iOBS3: an iSCSI-based Object Storage Security System

Author(s):  
Huang Jianzhong ◽  
Xie Changsheng ◽  
Li Xu
2020 ◽  
Vol 1 (1) ◽  
pp. 33-41
Author(s):  
I Komang

A storage box / locker is a facility used by people to store goods. Storage boxes are often found in buildings both in offices and in schools and other public places. Usually the existing storage box in a building still uses conventional keys. If using a conventional key security of goods in the box is still not guaranteed, but if you use an automatic item storage security system using RFID and Sim 800L, then the goods stored in the box will be guaranteed security and more efficient in its use.


Author(s):  
V.V. Pokussov

The article deals with the problem of designing protocols for information and technical interaction, which have a sign of correctness. For this, its model is built in graphical and analytical form, as well as using a modified adjacency matrix. A classification of modules participating in the interaction is proposed, namely the following: terminal sensor and executor, degenerate handler, object storage, intermediate handler. Five correctness requirements for the protocol are introduced: the need and sufficiency of exchange objects, input and output terminality of modules, and their involvement. For each of the requirements, a formal definition is given - in terms of an adjacency matrix, as well as an algorithm for their verification. The synthesized requirements and algorithms are used for the author›s protocol of information and technical interaction in an integrated information security system. As a result, the correctness of the protocol is proved.


2020 ◽  
Vol 3 (2) ◽  
pp. 182-186
Author(s):  
Lisnayani Silalahi ◽  
Anita Sindar

Data security and confidentiality is currently a very important issue and continues to grow. Several cases concerning data security are now a job that requires handling and security costs that are so large. To maintain the security and confidentiality of messages, data, or information so that no one can read or understand it, except for the rightful recipients, a data security system application with an encryption method using an algorithm is designed. The SHA-1 cryptographic hash function that takes input and produces a 160-bit hash value which is known as the message iteration is usually rendered as a 40-digit long hexadecimal number.


Sign in / Sign up

Export Citation Format

Share Document