scholarly journals Implementation of Different Cyptographic Strategies in Cloud Environment

2020 ◽  
Vol 8 (5) ◽  
pp. 4214-4218

Cloud computing is hosted technology used to deliver services over internet. These services are broadly classified based on type of hosting i.e. infrastructure, platform and software. Public environment and internet connectivity make it vulnerable and unsafe for communication and storage. Confidentiality is one of the major principles to keep data privacy and protection at high level. Cryptographic techniques are used to achieve confidentiality and integrity of information during unsafe communication. This research paper observes that various cryptographic algorithms known as symmetric key cryptography and asymmetric key cryptography can be used to protect information and make it unreadable for unauthorised users. This research paper implements different security algorithms and observe their performance based on computation time over different input sizes. The complete research work concludes a comparative study and recommends different security approaches for different situations.

2021 ◽  
Vol 14 (3) ◽  
pp. 1-25
Author(s):  
Arif Sasongko ◽  
I. M. Narendra Kumara ◽  
Arief Wicaksana ◽  
Frédéric Rousseau ◽  
Olivier Muller

The confidentiality and integrity of a stream has become one of the biggest issues in telecommunication. The best available algorithm handling the confidentiality of a data stream is the symmetric key block cipher combined with a chaining mode of operation such as cipher block chaining (CBC) or counter mode (CTR). This scheme is difficult to accelerate using hardware when multiple streams coexist. This is caused by the computation time requirement and mainly by management of the streams. In most accelerators, computation is treated at the block-level rather than as a stream, making the management of multiple streams complex. This article presents a solution combining CBC and CTR modes of operation with a hardware context switching. The hardware context switching allows the accelerator to treat the data as a stream. Each stream can have different parameters: key, initialization value, state of counter. Stream switching was managed by the hardware context switching mechanism. A high-level synthesis tool was used to generate the context switching circuit. The scheme was tested on three cryptographic algorithms: AES, DES, and BC3. The hardware context switching allowed the software to manage multiple streams easily, efficiently, and rapidly. The software was freed of the task of managing the stream state. Compared to the original algorithm, about 18%–38% additional logic elements were required to implement the CBC or CTR mode and the additional circuits to support context switching. Using this method, the performance overhead when treating multiple streams was low, and the performance was comparable to that of existing hardware accelerators not supporting multiple streams.


2021 ◽  
Vol 13 (22) ◽  
pp. 12513
Author(s):  
Ikram Ullah ◽  
Munam Ali Shah ◽  
Abid Khan ◽  
Carsten Maple ◽  
Abdul Waheed ◽  
...  

Preserving location privacy is increasingly an essential concern in Vehicular Adhoc Networks (VANETs). Vehicles broadcast beacon messages in an open form that contains information including vehicle identity, speed, location, and other headings. An adversary may track the various locations visited by a vehicle using sensitive information transmitted in beacons such as vehicle identity and location. By matching the vehicle identity used in beacon messages at various locations, an adversary learns the location history of a vehicle. This compromises the privacy of the vehicle driver. In existing research work, pseudonyms are used in place of the actual vehicle identity in the beacons. Pseudonyms should be changed regularly to safeguard the location privacy of vehicles. However, applying simple change in pseudonyms does not always provide location privacy. Existing schemes based on mix zones operate efficiently in higher traffic environments but fail to provide privacy in lower vehicle traffic densities. In this paper, we take the problem of location privacy in diverse vehicle traffic densities. We propose a new Crowd-based Mix Context (CMC) privacy scheme that provides location privacy as well as identity protection in various vehicle traffic densities. The pseudonym changing process utilizes context information of road such as speed, direction and the number of neighbors in transmission range for the anonymisation of vehicles, adaptively updating pseudonyms based on the number of a vehicle neighbors in the vicinity. We conduct formal modeling and specification of the proposed scheme using High-Level Petri Nets (HPLN). Simulation results validate the effectiveness of CMC in terms of location anonymisation, the probability of vehicle traceability, computation time (cost) and effect on vehicular applications.


Author(s):  
Abdul Wahid ◽  
Mohatesham Pasha Quadri ◽  
Ahmad Talha Siddiqui ◽  
Mudasir M. Kirmani ◽  
Khaleel Ahmad

A Distributed Cloud Storage Provider (DCSP) is used for managing the client's data. However, the platform is vulnerable to security attacks, which results in huge losses of client data. The confidential data in an enterprise system may be illegally accessed through a remote interface provided by a heterogeneous-cloud and archives. The data may be lost or tampered with when it is stored in a storage pool outside the enterprise on a cloud. To achieve reliability, consistency, security, and confidentiality of user information Kerberos Protocol is used. The Kerberos protocol is designed to provide reliable authentication over open and insecure networks. The symmetric-key cryptography is maintained for transaction over the network. In this chapter, a cooperative Key-Distribution Center (KDC) scheme is proposed to support dynamic scalability on multiple storage servers. The results of the research work show that KDC provides effective security properties required by Kerberos protocol to mitigate the impact of various attacks in any cloud.


2016 ◽  
Vol 1133 ◽  
pp. 486-490 ◽  
Author(s):  
Sami Ullah ◽  
Mohamad Azmi Bustam ◽  
Ali E.I. Elkhalifah ◽  
Nadia Riaz ◽  
Girma Gonfa ◽  
...  

Nearly 40% of the world gas reservoir contains high level of CO2 that stance problems to development. The discovery of natural gas field with CO2 content of as high as 87% in Malaysia poses new challenges in terms of the CO2 separation processes. This research work investigates the potential of MIL(Materials Institute Lavoisier)-101 as CO2 capture and storage candidate by conducting an experiment with different pressure between the synthesised and modified MIL-101 using Multi-wall carbon nano tubes (MWCNTs). To investigate the effect of the MWCNTs in MIL-101 towards CO2 adsorption performance. The synthesized MOFs were characterized using scanning electron microscopy (SEM) for surface morphology, Thermogravimetric analysis (TGA) for thermal stability, X-ray diffraction (XRD) for crystals plane, Brunauer-Emmet-Teller (BET) for surface area and CO2 adsorption performance. The result had showed that the modified MIL-101 enhanced the CO2 adsorption compared to the pure MIL-101. MWCNT@MIL-101 showed the adsorption of CO2 uptake is 0.0029mmole-1/g at 100kPa.


Author(s):  
Pushkar Aneja

With the growing use of the Internet, and more people being connected with it, the security of the data becomes a major concern. It is necessary that the data can only be accessed by the intended receiver and no person in the middle makes alterations to it. This is achieved by encryption of the data using cryptography. This paper presents a comparative analysis of RSA (Rivest-Shamir-Adleman), Caesar Cipher and Playfair Cipher cryptographic techniques. This paper also presents a comparative analysis of Symmetric Key Cryptography and Asymmetric Key Cryptography. Also, this paper includes the basic working of the above-mentioned techniques along with their implementation in C language over Visual Studio Code 1.49.3.


2014 ◽  
Vol 905 ◽  
pp. 687-692
Author(s):  
Waleed Al-Museelem ◽  
Chun Lin Li

Cloud computing has led to the development of IT to more sophisticated levels by improving the capacity and flexibility of data storage and by providing a scalable computation and processing power which matches the dynamic data requirements. Cloud computing has many benefits which has led to the transfer of many enterprise applications and data to public and hybrid clouds. However, many organizations refer to the protection of privacy and the security of data as the major issues which prevent them from adopting cloud computing. The only way successful implementation of clouds can be achieved is through effective enhancement and management of data security and privacy in clouds. This research paper analyzes the privacy and protection of data in cloud computing through all data lifecycle stages providing an overall perspective of cloud computing while highlighting key security issues and concerns which should be addressed. It also discusses several current solutions and further proposes more solutions which can enhance the privacy and security of data in clouds. Finally, the research paper describes future research work on the protection of data privacy and security in clouds.


2018 ◽  
Vol 7 (2.32) ◽  
pp. 436
Author(s):  
Gowtham Tumati ◽  
Yalamarthi Rajesh ◽  
Manogna T ◽  
J Ram Kumar

Cryptographic techniques are primarily divided into two categories and they are: Symmetric key type and Asymmetric key type. In Symmetric key cryptography, during the process of encryption and decryption, the same key will be used. This is a conventional method of Cryptography. This might cause some disadvantage and give way for attacks on the algorithm. So, for this reason, the next technique comes into play. In Asymmetric key cryptography, there is a usage of a pair of keys, one for the encryption process and another for decryption process. In this technique also, there is a slight disadvantage, since there is a possibility for attackers to guess the public key from the pair of keys, thereby posing a threat to the process to an extent. In this paper, we develop an algorithm with a simple yet efficient structure using Symmetric key cryptography that could possibly decrease the chance of attacks on the algorithm.  


Author(s):  
Asoke Nath ◽  
Ankita Kedia ◽  
Sunanda Pal ◽  
Moumita Sen

In today’s world with advancement in technologies as networking is growing at a fast pace providing security to data becomes the biggest concern. Hence, cryptography is the major area of concern when it comes to data security. DNA cryptography is a promising approach in encrypting, storing and transmitting data over a network. In our work we will be trying to design an encryption and corresponding decryption algorithm based on pseudo biotic DNA cryptography method. The algorithm will make use of basic concepts of DNA cryptography, crossover, mutation, transcription, splicing system for get spliced key, DNA Vigenere table and also a lot of steps to perform randomization of the plain texts in order to produce cipher texts which cannot be easily breakable. The encryption algorithm can be used in cellular and electronic communication.This document provides some minimal guidelines (and requirements) for writing a research paper. Issues related to the contents, originality, contributions, organization, bibliographic information, and writing style are briefly covered. Evaluation criteria and due dates for the research paper are also provided.


Sign in / Sign up

Export Citation Format

Share Document