Data in Transit Validation for Cloud Computing Using Cloud-Based Algorithm Detection of Injected Objects

The recent paradigm shift in the IT sector leading to cloud computing however innovative had brought along numerous data security concerns. One major such security laps is that referred to as the Man in the Middle (MITM) attack where external data are injected to either hijack a data in transit or t...

Full description

Saved in:
Bibliographic Details
Main Authors: Funke Olanrewaju, Rashidah (Author), Islam, Thouhedul (Author), O. Khalifa, Othman (Author), Fajingbesi, Fawwaz Eniola (Author)
Format: EJournal Article
Published: Institute of Advanced Engineering and Science, 2018-04-01.
Subjects:
Online Access:Get fulltext
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 02681 am a22003253u 4500
001 ijeecs10891_8225
042 |a dc 
100 1 0 |a Funke Olanrewaju, Rashidah  |e author 
100 1 0 |e contributor 
700 1 0 |a Islam, Thouhedul  |e author 
700 1 0 |a O. Khalifa, Othman  |e author 
700 1 0 |a Fajingbesi, Fawwaz Eniola  |e author 
245 0 0 |a Data in Transit Validation for Cloud Computing Using Cloud-Based Algorithm Detection of Injected Objects 
260 |b Institute of Advanced Engineering and Science,   |c 2018-04-01. 
500 |a https://ijeecs.iaescore.com/index.php/IJEECS/article/view/10891 
520 |a The recent paradigm shift in the IT sector leading to cloud computing however innovative had brought along numerous data security concerns. One major such security laps is that referred to as the Man in the Middle (MITM) attack where external data are injected to either hijack a data in transit or to manipulate the files and object by posing as a floating cloud base. Fresh algorithms for cloud data protection do exist however, they are still prone to attack especially in real-time data transmissions due to employed mechanism. Hence, a validation protocol algorithm based on hash function labelling provides a one-time security header for transferable files that protects data in transit against any unauthorized injection. The labelling header technique allows for a two-way data binding; DOM based communication between local and cloud computing that triggers automated acknowledgment immediately after file modification. A two layer encryption functions in PHP was designed for detecting injected object; bcrypt methods in Laravel and MD5 that generate 32 random keys. A sum total of 1600 different file types were used during training then evaluation of the proposed algorithm, where 87% of the injected objects were correctly detected. 
540 |a Copyright (c) 2018 Institute of Advanced Engineering and Science 
540 |a http://creativecommons.org/licenses/by-nc/4.0 
546 |a eng 
690 |a Cloud Computing, Data Security, Data in Transit, Data Injection 
690 |a Cloud Computing, Data Security, Data in Transit, Data Injection 
655 7 |a info:eu-repo/semantics/article  |2 local 
655 7 |a info:eu-repo/semantics/publishedVersion  |2 local 
655 7 |2 local 
786 0 |n Indonesian Journal of Electrical Engineering and Computer Science; Vol 10, No 1: April 2018; 348-353 
786 0 |n 2502-4760 
786 0 |n 2502-4752 
786 0 |n 10.11591/ijeecs.v10.i1 
787 0 |n https://ijeecs.iaescore.com/index.php/IJEECS/article/view/10891/8225 
856 4 1 |u https://ijeecs.iaescore.com/index.php/IJEECS/article/view/10891/8225  |z Get fulltext