[vc_empty_space][vc_empty_space]
Providing data integrity for container dwelling time in the seaport
Rahmadika S.a,b, Rusmin P.H.b, Hindersah H.b, Rhee K.H.a
a Dept. of IT Convergence and Application Engineering, Pukyong National University, South Korea
b School of Electrical Engineering and Informatics, Bandung Institute of Technology, Indonesia
[vc_row][vc_column][vc_row_inner][vc_column_inner][vc_separator css=”.vc_custom_1624529070653{padding-top: 30px !important;padding-bottom: 30px !important;}”][/vc_column_inner][/vc_row_inner][vc_row_inner layout=”boxed”][vc_column_inner width=”3/4″ css=”.vc_custom_1624695412187{border-right-width: 1px !important;border-right-color: #dddddd !important;border-right-style: solid !important;border-radius: 1px !important;}”][vc_empty_space][megatron_heading title=”Abstract” size=”size-sm” text_align=”text-left”][vc_column_text]© 2016 IEEE.Data integrity is a fundamental component of information security and as a process, data integrity verifies the data has remained unaltered in transit from creation to reception. Container dwelling time data in the seaport is used in this research which provide detailed information about the length of time the presence of container in the seaport. Data integrity is the main concern to ensure the dwelling time data is still original from the sender without any modification from attacker during stored in the cloud storage. Digital signature with using hashing algorithm SHA-256 is implemented to provide data integrity of dwelling time data. Digital signature needs a pair key (public and secret key) which is derived from RSA algorithm. The keys length used to encrypt and decrypt the dwelling time data are 1.024 bits, 2.048 bits and 3.072 bits. Experimental results verified that proposed method gave a real disparity between the data intact and data changed by the attacker. Although the attacker simply changed only one character of the data, the value of message digest will be totally changed, then the officers easily to decide if the data has been modified by the attacker. The approach used is strongly recommended to be applied to provide at the seaport with 100% effectiveness to provide data integrity of the dwelling time.[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Author keywords” size=”size-sm” text_align=”text-left”][vc_column_text]Cloud storages,Data integrity,Dwelling time,Fundamental component,Hashing algorithms,Message digests,RSA algorithms,Sha-256[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Indexed keywords” size=”size-sm” text_align=”text-left”][vc_column_text]cloud storage,Data integrity,digital signature,dwelling time,SHA-256[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Funding details” size=”size-sm” text_align=”text-left”][vc_column_text][/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”DOI” size=”size-sm” text_align=”text-left”][vc_column_text]https://doi.org/10.1109/INAES.2016.7821921[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/4″][vc_column_text]Widget Plumx[/vc_column_text][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row][vc_column][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][/vc_column][/vc_row]