advanced encryption standards
Recently Published Documents


TOTAL DOCUMENTS

11
(FIVE YEARS 5)

H-INDEX

2
(FIVE YEARS 1)

Author(s):  
Mitesh Chanodiya* ◽  
◽  
Dr. Manish Potey ◽  

Cloud computing facilities have become an increasing rise in demand for presenting computing sources. Various programs like monetary transactions, fitness care systems, video streaming, IoT programs want on-call for provisioning of cloud sources to guarantee timeliness and excessive availability. A shared culture for data interchange has evolved as a result of the fast progress of networking technology. The data security has become a difficult issue as a result of the vast volume of data that is exchanged via the internet. Thus there is a requirement for security to protect data that is transmitted across an insecure connection. In our proposed work, privacy, confidentiality, availability, integrity, and accountability that contribute to the security of information are ensured by cryptographic technique. This paper also describes an exhaustive study on the usage of hybrid algorithms i.e. the combination of Advanced Encryption Standards (AES) and Elliptical Curve Cryptography (ECC) to protect data leakage and protect the privacy of end-users and SHA256 algorithm to ensure data integrity. This type of hybrid encryption will help not only in concentrating software as well as physical attacks but also provide the model to deal with and prevent the application from these types of attacks; thus making the cloud application system more secure. The implemented web application can be used as a defence system for privacy and security in organizations as well as institutions where members of the organization can share the file or confidential data to other team members or colleagues without data leakage thus providing data privacy and security.


Sensors ◽  
2019 ◽  
Vol 19 (11) ◽  
pp. 2484 ◽  
Author(s):  
Sudip Maitra ◽  
Kumar Yelamarthi

Internet of Things (IoT) has brought about a new horizon in the field of pervasive computing and integration of heterogeneous objects connected to the network. The broad nature of its applications requires a modular architecture that can be rapidly deployed. Alongside the increasing significance of data security, much research has focused on simulation-based encryption algorithms. Currently, there is a gap in the literature on identifying the effect of encryption algorithms on timing and energy consumption in IoT applications. This research addresses this gap by presenting the design, implementation, and practical evaluation of a rapidly deployable IoT architecture with embedded data security. Utilizing open-source off-the-shelf components and widely accepted encryption algorithms, this research presents a comparative study of Advanced Encryption Standards (AES) with and without hardware accelerators and an eXtended Tiny Encryption Algorithm (XTEA) to analyze the performance in memory, energy, and execution time. Experimental results from implementation in multiple IoT applications has shown that utilizing the AES algorithm with a hardware accelerator utilizes the least amount of energy and is ideal where timing is a major constraint, whereas the XTEA algorithm is ideal for resource constrained microcontrollers. Additionally, software implementation of AES on 8-bit PIC architecture required 6.36x more program memory than XTEA.


Sign in / Sign up

Export Citation Format

Share Document