SlideShare una empresa de Scribd logo
1 de 9
Descargar para leer sin conexión
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013
DOI : 10.5121/ijcnc.2013.5510 131
A NOVEL SECURE E-CONTENTS SYSTEM FOR
MULTI-MEDIA INTERCHANGE WORKFLOWS IN E-
LEARNING ENVIRONMENTS
Shadi R. Masadeh1
,Bilal Abul-Huda2
andNidal M. Turab3
1
Dept. of Computer Networks, ISRA University, Amman, Jordan
masadeh@ipu.edu.jo
2
Computer Information Systems Dept.,Yarmouk University, Irbid, Jordan
abul-huda@yu.edu.jo
3
Department of computer science, ISRA University, Amman, Jordan
Nedalturab@ipu.edu.jo
ABSTRACT
The goal of e-learning is to benefit from the capabilities offered by new information technology (such as
remote digital communications, multimedia, internet, cell phones, teleconferences, etc.) and to enhance the
security of several government organizations so as to take into considerations almost all the contents of e-
learning such as: information content, covering most of citizens or state firms or corporations queries.
Content provides a service to provide most if not all basic and business services; content of communicative
link provides the citizen and the state agencies together all the time and provides content security for all
workers on this network to work in securely environment. Access to information as well is safeguarded. The
main objective of this research is to build a novel multi-media security system (encrypting / decrypting
system) that will enable E-learning to exchange more secured multi-media data/information.
KEYWORDS
E-content, E-protection, Encryption and Decryption, Security of E-content, multi-media.
1. INTRODUCTION
Many universities have to use wireless networks to provide their academic staff as well as their
students with wireless access to facilitate nomadic access to university systems and internet. But
all that is broadcasted over the air, so any eavesdropper, with proper equipment can have the
access to the information that is transmitted over the air. These Wireless Networks needed to be
secured in order to protect the multi-media data and or the multi-media information they transmit
over the air between the users and access points, so the designers worked a light weight securing
system they called WEP (Wired Equivalent Privacy).
The objectives of E-learning project are: first, increase the productivity, efficiency and
effectiveness of university institutions. Second, save time and effort in the movement and wait.
Third, keep transactions and access to any student from any university institution faster and
finally, in this paper we provide content security for all users on this network to work secured
environment and access to their information in a safe and secure manner.
An example as a current use of wireless networks in educational institutions is the Al-Hussein Bin
Talal University (AHU). Al-Hussein Bin Talal University has an E-learning network sponsored
by the Computer Center, to provide faculties with a new learning approach that could be
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013
132
developed at later stages to provide a portal for professors to access instructional and
examinational materials. The ComputerCenter is utilizing a wireless network that connects to
some faculties as a pilot project to fathom the efficiency of the project. This imposes security
vulnerability in that the network is using conventional wireless protection schemes (WEP, WPA,
and WPA-PSK). The main objective of this research paper is to introduce a new encryption
system that, in addition to the well known systems, will make it hard for the code crackers to get
the data or the information. This system was implemented and tested in AHU.
2. RELATED WORK
The history of cryptography dates back to the earliest recorded instances of man. About 1900 BC
an Egyptian scribe used non-standard hieroglyphs in an inscription. Kahn lists this as the first
documented example of written cryptography (Menezes,Oorschot and Vanstone , 2008).
Cryptography is both the lock and the combination (or key) that can be used to help protect your
data. There are a variety of cryptographic methods and keys. Together, themethod and the key
determine cryptographic security (Menezes,Oorschot and Vanstone , 2008).
The advent of computer technologies in both software and hardware necessitated the development
of more advanced encryption methods, so the NSA requested the data security organizations to
come up with a new encryption system to replace the old DES. In the year 2000 the NIST
selected the Rijndael to be the winner and to become the new AES (Advanced Encryption
Standard with 128 bit block and 256 bit key). Many versions of the Rijndael system were
designed to provide many levels of security ranging from medium to most secured (128 – 256
bits) depending on the level of security needed. The new communication systems are utilizing the
AES encryption which includes Microwave Networks, Cellular and Wireless Networks.
(Ferguson and Schneier, 2003), (Schneier, 2001).
The magic of secrecy enticed enthusiasts into cracking the code in order to see what others are
hiding from them, so they devised code breaking techniques, even the new AES has been attacked
, and in many cases breakers got the data.
The rest of this paper is organized as follows: Related Work is described in Section 2. The Case
Study and its Description are discussed in Sections 3 and 4. Current Challenges facing the
organization are discussed in section 5. Solutions and Recommendations are showed in section 6.
Finally Conclusion and Discussion are drawn in section 7.
3. CASE STUDY
In a wireless networks security applications, the system security technique is the process of
ensuring that both the stored and transmitted multi-media data and information is secured either
during transmitted or afterward. The transmitted multi-media data or information should be
encrypted before transmission.
The AHU faculty of Information Technology is totally depending on wireless networks. The
academic staff has free access to the internet as well as the AHU E-Learning system using a
unique usernames and passwords to their accounts.
The wireless network system facilitates the academic staff access to the faculty staff and student
data-base, the usage of E-Learning systems for updating E-Courses materials, online contact with
students and preparing the E-Exams for students. The faculty wireless network consists of an
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013
133
application server in the computer center, WEP data security system, access points (4-5 points in
each floor) and, portable staff laptops. The systems main disadvantage is sending the pre-shared
security key over the air, where anyone can simply 'hack' the system.
The new encryption method should be installed in:
1- Computer center application server.
2- Access Points.
3- Academic staff's portable computers.
The current wireless E-learning network at the faculty of information technology (FIT) at Al-
Hussein Bin Talal University (AHU) is relatively effective in the sense that the faculty is intended
to adopt the blended learning techniques at faculty classes. However, from a security point of
view, the system has serious problems in the area of secure e-content delivery network
connectivity as it is shown in the Figure (1) below.
Figure 1: The network setup and the unsecured area of wireless E-Learning network of AHU Faculty of
science and Information Technology (FIT).
The unsecured connection security issue can be summarized as follows:In the connection between
the professor's notebook/laptop and the access point; the connection is encrypted using some
widely used encryption systems and transferred over the air. When a hacker accesses the E-
learning site/portal, the connection and the transferred multi-media data/information is sent over
the air, and could be easily cracked using advanced methods. This means that the multi-media
data/information integrity and confidentiality is jeopardized with simple software.
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013
134
4. CURRENT CHALLENGES FACING THE ORGANIZATION
The main challenges facing the wireless network at the AHU are the security concerns. The wide-
spread Access Points (APs) make it difficult to assure the security of system. The wireless system
provides the academic staff, employees, and students with a remote access to the faculty students
database files, Internetand Online E-Learning courses.
The main security issues that must be assured are the Confidentiality, Integrity, and Availability
of the system data and resources. Therefore, the new security system must satisfy the following
activities:
• Checking the ICT application environment for any sever-level vulnerabilities.
• Ensuring roles and privilege levels were respected.
• Evaluating use of cryptography for multi-media data at rest and in transit.
• Validating user input for malicious multi-media data/information that could result in loss
of integrity or confidentiality of multi-media data/information.
• Anti-automation and end-user protection measures.
5. SOLUTION AND RECOMMENDATIONS
As a solution of threats facing the wireless network security using in AHU computer center we
introduced a new encryption system for the transferred data/information. In our research we can
summarize our proposed system in the following steps:
Encryption Side:
Step1: Open file for reading digitized multi-media data or information.
Step2: Open file for writing ciphered multi-media data or information.
Step3: Read multi-media dataset as blocks.
Step4: Embedded Watermark into multi-media dataset.
Step5: Set 2 arrays to hold plain digitized multi-media data or information text and cipher
digitized multi-media data or information text.
Step6: Hold input and output bytes or blocks in unmodified format.
Step7: Read-in 4 bytes or blocks from digitized multi-media data or information file.
Step8: keep reading until end of plain digitized multi-media data or information file.
Step9: read in one byte at a time and add it to the plain digitized multi-media data or information
file array.
Step10: If the number of bytes in the plain digitized multi-media data or information file of array
is 4 then encrypt the bytes from 0 to 3 (4 in total) and put them in cipher text array.
Step11: Repeat Step10 until end of array.
Step12: Write the cipher digitized multi-media data or information file array to encrypted or
ciphered file.
Step13: Reset buffers P and S.
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013
135
Step14: Encrypt the block (64-bit block).
Decryption side
Step1: Open file for reading ciphered multi-media data text.
Step2: Open file for writing plain digitized multi-media data text.
Step3: reset the byte counter and start reading 4 bytes into ciphered digitized multi-media data
array.
Step4: Repeat Step3 until end of ciphered multi-media data text file.
Step5: decrypt the bytes from 0 to 3 (4 in total) and put them in plain digitized multi-media data
of array.
Step6: Read-in 4 bytes from decrypted file.
Step7: If the number of bytes in the ciphered digitized multi-media data array is 4 then decrypt
the bytes from 0 to 3 (4 in total) and put them in digitized multi-media data array.
Step8: Repeat Step 7 until end of array.
Step9: Decrypt the block (64-bit block).
Step10: Extract Watermark from multi-media dataset.
Step11: Show multi-media dataset.
5.1 Proposed Encryption Algorithm
The following modified algorithm is used to explain our approach as follows:
1. Open file fpin for reading plain digitized multi-media data or information text
2. Open file fpout for writing ciphered multi-media data cipher text
3. Read dataset as blocks.
4. Embedded Watermark into dataset as shown above section 4.
5. set 2 arrays to hold plain digitized multi-media data or information text and ciphered
multi-media data text using calloc function
6. unsigned int p[4],s[4]; /* to hold input and output bytes in unmodified format */
7. Read-in 4 bytes from file 1 into array and keep reading until end of plain digitized multi-
media data or information file.
8. while (!feof(fpin)){ /* since we don't know the size of input file */
9. ch=getc(fpin); /*read in one byte at a time */
10. P[i++]=ch; /* add it to the cipher digitized multi-media data or information file plain text
array */
11. If (i>3){ /* if the number of bytes in the cipher digitized multi-media data or information
file plain text array is 4 then */
12. S[0]=(encrypt(p[3] using public key Bi[0]); /* encrypt the bytes from 0 to 3 (4 in total)
and put them in cipher text array */
13. s[1]=( encrypt(p[2] using public key Bi[1]);
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013
136
14. s[2]=( encrypt(p[1] using public key Bi[2]);
15. s[3]=( encrypt(p[0] using public key Bi[3]);
16. putc(s[2],fpout); /* write the ciphered digitized multi-media data cipher text array to
output file (encrypted file ) */
17. putc(s[0],fpout);
18. putc(s[3],fpout);
19. putc(s[1],fpout);
20. I=0; /* reset the byte counter and start reading 4 bytes into digitized multi-media data
plain text array
21. reset buffers P and S using calloc function
22. } /* end of bytes reading loop */
23. if I > 0 /* there is more input to process digitized multi-media data array (plain text )
24. } /* end of while loop, at the end of input file digitized multi-media data array (plain
text file ) */
25. Encrypt the block ( 64-bit block)
5.2 Proposed Decryption Algorithm
The proposed decrypting algorithm is depicted as follows:
1. Open file fpin for reading ciphered digitized multi-media data text.
2. Open file fpout for writing digitized multi-media data of plain text.
3. set 2 arrays to hold digitized multi-media data of plain text and ciphered digitized multi-
media data of cipher text using calloc function
4. unsigned int p[4],s[4]; /* to hold input and output bytes in unmodified format */
5. Read-in 4 bytes from file 1 into array and keep reading until end of ciphered digitized
multi-media data of cipher text file
6. while (!feof(fpin)){ /* since we don't know the size of input file */
7. ch=getc(fpin); /* read in one byte at a time */
8. p[i++]=ch; /* add it to the ciphered digitized multi-media data cipher text array */
9. if (i>3){ /* if the number of bytes in the ciphered digitized multi-media data cipher text
array is 4 then */
10. s[0]=(decrypt(p[3] using private key Bi[0])); /* decrypt the bytes from 0 to 3 (4 in total)
and put them in digitized multi-media data plain text array */
11. s[1]=( decrypt(p[2] using private key Bi[1]));
12. s[2]=( decrypt(p[1] using private key Bi[2]));
13. s[3]=( decrypt(p[0] using private key Bi[3]));
14. putc(s[2],fpout); /* write the digitized multi-media data plain text array to output file
(decrypted file ) */
15. putc(s[0],fpout);
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013
137
16. putc(s[3],fpout);
17. putc(s[1],fpout);
18. I=0; /* reset the byte counter and start reading 4 bytes into ciphered digitized multi-media
data cipher text array
19. reset buffers P and S using calloc function
20. } /* end of bytes reading loop */
21. if I > 0 /* there is more input to process ciphered digitized multi-media data cipher text
.
22. } /* end of while loop, at the end of input file ciphered digitized multi-media data array
(cipher text file ) */
23.Decrypt the block ( 64-bit block)
24.Extract Watermark from multi-media dataset.
25.Show multi-media dataset
6. CONCLUSION AND DISCUSSION
Through the compilation of all university activities and information services, interactive and
reciprocity in one location on the web site is the official university web site from which to do the
following:
1. Linking the average various organs of the university for all of the university services, and
computerized automatically to anywhere in the world and safely.
2. Completion of the university to the adoption of the various activities of information and
communication networks remotely.
3. The idea of E-learning basis to take advantage of all the possibilities offered by
information technology (such as digital communications, multimedia, internet, cell
phones, teleconferences, etc.) and to improve the performance of various government
institutions so as to include all the contents of E-government such as:
1. Information content, covering most if not all queries of faculty members, students
or state firms or enterprises.
2. Content provides a service to most if not all basic services and business services.
3. Content of communication link provides citizens and the state agencies together
almost all of the time.
4. Provides content security for all workers on this network to work securely and
access information in safeguarded environment.
Possible limitations of our algorithm are the CPU computation time and the power consumption.
These limitations can be considered as a future work.
In this paper we propose a novel multi-media security system (encrypting / decrypting system)
that will enable E-learning to exchange more secured multi-media data/information.
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013
138
ACKNOWLEDGEMENTS
The authors are grateful to the Al- Isra University, Jordan, for the Full Financial support granted
to this research project.
REFERENCES
[1] I. Fluhrer, S.Mantin, I.Shamir, "Weaknesses in the Key Scheduling Algorithm of RC4",( 2001).
[2] B. Schneier, “Cryptography, Security, and the Future,” Communications of the ACM, v. 40, n. 1,
1997 p. 138. http://en.wekipedia.org/wiki/automation.
[3] N.Ferguson , B.Schneier," Practical Cryptography". New York: J. Wiley & Sons, (2003).
[4] A. Menezes, P. van Oorschot and S. Vanstone ," Handbook of Applied Cryptography", / ajmeneze at
uwaterloo.ca / last updated (2008).
[5] B. Schneier, “Cryptography, Security, and the Future,” Communications of the ACM, v. 40, n. 1,
1997 p. 138. http://en.wekipedia.org/wiki/automation.
[6] R. Steve Edmonson, "Data Encryption and Cryptography, Investment and Governance Division
Ohio Office of Information Technology", (2007).
[7] V. Tselkov, N. Stoianov, "A Model of Software Cryptography System for Data Protection in
Distribution Information Systems", (2003),
www.dataprotection2003.info/speakers/Veselin_Tselkov/presentation.pdf.
[8] B. Schneier, “Key Length And Security.” Crypto-Gram , (2001).
http://www.counterpane.com/crypto-gram-910.html#KeyLengthandSecurity
[9] Wi-Fi Alliance. “Wi-Fi Protected Access (WPA)”, Version 2.0,( 2003).
[10] Wi-Fi Alliance. “Securing Wi-Fi Wireless Networks with today technologies”, ( 2003)..
[11] A. Schneier and J. Kelsey, "Unbalanced Feistel Networks and Block Cipher Design," Fast Software
Encryption, Third International Workshop Proceedings, 1996. ,Springer-Verlag, pp. 121-144,
(1996).
[12] M. Wiener. ``Efficient DES Key Search'', presented at the Rump session of Crypto '93. Reprinted in
Practical Cryptography for Data Internetworks", W. Stallings, editor, IEEE Computer Society Press,
pp. 31-79 (1996).
[13] S. Landau," Data Encryption Standard (DES)" .Notices of the AMS, March (2000).
.
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013
139
Authors
Dr. Shadi R. Masadehreceived a BSc degree in Computer Science and Computer Information
System in 2000 and MSc degree in Information Technology in 2003. with a Thesis titled "A
Mathematical Approach for Ciphering and Deciphering Techniques" After that, I received PhD
from department of Computer Information System in 2009 with a Thesis titled "A New
Embedded Method for Encryption/Decryption Technique Using Self Approach" My research
interests including E-learning Management and Security Issues, Encryption and Decryption Systems.
Networking and Wireless security. Currently, I'm working at ISRA University in Computer Networks
Department as assistant Prof. I have submitted a number of conference papers and journals.
Prof. Bilal Abul-huda received a BSc degree in Mathematicsand computer science SUNY at
Plattsburgh, Plattsburgh, New York, U.S. and M.SC Systems Engineering UPM, Dhahran,
Saudi Arabia. Ph.D. Universityof Ulster at Jordanstown, Northern Ireland, UK His
research interests include WLAN security, learning systems.. He is a full professor at Yarmouk
University, Irbid, Jordan
Dr. Nidal Turab received a BSc degree incommunication engineering from theUniversity of
Garounis, Benghazi, libya 1992 and an MSc in telecommunicationengineering from the
University of Jordan,Amman in 1996. His PhD in computerscience is from the Polytechnic
Universityof Bucharest, 2008. His research interests include WLAN security, computer
network security and cloud computing security.. He is an assistant professor at Isra University,
amman, Jordan

Más contenido relacionado

La actualidad más candente

Most Viewed Article for an year in Academia - International Journal of Distri...
Most Viewed Article for an year in Academia - International Journal of Distri...Most Viewed Article for an year in Academia - International Journal of Distri...
Most Viewed Article for an year in Academia - International Journal of Distri...ijdpsjournal
 
Trusting Smart Speakers: Understanding the Different Levels of Trust between ...
Trusting Smart Speakers: Understanding the Different Levels of Trust between ...Trusting Smart Speakers: Understanding the Different Levels of Trust between ...
Trusting Smart Speakers: Understanding the Different Levels of Trust between ...CSCJournals
 
Requisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSNRequisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSNAM Publications
 
A Novel Security Approach for Communication using IOT
A Novel Security Approach for Communication using IOTA Novel Security Approach for Communication using IOT
A Novel Security Approach for Communication using IOTIJEACS
 
Invisible water marking within media files using state of-the-art technology
Invisible water marking within media files using state of-the-art technologyInvisible water marking within media files using state of-the-art technology
Invisible water marking within media files using state of-the-art technologyIAEME Publication
 
Mobile Device Users’ Susceptibility To Phishing Attacks
Mobile Device Users’ Susceptibility To Phishing AttacksMobile Device Users’ Susceptibility To Phishing Attacks
Mobile Device Users’ Susceptibility To Phishing AttacksAIRCC Publishing Corporation
 
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...IRJET Journal
 
METHODOLOGIES AND CHALLENGES OF WSN FOR IOT
METHODOLOGIES AND CHALLENGES OF WSN FOR IOT METHODOLOGIES AND CHALLENGES OF WSN FOR IOT
METHODOLOGIES AND CHALLENGES OF WSN FOR IOT IAEME Publication
 
IoT Research & Education at LNU
IoT Research & Education at LNUIoT Research & Education at LNU
IoT Research & Education at LNUFrancesco Flammini
 
A Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network SecurityA Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network SecurityUniversitas Pembangunan Panca Budi
 
Securing Cloud Using Fog: A Review
Securing Cloud Using Fog: A ReviewSecuring Cloud Using Fog: A Review
Securing Cloud Using Fog: A ReviewIRJET Journal
 
Fragmentation of Data in Large-Scale System For Ideal Performance and Security
Fragmentation of Data in Large-Scale System For Ideal Performance and SecurityFragmentation of Data in Large-Scale System For Ideal Performance and Security
Fragmentation of Data in Large-Scale System For Ideal Performance and SecurityEditor IJCATR
 
Residential access control system using QR code and the IoT
Residential access control system using QR code and the IoT Residential access control system using QR code and the IoT
Residential access control system using QR code and the IoT IJECEIAES
 

La actualidad más candente (19)

Most Viewed Article for an year in Academia - International Journal of Distri...
Most Viewed Article for an year in Academia - International Journal of Distri...Most Viewed Article for an year in Academia - International Journal of Distri...
Most Viewed Article for an year in Academia - International Journal of Distri...
 
Trusting Smart Speakers: Understanding the Different Levels of Trust between ...
Trusting Smart Speakers: Understanding the Different Levels of Trust between ...Trusting Smart Speakers: Understanding the Different Levels of Trust between ...
Trusting Smart Speakers: Understanding the Different Levels of Trust between ...
 
Notacd02
Notacd02Notacd02
Notacd02
 
INTRODUCTION
INTRODUCTIONINTRODUCTION
INTRODUCTION
 
Requisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSNRequisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSN
 
A Novel Security Approach for Communication using IOT
A Novel Security Approach for Communication using IOTA Novel Security Approach for Communication using IOT
A Novel Security Approach for Communication using IOT
 
Invisible water marking within media files using state of-the-art technology
Invisible water marking within media files using state of-the-art technologyInvisible water marking within media files using state of-the-art technology
Invisible water marking within media files using state of-the-art technology
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Mobile Device Users’ Susceptibility To Phishing Attacks
Mobile Device Users’ Susceptibility To Phishing AttacksMobile Device Users’ Susceptibility To Phishing Attacks
Mobile Device Users’ Susceptibility To Phishing Attacks
 
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
 
Research Challenges in Networked Systems
Research Challenges in Networked SystemsResearch Challenges in Networked Systems
Research Challenges in Networked Systems
 
METHODOLOGIES AND CHALLENGES OF WSN FOR IOT
METHODOLOGIES AND CHALLENGES OF WSN FOR IOT METHODOLOGIES AND CHALLENGES OF WSN FOR IOT
METHODOLOGIES AND CHALLENGES OF WSN FOR IOT
 
IoT Research & Education at LNU
IoT Research & Education at LNUIoT Research & Education at LNU
IoT Research & Education at LNU
 
A Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network SecurityA Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network Security
 
Notacd05
Notacd05Notacd05
Notacd05
 
Securing Cloud Using Fog: A Review
Securing Cloud Using Fog: A ReviewSecuring Cloud Using Fog: A Review
Securing Cloud Using Fog: A Review
 
Fragmentation of Data in Large-Scale System For Ideal Performance and Security
Fragmentation of Data in Large-Scale System For Ideal Performance and SecurityFragmentation of Data in Large-Scale System For Ideal Performance and Security
Fragmentation of Data in Large-Scale System For Ideal Performance and Security
 
Residential access control system using QR code and the IoT
Residential access control system using QR code and the IoT Residential access control system using QR code and the IoT
Residential access control system using QR code and the IoT
 
The internet
The internetThe internet
The internet
 

Destacado

Wormhole attack mitigation in manet a
Wormhole attack mitigation in manet aWormhole attack mitigation in manet a
Wormhole attack mitigation in manet aIJCNCJournal
 
Distributed firewalls and ids interoperability checking based on a formal app...
Distributed firewalls and ids interoperability checking based on a formal app...Distributed firewalls and ids interoperability checking based on a formal app...
Distributed firewalls and ids interoperability checking based on a formal app...IJCNCJournal
 
Infrastructure of services for a smart city
Infrastructure of services for a smart cityInfrastructure of services for a smart city
Infrastructure of services for a smart cityIJCNCJournal
 
A novel algorithm for tcp timeout
A novel algorithm for tcp timeoutA novel algorithm for tcp timeout
A novel algorithm for tcp timeoutIJCNCJournal
 
Concepts and evolution of research in the field of wireless sensor networks
Concepts and evolution of research in the field of wireless sensor networksConcepts and evolution of research in the field of wireless sensor networks
Concepts and evolution of research in the field of wireless sensor networksIJCNCJournal
 
Evaluation of scalability and bandwidth
Evaluation of scalability and bandwidthEvaluation of scalability and bandwidth
Evaluation of scalability and bandwidthIJCNCJournal
 
A method of evaluating effect of qo s degradation on multidimensional qoe of ...
A method of evaluating effect of qo s degradation on multidimensional qoe of ...A method of evaluating effect of qo s degradation on multidimensional qoe of ...
A method of evaluating effect of qo s degradation on multidimensional qoe of ...IJCNCJournal
 
Regressive admission control enabled by real time qos measurements
Regressive admission control enabled by real time qos measurementsRegressive admission control enabled by real time qos measurements
Regressive admission control enabled by real time qos measurementsIJCNCJournal
 
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANETTHE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANETIJCNCJournal
 
AN OPTIMAL FUZZY LOGIC SYSTEM FOR A NONLINEAR DYNAMIC SYSTEM USING A FUZZY BA...
AN OPTIMAL FUZZY LOGIC SYSTEM FOR A NONLINEAR DYNAMIC SYSTEM USING A FUZZY BA...AN OPTIMAL FUZZY LOGIC SYSTEM FOR A NONLINEAR DYNAMIC SYSTEM USING A FUZZY BA...
AN OPTIMAL FUZZY LOGIC SYSTEM FOR A NONLINEAR DYNAMIC SYSTEM USING A FUZZY BA...IJCNCJournal
 
Adhoc mobile wireless network enhancement based on cisco devices
Adhoc mobile wireless network enhancement based on cisco devicesAdhoc mobile wireless network enhancement based on cisco devices
Adhoc mobile wireless network enhancement based on cisco devicesIJCNCJournal
 
COST-EFFICIENT RESIDENTIAL ENERGY MANAGEMENT SCHEME FOR INFORMATION-CENTRIC N...
COST-EFFICIENT RESIDENTIAL ENERGY MANAGEMENT SCHEME FOR INFORMATION-CENTRIC N...COST-EFFICIENT RESIDENTIAL ENERGY MANAGEMENT SCHEME FOR INFORMATION-CENTRIC N...
COST-EFFICIENT RESIDENTIAL ENERGY MANAGEMENT SCHEME FOR INFORMATION-CENTRIC N...IJCNCJournal
 
Multipath qos aware routing protocol
Multipath qos aware routing protocolMultipath qos aware routing protocol
Multipath qos aware routing protocolIJCNCJournal
 
Energy efficient clustering in heterogeneous
Energy efficient clustering in heterogeneousEnergy efficient clustering in heterogeneous
Energy efficient clustering in heterogeneousIJCNCJournal
 
The improvement of end to end delays in network management system using netwo...
The improvement of end to end delays in network management system using netwo...The improvement of end to end delays in network management system using netwo...
The improvement of end to end delays in network management system using netwo...IJCNCJournal
 
Managing, searching, and accessing iot devices
Managing, searching, and accessing iot devicesManaging, searching, and accessing iot devices
Managing, searching, and accessing iot devicesIJCNCJournal
 
Evaluation of a topological distance
Evaluation of a topological distanceEvaluation of a topological distance
Evaluation of a topological distanceIJCNCJournal
 
Performance comparison of coded and uncoded ieee 802.16 d systems under stanf...
Performance comparison of coded and uncoded ieee 802.16 d systems under stanf...Performance comparison of coded and uncoded ieee 802.16 d systems under stanf...
Performance comparison of coded and uncoded ieee 802.16 d systems under stanf...IJCNCJournal
 
Priority scheduling for multipath video transmission in wmsns
Priority scheduling for multipath video transmission in wmsnsPriority scheduling for multipath video transmission in wmsns
Priority scheduling for multipath video transmission in wmsnsIJCNCJournal
 

Destacado (19)

Wormhole attack mitigation in manet a
Wormhole attack mitigation in manet aWormhole attack mitigation in manet a
Wormhole attack mitigation in manet a
 
Distributed firewalls and ids interoperability checking based on a formal app...
Distributed firewalls and ids interoperability checking based on a formal app...Distributed firewalls and ids interoperability checking based on a formal app...
Distributed firewalls and ids interoperability checking based on a formal app...
 
Infrastructure of services for a smart city
Infrastructure of services for a smart cityInfrastructure of services for a smart city
Infrastructure of services for a smart city
 
A novel algorithm for tcp timeout
A novel algorithm for tcp timeoutA novel algorithm for tcp timeout
A novel algorithm for tcp timeout
 
Concepts and evolution of research in the field of wireless sensor networks
Concepts and evolution of research in the field of wireless sensor networksConcepts and evolution of research in the field of wireless sensor networks
Concepts and evolution of research in the field of wireless sensor networks
 
Evaluation of scalability and bandwidth
Evaluation of scalability and bandwidthEvaluation of scalability and bandwidth
Evaluation of scalability and bandwidth
 
A method of evaluating effect of qo s degradation on multidimensional qoe of ...
A method of evaluating effect of qo s degradation on multidimensional qoe of ...A method of evaluating effect of qo s degradation on multidimensional qoe of ...
A method of evaluating effect of qo s degradation on multidimensional qoe of ...
 
Regressive admission control enabled by real time qos measurements
Regressive admission control enabled by real time qos measurementsRegressive admission control enabled by real time qos measurements
Regressive admission control enabled by real time qos measurements
 
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANETTHE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
 
AN OPTIMAL FUZZY LOGIC SYSTEM FOR A NONLINEAR DYNAMIC SYSTEM USING A FUZZY BA...
AN OPTIMAL FUZZY LOGIC SYSTEM FOR A NONLINEAR DYNAMIC SYSTEM USING A FUZZY BA...AN OPTIMAL FUZZY LOGIC SYSTEM FOR A NONLINEAR DYNAMIC SYSTEM USING A FUZZY BA...
AN OPTIMAL FUZZY LOGIC SYSTEM FOR A NONLINEAR DYNAMIC SYSTEM USING A FUZZY BA...
 
Adhoc mobile wireless network enhancement based on cisco devices
Adhoc mobile wireless network enhancement based on cisco devicesAdhoc mobile wireless network enhancement based on cisco devices
Adhoc mobile wireless network enhancement based on cisco devices
 
COST-EFFICIENT RESIDENTIAL ENERGY MANAGEMENT SCHEME FOR INFORMATION-CENTRIC N...
COST-EFFICIENT RESIDENTIAL ENERGY MANAGEMENT SCHEME FOR INFORMATION-CENTRIC N...COST-EFFICIENT RESIDENTIAL ENERGY MANAGEMENT SCHEME FOR INFORMATION-CENTRIC N...
COST-EFFICIENT RESIDENTIAL ENERGY MANAGEMENT SCHEME FOR INFORMATION-CENTRIC N...
 
Multipath qos aware routing protocol
Multipath qos aware routing protocolMultipath qos aware routing protocol
Multipath qos aware routing protocol
 
Energy efficient clustering in heterogeneous
Energy efficient clustering in heterogeneousEnergy efficient clustering in heterogeneous
Energy efficient clustering in heterogeneous
 
The improvement of end to end delays in network management system using netwo...
The improvement of end to end delays in network management system using netwo...The improvement of end to end delays in network management system using netwo...
The improvement of end to end delays in network management system using netwo...
 
Managing, searching, and accessing iot devices
Managing, searching, and accessing iot devicesManaging, searching, and accessing iot devices
Managing, searching, and accessing iot devices
 
Evaluation of a topological distance
Evaluation of a topological distanceEvaluation of a topological distance
Evaluation of a topological distance
 
Performance comparison of coded and uncoded ieee 802.16 d systems under stanf...
Performance comparison of coded and uncoded ieee 802.16 d systems under stanf...Performance comparison of coded and uncoded ieee 802.16 d systems under stanf...
Performance comparison of coded and uncoded ieee 802.16 d systems under stanf...
 
Priority scheduling for multipath video transmission in wmsns
Priority scheduling for multipath video transmission in wmsnsPriority scheduling for multipath video transmission in wmsns
Priority scheduling for multipath video transmission in wmsns
 

Similar a A novel secure e contents system for multi-media interchange workflows in e-learning environments

Securing Sensitive Digital Data in Educational Institutions using Encryption ...
Securing Sensitive Digital Data in Educational Institutions using Encryption ...Securing Sensitive Digital Data in Educational Institutions using Encryption ...
Securing Sensitive Digital Data in Educational Institutions using Encryption ...IJCSIS Research Publications
 
June 2020: Top Read Articles in Advanced Computing
June 2020: Top Read Articles in Advanced ComputingJune 2020: Top Read Articles in Advanced Computing
June 2020: Top Read Articles in Advanced Computingacijjournal
 
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORK
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORKA NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORK
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORKijmnct
 
Secured E-Learning Content on Handheld Device
Secured E-Learning Content on Handheld DeviceSecured E-Learning Content on Handheld Device
Secured E-Learning Content on Handheld DeviceIOSR Journals
 
A novel cloud storage system with support of sensitive data application
A novel cloud storage system with support of sensitive data applicationA novel cloud storage system with support of sensitive data application
A novel cloud storage system with support of sensitive data applicationijmnct
 
Efficient Data Aggregation in Wireless Sensor Networks
Efficient Data Aggregation in Wireless Sensor NetworksEfficient Data Aggregation in Wireless Sensor Networks
Efficient Data Aggregation in Wireless Sensor NetworksIJAEMSJORNAL
 
IJISRT22MAR7471.docx
IJISRT22MAR7471.docxIJISRT22MAR7471.docx
IJISRT22MAR7471.docxballolliemin
 
IRJET- Security from Threats of Computer System
IRJET-  	  Security from Threats of Computer SystemIRJET-  	  Security from Threats of Computer System
IRJET- Security from Threats of Computer SystemIRJET Journal
 
Information security approach in open distributed multi agent virtual learnin...
Information security approach in open distributed multi agent virtual learnin...Information security approach in open distributed multi agent virtual learnin...
Information security approach in open distributed multi agent virtual learnin...ijcsit
 
Types of Networks Week7 Part4-IS RevisionSu2013 .docx
Types of Networks  Week7 Part4-IS RevisionSu2013 .docxTypes of Networks  Week7 Part4-IS RevisionSu2013 .docx
Types of Networks Week7 Part4-IS RevisionSu2013 .docxwillcoxjanay
 
Paper id 25201417
Paper id 25201417Paper id 25201417
Paper id 25201417IJRAT
 
Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...
Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...
Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...IJERA Editor
 
Final_year_project_documentation
Final_year_project_documentationFinal_year_project_documentation
Final_year_project_documentationUshnish Chowdhury
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...IRJET Journal
 
Widget and Smart Devices. A Different Approach for Remote and Virtual labs
Widget and Smart Devices. A Different Approach for Remote and Virtual labsWidget and Smart Devices. A Different Approach for Remote and Virtual labs
Widget and Smart Devices. A Different Approach for Remote and Virtual labsUNED
 
Information Security Management in University Campus Using Cognitive Security
Information Security Management in University Campus Using Cognitive SecurityInformation Security Management in University Campus Using Cognitive Security
Information Security Management in University Campus Using Cognitive SecurityCSCJournals
 

Similar a A novel secure e contents system for multi-media interchange workflows in e-learning environments (20)

Securing Sensitive Digital Data in Educational Institutions using Encryption ...
Securing Sensitive Digital Data in Educational Institutions using Encryption ...Securing Sensitive Digital Data in Educational Institutions using Encryption ...
Securing Sensitive Digital Data in Educational Institutions using Encryption ...
 
June 2020: Top Read Articles in Advanced Computing
June 2020: Top Read Articles in Advanced ComputingJune 2020: Top Read Articles in Advanced Computing
June 2020: Top Read Articles in Advanced Computing
 
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORK
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORKA NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORK
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORK
 
Secured E-Learning Content on Handheld Device
Secured E-Learning Content on Handheld DeviceSecured E-Learning Content on Handheld Device
Secured E-Learning Content on Handheld Device
 
A novel cloud storage system with support of sensitive data application
A novel cloud storage system with support of sensitive data applicationA novel cloud storage system with support of sensitive data application
A novel cloud storage system with support of sensitive data application
 
Efficient Data Aggregation in Wireless Sensor Networks
Efficient Data Aggregation in Wireless Sensor NetworksEfficient Data Aggregation in Wireless Sensor Networks
Efficient Data Aggregation in Wireless Sensor Networks
 
IJISRT22MAR7471.docx
IJISRT22MAR7471.docxIJISRT22MAR7471.docx
IJISRT22MAR7471.docx
 
Network security
Network securityNetwork security
Network security
 
IRJET- Security from Threats of Computer System
IRJET-  	  Security from Threats of Computer SystemIRJET-  	  Security from Threats of Computer System
IRJET- Security from Threats of Computer System
 
Information security approach in open distributed multi agent virtual learnin...
Information security approach in open distributed multi agent virtual learnin...Information security approach in open distributed multi agent virtual learnin...
Information security approach in open distributed multi agent virtual learnin...
 
Types of Networks Week7 Part4-IS RevisionSu2013 .docx
Types of Networks  Week7 Part4-IS RevisionSu2013 .docxTypes of Networks  Week7 Part4-IS RevisionSu2013 .docx
Types of Networks Week7 Part4-IS RevisionSu2013 .docx
 
Ijcatr04061002
Ijcatr04061002Ijcatr04061002
Ijcatr04061002
 
Paper id 25201417
Paper id 25201417Paper id 25201417
Paper id 25201417
 
Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...
Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...
Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...
 
Intrusion detection systems for internet of thing based big data: a review
Intrusion detection systems for internet of thing based big data:  a reviewIntrusion detection systems for internet of thing based big data:  a review
Intrusion detection systems for internet of thing based big data: a review
 
Final_year_project_documentation
Final_year_project_documentationFinal_year_project_documentation
Final_year_project_documentation
 
Ms3422732277
Ms3422732277Ms3422732277
Ms3422732277
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
 
Widget and Smart Devices. A Different Approach for Remote and Virtual labs
Widget and Smart Devices. A Different Approach for Remote and Virtual labsWidget and Smart Devices. A Different Approach for Remote and Virtual labs
Widget and Smart Devices. A Different Approach for Remote and Virtual labs
 
Information Security Management in University Campus Using Cognitive Security
Information Security Management in University Campus Using Cognitive SecurityInformation Security Management in University Campus Using Cognitive Security
Information Security Management in University Campus Using Cognitive Security
 

Más de IJCNCJournal

Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
 
April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficIJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...IJCNCJournal
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...IJCNCJournal
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...IJCNCJournal
 

Más de IJCNCJournal (20)

Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & Communications
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & Communications
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
 

Último

Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 

Último (20)

Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 

A novel secure e contents system for multi-media interchange workflows in e-learning environments

  • 1. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013 DOI : 10.5121/ijcnc.2013.5510 131 A NOVEL SECURE E-CONTENTS SYSTEM FOR MULTI-MEDIA INTERCHANGE WORKFLOWS IN E- LEARNING ENVIRONMENTS Shadi R. Masadeh1 ,Bilal Abul-Huda2 andNidal M. Turab3 1 Dept. of Computer Networks, ISRA University, Amman, Jordan masadeh@ipu.edu.jo 2 Computer Information Systems Dept.,Yarmouk University, Irbid, Jordan abul-huda@yu.edu.jo 3 Department of computer science, ISRA University, Amman, Jordan Nedalturab@ipu.edu.jo ABSTRACT The goal of e-learning is to benefit from the capabilities offered by new information technology (such as remote digital communications, multimedia, internet, cell phones, teleconferences, etc.) and to enhance the security of several government organizations so as to take into considerations almost all the contents of e- learning such as: information content, covering most of citizens or state firms or corporations queries. Content provides a service to provide most if not all basic and business services; content of communicative link provides the citizen and the state agencies together all the time and provides content security for all workers on this network to work in securely environment. Access to information as well is safeguarded. The main objective of this research is to build a novel multi-media security system (encrypting / decrypting system) that will enable E-learning to exchange more secured multi-media data/information. KEYWORDS E-content, E-protection, Encryption and Decryption, Security of E-content, multi-media. 1. INTRODUCTION Many universities have to use wireless networks to provide their academic staff as well as their students with wireless access to facilitate nomadic access to university systems and internet. But all that is broadcasted over the air, so any eavesdropper, with proper equipment can have the access to the information that is transmitted over the air. These Wireless Networks needed to be secured in order to protect the multi-media data and or the multi-media information they transmit over the air between the users and access points, so the designers worked a light weight securing system they called WEP (Wired Equivalent Privacy). The objectives of E-learning project are: first, increase the productivity, efficiency and effectiveness of university institutions. Second, save time and effort in the movement and wait. Third, keep transactions and access to any student from any university institution faster and finally, in this paper we provide content security for all users on this network to work secured environment and access to their information in a safe and secure manner. An example as a current use of wireless networks in educational institutions is the Al-Hussein Bin Talal University (AHU). Al-Hussein Bin Talal University has an E-learning network sponsored by the Computer Center, to provide faculties with a new learning approach that could be
  • 2. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013 132 developed at later stages to provide a portal for professors to access instructional and examinational materials. The ComputerCenter is utilizing a wireless network that connects to some faculties as a pilot project to fathom the efficiency of the project. This imposes security vulnerability in that the network is using conventional wireless protection schemes (WEP, WPA, and WPA-PSK). The main objective of this research paper is to introduce a new encryption system that, in addition to the well known systems, will make it hard for the code crackers to get the data or the information. This system was implemented and tested in AHU. 2. RELATED WORK The history of cryptography dates back to the earliest recorded instances of man. About 1900 BC an Egyptian scribe used non-standard hieroglyphs in an inscription. Kahn lists this as the first documented example of written cryptography (Menezes,Oorschot and Vanstone , 2008). Cryptography is both the lock and the combination (or key) that can be used to help protect your data. There are a variety of cryptographic methods and keys. Together, themethod and the key determine cryptographic security (Menezes,Oorschot and Vanstone , 2008). The advent of computer technologies in both software and hardware necessitated the development of more advanced encryption methods, so the NSA requested the data security organizations to come up with a new encryption system to replace the old DES. In the year 2000 the NIST selected the Rijndael to be the winner and to become the new AES (Advanced Encryption Standard with 128 bit block and 256 bit key). Many versions of the Rijndael system were designed to provide many levels of security ranging from medium to most secured (128 – 256 bits) depending on the level of security needed. The new communication systems are utilizing the AES encryption which includes Microwave Networks, Cellular and Wireless Networks. (Ferguson and Schneier, 2003), (Schneier, 2001). The magic of secrecy enticed enthusiasts into cracking the code in order to see what others are hiding from them, so they devised code breaking techniques, even the new AES has been attacked , and in many cases breakers got the data. The rest of this paper is organized as follows: Related Work is described in Section 2. The Case Study and its Description are discussed in Sections 3 and 4. Current Challenges facing the organization are discussed in section 5. Solutions and Recommendations are showed in section 6. Finally Conclusion and Discussion are drawn in section 7. 3. CASE STUDY In a wireless networks security applications, the system security technique is the process of ensuring that both the stored and transmitted multi-media data and information is secured either during transmitted or afterward. The transmitted multi-media data or information should be encrypted before transmission. The AHU faculty of Information Technology is totally depending on wireless networks. The academic staff has free access to the internet as well as the AHU E-Learning system using a unique usernames and passwords to their accounts. The wireless network system facilitates the academic staff access to the faculty staff and student data-base, the usage of E-Learning systems for updating E-Courses materials, online contact with students and preparing the E-Exams for students. The faculty wireless network consists of an
  • 3. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013 133 application server in the computer center, WEP data security system, access points (4-5 points in each floor) and, portable staff laptops. The systems main disadvantage is sending the pre-shared security key over the air, where anyone can simply 'hack' the system. The new encryption method should be installed in: 1- Computer center application server. 2- Access Points. 3- Academic staff's portable computers. The current wireless E-learning network at the faculty of information technology (FIT) at Al- Hussein Bin Talal University (AHU) is relatively effective in the sense that the faculty is intended to adopt the blended learning techniques at faculty classes. However, from a security point of view, the system has serious problems in the area of secure e-content delivery network connectivity as it is shown in the Figure (1) below. Figure 1: The network setup and the unsecured area of wireless E-Learning network of AHU Faculty of science and Information Technology (FIT). The unsecured connection security issue can be summarized as follows:In the connection between the professor's notebook/laptop and the access point; the connection is encrypted using some widely used encryption systems and transferred over the air. When a hacker accesses the E- learning site/portal, the connection and the transferred multi-media data/information is sent over the air, and could be easily cracked using advanced methods. This means that the multi-media data/information integrity and confidentiality is jeopardized with simple software.
  • 4. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013 134 4. CURRENT CHALLENGES FACING THE ORGANIZATION The main challenges facing the wireless network at the AHU are the security concerns. The wide- spread Access Points (APs) make it difficult to assure the security of system. The wireless system provides the academic staff, employees, and students with a remote access to the faculty students database files, Internetand Online E-Learning courses. The main security issues that must be assured are the Confidentiality, Integrity, and Availability of the system data and resources. Therefore, the new security system must satisfy the following activities: • Checking the ICT application environment for any sever-level vulnerabilities. • Ensuring roles and privilege levels were respected. • Evaluating use of cryptography for multi-media data at rest and in transit. • Validating user input for malicious multi-media data/information that could result in loss of integrity or confidentiality of multi-media data/information. • Anti-automation and end-user protection measures. 5. SOLUTION AND RECOMMENDATIONS As a solution of threats facing the wireless network security using in AHU computer center we introduced a new encryption system for the transferred data/information. In our research we can summarize our proposed system in the following steps: Encryption Side: Step1: Open file for reading digitized multi-media data or information. Step2: Open file for writing ciphered multi-media data or information. Step3: Read multi-media dataset as blocks. Step4: Embedded Watermark into multi-media dataset. Step5: Set 2 arrays to hold plain digitized multi-media data or information text and cipher digitized multi-media data or information text. Step6: Hold input and output bytes or blocks in unmodified format. Step7: Read-in 4 bytes or blocks from digitized multi-media data or information file. Step8: keep reading until end of plain digitized multi-media data or information file. Step9: read in one byte at a time and add it to the plain digitized multi-media data or information file array. Step10: If the number of bytes in the plain digitized multi-media data or information file of array is 4 then encrypt the bytes from 0 to 3 (4 in total) and put them in cipher text array. Step11: Repeat Step10 until end of array. Step12: Write the cipher digitized multi-media data or information file array to encrypted or ciphered file. Step13: Reset buffers P and S.
  • 5. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013 135 Step14: Encrypt the block (64-bit block). Decryption side Step1: Open file for reading ciphered multi-media data text. Step2: Open file for writing plain digitized multi-media data text. Step3: reset the byte counter and start reading 4 bytes into ciphered digitized multi-media data array. Step4: Repeat Step3 until end of ciphered multi-media data text file. Step5: decrypt the bytes from 0 to 3 (4 in total) and put them in plain digitized multi-media data of array. Step6: Read-in 4 bytes from decrypted file. Step7: If the number of bytes in the ciphered digitized multi-media data array is 4 then decrypt the bytes from 0 to 3 (4 in total) and put them in digitized multi-media data array. Step8: Repeat Step 7 until end of array. Step9: Decrypt the block (64-bit block). Step10: Extract Watermark from multi-media dataset. Step11: Show multi-media dataset. 5.1 Proposed Encryption Algorithm The following modified algorithm is used to explain our approach as follows: 1. Open file fpin for reading plain digitized multi-media data or information text 2. Open file fpout for writing ciphered multi-media data cipher text 3. Read dataset as blocks. 4. Embedded Watermark into dataset as shown above section 4. 5. set 2 arrays to hold plain digitized multi-media data or information text and ciphered multi-media data text using calloc function 6. unsigned int p[4],s[4]; /* to hold input and output bytes in unmodified format */ 7. Read-in 4 bytes from file 1 into array and keep reading until end of plain digitized multi- media data or information file. 8. while (!feof(fpin)){ /* since we don't know the size of input file */ 9. ch=getc(fpin); /*read in one byte at a time */ 10. P[i++]=ch; /* add it to the cipher digitized multi-media data or information file plain text array */ 11. If (i>3){ /* if the number of bytes in the cipher digitized multi-media data or information file plain text array is 4 then */ 12. S[0]=(encrypt(p[3] using public key Bi[0]); /* encrypt the bytes from 0 to 3 (4 in total) and put them in cipher text array */ 13. s[1]=( encrypt(p[2] using public key Bi[1]);
  • 6. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013 136 14. s[2]=( encrypt(p[1] using public key Bi[2]); 15. s[3]=( encrypt(p[0] using public key Bi[3]); 16. putc(s[2],fpout); /* write the ciphered digitized multi-media data cipher text array to output file (encrypted file ) */ 17. putc(s[0],fpout); 18. putc(s[3],fpout); 19. putc(s[1],fpout); 20. I=0; /* reset the byte counter and start reading 4 bytes into digitized multi-media data plain text array 21. reset buffers P and S using calloc function 22. } /* end of bytes reading loop */ 23. if I > 0 /* there is more input to process digitized multi-media data array (plain text ) 24. } /* end of while loop, at the end of input file digitized multi-media data array (plain text file ) */ 25. Encrypt the block ( 64-bit block) 5.2 Proposed Decryption Algorithm The proposed decrypting algorithm is depicted as follows: 1. Open file fpin for reading ciphered digitized multi-media data text. 2. Open file fpout for writing digitized multi-media data of plain text. 3. set 2 arrays to hold digitized multi-media data of plain text and ciphered digitized multi- media data of cipher text using calloc function 4. unsigned int p[4],s[4]; /* to hold input and output bytes in unmodified format */ 5. Read-in 4 bytes from file 1 into array and keep reading until end of ciphered digitized multi-media data of cipher text file 6. while (!feof(fpin)){ /* since we don't know the size of input file */ 7. ch=getc(fpin); /* read in one byte at a time */ 8. p[i++]=ch; /* add it to the ciphered digitized multi-media data cipher text array */ 9. if (i>3){ /* if the number of bytes in the ciphered digitized multi-media data cipher text array is 4 then */ 10. s[0]=(decrypt(p[3] using private key Bi[0])); /* decrypt the bytes from 0 to 3 (4 in total) and put them in digitized multi-media data plain text array */ 11. s[1]=( decrypt(p[2] using private key Bi[1])); 12. s[2]=( decrypt(p[1] using private key Bi[2])); 13. s[3]=( decrypt(p[0] using private key Bi[3])); 14. putc(s[2],fpout); /* write the digitized multi-media data plain text array to output file (decrypted file ) */ 15. putc(s[0],fpout);
  • 7. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013 137 16. putc(s[3],fpout); 17. putc(s[1],fpout); 18. I=0; /* reset the byte counter and start reading 4 bytes into ciphered digitized multi-media data cipher text array 19. reset buffers P and S using calloc function 20. } /* end of bytes reading loop */ 21. if I > 0 /* there is more input to process ciphered digitized multi-media data cipher text . 22. } /* end of while loop, at the end of input file ciphered digitized multi-media data array (cipher text file ) */ 23.Decrypt the block ( 64-bit block) 24.Extract Watermark from multi-media dataset. 25.Show multi-media dataset 6. CONCLUSION AND DISCUSSION Through the compilation of all university activities and information services, interactive and reciprocity in one location on the web site is the official university web site from which to do the following: 1. Linking the average various organs of the university for all of the university services, and computerized automatically to anywhere in the world and safely. 2. Completion of the university to the adoption of the various activities of information and communication networks remotely. 3. The idea of E-learning basis to take advantage of all the possibilities offered by information technology (such as digital communications, multimedia, internet, cell phones, teleconferences, etc.) and to improve the performance of various government institutions so as to include all the contents of E-government such as: 1. Information content, covering most if not all queries of faculty members, students or state firms or enterprises. 2. Content provides a service to most if not all basic services and business services. 3. Content of communication link provides citizens and the state agencies together almost all of the time. 4. Provides content security for all workers on this network to work securely and access information in safeguarded environment. Possible limitations of our algorithm are the CPU computation time and the power consumption. These limitations can be considered as a future work. In this paper we propose a novel multi-media security system (encrypting / decrypting system) that will enable E-learning to exchange more secured multi-media data/information.
  • 8. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013 138 ACKNOWLEDGEMENTS The authors are grateful to the Al- Isra University, Jordan, for the Full Financial support granted to this research project. REFERENCES [1] I. Fluhrer, S.Mantin, I.Shamir, "Weaknesses in the Key Scheduling Algorithm of RC4",( 2001). [2] B. Schneier, “Cryptography, Security, and the Future,” Communications of the ACM, v. 40, n. 1, 1997 p. 138. http://en.wekipedia.org/wiki/automation. [3] N.Ferguson , B.Schneier," Practical Cryptography". New York: J. Wiley & Sons, (2003). [4] A. Menezes, P. van Oorschot and S. Vanstone ," Handbook of Applied Cryptography", / ajmeneze at uwaterloo.ca / last updated (2008). [5] B. Schneier, “Cryptography, Security, and the Future,” Communications of the ACM, v. 40, n. 1, 1997 p. 138. http://en.wekipedia.org/wiki/automation. [6] R. Steve Edmonson, "Data Encryption and Cryptography, Investment and Governance Division Ohio Office of Information Technology", (2007). [7] V. Tselkov, N. Stoianov, "A Model of Software Cryptography System for Data Protection in Distribution Information Systems", (2003), www.dataprotection2003.info/speakers/Veselin_Tselkov/presentation.pdf. [8] B. Schneier, “Key Length And Security.” Crypto-Gram , (2001). http://www.counterpane.com/crypto-gram-910.html#KeyLengthandSecurity [9] Wi-Fi Alliance. “Wi-Fi Protected Access (WPA)”, Version 2.0,( 2003). [10] Wi-Fi Alliance. “Securing Wi-Fi Wireless Networks with today technologies”, ( 2003).. [11] A. Schneier and J. Kelsey, "Unbalanced Feistel Networks and Block Cipher Design," Fast Software Encryption, Third International Workshop Proceedings, 1996. ,Springer-Verlag, pp. 121-144, (1996). [12] M. Wiener. ``Efficient DES Key Search'', presented at the Rump session of Crypto '93. Reprinted in Practical Cryptography for Data Internetworks", W. Stallings, editor, IEEE Computer Society Press, pp. 31-79 (1996). [13] S. Landau," Data Encryption Standard (DES)" .Notices of the AMS, March (2000). .
  • 9. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013 139 Authors Dr. Shadi R. Masadehreceived a BSc degree in Computer Science and Computer Information System in 2000 and MSc degree in Information Technology in 2003. with a Thesis titled "A Mathematical Approach for Ciphering and Deciphering Techniques" After that, I received PhD from department of Computer Information System in 2009 with a Thesis titled "A New Embedded Method for Encryption/Decryption Technique Using Self Approach" My research interests including E-learning Management and Security Issues, Encryption and Decryption Systems. Networking and Wireless security. Currently, I'm working at ISRA University in Computer Networks Department as assistant Prof. I have submitted a number of conference papers and journals. Prof. Bilal Abul-huda received a BSc degree in Mathematicsand computer science SUNY at Plattsburgh, Plattsburgh, New York, U.S. and M.SC Systems Engineering UPM, Dhahran, Saudi Arabia. Ph.D. Universityof Ulster at Jordanstown, Northern Ireland, UK His research interests include WLAN security, learning systems.. He is a full professor at Yarmouk University, Irbid, Jordan Dr. Nidal Turab received a BSc degree incommunication engineering from theUniversity of Garounis, Benghazi, libya 1992 and an MSc in telecommunicationengineering from the University of Jordan,Amman in 1996. His PhD in computerscience is from the Polytechnic Universityof Bucharest, 2008. His research interests include WLAN security, computer network security and cloud computing security.. He is an assistant professor at Isra University, amman, Jordan