Secure File Multi Transfer Protocol Design

Krishna, Murali; Jamwal, Pradeep; Chaitanya, K. S. R.; Kumar, B. Vinod
May 2011
Journal of Software Engineering & Applications;May2011, Vol. 4 Issue 5, p311
Academic Journal
As the internet grows in popularity and therefore also in size more and more transmission takes place mainly because the technology is more readily available and applications have become more user friendly allowing entry to less sophisticated user over a broad spectrum. Most data transfer are mainly text based not secure and vulnerable to various forms of security risks. So the model that uses SSH for securing channel like intranet/internet which provides client authentication encryption and decryption with high degree of security by transferring the data in an encrypted format, up on this model enhances the efficiency of data transmission by encrypting or decrypting the data with AES in Counter Mode. AES is a symmetric key encryption standard. Moreover the permutation controlled by data can be performed at high speed in generic cpu. This scheme also expands the key space without costing more to run. And also finally through the combination of secure shell (ssh) and AES (Counter Mode) not only enhances the security of communication channel. It also provides various applications like remote user creation, remote user deletion, remote command execution, remote system shutdown, remote file transfer applications in a highly secure manner.


Related Articles

  • Securing America Against Cyber war. McCune, Jayson; Haworth, Dwight // Proceedings of the International Conference on Information Warfa;2012, p185 

    This paper expands on one aspect of Clarke and Knake's (2010) recommendation for defending the United States' Internet infrastructure from external attack. First it summarizes the threat that has been demonstrated in the recent past. Included are a number of data compromises that have been...

  • A Kind of Embedded Firewall Mechanism for ARM Processors. Xing Wenqi; Zhang Qianzhong; Feng Ziwei // Applied Mechanics & Materials;2014, Issue 556-562, p1757 

    The traditional firewall is a protect mechanism usually between the internal and external network, through the input and output of data packets in real-time network monitoring, it will make protective response immediately if it find security threats. With short data processing time and high...

  • Security start-ups offer new brands of protection. Messmer, Ellen // Network World;1/26/2004, Vol. 21 Issue 4, p21 

    Presents an update on the new products for security start-ups in the network industry. Role in protecting network-based attacks and stopping outbound transmission of sensitive date; Highlights of BeadWindow 100, the intrusion-prevention and firewall application from BeadWindow; Challenge of...

  • Intrusion profusion. Sturdevant, Cameron // eWeek;2/9/2004, Vol. 21 Issue 6, p62 

    Networks-based intrusion prevention systems are coming into bloom. Because corporations rely almost exclusively on the Internet and TCP/IP to communicate, they are subject to a range of assaults, including denial-of-service attacks, SYN floods and exploits designed to access such confidential...

  • Why VoIP security matters. Stredicke, Christian // Communications News;Aug2007, Vol. 44 Issue 8, p30 

    The article discusses the importance of Voice-over-Internet Protocol (VoIP) security. VoIP is often deployed by converged Information Technology (IT) infrastructures to enable unified messaging and cut costs, yet there are problems that can arise from its use. Security for shared data...

  • Taking the complexity out of encryption. Mottershead, Mark // Computer Bulletin;May1997, Vol. 39 Issue 3, p12 

    The business benefits of electronic commerce and communications are readily identifiable but there is mounting concern over the issue of software security, particularly in the unregulated domains of the Internet and Intranet. The UKÕs National Computing Centre has estimated that during...

  • Browse securely on your Android phone. Chester, Simon // APC (Future Publishing Ltd.);May2014, Issue 402, p98 

    The article discusses the encryption of Wi-Fi hotspots, and encrypting of data on the android device. Topics discussed include creation of Virtual Private Network (VPN), for working on Android device if it is connected with the Wi-Fi network, use of Secure Shell (SSH) which is a cryptographic...

  • Sygate Personal Firewall Pro.  // Australian Personal Computer;Mar2005, Vol. 25 Issue 3, p53 

    The article focuses on new developments in the field of personal computers. Sygate's Personal Firewall Pro blocks both unauthorized outbound communications and attacks from external users. It also features a detailed management application that generates network statistics on a per application...

  • NetOp firewall guards desktops. Chu, Francis // eWeek;1/31/2005, Vol. 22 Issue 5, p44 

    The article informs that IT managers looking for a desktop firewall with comprehensive rule sets and network customization options should check out CrossTec Corp.'s NetOp Desktop Firewall 3.0, which was released in December. The firewall is priced at $59 per system and supports Windows XP...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics