1. 9
CHAPTER-3
SYSTEM ANALYSIS
System analysis is used to analyze the project by using feasibility
study. In this project system meets requirements that storage servers
independently perform encoding and re-encryption and key servers
independently perform partial decryption.
3.1 Study of the system
Assuming that a new system is to be developed, the next phase is
system analysis involved a detailed study of the current system, leading to
specification of a new system. Analysis is a detailed study of various
operations performed by a system and their relationship within and outside
the system. During analysis, data are collected on the available files, decision
points and transactions handled by the present system. Interviews, on-site
observation and questionnaire are the tools used for system analysis. Using
the following steps it becomes easy to draw the exact boundary of the new
system under consideration.
Keeping in view the problems and new requirements.
Workout the pros and cons including new areas of the system.
3.1.1 Feasibility Report
Feasibility report is conducted once the problem is clearly understood.
The feasibility study which is a high level capsule version of the entire system
analysis and design process.
Fact Finding Techniques
The system we are going to develop a simulation of providing security
for the data in the clouds.
2. WINDS OF CHANGE FROM VENDOR SYSTEM ANALYSIS
LOCK-IN TO THE META CLOUD
10
3.2 Feasibility Study
A feasibility study is a high-level capsule version of the entire System
analysis and Design Process. The study begins by classifying the problem
definition. Feasibility is to determine if it’s worth doing. Once an acceptance
problem definition has been generated, the analyst develops a logical model
of the system. A search for alternatives is analyzed carefully. There are 3
parts in feasibility study
3.2.1 Operational Feasibility
The characteristics as follows,
Will the system be used if it developed and implemented.
If there was sufficient support for the project from the management
and from the users.
Will the system produce poorer result in any respect or area?
This system can be implemented in the organization because there is
adequate support from management and users. Being developed in
java so that the necessary operations are carried out automatically.
3.2.2 Technical Feasibility
Does the necessary technology exist to do what is been suggested
Does the proposed equipment have the technical capacity for using
the new system?
Are there technical guarantees of accuracy, reliability and data
security?
The project is developed on Pentium III with 256 MB RAM.
The environment required in the development of system is any
windows platform
The language used in the development is JAVA 1.4.0, Amcat1.6.0 &
Windows Environment
3. WINDS OF CHANGE FROM VENDOR SYSTEM ANALYSIS
LOCK-IN TO THE META CLOUD
11
3.2.3 Financial and Economical Feasibility
The system developed and installed will be good benefit to the
organization whoever is going to posses this. The system will be developed
and operated in the existing hardware and software infrastructure. So there is
no need of additional hardware and software for the system. With this system
the organization people can have better idea regarding mobile networks which
could help them in developing such network solutions.
3.2.4 System Description
The File security system is designed basically in three different
modules they are GUI module, Authorization and authentication module,
Connection Manager Module, Security System module
GUI Module basically deals with the design of the interface which
include the service of providing the user with the flexibility of accessing the file
system and selecting the required file for the transfer. It should also provide
the system to collect the information from the user to check the authorization
in providing the access to the file system. The interface is also to consider the
design, which includes the services of sending and receiving of the files with
encryption and decryption standards.
Authentication and Authorization Services module deals with the
checking of user name and corresponding password from the authentication
server, the backend database where the table containing the required
information is stored. If the authentication server validates the user then he is
provided with the File Encryption/decryption and transfer services.
The Connection Manager deals with the architecture, which supports
the system to identify the end users for the communication and establish the
communication. Connection and disconnection of the communication channel
between the users for the access of file system and file transfer services. The
Connection Manager receives the IP address to be connected and the file to
be sent then establishes the connection and transfers the file.
Security implementation module considers the implementation of the
encryptions and decryption standards in transfer the files from one system to
another in a distributed environment.