proxy server
Recently Published Documents


TOTAL DOCUMENTS

230
(FIVE YEARS 29)

H-INDEX

9
(FIVE YEARS 0)

2021 ◽  
Vol 9 (2) ◽  
pp. 45
Author(s):  
Gilang Ferdiansyah ◽  
Kustanto Kustanto ◽  
Sri Hariyati Fitriasih

RT/RW Net Joho Baru is one of the internet service provider organizations. As one of the growing internet service provider RT/RW Net Joho Baru has to give the best and the quickest services to the customers. So that it need appropriate technology which is support to the best networks to give good services to the customers.  The Important factors are cost and speed factors which related to the material efficiency and time. This research is comparing about proxy server operating systems such as Squid 2.7, Squid3, and Squid Lusca, so that it can easier to find out the appropriate operating systems to build the best network. SDLC Method has several steps. The first step is the analysis of feasibility study which included software and hardware.  The second step is the analysis of needs which is planning relate to the system project. Then network planning design is going apply. Next, continuing design system to system testing. Based on these steps, the proxy server is successfully to shorten time management on accessing the website. The results of the efficiency acquisition are Squid 2.7 at  75,1%, Squid3 at 83,5%, and Squid Lusca at 86,9%.


2021 ◽  
Vol 11 (20) ◽  
pp. 9422
Author(s):  
Young-Hoon Park ◽  
Yejin Kim ◽  
Shin-Ok Lee ◽  
Kwangman Ko

The security and privacy of electronic health records (EHRs) have received considerable attention from healthcare workers and researchers. To ensure security, various encryption and decryption schemes as well as key management protocols have been developed. However, owing to sharing and scalability issues, additional security technologies have been proposed. Nonetheless, these technologies cause other problems, such as efficiency issues. Blockchain-based EHR management systems have been proposed to overcome computational overhead. However, because most blockchain systems are installed by outsourcing companies, EHRs may be leaked to the company. Hence, we herein propose a blockchain-based EHR management scheme with proxy re-encryption. In this scheme, we set a proxy server that re-encrypts the ciphertext between file servers, thereby solving EHR sharing issues. Furthermore, because the server is separated from the blockchain system, the outsourcing company cannot manipulate the server or access the records. In addition, the blockchain assists in access control by using smart contracts, thereby enabling secure and efficient EHR sharing. By performing security analysis, we prove that our proposed scheme solves the aforementioned security problems. In addition, we experimentally demonstrate the efficient operation of the proposed system.


2021 ◽  
Vol 1 (1) ◽  
pp. 1-8
Author(s):  
Raditya Faisal Walilu ◽  
Bernard Ferdinan Nugroho Laim ◽  
I Made Mariasa ◽  
Riki Riki ◽  
Alberto Alberto

Kebijakan pelaksanaan pendidikan daring yang dilakukan oleh sekolah dan juga perguruan  tinggi  di  Indonesia  adalah  menyikapi  pandemi  Covid-19 ­­yang  melanda hampir   seluruh   dunia.   Kementrian   Pendidikan   dan   kebudayaan   RI   mendorong penyelenggaraan proses pembelajaran dilakukan dengan daring. Hal ini sesuai dengan Surat  Edaran  Mendikbud  RI  nomor  3  tahun  2020  tentang  Pencegahan  Corona  Virus Disease  (COVID-19)  pada  Satuan  Pendidikan,  dan  Surat  Sekjen  Mendikbud  nomor 35492/A.A5/HK/2020  tanggal  12  Maret  2020  perihal  Pencegahan  Penyebaran Corona Virus  Disease (Covid-19).  Disamping  juga  mengikuti  edaran  dan  himbauan  dari masing-masing Pemerintah Daerah domisili Perguruan Tinggi.Hal ini menyebabkan maju pesatnya perkembangan media komunikasi WEBRTC, sebuah media teknologu realtime audio/video secara live. Hal ini digunakan bersama dalam sebuah room hingga menjadi teleconference.Penelitian ini membahas teleconference jitsi sebagai fasilitator opensource software. Penggunaan ini diterapkan dengan menggunakan konfigurasi default jitsi meliputi proxy server dan socket.Penerapan dilakukan pada tiga tempat berbeda didaerah kota/kabupaten sorong. Diantaranya diujung kota sorong, daerah saoka; kabupaten sorong, aimas dan kepulauan rajaampat, waisai. Didapatkan hasil yang signifikan sesuai dengan kecepatan internet yang didapatkan. Koresponden menggunakan paket data dan wifi telekomunikasi


Author(s):  
Denis Zolotariov

The article is devoted to the study and development of the mechanism of interaction between Wolfram Mathematica programs and Apache Kafka queue to provide the ability to build event-driven applications based on it. The subject of the research is the practical principles of building a mechanism for interaction between Wolfram Mathematica and Apache Kafka through a proxy-server. The purpose of the article is to develop and substantiate practical recommendations regarding the formation of proxy-server and a mechanism for its work to publishing messages to the Apache Kafka queue and reading messages from it for programs of the mathematical processor Wolfram Mathematica, which will make it possible to build event-driven applications. The tasks are: to determine the mechanism of such interaction, prove the choice of tools for its implementation, create and test the obtained results. The research used the following tools: Apache Kafka, Kafkacat, servers Ubuntu 20 LTS, the method of developing the Wolfram Mathematica package. The results of the research: the mechanism of interaction between Wolfram Mathematica and Apache Kafka through a proxy-server was determined and the corresponding toolkit was created on its basis in the form of two Mathematica packages, which are built on using bash-scripts, Apache Kafka and third-party Kafkacat software. The first - for use on the end user's computer, the second – on a compute server with a remote Mathematica kernel. It is confirmed that the Mathematica processor is currently not suitable in its pure form for real-time data analysis. Conclusions. Practical recommendations have been developed and substantiated regarding the formation of the mechanism of interaction between the Wolfram Mathematica mathematical processor and the Apache Kafka queue manager through a proxy-server for the possibility of working in two directions with the queue: publishing messages and reading them. A toolkit for such interaction in the form of Mathematica packages has been created, their capabilities have been demonstrated. The economic benefit of using the described tools is shown. Future ways of its improvement are given.


Author(s):  
Andreas Sebayang ◽  
Indrastanti Ratna Widiasari

Technology and internet networks are two things that are always related, because in today's era the internet has become a much-needed medium for learning, communicating, exchanging data, and even playing. With the activity of using the internet network, a problem will arise, namely network security. Network security is a very important aspect as a defense in a network, to minimize the risk of data theft and unwanted access in an internet network. The purpose of this study is to implement the control and security of internet use in an agency with minimal costs. namely using the Linux operating system Ubuntu Server 18.04, Proxy Server, and Snort. The result of the system that has been created has a function to perform caching so that it can save bandwidth and can function as filtering content to minimize unwanted things on the network. In addition, the system created is very helpful for network admins to monitor the network in real-time, even can also enforce rules to protect the network.


2021 ◽  
Vol 40 (2) ◽  
Author(s):  
Francis Jayakanth ◽  
Anand Byrappa ◽  
Raja Visvanathan

Institutions of advanced education and research, through their libraries, invest substantially in licensed online resources. Only authorized users of an institution are entitled to access licensed online resources. Seamless on-campus access to licensed resources happens mostly through Internet Protocol (IP) address authentication. Increasingly, licensed online resources are accessed by authorized users from off-campus locations as well. Libraries will, therefore, need to ensure seamless off-campus access to authorized users. Libraries have been using various technologies, including proxy server or virtual private network (VPN) server or single sign-on, to facilitate seamless off-campus access to licensed resources. In this paper, authors share their experience in setting up a Shibboleth-based single sign-on (SSO) access management system at the JRD Tata Memorial Library, Indian Institute of Science, to enable authorized users of the institute to seamlessly access licensed online resources from off-campus locations.


Author(s):  
M. N. Favorskaya ◽  
V. V. Buryachenko

Abstract. Mobile devices provide a huge amount of multimedia information sending to the members of social groups every day. Sometimes it is required to authorize the sending information using the limited computational resources of smartphones, tablets or laptops. The hardest problem is with smartphones, which have the limited daily energy and battery life. There are two scenarios for using mobile watermarking techniques. The first scenario is to implement the embedding and extraction schemes using proxy server. In this case, the watermarking scheme does not differ from conventional techniques, including the advanced ones based on adaptive paradigms, deep learning, multi-level protection, and so on. The main issue is to hide the embedding and extracting information from the proxy server. The second scenario is to provide a pseudo-optimized algorithm respect to robustness, imperceptibility and capacity using limited mobile resources. In this paper, we develop the second approach as a light version of adaptive image and video watermarking schemes. We propose a simple approach for creating a patch-based set for watermark embedding using texture estimates in still images and texture/motion estimates in frames that are highly likely to be I-frames in MPEG notation. We embed one or more watermarks using relevant large-sized patches according to two main criteria: high texturing in still images and high texturing/non-significant motion in videos. The experimental results confirm the robustness of our approach with minimal computational costs.


Author(s):  
Muna Mohammed Saeed Altaee ◽  
Mafaz Alanezi

In recent years, the trend has increased for the use of cloud computing, which provides broad capabilities with the sharing of resources, and thus it is possible to store and process data in the cloud remotely, but this (cloud) is untrusted because some parties can connect to the network such as the internet and read or change data because it is not protected, therefore, protecting data security and privacy is one of the challenges that must be addressed when using cloud computing. Encryption is interested in the field of security, confidentiality and integrity of information that sent by a secure connection between individuals or institutions regardless of the method used to prepare this connection. But using the traditional encryption methods to encrypt the data before sending it will force the data provider to send his private key to the server to decrypt the data to perform computations on it. In this paper we present a proposal to secure banking data transmission through the cloud by using partially homomorphic encryption algorithms such as (paillier, RSA algorithm) that allow performing mathematical operations on encrypted data without needing to decryption. A proxy server will also use for performing re-encryption process to enhance security.


Sign in / Sign up

Export Citation Format

Share Document