scholarly journals A Newly Proposed Prospective and Robust Computer Networking Model Architecture Based on the Infrastructure of Cloud Computing Contrivance

Author(s):  
Shivankur Thapliyal

Abstract: Computer Networking Play’s a major role for data communication or data sharing and data transmissions from one location to another, which are geographically differ, but in today’s scenario where the main and primary major concerns are not to data transfer but also utilize all resources with greater efficiency and also preserves the confidentiality and integrity of the messages with respect to speed and time with lower Bandwidth and also consume a very low computational costs with low power supply and redirect to optimality. Cloud Computing also play’s a significant role to access data at geographically different locations. So In this paper we create a fusion of Computer Networking Architecture and Cloud Computing Architecture and released a very much superior fundamentally strong Cloud computing based Computer Networking model, which works on the concepts of ‘Virtualization’. Because when the number of hardware components (Servers) drastically increases all factors which are responsible to make possible networking among nodes are also consume each resources at extreme level, and networking becomes complex and slow, that’s why we used the concept of Virtual Machine. In this paper we proposed a Computer Networking model using the concepts of Cloud Computing. This model also suitable for data transmission but also take concern the most significant feature of Computer Networking, which is Data Security. This model also used some Proxy servers/ firewalls to take concern some security mechanisms. In this paper we also proposed Communication Oriented model among the Intercluster domains that how one node which belongs to another CLOUD cluster make possible communication among other InterCLOUD clusters with respect to data security measures. In this paper we proposed three models related to this networking model, which is CLOUD Networking Infrastructure, Connection Oriented model, Communication Oriented model. The detailed description of all three models are in the upcoming sections of this paper. Keywords: Cloud computing based computer networking model, A virtual model for computer networking, Computer Networking model based on virtualization, Virtualization based computer networking model.

2018 ◽  
Vol 6 (2) ◽  
pp. 179-188
Author(s):  
Maryanto Maryanto ◽  
Maisyaroh Maisyaroh ◽  
Budi Santoso

Virtual Private Network (VPN) is a local communication network that is connected through a public network, with private network data security, data transfer closure from illegal access and network scalability to become the main standard in Virtual Private Network (VPN). In building a VPN at PT. Penas (Persero) conducted by the method of Internet Protocol Security (IP Sec). IP Sec works on the network layer, protects and authenticates communications on IP between hosts and functions both on IPv6 and IPv4 traffic. IP Sec is actually a feature that is owned by IPv6 but by some developers it was applied to IPv4. PT. Penas (Persero) is a subsidiary of PT. PPA (Persero), which in PT. Penas, the local network system and the internet and also data communication with PT. PPA (Persero) that are used are still very simple and vulnerable to the security of its data. The results of this study are implementing VPN with IP Sec method at PT. Penas, where with the concept of IP security, internet access in conducting data communication between PT. PPA (Persero) and PT. Penas can be done quickly, realtime, and confidential. Because basically VPN is a relatively safe way of networking because it uses encryption and special protocols to provide data security.   Keywords: Networking, Secur, Virtual Private Network.   Abstrak   Virtual Private Network (VPN) merupakan suatu jaringan komunikasi lokal yang terhubung melalui jaringan publik, dengan private network keamanan data, ketertutupan transfer data dari akses ilegal serta skalabilitas jaringan menjadi standar utama dalam Virtual Private Network (VPN). Dalam membangun VPN pada PT.Penas (Persero) dilakukan dengan metode Internet Protocol Security (IP Sec). IP Sec bekerja pada lapisan network, memproteksi dan mengotentikasi komunikasi pada IP antara host dan berfungsi baik pada lalulintas IPv6 maupun IPv4. IP Sec sebenarnya adalah fitur yang dimiliki oleh IPv6 namun oleh beberapa developer diaplikasikan ke dalam IPv4. PT. Penas (Persero) merupakan anak perusahaan dari PT. PPA (Persero), yang mana pada PT.Penas ini, sistem jaringan lokal dan internet dan juga komunikasi data dengan PT.PPA (Persero) yang digunakan masih sangat sederhana dan rentan terhadap keamanan datanya. Hasil penelitian ini adalah mengimplementasikan VPN dengan metode IP Sec pada PT.Penas, dimana dengan konsep IP security ini akses internet dalam melakukan komunikasi data antara kantor Pusat PT.PPA (Persero) dengan PT.Penas dapat dilakukan secara cepat, realtime, dan rahasia. Karena pada dasarnya VPN itu cara jaringan yang relatif aman karena menggunakan enkripsi dan protokol khusus untuk memberikan keamanan data.   Kata kunci: Jaringan, Keamanan, Virtual Private Network (VPN).


2011 ◽  
Vol 12 (3) ◽  
Author(s):  
Peter Blume

AbstractThis article discusses the data protection issues made topical by cloud computing. It takes its starting point in a decision made by the Danish Data Protection Agency which is probably the first decision concerning this issue in an EU member state. The article focuses on the relationship between controller and processor, data security, data transfer and data subject rights. It concludes that cloud computing is a challenge but that data protection law should be able to meet that challenge.


Author(s):  
Taufik Hidayat ◽  
Rahutomo Mahardiko

Cloud computing is one revolution in information technology (IT) that can share resources, services and data through a network among users. Because users have same rights on the network to transfer data, data are vulnerable to be attacked by unauthorized person. Lately, data security in a system only concentrates on data storage on cloud by utilizing internet security, but a little concentration is found during data transfer. By considering security as a serious problem, an encryption-based proposed system is presented to secure during data transfer. Authors propose an approach to boost system security during data transfer in order to prevent data theft by unauthorized person. To prevent an attack by unauthorized person, Advanced Encryption Standard (AES) will be proposed to secure data transfer and storage in cloud computing. For better future, authors will propose Systematic Literature Review (SLR) to generate suggestions and opportunities in AES cloud computing.


2021 ◽  
pp. 6-9
Author(s):  
Kavya H ◽  
Samyama Gunjal G H

Health-records are an essential information for everyone. User cannot carry all the health records of a patient everywhere whenever required, as it may lead to misplacing of documents and may get placed in the wrong hands. To solve this obstacle, remote data integrity audit proposal has been introduced, that facilitates the sharing of data and hides crucial data ensuring the condentiality of the information stored in the cloud. The proposed system aims at preserving user privacy in an Electronic Health Records (EHR) system using the blockchain technology (EHR-BT). The scheme generates blocks of equal length of the le with condential data and turns the signatures of data blocks into legitimate le access data blocks. With the integrity audit phase, signatures are used to certify the integrity of the le, as well as ensures the privacy and immutability of information.


2021 ◽  
Vol 23 (05) ◽  
pp. 551-561
Author(s):  
Riya Bagul ◽  
◽  
Atharva Karaguppi ◽  
Vishwas Karale ◽  
Mudit Singal ◽  
...  

In modern computing systems data security is of paramount importance. The data transfer must be made secure because it can be significantly sensitive for any organization involved. This paper expounds a SOC architecture to facilitate end to end secure data exchange for applications involving short communication intervals. This SOC has been designed to behave as a co-processor which along with a standard general-purpose processor would serve as a cryptosystem. The SOC employs two famous algorithms – RSA and AES for cryptography. In contrast to usual single key cryptographic systems, this paper tries to elaborate an innovative methodology involving dynamic security measures that makes the system distributed rather than making it central to a specific algorithm and hence a particular key. The methodology involves generating and using an AES key for data encryption and RSA key for secure transfer of the AES key between the point of transmission and reception.


2020 ◽  
Vol 11 (4) ◽  
pp. 149-167
Author(s):  
Damla KARAGOZLU ◽  
◽  
Janet AJAMU ◽  
Anne Bakupa MBOMBO ◽  
◽  
...  

One of the popular technologies in the industry today is cloud computing and the use of cloud computing in small businesses is now fashionable, it has a remarkable impact on them by bringing a new way of working, accessing their data and storing it. The aim of the study is to examine the impacts and effects of migration to cloud computing on small businesses. The methodology used for this study is based on a review of past studies, which explains in broad terms each research question of this study. The results of this study shows that there are several benefits that cloud computing has to offer small businesses if cloud computing is adopted and that includes flexibility, cost reduction and automatic software/hardware upgrades etc. Cloud computing has a large storage capacity that helps small businesses store and access large amounts of data quickly and easily, and there are a number of cloud computing data recovery techniques that help to recover lost or damaged data in the cloud. In the same way that security is a major concern for all technologies, it is also a concern for data stored in the cloud; security techniques such as encryption, cryptography are mostly used to ensure that key areas of data security (data confidentiality, data integrity and data availability) are protected. The results of this study helps small businesses to understand the impact of cloud computing on their businesses and the various security measures that need to be taken while adapting cloud computing technology.


Author(s):  
B. Indira Reddy ◽  
V. Srikanth

Wireless networks have posed a threat in Data Security that has stuck to the core of data communication between two points. Absence of inflexible security measures has made numerous organizations contribute millions to verify their systems. Development of different security conventions for Wireless LANs has been given in this paper. Also, vulnerabilities of WEP/WPA/WPA2/WPA3 have been discussed and how the wireless networks are attacked using the design flaws present in these Wireless Security Protocols. The use of different tools and programming languages used for testing the strength of the protocols. Tools like nmap, zenmap, aircrack-ng, etc., are used in the Linux environment to practically demonstrate the attacks against these networks using WEP/WPA/WPA2/WPA3 protocols. The solutions for the shortcomings in WEP has been applied in WPA, similarly WPA2 and WPA3.


2012 ◽  
Vol 1 (2) ◽  
pp. 31-34
Author(s):  
Shameena Begum ◽  
◽  
V.Ratna Vasuki ◽  
K.V.V.Srinivas K.V.V.Srinivas

Sign in / Sign up

Export Citation Format

Share Document