Remote System Controller: An Implementation of a Secure Channel?
Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.2, No. 4)Publication Date: 2013-04-15
Authors : Shanu Sharma;
Page : 414-421
Keywords : Window based Application; GUI; Kerberos protocol; Java; Cryptography and Steganography;
Abstract
Now, a day’s Security over a Network is a must. Everyone wants to share files with others like Facebook, Pinterest. But are they aware whether the network on which they are Sharing files is Secure? So to help these kind of People who are not aware of what’s going on in Background there is a Kerberos cum Remote System Controller (RSC) System. Kerberos as a name looks like a Network Protocol, just for authentication purpose. This system allows a person to send, transfer, share any file or document over a particular Network in a Secured way. So that no one reveal the type of transaction going on between the two parties. The proposed System works on the Client Server architecture model, which says the Client will have to prove its Identity to the server before accessing anything. The objective of this System cum Controller was just to make users aware of what’s happening on back-end of which they are Un-aware of. The Controller is a “window based application” to be implemented by a client or the Sender. The use of mediator is mainly just to reduce the Resources Utilization Power. The System will work based on Secured client’s password, Internet Protocol address and name of the service to be used. The Concept will rotate whole about Key Distribution Centre who will use DES i.e. Data Encryption Standard Algorithm for Transmission. RSC is using LSB i.e. Least Significant Bit Algorithm for Cryptography and Steganography. So, any client can send and receive files which can be Audio, Text and Video along with Data file containing Hidden text messages. All the Functionality is under a Single Page Cum Software, so that clients have the choice what Receiver and Sender wants to do.
Other Latest Articles
- A Novel Network Interjection Avoidance for MANET?
- Modified Security Frame Work for PIR Cloud Computing Environment?
- An Enhanced HASBE for Cloud Computing Environment?
- An Analysis for Black Hole Attack in AODV Protocol and Its Solution
- Enhanced Anomaly Detection IDS-Based Scheme for Dynamic MANET on-Demand (DYMO) Routing Protocol for MANETS?
Last modified: 2013-05-02 16:47:48