scholarly journals Upgraded Web Architecture for Mail Security and Customization

Here we are presenting a made sure about DNS with upgraded database which underpins on cloud mail server. DNS in general considered as a straightforward approach where content-based convention occurs, where at least one among the beneficiaries of a message are indicated along with the message content and possibly with additional encoded entities act on behalf of the supreme database. A remote server then receives the message employing a method of inquiries and responses among the client and the server. A server Mail Transfer Agent (MTA) or a Mail User Agent (MUA) whose is the end client can be a customer in the SMTP server database. Here we presenting a technique-based security strategy called as guidance location framework (IDS) which follow the internet protocol (IP) subtleties, date, time and the secret key level of the programmer from the programmer's side. Programmer's area can be discovered utilizing their IP address. The subtleties will be put away in the database from the server side. The email or the DNS client associates with the server MTA through the communication port 25. Telnet program is the most commonly used to test the SMTP server. Upon request DNS doesn't permit one to pull messages from a remote server as it works on the conventional push protocol. With the goal that the primary article is to make protection conservation for the private database the proposed design executes this present reality mysterious database by actualizing the speculation and concealment. It manages forestalling pernicious gatherings and interruption utilizing trust mindful steering system with trust as an assistance. The proficiency and security of information can be accomplished by keeping up single database with explicit access rights. With the activity performed with IDS with ESMTP in Anonymous and Confidential Databases.

2014 ◽  
Vol 984-985 ◽  
pp. 1357-1363
Author(s):  
M. Vinothini ◽  
M. Manikandan

During real time there are problems in transmitting video directly to the client. One of the main problems is, intermediate intelligent proxy can easily hack the data as the transmitter fails to address authentication, and fails to provide security guarantees. Hence we provide steganography and cryptography mechanisms like secure-code, IP address and checksum for authentication and AES algorithm with secret key for security. Although the hacker hacks the video during transmission, he cannot view the information. Based on IP address and secure-code, the authenticated user only can get connected to the transmitter and view the information. For further improvement in security, the video is converted into frames and these frames are split into groups and separate shared key is applied to each group of frames for encryption and decryption. This secured communication process is applied in image processing modules like face detection, edge detection and color object detection. To reduce the computation time multi-core CPU processing is utilized. Using multi-core, the tasks are processed in parallel fashion.


Compiler ◽  
2013 ◽  
Vol 2 (2) ◽  
Author(s):  
Anggi Sri Septiani Suhendar ◽  
Haruno Sajati ◽  
Yenni Astuti

In managing a server, an administrator takes a variety of ways for ensuring the safety and cosiness of the system. One type of threat that attack on the server is done on a port that is in an open state, thus making people who do not have access rights to perform port scanning to infiltrate into the server. One solution to cope with the attack on the port can be done by using port knocking. Port knocking is a method that can be applied to the server with the workings of such a code to unlock the safe. Port knocking is done by inserting a predetermined port sequenced to open a specific port. At the port sequenced delivery process takes an additional authentication likes keyport. Anggi algorithm (AA) is an algorithm that is built by combination o f Diffie-Hellman and RC4. The algorithm is used for encryption and descriptions a keyport from client side to the server side. In the process of sending a keyport to be modified by using the arithmetic calculation. Process of encryption and description keyport is done to prevent some attacks on the server by hackers with extracting such information after successfully breaking into a port. The results o f implementation AA algorithm on the process of port knocking can secure the delivery process o f keyport and improve the security o f server.


Author(s):  
N. Swetha ◽  
Dr. V. Divya

The software that runs its processing logic is a cloud application. In this the data is stored between two systems: client-side and server-side. End-users local hardware and remote server is also a part where some processing is done. However, most data storage exists on a remote server which is one of the major perk of using cloud application. In some cases a local device with no storage space is built with cloud application. Using web browser cloud application interacts with its users; this facility makes the organizations to switch their infrastructure to the cloud for gaining the benefit of digital transformations. In cloud applications it is easier for the clients to move or manage their data safely and it also provides the flexibility required for the emerging organizations to sustain in the digital market. As the cloud applications are emerged with sophistication many papers were employed on its branches. This research paper emphasizes on the evolution and long-term trends of cloud applications. Findings from the paper enable the enterprise with perplexity to decide on adopting cloud.


2020 ◽  
Vol 32 (4) ◽  
pp. 112-137
Author(s):  
Mamta ◽  
Brij B. Gupta

Fine-grained searching is an important feature in multi-user cloud environment and a combination of attribute-based encryption (ABE) and searchable encryption (SE) is used to facilitate it. This combination provides a powerful tool where multiple data owners can share their data with multiple data users in an independent and differential manner. In this article, the authors have used key-policy design framework of attribute-based encryption to construct the multi-keyword search scheme where access rights assigned to a data user are associated with his/her secret key. This leads to a situation where a data user can abuse his secret key to distribute it illegally to the unauthorized users to perform search over the shared data which is not intended for him/her. Therefore, to track such kind of key abusers the authors have embedded an extra functionality of tracing the traitors. For this purpose, each user is assigned a unique identity in the form of binary string where each bit represents an attribute related to his identity. In addition to the normal attributes, the access structure of a user also possesses identity-related attributes which are hidden from the user along with some normal attributes. Hence, the proposed scheme supports partial anonymity. Further, in the event of user revocation the proposed scheme efficiently handles the system update process by delegating the computationally intensive tasks to the cloud server. Finally, the proposed scheme is proved secure under Decisional Bilinear Diffie-Hellman (DBDH) assumption and decision linear assumption in the selective security model.


2015 ◽  
Vol 2015 ◽  
pp. 1-12 ◽  
Author(s):  
Fei Tang ◽  
Hongda Li ◽  
Qihua Niu ◽  
Bei Liang

A mobile agent can sign a message in a remote server on behalf of a customer without exposing its secret key; it can be used not only to search for special products or services, but also to make a contract with a remote server. Hence a mobile agent system can be used for electronic commerce as an important key technology. In order to realize such a system, Lee et al. showed that a secure mobile agent can be constructed using proxy signatures. Intuitively, a proxy signature permits an entity (delegator) to delegate its signing right to another entity (proxy) to sign some specified messages on behalf of the delegator. However, the proxy signatures are often used in scenarios where the signing is done in an insecure environment, for example, the remote server of a mobile agent system. In such setting, an adversary could launch side-channel attacks to exploit some leakage information about the proxy key or even other secret states. The proxy signatures which are secure in the traditional security models obviously cannot provide such security. Based on this consideration, in this paper, we design a leakage-resilient proxy signature scheme for the secure mobile agent systems.


Author(s):  
Mojtaba Bahramian ◽  
Elham Hajirezaei

Identity-Based Encryption is a public key cryptosystem that uses the receiver identifier information such as email address, IP address, name and etc, to compute a public and a private key in a cryptosystem and encrypt a message. A message receiver can obtain the secret key corresponding with his privacy information from Private Key Generator and he can decrypt the ciphertext. In this paper, we review Boneh-Franklin’s scheme and use bilinear map and Weil pairing’s properties to propose an identity-based cryptography scheme based on isogeny of elliptic curves.


In warfare, “reconnaissance” is the process of collecting information about enemy forces using different detection methods. In ethical hacking, reconnaissance is the first phase targeted to gather and learn as much as information available about the target using tools like internet sources, social engineering techniques, dumpster diving, email harvesting, Whois database, etc. This chapter introduces different tools and techniques used during the active and passive reconnaissance phases in detail. Reconnaissance consists of footprinting, scanning, and enumeration techniques used to covertly discover and collect information about a target system. During reconnaissance, an ethical hacker attempts to gather as much information about a target system as possible. It can use active (by directly interacting with the target which have risk of getting caught like social engineering methods) or passive (like visiting target website) information-gathering methods in order to identify the target and discover its IP address range, network, domain name, mail server, DNS records, employee names, organization charts, and company details. The chapter also provides the details of possible countermeasures to be implemented on website to avoid revealing more information to the attackers.


Sign in / Sign up

Export Citation Format

Share Document