scholarly journals Client-side XSLT, Validation and Data Security

Author(s):  
Wendell Piez

Client-side XSLT (CSX) is often used in scenarios where data (in XML) from a remote server is provided to a user who processes it in some way, for example, rendering it locally for display. That is, the server provides the data, and the client does the work on that data to make it useful. However, that is not the only scenario in which CSX is useful. In an environment in which the user already has, or is in the process of creating, XML, CSX can be a convenient and powerful tool, enabling users to perform operations on their data, securely, on their own systems. The potential for this use of CSX is illustrated with uses of Saxon-JS for several security-related applications.

Author(s):  
Priya Mathur ◽  
Amit Kumar Gupta ◽  
Prateek Vashishtha

Cloud computing is an emerging technique by which anyone can access the applications as utilities over the internet. Cloud computing is the technology which comprises of all the characteristics of the technologies like distributed computing, grid computing, and ubiquitous computing. Cloud computing allows everyone to create, to configure as well as to customize the business applications online. Cryptography is the technique which is use to convert the plain text into cipher text using various encryption techniques. The art and science used to introduce the secrecy in the information security in order to secure the messages is defined as cryptography. In this paper we are going to review few latest Cryptographic algorithms which are used to enhance the security of the data on the cloud servers. We are comparing Short Range Natural Number Modified RSA (SRNN), Elliptic Curve Cryptography Algorithm, Client Side Encryption Technique and Hybrid Encryption Technique to secure the data in cloud.


2018 ◽  
Vol 1 (2) ◽  
pp. 20-28
Author(s):  
Aditya Kurniawan ◽  
Ratna Mayasari ◽  
Muhammad Ary Murti

Data security is one of many problems that we face in IoT implementation. One of the problems with data security is we cannot assure that the data we received in the server-side is truly our data that we send from client-side or sensor-side. With that problems, comes some solutions like encryption and decryption method or some basic authentication planted on the server-side. In this research, we propose some encryption and decryption method that can be easily implemented on both server and sensor-side and then we analyze the complexity of its algorithm. This research aims to create some authentication process for the data that server-side receive from the sensor-side by creating encrypted ID consisting of 6 digits of alphanumeric and useful for identification process in system, so the server can recognize the data and validate it.


The work suggests a unique data security protocol for trusted online validation of e-documents like university certificates to confirm its credibility on different aspects. The idea reliably validates such e-documents from both the issuing authority and incumbent perspectives by strongly complying the security challenges like authentication, confidentiality, integrity and non-repudiations. At the very beginning, the parent institute physically issues the client copyright signature to the incumbent and stores this signature and biometric fingerprint of the incumbent on the server database. Additionally, the server secretly fabricates ownership signatures of parent institute and concern officer both within the e-document and this certified e-document is kept on the server database. Importantly, these signature fabrications are governed by self-defined hash computations on incumbent registration and certificate number respectively. Next, the server transmits this signed e-document to the client after a successful login by the client. Now client conceals shared copyright signature and taken thumb impression of the incumbent separately within this received e-document. Critically, these client-side signature castings are employed through self-defined hash computations on the incumbent name and obtained marks respectively. Finally, this authenticated e-document is validated at the server end by sensing all authentic signatures from it through those same identical hash operations. For stronger authenticity each signature is concealed by tracing its valid or authentic circular orientation of fragment sequences and embedding locations both derived from respective hash operations. Also, each signature is dispersed in non-overlapping manners on each separate region of the e-document promoting better signature recovery. Additional robustness is further injected with variable encoding of signature bits on different transformed pixel byte components of the e-Certificate image. Overall, the scheme confirms significant performance enhancements over exiting approaches with exhaustive simulation results on image data hiding aspects and their standardized comparisons


Author(s):  
N. Swetha ◽  
Dr. V. Divya

The software that runs its processing logic is a cloud application. In this the data is stored between two systems: client-side and server-side. End-users local hardware and remote server is also a part where some processing is done. However, most data storage exists on a remote server which is one of the major perk of using cloud application. In some cases a local device with no storage space is built with cloud application. Using web browser cloud application interacts with its users; this facility makes the organizations to switch their infrastructure to the cloud for gaining the benefit of digital transformations. In cloud applications it is easier for the clients to move or manage their data safely and it also provides the flexibility required for the emerging organizations to sustain in the digital market. As the cloud applications are emerged with sophistication many papers were employed on its branches. This research paper emphasizes on the evolution and long-term trends of cloud applications. Findings from the paper enable the enterprise with perplexity to decide on adopting cloud.


2018 ◽  
Vol 2 (1) ◽  
pp. 69
Author(s):  
Mira Maisura

Client side encryption has become one of the choice for data security in outsourced database as it is believed to provide more security than the server side encryption. It allows users to protect their data and prohibit access to that data from unauthorized user. Here, key use for encryption and decryption are all belong and known only to the user. On the other words, data stored in the database are all in encrypted form. CryptDB, a new cryptographic technique, where the system acts as a proxy to protect the communication between the application server and database server, implementing the idea. The aim of this study is to look into more detail about the encryption scheme implemented in CryptDB in 2 different case study, using SEARCH command with the condition given. The result of the study will present how the statement change with the act of proxy, and the encryption scheme implemented here.


2021 ◽  
Vol 9 (8) ◽  
pp. 100-108
Author(s):  
Remya Nair ◽  
J. Meenakumari

Cloud Platform has the data stored in a remote server and accessed with the help of services provided by cloud service providers. The primary objective is to provide data security due to the confidentiality of data transmitted to the remote server, over an unmonitored and multi-tenancy channel (internet). The major components of cloud platform are application, service, runtime cloud, storage and infrastructure. This is a conceptual paper trying to explain the risk factors to be deemed in a cloud environment. The benefits include scalability, availability, reliability, flexibility, increased collaboration, competitive edge, sustainability, reduced proportional cost. Risk factors influencing the data security and Integrity are identified up to three level of sub-constructs.. All the risk factors including hackers, mishandling of passwords, risk of data accessed from public /unmonitored sources, security in communication channels, intentional and unintentional data security threats created due to human interference are included in the scope of this paper. In this paper, the identification of sub factors of cloud data security risk components is achieved. The futuristics scope of this paper is to identify early risk prediction and mitigation strategies to all the identified risk factors related to data security by implementing SEM methodology.


2009 ◽  
Vol 42 (21) ◽  
pp. 1-2
Author(s):  
ERIK L. GOLDMAN
Keyword(s):  

1997 ◽  
Vol 36 (02) ◽  
pp. 79-81
Author(s):  
V. Leroy ◽  
S. Maurice-Tison ◽  
B. Le Blanc ◽  
R. Salamon

Abstract:The increased use of computers is a response to the considerable growth in information in all fields of activities. Related to this, in the field of medicine a new component appeared about 40 years ago: Medical Informatics. Its goals are to assist health care professionals in the choice of data to manage and in the choice of applications of such data. These possibilities for data management must be well understood and, related to this, two major dangers must be emphasized. One concerns data security, and the other concerns the processing of these data. This paper discusses these items and warns of the inappropriate use of medical informatics.


1979 ◽  
Vol 18 (04) ◽  
pp. 214-222
Author(s):  
K. Sauter

The problems encountered in achieving data security within computer-supported information systems increased with the development of modern computer systems. The threats are manifold and have to be met by an appropriate set of hardware precautions, organizational procedures and software measures which are the topic of this paper. Design principles and software construction rules are treated first, since the security power of a system is considerably determined by its proper design. A number of software techniques presented may support security mechanisms ranging from user identification and authentication to access control, auditing and threat monitoring. Encryption is a powerful tool for protecting data during physical storage and transmission as well.Since an increasing number of health information systems with information-integrating functions are database-supported, the main issues and terms of database systems and their specific security aspects are summarized in the appendix.


2020 ◽  
Vol 3 (2) ◽  
pp. 182-186
Author(s):  
Lisnayani Silalahi ◽  
Anita Sindar

Data security and confidentiality is currently a very important issue and continues to grow. Several cases concerning data security are now a job that requires handling and security costs that are so large. To maintain the security and confidentiality of messages, data, or information so that no one can read or understand it, except for the rightful recipients, a data security system application with an encryption method using an algorithm is designed. The SHA-1 cryptographic hash function that takes input and produces a 160-bit hash value which is known as the message iteration is usually rendered as a 40-digit long hexadecimal number.


Sign in / Sign up

Export Citation Format

Share Document