INTERNATIONAL JOURNAL OF SCIENTIFIC DEVELOPMENT AND RESEARCH International Peer Reviewed & Refereed Journals, Open Access Journal ISSN Approved Journal No: 2455-2631 | Impact factor: 8.15 | ESTD Year: 2016
open access , Peer-reviewed, and Refereed Journals, Impact factor 8.15
A Cloud-based Invansion detection system that uses secure hashing methods
Authors Name:
K. Yogananda venkatesh
, K. Venkatakrishnavaraprasad , R.Srujani , K.Sumanth , Mrs.B.N.SWARNA JYOTHI
Unique Id:
IJSDR2304260
Published In:
Volume 8 Issue 4, April-2023
Abstract:
All industries have the same fundamental problem of insufficient defence, but today's adversaries are making significant efforts to penetrate these defences in order to engage in illegal insider trading. They identify a wide variety of information theft conduits. Private details is more vulnerable to intrusion in the modern world. While there are numerous defences against various forms of assault, hackers are always developing novel methods of breaching existing defences. As a result, in this article, we attempted to create a novel approach that would be very resistant to such an assault. The suggested scheme includes the implementation of a hash map-based system for detecting intrusions. In this system, the item is hashed and then stored as a shared key. The safe transfer of data is a key issue nowadays. Users in the data-sharing system may encrypt their files using their own personal keys before uploading them. If a user leaks the key information, it becomes tough for the cloud provider maintain stay secure, making this attribute extremely crucial to any large-scale data sharing system. In this work, we provide a secure and efficient implementation of the technique, as well as a proof of its security. Many obstacles stand in the way of data owners when they want to make their data available through server or cloud storage. The issues may be addressed in a variety of ways. For the safe management of a shared key belonging to the data's owner, several methods are required. In this article, we'll discuss the concept of a trusted authority as a means of verifying the identities of cloud data users. The trusted authority will utilize the SHA algorithm to produce the key, and then distribute it to the user and the owner. To determine the hash value, the certified authority system utilizes the MD-5 method after receiving an AES-encrypted file from the data owner. It maintains a database with keys that may be accessed during dynamic operations and utilized to identify any cheaters inside the network (CSP or Owner). The CSP module stores files sent from the trusted authority in the cloud. It is shown that the generated key sets have many desired qualities that protect reliable communication from being snooped on by other the network's nodes.
"A Cloud-based Invansion detection system that uses secure hashing methods ", International Journal of Science & Engineering Development Research (www.ijsdr.org), ISSN:2455-2631, Vol.8, Issue 4, page no.1636 - 1642, April-2023, Available :http://www.ijsdr.org/papers/IJSDR2304260.pdf
Downloads:
000337077
Publication Details:
Published Paper ID: IJSDR2304260
Registration ID:205480
Published In: Volume 8 Issue 4, April-2023
DOI (Digital Object Identifier):
Page No: 1636 - 1642
Publisher: IJSDR | www.ijsdr.org
ISSN Number: 2455-2631
Facebook Twitter Instagram LinkedIn