IJSDR
IJSDR
INTERNATIONAL JOURNAL OF SCIENTIFIC DEVELOPMENT AND RESEARCH
International Peer Reviewed & Refereed Journals, Open Access Journal
ISSN Approved Journal No: 2455-2631 | Impact factor: 8.15 | ESTD Year: 2016
open access , Peer-reviewed, and Refereed Journals, Impact factor 8.15

Issue: April 2024

Volume 9 | Issue 4

Impact factor: 8.15

Click Here For more Info

Imp Links for Author
Imp Links for Reviewer
Research Area
Subscribe IJSDR
Visitor Counter

Copyright Infringement Claims
Indexing Partner
Published Paper Details
Paper Title: A Cloud-based Invansion detection system that uses secure hashing methods
Authors Name: K. Yogananda venkatesh , K. Venkatakrishnavaraprasad , R.Srujani , K.Sumanth , Mrs.B.N.SWARNA JYOTHI
Unique Id: IJSDR2304260
Published In: Volume 8 Issue 4, April-2023
Abstract: All industries have the same fundamental problem of insufficient defence, but today's adversaries are making significant efforts to penetrate these defences in order to engage in illegal insider trading. They identify a wide variety of information theft conduits. Private details is more vulnerable to intrusion in the modern world. While there are numerous defences against various forms of assault, hackers are always developing novel methods of breaching existing defences. As a result, in this article, we attempted to create a novel approach that would be very resistant to such an assault. The suggested scheme includes the implementation of a hash map-based system for detecting intrusions. In this system, the item is hashed and then stored as a shared key. The safe transfer of data is a key issue nowadays. Users in the data-sharing system may encrypt their files using their own personal keys before uploading them. If a user leaks the key information, it becomes tough for the cloud provider maintain stay secure, making this attribute extremely crucial to any large-scale data sharing system. In this work, we provide a secure and efficient implementation of the technique, as well as a proof of its security. Many obstacles stand in the way of data owners when they want to make their data available through server or cloud storage. The issues may be addressed in a variety of ways. For the safe management of a shared key belonging to the data's owner, several methods are required. In this article, we'll discuss the concept of a trusted authority as a means of verifying the identities of cloud data users. The trusted authority will utilize the SHA algorithm to produce the key, and then distribute it to the user and the owner. To determine the hash value, the certified authority system utilizes the MD-5 method after receiving an AES-encrypted file from the data owner. It maintains a database with keys that may be accessed during dynamic operations and utilized to identify any cheaters inside the network (CSP or Owner). The CSP module stores files sent from the trusted authority in the cloud. It is shown that the generated key sets have many desired qualities that protect reliable communication from being snooped on by other the network's nodes.
Keywords: Object, Hashing, Hash Map, Intrusion Detection System, Intrusion, Security
Cite Article: "A Cloud-based Invansion detection system that uses secure hashing methods ", International Journal of Science & Engineering Development Research (www.ijsdr.org), ISSN:2455-2631, Vol.8, Issue 4, page no.1636 - 1642, April-2023, Available :http://www.ijsdr.org/papers/IJSDR2304260.pdf
Downloads: 000337077
Publication Details: Published Paper ID: IJSDR2304260
Registration ID:205480
Published In: Volume 8 Issue 4, April-2023
DOI (Digital Object Identifier):
Page No: 1636 - 1642
Publisher: IJSDR | www.ijsdr.org
ISSN Number: 2455-2631

Click Here to Download This Article

Article Preview

Click here for Article Preview







Major Indexing from www.ijsdr.org
Google Scholar ResearcherID Thomson Reuters Mendeley : reference manager Academia.edu
arXiv.org : cornell university library Research Gate CiteSeerX DOAJ : Directory of Open Access Journals
DRJI Index Copernicus International Scribd DocStoc

Track Paper
Important Links
Conference Proposal
ISSN
DOI (A digital object identifier)


Providing A digital object identifier by DOI
How to GET DOI and Hard Copy Related
Open Access License Policy
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License
Creative Commons License
This material is Open Knowledge
This material is Open Data
This material is Open Content
Social Media
IJSDR

Indexing Partner