The Secure Shell (SSH) is a protocol to use the network services with security. For example, when an email is send or receive, SSH will automatically encrypt or decrypt the email so that attacker will not intercept in the middle of the transaction . There are two versions of SSH i.e. SSH1 and SSH2. SSH has 3 main components as shown in figure 1: Transport Layer Protocol that provide confidentiality, integrity and authentication; User Authentication Protocol that authenticate client to the server; Connection Protocol that “multiplexes the encrypted tunnel into several logical channels” .
The proxy server effectively hides the true network addresses. In practice, many firewalls use two or more of these techniques in concert. A firewall is considered a first line of defense in file and network security. For greater security, data should be encrypted. (www.webopedia.com) Symmetric and asymmetric encryption Symmetric encryption is a type of encryption where the same key is used to encrypt and decrypt the message.
For connecting to a remote machine running over a SSH server we use SSH to access our applications and data. Some primary advantages of using SSH are as follows: 1. We can authenticate the remote machine by using SSH which cannot be possible by telnet and rlogin. 2. We can use encryption method for securing the passwords by using SSH.
Server provides authentication information to client to ensure that illicit servers cannot masquerade as genuine servers. Both parties have to authenticate. 2. Encryption- hiding data using algorithms. protection, method of code, algorithms, formulas a. Asymmetric keys- pair of key values one public and one private.
The use of SSH utilities at both end of connection are authenticated using a digital certificate. The passwords are encrypted unlike in utilities like Telnet. SSH has a built in username/password authentication system to establish a connection. SSH uses RSA public key cryptography for authentication and establishing connection. More often than not, SSH uses SSL under the hood, so they are both as secure as each other.
PUBLIC KEY (ASYMMETRIC) ENCRYPTION Asymmetric Encryption is used to protect the data while in movement. Asymmetric Encryption is also known as Public Key Encryption. It uses two related keys, a public key and a private key which is not shared with anyone. This pair of keys are developed by mathematical methods which can be solved in one direction. So anyone can encode a data using the public key but only the user with a private key can decode that specific data.
While the public key is published so that all can access it and use it to send information to its owner, the private key is kept secret and used by the receiver to decrypt the information which was sent (Computer Reseller News PG). The utilization of cryptography is superior to dependence on TCP/IP in that while information can still be intercepted by unauthorized personnel, it is less likely to be decrypted due to the elaborate cryptographic scheme. Unlike cryptography, TCP/IP messages are commonly intercepted using sniffer packets. Once intercepted they are immediately apparent in their content and no decryption is involved. Sources Cited Anonymous.
Encryption Data encryption refers to the transformation of data into a structure that makes it unreadable by anyone without a secret decryption key. It ensures that messages can be read only by the planned recipient. Encryption is the procedure of obscuring information to create it unreadable without special information. Only organizations and individuals with an abnormal need for secrecy have actually made good use of it. Nowadays, encryption is one of the most important technologies for maintaining your privacy and the security of important information.
These keys consist of groups of letters, numbers, and symbols. If a website is secured by encryption, you will see a small lock on the lower right hand side of your screen on the status bar. There are two basic standards of encryption. They are, Secure Sockets Layer (SSL) and Secure Hypertext Transport Protocol (S-HTTP). Both of these allow the client and the server computers to manage encryption and decryption as they communicate with each other during a secure Internet session.
In Cloud, the data owner stores data at a cloud service provider (CSP) and the clients send requests to the service provider to fetch the data. The cloud has huge data which makes system incapable and complex to monitor the integrity and security of storage. Cloud users require a proper mechanism or system to guard the integrity of the cloud. The audit mechanism should be efficient, b... ... middle of paper ... ...uch incident in future. The goal of this paper is to provide a simple, but efficient solution so that no overhead occurs at both CSP and Data Owners (DO).