scholarly journals Design and Implementation of Data Encryption in Cloud based on HDFS

Author(s):  
Cheng Zhonghan ◽  
Zhang Diming ◽  
Huang Hao ◽  
Qian Zhenjiang

Author(s):  
Obiniyi Ayodele Afolayan ◽  
Ezugwu El-Shamir Absalom

This paper identifies the causes associated with delays in processing and releasing results in tertiary institutions. An enhanced computer program for result computation integrated with a database for storage of processed results simplifies a university grading system and overcomes the short-comings of existing packages. The system takes interdepartmental collaboration and alliances into consideration, over a network that speeds up collection of processed results from designated departments through an improved centralized database system. An empirical evaluation of the system shows that it expedites processing of results and transcripts at various levels and management of and access to student results on-line. The technological approach for the implementation of the proposed system is based on open source solutions. Apache is used as Web server extended with PHP for server side processing. In recognition of the confidentiality of data contained in the system, communication networks are protected with open-ssl library for data encryption and role-based authentication. This system increases efficient service delivery and benefits both administration and students.



2014 ◽  
Vol 602-605 ◽  
pp. 2807-2810
Author(s):  
Quan Gang Wen

To protect the security of critical data and application system, generally, many companies or departments use a parallel way of intranet and internet. Because every kind of security technology has its limitations, traditional security products such as firewall, VPN, data encryption, intrusion detection and network vulnerability scanning can not completely solve various security problems in information exchange between different networks. It is not able to meet all the security needs of critical networks and security data with the general products only. The way of data exchange of most of the existing products of "GAP" is mainly logic isolation .This paper describes a design and implementation of a hot switch circuit card in way of physical isolation .The data exchange mode of this circuit card is a half-duplex which can physically completely isolate intranet and internet. Through functional test and performance test, we can draw a conclusion that the circuit card can effectively achieve our demand of data exchange between different networks.





2012 ◽  
Vol 241-244 ◽  
pp. 2669-2675
Author(s):  
Wei Dong ◽  
Li Xin Ma ◽  
Li Liu

The development of 3G has made E-commerce become conveniently and fast. A system is proposed in this paper that is a 3G mobile e-commerce transaction system based on Web Service. And the double data encryption algorithm is also applied. It can be paid online to realize the enterprise mobile users in the 3G network, shopping needs, and ensures the security.



2014 ◽  
Vol 644-650 ◽  
pp. 2433-2437
Author(s):  
Zhi Chao Li ◽  
Jie Tao Diao ◽  
Qi You Xie ◽  
Jian Bin Liu ◽  
Ce Zhu

Encryption of information is getting increasingly large attention, due to the popularity of internet and the advance of technology. One of the encryption algorithms, MD5, is commonly used in data encryption nowadays. In this paper, MD5 algorithm was briefly described and used to construct a dynamic password encryption technique with time parameters. This dynamic password has no internal relevance, which means the new password can not be derived using previous passwords. Generation of password also takes a relative short time frame, such that in theory the encryption system can not be breached.



2010 ◽  
Vol 1 (1) ◽  
pp. 1-15 ◽  
Author(s):  
Obiniyi Ayodele Afolayan ◽  
Ezugwu El-Shamir Absalom

This paper identifies the causes associated with delays in processing and releasing results in tertiary institutions. An enhanced computer program for result computation integrated with a database for storage of processed results simplifies a university grading system and overcomes the short-comings of existing packages. The system takes interdepartmental collaboration and alliances into consideration, over a network that speeds up collection of processed results from designated departments through an improved centralized database system. An empirical evaluation of the system shows that it expedites processing of results and transcripts at various levels and management of and access to student results on-line. The technological approach for the implementation of the proposed system is based on open source solutions. Apache is used as Web server extended with PHP for server side processing. In recognition of the confidentiality of data contained in the system, communication networks are protected with open-ssl library for data encryption and role-based authentication. This system increases efficient service delivery and benefits both administration and students.



2012 ◽  
Vol 220-223 ◽  
pp. 2924-2929
Author(s):  
Shu Jie Han ◽  
Di Yang Li

Aiming at the security threats of Integrated Storage Network (ISN) in network transmission and static storage of classified information, a Secure Integrated Storage Network (SISN) model is proposed. By designing a Security Initiator (SI) and a Security Control Model (SCM) with integration of techniques for identification, data encryption, access control and security auditing to guarantee the confidentiality, integrity and effectiveness of the storage. The simulation attack test was done to classified organizations which applying the SISN.The result prove SISN can guarantee the storage security of classified information effectively.





Sign in / Sign up

Export Citation Format

Share Document