Data transmission channel protection organization in client-server software architecture

D. Krykunov, postgraduate student
Cherkasy State Technological University
460 Shevchenko Blvd., Cherkasy, 18006, Ukraine
This email address is being protected from spambots. You need JavaScript enabled to view it.

Èlektron. model. 2023, 45(3):92-103

https://doi.org/10.15407/emodel.45.03.092

ABSTRACT

The study is devoted to the organization of data transmission channel protection in software with a client-server architecture. In today's information environment, where data exchange takes place over the network, ensuring security becomes a critical task. The effectiveness of the data channel protection method in a client-server architecture program was developed and evaluated. A method has been developed that ensures encryption of messages from interception and data modification and prevents modification of the client software and abuse during its use.

KEYWORDS

Software security, encryption, client-server architecture, secure tunnel, cryptographic protection.

REFERENCES

  1. Teng, L., Li, H., Yin, S., & Sun, Y. (2020). A Modified Advanced Encryption Standard for Data Security. International Journal of Network Security, 22, 112-117. http:// jalaxy.com.tw/contents/ijns-v22-n1/ijns-2020-v22-n1-p112-117.pdf
  2. Koç, Ç. K., Özdemir, F., & Ödemiş Özger, Z. (2021). Rivest-Shamir-Adleman Algorithm. Partially Homomorphic Encryption, 37–41.
    https://doi.org/10.1007/978-3-030-87629-6_3
  3. Baek, J., Kim, J., & Susilo, W. (2020). Inspecting TLS Anytime Anywhere: A New Approach to TLS Interception. ACM Asia Conference on Computer and Communications Security, 116–126.
    https://doi.org/10.1145/3320269.3372199
  4. Mundhenk, P., Paverd, A., Mrowca, A., Steinhorst, S., Lukasiewycz, M., Fahmy, S. A., & Chakraborty, S. (2017). Security in Automotive Networks: Lightweight Authentication and Authorization. ACM Transactions on Design Automation of Electronic Systems, 22, 1-27. 
    https://doi.org/10.1145/2960407
  5. Jingyao, S., Chandel, S., Yunnan, Y., Jingji, Z., & Zhipeng, Z. (2019). Securing a Network: How Effective Using Firewalls and VPNs Are. Future of Information and Communication Conference, 1050-1068. 
    https://doi.org/10.1007/978-3-030-12385-7_71
  6. Zhao, W., Shi, R., Shi, J., Huang, P., Guo, Y., & Huang, D. (2021). Multibit quantum digital signature with continuous variables using basis encoding over insecure channels. Physical Review A, 103.
    https://doi.org/10.1103/PhysRevA.103.012410
  7. Ezra, P. J., Misra, S., Agrawal, A., Oluranti, J., Maskeliunas, R., & Damasevicius, R. (2021). Secured Communication Using Virtual Private Network (VPN). Cyber Security and Digital Forensics, 309-319. 
    https://doi.org/10.1007/978-981-16-3961-6_27
  8. Gasti, P., Tsudik, G., Uzun, E., & Zhang, L. (2013). DoS and DDoS in Named Data Networking. International Conference on Computer Communications and Networks (ICCCN), 1-7. 
    https://doi.org/10.1109/ICCCN.2013.6614127
  9. Lau, P. T. (2018). Scan Code Injection Flaws in HTML5-Based Mobile Applications. IEEE International Conference on Software Testing Verification and Validation Workshop (ICSTW), 81-88. 
    https://doi.org/10.1109/ICSTW.2018.00032

Full text: PDF