Data in transit validation for cloud computing using cloud-based algorithm detection of injected objects
The recent paradigm shift in the IT sector leading to cloud computing however innovative had brought along numerous data security concerns. One major such security laps is that referred to as the Man in the Middle (MITM) attack where external data are injected to either hijack a data in transit o...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English English |
Published: |
Institute of Advanced Engineering and Science (IAES)
2018
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/64152/ http://irep.iium.edu.my/64152/ http://irep.iium.edu.my/64152/ http://irep.iium.edu.my/64152/1/64152_Data%20in%20transit%20validation%20for%20cloud%20computing_article.pdf http://irep.iium.edu.my/64152/2/64152_Data%20in%20transit%20validation%20for%20cloud%20computing_scopus.pdf |
id |
iium-64152 |
---|---|
recordtype |
eprints |
spelling |
iium-641522018-06-08T08:17:15Z http://irep.iium.edu.my/64152/ Data in transit validation for cloud computing using cloud-based algorithm detection of injected objects Olanrewaju, Rashidah Funke Islam, Thouhedul Khalifa, Othman Omran Fajingbesi, Fawwaz Eniola TK Electrical engineering. Electronics Nuclear engineering TK7800 Electronics. Computer engineering. Computer hardware. Photoelectronic devices The recent paradigm shift in the IT sector leading to cloud computing however innovative had brought along numerous data security concerns. One major such security laps is that referred to as the Man in the Middle (MITM) attack where external data are injected to either hijack a data in transit or to manipulate the files and object by posing as a floating cloud base. Fresh algorithms’ for cloud data protection do exist however, they are still prone to attack especially in real-time data transmissions due to employed mechanism. Hence, a validation protocol algorithm based on hash function labelling provides a one-time security header for transferable files that protects data in transit against any unauthorized injection. The labelling header technique allows for a two-way data binding; DOM based communication between local and cloud computing that triggers automated acknowledgment immediately after file modification. A two layer encryption functions in PHP was designed for detecting injected object; bcrypt methods in Laravel and MD5 that generate 32 random keys. A sum total of 1600 different file types were used during training then evaluation of the proposed algorithm, where 87% of the injected objects were correctly detected. Institute of Advanced Engineering and Science (IAES) 2018-04 Article PeerReviewed application/pdf en http://irep.iium.edu.my/64152/1/64152_Data%20in%20transit%20validation%20for%20cloud%20computing_article.pdf application/pdf en http://irep.iium.edu.my/64152/2/64152_Data%20in%20transit%20validation%20for%20cloud%20computing_scopus.pdf Olanrewaju, Rashidah Funke and Islam, Thouhedul and Khalifa, Othman Omran and Fajingbesi, Fawwaz Eniola (2018) Data in transit validation for cloud computing using cloud-based algorithm detection of injected objects. Indonesian Journal of Electrical Engineering and Computer Science, 10 (1). pp. 348-353. ISSN 2502-4752 E-ISSN 2502-4760 http://www.iaescore.com/journals/index.php/IJEECS/article/view/10891/8225 10.11591/ijeecs.v10.i1.pp348-353 |
repository_type |
Digital Repository |
institution_category |
Local University |
institution |
International Islamic University Malaysia |
building |
IIUM Repository |
collection |
Online Access |
language |
English English |
topic |
TK Electrical engineering. Electronics Nuclear engineering TK7800 Electronics. Computer engineering. Computer hardware. Photoelectronic devices |
spellingShingle |
TK Electrical engineering. Electronics Nuclear engineering TK7800 Electronics. Computer engineering. Computer hardware. Photoelectronic devices Olanrewaju, Rashidah Funke Islam, Thouhedul Khalifa, Othman Omran Fajingbesi, Fawwaz Eniola Data in transit validation for cloud computing using cloud-based algorithm detection of injected objects |
description |
The recent paradigm shift in the IT sector leading to cloud computing
however innovative had brought along numerous data security concerns. One
major such security laps is that referred to as the Man in the Middle (MITM)
attack where external data are injected to either hijack a data in transit or to
manipulate the files and object by posing as a floating cloud base. Fresh
algorithms’ for cloud data protection do exist however, they are still prone to
attack especially in real-time data transmissions due to employed
mechanism. Hence, a validation protocol algorithm based on hash function
labelling provides a one-time security header for transferable files that
protects data in transit against any unauthorized injection. The labelling
header technique allows for a two-way data binding; DOM based
communication between local and cloud computing that triggers automated
acknowledgment immediately after file modification. A two layer encryption
functions in PHP was designed for detecting injected object; bcrypt methods
in Laravel and MD5 that generate 32 random keys. A sum total of 1600
different file types were used during training then evaluation of the proposed
algorithm, where 87% of the injected objects were correctly detected. |
format |
Article |
author |
Olanrewaju, Rashidah Funke Islam, Thouhedul Khalifa, Othman Omran Fajingbesi, Fawwaz Eniola |
author_facet |
Olanrewaju, Rashidah Funke Islam, Thouhedul Khalifa, Othman Omran Fajingbesi, Fawwaz Eniola |
author_sort |
Olanrewaju, Rashidah Funke |
title |
Data in transit validation for cloud computing using cloud-based algorithm detection of injected objects |
title_short |
Data in transit validation for cloud computing using cloud-based algorithm detection of injected objects |
title_full |
Data in transit validation for cloud computing using cloud-based algorithm detection of injected objects |
title_fullStr |
Data in transit validation for cloud computing using cloud-based algorithm detection of injected objects |
title_full_unstemmed |
Data in transit validation for cloud computing using cloud-based algorithm detection of injected objects |
title_sort |
data in transit validation for cloud computing using cloud-based algorithm detection of injected objects |
publisher |
Institute of Advanced Engineering and Science (IAES) |
publishDate |
2018 |
url |
http://irep.iium.edu.my/64152/ http://irep.iium.edu.my/64152/ http://irep.iium.edu.my/64152/ http://irep.iium.edu.my/64152/1/64152_Data%20in%20transit%20validation%20for%20cloud%20computing_article.pdf http://irep.iium.edu.my/64152/2/64152_Data%20in%20transit%20validation%20for%20cloud%20computing_scopus.pdf |
first_indexed |
2023-09-18T21:30:59Z |
last_indexed |
2023-09-18T21:30:59Z |
_version_ |
1777412508660793344 |