Providing data integrity for container dwelling time in the seaport

Data integrity is a fundamental component of information security and as a process, data integrity verifies the data has remained unaltered in transit from creation to reception. Container dwelling time data in the seaport is used in this research which provide detailed information about the length of time the presence of container in the seaport. Data integrity is the main concern to ensure the dwelling time data is still original from the sender without any modification from attacker during stored in the cloud storage. Digital signature with using hashing algorithm SHA-256 is implemented to provide data integrity of dwelling time data. Digital signature needs a pair key (public and secret key) which is derived from RSA algorithm. The keys length used to encrypt and decrypt the dwelling time data are 1.024 bits, 2.048 bits and 3.072 bits. Experimental results verified that proposed method gave a real disparity between the data intact and data changed by the attacker. Although the attacker simply changed only one character of the data, the value of message digest will be totally changed, then the officers easily to decide if the data has been modified by the attacker. The approach used is strongly recommended to be applied to provide at the seaport with 100% effectiveness to provide data integrity of the dwelling time.

[1]  Joseph K. Liu,et al.  A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing , 2015, Future Gener. Comput. Syst..

[2]  Paulo S. L. M. Barreto,et al.  Shorter hash-based signatures , 2016, J. Syst. Softw..

[3]  Bruce Schneier,et al.  Cryptography Engineering - Design Principles and Practical Applications , 2010 .

[4]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[5]  Chin-Chen Chang,et al.  Security enhancement for digital signature schemes with fault tolerance in RSA , 2007, Inf. Sci..

[6]  Bayu Adhi Tama,et al.  Performance Analysis of Multiple Classifier System in DoS Attack Detection , 2015, WISA.

[7]  P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .

[8]  Lucia Moura,et al.  Locating modifications in signed data for partial data integrity , 2015, Inf. Process. Lett..

[9]  Burton Rosenberg,et al.  Handbook of Financial Cryptography and Security , 2010 .

[11]  Jinjun Chen,et al.  External integrity verification for outsourced big data in cloud and IoT: A big picture , 2015, Future Gener. Comput. Syst..

[12]  Filip Merckx,et al.  The issue of dwell time charges to optimize container terminal capacity , 2005 .

[13]  Paris Kitsos,et al.  An efficient implementation of the digital signature algorithm , 2002, 9th International Conference on Electronics, Circuits and Systems.

[14]  Alexander A. Hernandez,et al.  Symmetric Cryptosystem Based on Data Encryption Standard Integrating HMAC and Digital Signature Scheme Implemented in Multi-cast Messenger Application , 2009, 2009 Second International Conference on Computer and Electrical Engineering.

[15]  P. Varalakshmi,et al.  An Enhanced and Secured RSA Key Generation Scheme (ESRKGS) , 2015, J. Inf. Secur. Appl..