Development of complex data protection of server rooms from unauthorized access
DOI:
https://doi.org/10.15587/2312-8372.2015.51351Keywords:
complex security, server room, AES-256, Python, data reservationAbstract
The problem of providing of information security at the all levels can be solved effectively only if there will be found and activated a Complex Information Security System (CISS), which will cover the entire life cycle of computer systems (CS), starting from design and ending up with recycling, and all the technological link of collection, storage, processing and transmission of information. Therefore, the main purpose of the research in this paper is the development of integrated protection, which will prevent physical access to confidential information, its copying, theft or damage in server rooms. The use of modern high-level programming language Python and symmetric codifying algorithm AES allows the programming part of complex protection to work as quickly as possible, which leads to a rapid transfer of data from personal computer to remote server. Developed CISS allows keeping of confidential information even in a case of unauthorized access and theft of equipment. Program part allows reservation of data to 50 Mb (after the SMTP protocol) and more than 50 Mb (after the FTP protocol), speed of operation in this case is 15-20 sec (after the SMTP protocol) and 2-3 sec (after FTP protocol) if dimensions of file is 50 Mb. Thanks to using symmetric cryptosystem AES-256 which has a length of key of 256 bit we reached to obtain maximum crypto stability if compare with alternative software-hardware complex information security system Secret Disk Secret NG 3.2 which uses cryptosystem DES with length of key of 56 bit. For instance to ‘crack’ AES-256 we need approximate 3.78×1063years provided that you go over million keys per second.
The developed system can be used in all fields of application whose work is connected with the use of server rooms and who have no need in high qualified staff to servicing this system. Therefore, if compared to alternative CISS, the one reviewed in the article is more reliable thanks to newer encryption algorithm and capability to prevent data losses in the case of unauthorized access to the room.References
- Shcheglov, O. Yu. (2004). Zashchita komp'iuternoi seti ot NSD. St. Petersburg, 384.
- Skripnik, D. A. (2009). Obespechenie bezopasnosti personal'nyh dannyh. Moscow, 78.
- Zavgorodnii, V. I. (2001). Kompleksnaia zashchita informatsii v komp'iuternyh sistemah. Moscow: Logos, 264.
- Naji, A. W., Muhamadi, I. A. S. (2010). Novel Approach for Cover File of Hidden Data in the Unused Area Two within EXE File Using Distortion Technique sand Advance Encryption Standard. Proceeding of World Academy of Science Engineering and Technology (WASET), Vol. 56, № 5, 498–502.
- Abomhara, M., Zakaria, O., Khalifa, O., Zaidan, A., Zaidan, B. (2010). Enhancing Selective Encryption for H.264/AVC Using Advanced Encryption Standard. International Journal of Computer and Electrical Engineering, Vol. 2, № 2, 223–229. doi:10.7763/ijcee.2010.v2.141
- Naji, A. W., Hameed, S. A., Zaidan, B. B., Al-Khateeb, W. F., Khalifa, O. O. (2009). Novel Framework for Hidden Data in the Image Page within Executable File Using Computation between Advance Encryption Standared and Distortion Techniques. International Journal of Computer Science and Information Security, Vol. 3, № 1, 73–78.
- Hamdan, A., Jalab, H. A., Zaidan, A. A., Zaidan, B. B. (2010). New Frame Work of Hidden Data with in Non Multimedia File. International Journal of Computer and Network Security, Vol. 2, № 1, 46–54.
- Tehnicheskie sistemy zashchity informatsii. (1998). Moscow: AOZT «Nelk», 56.
- Taqa, A., Zaidan, A., Zaidan, B. (2009). New Framework for High Secure Data Hidden in the MPEG Using AES Encryption Algorithm. International Journal of Computer and Electrical Engineering, Vol. 1, № 5, 566–571. doi:10.7763/ijcee.2009.v1.87
- Zaidan, A. A., Zaidan, B. B., Jalab, H. A. (2010). A New System for Hiding Data within (Unused Area Two + Image Page) of Portable Executable File Using Statistical Technique and Advance Encryption Standared. International Journal of Computer Theory and Engineering, Vol. 2, № 2, 218–225. doi:10.7763/ijcte.2010.v2.143
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2016 Yaroslav Drabyk, Galyna Lastivka
This work is licensed under a Creative Commons Attribution 4.0 International License.
The consolidation and conditions for the transfer of copyright (identification of authorship) is carried out in the License Agreement. In particular, the authors reserve the right to the authorship of their manuscript and transfer the first publication of this work to the journal under the terms of the Creative Commons CC BY license. At the same time, they have the right to conclude on their own additional agreements concerning the non-exclusive distribution of the work in the form in which it was published by this journal, but provided that the link to the first publication of the article in this journal is preserved.