Secure Socket Layer in the Network and Web Security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32797
Secure Socket Layer in the Network and Web Security

Authors: Roza Dastres, Mohsen Soori

Abstract:

In order to electronically exchange information between network users in the web of data, different software such as outlook is presented. So, the traffic of users on a site or even the floors of a building can be decreased as a result of applying a secure and reliable data sharing software. It is essential to provide a fast, secure and reliable network system in the data sharing webs to create an advanced communication systems in the users of network. In the present research work, different encoding methods and algorithms in data sharing systems is studied in order to increase security of data sharing systems by preventing the access of hackers to the transferred data. To increase security in the networks, the possibility of textual conversation between customers of a local network is studied. Application of the encryption and decryption algorithms is studied in order to increase security in networks by preventing hackers from infiltrating. As a result, a reliable and secure communication system between members of a network can be provided by preventing additional traffic in the website environment in order to increase speed, accuracy and security in the network and web systems of data sharing.

Keywords: Secure Socket Layer, Security of networks.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 441

References:


[1] M.L. Das, N. Samdaria, “On the security of SSL/TLS-enabled applications” Appl. Comput. Inform. 2014, 10(1-2), pp.68-81.
[2] S. Upadhyaya, “Secure communication using DNA cryptography with secure socket layer (SSL) protocol in wireless sensor networks” Proced. Comput. Sci. 2015, 70, pp.808-813.
[3] H.Wang, G. Bai, and H. Chen, “A gbps ipsec ssl security processor design and implementation in an fpga prototyping platform” J. Signal Process. Syst. 2010, 58(3), pp.311-324.
[4] C. Wijayarathna, N.A.G. Arachchilage, “Why Johnny can’t develop a secure application? A usability analysis of Java Secure Socket Extension API” Comput. Secur. 2019, 80, pp.54-73.
[5] P.V Krishna, S.Misra, D. Joshi, A. Gupta and M.S. Obaidat, “Secure socket layer certificate verification: a learning automata approach” Secur. Commun. Networ. 2014, 7(11), pp.1712-1718.
[6] W.El‐Hajj, “The most recent SSL security attacks: origins, implementation, evaluation, and suggested countermeasures” Secur. Commun. Networ. 2012, 5(1), pp.113-124.
[7] H. Wang, G. Bai and H. Chen, “Design and implementation of a high performance network security processor” Int. J. Electron. 2010, 97(3), pp.309-325.
[8] S.K. Sood, “A combined approach to ensure data security in cloud computing” J. Networ. Comput. Appl., 2012, 35(6), pp.1831-1838.
[9] https://www.digicert.com/ssl/