6 research outputs found

    Steganography- A Powerful Web Security Tool for Data Transmission

    Get PDF
    The main objective of this paper titled � Steganography � A secured tool for web data transmission� is to provide security for data files during transmission in the network. The main motto of this type of data security is to prevent data access by unauthorized users during data transmission. The steganography is the process to convert the transmitting data in the network in an unreadable format and it is difficult to understand the stolen person

    A Brief Review of Security in Emerging Programmable Computer Networking Technologies

    Get PDF
    Recent programmable networking paradigms, such as cloud computing, fog computing, software- defined networks, and network function virtualization gain significant traction in industry and academia. While these newly developed networking technologies open a pathway to new architectures and enable a faster innovation cycle, there exist many problems in this area. In this article, we provide a review of these programmable networking architectures for comparison. Second, we provide a survey of security attacks and defense mechanisms in these emerging programmable networking technologies

    Optimizing Key Management within a Crypto-System using Aggregate Keys

    Get PDF
    Sharing data with peers is an important functionality in cloud storage. This is a study and analysis of secure, efficient, and flexible sharing of data with other users in cloud storage. The new public key encryptions which produce constant-size ciphertexts in such a way that effective delegation of decryption rights given to any set of ciphertexts are described in this paper. The novelty of the mechanism is that someone can aggregate any number of secret keys and turn them into a small single key, but combine the power of all the keys being grouped. To describe, in other words, the secret key holder could release a constant-size aggregate key for more flexible choices of ciphertext set in cloud storage, but different encrypted files outside of the set remain confidential. The aggregate compact key can be sent to others with ease or saved in a smart card with very less secure storage. In this paper, we discuss various such mechanisms and demonstrate the topic with a project. Some of the papers written by other authors in the area are analyzed in this paper. The project in this paper is a partial implementation of the proposed Crypto System

    A New Method IBE Interfaced with Private Key Generation and Public Key Infrastructure to Achieve High Data Security

    Get PDF
    A New Method IBE Interfaced with Private Key Generation and Public Key Infrastructure to Achieve High Data Securit

    Enhanced IPFIX flow processing mechanism for overlay network monitoring

    Get PDF
    Cloud computing is an emerging technology. People are adopting cloud at a faster rate, due to this cloud network traffic is increasing at a pace which is challenging to manage. Monitoring tool is an essential aspect of cloud computing and becomes more apparent with the acquired of cloud services. Overlay network provides new path to converge network and run as an independent virtual network on top of physical network. Currently, cloud overlay network technologies in cloud infrastructure have visibility gaps, which mean cloud provider and consumers miss out the major performance issues for troubleshooting of overlay network traffic. Hence, to keep a close watch on network and catch potential problems, a network monitoring tool required, to track and report more in-depth for not only see the hidden traffic but also presents the related information of cloud overlay network technologies specifically suited to the modern cloud-scale data center. Therefore, this study proposes an enhanced IP Flow Information Export (IPFIX) mechanism for cloud overlay network monitoring by adopting flexible flow based technique. Furthermore, the solution provided in this research consist of diverse mechanisms: enhanced packet filtering mechanisms using property match filtering technique and hash-based filtering technique. Virtual Extensible Local Area Network (VXLAN) based flow classification mechanisms using 6-tuple flow pattern and adoptable flow patterns. IPFIX message template mechanisms, which is comprise set of fields for data records within the IPFIX flow processing system. The findings demonstrate that the proposed mechanism can capture multi-tenant overlay network traffic to identify, track, analyze and continuously monitor the performance of cloud overlay network services. The proposed mechanisms are resource efficient where the combination of VFMFM+6tuple+VXLAN Message consume 4.63% less CPU, while the combination of VHFM+AFCM+AFCM Message consume 11.45% less CPU than Standard IPFIX. The contributions of this study would help cloud network operators and end-users to quickly and proactively resolve any overlay network based on performance issues with end-to end visibility and actionable insights
    corecore