Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Data Security in System Socket Layer


Affiliations
1 Department of Computer Applications, Pioneer College of Arts and Science, Jothipuram, India
     

   Subscribe/Renew Journal


In a nutshell, Ambient Computational Environments is the integration of computational resources into a robust, secure, and pervasive network where users can easily access and co-opt devices, services, and applications via spoken, graphical, or gesture commands. ACE is ubiquitous and accessing information and computational processing power is easy and fast, independent of the user’s location within the environment.An Ambient Computational Environment (ACE) is a set of Devices and services that allow any user to operate in the Environment without the usage of too many cumbersome devices attached to the users person. Security in such an infrastructure is a must for apparent reasons. This paper addresses the design and implementation issues related to securing an ACE, namely identification of a user and a service in the ACE and ensuring proper encrypted communications between users and services alike. A limited form of Public Key Infrastructure has been put in place in the ACE. The simulation results reveal that the proposed Authentication and secure communication is one of the best alternative in the ACE Infrastructure.

Keywords

Ambient Computational Environment (ACE), Host Resource Monitor (HRM's), Remote Connection Manager (RCM).
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 160

PDF Views: 4




  • Data Security in System Socket Layer

Abstract Views: 160  |  PDF Views: 4

Authors

K. Aiswarya
Department of Computer Applications, Pioneer College of Arts and Science, Jothipuram, India
C. Bhuvaneswari
Department of Computer Applications, Pioneer College of Arts and Science, Jothipuram, India
R. Sowmiya
Department of Computer Applications, Pioneer College of Arts and Science, Jothipuram, India

Abstract


In a nutshell, Ambient Computational Environments is the integration of computational resources into a robust, secure, and pervasive network where users can easily access and co-opt devices, services, and applications via spoken, graphical, or gesture commands. ACE is ubiquitous and accessing information and computational processing power is easy and fast, independent of the user’s location within the environment.An Ambient Computational Environment (ACE) is a set of Devices and services that allow any user to operate in the Environment without the usage of too many cumbersome devices attached to the users person. Security in such an infrastructure is a must for apparent reasons. This paper addresses the design and implementation issues related to securing an ACE, namely identification of a user and a service in the ACE and ensuring proper encrypted communications between users and services alike. A limited form of Public Key Infrastructure has been put in place in the ACE. The simulation results reveal that the proposed Authentication and secure communication is one of the best alternative in the ACE Infrastructure.

Keywords


Ambient Computational Environment (ACE), Host Resource Monitor (HRM's), Remote Connection Manager (RCM).