4.6 Article

A Secure Architecture to Protect the Network from Replay Attacks during Client-to-Client Data Transmission

Journal

APPLIED SCIENCES-BASEL
Volume 12, Issue 16, Pages -

Publisher

MDPI
DOI: 10.3390/app12168143

Keywords

replay attacks; cryptography; encryption; decryption; server; symmetric cryptography; network; intrusion detection; prevention

Funding

  1. Researchers Supporting Program (TUMA-Project) Almaarefa University, Riyadh, Saudi Arabia [202127]

Ask authors/readers for more resources

This paper discusses cloud computing and data security, and proposes a secure architecture and algorithm implementation to prevent replay attacks.
Cloud computing is an online data storage system that can be easily accessed anywhere. Various algorithms and techniques have been developed to secure cloud data, which, if used correctly, can detect cloud attacks. These algorithms can only detect cloud data attacks and cannot prevent such attacks. If an attacker gains access to the data, he or she can tamper with the data in any way that could lead to misuse of the data. This paper will design a secure architecture for securing data with various algorithm implementations on the architecture so that cloud data can be saved from replay attacks. First, a text file will be taken, the text file will be encrypted using the encryption mechanism, and this file will be transmitted on the SaaS cloud server platform. Whenever a file is uploaded to a cloud server, it will be broadcast across the network, after which any user can access it, whether it is valid or invalid. Whenever a file is downloaded from a cloud server, it will be necessary to decrypt it to access it. If the file is successfully decrypted, then the file will be verified. A verification mechanism will be used to verify the data, which will be used to check whether a replay attack has been made on the data or not. If the data authentication is successful, this data will be called authentic data. The novelty of this paper is that an algorithm has been developed in this paper to prevent replay attacks so that if the data is retransmitted with slight changes, then the authenticity and inauthenticity of the data will be identified. Recent papers will be compared with the proposed paper in the conclusion, and it will be pointed out how much better the current technique is than the previous one.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available