scholarly journals Improve Security of Cloud Storage by Using Third Parity Authentication, One Time Password and Modified AES Encryption Algorithm

Author(s):  
Firas A. Abdulatif ◽  
Maan Zuhiar

<p>Cloud computing is a new term to provide application and hardware as service over the internet. Demand for cloud has increased dramatically in recent years. However, a major drawback for cloud adoption is lack of security so that we will try to solve some security issues related to cloud storage by design and implement a secure system to store privet data in cloud storage. This secure system provide secure login to cloud by using third parity authentication (smart phone) and one time password depend on chaotic system to prevent unauthorized people from get access to cloud and modified AES algorithms to encrypt the data in the cloud storage.</p>

Cryptography ◽  
2020 ◽  
pp. 129-141
Author(s):  
Filali Mohamed Amine ◽  
Gafour Abdelkader

Advanced Encryption Standard is one of the most popular symmetric key encryption algorithms to many works, which have employed to implement modified AES. In this paper, the modification that has been proposed on AES algorithm that has been developed to decrease its time complexity on bulky data and increased security will be included using the image as input data. The modification proposed itself including alteration in the mix column and shift rows transformation of AES encryption algorithm, embedding confusion-diffusion. This work has been implemented on the most recent Xilinx Spartan FPGA.


Author(s):  
Filali Mohamed Amine ◽  
Gafour Abdelkader

Advanced Encryption Standard is one of the most popular symmetric key encryption algorithms to many works, which have employed to implement modified AES. In this paper, the modification that has been proposed on AES algorithm that has been developed to decrease its time complexity on bulky data and increased security will be included using the image as input data. The modification proposed itself including alteration in the mix column and shift rows transformation of AES encryption algorithm, embedding confusion-diffusion. This work has been implemented on the most recent Xilinx Spartan FPGA.


2020 ◽  
Vol 32 ◽  
pp. 03018
Author(s):  
Akhil Shah ◽  
Nishita Sodhia ◽  
Shruti Saha ◽  
Soumi Banerjee ◽  
Madhuri Chavan

A blockchain-enabled online-voting system is being proposed in this following paper. Blockchain technologies deliver an endless variety of applications that benefit from distributed economies. The proposed model is an android application that has enhanced security features which includes both authentication and authorization. Authentication is incorporated by using a unique identification key and authorization is done by using fingerprint. Voters are also being verified by One-time password. The security in this project is implemented by using a 128 bit AES encryption algorithm and SHA-256 along with blockchain. The vote is casted in the form of transaction, where a blockchain is created, which keeps track of tallies of votes. Through this atomicity and integrity are maintained. [4] Index Terms—Voting System , Blockchain , SHA-256, Security, AES-128, Ballot


2020 ◽  
Vol 10 (1) ◽  
pp. 17-29
Author(s):  
Ahmed A. Elngar ◽  
Mohammed Kayed

AbstractNowadays, the automobile sector is one of the hottest applications, where vehicles can be intelligent by using IoT technology. But unfortunately, these vehicles suffer from many crimes. Hence it has become a big challenge for the IoT to avoid such these crimes from professional thieves. This paper presents a proposal for the development of a vehicle guard and alarm system using biometric authentication based on IoT technology. Whereas, for vehicle security issues; the proposed system VSS − IoT gives only full access for authorized vehicle’s driver based on the interface of a Raspberry Pi 3 Model B+ development board, Pi camera, PIR sensor, and smart-phone. Therefore, if the proposed system detects an unauthorized person inside the vehicle, then the system will notify and send his image to vehicle’s owner and/or to a police workstation through the Internet, as well as, its location in case the vehicle is stolen or damaged. The proposed system is tested on two datasets that are ORL dataset and our dataset. The experimental results of the VSS − IoT showed that the accuracy is 98.2% on ORL dataset, whereas 99.6% when applied on our dataset. Besides, the VSS − IoT enhances the sensitivity to 97.7% which is important for real-time. As well as the result demonstrated that the proposed system took shorter time 0.152 sec under different illumination conditions, when the value of the threshold is 3 * 103 and 3.50 * 103. Therefore, the VSS − IoT is very robust and reliable for face recognition when deployed on the low-power processor.


Cloud computing (CC) is the expertise over which every person is capable of sharing the reserves, amenities, and evidence amongst the individuals as a result of harnessing the internet in link. Subsequently, protection is a key concern on the facts pooled by means of the internet. In CC a numerous security issues prone to occur that includes confidentiality, integrity, authentication and/or thin well-honed edit control (TWHEC). In this research an innovative security replica has been aforethought. The design stipulates an approach across which secure communication besides data hiding from unauthorized punters can be got hold of. The security resolved with all categories of CC aspects similar to Platform as a Service (aaS), and Process aaS (PaaS), Software aaS, Storage aaS and Security aaS (SaaS), Network aaS (NaaS), Functions aaS (FaaS), Infrastructure aaS, Information aaS, and Integration aaS (IaaS), Database aaS (DBaaS), Application as a Service aaS and API aaS (AaaS), Management aaS (MaaS), Testing aaS (TaaS), etc., This anticipated system yield thin well-honed, mutable and ascendable statistics editing control by means of the manipulation of complex traits of Hierarchical (Ranked/Ordered) attribute-set-based encryption (HASBE). This multifarious qualities of blend of HASBE and Rivest–Shamir–Adleman (RSA) algorithm too. For instance, cyber individual healthiness record (IHR) aids sick persons to deal with his/her personal medicinal archives into a unified means that is to a great extent vital in storing, editing and partaking of the individual healthiness data. Further down encryption, it is impeding in accomplishing the TWHEC to CIHR data in an ascendable and effectual technique by using HASBE. Prevailing RSA encryption does not endow the data with high security in health. To fulfill ascendable, elastic, and thin well-honed edit control of subcontracted statistics in cloud. In this archetypal instigated a mish-mash RSA encryption with HASBE. Cyber IHR dispenses with patients to get along medical archives in a secure way, in which very significant concerns are the storing, access and distribution of individual wellness information. This composite process is responsible for three mode precautions, i.e. data precautions, certification and corroboration. In this report, the HASBE encryption algorithm has been put forward in realizing TWHEC to IHR data in an ascendable and effectual way


2021 ◽  
Vol 2021 ◽  
pp. 1-15
Author(s):  
Farah Tawfiq Abdul Hussien ◽  
Abdul Monem S. Rahma ◽  
Hala Bahjat Abdul Wahab

Providing security for transmitted data through the e-commerce environment requires using a fast and high secure encryption algorithm. Balancing between the speed and the security degree is a problem that many of the encryption algorithms suffer from. Increasing the security degree requires increasing the level of complexity which results in increasing encryption time. On the other hand, increasing the algorithm speed may reduce the complexity degree which affects the security level. This paper aims to design an encryption algorithm that balances time and complexity (speed and security). This is done by suggesting a security environment that depends on creating and providing an agent software to be settled into each customer device that manages the purchase and security process without customer interference. The suggested encryption algorithm is applied within this environment. Several modifications are performed on the AES encryption algorithm. The AES was chosen due to its performance (security and speed), which makes it suitable for encrypting transmitted data over the Internet. These modifications involve adding preprocessing steps (padding and zigzag), eliminating Sub Byte step, and reducing the number of rounds. The experimental results showed that the suggested algorithm provides more security and speed in the encryption and decryption process. The randomness degree has increased by 29.5%. The efficiency is increased because the encryption and decryption times are reduced, as is the CPU usage. The throughput for the suggested algorithm is increased by 10% for the encryption process and is increased by 9.3% for the decryption process.


Author(s):  
Erick Irwansyah ◽  
Maryaningsih Maryaningsih ◽  
Yode Arliando

ABSTRAKPerkembangan dunia teknologi sangat pesat, sehingga mengubah sudut pandang manusia dalam berkomunikasi dampak dari perkembangan teknologi tersebut adalah terciptanya aplikasi chatting, yang memungkinkan manusia untuk melakukan pertukaran informasi melalui jaringan internet secara langsung dan instan. Dalam melakukan pertukaran informasi manusia membutuhkan sebuah fitur yang bisa menjamin informasi yang ia pertukarkan agar tidak bisa dibaca oleh orang-orang yang tidak memiliki wewenang. Salah satu cara melakukan pengamanan data adalah dengan menkripsi pesan tersebut. Enkripsi dilakukan untuk merubah teks biasa (plaintext) menjadi teks yang tidak bisa dibaca dan difahami oleh manusia makna pesan tersebut (ciphertext). Maka diterapkan salah satu algoritma enkripsi yaitu Algoritma Caesar cipher. Pengujian dilakukan pada dua perangakat smart phone dan personal computer dalam suatu jaringan wifi, hasil pengujian sistem yang dibangun menujukan aplikasi chatting dapat melakukan pengamanan pesan. ABSTRACTThe Development of technological world is very rapid, it changes the point of view of humans in communication, the impact of the development of these technologies is the creation of chat applications, which enable humans to exchange information through the internet network directly and instantly. In exchanging human information requires a feature that can guarantee the information so that it cannot be read by people who do not have the authority. One way to safeguard data is to encrypt the message. Encryption is done to change plain text (plaintext) into text that cannot be read and understood by humans the meaning of the message (ciphertext). Then applied one encryption algorithm, the Caesar cipher algorithm. Tests carried out on two smart phone devices and personal computers in a Wi-Fi network, the results of testing the system that was built showed the chat application can do security.


Author(s):  
Shankar Chaudhary

Despite being in nascent stage m-commerce is gaining momentum in India. The explosive growth of smart-phone users has made India much loved business destination for whole world. Indian internet user is becoming the second largest in the world next to China surpassing US, which throws open plenty of e-commerce opportunities, not only for Indian players, offshore players as well. Mobile commerce is likely to overtake e-commerce in the next few years, spurred by the continued uptrend in online shopping and increasing use of mobile apps.The optimism comes from the fact that people accessing the Internet through their mobiles had jumped 33 per cent in 2014 to 173 million and is expected to grow 21 per cent year-on-year till 2019 to touch 457 million. e-Commerce brands are eyeing on the mobile app segment by developing user-friendly and secure mobile apps offering a risk-free and easy shopping experience to its users. Budget 4G smart phones coupled with affordable plans, can very well drive 4G growth in India.


2020 ◽  
Vol 4 (3) ◽  
pp. 29-39
Author(s):  
Sulkhiya Gazieva ◽  

The future of labor market depends upon several factors, long-term innovation and the demographic developments. However, one of the main drivers of technological change in the future is digitalization and central to this development is the production and use of digital logic circuits and its derived technologies, including the computer,the smart phone and the Internet. Especially, smart automation will perhaps not cause e.g.regarding industries, occupations, skills, tasks and duties


Author(s):  
Qingtao Wu ◽  
Zaihui Cao

: Cloud monitoring technology is an important maintenance and management tool for cloud platforms.Cloud monitoring system is a kind of network monitoring service, monitoring technology and monitoring platform based on Internet. At present, the monitoring system is changed from the local monitoring to cloud monitoring, with the flexibility and convenience improved, but also exposed more security issues. Cloud video may be intercepted or changed in the transmission process. Most of the existing encryption algorithms have defects in real-time and security. Aiming at the current security problems of cloud video surveillance, this paper proposes a new video encryption algorithm based on H.264 standard. By using the advanced FMO mechanism, the related macro blocks can be driven into different Slice. The encryption algorithm proposed in this paper can encrypt the whole video content by encrypting the FMO sub images. The method has high real-time performance, and the encryption process can be executed in parallel with the coding process. The algorithm can also be combined with traditional scrambling algorithm, further improve the video encryption effect. The algorithm selects the encrypted part of the video data, which reducing the amount of data to be encrypted. Thus reducing the computational complexity of the encryption system, with faster encryption speed, improve real-time and security, suitable for transfer through mobile multimedia and wireless multimedia network.


Sign in / Sign up

Export Citation Format

Share Document