ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Secure and Automated Communication in Client and Server Environment

Journal: International Journal of Advanced Computer Research (IJACR) (Vol.3, No. 13)

Publication Date:

Authors : ;

Page : 263-271

Keywords : Content attack detection; diverse attacks; secure framework; anchor check action; Encryption- Decryption technique (DES); file splitter technique and hidden numeric adder.;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

The unstoppable mass of the internet and the network- based applications has gratuitous to obese stability leaks. Soothe the confidential protocols, which are worn to quarter receive bulletin, are eternally targeted by diverse attacks. So there is the need of secure framework for content attack detection. Content attackers suit the position or the dawning encipher of strengthen a choose pages worn in their attacks to transcribe undulations to genuine websites. As a result the ability telecast and receiving in a handful of forms are battle-cry agreement safe. In this composition we heap up our charitable dissect in the administering of duty sniffing and absence to hooker the correct anchor check action and prevail upon on fake determining trick, thus wander the attack insightful necessity be sent in a counterirritant time eon majority. In this paper we will propose an efficient detection technique where the process of data preparation from server is automated which will reduce the time duration. In proposed approach, client must authorize first in the central database. After authorization, server request data from the client. When client request for data server prepares the data by applying the Data Encryption Standard (DES) algorithm as an encryption technique and split them using the partition algorithm as file splitter technique in order to reduce the time overhead. After this process server sends the data with relevant log file to the client and also maintains the log file itself. If any attacker attacks the data it will be notified to the server and the client because of the hidden numeric adder which will also to be sent with the file.

Last modified: 2014-12-02 20:47:18