scholarly journals Enhancing and Developing Multi Block Proxy Re-encryption Methodology in Network Security

Windows Azure Storage (WAS) is a scattered accumulating structure that empowers clients to store clearly boundless tends of information for any term of time. Gigantic safety is not given internet to content prospering. Internet storage device separates record into social events and contemplated security. Those encoded gatherings placed on emulate storage device assistance. The mixed contents changed over converted formats included esteem byte execution getting to the essential content. The internet device makes correspondence included mixed contents showed up unmistakably in group with the etching outfitted with the access to confirm the content ordinariness. The code is executed for the back-up of the data. The encryption arrangement of the contents done by the content owner before it accomplishes internet storage. This ensures veritable twofold clock encryption. In the paper we deal with the existing system we deals with. Server used for storing data. Single Content are uploaded into the different size in different server. That is inability to any information in a server influence the entire framework. Along these lines all content setback from the server. In the wake of utilizing different server this issue could be stayed away from. The encryption plots in the current framework are not compelling in light of the fact that just couples of activities are upheld over scrambled information. In the event that at all security exists, the outsider evaluator ought to be permitted to get to the whole information bundles for confirmation. Internet encounters a ceaseless disillusionment escape contents ground-breaking support execution present structure. This framework, Internet storage will part of document converts same size, thought about security. These relating encoded groups placed in various Internet storage, its passwords are dissipated in various main devices. That encoded information are changed over formats included consistency execution bind access getting to the primary content by utilizing AES, MD5 ALGORITHM if the considerable customer getting to the content cloud will recoup the contents reversible way.

2012 ◽  
Vol 4 ◽  
pp. 38-42
Author(s):  
Jin Liang Bian

With the Internet spread and deepening of the application, the development of enterprises Internet and e-commerce business has become an inevitable trend. Network security has drawn more and more attention. Therefore, it is necessary to monitor network information real-timely by using an effective information filtering systems in the network security. So the paper discussed the system structure, the estimation methods and key technology of the Network Information Filtering System in the general and in detail.


2010 ◽  
Vol 1 (1) ◽  
pp. 79-94 ◽  
Author(s):  
Janne Lindqvist ◽  
Essi Vehmersalo ◽  
Miika Komu ◽  
Jukka Manner

Firewalls are an essential component of the Internet and enterprise network security policy enforcement today. The configurations of enterprise firewalls are typically rather static. Even if client’s IP addresses can be dynamically added to the packet filtering rules, the services allowed through the firewall are commonly still fixed. In this paper, we present a transparent firewall configuration solution based on mobile cryptographic identifiers of Host Identity Protocol (HIP). HIP allows a client to protect the data transfer with IPsec ESP, and supports dynamic address changes for mobile clients. The HIP-based firewall learns the identity of a client when it communicates with the server over HIP. The firewall configures the necessary rules based on HIP control messages passing through the firewall. The solution is secure and flexible, and introduces only minimal latency to the initial HIP connection establishment.


Author(s):  
Gabriel PETRICĂ

Solutions that can be implemented to secure a LAN include firewalls and intrusion detection / prevention systems (IDS / IPS). For a wireless network, security is a challenge considering the specific elements of this type of network: the physical area from which the connection is possible, and the weaknesses of the protocols used for data encryption. This article presents a case study on the most widely used protocols (WEP, WPA and WPA2) to secure wireless networks and the methodology by which passwords can be decrypted using Kali Linux distribution - available for free on the Internet - and applications included in this operating system.


Author(s):  
Inderjeet Singh Sodhi

This chapter highlights the constant increase in the number of attacks on computer network systems, which has pushed governments, researchers, and experts to devise better security policies and strategies. However, the rapid growth of systems, components, and services offered has increased the difficulty of administering them. In many organizations in developed and developing countries, more emphasis is being given on use of Automatic Computing for proper network security. The chapter clarifies how various projects and tools could be relevant for network security. The chapter provides insights about what steps have been taken for network security in a developing country like India. It looks into various strategies adopted for communication data and network security in India. It emphasizes that, with increasing demand for basic/citizen services over the Internet, it has become important to protect data and ensure efficient backup and data recovery. The chapter proposes a need for better and effective policy and strategy for communication data and network security to make the government citizen-oriented in developing countries.


Author(s):  
Yongli Liu ◽  
Weifang Zhai ◽  
Song Ji

With the “Internet +” era of arrival, the major colleges and universities are in the construction of the wisdom of the campus, students and teachers living with the campus network is more and more closely related, Campus network security has become the protection of the wisdom of the campus construction. Campus network security issues become increasingly serious; a single security protection has been unable to meet the current security needs. This paper analyzes the major security threats facing the campus network, and presents the campus network security protection measures from the physical layer, network layer, system layer, application layer and management of five aspects, thus constructing the campus network's overall security defense system. The system has multiple security protection for Campus Network, thus improving the security of the campus network.


2017 ◽  
Vol 11 (4) ◽  
pp. 1-15 ◽  
Author(s):  
Nagesh K. ◽  
Sumathy R. ◽  
Devakumar P. ◽  
Sathiyamurthy K.

Security is concerned with protecting assets. The aspects of security can be applied to any situation- defense, detection and deterrence. Network security plays important role of protecting information, hardware and software on a computer network. Denial of service (DOS) attacks causes great impacts on the internet world. These attacks attempt to disrupt legitimate user's access to services. By exploiting computer's vulnerabilities, attackers easily consume victim's resources. Many special techniques have been developed to protest against DOS attacks. Some organizations constitute several defense mechanism tools to tackle the security problems. This paper has proposed various types of attacks and solutions associated with each layers of OSI model. These attacks and solutions have different impacts on the different environment. Thus the rapid growth of new technologies may constitute still worse impacts of attacks in the future.


Atlanti ◽  
2015 ◽  
Vol 25 (1) ◽  
pp. 131-140
Author(s):  
Živana Heđbeli ◽  
Nikola Mokrović

Paper deals with whole process of organization of photo documentation produced by magazine ARKzin. ARKzin was published from 1991 to 1998 and first existed within the Antiwar Campaign Croatia, a network of peace, antiwar, and human rights groups, and later became independent subject. Collection of photographs consists of around 1500 items, taken from different authors, with some of them later becoming well-known photographers, and covers many subjects: protests, war atrocities, portraits of people interviewed for ARKzin, various social events, and graphics. The collection itself is valuable overview of social and political situation in Croatia in the nineties. The collection was transferred from ARKzin as creator to Documenta in 2011, with the aim of identification of items, organization and digitization, and publishing on virtual archive on the Internet. The paper is presenting the challenges of collection management in both physical and virtual environment, with emphasis on physical organization of the collection.


The internet has become an irreplaceable communicating and informative tool in the current world. With the ever-growing importance and massive use of the internet today, there has been interesting from researchers to find the perfect Cyber Attack Detection Systems (CADSs) or rather referred to as Intrusion Detection Systems (IDSs) to protect against the vulnerabilities of network security. CADS presently exist in various variants but can be largely categorized into two broad classifications; signature-based detection and anomaly detection CADSs, based on their approaches to recognize attack packets.The signature-based CADS use the well-known signatures or fingerprints of the attack packets to signal the entry across the gateways of secured networks. Signature-based CADS can only recognize threats that use the known signature, new attacks with unknown signatures can, therefore, strike without notice. Alternatively, anomaly-based CADS are enabled to detect any abnormal traffic within the network and report. There are so many ways of identifying anomalies and different machine learning algorithms are introduced to counter such threats. Most systems, however, fall short of complete attack prevention in the real world due system administration and configuration, system complexity and abuse of authorized access. Several scholars and researchers have achieved a significant milestone in the development of CADS owing to the importance of computer and network security. This paper reviews the current trends of CADS analyzing the efficiency or level of detection accuracy of the machine learning algorithms for cyber-attack detection with an aim to point out to the best. CADS is a developing research area that continues to attract several researchers due to its critical objective.


Sign in / Sign up

Export Citation Format

Share Document