WebSecurityM Aoori
WebSecurityM Aoori
net/publication/344781801
CITATIONS READS
15 2,519
2 authors:
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Mohsen Soori on 23 October 2020.
the security of the data sharing via the web is studied and an
Abstract—In order to electronically exchange information advanced system of secured data sharing is also developed. As
between network users in the web of data, different software such as a result, security and reliability of the network systems can be
outlook is presented. So, the traffic of users on a site or even the increased in order to increase benefits of information
floors of a building can be decreased as a result of applying a secure
technology in human life.
and reliable data sharing software. It is essential to provide a fast,
secure and reliable network system in the data sharing webs to create Review of research works is presented in Section II.
an advanced communication systems in the users of network. In the Application of the SSL in the network and web security is
present research work, different encoding methods and algorithms in presented in Section II. The developed software in the study is
data sharing systems is studied in order to increase security of data presented in Section IV. Finally, the obtained results are
sharing systems by preventing the access of hackers to the transferred presented in Section V.
data. To increase security in the networks, the possibility of textual
Open Science Index, Computer and Information Engineering Vol:14, No:10, 2020 waset.org/Publication/10011526
T HE software such as Outlook Software are presented in networks. To provide an advanced Network Security
order to provide the electronically exchanging information Processor in the webs of data, A Gbps IPSec SSL security
between users in the web. The need to use this new connection processor design is investigated by [3]. A usability analysis of
reduces the traffic of users on a site or even the floors of a Java Secure Socket Extension API is presented by [4] to
building. In the meantime, an example such as face, security, prevent the security vulnerabilities in software development
and reliability is very important. Security and reliability are applications. SSL certificate verification is investigated by [5]
important issues that messages are sent to the destination with to verify SSL certificates using the concepts of learning
the least error. automata (LA). To increase security in the data sharing
Encryption is the science of codes and codes. It is an systems in the networks, the most recent SSL security attacks
ancient art and has been used for centuries to protect messages is analyzed by [6]. Design and implementation of a high
exchanged between commanders, spies, lovers, and others in performance network security processor is presented by [7] to
order to keep their messages confidential. When dealing with develop network security processors (NSPs) in data sharing
data security, it is essential to prove the identity of the sender systems. A combined approach to ensure data security in
and receiver of the message. Also, it is necessary to make sure cloud computing is presented by [8] to increase security in
that the content of the message does not change in the data data sharing networks.
transferring process. These three issues, privacy,
authentication, and comprehensiveness, are at the heart of III. SSL
modern data security and can be used for encryption. SSL is a standard, registered technology for secure
In this paper, various encryption algorithms are presented in communication between a web server and an Internet browser
order to prevent hackers from infiltrating. The aim is to or a mail server and a mail client (e.g., Outlook). This secure
provide a complete and coherent defense model that can be connection protects all the information that we transfer
exploited according to the organization's capabilities. between the web server and the Internet browser (user) so that
Application of the Secure Socket Layer (SSL) in increasing it remains confidential and intact. SSL is an industry standard
and is used by millions of websites around the world to ensure
data security. The SSL is a solution for secure communication
R. D. is with the Department of Computer Engineering, Cyprus between a server and a service provider, provided by
International University, North Cyprus, Turkey (e-mail:
[email protected]). Netscape. In fact, SSL is a protocol that is lower than the
M. S. is with the Department of Mechanical Engineering, Eastern application layer (TCP/IP layer 4 in the TCP/IP model). The
Mediterranean University, Famagusta, Via Mersin 10, North Cyprus, Turkey advantage of using this protocol is the use of its embedded
(corresponding author, e-mail: [email protected] ).
International Scholarly and Scientific Research & Innovation 14(10) 2020 330 ISNI:0000000091950263
World Academy of Science, Engineering and Technology
International Journal of Computer and Information Engineering
Vol:14, No:10, 2020
security features to secure insecure application layer protocols exchanged information between the server and the receiver
such as HTTP and HTTPS. Based on that, cryptographic will be encrypted by the developed software in the study.
algorithms are applied to plain text that is supposed to pass Then, the sent data will be decrypted on the opposite side in
through an insecure communication channel such as the order to maximize confidentiality in data sending systems via
Internet, and ensures that data are kept confidential throughout the webs of data. The developed algorithm of the presented
the transmission channel. An SSL certificate is required for a software is described in this section.
website to have a secure SSL connection. The connection unit unfrmMain;
between the web browser and webserver using the SSL system interface
is shown in Fig. 1 [9]. uses
Windows, Messages, SysUtils, Variants, Classes, Graphics, Controls,
forms,
Dialogs, StdCtrls, ExtCtrls, Sockets, IdBaseComponent,
IdComponent,
IdIPWatch, Menus, ScktComp;
type
TfrmClientSocket = class(TForm)
Panel1: TPanel;
Fig. 1 The connection between the web browser and webserver using Panel2: TPanel;
Open Science Index, Computer and Information Engineering Vol:14, No:10, 2020 waset.org/Publication/10011526
International Scholarly and Scientific Research & Innovation 14(10) 2020 331 ISNI:0000000091950263
World Academy of Science, Engineering and Technology
International Journal of Computer and Information Engineering
Vol:14, No:10, 2020
V. CONCLUSION
Advanced data sharing systems are recently presented due
to information exchange requirements between webs of data.
Fig. 4 The name of the server In this study, various encryption algorithms is presented to
prevent hackers from infiltrating. The aim of the present
research work is providing a complete and coherent defense
model which can be exploited according to the organization's
capabilities. The developed software in the study is presented
and algorithm of the system is described. By connecting
between two computers, the user can consider features such as
sending various files and voice calls and voicemail, etc., in
addition to text conversation. So, an advanced secured
communication system in the webs of data can be provided
using the developed system in the study. The obtained results
proved the reliability and capabilities of the developed
software in the study which can be used in the internet (Like
yahoo messenger software).
Fig. 5 File sending by the user In designing security patterns, the fit between the user and
International Scholarly and Scientific Research & Innovation 14(10) 2020 332 ISNI:0000000091950263
World Academy of Science, Engineering and Technology
International Journal of Computer and Information Engineering
Vol:14, No:10, 2020
REFERENCES
[1] M.L. Das, N. Samdaria, “On the security of SSL/TLS-enabled
applications” Appl. Comput. Inform. 2014, 10(1-2), pp.68-81.
[2] S. Upadhyaya, “Secure communication using DNA cryptography with
secure socket layer (SSL) protocol in wireless sensor networks” Proced.
Comput. Sci. 2015, 70, pp.808-813.
[3] H.Wang, G. Bai, and H. Chen, “A gbps ipsec ssl security processor
design and implementation in an fpga prototyping platform” J. Signal
Process. Syst. 2010, 58(3), pp.311-324.
[4] C. Wijayarathna, N.A.G. Arachchilage, “Why Johnny can’t develop a
secure application? A usability analysis of Java Secure Socket Extension
API” Comput. Secur. 2019, 80, pp.54-73.
[5] P.V Krishna, S.Misra, D. Joshi, A. Gupta and M.S. Obaidat, “Secure
socket layer certificate verification: a learning automata approach”
Secur. Commun. Networ. 2014, 7(11), pp.1712-1718.
[6] W.El‐Hajj, “The most recent SSL security attacks: origins,
implementation, evaluation, and suggested countermeasures” Secur.
Commun. Networ. 2012, 5(1), pp.113-124.
[7] H. Wang, G. Bai and H. Chen, “Design and implementation of a high
performance network security processor” Int. J. Electron. 2010, 97(3),
pp.309-325.
[8] S.K. Sood, “A combined approach to ensure data security in cloud
computing” J. Networ. Comput. Appl., 2012, 35(6), pp.1831-1838.
[9] https://www.digicert.com/ssl/
International Scholarly and Scientific Research & Innovation 14(10) 2020 333 ISNI:0000000091950263