication using Convergent Encryption Technique
Secure Authorised De-duplication using Convergent Encryption TechniqueSecure Authorised De-duplication using Convergent Encryption Technique
Secure Authorised De-duplication using Convergent Encryption TechniqueEswar Publications
 
FAST PHRASE SEARCH FOR ENCRYPTED CLOUD STORAGE.pptx
FAST PHRASE SEARCH FOR ENCRYPTED CLOUD STORAGE.pptxFAST PHRASE SEARCH FOR ENCRYPTED CLOUD STORAGE.pptx
FAST PHRASE SEARCH FOR ENCRYPTED CLOUD STORAGE.pptxgattamanenitejeswar
 
Software engg. pressman_ch-10
Software engg. pressman_ch-10Software engg. pressman_ch-10
Software engg. pressman_ch-10Dhairya Joshi
 
documentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesdocumentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesSahithi Naraparaju
 
Second phase report on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTIO...
Second phase report on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTIO...Second phase report on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTIO...
Second phase report on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTIO...Nikhil Jain
 
Asp net whitepaper
Asp net whitepaperAsp net whitepaper
Asp net whitepaperZayar Shwe
 
Metric for Evaluating Availability of an Information System : A Quantitative ...
Metric for Evaluating Availability of an Information System : A Quantitative ...Metric for Evaluating Availability of an Information System : A Quantitative ...
Metric for Evaluating Availability of an Information System : A Quantitative ...IJNSA Journal
 
lake city institute of technology
lake city institute of technology lake city institute of technology
lake city institute of technology RaviKalola786
 
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...IJERA Editor
 
Security Measures For A System
Security Measures For A SystemSecurity Measures For A System
Security Measures For A SystemLaura Smith
 
enhanced secure multi keyword top k retrieval in cloud
enhanced secure multi keyword top k retrieval in cloudenhanced secure multi keyword top k retrieval in cloud
enhanced secure multi keyword top k retrieval in cloudINFOGAIN PUBLICATION
 
Paper id 712019116
Paper id 712019116Paper id 712019116
Paper id 712019116IJRAT
 
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...Yashwanth Reddy
 
Software Engineering Important Short Question for Exams
Software Engineering Important Short Question for ExamsSoftware Engineering Important Short Question for Exams
Software Engineering Important Short Question for ExamsMuhammadTalha436
 
Cake shop billing system
Cake shop billing systemCake shop billing system
Cake shop billing systemAkshita Pillai
 
Authorized Duplicate Check Scheme
Authorized Duplicate Check SchemeAuthorized Duplicate Check Scheme
Authorized Duplicate Check SchemeIRJET Journal
 
MEDICAL FACILITY ANALYSIS2MEDICAL FACILITY ANALYSIS16.docx
MEDICAL FACILITY ANALYSIS2MEDICAL FACILITY ANALYSIS16.docxMEDICAL FACILITY ANALYSIS2MEDICAL FACILITY ANALYSIS16.docx
MEDICAL FACILITY ANALYSIS2MEDICAL FACILITY ANALYSIS16.docxARIV4
 

Similaire à 9.system analysis (20)

Secure Authorised De-duplication using Convergent Encryption Technique
Secure Authorised De-duplication using Convergent Encryption TechniqueSecure Authorised De-duplication using Convergent Encryption Technique
Secure Authorised De-duplication using Convergent Encryption Technique
 
Cloud Storage and Security
Cloud Storage and SecurityCloud Storage and Security
Cloud Storage and Security
 
FAST PHRASE SEARCH FOR ENCRYPTED CLOUD STORAGE.pptx
FAST PHRASE SEARCH FOR ENCRYPTED CLOUD STORAGE.pptxFAST PHRASE SEARCH FOR ENCRYPTED CLOUD STORAGE.pptx
FAST PHRASE SEARCH FOR ENCRYPTED CLOUD STORAGE.pptx
 
Software engg. pressman_ch-10
Software engg. pressman_ch-10Software engg. pressman_ch-10
Software engg. pressman_ch-10
 
documentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesdocumentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemes
 
Srs
SrsSrs
Srs
 
Second phase report on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTIO...
Second phase report on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTIO...Second phase report on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTIO...
Second phase report on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTIO...
 
Asp net whitepaper
Asp net whitepaperAsp net whitepaper
Asp net whitepaper
 
Metric for Evaluating Availability of an Information System : A Quantitative ...
Metric for Evaluating Availability of an Information System : A Quantitative ...Metric for Evaluating Availability of an Information System : A Quantitative ...
Metric for Evaluating Availability of an Information System : A Quantitative ...
 
lake city institute of technology
lake city institute of technology lake city institute of technology
lake city institute of technology
 
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
 
Security Measures For A System
Security Measures For A SystemSecurity Measures For A System
Security Measures For A System
 
enhanced secure multi keyword top k retrieval in cloud
enhanced secure multi keyword top k retrieval in cloudenhanced secure multi keyword top k retrieval in cloud
enhanced secure multi keyword top k retrieval in cloud
 
Paper id 712019116
Paper id 712019116Paper id 712019116
Paper id 712019116
 
publishable paper
publishable paperpublishable paper
publishable paper
 
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
 
Software Engineering Important Short Question for Exams
Software Engineering Important Short Question for ExamsSoftware Engineering Important Short Question for Exams
Software Engineering Important Short Question for Exams
 
Cake shop billing system
Cake shop billing systemCake shop billing system
Cake shop billing system
 
Authorized Duplicate Check Scheme
Authorized Duplicate Check SchemeAuthorized Duplicate Check Scheme
Authorized Duplicate Check Scheme
 
MEDICAL FACILITY ANALYSIS2MEDICAL FACILITY ANALYSIS16.docx
MEDICAL FACILITY ANALYSIS2MEDICAL FACILITY ANALYSIS16.docxMEDICAL FACILITY ANALYSIS2MEDICAL FACILITY ANALYSIS16.docx
MEDICAL FACILITY ANALYSIS2MEDICAL FACILITY ANALYSIS16.docx
 

Plus de NARESH DEVOLLA

Plus de NARESH DEVOLLA (6)

7. introduction
7. introduction7. introduction
7. introduction
 
6.table of centents
6.table of centents6.table of centents
6.table of centents
 
5.abstract
5.abstract5.abstract
5.abstract
 
2.college certificate
2.college certificate2.college certificate
2.college certificate
 
1.coverpage
1.coverpage1.coverpage
1.coverpage
 
4.acknowledgement
4.acknowledgement4.acknowledgement
4.acknowledgement
 

9.system analysis

  • 1. 9 CHAPTER-3 SYSTEM ANALYSIS System analysis is used to analyze the project by using feasibility study. In this project system meets requirements that storage servers independently perform encoding and re-encryption and key servers independently perform partial decryption. 3.1 Study of the system Assuming that a new system is to be developed, the next phase is system analysis involved a detailed study of the current system, leading to specification of a new system. Analysis is a detailed study of various operations performed by a system and their relationship within and outside the system. During analysis, data are collected on the available files, decision points and transactions handled by the present system. Interviews, on-site observation and questionnaire are the tools used for system analysis. Using the following steps it becomes easy to draw the exact boundary of the new system under consideration.  Keeping in view the problems and new requirements.  Workout the pros and cons including new areas of the system. 3.1.1 Feasibility Report Feasibility report is conducted once the problem is clearly understood. The feasibility study which is a high level capsule version of the entire system analysis and design process. Fact Finding Techniques The system we are going to develop a simulation of providing security for the data in the clouds.
  • 2. WINDS OF CHANGE FROM VENDOR SYSTEM ANALYSIS LOCK-IN TO THE META CLOUD 10 3.2 Feasibility Study A feasibility study is a high-level capsule version of the entire System analysis and Design Process. The study begins by classifying the problem definition. Feasibility is to determine if it’s worth doing. Once an acceptance problem definition has been generated, the analyst develops a logical model of the system. A search for alternatives is analyzed carefully. There are 3 parts in feasibility study 3.2.1 Operational Feasibility The characteristics as follows,  Will the system be used if it developed and implemented.  If there was sufficient support for the project from the management and from the users.  Will the system produce poorer result in any respect or area?  This system can be implemented in the organization because there is adequate support from management and users. Being developed in java so that the necessary operations are carried out automatically. 3.2.2 Technical Feasibility  Does the necessary technology exist to do what is been suggested  Does the proposed equipment have the technical capacity for using the new system?  Are there technical guarantees of accuracy, reliability and data security?  The project is developed on Pentium III with 256 MB RAM.  The environment required in the development of system is any windows platform  The language used in the development is JAVA 1.4.0, Amcat1.6.0 & Windows Environment
  • 3. WINDS OF CHANGE FROM VENDOR SYSTEM ANALYSIS LOCK-IN TO THE META CLOUD 11 3.2.3 Financial and Economical Feasibility The system developed and installed will be good benefit to the organization whoever is going to posses this. The system will be developed and operated in the existing hardware and software infrastructure. So there is no need of additional hardware and software for the system. With this system the organization people can have better idea regarding mobile networks which could help them in developing such network solutions. 3.2.4 System Description The File security system is designed basically in three different modules they are GUI module, Authorization and authentication module, Connection Manager Module, Security System module GUI Module basically deals with the design of the interface which include the service of providing the user with the flexibility of accessing the file system and selecting the required file for the transfer. It should also provide the system to collect the information from the user to check the authorization in providing the access to the file system. The interface is also to consider the design, which includes the services of sending and receiving of the files with encryption and decryption standards. Authentication and Authorization Services module deals with the checking of user name and corresponding password from the authentication server, the backend database where the table containing the required information is stored. If the authentication server validates the user then he is provided with the File Encryption/decryption and transfer services. The Connection Manager deals with the architecture, which supports the system to identify the end users for the communication and establish the communication. Connection and disconnection of the communication channel between the users for the access of file system and file transfer services. The Connection Manager receives the IP address to be connected and the file to be sent then establishes the connection and transfers the file. Security implementation module considers the implementation of the encryptions and decryption standards in transfer the files from one system to another in a distributed environment.