Dynasis Secure Group Information Sharing System A DVI SOR: D R . AWA I S S H I B LI C O- ADV IS OR: DR. ABDUL GHAFOOR G ROUP M E MBERS : MANSOOR AHMED SAIF ULLAH YA S I R A L I Outline 1. 2. 3. 4. 5. 6. 7. 8. 9. Introduction to Domain Problem Statement Related Work Our Product Main Features Scope Deliverable and Milestones Future Prospects Conclusion Introduction to Domain Domain : Group Secure Information Sharing (g-SIS) It envision agile and secure group management as well cryptographic sharing of resources Group Secure Resource Sharing Secure Group Management Encryption & Decryption Key Management and Distribution Access Control Policies and delegation Role Based Access Control (RBAC) Attribute Based Access Control (ABAC) Usage Based Access Control (UCON) Problem Statement “Existing Software solutions do not provide Dynamic and Secure Group Information Sharing as per user requirement” Related Work & Literature Survey Related Products in Market LMS EasyChair FirstClass Dspace Google drive DropBox Related Work & Literature Survey Related Papers: ○ A Temporal Model for Group-Centric Secure Information Sharing ○ An Extended Authorization Model for Group-Centric Secure Information Sharing ○ Enforcement Architecture and Implementation Model for Group-Centric Information Sharing ○ RFC 4535 GSAKMP: Group Secure Association Key Management Protocol. (selected section). ○ XACML:extensible Access control markup Language. Our Product: Dynasis Dynasis is a user friendly, secure information sharing web based system for individuals and organizations, to manage secure groups and share encrypted data. Main Features ◦ KeyFeatures: ◦ Secure group information Sharing ◦ Time and Event Based Groups. ◦ Dynamic Roles and Access Control ◦ Additional Features: ◦ ◦ ◦ ◦ Open Source Cloud based system User Friendly Desktop Integration Secure Group Information Sharing ● It will use Group Secure Association Key Management protocol (GSAKMP) for cryptographic group managment. ● Access to authorized users. ● Encrypted resources ● Confidentiality ● Hashing and system logging ● Integrity Dynamic Roles and Access Control Policies ● Roles and corresponding access control policies can be defined according to organizational structure. ● It will use XACML for Attribute based Access Control (ABAC) for defining dynamic policies Task and Event based group Management ● User’s can manage different types Groups based on attributes o Time o Event o Task Groups will be expired , disasemble and user right will be revoked. Technology: ◦ Spring MVC And Hibernate Security and testability Scope ● Knowledge Areas o Research on Group Secure Information Sharing o Cloud Security o Open Source Development ● End Users o Individual Users o Organizations and Institutes Deliverables ◦ Documentation ◦ SRS ◦ SDS ◦ Development ◦ ◦ ◦ ◦ ◦ ◦ Basic Infrastructure Development Secure Groups Implementation (GSAKMP Integration) Access control policy (XACML implementation) Different Types of Groups. Integration Testing Future Prospects ● ● ● ● Other Resources like Videos etc. sharing. Online Secure Editing of resources. Secure Email communication. Secure chat. Demo Conclusion: ◦ Our product ◦ ◦ ◦ ◦ Meeting Functional and Nonfunctional Requirements Developed using latest technologies follow the professional standards. Best of Best Features References www.google.com/trends/explore#q=%2Fm%2F0dhx5b%2C %2Fm%2F026mhl&cmpt=q http://zeroturnaround.com/rebellabs/java-tools-and-technologies-landscape-for-2014/ http://zeroturnaround.com/rebellabs/the-2014-decision-makers-guide-to-java-web-frameworks/3/ http://blog.websitesframeworks.com/2013/03/wahner-categorization-and-comparison-of-web-frameworks-229/ http://zeroturnaround.com/rebellabs/top-4-java-web-frameworks-revealed-real-life-usage-data-of-spring-mvc-vaadin-gwt-and-jsf/ http://blog.websitesframeworks.com/2013/03/web-frameworks-benchmarks-192/ https://spreadsheets.google.com/pub?key=0AtkkDCT2WDMXdC1HOEtnUHpCejJMbUhGeGJWUmh5dVE&hl=en&output=html Thanks