CFP last date
20 January 2025
Reseach Article

Customized Data Exchange Gateway (DEG) for Automated File Exchange across Networks

by Abhishek Vora, B. Lakshmi, C. V. Srinivas
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 52 - Number 8
Year of Publication: 2012
Authors: Abhishek Vora, B. Lakshmi, C. V. Srinivas
10.5120/8224-1661

Abhishek Vora, B. Lakshmi, C. V. Srinivas . Customized Data Exchange Gateway (DEG) for Automated File Exchange across Networks. International Journal of Computer Applications. 52, 8 ( August 2012), 34-38. DOI=10.5120/8224-1661

@article{ 10.5120/8224-1661,
author = { Abhishek Vora, B. Lakshmi, C. V. Srinivas },
title = { Customized Data Exchange Gateway (DEG) for Automated File Exchange across Networks },
journal = { International Journal of Computer Applications },
issue_date = { August 2012 },
volume = { 52 },
number = { 8 },
month = { August },
year = { 2012 },
issn = { 0975-8887 },
pages = { 34-38 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume52/number8/8224-1661/ },
doi = { 10.5120/8224-1661 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:51:46.168644+05:30
%A Abhishek Vora
%A B. Lakshmi
%A C. V. Srinivas
%T Customized Data Exchange Gateway (DEG) for Automated File Exchange across Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 52
%N 8
%P 34-38
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper addresses a customized solution to ensure security of the trusted network while receiving files from applications residing on less trusted networks. The solution is a four layered secured file transfer service which controls and authenticates the data transfer through service blocking mechanism and digital signatures at the first two levels and by introducing a novel concept of privileged socket creation and finger printing TCP packets at layer three and four by customizing the Linux kernel. The solution is deployed using a pair of systems connected peer to peer running customized Linux kernels and the solution will ensure that the first system on the gateway accepts only authentic data and transfers to second system which accepts the data only when it originates from the first system. The link between the two systems and the systems as such are physically protected. Data is received only from the first system. In this paper we explain its security architecture and discuss implementation on Linux kernel 2. 6. 24. 2

References
  1. Linux Kernel Version 0. 8-3, David A Rusling
  2. Introduction to TCP/IP Network Attacks, Guang Yang
  3. TCP/IP Architecture, Design and Implementation in Linux (Practitioners) Sameer Seth and M. Ajaykumar Venkatesulu
  4. Martin A. Brown, "Guide to IP Layer Network Administration with Linux V 0. 4. 5", Ch-7 March 2007 Available: http://linux-ip. net/html/ch-packetfilter. html
  5. Gianluca Insolvibile, "Inside the Linux Packet Filter", Feb 2002 Available www. linuxjournal. com/article/4852
  6. William Stallings, "Cryptography and Network Security: Principles & Practice" 5th edition, Pearson ch 6, 11, 13, 19. pp. 192-218, 327-362, 395-407, 615-647
  7. Shari Lawrence Pfleeger and Charles P. Pfleeger, "Security in Computing" 4rd edition, Prentice Hall PTR, Oct 2006 Ch- 2, 7
  8. M. Tim Jones, "Anatomy of Linux Network Stack", June 2007, Available: http://www. ibm. com/developerworks/linux/library/llinux-networking-stack/
  9. Arnout Vandecappelle and Mind, "Kernel Flow", Nov 2009, Available: http://www. linuxfoundation. org/collaborate/workgroups/networking/kernel_flow
  10. Chrisitan Benvenati, "Understanding Linux Network Internals", O'Reilly Dec 2005. Ch-18, 19, 20, 21
  11. M. Tim Jones, "Kernel Command Using Linux System Call", Feb 2010, Available: http://www. ibm. com/developerworks/linux/library/lsystem-calls/
Index Terms

Computer Science
Information Sciences

Keywords

Network Security Secured automated file exchange Kernel hardening