SlideShare une entreprise Scribd logo
1  sur  9
Software Requirements
Specification
For
Identity Based Secure Distributed
Data Storage Schemes
Prepared by
N.Sahithi
12C11D5816
Anurag Engineering College
06-03-2014
Identity Based Secure Distributed Data Storage Schemes page ii
Table of Contents
Table of Contents.......................................................................................................................... ii
1. Introduction..............................................................................................................................1
1.1 Purpose ............................................................................................................................................ 1
1.2 Document Conventions.................................................................................................................... 1
1.3 Intended Audience and Reading Suggestions.................................................................................. 1
1.4 Project Scope ................................................................................................................................... 1
1.5 References........................................................................................................................................ 2
2. Overall Description....................................................................Error! Bookmark not defined.
2.1 Product Perspective ......................................................................................................................... 2
2.2 Product Features .............................................................................................................................. 2
2.3 User Classes and Characteristics ..................................................................................................... 3
2.4 Operating Environment.................................................................................................................... 3
2.5 Design and Implementation Constraints.......................................................................................... 4
2.6 User Documentation ........................................................................................................................ 4
2.7 Assumptions and Dependencies ...................................................................................................... 4
3. System Features........................................................................................................................4
4. External Interface Requirements ...........................................................................................5
4.1 User Interfaces................................................................................................................................. 5
4.2 Hardware Interfaces......................................................................................................................... 5
4.3 Software Interfaces .......................................................................................................................... 5
4.4 Communications Interfaces ............................................................................................................. 6
5. Other Nonfunctional Requirements.......................................................................................6
5.1 Performance Requirements.............................................................................................................. 6
5.2 Safety Requirements........................................................................................................................ 6
5.3 Security Requirements..................................................................................................................... 6
5.4 Software Quality Attributes............................................................................................................. 6
6. Other Requirements ................................................................................................................6
Appendix A: Glossary ................................................................................................................7
Identity Based Secure Distributed Data Storage Scheme Page 1
1. Introduction
1.1 Purpose
The purpose of this document is to present a detailed description of identity based secure
distributed data storage schemes. Secure distributed data storage can shift the burden of maintaining
a large number of files from the owner to proxy servers. Proxy servers can convert encrypted files
for the owner to encrypted files for the receiver without the necessity of knowing the content of the
original files. To provide confidentiality and integrity of data outsourced this IBSDDS scheme was
proposed.
1.2 Document Conventions
This SRS archive keeps up diverse sorts of fonts, sizes and faces. This record additionally
specified Times New Roman; font sort is Bold and Normal.
1.3 Intended Audience and Reading Suggestions
This SRS archive is perusing the distinctive sorts of onlooker that the report is planned for, for
example, developers, and venture administrators, showcasing staff, clients, analyzers, and
documentation authors.
Developers: in order to be sure they are developing the right project that fulfills requirements
provided in this document.
Testers: in order to have an exact list of the features and functions that have to respond according to
requirements and provided diagrams.
Users: in order to get familiar with the idea of the project and suggest other features that would
make it even more functional.
Documentation writers: to know what features and in what way they have to explain. What
security technologies are required, how the system will response in each user’s action etc.
Advanced end users, end users/desktop and system administrators: in order to know exactly
what they have to expect from the system, right inputs and outputs and response in error situations.
Identity Based Secure Distributed Data Storage Scheme Page 2
1.4 Project Scope
Scope of the IBSDSS scheme provides an access permission which is bound not only to the identity
of the receiver but also the file. The access permission can be decided by the owner, instead of the
trusted party.
1.5 References
Jinguang Han, Student Member, IEEE, Willy Susilo, Senior Member, IEEE, and Yi Mu,
SeniorMember, IEEE-“Identity-Based Secure Distributed Data Storage Schemes”-IEEE
TRANSACTIONS ON COMPUTERS, 2013.
M. L. Yiu, G. Ghinita, C. S. Jensen, and P. Kalnis, “Enabling search services on outsourced private
spatial data”.
2. Overall Description
2.1 Product Perspective
Proxy servers can perform some functions on the outsourced cipher texts without knowing anything
about the original files. After outsourcing the files to proxy servers, the user will remove them from
his local machine. Therefore, how to guarantee the outsourced files are not accessed by the
unauthorized users and not modified by proxy servers is an important problem. Furthermore, how to
guarantee that an authorized user can query the outsourced files from proxy servers is another concern
as the proxy server only maintains the outsourced cipher texts. To address the issue of confidentiality
and integrity of data outsourced Identity based secure distributed data storage schemes are proposed.
Where proposed project uses 2 IBSDDS schemes: First scheme is secure against Chosen Plaintext
Attacks (CPA), Second scheme is secure against Chosen Cipher text attacks(CCA).
Identity Based Secure Distributed Data Storage Scheme Page 3
2.2 Product Features
 It has two schemes of security, the first scheme is CPA secure, and the second scheme
achieves CCA security.
 To the best of our knowledge, it is the first IBSDDS schemes where access permission is
made by the owner for an exact file and collusion attacks can be protected in the standard
model.
 To achieve stronger security and implement file based access control, the owner must be
online to authenticate requesters and also to generate access permissions for them.
2.3 User Classes and Characteristics
This SRS document we use different types of user classes. Those are User login, Auditor
login and admin login. These are used to characterize the user means of admin module description.
2.4 Operating Environment
Hardware Requirements:
• Hardware : Pentium IV 2.4 GHz.
• Hard Disk : 20 GB.
• Floppy Drive : 1.44 Mb.
• Monitor : SVGA.
• Mouse : Two or Three button mouse
• RAM : 512 MB.
Software Requirements:
• Operating system : Windows XP.
• Programming Language : JAVA/J2EE
• Data Base : MYSQL
Identity Based Secure Distributed Data Storage Scheme Page 4
2.5 Design and Implementation Constraints
Design is the process or art of defining the architecture, components, modules, interfaces,
and data for a system to satisfy specified requirements. One could see it as the application of
systems theory to product development. There is some overlap and synergy with the disciplines of
systems analysis, systems architecture and systems engineering.
2.6 User Documentation
http://www.google.co.in
http://www.youtube.com
2.7 Assumptions and Dependencies
This project is mainly used in many websites like Google, many organizations and etc.
3. System Features
Functional Requirements
The present application has been divided in to four modules.
1. Data owner Module
2. Proxy server Module
3. Receiver Module
4. Data storage Module
Identity Based Secure Distributed Data Storage Scheme Page 5
4. External Interface Requirements
4.1 User Interfaces
Provide requirements of the system, user or business, taking into account all major
classes/categories of users. Provide the type of security or other distinguishing characteristics of
each set of users. List the functional requirements that compose each user requirement. As the
functional requirements are decomposed, the highest level functional requirements are traced to the
user requirements. User requirement information can be in text or process flow format for each
major user class that shows what inputs will initiate the system functions, system interactions, and
what outputs are expected to be generated by the system. The scenarios should be comprehensive,
to the extent that all user types and all major functions are covered. Give each user requirement a
unique number. Typically, user requirements have a numbering system that is separate from the
functional requirements.
4.2 Hardware Interfaces
• System : Pentium IV 2.4 GHz.
• Hard Disk : 20 GB.
• Floppy Drive : 1.44 Mb.
• Monitor : SVGA Monitor.
• Mouse : Two or Three Button Mouse
• RAM : 512 MB.
4.3 Software Interfaces
• Operating system : Windows XP.
• Coding Language : JAVA
• Data Base : MYSQL
Identity Based Secure Distributed Data Storage Scheme Page 6
4.4 Communications Interfaces
This document we use communication interfaces are FTP and HTTP.
5. Other Nonfunctional Requirements
5.1 Performance Requirements
Performance is measured in terms of the output provided by the application. Requirement
specification plays an important part in the analysis of a system.
The requirement specification for any system can be broadly stated as given below:
 The system should be able to interface with the existing system
 The system should be accurate
 The system should be better than the existing system
5.2 Safety Requirements
The user in the application is provided with user name and password for authenticating
before the login process. Invalid users are blocked from logging in. As the application is deployed in
user machine each user can be provided with a login facility authenticates with the set of username
and password for restricting the unauthorized users from loging in to increase the strength of the
passwords the process of encryption and decryption can also be applied.
5.3 Security Requirements
As the source code or software is deployed under the user machine. No security is provided
to the user code. The system security itself is the security i.e. applied to the application.
5.4 Software Quality Attributes
Setting Up Authentication for user to access a specific file which is encrypted by the file
owner a specific simple authentication procedure is required.
Identity Based Secure Distributed Data Storage Scheme Page 7
6. Other Requirements
Appendix A: Glossary
IBSDDS - Identity Based Secure Distributed Data Storage Scheme
CPA - Chosen Plain text Attack
CCA - Chosen Cipher text Attack
DAS - Data As a Service

Contenu connexe

Tendances

Software architecture document
Software architecture documentSoftware architecture document
Software architecture documentHaidar Arya
 
Github-Source code management system SRS
Github-Source code management system SRSGithub-Source code management system SRS
Github-Source code management system SRSAditya Narayan Swami
 
The complete srs documentation of our developed game.
The complete srs documentation of our developed game. The complete srs documentation of our developed game.
The complete srs documentation of our developed game. Isfand yar Khan
 
Srs template
Srs templateSrs template
Srs templatemuqeet19
 
Software Requirements Specification Final
Software Requirements Specification FinalSoftware Requirements Specification Final
Software Requirements Specification Finaljangjong
 
Web server and web-hosting
Web server and web-hostingWeb server and web-hosting
Web server and web-hostingAK DigiHub
 
Software design specification
Software design specificationSoftware design specification
Software design specificationSubhashiniSukumar
 
Chat Application [Full Documentation]
Chat Application [Full Documentation]Chat Application [Full Documentation]
Chat Application [Full Documentation]Rajon
 
Web servers – features, installation and configuration
Web servers – features, installation and configurationWeb servers – features, installation and configuration
Web servers – features, installation and configurationwebhostingguy
 
Software requirement Analysis (SRS) for FACEBOOK
Software requirement Analysis (SRS) for FACEBOOKSoftware requirement Analysis (SRS) for FACEBOOK
Software requirement Analysis (SRS) for FACEBOOKKrishna Mohan Mishra
 
Srs template ieee
Srs template ieeeSrs template ieee
Srs template ieeehoinongdan
 
Software Requirements Specification (SRS) for Online Tower Plotting System (O...
Software Requirements Specification (SRS) for Online Tower Plotting System (O...Software Requirements Specification (SRS) for Online Tower Plotting System (O...
Software Requirements Specification (SRS) for Online Tower Plotting System (O...Dr Sukhpal Singh Gill
 

Tendances (20)

Software Requirement Specification
Software Requirement SpecificationSoftware Requirement Specification
Software Requirement Specification
 
Srs documentation
Srs documentationSrs documentation
Srs documentation
 
Client server architecture
Client server architectureClient server architecture
Client server architecture
 
Software architecture document
Software architecture documentSoftware architecture document
Software architecture document
 
Github-Source code management system SRS
Github-Source code management system SRSGithub-Source code management system SRS
Github-Source code management system SRS
 
The complete srs documentation of our developed game.
The complete srs documentation of our developed game. The complete srs documentation of our developed game.
The complete srs documentation of our developed game.
 
Srs example webapp
Srs example webappSrs example webapp
Srs example webapp
 
Srs template 1
Srs template 1Srs template 1
Srs template 1
 
Srs
SrsSrs
Srs
 
Srs
SrsSrs
Srs
 
Srs template
Srs templateSrs template
Srs template
 
Software Requirements Specification Final
Software Requirements Specification FinalSoftware Requirements Specification Final
Software Requirements Specification Final
 
Web server and web-hosting
Web server and web-hostingWeb server and web-hosting
Web server and web-hosting
 
Squid server
Squid serverSquid server
Squid server
 
Software design specification
Software design specificationSoftware design specification
Software design specification
 
Chat Application [Full Documentation]
Chat Application [Full Documentation]Chat Application [Full Documentation]
Chat Application [Full Documentation]
 
Web servers – features, installation and configuration
Web servers – features, installation and configurationWeb servers – features, installation and configuration
Web servers – features, installation and configuration
 
Software requirement Analysis (SRS) for FACEBOOK
Software requirement Analysis (SRS) for FACEBOOKSoftware requirement Analysis (SRS) for FACEBOOK
Software requirement Analysis (SRS) for FACEBOOK
 
Srs template ieee
Srs template ieeeSrs template ieee
Srs template ieee
 
Software Requirements Specification (SRS) for Online Tower Plotting System (O...
Software Requirements Specification (SRS) for Online Tower Plotting System (O...Software Requirements Specification (SRS) for Online Tower Plotting System (O...
Software Requirements Specification (SRS) for Online Tower Plotting System (O...
 

En vedette

Software Requirement Specification Master Template
Software Requirement Specification Master TemplateSoftware Requirement Specification Master Template
Software Requirement Specification Master TemplateWayne Chen
 
srs for railway reservation system
 srs for railway reservation system srs for railway reservation system
srs for railway reservation systemkhushi kalaria
 
SRS example
SRS exampleSRS example
SRS examplegentzone
 
A secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloudA secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloudShakas Technologies
 
Srs example webapp
Srs example webappSrs example webapp
Srs example webappVineeth E
 
A secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloudA secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloudNinad Samel
 
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the CloudMona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the CloudShruthi Suresh
 
A secure-anti-collusion-data-sharing-scheme-for-dynamic-groups-in-the-cloud
A secure-anti-collusion-data-sharing-scheme-for-dynamic-groups-in-the-cloudA secure-anti-collusion-data-sharing-scheme-for-dynamic-groups-in-the-cloud
A secure-anti-collusion-data-sharing-scheme-for-dynamic-groups-in-the-cloudPvrtechnologies Nellore
 
91743410 advertisement-management-system-srs
91743410 advertisement-management-system-srs91743410 advertisement-management-system-srs
91743410 advertisement-management-system-srsSumit Badaya
 
Leave Management System Documentation
Leave Management System DocumentationLeave Management System Documentation
Leave Management System Documentationmuzammil siddiq
 
Leave management system
Leave management systemLeave management system
Leave management systemAyushi Gaur
 
Leave Management System: Software Requirements Specification Document(SRS)
Leave Management System: Software Requirements Specification Document(SRS) Leave Management System: Software Requirements Specification Document(SRS)
Leave Management System: Software Requirements Specification Document(SRS) Abhilasha Lahigude
 
SRS FOR CHAT APPLICATION
SRS FOR CHAT APPLICATIONSRS FOR CHAT APPLICATION
SRS FOR CHAT APPLICATIONAtul Kushwaha
 
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUDKEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUDNaseem nisar
 
secure multi-owner data sharing for dynamic groups
secure multi-owner data sharing for dynamic groupssecure multi-owner data sharing for dynamic groups
secure multi-owner data sharing for dynamic groupsSuchithra Balan
 
Employee Recruitment System srs
Employee Recruitment System srsEmployee Recruitment System srs
Employee Recruitment System srskrupal shah
 
Cloud Computing Documentation Report
Cloud Computing Documentation ReportCloud Computing Documentation Report
Cloud Computing Documentation ReportUsman Sait
 
Online railway reservation system
Online railway reservation systemOnline railway reservation system
Online railway reservation systemPIYUSH Dubey
 
Cloud computing project report
Cloud computing project reportCloud computing project report
Cloud computing project reportNaveed Farooq
 

En vedette (20)

Software Requirement Specification Master Template
Software Requirement Specification Master TemplateSoftware Requirement Specification Master Template
Software Requirement Specification Master Template
 
srs for railway reservation system
 srs for railway reservation system srs for railway reservation system
srs for railway reservation system
 
SRS example
SRS exampleSRS example
SRS example
 
A secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloudA secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloud
 
Srs example webapp
Srs example webappSrs example webapp
Srs example webapp
 
Srs template
Srs templateSrs template
Srs template
 
A secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloudA secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloud
 
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the CloudMona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
 
A secure-anti-collusion-data-sharing-scheme-for-dynamic-groups-in-the-cloud
A secure-anti-collusion-data-sharing-scheme-for-dynamic-groups-in-the-cloudA secure-anti-collusion-data-sharing-scheme-for-dynamic-groups-in-the-cloud
A secure-anti-collusion-data-sharing-scheme-for-dynamic-groups-in-the-cloud
 
91743410 advertisement-management-system-srs
91743410 advertisement-management-system-srs91743410 advertisement-management-system-srs
91743410 advertisement-management-system-srs
 
Leave Management System Documentation
Leave Management System DocumentationLeave Management System Documentation
Leave Management System Documentation
 
Leave management system
Leave management systemLeave management system
Leave management system
 
Leave Management System: Software Requirements Specification Document(SRS)
Leave Management System: Software Requirements Specification Document(SRS) Leave Management System: Software Requirements Specification Document(SRS)
Leave Management System: Software Requirements Specification Document(SRS)
 
SRS FOR CHAT APPLICATION
SRS FOR CHAT APPLICATIONSRS FOR CHAT APPLICATION
SRS FOR CHAT APPLICATION
 
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUDKEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
 
secure multi-owner data sharing for dynamic groups
secure multi-owner data sharing for dynamic groupssecure multi-owner data sharing for dynamic groups
secure multi-owner data sharing for dynamic groups
 
Employee Recruitment System srs
Employee Recruitment System srsEmployee Recruitment System srs
Employee Recruitment System srs
 
Cloud Computing Documentation Report
Cloud Computing Documentation ReportCloud Computing Documentation Report
Cloud Computing Documentation Report
 
Online railway reservation system
Online railway reservation systemOnline railway reservation system
Online railway reservation system
 
Cloud computing project report
Cloud computing project reportCloud computing project report
Cloud computing project report
 

Similaire à Srs document for identity based secure distributed data storage schemes

documentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesdocumentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesSahithi Naraparaju
 
Record matching over query results
Record matching over query resultsRecord matching over query results
Record matching over query resultsambitlick
 
Software Requirement Specification For Smart Internet Cafe
Software Requirement Specification For Smart Internet CafeSoftware Requirement Specification For Smart Internet Cafe
Software Requirement Specification For Smart Internet CafeHari
 
Cis controls v8_guide (1)
Cis controls v8_guide (1)Cis controls v8_guide (1)
Cis controls v8_guide (1)MHumaamAl
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...IRJET Journal
 
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...IRJET Journal
 
IRJET- Improving Data Storage Security and Performance in Cloud Environment
IRJET- Improving Data Storage Security and Performance in Cloud EnvironmentIRJET- Improving Data Storage Security and Performance in Cloud Environment
IRJET- Improving Data Storage Security and Performance in Cloud EnvironmentIRJET Journal
 
IRJET - A Comprehensive Review on Security Issues and Challenges in Lightweig...
IRJET - A Comprehensive Review on Security Issues and Challenges in Lightweig...IRJET - A Comprehensive Review on Security Issues and Challenges in Lightweig...
IRJET - A Comprehensive Review on Security Issues and Challenges in Lightweig...IRJET Journal
 
IRJET- Sandbox Technology
IRJET- Sandbox TechnologyIRJET- Sandbox Technology
IRJET- Sandbox TechnologyIRJET Journal
 
Cloud Storage System like Dropbox
Cloud Storage System like DropboxCloud Storage System like Dropbox
Cloud Storage System like DropboxIRJET Journal
 
Internet security evaluation system documentation nikitha
Internet security evaluation system documentation nikithaInternet security evaluation system documentation nikitha
Internet security evaluation system documentation nikithaSusmitha Reddy
 
Distributed semantic search system (dsss)
Distributed semantic search system (dsss)  Distributed semantic search system (dsss)
Distributed semantic search system (dsss) Isuru Vincent
 
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET-  	  A Research Paper on Block Design-based Key Agreement for Group Dat...IRJET-  	  A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...IRJET Journal
 
Impact2014: Introduction to the IBM Java Tools
Impact2014: Introduction to the IBM Java ToolsImpact2014: Introduction to the IBM Java Tools
Impact2014: Introduction to the IBM Java ToolsChris Bailey
 
IRJET- Document Management System, Open Source and Secure
IRJET-  	  Document Management System, Open Source and SecureIRJET-  	  Document Management System, Open Source and Secure
IRJET- Document Management System, Open Source and SecureIRJET Journal
 
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET-  	  Single to Multi Cloud Data Security in Cloud ComputingIRJET-  	  Single to Multi Cloud Data Security in Cloud Computing
IRJET- Single to Multi Cloud Data Security in Cloud ComputingIRJET Journal
 

Similaire à Srs document for identity based secure distributed data storage schemes (20)

documentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesdocumentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemes
 
Record matching over query results
Record matching over query resultsRecord matching over query results
Record matching over query results
 
Software Requirement Specification For Smart Internet Cafe
Software Requirement Specification For Smart Internet CafeSoftware Requirement Specification For Smart Internet Cafe
Software Requirement Specification For Smart Internet Cafe
 
Cis controls v8_guide (1)
Cis controls v8_guide (1)Cis controls v8_guide (1)
Cis controls v8_guide (1)
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
 
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
 
IRJET- Improving Data Storage Security and Performance in Cloud Environment
IRJET- Improving Data Storage Security and Performance in Cloud EnvironmentIRJET- Improving Data Storage Security and Performance in Cloud Environment
IRJET- Improving Data Storage Security and Performance in Cloud Environment
 
IRJET - A Comprehensive Review on Security Issues and Challenges in Lightweig...
IRJET - A Comprehensive Review on Security Issues and Challenges in Lightweig...IRJET - A Comprehensive Review on Security Issues and Challenges in Lightweig...
IRJET - A Comprehensive Review on Security Issues and Challenges in Lightweig...
 
IRJET- Sandbox Technology
IRJET- Sandbox TechnologyIRJET- Sandbox Technology
IRJET- Sandbox Technology
 
Cloud Storage System like Dropbox
Cloud Storage System like DropboxCloud Storage System like Dropbox
Cloud Storage System like Dropbox
 
Internet security evaluation system documentation nikitha
Internet security evaluation system documentation nikithaInternet security evaluation system documentation nikitha
Internet security evaluation system documentation nikitha
 
publishable paper
publishable paperpublishable paper
publishable paper
 
Distributed semantic search system (dsss)
Distributed semantic search system (dsss)  Distributed semantic search system (dsss)
Distributed semantic search system (dsss)
 
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET-  	  A Research Paper on Block Design-based Key Agreement for Group Dat...IRJET-  	  A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
 
Pp1t
Pp1tPp1t
Pp1t
 
pp1t
pp1tpp1t
pp1t
 
Pp1t
Pp1tPp1t
Pp1t
 
Impact2014: Introduction to the IBM Java Tools
Impact2014: Introduction to the IBM Java ToolsImpact2014: Introduction to the IBM Java Tools
Impact2014: Introduction to the IBM Java Tools
 
IRJET- Document Management System, Open Source and Secure
IRJET-  	  Document Management System, Open Source and SecureIRJET-  	  Document Management System, Open Source and Secure
IRJET- Document Management System, Open Source and Secure
 
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET-  	  Single to Multi Cloud Data Security in Cloud ComputingIRJET-  	  Single to Multi Cloud Data Security in Cloud Computing
IRJET- Single to Multi Cloud Data Security in Cloud Computing
 

Plus de Sahithi Naraparaju

SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...
SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...
SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...Sahithi Naraparaju
 
literature survey for identity based secure distributed data storage
literature survey for identity based secure distributed data storage literature survey for identity based secure distributed data storage
literature survey for identity based secure distributed data storage Sahithi Naraparaju
 
Identity based secure distributed data storage schemes
Identity based secure distributed data storage schemesIdentity based secure distributed data storage schemes
Identity based secure distributed data storage schemesSahithi Naraparaju
 
66913017 java-ring-1217949449014046-9 (1)
66913017 java-ring-1217949449014046-9 (1)66913017 java-ring-1217949449014046-9 (1)
66913017 java-ring-1217949449014046-9 (1)Sahithi Naraparaju
 
Self protecteion in clustered distributed system new
Self protecteion in clustered distributed system newSelf protecteion in clustered distributed system new
Self protecteion in clustered distributed system newSahithi Naraparaju
 
CONSTANTS, VARIABLES & DATATYPES IN C
CONSTANTS, VARIABLES & DATATYPES IN CCONSTANTS, VARIABLES & DATATYPES IN C
CONSTANTS, VARIABLES & DATATYPES IN CSahithi Naraparaju
 
constants, variables and datatypes in C
constants, variables and datatypes in Cconstants, variables and datatypes in C
constants, variables and datatypes in CSahithi Naraparaju
 
Steps for Developing a 'C' program
 Steps for Developing a 'C' program Steps for Developing a 'C' program
Steps for Developing a 'C' programSahithi Naraparaju
 
Self protecteion in clustered distributed system new
Self protecteion in clustered distributed system newSelf protecteion in clustered distributed system new
Self protecteion in clustered distributed system newSahithi Naraparaju
 
A Batch-authenticated And Key Agreement Framework For P2p-based Online Social...
A Batch-authenticated And Key AgreementFramework For P2p-based Online Social...A Batch-authenticated And Key AgreementFramework For P2p-based Online Social...
A Batch-authenticated And Key Agreement Framework For P2p-based Online Social...Sahithi Naraparaju
 

Plus de Sahithi Naraparaju (15)

PPT FOR IDBSDDS SCHEMES
PPT FOR IDBSDDS SCHEMESPPT FOR IDBSDDS SCHEMES
PPT FOR IDBSDDS SCHEMES
 
SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...
SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...
SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...
 
over view of viruses
over view of virusesover view of viruses
over view of viruses
 
literature survey for identity based secure distributed data storage
literature survey for identity based secure distributed data storage literature survey for identity based secure distributed data storage
literature survey for identity based secure distributed data storage
 
Identity based secure distributed data storage schemes
Identity based secure distributed data storage schemesIdentity based secure distributed data storage schemes
Identity based secure distributed data storage schemes
 
66913017 java-ring-1217949449014046-9 (1)
66913017 java-ring-1217949449014046-9 (1)66913017 java-ring-1217949449014046-9 (1)
66913017 java-ring-1217949449014046-9 (1)
 
Self protecteion in clustered distributed system new
Self protecteion in clustered distributed system newSelf protecteion in clustered distributed system new
Self protecteion in clustered distributed system new
 
OVERVIEW OF ‘C’ PROGRAM
OVERVIEW OF ‘C’ PROGRAMOVERVIEW OF ‘C’ PROGRAM
OVERVIEW OF ‘C’ PROGRAM
 
CONSTANTS, VARIABLES & DATATYPES IN C
CONSTANTS, VARIABLES & DATATYPES IN CCONSTANTS, VARIABLES & DATATYPES IN C
CONSTANTS, VARIABLES & DATATYPES IN C
 
constants, variables and datatypes in C
constants, variables and datatypes in Cconstants, variables and datatypes in C
constants, variables and datatypes in C
 
Steps for Developing a 'C' program
 Steps for Developing a 'C' program Steps for Developing a 'C' program
Steps for Developing a 'C' program
 
pre processor directives in C
pre processor directives in Cpre processor directives in C
pre processor directives in C
 
Self protecteion in clustered distributed system new
Self protecteion in clustered distributed system newSelf protecteion in clustered distributed system new
Self protecteion in clustered distributed system new
 
A Batch-authenticated And Key Agreement Framework For P2p-based Online Social...
A Batch-authenticated And Key AgreementFramework For P2p-based Online Social...A Batch-authenticated And Key AgreementFramework For P2p-based Online Social...
A Batch-authenticated And Key Agreement Framework For P2p-based Online Social...
 
Haptic technology
Haptic technologyHaptic technology
Haptic technology
 

Srs document for identity based secure distributed data storage schemes

  • 1. Software Requirements Specification For Identity Based Secure Distributed Data Storage Schemes Prepared by N.Sahithi 12C11D5816 Anurag Engineering College 06-03-2014
  • 2. Identity Based Secure Distributed Data Storage Schemes page ii Table of Contents Table of Contents.......................................................................................................................... ii 1. Introduction..............................................................................................................................1 1.1 Purpose ............................................................................................................................................ 1 1.2 Document Conventions.................................................................................................................... 1 1.3 Intended Audience and Reading Suggestions.................................................................................. 1 1.4 Project Scope ................................................................................................................................... 1 1.5 References........................................................................................................................................ 2 2. Overall Description....................................................................Error! Bookmark not defined. 2.1 Product Perspective ......................................................................................................................... 2 2.2 Product Features .............................................................................................................................. 2 2.3 User Classes and Characteristics ..................................................................................................... 3 2.4 Operating Environment.................................................................................................................... 3 2.5 Design and Implementation Constraints.......................................................................................... 4 2.6 User Documentation ........................................................................................................................ 4 2.7 Assumptions and Dependencies ...................................................................................................... 4 3. System Features........................................................................................................................4 4. External Interface Requirements ...........................................................................................5 4.1 User Interfaces................................................................................................................................. 5 4.2 Hardware Interfaces......................................................................................................................... 5 4.3 Software Interfaces .......................................................................................................................... 5 4.4 Communications Interfaces ............................................................................................................. 6 5. Other Nonfunctional Requirements.......................................................................................6 5.1 Performance Requirements.............................................................................................................. 6 5.2 Safety Requirements........................................................................................................................ 6 5.3 Security Requirements..................................................................................................................... 6 5.4 Software Quality Attributes............................................................................................................. 6 6. Other Requirements ................................................................................................................6 Appendix A: Glossary ................................................................................................................7
  • 3. Identity Based Secure Distributed Data Storage Scheme Page 1 1. Introduction 1.1 Purpose The purpose of this document is to present a detailed description of identity based secure distributed data storage schemes. Secure distributed data storage can shift the burden of maintaining a large number of files from the owner to proxy servers. Proxy servers can convert encrypted files for the owner to encrypted files for the receiver without the necessity of knowing the content of the original files. To provide confidentiality and integrity of data outsourced this IBSDDS scheme was proposed. 1.2 Document Conventions This SRS archive keeps up diverse sorts of fonts, sizes and faces. This record additionally specified Times New Roman; font sort is Bold and Normal. 1.3 Intended Audience and Reading Suggestions This SRS archive is perusing the distinctive sorts of onlooker that the report is planned for, for example, developers, and venture administrators, showcasing staff, clients, analyzers, and documentation authors. Developers: in order to be sure they are developing the right project that fulfills requirements provided in this document. Testers: in order to have an exact list of the features and functions that have to respond according to requirements and provided diagrams. Users: in order to get familiar with the idea of the project and suggest other features that would make it even more functional. Documentation writers: to know what features and in what way they have to explain. What security technologies are required, how the system will response in each user’s action etc. Advanced end users, end users/desktop and system administrators: in order to know exactly what they have to expect from the system, right inputs and outputs and response in error situations.
  • 4. Identity Based Secure Distributed Data Storage Scheme Page 2 1.4 Project Scope Scope of the IBSDSS scheme provides an access permission which is bound not only to the identity of the receiver but also the file. The access permission can be decided by the owner, instead of the trusted party. 1.5 References Jinguang Han, Student Member, IEEE, Willy Susilo, Senior Member, IEEE, and Yi Mu, SeniorMember, IEEE-“Identity-Based Secure Distributed Data Storage Schemes”-IEEE TRANSACTIONS ON COMPUTERS, 2013. M. L. Yiu, G. Ghinita, C. S. Jensen, and P. Kalnis, “Enabling search services on outsourced private spatial data”. 2. Overall Description 2.1 Product Perspective Proxy servers can perform some functions on the outsourced cipher texts without knowing anything about the original files. After outsourcing the files to proxy servers, the user will remove them from his local machine. Therefore, how to guarantee the outsourced files are not accessed by the unauthorized users and not modified by proxy servers is an important problem. Furthermore, how to guarantee that an authorized user can query the outsourced files from proxy servers is another concern as the proxy server only maintains the outsourced cipher texts. To address the issue of confidentiality and integrity of data outsourced Identity based secure distributed data storage schemes are proposed. Where proposed project uses 2 IBSDDS schemes: First scheme is secure against Chosen Plaintext Attacks (CPA), Second scheme is secure against Chosen Cipher text attacks(CCA).
  • 5. Identity Based Secure Distributed Data Storage Scheme Page 3 2.2 Product Features  It has two schemes of security, the first scheme is CPA secure, and the second scheme achieves CCA security.  To the best of our knowledge, it is the first IBSDDS schemes where access permission is made by the owner for an exact file and collusion attacks can be protected in the standard model.  To achieve stronger security and implement file based access control, the owner must be online to authenticate requesters and also to generate access permissions for them. 2.3 User Classes and Characteristics This SRS document we use different types of user classes. Those are User login, Auditor login and admin login. These are used to characterize the user means of admin module description. 2.4 Operating Environment Hardware Requirements: • Hardware : Pentium IV 2.4 GHz. • Hard Disk : 20 GB. • Floppy Drive : 1.44 Mb. • Monitor : SVGA. • Mouse : Two or Three button mouse • RAM : 512 MB. Software Requirements: • Operating system : Windows XP. • Programming Language : JAVA/J2EE • Data Base : MYSQL
  • 6. Identity Based Secure Distributed Data Storage Scheme Page 4 2.5 Design and Implementation Constraints Design is the process or art of defining the architecture, components, modules, interfaces, and data for a system to satisfy specified requirements. One could see it as the application of systems theory to product development. There is some overlap and synergy with the disciplines of systems analysis, systems architecture and systems engineering. 2.6 User Documentation http://www.google.co.in http://www.youtube.com 2.7 Assumptions and Dependencies This project is mainly used in many websites like Google, many organizations and etc. 3. System Features Functional Requirements The present application has been divided in to four modules. 1. Data owner Module 2. Proxy server Module 3. Receiver Module 4. Data storage Module
  • 7. Identity Based Secure Distributed Data Storage Scheme Page 5 4. External Interface Requirements 4.1 User Interfaces Provide requirements of the system, user or business, taking into account all major classes/categories of users. Provide the type of security or other distinguishing characteristics of each set of users. List the functional requirements that compose each user requirement. As the functional requirements are decomposed, the highest level functional requirements are traced to the user requirements. User requirement information can be in text or process flow format for each major user class that shows what inputs will initiate the system functions, system interactions, and what outputs are expected to be generated by the system. The scenarios should be comprehensive, to the extent that all user types and all major functions are covered. Give each user requirement a unique number. Typically, user requirements have a numbering system that is separate from the functional requirements. 4.2 Hardware Interfaces • System : Pentium IV 2.4 GHz. • Hard Disk : 20 GB. • Floppy Drive : 1.44 Mb. • Monitor : SVGA Monitor. • Mouse : Two or Three Button Mouse • RAM : 512 MB. 4.3 Software Interfaces • Operating system : Windows XP. • Coding Language : JAVA • Data Base : MYSQL
  • 8. Identity Based Secure Distributed Data Storage Scheme Page 6 4.4 Communications Interfaces This document we use communication interfaces are FTP and HTTP. 5. Other Nonfunctional Requirements 5.1 Performance Requirements Performance is measured in terms of the output provided by the application. Requirement specification plays an important part in the analysis of a system. The requirement specification for any system can be broadly stated as given below:  The system should be able to interface with the existing system  The system should be accurate  The system should be better than the existing system 5.2 Safety Requirements The user in the application is provided with user name and password for authenticating before the login process. Invalid users are blocked from logging in. As the application is deployed in user machine each user can be provided with a login facility authenticates with the set of username and password for restricting the unauthorized users from loging in to increase the strength of the passwords the process of encryption and decryption can also be applied. 5.3 Security Requirements As the source code or software is deployed under the user machine. No security is provided to the user code. The system security itself is the security i.e. applied to the application. 5.4 Software Quality Attributes Setting Up Authentication for user to access a specific file which is encrypted by the file owner a specific simple authentication procedure is required.
  • 9. Identity Based Secure Distributed Data Storage Scheme Page 7 6. Other Requirements Appendix A: Glossary IBSDDS - Identity Based Secure Distributed Data Storage Scheme CPA - Chosen Plain text Attack CCA - Chosen Cipher text Attack DAS - Data As a Service