Dynamic Virtual Private Network
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
computer science crazy
Super Moderator
******

Posts: 3,048
Joined: Dec 2008
#1
22-09-2008, 09:50 AM


Definition
Based on internet technology, intranets are becoming an essential part of corporate information systems today. However, internets were not originally designed with businesses in mind. It lacks the technology required for secure business transactions and communications. A challenge therefore arises for businesses with intranet, i.e. how to establish and maintain trust in an environment which was originally designed for open access to information. More specifically, a way has to be found to secure an intranet without impinging on its inherent benefits of flexibility, interoperability and ease of use.

Unlike traditional VPNs that offer limited or inflexible security, a dynamic VPN provide both high levels of security and, equally important, the flexibility to accommodate dynamically changing groups of users and information needs. Our dynamic VPN can provide this flexibility based on a unique agent-based architecture as well as other features.

Because information can now be made available in such a flexible and fine-grained fashion, a company's files, documents or data that had to locked in the past can now be accessed in either whole or in part to carefully selected groups of users in precisely determined ways. As a result, a dynamic VPN is an intranet enabler. It enables an intranet to offer more services and services than it could otherwise, thereby allowing the business to make more use of its information resources.

In order to accommodate new, changing and expanding groups of users and provide these users with information in a number of ways, intranets should deliver several benefits, including flexibility, interoperability, ease of use and extendibility. In particular, they should be open and and standards based, so information can be read by different users with different applications on different platforms.

However, the benefits promised by intranets lead to an important challenge for businesses using this technology: how to establish and maintain trust in an environment which was designed originally for free and open access to information. The Internet was not designed with business security in mind. It was designed by universities as an open network where users could access, share and add to information as early as possible. A way has to be found to secure an intranet for businesses without impinging on the intranet's inherent benefits of flexibility interoperability and ease of use. Indeed, an ideal solution must also provide not only the highest levels of security but also security in such a way that users can easily access, modify and share more information, not less, under carefully controlled and maintained conditions.

The most appropriate and successful answer to this challenge will be a DYNAMIC VIRTUAL PRIVATE NETWORK. Unlike traditional VPNs that offer limited or inflexible security, a dynamic VPN provides both extremely high levels of security and, equally important, the flexibility to accommodate dynamically changing groups of users and information needs.

A dynamic VPN is actually an intranet enabler. It enables an intranet to offer more resources and services than it could otherwise, thereby allowing the business to make more use of its information resources.




Major Drawbacks Of VPN
The single major problem on the road to VPN is network security. Because VPN is connected to a public network. , the internet, it is prone to be hacked. Though all networks have some basic security that prevents such access they are often insufficient. The main threat is to the data that is transmitted through the internet. Then the user at this has to be sure that the person at the other is really the person who he claims to be. This protects data through a combination of encryption, host authentication and protocol tunneling. The commonly used basic protecting data is encryption. This involves scrambling the data using an algorithm so that even if the transmitted data is tapped, it cannot be decoded without the correct key
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply
seminar class
Active In SP
**

Posts: 5,361
Joined: Feb 2011
#2
19-04-2011, 11:19 AM


.doc   DVPN(DYNAMIC VIRTUAL PRIVATE NETWORK).doc (Size: 125 KB / Downloads: 51)
ABSTRACT
Based on internet technology, intranets are becoming an essential part of corporate information systems today. However, internets were not originally designed with businesses in mind. It lacks the technology required for secure business transactions and communications. A challenge therefore arises for businesses with intranet, i.e. how to establish and maintain trust in an environment which was originally designed for open access to information. More specifically, a way has to be found to secure an intranet without impinging on its inherent benefits of flexibility, interoperability and ease of use.
Unlike traditional VPNs that offer limited or inflexible security, a dynamic VPN provide both high levels of security and, equally important, the flexibility to accommodate dynamically changing groups of users and information needs. Our dynamic VPN can provide this flexibility based on a unique agent-based architecture as well as other features.
Because information can now be made available in such a flexible and fine-grained fashion, a company’s files, documents or data that had to locked in the past can now be accessed in either whole or in part to carefully selected groups of users in precisely determined ways. As a result, a dynamic VPN is an intranet enabler. It enables an intranet to offer more services and services than it could otherwise, thereby allowing the business to make more use of its information resources.
Chapter-1
Introduction to Topic

In order to accommodate new, changing and expanding groups of users and provide these users with information in a number of ways, intranets should deliver several benefits, including flexibility, interoperability, ease of use and extendibility. In particular, they should be open and and standards based, so information can be read by different users with different applications on different platforms.
However, the benefits promised by intranets lead to an important challenge for businesses using this technology: how to establish and maintain trust in an environment which was designed originally for free and open access to information. The Internet was not designed with business security in mind. It was designed by universities as an open network where users could access, share and add to information as early as possible. A way has to be found to secure an intranet for businesses without impinging on the intranet’s inherent benefits of flexibility interoperability and ease of use. Indeed, an ideal solution must also provide not only the highest levels of security but also security in such a way that users can easily access, modify and share more information, not less, under carefully controlled and maintained conditions.
The most appropriate and successful answer to this challenge will be a DYNAMIC VIRTUAL PRIVATE NETWORK. Unlike traditional VPNs that offer limited or inflexible security, a dynamic VPN provides both extremely high levels of security and, equally important, the flexibility to accommodate dynamically changing groups of users and information needs.
A dynamic VPN is actually an intranet enabler. It enables an intranet to offer more resources and services than it could otherwise, thereby allowing the business to make more use of its information resources.
1.1 Understanding Security Needs
In thinking about the challenge of the trust in an open, changing environment, we will examine the security needs first. Security for an Intranet is based on several hardware and software components. Specific mechanisms and technology will vary, but what is sometimes called “industrial-strength” security must always satisfy the following basic needs:
• Privacy, with the ability to scramble or encrypt the messages across an unsecured network.
• Access control, determining who is given access to a system or network, as well as what and how information someone can receive.
• Authentication, which verifies the identity of the two companies executing the transaction.
• Integrity, ensuring that the messages or files have not been altered in transit.
• Non-repudiation, which prevents the two companies from denying that they send or receive a file.
1.2 Accommodating changes
Along with industrial-strength security, an Intranet must also be able to accommodate changing information needs involving multiple groups of users arranged in multiple ways on an ongoing dynamic basis. User groups might include employees according to department, rank or location. Other groups might include members of organizations, subscribers to services, corporate vendors, or the general public. One person might also be a member of several groups concurrently. At the same time, membership in each group is constantly varying as members join or leave the groups.
1.3 The solution: A Dynamic VPN
To meet the challenge of establishing and maintaining trust in an open, changing environment, the best strategy is to implement what we call a dynamic VPN.
In general, any VPN is a process whereby the public networks (the Internet) is secured in order to function as if it were a private network. As such, a VPN is not defined by specialized circuits or routes. Rather, it is defined by security mechanisms and procedures that allow only appointed users access to the VPN and the information that flows through it.
VPNs are not new. Dynamic VPN is appropriate for intranet security by its dynamic nature. By dynamic, we mean its ability to accommodate open, changing business environments. This ability is based on a unique architecture and set of other features.
1.4 MAJOR DRAWBACKS OF VPN
The single major problem on the road to VPN is network security. Because VPN is connected to a public network. , the internet, it is prone to be hacked. Though all networks have some basic security that prevents such access they are often insufficient. The main threat is to the data that is transmitted through the internet. Then the user at this has to be sure that the person at the other is really the person who he claims to be.
This protects data through a combination of encryption, host authentication and protocol tunneling. The commonly used basic protecting data
is encryption. This involves scrambling the data using an algorithm so that even if the transmitted data is tapped, it cannot be decoded without the correct key.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Wireless Sensor Network Security model using Zero Knowledge Protocol seminar ideas 2 1,427 31-03-2015, 09:08 AM
Last Post: Guest
  virtual keyboared jaseelati 0 155 22-01-2015, 01:51 PM
Last Post: jaseelati
  VIRTUAL P.C seminar projects crazy 4 3,901 08-10-2014, 03:33 PM
Last Post: DorothyKl
Brick Virtual keyboard (Download Full Report And Abstract) computer science crazy 37 30,948 08-04-2014, 07:07 AM
Last Post: Guest
  Towards Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks seminar ideas 11 3,926 02-04-2014, 12:50 PM
Last Post: Guest
  Computerized Paper Evaluation using Neural Network computer science crazy 11 8,931 03-02-2014, 03:21 PM
Last Post: Guest
  Network Reconfiguration Using a Genetic Approach for Loss and Reliability Optimizati project report helper 1 1,590 16-10-2013, 05:35 AM
Last Post: dreambanned
  SIMULATION OF NETWORK PROTOCOLS: M/M/1 and M/M/1/N queues. seminar projects maker 0 415 25-09-2013, 04:29 PM
Last Post: seminar projects maker
  DATA STRUCTURES USED IN NETWORK PROGRAMMING seminar projects maker 0 557 25-09-2013, 04:27 PM
Last Post: seminar projects maker
  ppt on Wireless Mesh Network seminar projects maker 0 473 25-09-2013, 02:52 PM
Last Post: seminar projects maker