scholarly journals Encryption and Decryption Timing Computation of Different Sizes of JPEG Image

Author(s):  
Dr. Manish L Jivtode

With the increasing popularity of the cloud, web service technology has emerged as a popular way for building distributed applications involving distributed databases. It is the next generation technology in the long journey from functions to objects to components to services. In this paper, encryption and decryption technique is used for timing computation of different sizes of JPEG images which is based on enhanced AES algorithm. It is improve its performance by reducing the number of rounds and by increasing the block length with fixed length during encryption and decryption and also give the general introduction about cryptography.

Author(s):  
Dr. Manish L Jivtode

Web service technology has emerged as a popular way for building distributed applications involving distributed databases. It is the next generation technology in the long journey from functions to objects to components to services. Today’s comparing SOAP as a wire protocol to the commonly used distributed object technologies and their wire protocols in use. SOAP makes use of openly available technologies that, when combined, specify a wire protocol. This protocol can be used to facilitate highly and ultra-distributed architecture. SOAP commonly uses the HTTP protocol to transport XML-encoded serialized method argument data from system to system. This serialized argument data is used on the remote end to execute the client’s method call on that system, rather than the client’s local system. This case study provides a more details comparison of the SOAP and Distributed objects.


Author(s):  
Dr. Manish L Jivtode

The Broker Architecture became popular involving client and server. Representational State Transfer(REST) architecture is the architecture of World Wide Web. REST uses HTTP protocol based on Servlet and ASMX technology is replaced by WCF web service technology. SOAP and REST are two kinds of WCF web services. REST is lightweight compared to SOAP and hence emerged as the popular technology for building distributed applications in the cloud. In this paper, conducted by exposing a HTTP endpoint address, HTTP relay binding (webHttpRelayBinding) and CRUD contract through interface. The interface is decorated using WebGet and WebInvoke attributes. WCF configuration file created using XML tags for use with REST web service.


Author(s):  
Surya Nepal ◽  
John Zic

In the Service Oriented Architecture (SOA) model, a service is characterized by its exchange of asynchronous messages, and a service contract is a desirable composition of a variety of messages. Though this model is simple, implementing large-scale, cross-organizational distributed applications may be difficult to achieve in general, as there is no guarantee that service composition will be possible because of incompatibilities of Web service contracts. We categorize compatibility issues in Web service contracts into two broad categories: (a) between contracts of different services (which we define as a composability problem), and (b) a service contract and its implementation (which we define as a conformance problem). This chapter examines and addresses these problems, first by identifying and specifying contract compatibility conditions, and second, through the use of compatibility checking tools that enable application developers to perform checks at design time.


Author(s):  
Juan Manuel Adán-Coello

Service-oriented computing (SOC) is a new computing paradigm that uses services as building blocks to accelerate the development of distributed applications in heterogeneous computer environments. SOC promises a world of cooperating services where application components are combined with little effort into a network of loosely coupled services for creating flexible and dynamic business processes that can cover many organizations and computing platforms (Chesbrough & Spohrer, 2006; Papazoglou & Georgakopoulos, 2003). From a technical point of view, the efforts to offer services have focused on the development of standards and the creation of the infrastructure necessary to describe, discover, and access services using the Web. This type of service is usually called a Web service. The availability of an abundant number of Web services defines a platform for distributed computing in which information and services are supplied on demand, and new services can be created (composed) using available services. Nevertheless, the composition of Web services involves three fundamental problems (Sycara, Paolucci, Ankolekar, & Srinivasan, 2003): 1. To elaborate a plan that describes how Web services interact, how the functionally they offer can be integrated to provide a solution to the considered problem. 2. To discover Web services that accomplish the tasks required by the plan. 3. To manage the interaction of the chosen services. Problems 2 and 3 are of responsibility of the infrastructure that supports the composition of services, while the first problem is of responsibility of the (software) agents that use the infrastructure. The discovery and interaction of Web services poses two main challenges to the infrastructure: 1. How to represent Web services capabilities and how to recognize the similarities between service capabilities and the required functionalities. 2. How to specify the information a Web service requires and provides, the interaction protocol, and the low-level mechanisms required to service invocation.


Symmetry ◽  
2019 ◽  
Vol 11 (12) ◽  
pp. 1484 ◽  
Author(s):  
Oluwakemi Christiana Abikoye ◽  
Ahmad Dokoro Haruna ◽  
Abdullahi Abubakar ◽  
Noah Oluwatobi Akande ◽  
Emmanuel Oluwatobi Asani

The wide acceptability of Advanced Encryption Standard (AES) as the most efficient of all of the symmetric cryptographic techniques has further opened it up to more attacks. Efforts that were aimed at securing information while using AES is still being undermined by the activities of attackers This has further necessitated the need for researchers to come up with ways of enhancing the strength of AES. This article presents an enhanced AES algorithm that was achieved by modifying its SubBytes and ShiftRows transformations. The SubBytes transformation is modified to be round key dependent, while the ShiftRows transformation is randomized. The rationale behind the modification is to make the two transformations round key dependent, so that a single bit change in the key will produce a significant change in the cipher text. The conventional and modified AES algorithms are both implemented and evaluated in terms avalanche effect and execution time. The modified AES algorithm achieved an avalanche effect of 57.81% as compared to 50.78 recorded with the conventional AES. However, with 16, 32, 64, and 128 plain text bytes, the modified AES recorded an execution time of 0.18, 0.31, 0.46, and 0.59 ms, respectively. This is slightly higher than the results obtained with the conventional AES. Though a slightly higher execution time in milliseconds was recorded with the modified AES, the improved encryption and decryption strength via the avalanche effects measured is a desirable feat.


2014 ◽  
Vol 644-650 ◽  
pp. 1911-1914
Author(s):  
Shao Min Zhang ◽  
Yu Fang Gan ◽  
Bao Yi Wang

Considering the confidentiality and integrity of big data in cloud storage, a MapReduce-based AES parallelization scheme is designed by using MapReduce framework of the open source Hadoop in this paper. The scheme takes full advantage of MapReduce and modern cryptography technologies to parallelize AES encryption and decryption process, in the way of data decomposition, which speeds up the efficiency in the implementation of encryption and decryption. Meanwhile, mix plaintext, separate storage and other technical means are taken into account in this scheme to ensure the confidentiality and security of the key and the ciphertext. By analyzing the performance, it is proved that the time consumption of new scheme is significantly reduced comparing with the traditional method.


Author(s):  
Ricardo Sotolongo ◽  
◽  
Carlos Kobashikawa ◽  
Fangyan Dong ◽  
Kaoru Hirota

An algorithm based on information retrieval that applies the lexical database WordNet together with a linear discriminant function is proposed. It calculates the degree of similarity between words and their relative importance to support the development of distributed applications based on web services. The algorithm uses the semantic information contained in the Web Service Description Language specifications and ranks web services based on their similarity to the one the developer is searching for. It is applied to a set of 48 real web services in five categories, then compared them to four other algorithms based on information retrieval, showing an averaged improvement over all data between 0.6% and 1.9% in precision and 0.7% and 3.1% in recall for the top 15 ranked web services. The objective was to reduce the burden and time spent searching web services during the development of distributed applications, and it can be used as an alternative to current web service discovery systems such as brokers in the Universal Description, Discovery, and Integration (UDDI) platform.


Author(s):  
V Goutham Bharadwaja ◽  
Yashas M S ◽  
Yathendra Yadav T V ◽  
Gelvesh G

Security is a crucial side to preserve the confidentiality of information such as pictures and text. The probability of an assailant attempting to access the image in the course of transferring process is high as assailant may get hold of important data. Therefore, encryption methods are used for securing the data. A novel image encryption algorithm that is a combination of the AES algorithm and the chaos sequence is proposed in this paper. The project will use AES for encryption and decryption of the image transfer because AES is capable of solving problem that cannot be resolved by different algorithms. The original image is transformed into cipher-image using a share secret key and this process is called encryption while the reverse of encryption process is known as decryption. This method’s sensitivity to the initial values and input image, even the tiniest changes within these values will result in significant changes in the encrypted image. We show that this approach can shield the image against different attacks exploitation using histogram analysis.


Author(s):  
Mahadi Winafil ◽  
Sinar Sinurat ◽  
Taronisokhi Zebua

Digital images that are personal and confidential are very vulnerable to wiretapping by irresponsible parties. Especially if distributed via the internet network such as on Facebook, WhatsApp and e-mail chat based applications. Images that are sent sometimes are often confidential images and must be maintained. In order to maintain the security of digital images can be done by utilizing cryptographic techniques. Cryptographic techniques can secure digital images by changing pixel values from digital images so as to produce different pixel values from the original image to be secured. This research will use AES 128 bit and Triple DES methods for encryption and decryption of digital images on client-server based applications. The results of the encryption AES algorithm will be re-encrypted with the Triple DES Algorithm so as to produce pixel values that are far different from the original pixel values. Keywords: cryptography, image, AES, Triple DES


Sign in / Sign up

Export Citation Format

Share Document