scholarly journals A Model of Cloud Forensic Application With Assurance of Cloud Log

2021 ◽  
Vol 13 (5) ◽  
pp. 114-129
Author(s):  
More Swami Das ◽  
A. Govardhan ◽  
Vijaya Lakshmi Doddapaneni

The key concepts of digital forensic investigation in cloud computing are examination and investigation. Cybercriminals target cloud-based web applications due to presence of vulnerabilities. Forensic investigation is a complex process, where a set of activities are involved. The cloud log history plays an important role in the investigation and evidence collection. The existing model in cloud log information requires more security. The proposed model used for forensic application with the assurance of cloud log that helps the digital and cloud forensic investigators for collecting forensic scientific evidences. The cloud preservation and cloud log data encryption method is implemented in java. The real-time dataset, network dataset results tell that attacks with the highest attack type are generic type, and a case conducted chat log will predict the attacks in advance by keywork antology learning process, NLP, and AI techniques.

Author(s):  
Hamza Sajjad Ahmad ◽  
Muhammad Junaid Arshad ◽  
Muhammad Sohail Akram

To send data over the network, devices need to authenticate themselves within the network. After authentication, the device will be able to send the data in-network. After authentication, secure communication of devices is an important task that is done with an encryption method. IoT network devices have a very small circuit with low resources and low computation power. By considering low power, less memory, low computation, and all the aspect of IoT devices, an encryption technique is needed that is suitable for this type of device. As IoT networks are heterogeneous, each device has different hardware properties, and all the devices are not on one scale. To make IoT networks secure, this paper starts with the secure authentication mechanism to verify the device that wants to be a part of the network. After that, an encryption algorithm is presented that will make the communication secure. This encryption algorithm is designed by considering all the important aspects of IoT devices (low computation, low memory, and cost).


2016 ◽  
Vol 3 (3) ◽  
pp. 291-317 ◽  
Author(s):  
Camilo Vieira ◽  
Molly Hathaway Goldstein ◽  
Şenay Purzer ◽  
Alejandra J. Magana

Engineering design is a complex process. The design process cannot be assessed based solely on a product or as a simple test because there is no single perfect design for a problem. An important design strategy is the conduction of experiments. Informed designers carry out experiments and use their outcomes to inform their next steps. On the other hand, beginning designers do little or no experiments, and the few experiments they do involve confounding variables. These behaviours that differentiate beginning and informed designers are not easy to assess in educational settings because they occur throughout the design process. This paper proposes and evaluates a model to analyze student interactions with a CAD tool in order to identify and characterize the different strategies students use to conduct experiments. A two-fold study is carried out to validate the model. The first phase uses the clickstream data of 51 middle school students working on a design project to create a net-zero energy house. The analysis of clickstream data is compared to a qualitative analysis of an open-ended posttest. The second phase correlates the number of experiments students did to the student prototype quality. The results suggest that the proposed model can be used to identify, characterize, and assess student strategies to conduct experiments.


2017 ◽  
Vol 2017 ◽  
pp. 1-6
Author(s):  
Pengtao Yang ◽  
Guiling Sun ◽  
Jingfei He ◽  
Peiyao Zhou ◽  
Jiangjiang Liu

A new type of student information management system is designed to implement student information identification and management based on fingerprint identification. In order to ensure the security of data transmission, this paper proposes a data encryption method based on an improved AES algorithm. A new S-box is cleverly designed, which can significantly reduce the encryption time by improving ByteSub, ShiftRow, and MixColumn in the round transformation of the traditional AES algorithm with the process of look-up table. Experimental results show that the proposed algorithm can significantly improve the encryption time compared with the traditional AES algorithm.


2015 ◽  
Vol 19 (1) ◽  
pp. 45-59 ◽  
Author(s):  
Subhasis Dasgupta ◽  
Pinakpani Pal ◽  
Chandan Mazumdar ◽  
Aditya Bagchi

Purpose – This paper provides a new Digital Library architecture that supports polyhierarchic ontology structure where a child concept representing an interdisciplinary subject area can have multiple parent concepts. The paper further proposes an access control mechanism for controlled access to different concepts by different users depending on the authorizations available to each such user. The proposed model thus provides a better knowledge representation and faster searching possibility of documents for modern Digital Libraries with controlled access to the system. Design/methodology/approach – Since the proposed Digital Library Architecture considers polyhierarchy, the underlying hierarchical structure becomes a Directed Acyclic Graph instead of a tree. A new access control model has been developed for such a polyhierarchic ontology structure. It has been shown that such model may give rise to undecidability problem. A client specific view generation mechanism has been developed to solve the problem. Findings – The paper has three major contributions. First, it provides better knowledge representation for present-day digital libraries, as new interdisciplinary subject areas are getting introduced. Concepts representing interdisciplinary subject areas will have multiple parents, and consequently, the library ontology introduces a new set of nodes representing document classes. This concept also provides faster search mechanism. Secondly, a new access control model has been introduced for the ontology structure where a user gets authorizations to access a concept node only if its credential supports it. Lastly, a client-based view generation algorithm has been developed so that a client’s access remains limited to its view and avoids any possibility of undecidability in authorization specification. Research limitations/implications – The proposed model, in its present form, supports only read and browse facilities. It would later be extended for addition and update of documents. Moreover, the paper explains the model in a single user environment. It will be augmented later to consider simultaneous access from multiple users. Practical implications – The paper emphasizes the need for changing the present digital library ontology to a polyhierarchic structure to provide proper representation of knowledge related to the concepts covering interdisciplinary subject areas. Possible implementation strategies have also been mentioned. This design method can also be extended for other semantic web applications. Originality/value – This paper offers a new knowledge management strategy to cover the gradual proliferation of interdisciplinary subject areas along with a suitable access control model for a digital library ontology. This methodology can also be extended for other semantic web applications.


Author(s):  
DECY NATALIANA ◽  
FEBRIAN HADIATNA ◽  
AHMAD FAUZI

ABSTRAKPada penelitian ini mencoba untuk memanfaatkan tag RFID sebagai media untuk menyimpan data berupa nilai nominal uang. Metode enkripsi data Ceasar Cipher akan diterapkan ke dalam sistem yang dirancang sehingga data nominal uang pada tag merupakan data yang terenkripsi. Enkripsi data ini dilakukan untuk memperkuat sistem keamanan yang telah terdapat pada tag, sehingga proses peretasan data akan lebih sulit untuk dilakukan. Perangkat keras yang digunakan untuk merealisasikan sistem terdiri dari unit reader RFID-RC522, tag MIFARE Classic S50 1 kbyte, dan Arduino UNO R3. Dari hasil pengujian diperoleh bahwa tag dapat digunakan untuk menyimpan data berupa nilai nominal uang dan dari sistem yang telah direalisasikan nilai nominal uang tersebut dapat ditambah atau dikurang jumlahnya dari Rp 0 – Rp 4.294.967.295. Penerapan metode Ceasar Cipher berhasil mengubah nilai nominal uang menjadi data yang terenkripsi.Kata Kunci: RFID, pembayaran elektronik, sistem keamanan, enkripsi data, ceasar cipher ABSTRACTIn this research will try to utilize RFID tag as data storage for a certain value of money. Ceasar cipher as encryption method will be applied to the implemented system so that this certain value of money inside the tag turned into an encrypted data. Ecryption of the data is done to hardened the security sistem that already exists in the tag itself, so any violation behavior like data cracking will be harder to accomplish. The hardware that used on the system consist of a reader unit RFID-RC522, MIFARE Classic tag S50 1kbyte, and Arduino UNO R3. The result of this research proofed that the tag could be utilized to store a certain value of money and with a well built implemented system, the data value could be incremented or decremented ranging from Rp 0 – Rp 4.294.967.295. Implementation of Ceasar Cipher method has succesfully turn that certain value of money inside the tag into an encrypted data.Keywords: RFID, Electronic payment, security system, data encryption, ceasar cipher


Big data security is the most focused research issue nowadays due to their increased size and the complexity involved in handling of large volume of data. It is more difficult to ensure security on big data handling due to its characteristics 4V’s. With the aim of ensuring security and flexible encryption computation on big data with reduced computation overhead in this work, framework with encryption (MRS) is presented with Hadoop Distributed file System (HDFS). Development of the MapReduce paradigm needs networked attached storage in addition to parallel processing. For storing as well as handling big data, HDFS are extensively utilized. This proposed method creates a framework for obtaining data from client and after that examining the received data, excerpt privacy policy and after that find the sensitive data. The security is guaranteed in this framework using key rotation algorithm which is an efficient encryption and decryption technique for safeguarding the data over big data. Data encryption is a means to protect data in storage with containing a key encryption saved and accessible to reuse the data while required. The outcome shows that the research method guarantees greater security for enormous amount of data and gives beneficial info to related clients. Therefore the outcome concluded that the proposed method is superior to the previous method. Finally, this research can be applied effectively on the various domains such as health care domains, educational domains, social networking domains, etc which require more security and increased volume of data.


Sign in / Sign up

Export Citation Format

Share Document