Remote System Controller: An Implementation of a Secure Channel

نویسنده

  • Shanu Sharma
چکیده

Now, a day’s Security over a Network is a must. Everyone wants to share files with others like Facebook, Pinterest. But are they aware whether the network on which they are Sharing files is Secure? So to help these kind of People who are not aware of what’s going on in Background there is a Kerberos cum Remote System Controller (RSC) System. Kerberos as a name looks like a Network Protocol, just for authentication purpose. This system allows a person to send, transfer, share any file or document over a particular Network in a Secured way. So that no one reveal the type of transaction going on between the two parties. The proposed System works on the Client Server architecture model, which says the Client will have to prove its Identity to the server before accessing anything. The objective of this System cum Controller was just to make users aware of what’s happening on back-end of which they are Un-aware of. The Controller is a “window based application” to be implemented by a client or the Sender. The use of mediator is mainly just to reduce the Resources Utilization Power. The System will work based on Secured client’s password, Internet Protocol address and name of the service to be used. The Concept will rotate whole about Key Distribution Centre who will use DES i.e. Data Encryption Standard Algorithm for Transmission. RSC is using LSB i.e. Least Significant Bit Algorithm for Cryptography and Steganography. So, any client can send and receive files which can be Audio, Text and Video along with Data file containing Hidden text messages. All the Functionality is under a Single Page Cum Software, so that clients have the choice what Receiver and Sender wants to do. Key Terms: Window based Application; GUI; Kerberos protocol; Java; Cryptography and Steganography

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Delay-dependent stability for transparent bilateral teleoperation system: an LMI approach

There are two significant goals in teleoperation systems: Stability and performance. This paper introduces an LMI-based robust control method for bilateral transparent teleoperation systems in presence of model mismatch. The uncertainties in time delay in communication channel, task environment and model parameters of master-slave systems is called model mismatch. The time delay in communicatio...

متن کامل

Anti-Synchronization of Complex Chaotic T-System Via Optimal Adaptive Sliding-Mode and Its Application In Secure Communication

In this paper, an optimal adaptive sliding mode controller is proposed for anti-synchronization of two identical hyperchaotic systems. We use hyperchaotic complex T-system for master and slave systems with unknown parameters in the slave system. To construct the optimal adaptive sliding mode controller, first a simple sliding surface is designed. Then, the optimal adaptive sliding mode controll...

متن کامل

Secure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines

Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...

متن کامل

LabVIEW implementation of an enhanced nonlinear PID controller based on harmony search for one-stage servomechanism system

This paper presents a practical implementation for a new formula of nonlinear PID (NPID) control. The purpose of the controller is to accurately trace a preselected position reference of one stage servomechanism system. The possibility of developing a transfer function model for experimental setup is elusive because of the lack of system data. So, the identified model has been developed via gat...

متن کامل

An efficient secure channel coding scheme based on polar codes

In this paper, we propose a new framework for joint encryption encoding scheme based on polar codes, namely efficient and secure joint secret key encryption channel coding scheme. The issue of using new coding structure, i.e. polar codes in Rao-Nam (RN) like schemes is addressed. Cryptanalysis methods show that the proposed scheme has an acceptable level of security with a relatively smaller ke...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013