Data in transit validation for cloud computing using cloud-based algorithm detection of injected objects

The recent paradigm shift in the IT sector leading to cloud computing however innovative had brought along numerous data security concerns. One major such security laps is that referred to as the Man in the Middle (MITM) attack where external data are injected to either hijack a data in transit o...

Full description

Saved in:
Bibliographic Details
Main Authors: Olanrewaju, Rashidah Funke, Islam, Thouhedul, Khalifa, Othman Omran, Fajingbesi, Fawwaz Eniola
Format: Article
Language:English
English
Published: Institute of Advanced Engineering and Science (IAES) 2018
Subjects:
Online Access:http://irep.iium.edu.my/64152/1/64152_Data%20in%20transit%20validation%20for%20cloud%20computing_article.pdf
http://irep.iium.edu.my/64152/2/64152_Data%20in%20transit%20validation%20for%20cloud%20computing_scopus.pdf
http://irep.iium.edu.my/64152/
http://www.iaescore.com/journals/index.php/IJEECS/article/view/10891/8225
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.iium.irep.64152
record_format dspace
spelling my.iium.irep.641522018-06-08T08:17:15Z http://irep.iium.edu.my/64152/ Data in transit validation for cloud computing using cloud-based algorithm detection of injected objects Olanrewaju, Rashidah Funke Islam, Thouhedul Khalifa, Othman Omran Fajingbesi, Fawwaz Eniola TK Electrical engineering. Electronics Nuclear engineering TK7800 Electronics. Computer engineering. Computer hardware. Photoelectronic devices The recent paradigm shift in the IT sector leading to cloud computing however innovative had brought along numerous data security concerns. One major such security laps is that referred to as the Man in the Middle (MITM) attack where external data are injected to either hijack a data in transit or to manipulate the files and object by posing as a floating cloud base. Fresh algorithms’ for cloud data protection do exist however, they are still prone to attack especially in real-time data transmissions due to employed mechanism. Hence, a validation protocol algorithm based on hash function labelling provides a one-time security header for transferable files that protects data in transit against any unauthorized injection. The labelling header technique allows for a two-way data binding; DOM based communication between local and cloud computing that triggers automated acknowledgment immediately after file modification. A two layer encryption functions in PHP was designed for detecting injected object; bcrypt methods in Laravel and MD5 that generate 32 random keys. A sum total of 1600 different file types were used during training then evaluation of the proposed algorithm, where 87% of the injected objects were correctly detected. Institute of Advanced Engineering and Science (IAES) 2018-04 Article REM application/pdf en http://irep.iium.edu.my/64152/1/64152_Data%20in%20transit%20validation%20for%20cloud%20computing_article.pdf application/pdf en http://irep.iium.edu.my/64152/2/64152_Data%20in%20transit%20validation%20for%20cloud%20computing_scopus.pdf Olanrewaju, Rashidah Funke and Islam, Thouhedul and Khalifa, Othman Omran and Fajingbesi, Fawwaz Eniola (2018) Data in transit validation for cloud computing using cloud-based algorithm detection of injected objects. Indonesian Journal of Electrical Engineering and Computer Science, 10 (1). pp. 348-353. ISSN 2502-4752 http://www.iaescore.com/journals/index.php/IJEECS/article/view/10891/8225 10.11591/ijeecs.v10.i1.pp348-353
institution Universiti Islam Antarabangsa Malaysia
building IIUM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider International Islamic University Malaysia
content_source IIUM Repository (IREP)
url_provider http://irep.iium.edu.my/
language English
English
topic TK Electrical engineering. Electronics Nuclear engineering
TK7800 Electronics. Computer engineering. Computer hardware. Photoelectronic devices
spellingShingle TK Electrical engineering. Electronics Nuclear engineering
TK7800 Electronics. Computer engineering. Computer hardware. Photoelectronic devices
Olanrewaju, Rashidah Funke
Islam, Thouhedul
Khalifa, Othman Omran
Fajingbesi, Fawwaz Eniola
Data in transit validation for cloud computing using cloud-based algorithm detection of injected objects
description The recent paradigm shift in the IT sector leading to cloud computing however innovative had brought along numerous data security concerns. One major such security laps is that referred to as the Man in the Middle (MITM) attack where external data are injected to either hijack a data in transit or to manipulate the files and object by posing as a floating cloud base. Fresh algorithms’ for cloud data protection do exist however, they are still prone to attack especially in real-time data transmissions due to employed mechanism. Hence, a validation protocol algorithm based on hash function labelling provides a one-time security header for transferable files that protects data in transit against any unauthorized injection. The labelling header technique allows for a two-way data binding; DOM based communication between local and cloud computing that triggers automated acknowledgment immediately after file modification. A two layer encryption functions in PHP was designed for detecting injected object; bcrypt methods in Laravel and MD5 that generate 32 random keys. A sum total of 1600 different file types were used during training then evaluation of the proposed algorithm, where 87% of the injected objects were correctly detected.
format Article
author Olanrewaju, Rashidah Funke
Islam, Thouhedul
Khalifa, Othman Omran
Fajingbesi, Fawwaz Eniola
author_facet Olanrewaju, Rashidah Funke
Islam, Thouhedul
Khalifa, Othman Omran
Fajingbesi, Fawwaz Eniola
author_sort Olanrewaju, Rashidah Funke
title Data in transit validation for cloud computing using cloud-based algorithm detection of injected objects
title_short Data in transit validation for cloud computing using cloud-based algorithm detection of injected objects
title_full Data in transit validation for cloud computing using cloud-based algorithm detection of injected objects
title_fullStr Data in transit validation for cloud computing using cloud-based algorithm detection of injected objects
title_full_unstemmed Data in transit validation for cloud computing using cloud-based algorithm detection of injected objects
title_sort data in transit validation for cloud computing using cloud-based algorithm detection of injected objects
publisher Institute of Advanced Engineering and Science (IAES)
publishDate 2018
url http://irep.iium.edu.my/64152/1/64152_Data%20in%20transit%20validation%20for%20cloud%20computing_article.pdf
http://irep.iium.edu.my/64152/2/64152_Data%20in%20transit%20validation%20for%20cloud%20computing_scopus.pdf
http://irep.iium.edu.my/64152/
http://www.iaescore.com/journals/index.php/IJEECS/article/view/10891/8225
_version_ 1643616472870682624
score 13.159267