Development of complex data protection of server rooms from unauthorized access

Authors

DOI:

https://doi.org/10.15587/2312-8372.2015.51351

Keywords:

complex security, server room, AES-256, Python, data reservation

Abstract

The problem of providing of information security at the all levels can be solved effectively only if there will be found and activated a Complex Information Security System (CISS), which will cover the entire life cycle of computer systems (CS), starting from design and ending up with recycling, and all the technological link of collection, storage, processing and transmission of information. Therefore, the main purpose of the research in this paper is the development of integrated protection, which will prevent physical access to confidential information, its copying, theft or damage in server rooms. The use of modern high-level programming language Python and symmetric codifying algorithm AES allows the programming part of complex protection to work as quickly as possible, which leads to a rapid transfer of data from personal computer to remote server. Developed CISS allows keeping of confidential information even in a case of unauthorized access and theft of equipment. Program part allows reservation of data to 50 Mb (after the SMTP protocol) and more than 50 Mb (after the FTP protocol), speed of operation in this case is 15-20 sec (after the SMTP protocol) and 2-3 sec (after FTP protocol) if dimensions of file is 50 Mb. Thanks to using symmetric cryptosystem AES-256 which has a length of key of 256 bit we reached to obtain maximum crypto stability if compare with alternative software-hardware complex information security system Secret Disk Secret NG 3.2 which uses cryptosystem DES with length of key of 56 bit. For instance to ‘crack’ AES-256 we need approximate 3.78×1063years provided that you go over million keys per second.

The developed system can be used in all fields of application whose work is connected with the use of server rooms and who have no need in high qualified staff to servicing this system. Therefore, if compared to alternative CISS, the one reviewed in the article is more reliable thanks to newer encryption algorithm and capability to prevent data losses in the case of unauthorized access to the room.

Author Biographies

Yaroslav Drabyk, Yuriy Fedkovych Chernivtsi National University, 101, Storozhynetska, Chernivtsi, Ukraine, 58012

Department of Radio Engineering and Information Security

Galyna Lastivka, Yuriy Fedkovych Chernivtsi National University, 101, Storozhynetska, Chernivtsi, Ukraine, 58012

Candidate of Technical Sciences, Associated Professor

Department of Radio Engineering and Information Security

References

  1. Shcheglov, O. Yu. (2004). Zashchita komp'iuternoi seti ot NSD. St. Petersburg, 384.
  2. Skripnik, D. A. (2009). Obespechenie bezopasnosti personal'nyh dannyh. Moscow, 78.
  3. Zavgorodnii, V. I. (2001). Kompleksnaia zashchita informatsii v komp'iuternyh sistemah. Moscow: Logos, 264.
  4. Naji, A. W., Muhamadi, I. A. S. (2010). Novel Approach for Cover File of Hidden Data in the Unused Area Two within EXE File Using Distortion Technique sand Advance Encryption Standard. Proceeding of World Academy of Science Engineering and Technology (WASET), Vol. 56, № 5, 498–502.
  5. Abomhara, M., Zakaria, O., Khalifa, O., Zaidan, A., Zaidan, B. (2010). Enhancing Selective Encryption for H.264/AVC Using Advanced Encryption Standard. International Journal of Computer and Electrical Engineering, Vol. 2, № 2, 223–229. doi:10.7763/ijcee.2010.v2.141
  6. Naji, A. W., Hameed, S. A., Zaidan, B. B., Al-Khateeb, W. F., Khalifa, O. O. (2009). Novel Framework for Hidden Data in the Image Page within Executable File Using Computation between Advance Encryption Standared and Distortion Techniques. International Journal of Computer Science and Information Security, Vol. 3, № 1, 73–78.
  7. Hamdan, A., Jalab, H. A., Zaidan, A. A., Zaidan, B. B. (2010). New Frame Work of Hidden Data with in Non Multimedia File. International Journal of Computer and Network Security, Vol. 2, № 1, 46–54.
  8. Tehnicheskie sistemy zashchity informatsii. (1998). Moscow: AOZT «Nelk», 56.
  9. Taqa, A., Zaidan, A., Zaidan, B. (2009). New Framework for High Secure Data Hidden in the MPEG Using AES Encryption Algorithm. International Journal of Computer and Electrical Engineering, Vol. 1, № 5, 566–571. doi:10.7763/ijcee.2009.v1.87
  10. Zaidan, A. A., Zaidan, B. B., Jalab, H. A. (2010). A New System for Hiding Data within (Unused Area Two + Image Page) of Portable Executable File Using Statistical Technique and Advance Encryption Standared. International Journal of Computer Theory and Engineering, Vol. 2, № 2, 218–225. doi:10.7763/ijcte.2010.v2.143

Downloads

Published

2015-09-22

How to Cite

Drabyk, Y., & Lastivka, G. (2015). Development of complex data protection of server rooms from unauthorized access. Technology Audit and Production Reserves, 5(6(25), 66–68. https://doi.org/10.15587/2312-8372.2015.51351