scholarly journals Secure Online Data Sharing in Cloud by Private Transmit Cryptosystem Using Aggregate Keys

2018 ◽  
Vol 7 (3.27) ◽  
pp. 36
Author(s):  
E Amarnath Reddy ◽  
M Srinuvasa Reddy ◽  
Kompally Manisha ◽  
B Mamatha

Cloud has become a crucial part of our day to day life because of its easy, effortless and straightforward nature of data storing and sharing. One of the important concerns for many users is data storing, we mustn’t forget about data sharing. A convenient way of online data sharing is to look at its pros for simple access while preserving security are cons for any user. Thus, a better way of ensuring user’s data is to implement data integrity with the KAC scheme. This scheme provides an efficient sharing method of decrypting multiple sets of data with the single key. It’s one among many ways of quick and effective data retrieval in case of data loss or data alteration on the cloud. It also uses the broadcast algorithm to distribute data for a specific set of users. This scheme uses basic HMAC, one of the secure hash functions for the stability of data integrity.  Therefore provides a protected environment where a user can share the bulk of data through integrity. Another advantage of using this scheme could reduce the burden of computation over the cloud.       

Author(s):  
Sergei A. Dichenko ◽  
◽  
Finko ◽  

The article describes the information and analytical systems (IAS), the main function of which is processing of large multidimensional arrays of information under conditions of destructive effects caused by attacker. Such conditions require the management of secure data storage. It ensures the data sent for storage by operator is identical to the one used by a decision-maker upon request. The authors propose the subsystem of data integrity control that uses cryptographic hash functions. The applied hash functions are based on the rules for constructing Pascal’s triangle. The paper shows that a distinguishing feature of the subsystem is reducing the input redundancy of control information at a given security level of data processed in the IAS, as well as ensuring new properties, such as the ability to control the integrity of not only the data to be secured, but also the reference hash codes. The article also gives a comparative assessment of the developed subsystem with known methods of data integrity control.


Author(s):  
Keith M. Martin

This chapter discusses cryptographic mechanisms for providing data integrity. We begin by identifying different levels of data integrity that can be provided. We then look in detail at hash functions, explaining the different security properties that they have, as well as presenting several different applications of a hash function. We then look at hash function design and illustrate this by discussing the hash function SHA-3. Next, we discuss message authentication codes (MACs), presenting a basic model and discussing basic properties. We compare two different MAC constructions, CBC-MAC and HMAC. Finally, we consider different ways of using MACs together with encryption. We focus on authenticated encryption modes, and illustrate these by describing Galois Counter mode.


2018 ◽  
pp. 321-383
Author(s):  
Alfred J. Menezes ◽  
Paul C. van Oorschot ◽  
Scott A. Vanstone

Symmetry ◽  
2018 ◽  
Vol 10 (7) ◽  
pp. 291 ◽  
Author(s):  
Endrowednes Kuantama ◽  
Ioan Tarca ◽  
Simona Dzitac ◽  
Ioan Dzitac ◽  
Radu Tarca

Quadcopter flight stability is achieved when all of the rotors–propellers generate equal thrust in hover and throttle mode. It requires a control system algorithm for rotor speed adjustment, which is related with the translational vector and rotational angle. Even with an identical propeller and speed, the thrusts generated are not necessarily equal on all rotors–propellers. Therefore, this study focuses on developing a data logger to measure thrust and to assist in flight control on a symmetrically-structured quadcopter. It is developed with a four load cells sensor with two-axis characterizations and is able to perform real-time signal processing. The process includes speed adjustment for each rotor, trim calibration, and a proportional integral derivative (PID) control tuning system. In the data retrieval process, a quadcopter was attached with data logger system in a parallel axis position. Various speeds between 1200 rpm to 4080 rpm in throttle mode were analyzed to determine the stability of the resulting thrust. Adjustment result showed that the thrust differences between the rotors were less than 0.5 N. The data logger showed the consistency of the thrust value and was proved by repeated experiments with 118 s of sampling time for the same quadcopter control condition. Finally, the quadcopter flight stability as the result of tuning process by the thrust data logger was validated by the flight controller data.


2019 ◽  
Vol 62 (12) ◽  
pp. 1748-1760 ◽  
Author(s):  
Yang Chen ◽  
Wenmin Li ◽  
Fei Gao ◽  
Wei Yin ◽  
Kaitai Liang ◽  
...  

AbstractOnline data sharing has become a research hotspot while cloud computing is getting more and more popular. As a promising encryption technique to guarantee the security shared data and to realize flexible fine-grained access control, ciphertext-policy attribute-based encryption (CP-ABE) has drawn wide attentions. However, there is a drawback preventing CP-ABE from being applied to cloud applications. In CP-ABE, the access structure is included in the ciphertext, and it may disclose user’s privacy. In this paper, we find a more efficient method to connect ABE with inner product encryption and adopt several techniques to ensure the expressiveness of access structure, the efficiency and security of our scheme. We are the first to present a secure, efficient fine-grained access control scheme with hidden access structure, the access structure can be expressed as AND-gates on multi-valued attributes with wildcard. We conceal the entire attribute instead of only its values in the access structure. Besides, our scheme has obvious advantages in efficiency compared with related schemes. Our scheme can make data sharing secure and efficient, which can be verified from the analysis of security and performance.


2017 ◽  
Vol 7 (1.5) ◽  
pp. 230
Author(s):  
A. Murali ◽  
K Hari Kishore

Data manipulations are made with the use of communication and networking systems. But at the same time, data integrity is also a needed and important property that must be maintained in every data communicating systems. For this, the security levels are provided with cryptographic primitives like hash functions and block ciphers which are deployed into the systems. For efficient architectures, FPGA-based systems like AES-GCM and AEGIS-128 plays in the best part of the re-configurability, which supports the security services of such communication and networking systems. We possibly focus on the performance of the systems with the high security of the FPGA bit streams. GF (2128) multiplier is implemented for authentication tasks for high-speed targets. And also, the implementations were evaluated by using vertex 4.5 FPGA’s


2018 ◽  
Vol 21 ◽  
pp. 00011
Author(s):  
Dariusz Strzęciwilk ◽  
Krzysztof Ptaszek ◽  
Paweł Hoser ◽  
Izabella Antoniku

The following article presents the results on the impact of encryption algorithms and the cryptographic hash function on the QoS (Quality of Service) transmission in a computer network. A network model supporting data encryption using the AES algorithm and the MD5 and SHA hash functions used in VPN tunnels was designed and tested. The influence of different data length on the quality of transmission in a secured network was studied. The measurements and tests of networks were performed according to two methodologies ITU-T Y.1564 and RFC 2544. The impact of the data encryption mechanism on bandwidth, data loss and maximum delays was examined. The secured network tests were performed with different combinations of encryption algorithms and hash functions of the VPN tunnel in the ESP (Encapsulating Security Payload) transport mode.


2020 ◽  
Vol 30 (13) ◽  
pp. 2050188
Author(s):  
Zhuo Liu ◽  
Yong Wang ◽  
Gongkun Jiang ◽  
Leo Yu Zhang

The inherent random-like behavior and one-way property of iteration in chaotic systems provide a good basis for designing Hash function. In the era of big data, due to the increasing data capacity in applications, fast Hash functions with parallel mode are highly desirable when authenticating data integrity. We analyze the issue of how to parallelize Hash function with iterative structure. Some security requirements on parallel Hash function are presented. In addition, using chaotic map and block cipher, we construct a keyed parallel Hash function. The message blocks are firstly processed in parallel by a DM-like structure. Furthermore, a tree mode with chaotic map is utilized to combine the outputs of the hash round function in parallel. The proposed Hash function is analyzed by theory and tested by computer simulations. The test results show that the proposed scheme can resist the various common attacks against Hash functions. It satisfies the secure performance requirements of Hash function. Owing to the usage of the parallel mode to process messages, the proposed chaos-based Hash function possess high efficiency and has high potential in applications to guarantee data integrity on a parallel computing platform.


Infotekmesin ◽  
2019 ◽  
Vol 9 (02) ◽  
pp. 91-95
Author(s):  
Annas Setiawan Prabowo ◽  
Lutfi Syafirullah

Information about UMKM is very much needed by the Cooperative Office of UMKM in determining the direction of MSME development. Accurate data will have the right impact in determining development programs and services for SMEs. The problem that often occurs in managing UMKM data and Consultation is that management is still done  manually using a book, so the risk for data loss, double data, and data retrieval are difficult when data is needed quickly. So based on these problems it is necessary to have an Information System to manage MSME data. The method used is the waterfall software development method. The results of this study are systems that can facilitate datamanagement, speed up the data search process, classify according to criteria so that it can be used as a reference in the development and service of MSMEs and assist cooperative service consultants in the business consultation process.


Author(s):  
Ch. Chakradhara Rao, Et. al.

The data owner administers their data to the public cloud due to regulatory. Even this data encoded once it easily transmitted to the cloud. In order to ensure the privacy and security, cloud subscribers need a very different type of online data. This specific information must be germane to the recipient's query. The user to inspect the query too in the cloud with umpteen keywords can accomplish this. With the intention to defend the privacy of data, confidential data encoded before subcontracting by the metadata owner, attempting to make the traditional and efficient plaintext keyword search tactic pointless. Therefore, it is crucial to explore a secure data search service for encrypted user data. Due to the growing of massive number of digital users and legal documents in the cloud, umpteen keywords forced in the search request and documents returned in the order of their relevance to these keywords.Cloud assistance end-user demands cloud information by various paternoster inquiry, whichlabelled as umpteenkeywordstratified exploration over scrambled information. In the cloud server, all the client inquiries exchanged. Server looks through the significant matter by utilizing the harmonic equivalency and sends the applicable outcomes to the client. Information got from cloud server is in the scrambled configuration. To get to control to the client,Information proprietor furnishes with key for unscrambling of information. Message Authentication Code(MAC) calculation is utilized to check and confirm trustworthiness of information. Thusly this paper depicts the method of giving security to redistribute information on cloud and checking the trustworthiness of information using blowfish algorithm. Comparison results shows the improvement in efficiency of Data Retrieval and Time efficiency.


Sign in / Sign up

Export Citation Format

Share Document