An Approach for Intranet Data Security
نویسندگان
چکیده
In this paper, combined the encrypting and compressing processes to consider the choices of which types of bits are most effective in the selective encryption sense when they are changed. So, instead of encrypting the whole file bit by bit, changed only these highly sensitive bits. Moreover, by combining the compression and encryption tasks and reducing the total encryption work required, it will helps to achieve a savings in system complexity. Selective encryption is the technique of encrypting some parts of a compressed data file while leaving others unencrypted. Selective encryption is not a new idea. It has been proposed in several applications, especially in the commercial multimedia industry. Hover, selective encryption of lossless compressed text files has not been explored, and that is the focus of this paper.
منابع مشابه
Design and Implementation of an Intranet Security and Access Control System in Ubi-Com
Currently, most enterprise intranet systems process user information for security and access authentication purposes. However, this information is often captured by unauthorized users who may edit, modify, delete or otherwise corrupt this ∗ corresponding author 420 M. Lee, N.-D. Cho, K.-K. Lee, K.-S. Ko data. In addition, corruption can result from inaccurate communication protocols in the web ...
متن کاملData Replication System in Secure Data Access control in Cloud Environment
Replication is a widely used method for achieving high availability in database systems. The data replication approach can be used for solutions such as Sharing data among remote offices, Sharing data among dispersed users, Make server data more accessible, Distribute solution updates, Back up data, Provide Internet or Intranet Replication. Cloud computing is most prevalent technology used in v...
متن کاملA Novel Approach for Protecting Exposed Intranet from Intrusions
This paper proposes a novel approach for protecting groups of computers in an intranet from malicious attacks. The proposed scheme uses a distributed intrusion detection system as the primary source of security mechanism along with micro-firewalls at the host level to enable dynamic policy update for the intranet as and when the threat pattern changes. The authentication mechanism used for auth...
متن کامل“ Structured evaluation of site security using an agent based hierarchical approach to ISO 17799 . ”
There is an increase in the interaction of different organizations at the internal Intranet, business Extranet, and the public Internet level. The need to conduct business or exchange confidential information across heterogeneous networks raises the issue of compliance with international information security management standards. It is becoming of increasing importance to establishing a common ...
متن کاملA Role-Based Access Control for Intranet Security
T hrough its open standards, the Internet set the foundation for the global community and access to resources that millions of computer users enjoy today. The benefits that accrue to the global community from this approach are also available to corporate enterprises through intranets, private information networks that use Internet software and standards but are not accessible from the Internet-...
متن کامل