Web Service Implementation in Logistics Company uses JSON Web Token and RC4 Cryptography Algorithm

2020 ◽  
Vol 4 (3) ◽  
pp. 591-600
Author(s):  
Mochammad Rizky Royani ◽  
Arief Wibowo

The development of e-commerce in Indonesia in the last five years has significantly increased the growth for logistics service companies. The Indonesian Logistics and Forwarders Association (ALFI) has predicted the growth potential of the logistics business in Indonesia to reach more than 30% by 2020. One of the efforts of logistics business companies to improve services in the logistics services business competition is to implement web service technology on mobile platforms, to easy access to services for customers. This research aims to build a web service with a RESTful approach. The REST architecture has limitations in the form of no authentication mechanism, so users can access and modify data. To improve its services, JSON Web Token (JWT) technology is needed in the authentication process and security of access rights. In terms of data storage and transmission security, a cryptographic algorithm is also needed to encrypt and maintain confidentiality in the database. RC4 algorithm is a cryptographic algorithm that is famous for its speed in the encoding process. RC4 encryption results are processed with the Base64 Algorithm so that encrypted messages can be stored in a database. The combination of the RC4 method with the Base64 method has strengthened aspects of database security. This research resulted in a prototype application that was built with a combination of web service methods, JWT and cryptographic techniques. The test results show that the web service application at the logistics service company that was created can run well with relatively fast access time, which is an average of 176 ms. With this access time, the process of managing data and information becomes more efficient because before making this application the process of handling a transaction takes up to 20 minutes.

2018 ◽  
Vol 10 (1) ◽  
pp. 19-26 ◽  
Author(s):  
Muhammad Iqbal Perkasa ◽  
Eko Budi Setiawan

Data is one of the most important things in this information and information technology era that evolving now. Currently, the government still has not used the public data maximally for administrative purposes. Utilization of this big population data is the creation of a web service application system with REST API where this data will be open and accessible to those who have access. One of the institutions that use this service is the Manpower and Transmigration Service where this system can make the Dinas staff more efficient to create and register job search cards using available community data. This application is able to provide and facilitate many parties, such as data administrators to monitor data usage, registration employee in input data, and people able to register independently. Index Terms—Web service, API, Rest api, People data


NANO ◽  
2015 ◽  
Vol 10 (08) ◽  
pp. 1550118 ◽  
Author(s):  
Lei Wang ◽  
Jing Wen ◽  
CiHui Yang ◽  
Shan Gai ◽  
YuanXiu Peng

Phase-change probe memory using Ge2Sb2Te5 has been considered as one of the promising candidates as next-generation data storage device due to its ultra-high density, low energy consumption, short access time and long retention time. In order to utmostly mimic the practical setup, and thus fully explore the potential of phase-change probe memory for 10 Tbit/in2 target, some advanced modeling techniques that include threshold-switching, electrical contact resistance, thermal boundary resistance and crystal nucleation-growth, are introduced into the already-established electrothermal model to simulate the write and read performance of phase-change probe memory using an optimal media stack design. The resulting predictions clearly demonstrate the capability of phase-change probe memory to record 10 Tbit/in2 density under pico Joule energy within micro second period.


Author(s):  
Klaus Schützer ◽  
Antonio Álvaro de Assis Moura ◽  
Reiner Anderl ◽  
Christian Mosch

Compiler ◽  
2015 ◽  
Vol 4 (2) ◽  
Author(s):  
Hero Wintolo ◽  
Lalu Septian Dwi Paradita

Cloud computing, one form of information technologies are widely used in the field of computer networks or the Internet. Cloud computing consists of computer hardware, computer networking devices, and computer software, the cloud computing there are three services provided include (SaaS) Software as a Service (PaaS) Platform as a Service, and (IaaS) Infrastructure as a Service. Application cloud computing services in the wake of this system is a service-based data storage infrastructure as a service by using android smartphone as a storage medium, which utilizes FTP Server which is already available on the smartphone. This certainly supports the easy storage of data that utilize various types of internal and external storage on smartphones that serves as a storage server. In addition to the functions of storage available, this service can accommodate streaming function .mp3 file type. Implementation result of the system can be implemented on a local network using a wireless LAN. In addition, the results of user testing using Likert method shows the application can run and function properly


2015 ◽  
pp. 1911-1940
Author(s):  
Kenneth David Strang

This chapter provides literature-grounded definitions of contemporary Web services and marketing theories, which can model business demand through procurement decision-making behavior. First, the literature was reviewed to identify contemporary Web 2.0 and Web service ontology alongside marketing theories, which can describe individual decision making in an organizational or personal context. The Web services included cloud computing, social networking, data storage, security, and hosted applications. Then selected models for assessing procurement decision-making behavior were discussed in more detail. The constructed grounded theory method was applied by interviewing Chief Information Officers (CIO) at large organizations across four industries in the USA: healthcare, higher education, energy creation, and banking. The purpose was to determine which marketing theories could effectively model their Web service procurement behavior. An empirical procurement decision-making model was developed and fitted with data collected from the participants. The results indicated that Web service procurement decision-making behavior in businesses could easily be modeled, and this was ratified by the CIOs. The chapter proposes a state-of-the-art ontology and model for continued empirical research about organizational procurement decision-making behavior for Web services or other products.


2011 ◽  
Vol 121-126 ◽  
pp. 4074-4079
Author(s):  
Yue Jin Lin ◽  
Bing Yue Liu ◽  
Hui Ling Chen

To meet the requirements of enterprises in different developing phases, often using the latest technology under the circumstances that lead to existing many and various hardware, operating systems, middleware, programming languages, data storage, reusable redundant code in the enterprise. Service-Oriented Architecture (SOA)[1] is naturally chose as an application architecture by many enterprises because of its innate loose coupling and co-operating. In this paper you will see the Web service development tools supplied by WebSphere platform and you will also see that Web service function which is supplied by J2EE can easily build up SOA system [2] and visit the the existing business process.


2020 ◽  
Vol 12 (12) ◽  
pp. 1932
Author(s):  
Weiwen Ye ◽  
Feng Zhang ◽  
Xianqiang He ◽  
Yan Bai ◽  
Renyi Liu ◽  
...  

Marine remote sensing (MRS) data provide an important tool for advancing global change research. However, the existing product service practices are insufficient for meeting the needs of a full-experience online application. This paper introduces a framework named SatANA, which is unified by a data tiling method with a spatial-aware feature, for integrated and intelligent improvements in visualization, storage and computing. The SatANA framework is supported by a hybrid database storage ideal for the cloud storage of massive MRS data. The raw data are displayed and roamed on a virtual globe through the Internet as tiles, enhancing their spatial awareness, that can be intelligently used for visualization result tuning, data storage preloading and distributed computing optimized indexing. To verify its feasibility and effectiveness, we applied this framework to a platform called SatCO2, which is devoted to providing convenient access to and the efficient utilization of MRS data.


2019 ◽  
Vol 1232 ◽  
pp. 012025
Author(s):  
Raihan Islamadina ◽  
Nuriza Pramita

Sensors ◽  
2019 ◽  
Vol 19 (22) ◽  
pp. 4905 ◽  
Author(s):  
Rongxu Xu ◽  
Wenquan Jin ◽  
Dohyeun Kim

Internet of Things (IoT) devices are embedded with software, electronics, and sensors, and feature connectivity with constrained resources. They require the edge computing paradigm, with modular characteristics relying on microservices, to provide an extensible and lightweight computing framework at the edge of the network. Edge computing can relieve the burden of centralized cloud computing by performing certain operations, such as data storage and task computation, at the edge of the network. Despite the benefits of edge computing, it can lead to many challenges in terms of security and privacy issues. Thus, services that protect privacy and secure data are essential functions in edge computing. For example, the end user’s ownership and privacy information and control are separated, which can easily lead to data leakage, unauthorized data manipulation, and other data security concerns. Thus, the confidentiality and integrity of the data cannot be guaranteed and, so, more secure authentication and access mechanisms are required to ensure that the microservices are exposed only to authorized users. In this paper, we propose a microservice security agent to integrate the edge computing platform with the API gateway technology for presenting a secure authentication mechanism. The aim of this platform is to afford edge computing clients a practical application which provides user authentication and allows JSON Web Token (JWT)-based secure access to the services of edge computing. To integrate the edge computing platform with the API gateway, we implement a microservice security agent based on the open-source Kong in the EdgeX Foundry framework. Also to provide an easy-to-use approach with Kong, we implement REST APIs for generating new consumers, registering services, configuring access controls. Finally, the usability of the proposed approach is demonstrated by evaluating the round trip time (RTT). The results demonstrate the efficiency of the system and its suitability for real-world applications.


Sign in / Sign up

Export Citation Format

Share Document