scholarly journals Efficient Implementation of NIST LWC ESTATE Algorithm Using OpenCL and Web Assembly for Secure Communication in Edge Computing Environment

Sensors ◽  
2021 ◽  
Vol 21 (6) ◽  
pp. 1987 ◽  
Author(s):  
BoSun Park ◽  
Seog Chung Seo

In edge computing service, edge devices collect data from a number of embedded devices, like sensors, CCTVs (Closed-circuit Television), and so on, and communicate with application servers. Since a large portion of communication in edge computing services are conducted in wireless, the transmitted data needs to be properly encrypted. Furthermore, the application servers (resp. edge devices) are responsible for encrypting or decrypting a large amount of data from edge devices (resp. terminal devices), the cryptographic operation needs to be optimized on both server side and edge device side. Actually, the confidentiality and integrity of data are essential for secure communication. In this paper, we present two versions of security software which can be used on edge device side and server side for secure communication between them in edge computing environment. Our softwares are basically web-based application because of its universality where the softwares can be executed on any web browsers. Our softwares make use of ESTATE (Energy efficient and Single-state Tweakable block cipher based MAC-Then-Encrypt)algorithm, which is a promising candidate of NIST LWC (National Institute of Standards and Technology LightWeight Cryptography) competition and it provides not only data confidentiality but also data authentication. It also implements the ESTATE algorithm using Web Assembly for efficient use on edge devices, and optimizes the performance of the algorithm using the properties of the underlying block cipher. Several methods are applied to efficiently operate the ESTATE algorithm. We use conditional statements to XOR the extended tweak values during the operation of the ESTATE algorithm. To eliminate this unnecessary process, we use a method of expanding and storing the tweak value through pre-computation. The measured results of the ESTATE algorithm implemented with Web Assembly and the reference C/C++ ESTATE algorithm are compared. ESTATE implemented as Web Assembly is measured in web browsers Chrome, FireFox, and Microsoft Edge. For efficiency on server side, we make use of OpenCL which is parallel computing framework in order to process a number of data simultaneously. In addition, when implementing with OpenCL, using conditional statements causes performance degradation. We eliminated the conditional statement using the loop unrolling method to eliminate the performance degradation. In addition, OpenCL operates by moving the data to be encrypted to the local memory because the local memory has a high operation speed. TweAES-128 and TweAES-128-6, which have the same structure as AES algorithm, can apply the previously existing studied T-table method. In addition, the input value 16-byte is processed in parallel and calculated. In addition, since it may be vulnerable to cache-timing attack, it is safely operated by applying the previously existing studied T-table shuffling method. Our softwares cover the necessary security service from edge devices to servers in edge computing services and they can be easily used for various types of edge computing devices because they are all web-based applications.

2011 ◽  
Vol 1 (1) ◽  
pp. 6
Author(s):  
Muhammad Kashif Shaikh ◽  
Muzammil Ahmad Khan ◽  
Mumtaz -ul- Imam

High availability cluster computing environment attempts to provide high availability to computing services. This paper evaluates building and investigating a highly available computing environment that provides a solution to achieve high availability. A prototype of cluster computing environment is developed in Linux environment to provide a single but highly available point of entry. The cluster of computers run web based application to provide services to HTTP users.


Author(s):  
Nathan Wong ◽  
Kevin Gucwa ◽  
Harry H. Cheng

An interactive, web-based C/C++ computing environment has been developed to facilitate programming education. An editor with syntax highlighting is provided for students to solve the educational lessons designed to introduce computer programming concepts. The system uses SafeCh, a secure C/C++ interpreter that sandboxes the user to protect against server access, to execute code written by the user. Node.js, a JavaScript framework, is used to interface with SafeCh to redirect user input and output data from client to server and vice versa, creating an interactive programming environment. Users are able to access the learning environment conveniently using any internet-enabled device, including mobile phones and tablets. Most other web-based interactive programming tutorials teach scripting languages such as Python or JavaScript. The few existing web tutorials for C/C++ use server-side compilation and thus lack the same interactivity as is available with this system. Given the increasing popularity of programming education events such as Hour of Code, this web-based computing system can be a simple, interactive method to introduce and teach C/C++.


Author(s):  
Bo Li ◽  
Qiang He ◽  
Feifei Chen ◽  
Hai Jin ◽  
Yang Xiang ◽  
...  

2020 ◽  
Vol 165 ◽  
pp. 102715
Author(s):  
Chunlin Li ◽  
Mingyang Song ◽  
Shaofeng Du ◽  
Xiaohai Wang ◽  
Min Zhang ◽  
...  

2018 ◽  
Vol 7 (4.15) ◽  
pp. 130
Author(s):  
Emil Semastin ◽  
Sami Azam ◽  
Bharanidharan Shanmugam ◽  
Krishnan Kannoorpatti ◽  
Mirjam Jonokman ◽  
...  

Today’s contemporary business world has incorporated Web Services and Web Applications in its core of operating cycle nowadays and security plays a major role in the amalgamation of such services and applications with the business needs worldwide. OWASP (Open Web Application Security Project) states that the effectiveness of security mechanisms in a Web Application can be estimated by evaluating the degree of vulnerability against any of the nominated top ten vulnerabilities, nominated by the OWASP. This paper sheds light on a number of existing tools that can be used to test for the CSRF vulnerability. The main objective of the research is to identify the available solutions to prevent CSRF attacks. By analyzing the techniques employed in each of the solutions, the optimal tool can be identified. Tests against the exploitation of the vulnerabilities were conducted after implementing the solutions into the web application to check the efficacy of each of the solutions. The research also proposes a combined solution that integrates the passing of an unpredictable token through a hidden field and validating it on the server side with the passing of token through URL.  


Sign in / Sign up

Export Citation Format

Share Document