云中敏感数据传输和检索的密码深环拓扑防火墙

IF 1.3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS
Vikas K. Soman, V. Natarajan
{"title":"云中敏感数据传输和检索的密码深环拓扑防火墙","authors":"Vikas K. Soman,&nbsp;V. Natarajan","doi":"10.1049/2024/8821086","DOIUrl":null,"url":null,"abstract":"<div>\n <p>The data transmission and data retrieval process from the cloud is a critical issue because of cyber-attacks. The data in the cloud is highly vulnerable and may fall prey to hackers. The hackers tend to attack the data in the public network, deteriorating the range of confidentiality and the authentication of the data. To prevent this attack on the cloud data, this manuscript proposes a crypto deep ring topology firewall to protect the cloud from data breaches. The data transmission has been performed using egress ring topology crypto encryption that solves the difficulty in isolating the traffic path between the edge and cloud network. Moreover, during the cloud data retrieval, the data interoperability issue arises due to the improper cloud service level agreement, which is solved using an application programing interface firewall fetch intrusion prevention system used in the secure transmission technique in which the data are entered into the transport and session layer of the firewall and then into the intrusion detection and prevention system thus sieving of data is carried out to solve the amenability violation of the cloud network and eliminate data interoperability issue. The proposed model was implemented in the Python platform and provided an enhanced level of encryption and decryption performance than the existing cloud retrieval model, producing high access speed to the cloud network with data security. The proposed work has proved to be highly robust against cyber attacks like man-in-the-middle attacks and spoofing attacks.</p>\n </div>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"2024 1","pages":""},"PeriodicalIF":1.3000,"publicationDate":"2024-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/2024/8821086","citationCount":"0","resultStr":"{\"title\":\"Crypto Deep Ring Topology Firewall in Sensitive Data Transmission and Retrieval in Cloud\",\"authors\":\"Vikas K. Soman,&nbsp;V. Natarajan\",\"doi\":\"10.1049/2024/8821086\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div>\\n <p>The data transmission and data retrieval process from the cloud is a critical issue because of cyber-attacks. The data in the cloud is highly vulnerable and may fall prey to hackers. The hackers tend to attack the data in the public network, deteriorating the range of confidentiality and the authentication of the data. To prevent this attack on the cloud data, this manuscript proposes a crypto deep ring topology firewall to protect the cloud from data breaches. The data transmission has been performed using egress ring topology crypto encryption that solves the difficulty in isolating the traffic path between the edge and cloud network. Moreover, during the cloud data retrieval, the data interoperability issue arises due to the improper cloud service level agreement, which is solved using an application programing interface firewall fetch intrusion prevention system used in the secure transmission technique in which the data are entered into the transport and session layer of the firewall and then into the intrusion detection and prevention system thus sieving of data is carried out to solve the amenability violation of the cloud network and eliminate data interoperability issue. The proposed model was implemented in the Python platform and provided an enhanced level of encryption and decryption performance than the existing cloud retrieval model, producing high access speed to the cloud network with data security. The proposed work has proved to be highly robust against cyber attacks like man-in-the-middle attacks and spoofing attacks.</p>\\n </div>\",\"PeriodicalId\":50380,\"journal\":{\"name\":\"IET Information Security\",\"volume\":\"2024 1\",\"pages\":\"\"},\"PeriodicalIF\":1.3000,\"publicationDate\":\"2024-08-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://onlinelibrary.wiley.com/doi/epdf/10.1049/2024/8821086\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IET Information Security\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://onlinelibrary.wiley.com/doi/10.1049/2024/8821086\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IET Information Security","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1049/2024/8821086","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

摘要

由于网络攻击,从云中传输和检索数据是一个关键问题。云中的数据非常脆弱,可能成为黑客的猎物。黑客往往会攻击公共网络中的数据,破坏数据的保密性和认证范围。为了防止这种对云数据的攻击,本手稿提出了一种加密深环拓扑防火墙,以保护云免受数据泄露。数据传输采用出口环形拓扑加密技术,解决了边缘网络和云网络之间流量路径隔离的难题。此外,在云数据检索过程中,由于云服务级别协议不当,会产生数据互操作性问题,该问题可通过安全传输技术中使用的应用编程接口防火墙获取入侵防御系统来解决,该系统将数据输入防火墙的传输层和会话层,然后再输入入侵检测和防御系统,从而对数据进行筛选,以解决云网络的适配性违规问题,消除数据互操作性问题。所提出的模型在 Python 平台上实现,与现有的云检索模型相比,加密和解密性能都得到了提升,在保证数据安全的前提下实现了云网络的高速访问。事实证明,所提出的工作具有很强的鲁棒性,可抵御中间人攻击和欺骗攻击等网络攻击。
本文章由计算机程序翻译,如有差异,请以英文原文为准。

Crypto Deep Ring Topology Firewall in Sensitive Data Transmission and Retrieval in Cloud

Crypto Deep Ring Topology Firewall in Sensitive Data Transmission and Retrieval in Cloud

The data transmission and data retrieval process from the cloud is a critical issue because of cyber-attacks. The data in the cloud is highly vulnerable and may fall prey to hackers. The hackers tend to attack the data in the public network, deteriorating the range of confidentiality and the authentication of the data. To prevent this attack on the cloud data, this manuscript proposes a crypto deep ring topology firewall to protect the cloud from data breaches. The data transmission has been performed using egress ring topology crypto encryption that solves the difficulty in isolating the traffic path between the edge and cloud network. Moreover, during the cloud data retrieval, the data interoperability issue arises due to the improper cloud service level agreement, which is solved using an application programing interface firewall fetch intrusion prevention system used in the secure transmission technique in which the data are entered into the transport and session layer of the firewall and then into the intrusion detection and prevention system thus sieving of data is carried out to solve the amenability violation of the cloud network and eliminate data interoperability issue. The proposed model was implemented in the Python platform and provided an enhanced level of encryption and decryption performance than the existing cloud retrieval model, producing high access speed to the cloud network with data security. The proposed work has proved to be highly robust against cyber attacks like man-in-the-middle attacks and spoofing attacks.

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
IET Information Security
IET Information Security 工程技术-计算机:理论方法
CiteScore
3.80
自引率
7.10%
发文量
47
审稿时长
8.6 months
期刊介绍: IET Information Security publishes original research papers in the following areas of information security and cryptography. Submitting authors should specify clearly in their covering statement the area into which their paper falls. Scope: Access Control and Database Security Ad-Hoc Network Aspects Anonymity and E-Voting Authentication Block Ciphers and Hash Functions Blockchain, Bitcoin (Technical aspects only) Broadcast Encryption and Traitor Tracing Combinatorial Aspects Covert Channels and Information Flow Critical Infrastructures Cryptanalysis Dependability Digital Rights Management Digital Signature Schemes Digital Steganography Economic Aspects of Information Security Elliptic Curve Cryptography and Number Theory Embedded Systems Aspects Embedded Systems Security and Forensics Financial Cryptography Firewall Security Formal Methods and Security Verification Human Aspects Information Warfare and Survivability Intrusion Detection Java and XML Security Key Distribution Key Management Malware Multi-Party Computation and Threshold Cryptography Peer-to-peer Security PKIs Public-Key and Hybrid Encryption Quantum Cryptography Risks of using Computers Robust Networks Secret Sharing Secure Electronic Commerce Software Obfuscation Stream Ciphers Trust Models Watermarking and Fingerprinting Special Issues. Current Call for Papers: Security on Mobile and IoT devices - https://digital-library.theiet.org/files/IET_IFS_SMID_CFP.pdf
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信