An Efficient and Light weight Secure Framework for Applications of Cloud Environment using Identity Encryption Method
|
|
|
- Harold Holmes
- 10 years ago
- Views:
Transcription
1 An Efficient and Light weight Secure Framework for Applications of Cloud Environment using Identity Encryption Method E.Sathiyamoorthy 1, S.S.Manivannan 2 1&2 School of Information Technology and Engineering VIT University, Tamil Nadu, India 1 [email protected], 2 [email protected] Abstract : Security plays a vital role in Cloud Computing Services. Public Key Encryption is the mostly used method to provide security that needs sharing the public keys and digital certificates. Securing the data and resources in the Cloud is a difficult task. If the security method adopted in cloud environment is not understandable by the user, then the user may leave the service or application. So an easy-to-use security method is required for cloud applications. In this paper we propose the light weight Secure Framework for Applications of Cloud Environment using Identity Based Cryptography that overcomes the problems of existing security approaches. A mail application is developed to demonstrate the simplicity of proposed approach using Identity-Based Cryptography. Our approach allows several domains to execute independently and clearly depicts the complexity involved in Certificate Based Infrastructures and encourages the use of novel Identity-Based Infrastructure,which is easy to perform and less complex than the traditional public key algorithms. Keywords : Cloud Computing, Services, Security, Identity Based Cryptography, Less Complexity, Easy to use 1. Introduction Cloud environment gives the best way to share services, resources and data. But providing the security in clouds is a challenging issue. Many service providers provide Cloud Computing Security. The commonly used security feature is public key encryption that requires pre-sharing of the public keys and digital certificates. It is difficult to understand how to protect the data and resources in the Cloud from a security breach. Thus a security approach must be identified that is comprehensible and easy-to-use Identity-based Security Infrastructure is proposed. The difficulty of using the PKI is managing the certificates and keys. In asymmetric algorithm, public information is used to generate the public keys. So a client can generate the public key of others. The parameters such as client identity, client s position and key validity time are considered to generate the pair of keys. In public key cryptography, certificate authority verifies the certificate information. In identity based encryption, the trusted authority generates and distributes the key pairs. Similar to network-based application, Cloud computing also have certain vulnerabilities in storage and communication. Providing physical access to the unknown third parties present in the network. In this paper, we have proposed the Identity Encryption method. The features of the proposed system are i) There is no need for any public key certificate. ii) It provides a very secure way of storing and retrieving data in the Cloud. iii) Operating Costs were one-fifth of those of Public key systems. iv) It requires a simpler infrastructure. Thus it is more feasible to implement this security infrastructure in Cloud Environment. 2. Literature Survey After doing a good study, it is clear that only limited number of attempts have been made to apply Identity- Based Cryptography to cloud computing. Identity based encryption proposed by Shamir [1], solves the problem of authenticity of keys. Asish Kuamr has proposed the cloud computing and security [2]. Cloud Computing provides the services such as virtualization and on demand deployment. An efficient security scheme is required to ensure the integrity of data in the cloud environments. A perfect cloud data security and performance is required to ensure the quality of services. ISSN : Vol 5 No 3 Jun-Jul
2 The practical and secure Identity-based Public Key Encryption Scheme was presented by Boneh and Franklin [3]. They proposed that the key escrow can be circumvented by using Multiple Trusted Authorities. Sai Krishna Parsha and Mohd Khaja Pasha have proposed Enhancing Data Access Security in Cloud Computing using Hierarchical Identity Based Encryption [4]. They have proposed the deployment of data access security in cloud environments. Data access is restricted to un trusted users by organizing the users in a hierarchical method and the security is achieved by allowing only the trusted users to access the data. Schridde and Christian have proposed the identity-based security infrastructure for Cloud environments [5]. An identity-based cryptographic approach that does not require a trust hierarchy is proposed. Traditional cryptography methods and identity-based cryptography methods are compared towards data transfer rate is presented. Hongbing, Chunming, Zhenghua and Qingkai1 have proposed Identity Based Encryption and Biometric Authentication Scheme for Secure Data Access in Cloud Computing [6]. They proposed an integrated data access approach for cloud computing that uses parameter setup, key distribution, feature template creation, cloud data processing to provide the secure data access control. Hongwei Li, Yuanshun Dai and Bo Yang have proposed Identity-Based Cryptography for Cloud Security [7]. They presented a Hierarchical Architecture for Cloud Computing (HACC) that uses Identity-Based Encryption (IBE) and Identity-Based Signature (IBS). Authentication Protocol for Cloud Computing (APCC) is presented to achieve high performance. Lim and Robshaw [8] propose a Dynamic Key Infrastructure for Grids based on Identity-Based Encryption. In the same way, Lim and Patterson [9] suggest the use of identity-based Cryptography as an alternative for GSI. Gentry and Silverberg proposed HIBC in [10] to ease the Private key Distribution problem and improve Scalability of the original IBE scheme. Cramptom,Lim and patterson examined how Identity-Based Cryptography can be used to secure Web Services [11]. Lim and Robshaw have presented the use of IBC in a Grid Security Architecture. They stated that the properties of IBC allows the generation of keys that is used as an alternative approach to provide good security [12]. 3. Architecture 3.1. Architecture of the Proposed system: ISSN : Vol 5 No 3 Jun-Jul
3 Web Interface Private Key Generator Master Master Hash Code Generation (PKG) Public Key Private Key User Key Generation Data Storage Interface Fig 3.2.1: Architecture of IBC. SQL Server SQLDataReader DataStore Cloud Mail Component Node1 Node2 Node3 Noden Others.. Fig.1 Architecture of Identity Based Cryptography Web Interface layer acts as a mediator between the user and database and also between the user and the Third Party Server. This displays how the Identity based encryption secures the data that is stored in the cloud. Private key Generator acts as a middle layer between the Cloud and the user.this is also called as Trusted Authority (TA),since the user must trust this generator for secure transactions. 3.2 Components of Identity Based Encryption The components of Identity Based Encryption is shown in the Fig.2 ISSN : Vol 5 No 3 Jun-Jul
4 Identity Based Cryptographic System Encryption Private Key Generator Decryption User Public Key User Identity Master Key User Identity User Private Key User Identity Hash Function Public Key Private Key User Identity Hash Functio Master Key Fig.2 Components Identity-Based Cryptography 3.3 Design of a secure mail application using Identity based cryptography Algorithm: i)record the User information. ii) Create new Identity. iii) Record Identity details. iv) Encrypt the Message. v) Send to the Intended user. vi) Check Identity Availability. vii) Receive the cipher text mail. viii) Decrypt the message. The following Fig.3 shows the detailed steps in encryption and decryption process. Fig.3 Encryption and Decryption Process 4. Implementation of Identity Based Cryptography 4.1 Generation of Public Shared parameters (PSP) Algorithm : Extended Euclidean Algorithm is used to find the inverse of e mod n. ISSN : Vol 5 No 3 Jun-Jul
5 Input Output : Two large prime numbers[p,q]. : Public Shared Parameters 4.2 Generation of Public Key Generation Fig.4 Generation of Public Shared Parameters Algorithm : Generation of Public Key Input : Identity and hash algorithm type. Output : Hash Value of Identity/User Public Key. Public key is generated using only the user s identity by creating a hash value using SHA 256 or SHA 512 algorithm 4.3 Encryption Process Description :To encrypt the message using the User Public Key. Input : Message Output : Encrypted text/cipher text. The formula used for encryption process C = mod n,where H(id) is the Hash Value of Identity. Fast Modular Exponentiation algorithm is used to do modular exponentiation Fast Modular Exponentiation algorithm is extremely efficient and is very useful in our work relating to public key and elliptic curve cryptography: Input : An integer base c,an integer exponent x and an integer modulus m>1. Output : A nonnegative integer a,m that satisfies a= (mod m). Step 1 : Use Algorithm 1 to create the binary expansion of the exponent x : ~ d ](base 2) Step 2 : Repeatedly square the number c(mod m) as we run through the binary digits of x,including the result in the cumulative product only when =1. Set a=1 <Initialize cumulative product a> Set s=c (mod m) <Initialize squaring> FOR k=0 TO K IF =1 Update a a*s (mod m) END <IF> ISSN : Vol 5 No 3 Jun-Jul
6 Update s (mod m) <Squaring need not be done when k=k> END <k FOR> Step 3 : Output : a Fig.5 Encryption 4.4 User Private Key Generation. Description :To generate User Private Key using PSPs. Input : PSPs and Hash value of Identity. Output : User Private Key. User Private Key, d=[ mod phi]mod n, where n and phi are the Publicly Shared Parameters. Fig.6 User Private Key Generation 4.5 Decryption Description : To decrypt the message using the User Public Key. Input : Ciphertext and User Private Key. Output : Original message. Decrypt,M = mod n,where d is the User Private Key. The same Fast modular Exponentiation algorithm is used. Fig.7 Decryption 5. Design of secure mail application using identity based encryption To demonstrate the proposed system a e mail application SCRIBE (SeCuring Resources using Identity-Based Encryption) is developed using the identity based encryption. 5.1 Identity Creation Page : The user can create a new Identity or use existing Identity by choosing one item.the identity will be immediately PostBack to the server for checking its Availability as shown below: ISSN : Vol 5 No 3 Jun-Jul
7 Fig.8 Identity Creation Here the user selects Create New Identity and enters some existing identity, so a message is displayed that it already exists. 5.2 Use Existing Identity If the user chooses Use Existing identity and gives a new identity,it should immediately postback to the server and check the availability and display a message if it doesn t exists : 5.3 Using Calendar as the validity of Identity Fig.9 Use Existing Identity Fig.10 Selecting Validity date for the Identity 5.4 Sending mail Once Encryption is done, the interface will ask the user to provide the receiver s id to send the message. ISSN : Vol 5 No 3 Jun-Jul
8 Fig.11 Sending the mail using encryption 5.5 Decrypt the content of After receiving the encrypted message,decryption is applied to convert the cipher text back to original message. Fig.12 Decrypting the content of mail 6. Conclusion In this paper, an efficient and light-weight Security frame work for Applications of Cloud Environment using Identity Encryption method was discussed which overcomes the problems faced by Certificate-based security. A mail application is developed to demonstrate the simplicity of proposed approach using Identity Based Cryptography. This approach indicates that an alternative secure framework can be developed for the applications of cloud environment that offers easy to use infrastructure rather than certificate based cryptography. 7. References [1] Adi Shamir, Identity Based Cryptosystems and Signature Schemes, Advances in Cryptology, Lecture Notes in Computer Science, Vol:196, pp: 47-53, Springer,1984. [2] Ashish Kumar, World of Cloud computing and Security, International Journal of Cloud Computing and Services Science, Vol.1, No.2, pp , 2012 [3] D.Boneh and M.Franklin. Identity Based Encryption, Advances in Cryptology,Lectute Notes in Computer Science, pp: , Springer-Verlag,2001 [4] Sai Krishna Parsha, Mohd Khaja Pasha, Enhancing Data Access Security in Cloud Computing using Hierarchical Identity Based Encryption (HIBE), International Journal of Scientific & Engineering Research, Vol: 3, No.5, pp:1-5, 2012 [5] Christian, Bernd Freisleben, M.Smith, An Identity-Based Security Infrastructure for Cloud Environments, IEEE International Conference on Wireless Communications Networking and Information Security, pp: ,China, [6] Hongbing, Chunming, Zhenghua and Qingkai, Identity Based Encryption and Biometric Authentication Scheme for Secure Data Access in Cloud Computing, Chinese Journal of Electronics Vol.21, No.2, 2012 [7] Hongwei Li, Yuanshun Dai and Bo Yang, Identity-Based Cryptography for Cloud Security, IEEE International Conference 2010 [8] H.W.Lim and M.J.B. Robshaw, A Dynamic Key Infrastructure for Grid, European Grid Conference on Advances in Grid Computing, pp: ,2005 [9] H.W.Lim and K.G.Paterson, Identity-Based Cryptography for Grid Security, Proceedings of the First international Conference on e- science and Grid Computing, pp: ,IEEE press,2005. [10] C.Gentry and A.Silverberg, Hierarchical ID-Based Cryptography,Advances in Cryptology, Lecture Notes in Computer Science,pp:48-566,Springer-Verlag, 2002 [11] Crampton, H.W.Lim and K.G.Paterson, What can identity Based Cryptography offer to Web Services?, Proceedings of ACM Workshop on Secure Web Services, pages 26-36,ACM,2007 [12] H.W.Lim and M.J.B. Robshaw. On Identity-Based Cryptography and Grid Computing, ICCS,pp ,Springer-Verlag,2004 ISSN : Vol 5 No 3 Jun-Jul
Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography
Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography Liang Yan, Chunming Rong, and Gansen Zhao University of Stavanger, Norway {liang.yan,chunming.rong}@uis.no
An Introduction to Identity-based Cryptography CSEP 590TU March 2005 Carl Youngblood
An Introduction to Identity-based Cryptography CSEP 590TU March 2005 Carl Youngblood One significant impediment to the widespread adoption of public-key cryptography is its dependence on a public-key infrastructure
The Mathematics of the RSA Public-Key Cryptosystem
The Mathematics of the RSA Public-Key Cryptosystem Burt Kaliski RSA Laboratories ABOUT THE AUTHOR: Dr Burt Kaliski is a computer scientist whose involvement with the security industry has been through
Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human
Int Jr of Mathematics Sciences & Applications Vol3, No1, January-June 2013 Copyright Mind Reader Publications ISSN No: 2230-9888 wwwjournalshubcom Mathematical Model Based Total Security System with Qualitative
Strengthen RFID Tags Security Using New Data Structure
International Journal of Control and Automation 51 Strengthen RFID Tags Security Using New Data Structure Yan Liang and Chunming Rong Department of Electrical Engineering and Computer Science, University
Identity Based Encryption. Terence Spies VP Engineering [email protected]
Identity Based Encryption Terence Spies VP Engineering [email protected] Voltage Security Overview Breakthrough technology for encryption and access control Based on work of Dr. Boneh at Stanford and
Security Strength of RSA and Attribute Based Encryption for Data Security in Cloud Computing
Security Strength of RSA and Attribute Based Encryption for Data Security in Cloud Computing S.Hemalatha, Dr.R.Manickachezian Ph.D Research Scholar, Department of Computer Science, N.G.M College, Pollachi,
Table of Contents. Bibliografische Informationen http://d-nb.info/996514864. digitalisiert durch
1 Introduction to Cryptography and Data Security 1 1.1 Overview of Cryptology (and This Book) 2 1.2 Symmetric Cryptography 4 1.2.1 Basics 4 1.2.2 Simple Symmetric Encryption: The Substitution Cipher...
A SECURE FRAMEWORK WITH KEY- AGGREGATION FOR DATA SHARING IN CLOUD
A SECURE FRAMEWORK WITH KEY- AGGREGATION FOR DATA SHARING IN CLOUD Yerragudi Vasistakumar Reddy 1, M.Purushotham Reddy 2, G.Rama Subba Reddy 3 1 M.tech Scholar (CSE), 2 Asst.Professor, Dept. of CSE, Vignana
An Efficient Data Security in Cloud Computing Using the RSA Encryption Process Algorithm
An Efficient Data Security in Cloud Computing Using the RSA Encryption Process Algorithm V.Masthanamma 1,G.Lakshmi Preya 2 UG Scholar, Department of Information Technology, Saveetha School of Engineering
Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication
Volume 4, Issue 6, June 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Three Layered
Journal of Electronic Banking Systems
Journal of Electronic Banking Systems Vol. 2015 (2015), Article ID 614386, 44 minipages. DOI:10.5171/2015.614386 www.ibimapublishing.com Copyright 2015. Khaled Ahmed Nagaty. Distributed under Creative
Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt
Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt 1 Lecture 11: Network Security Reference: Chapter 8 - Computer Networks, Andrew S. Tanenbaum, 4th Edition, Prentice
1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies
1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies Dave Corbett Technical Product Manager Implementing Forward Secrecy 1 Agenda Part 1: Introduction Why is Forward Secrecy important?
Role Based Encryption with Efficient Access Control in Cloud Storage
Role Based Encryption with Efficient Access Control in Cloud Storage G. V. Bandewar 1, R. H. Borhade 2 1 Department of Information Technology, Sinhgad Technical Education Society s SKNCOE, Pune, India
Fully homomorphic encryption equating to cloud security: An approach
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 9, Issue 2 (Jan. - Feb. 2013), PP 46-50 Fully homomorphic encryption equating to cloud security: An approach
A Layered Signcryption Model for Secure Cloud System Communication
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.1086
SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES
www.arpapress.com/volumes/vol8issue1/ijrras_8_1_10.pdf SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES Malek Jakob Kakish Amman Arab University, Department of Computer Information Systems, P.O.Box 2234,
The Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network
The Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network R.Anbarasi 1, S.Gunasekaran 2 P.G. Student, Department of Computer Engineering, V.S.B Engineering College, Karur,
Certificate Based Signature Schemes without Pairings or Random Oracles
Certificate Based Signature Schemes without Pairings or Random Oracles p. 1/2 Certificate Based Signature Schemes without Pairings or Random Oracles Joseph K. Liu, Joonsang Baek, Willy Susilo and Jianying
AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES
HYBRID RSA-AES ENCRYPTION FOR WEB SERVICES AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES Kalyani Ganesh
CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives
CIS 6930 Emerging Topics in Network Security Topic 2. Network Security Primitives 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange; Hash functions; Application of hash
Group Security Model in Wireless Sensor Network using Identity Based Cryptographic Scheme
Group Security Model in Wireless Sensor Network using Identity Based Cryptographic Scheme Asha A 1, Hussana Johar 2, Dr B R Sujatha 3 1 M.Tech Student, Department of ECE, GSSSIETW, Mysuru, Karnataka, India
A SOFTWARE COMPARISON OF RSA AND ECC
International Journal Of Computer Science And Applications Vol. 2, No. 1, April / May 29 ISSN: 974-13 A SOFTWARE COMPARISON OF RSA AND ECC Vivek B. Kute Lecturer. CSE Department, SVPCET, Nagpur 9975549138
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING Sonam Mahajan 1 and Maninder Singh 2 1 Department of Computer Science Engineering, Thapar University, Patiala, India 2 Department of Computer Science Engineering,
IMPROVED SECURITY MEASURES FOR DATA IN KEY EXCHANGES IN CLOUD ENVIRONMENT
INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 IMPROVED SECURITY MEASURES FOR DATA IN KEY EXCHANGES IN CLOUD ENVIRONMENT Merlin Shirly T 1, Margret Johnson 2 1 PG
Lecture 25: Pairing-Based Cryptography
6.897 Special Topics in Cryptography Instructors: Ran Canetti and Ron Rivest May 5, 2004 Lecture 25: Pairing-Based Cryptography Scribe: Ben Adida 1 Introduction The field of Pairing-Based Cryptography
AN EFFICIENT STRATEGY OF THE DATA INTEGRATION BASED CLOUD
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF THE DATA INTEGRATION BASED CLOUD Koncha Anantha Laxmi Prasad 1, M.Yaseen Pasha 2, V.Hari Prasad 3 1
Blinding Self-Certified Key Issuing Protocols Using Elliptic Curves
Blinding Self-Certified Key Issuing Protocols Using Elliptic Curves Billy Bob Brumley Helsinki University of Technology Laboratory for Theoretical Computer Science [email protected] Abstract Self-Certified
A New Efficient Digital Signature Scheme Algorithm based on Block cipher
IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727Volume 7, Issue 1 (Nov. - Dec. 2012), PP 47-52 A New Efficient Digital Signature Scheme Algorithm based on Block cipher 1
HYBRID ENCRYPTION FOR CLOUD DATABASE SECURITY
HYBRID ENCRYPTION FOR CLOUD DATABASE SECURITY Amanjot Kaur 1, Manisha Bhardwaj 2 1 MTech Student, Computer Science Department, LPU, Jalandhar, Punjab, India, [email protected] 2 Assistant Professor,
RSA Attacks. By Abdulaziz Alrasheed and Fatima
RSA Attacks By Abdulaziz Alrasheed and Fatima 1 Introduction Invented by Ron Rivest, Adi Shamir, and Len Adleman [1], the RSA cryptosystem was first revealed in the August 1977 issue of Scientific American.
Software Tool for Implementing RSA Algorithm
Software Tool for Implementing RSA Algorithm Adriana Borodzhieva, Plamen Manoilov Rousse University Angel Kanchev, Rousse, Bulgaria Abstract: RSA is one of the most-common used algorithms for public-key
EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE
EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE Reshma Mary Abraham and P. Sriramya Computer Science Engineering, Saveetha University, Chennai, India E-Mail: [email protected]
MODIFIED RSA ENCRYPTION ALGORITHM IS USED IN CLOUD COMPUTING FOR DATA SECURITY
MODIFIED RSA ENCRYPTION ALGORITHM IS USED IN CLOUD COMPUTING FOR DATA SECURITY Yogita Gangboir 1, Praveen Shende 2 1.,2 CSE Dept, CSIT Durg, (India) ABSTRACT Cloud computing is rising day by day around
SMART FRAME- AN EFFICIENT SECURITY FRAMEWORK FOR BIG DATA MANAGEMENT SCHEME ON CLOUD
SMART FRAME- AN EFFICIENT SECURITY FRAMEWORK FOR BIG DATA MANAGEMENT SCHEME ON CLOUD *Mrs.J.Sarojini Premalatha, **Mr.C.GopalaKrishnan, **Mrs.D.C.JOY WINNIE WISE, * M.E. (CSE), M.E.,Ph.D,Francis Xavier
Secure Communication in a Distributed System Using Identity Based Encryption
Secure Communication in a Distributed System Using Identity Based Encryption Tyron Stading IBM, Austin, Texas 78758, USA [email protected] Abstract Distributed systems require the ability to communicate
A Secure Intrusion Avoidance System Using Hybrid Cryptography
ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference
AStudyofEncryptionAlgorithmsAESDESandRSAforSecurity
Global Journal of Computer Science and Technology Network, Web & Security Volume 13 Issue 15 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
CRYPTOGRAPHY IN NETWORK SECURITY
ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can
NEW DIGITAL SIGNATURE PROTOCOL BASED ON ELLIPTIC CURVES
NEW DIGITAL SIGNATURE PROTOCOL BASED ON ELLIPTIC CURVES Ounasser Abid 1, Jaouad Ettanfouhi 2 and Omar Khadir 3 1,2,3 Laboratory of Mathematics, Cryptography and Mechanics, Department of Mathematics, Fstm,
Efficient and Robust Secure Aggregation of Encrypted Data in Wireless Sensor Networks
Efficient and Robust Secure Aggregation of Encrypted Data in Wireless Sensor Networks J. M. BAHI, C. GUYEUX, and A. MAKHOUL Computer Science Laboratory LIFC University of Franche-Comté Journée thématique
Identity-Based Cryptography for Grid Security
Identity-Based Cryptography for Grid Security Hoon Wei Lim and Kenneth G. Paterson Information Security Group Royal Holloway, University of London Egham, Surrey TW20 0EX, UK {h.lim, kenny.paterson}@rhul.ac.uk
How To Make A Secure Storage On A Mobile Device Secure
Outsourcing with secure accessibility in mobile cloud computing Monika Waghmare 1, Prof T.A.Chavan 2 Department of Information technology, Smt.Kashibai Navale College of Engineering, Pune, India. Abstract
Signature Amortization Technique for Authenticating Delay Sensitive Stream
Signature Amortization Technique for Authenticating Delay Sensitive Stream M Bruntha 1, Dr J. Premalatha Ph.D. 2 1 M.E., 2 Professor, Department of Information Technology, Kongu Engineering College, Perundurai,
A Secure Model for Cloud Computing Based Storage and Retrieval
IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727 Volume 6, Issue 1 (Sep-Oct. 2012), PP 01-05 A Secure Model for Cloud Computing Based Storage and Retrieval Yaga Reddemma
Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms
Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms Radhika G #1, K.V.V. Satyanarayana *2, Tejaswi A #3 1,2,3 Dept of CSE, K L University, Vaddeswaram-522502,
A Novel Approach to combine Public-key encryption with Symmetric-key encryption
Volume 1, No. 4, June 2012 ISSN 2278-1080 The International Journal of Computer Science & Applications (TIJCSA) RESEARCH PAPER Available Online at http://www.journalofcomputerscience.com/ A Novel Approach
Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures
Outline Computer Science 418 Digital Signatures Mike Jacobson Department of Computer Science University of Calgary Week 12 1 Digital Signatures 2 Signatures via Public Key Cryptosystems 3 Provable 4 Mike
E-Visas Verification Schemes Based on Public-Key Infrastructure and Identity Based Encryption
Journal of Computer Science 6 (7): 723-727, 2010 ISSN 1549-3636 2010 Science Publications E-Visas Verification Schemes Based on Public-Key Infrastructure and Identity Based Encryption Najlaa A. Abuadhmah,
Lukasz Pater CMMS Administrator and Developer
Lukasz Pater CMMS Administrator and Developer EDMS 1373428 Agenda Introduction Why do we need asymmetric ciphers? One-way functions RSA Cipher Message Integrity Examples Secure Socket Layer Single Sign
Keywords- Cloud Computing, Android Platform, Encryption, Decryption, NTRU, RSA, DES, throughput.
Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Implementation
Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud
Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud M.Jayanthi, Assistant Professor, Hod of MCA.E mail: [email protected] MahatmaGandhi University,Nalgonda, INDIA. B.Ranganatha
International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013
FACTORING CRYPTOSYSTEM MODULI WHEN THE CO-FACTORS DIFFERENCE IS BOUNDED Omar Akchiche 1 and Omar Khadir 2 1,2 Laboratory of Mathematics, Cryptography and Mechanics, Fstm, University of Hassan II Mohammedia-Casablanca,
Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
Secure and Efficient Data Retrieval Process based on Hilbert Space Filling Curve
Secure and Efficient Data Retrieval Process based on Hilbert Space Filling Curve N.S. Jeya karthikka PG Scholar Sri Ramakrishna Engg Collg S.Bhaggiaraj Assistant Professor Sri Ramakrishna Engg Collg V.Sumathy
Identity-Based Cryptography and Comparison with traditional Public key Encryption: A Survey
Identity-Based Cryptography and Comparison with traditional Public key Encryption: A Survey Girish Department of PGS-CEA The National Institute of Engineering, Manadavady Road,Mysore-570008, INDIA Phaneendra
Data Grid Privacy and Secure Storage Service in Cloud Computing
Data Grid Privacy and Secure Storage Service in Cloud Computing L.Revathi 1, S.Karthikeyan 2 1 Research Scholar, Department of Computer Applications, Dr. M.G.R. Educational and Research Institute University,
Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment
Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment Chih Hung Wang Computer Science and Information Engineering National Chiayi University Chiayi City 60004,
Secure Network Communication Part II II Public Key Cryptography. Public Key Cryptography
Kommunikationssysteme (KSy) - Block 8 Secure Network Communication Part II II Public Key Cryptography Dr. Andreas Steffen 2000-2001 A. Steffen, 28.03.2001, KSy_RSA.ppt 1 Secure Key Distribution Problem
Secure Key Exchange for Cloud Environment Using Cellular Automata with Triple-DES and Error-Detection
Secure Key Exchange for Cloud Environment Using Cellular Automata with Triple-DES and Error-Detection Govinda.K 1, Sathiyamoorthy.E *2, Surbhit Agarwal 3 # SCSE,VIT University Vellore,India 1 [email protected]
Quantitative Analysis of 2-tier P2P- SIP Architecture with ID-based Signature
A Thesis for the degree of Master Quantitative Analysis of 2-tier P2P- SIP Architecture with ID-based Signature Chang-Hwan Lee School of Engineering Information and Communications University 2008 i Quantitative
A Factoring and Discrete Logarithm based Cryptosystem
Int. J. Contemp. Math. Sciences, Vol. 8, 2013, no. 11, 511-517 HIKARI Ltd, www.m-hikari.com A Factoring and Discrete Logarithm based Cryptosystem Abdoul Aziz Ciss and Ahmed Youssef Ecole doctorale de Mathematiques
A SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED
A SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED J Karunamayi 1, Annapurna V K 2 1 Student, Computer Network and Engineering,The National Institute of Engineering, Mysuru,
CRYPTOGRAPHIC SECURE CLOUD STORAGE MODEL WITH ANONYMOUS AUTHENTICATION AND AUTOMATIC FILE RECOVERY
SOWMIYA MURTHY: CRYPTOGRAPHIC SECURE CLOUD STORAGE MODEL WITH ANONYMOUS AUTHENTICATION AND AUTOMATIC FILE RECOVERY CRYPTOGRAPHIC SECURE CLOUD STORAGE MODEL WITH ANONYMOUS AUTHENTICATION AND AUTOMATIC FILE
AN EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA IN TEGRITY IN CLOUDS
AN EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA IN TEGRITY IN CLOUDS Mrs.K.Saranya, M.E.,(CSE), Jay Shriram Group of Institutions, Tirupur. [email protected] Dr.S.Rajalakshmi, Associate Professor/CSE,
A Security Integrated Data Storage Model for Cloud Environment
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 8, August 2014,
SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTING SECURITY ENVIRONMENT
SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTING SECURITY ENVIRONMENT K.karthika 1, M. Daya kanimozhi Rani 2 1 K.karthika, Assistant professor, Department of IT, Adhiyamaan College of Engineering, Hosur
Identity Based Cryptography for Smart-grid Protection
Identity Based Cryptography for Smart-grid Protection MICKAEL AVRIL [email protected] ABDERRAHMAN DAIF [email protected] LAURIE BASTA [email protected] GREGORY LANDAIS [email protected] LAURENT
An Approach to Shorten Digital Signature Length
Computer Science Journal of Moldova, vol.14, no.342, 2006 An Approach to Shorten Digital Signature Length Nikolay A. Moldovyan Abstract A new method is proposed to design short signature schemes based
An Introduction to the RSA Encryption Method
April 17, 2012 Outline 1 History 2 3 4 5 History RSA stands for Rivest, Shamir, and Adelman, the last names of the designers It was first published in 1978 as one of the first public-key crytographic systems
Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving,
Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Third Party
An Efficient data storage security algorithm using RSA Algorithm
An Efficient data storage security algorithm using RSA Algorithm Amandeep Kaur 1, Sarpreet Singh 2 1 Research fellow, Department of Computer Science and Engineering, Sri Guru Granth Sahib World University,
Single Sign-On Secure Authentication Password Mechanism
Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,
Schnorr Signcryption. Combining public key encryption with Schnorr digital signature. Laura Savu, University of Bucharest, Romania
Schnorr Signcryption Combining public key encryption with Schnorr digital signature Laura Savu, University of Bucharest, Romania IT Security for the Next Generation European Cup, Prague 17-19 February,
Public Key Cryptography and RSA. Review: Number Theory Basics
Public Key Cryptography and RSA Murat Kantarcioglu Based on Prof. Ninghui Li s Slides Review: Number Theory Basics Definition An integer n > 1 is called a prime number if its positive divisors are 1 and
Implementation and Comparison of Various Digital Signature Algorithms. -Nazia Sarang Boise State University
Implementation and Comparison of Various Digital Signature Algorithms -Nazia Sarang Boise State University What is a Digital Signature? A digital signature is used as a tool to authenticate the information
Security System in Cloud Computing for Medical Data Usage
, pp.27-31 http://dx.doi.org/10.14257/astl.2013.38.06 Security System in Cloud Computing for Medical Data Usage Maya Louk 1, Hyotaek Lim 2, Hoon Jae Lee 3 1 Department of Ubiquitous IT, Graduate School
An Enhanced Security Enabled Sharing of Protected Cloud Storage Services by Trapdoor Commitment Based on RSA Signature Assumption
Bonfring International Journal of Research in Communication Engineering, Vol. 2, No. 3, September 2012 1 An Enhanced Security Enabled Sharing of Protected Cloud Storage Services by Trapdoor Commitment
Attribute Based Encryption with Privacy Preserving In Clouds
Attribute Based Encryption with Privacy Preserving In Clouds M. Suriyapriya 1, A. Joicy 2 PG Scholar 1 Assistant Professor CSE Department 2 St.Joseph College of Engineering Sriperumbudur, Chennai-602105
Enhance data security of private cloud using encryption scheme with RBAC
Enhance data security of private cloud using encryption scheme with RBAC Dimpi Rani 1, Rajiv Kumar Ranjan 2 M.Tech (CSE) Student, Arni University, Indora, Kangra, India 1 Assistant Professor, Dept. of
Lightweight Security using Identity-Based Encryption Guido Appenzeller
Lightweight Security using Identity-Based Encryption Guido Appenzeller Chief Technology Officer Voltage Security Inc. Identity-Based Encryption (IBE) IBE is a new public key encryption algorithm A number
Cryptography and Network Security Chapter 9
Cryptography and Network Security Chapter 9 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 9 Public Key Cryptography and RSA Every Egyptian received two names,
Highly Secure Data Sharing in Cloud Storage using Key-Pair Cryptosystem
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 10, October 2015,
Categorical Heuristic for Attribute Based Encryption in the Cloud Server
Categorical Heuristic for Attribute Based Encryption in the Cloud Server R. Brindha 1, R. Rajagopal 2 1( M.E, Dept of CSE, Vivekanandha Institutes of Engineering and Technology for Women, Tiruchengode,
Speeding Up RSA Encryption Using GPU Parallelization
2014 Fifth International Conference on Intelligent Systems, Modelling and Simulation Speeding Up RSA Encryption Using GPU Parallelization Chu-Hsing Lin, Jung-Chun Liu, and Cheng-Chieh Li Department of
Computer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 20 Public-Key Cryptography and Message Authentication First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Public-Key Cryptography
Lecture 9: Application of Cryptography
Lecture topics Cryptography basics Using SSL to secure communication links in J2EE programs Programmatic use of cryptography in Java Cryptography basics Encryption Transformation of data into a form that
7! Cryptographic Techniques! A Brief Introduction
7! Cryptographic Techniques! A Brief Introduction 7.1! Introduction to Cryptography! 7.2! Symmetric Encryption! 7.3! Asymmetric (Public-Key) Encryption! 7.4! Digital Signatures! 7.5! Public Key Infrastructures
IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD ENVIRONMENT
IJRRECS/November 2014/Volume-2/Issue-11/3699-3703 ISSN 2321-5461 INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD
