Felix Bentil - Academia.edu (original) (raw)
Papers by Felix Bentil
This article uncovers a significant security flaw known as Insecure Direct Object Reference (IDOR... more This article uncovers a significant security flaw known as Insecure Direct Object Reference (IDOR) found in an online academic publishing platform. The flaw allows unauthorized access to sensitive information, including the status of submitted documents, acceptance letters, payment details and author certificates. Through a detailed case study, we examine the discovery of this vulnerability, its potential consequences, and ethical considerations associated with its disclosure. We also provide recommendations for improving the security of academic and other online platforms to prevent similar issues.
International journal of engineering research and technology, May 25, 2021
If all of the top levels of security fail, the final and most critical tier, data security, must ... more If all of the top levels of security fail, the final and most critical tier, data security, must not fail [1]. By breaching this layer of defence, the CIA's triad principles of confidentiality, integrity, and availability are undermined. However, increasing security reduces the performance of the system and usability. This paper addresses the fundamentals of cloud computing as well as its key challenge: security. This paper examines a variety of cryptographic methods used by major cloud providers. It proposes an alternative algorithm for encrypting data in transit from the user to the cloud in order to ensure data security and defend against Man-in-the-Middle (MitM) attacks like sniffing. The paper concludes by urging further study into the proposed cryptography algorithm in order to ensure data protection and privacy in all three data states.
Journal of emerging technologies and innovative research, May 1, 2021
International journal of engineering research and technology, May 25, 2021
When all the top layers of security fail, the last and most important layer which is data securit... more When all the top layers of security fail, the last and most important layer which is data security layer must not fail. Breaching this layer of security compromises the CIA triad principle of confidentiality, integrity and availability. However, increasing security also reduces the efficiency and usability of a system. This paper discusses the basics of cloud computing, and its main challenge; security. This paper's main focus is on the security challenges of cloud computing and examines various cryptographic techniques implemented by giant cloud providers and proposes an algorithm to encrypt data in transit from the user to the cloud to ensure data security to guard against data breach by Man-in-the-Middle (MitM) attacks like sniffing. The paper concludes by suggesting more works that is to be done on the proposed cryptography algorithm to ensure data security and protection in all the three various states of data.
Cloud computing is a service-oriented architecture that offers a high level of flexibility and on... more Cloud computing is a service-oriented architecture that offers a high level of flexibility and on-demand selfservice, powered by existing technologies like virtualization and the internet. Open source software (OSS) is a type of computer software in which the source code is made publicly available under a license that allows users to review, modify, and distribute [1]. Open Source Cloud Computing is, therefore, any cloud solution developed with open-source software. This paper examines current trends in cloud computing and open-source software and serves as a road map for future research. This research aims to provide a detailed overview of the two open cloud computing solutions, Xen Cloud Platform (XCP) and OpenStack. KeywordsCloud Computing, Open Source Software, Virtualization, Xen Cloud Platform, OpenStack
This article uncovers a significant security flaw known as Insecure Direct Object Reference (IDOR... more This article uncovers a significant security flaw known as Insecure Direct Object Reference (IDOR) found in an online academic publishing platform. The flaw allows unauthorized access to sensitive information, including the status of submitted documents, acceptance letters, payment details and author certificates. Through a detailed case study, we examine the discovery of this vulnerability, its potential consequences, and ethical considerations associated with its disclosure. We also provide recommendations for improving the security of academic and other online platforms to prevent similar issues.
International journal of engineering research and technology, May 25, 2021
If all of the top levels of security fail, the final and most critical tier, data security, must ... more If all of the top levels of security fail, the final and most critical tier, data security, must not fail [1]. By breaching this layer of defence, the CIA's triad principles of confidentiality, integrity, and availability are undermined. However, increasing security reduces the performance of the system and usability. This paper addresses the fundamentals of cloud computing as well as its key challenge: security. This paper examines a variety of cryptographic methods used by major cloud providers. It proposes an alternative algorithm for encrypting data in transit from the user to the cloud in order to ensure data security and defend against Man-in-the-Middle (MitM) attacks like sniffing. The paper concludes by urging further study into the proposed cryptography algorithm in order to ensure data protection and privacy in all three data states.
Journal of emerging technologies and innovative research, May 1, 2021
International journal of engineering research and technology, May 25, 2021
When all the top layers of security fail, the last and most important layer which is data securit... more When all the top layers of security fail, the last and most important layer which is data security layer must not fail. Breaching this layer of security compromises the CIA triad principle of confidentiality, integrity and availability. However, increasing security also reduces the efficiency and usability of a system. This paper discusses the basics of cloud computing, and its main challenge; security. This paper's main focus is on the security challenges of cloud computing and examines various cryptographic techniques implemented by giant cloud providers and proposes an algorithm to encrypt data in transit from the user to the cloud to ensure data security to guard against data breach by Man-in-the-Middle (MitM) attacks like sniffing. The paper concludes by suggesting more works that is to be done on the proposed cryptography algorithm to ensure data security and protection in all the three various states of data.
Cloud computing is a service-oriented architecture that offers a high level of flexibility and on... more Cloud computing is a service-oriented architecture that offers a high level of flexibility and on-demand selfservice, powered by existing technologies like virtualization and the internet. Open source software (OSS) is a type of computer software in which the source code is made publicly available under a license that allows users to review, modify, and distribute [1]. Open Source Cloud Computing is, therefore, any cloud solution developed with open-source software. This paper examines current trends in cloud computing and open-source software and serves as a road map for future research. This research aims to provide a detailed overview of the two open cloud computing solutions, Xen Cloud Platform (XCP) and OpenStack. KeywordsCloud Computing, Open Source Software, Virtualization, Xen Cloud Platform, OpenStack