41,556 research outputs found

    Trusted S/MIME Gateways

    Get PDF
    The utility of Web-based email clients is clear: a user is able to access their email account from any computer anywhere at any time. However, this option is unavailable to users whose security depends on their key pair being stored either on their local computer or in their browser. Our implementation seeks to solve two problems with secure email services. The first that of mobility: users must have access to their key pairs in order to perform the necessary cryptographic operations. The second is one of transition: initially, users would not want to give up their regular email clients. Keeping these two restrictions in mind, we decided on the implementation of a secure gateway system that works in conjunction with an existing mail server and client. Our result is PKIGate, an S/MIME gateway that uses the DigitalNet (formerly Getronics) S/MIME Freeware Library and IBM\u27s 4758 secure coprocessor. This thesis presents motivations for the project, a comparison with similar existing products, software and hardware selection, the design, use case scenarios, a discussion of implementation issues, and suggestions for future work

    A SURVEY OF CLOUD BASED SECURED WEB APPLICATION

    Get PDF
    ABSTRACT Cloud computing is a schema for allowingappropriate onrequest network access to a shared pool of configurable computing resources, that can be rapidlydelivered and released by minimal management effort or service provider.In cloud computing, you need a Web browser to access to everything needed to run your business from the required applications, services, and infrastructure. Many web developers are not security-aware. As a result, there exist many web sites on the Internet that are vulnerable. More and more Web-based enterprise applications deal with sensitive financial and medical data, which, if compromised, in addition to downtime can mean millions of dollars in damages. It is crucial to protect these applications from malicious attacks. In this paper we present a comprehensive survey of cloud based secure web application in the literature.The goal of this paper is to present a comparison of various previous methods proposed in the literature and a comparison between Python to other used programming languages

    Web-based Attacks on Host-Proof Encrypted Storage

    Get PDF
    International audienceCloud-based storage services, such as Wuala, and pass- word managers, such as LastPass, are examples of so- called host-proof web applications that aim to protect users from attacks on the servers that host their data. To this end, user data is encrypted on the client and the server is used only as a backup data store. Authorized users may access their data through client-side software, but for ease of use, many commercial applications also offer browser-based interfaces that enable features such as remote access, form-filling, and secure sharing.We describe a series of web-based attacks on popular host-proof applications that completely circumvent their cryptographic protections. Our attacks exploit standard web application vulnerabilities to expose flaws in the encryption mechanisms, authorization policies, and key management implemented by these applications. Our analysis suggests that host-proofing by itself is not enough to protect users from web attackers, who will simply shift their focus to flaws in client-side interfaces

    Data Security on Backed Up Data and Recovery in Cloud Storage

    Get PDF
    Cloud provides its users with different services. Every day during cloud computing, a great deal of data is generated. On the cloud servers, the data is being saved. A recovery tool should be created in case this data is lost from the server. One such setup is described in this consideration. The proposed approach would enable simultaneous data storage on the inaccessible server and the cloud server. The information is returned from the farther server when the key record is misplaced. Secret key security is ensured so that the authentication is secure and authorized by the user based on the attributes of backup and recovery. A cloud is a distinct Information Technology infrastructure designed to provide its users with different facilities that can be gotten to remotely. Cloud alludes to the term arrange of systems that back get to decentralized Data Innovation assets. Cloud employments the Web as well as the inaccessible central servers to manage consumers and businessmen's data and applications. This helps to save the consumer from costs and room problems. It is a technology that makes data collection, processing, and bandwidth much more centralized. A cloud encompasses a certain restrain, because it could be a certain system utilized to supply assets remotely. The Web offers get to an endless number of clouds. Though the Web offers free get to a few web-based Information Technology services, a cloud is generally private and provides wireless data resources. Much of the Internet is accessible via the web service to Information Technology services. On the other hand, the Information Technology services supplied by cloud environments are intended to provide back-end computing capabilities and browser access.
    • …
    corecore