Data Encryption Standard (DES) was the set up plan of the standard symmetric-key encryption designs. By and by it has
been well ordered supplanted by the triple DES or AES so that the encoder has a greater key space.
The document discusses secure data sharing in cloud storage using a key-aggregate cryptosystem (KAC) which allows efficient delegation of decryption rights for any set of ciphertexts. KAC produces constant size ciphertexts and allows any set of secret keys to be aggregated into a single key encompassing the power of the keys being aggregated. This aggregate key can then be sent to others for decryption of the ciphertext set while keeping files outside the set confidential.
Different date block size using to evaluate the performance between different...IJCNCJournal
The different computer networks whether wired or wireless are becoming more popular with its high
security aspect. Different security algorithms and technique are using to avoid any aforementioned attacks.
One of these technique is a cryptography technique that makes the data as unreadable during the transfer
hence; there is no chance to reclaim the information. Presently, most of the users are using various media
types and internet to transfer the data but, it has the chance to retrieve the data by using these media types.
The perfect solution for this problem is to provide security on time-to-time basis; this stage is always
significant to the security related community discussions. This paper explains the comparison between the
run time of three different encryption algorithms which are DES, AES and Blowfish The compression
includes using different modes, data block size and different operation modes. As a result, Blowfish
algorithm followed by AES take less time for running compared to DES.
Survey of Security Threats and Protection Techniques in Mobile Ad Hoc Networksdrsrinivasanvenkataramani
This document summarizes various security threats and protection techniques in mobile ad hoc networks (MANETs). It discusses several proposed solutions, including those based on cryptography using public/private keys, trusted certificate servers, detecting node capture and forged routing messages, watchdog mechanisms to detect misbehaving nodes, using route request packets to establish secure routes, redundant routing messages to detect attacks, reputation-based approaches, and using firewalls. The document provides an overview of the key challenges in securing MANETs and surveys different existing approaches, their advantages and limitations.
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...IJECEIAES
he Wireless Sensor Networks (WSNs) have spread its roots in almost every application. Owing to their scattered nature of sensor nodes, they are more prone to attacks. There are certain applications e.g. military, where sensor data‟s confidentiality requirement during transmission is essential. Cryptography has a vital role for achieving security in WSNs.WSN has resource constraints like memory size, processing speed and energy consumption which bounds the applicability of existing cryptographic algorithms for WSN. Any good security algorithms has higher energy consumption by the nodes, so it‟s a need to choose most energy-efficient cryptographic encryption algorithms for WSNs. This paper surveys different asymmetric algorithms such as RSA, Diffie-Hellman, DSA, ECC, hybrid and DNA cryptography. These algorithms are compared based on their key size, strength, weakness, attacks and possible countermeasures in the form of table.
This document discusses various techniques for improving web browser security and detecting phishing attacks, including:
1. Phishing toolbars that use heuristics and community ratings to identify fraudulent sites, but studies found they only identified around 40% of phishing sites on average.
2. Password hashing extensions that hash passwords on the client-side with the domain name to prevent stolen passwords from being reused across sites.
3. Dynamic security skins and trusted windows that aim to simplify two-factor authentication by generating one-time passwords on the client-side using shared secrets or hardware tokens.
4. Using phone-based client certificates to add an extra layer of authentication, but this faces challenges with browser and hardware
Key aggregate searchable encryption (kase) for group data sharing via cloud s...LeMeniz Infotech
Key aggregate searchable encryption (kase) for group data sharing via cloud storage
Do Your Projects With Technology Experts
To Get this projects Call : 9566355386 / 99625 88976
Visit : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
The document discusses secure data sharing in cloud storage using a key-aggregate cryptosystem (KAC) which allows efficient delegation of decryption rights for any set of ciphertexts. KAC produces constant size ciphertexts and allows any set of secret keys to be aggregated into a single key encompassing the power of the keys being aggregated. This aggregate key can then be sent to others for decryption of the ciphertext set while keeping files outside the set confidential.
Different date block size using to evaluate the performance between different...IJCNCJournal
The different computer networks whether wired or wireless are becoming more popular with its high
security aspect. Different security algorithms and technique are using to avoid any aforementioned attacks.
One of these technique is a cryptography technique that makes the data as unreadable during the transfer
hence; there is no chance to reclaim the information. Presently, most of the users are using various media
types and internet to transfer the data but, it has the chance to retrieve the data by using these media types.
The perfect solution for this problem is to provide security on time-to-time basis; this stage is always
significant to the security related community discussions. This paper explains the comparison between the
run time of three different encryption algorithms which are DES, AES and Blowfish The compression
includes using different modes, data block size and different operation modes. As a result, Blowfish
algorithm followed by AES take less time for running compared to DES.
Survey of Security Threats and Protection Techniques in Mobile Ad Hoc Networksdrsrinivasanvenkataramani
This document summarizes various security threats and protection techniques in mobile ad hoc networks (MANETs). It discusses several proposed solutions, including those based on cryptography using public/private keys, trusted certificate servers, detecting node capture and forged routing messages, watchdog mechanisms to detect misbehaving nodes, using route request packets to establish secure routes, redundant routing messages to detect attacks, reputation-based approaches, and using firewalls. The document provides an overview of the key challenges in securing MANETs and surveys different existing approaches, their advantages and limitations.
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...IJECEIAES
he Wireless Sensor Networks (WSNs) have spread its roots in almost every application. Owing to their scattered nature of sensor nodes, they are more prone to attacks. There are certain applications e.g. military, where sensor data‟s confidentiality requirement during transmission is essential. Cryptography has a vital role for achieving security in WSNs.WSN has resource constraints like memory size, processing speed and energy consumption which bounds the applicability of existing cryptographic algorithms for WSN. Any good security algorithms has higher energy consumption by the nodes, so it‟s a need to choose most energy-efficient cryptographic encryption algorithms for WSNs. This paper surveys different asymmetric algorithms such as RSA, Diffie-Hellman, DSA, ECC, hybrid and DNA cryptography. These algorithms are compared based on their key size, strength, weakness, attacks and possible countermeasures in the form of table.
This document discusses various techniques for improving web browser security and detecting phishing attacks, including:
1. Phishing toolbars that use heuristics and community ratings to identify fraudulent sites, but studies found they only identified around 40% of phishing sites on average.
2. Password hashing extensions that hash passwords on the client-side with the domain name to prevent stolen passwords from being reused across sites.
3. Dynamic security skins and trusted windows that aim to simplify two-factor authentication by generating one-time passwords on the client-side using shared secrets or hardware tokens.
4. Using phone-based client certificates to add an extra layer of authentication, but this faces challenges with browser and hardware
Key aggregate searchable encryption (kase) for group data sharing via cloud s...LeMeniz Infotech
Key aggregate searchable encryption (kase) for group data sharing via cloud storage
Do Your Projects With Technology Experts
To Get this projects Call : 9566355386 / 99625 88976
Visit : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
The document proposes two novel techniques for authenticating short encrypted messages in mobile and pervasive computing applications. The techniques aim to be more efficient than existing message authentication codes by utilizing the security provided by the underlying encryption algorithm. Specifically, one technique appends a short random string during authentication to benefit from unconditional security without managing long keys. The second technique further improves efficiency by leveraging block cipher-based encryption. Security analyses show the techniques meet confidentiality and integrity requirements for authenticated encryption.
This document discusses image cryptography using the RSA algorithm. It begins with an abstract that provides an overview of encrypting images through a combination of RSA encryption and a 2-bit rotation mechanism. The document then reviews literature on modifications made to the original RSA algorithm. It discusses current applications of RSA, including uses in email encryption, cloud services, and digital signatures. The design architecture and working of the RSA algorithm are explained. The document concludes that image encryption using RSA is efficient and secure, though further research is needed to develop quantum-resistant encryption systems.
Key Management Scheme for Secure Group Communication in WSN with Multiple Gr...csandit
Security is one of the inherent challenges in the area of Wireless Sensor Network (WSN). At
present, majority of the security protocols involve massive iterations and complex steps of
encryptions thereby giving rise to degradation of quality of service. Many WSN applications are
based on secure group communication. In this paper, we have proposed a scheme for secure
group key management with simultaneous multiple groups. The scheme uses a key-based
approach for managing the groups and we show that membership change events can be
handled with less storage, communication and computation cost. The scheme also offers
authentication to the messages communicated within and among the groups.
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUDNaseem nisar
1. EASiER proposes an encryption-based access control architecture for social networks that uses attribute-based encryption. It introduces a minimally trusted proxy to enable efficient revocation without reissuing keys.
2. Multi-authority attribute based encryption schemes allow multiple authorities to issue secret keys for attributes. This is useful in applications with attributes managed by different authorities.
3. Existing social network privacy architectures focus on encryption-based access control but do not address efficient revocation of users or attributes. EASiER addresses this issue.
Efficient authentication for mobile and pervasive computingIGEEKS TECHNOLOGIES
This document proposes two novel techniques for authenticating short encrypted messages for mobile and pervasive applications. Existing message authentication codes (MACs) are not designed to utilize encryption functionality and are inefficient for short messages. The proposed techniques are more efficient by using the encryption process to generate authentication information, rather than applying encryption and a MAC separately. The first technique appends a short random string during encryption for authentication. The second improves on this by leveraging properties of block ciphers. Analysis shows the techniques provide security while maintaining efficiency needed for mobile applications.
Security Issues related with cloud computingIJERA Editor
The term CLOUD means Common Location Independent Online Utility on Demand. It‟s an emerging technology in IT industries. Cloud technologies are improving day by day and now it become a need for all small and large scale industries. Companies like Google, Amazon, Microsoft etc. is providing virtualized environment for user by which it omits the need for physical storage and others. But as the advantage of cloud computing is increasing day by day the issues are also threatening the IT industries. These issues related with the security of the data. The basic idea of this review paper is to elaborate the security issues related with cloud computing and what methods are implemented to improve these security. Certain algorithms like RSA, DES, and Ceaser Cipher etc. implemented to improve the security issues. In this paper we have implemented Identity based mRSA algorithm in this paper for improving security of data.
File transfer using cryptography techniquesmiteshkumar82
The document discusses implementing IT auditing mechanisms for cloud computing applications to ensure security. It proposes using checklists based on cloud computing deployment and service models to audit the lifecycle of cloud applications like customer relationship management. The goal is to present implications for large enterprises and achieve desired security levels by designing and implementing IT auditing techniques. Practical investigations show IT auditing can assure security, regulations, and compliance for enterprise applications in the cloud.
Security analysis of fbdk block cipher for digital imageseSAT Journals
Abstract Network security is one of the major concerns in the modern world. In this regard, a strong security technique is required to protect user data. Cryptography techniques plays an important role in secured transmission through encryption of data and thus ensuring integrity, authenticity, confidentiality of information. Several encryption algorithms have been proposed like AES (Advanced Encryption Standard), DES (Data Encryption Standard) and RSA. These provide very good encryption for text applications. However, these encryption schemes appear not to be ideal for image applications. Some algorithms like GKSBC and RC6 provide very good encryption for digital images. New techniques are emerging that are aimed at providing secured transmission of images over networks. The FBDK (Fixed Block with Dynamic Key Size) block cipher is a new cryptography technique designed using simple operations like XOR, substitutions, circular shifting. The FBDK algorithm is applicable for blocks of any size with key size being dynamic for each block. It does not involve any complex mathematical operations like modular exponentiation. It is a hybrid cryptography technique based on symmetric key and asymmetric key cryptosystems. This paper investigates the security of FBDK block cipher for digital images against brute-force attack, statistical analysis and Differential analysis attacks. In this paper, various security analysis tests has been discussed which are helpful in finding out whether the FBDK encryption algorithm can do secure encryption or not. Experimental results proves the security and efficiency of FBDK cipher for images against all aforementioned types of attacks which justifies its consideration for real time image applications. Keywords: Cryptography, Ciphers, Encryption, Security, and cryptanalysis.
Abstract: In an online security, authentication plays a crucial role in shielding resources against unauthorized and illegal use of information. Authentication processes may differ from simple password based authentication system to complex, costly and computation strengthened authentication systems. In recent days, increasing security has always been an important issue since Internet and Web Development came into actuality. Text based password is not enough to counter such problems, which is also an obsolete approach now. Consequently, this demands the need for something more secure along with being more user-friendly. Therefore, we have strained to rise the security by involving a multiple level security tactic, involving Text based using Cryptography, Grid Authentication and Image Based Password. The cryptography technique is very essential for the text based password while encrypting it with the principle of substitution method like Caesar Cipher. Session passwords are also necessary for eliminating the time factor attacks such as Brute Force attack. Grid Authentication makes the system more dynamic due ever changing nature. Image based authentication makes the system more user friendly, reliable and secure.Keywords: Cryptography, Grid Authentication, Image Based Password, Shoulder Attack.
Title: Multilevel Security and Authentication System
Author: Pratik Anap, Sanjay Gholap, Prasad Anpat, Abhijit Bhapkar
International Journal of Recent Research in Mathematics Computer Science and Information Technology
ISSN 2350-1022
Paper Publications
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...eSAT Journals
This document summarizes a research paper on key-aggregate cryptosystem (KAC) for secure data sharing in cloud storage. KAC allows data owners to efficiently share decryption keys for selected ciphertext classes by generating an aggregate key of constant size. The data owner first encrypts data and generates keys, then can create an aggregate key over a set of ciphertexts to share with others. When received, the aggregate key allows downloading and accessing the selected encrypted data. KAC provides an efficient way to delegate decryption rights for cloud-stored data while maintaining security and flexibility in data sharing.
A Review Paper on Secure authentication and data sharing in cloud storage usi...ijsrd.com
This document summarizes a research paper on secure authentication and data sharing in cloud storage using a key aggregate cryptosystem. It begins with an abstract that describes using public key cryptography to encrypt data and delegate decryption rights for any subset of ciphertexts with a constant size key. It then provides details on the proposed key aggregate cryptosystem, including an introduction, related work comparing it to other solutions, the system architecture, and sections on key aggregate encryption and a conclusion. The key aggregate cryptosystem allows a master key holder to release an aggregate key that decrypts a flexible set of ciphertexts in cloud storage while keeping other files encrypted.
This document summarizes security solutions that have been proposed to counter security threats in mobile ad hoc networks (MANETs). It discusses approaches that use heavy encryption and digital signatures which require significant resources versus simpler trust-based and observation-based methods. It surveys common attack types and solutions for alleviating them. Several specific solutions are described in detail, including using a trusted certificate server, public/private key approaches, detecting node capture through observation of meeting times between nodes, and detecting forged routing messages. The goal is to provide researchers an overview of security issues and different approaches to consider based on their needs and constraints.
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...revathirram
This document summarizes a research paper that proposes a mediated certificateless public key encryption (mCL-PKE) scheme for secure data sharing in cloud storage. The key points are:
1) The mCL-PKE scheme solves problems of key escrow and certificate revocation without using computationally expensive bilinear pairing operations.
2) It uses a security mediator to instantly revoke compromised users and enforce access policies. The mediator also supports partial decryption to preserve data confidentiality.
3) The scheme extends mCL-PKE with an access control list to allow the data owner to encrypt data only once for multiple authorized users, improving efficiency over previous pairing-based schemes.
Analysis of Cryptographic Algorithms for Network SecurityEditor IJCATR
This document discusses and analyzes various cryptographic algorithms used for network security. It begins with definitions of key cryptographic terms like plain text, cipher text, encryption, decryption, and keys. It then describes different types of cryptographic schemes, including symmetric, asymmetric, and hash functions. Specific algorithms are analyzed like DES, AES, RSA, and Diffie-Hellman. Factors to consider when selecting a cryptographic algorithm like speed, memory requirements, security needs, and data type are also discussed. Overall the document provides a comprehensive overview and comparison of cryptographic algorithms and their applications for network security.
File transfer with multiple security mechanismShubham Patil
The system enhances the security and the data confidentiality between the users and receiver by the two-layer encryption mechanism and the QR code for verification. The system consists of three main components which are very important to providing the security between sender and receiver while transmitting the data
This document summarizes several proposed solutions for improving security in mobile ad hoc networks (MANETs). It discusses approaches that use cryptography, trust models, observation-based detection of misbehaving nodes, analyzing routing message semantics, watchdog mechanisms, controlling routing message trust levels, using redundant routing messages, reputation-based models, and firewalls. The document surveys the key techniques proposed in recent literature and discusses their advantages and limitations to provide researchers an overview of the security challenges and approaches in MANETs.
UNIT - 2
SYMMETRIC CIPHERS: Symmetric Cipher Model, Substitution Techniques,
Transposition Techniques, Simplified DES, Data encryption standard (DES), The strength of
DES, Differential and Linear Cryptanalysis, Block Cipher Design Principles and Modes of
Operation, Evaluation Criteria for Advanced Encryption Standard, The AES Cipher.
RSA and RC4 Cryptosystem Performance Evaluation Using Image and TextYekini Nureni
This document compares the performance of the RSA and RC4 encryption algorithms. An application was developed to encrypt text and image files of varying sizes (10-200KB) using RSA and RC4. The encryption time (TE) for each algorithm on each file size was measured and recorded. The results showed that RC4 had significantly faster encryption times than RSA for all file sizes, both for text and image files. However, RSA is considered more securely than RC4. In conclusion, while RSA is more secure, RC4 has better performance and faster encryption/decryption speeds compared to RSA.
This document describes an RSA encryption software project. The software allows users to encrypt images and text for secure transmission. It uses the RSA encryption algorithm with public and private keys. The software has options to encrypt and decrypt files with a password. Screenshots show the user interface for selecting files to encrypt, entering passwords, and viewing encrypted and decrypted files. The document discusses the software's features, how RSA encryption works, and possibilities for future improvements.
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...IRJET Journal
This document proposes a system for efficient and secure attribute-based keyword searching and data deduplication on encrypted cloud data. The system uses attribute-based encryption to allow only authorized users to search and access encrypted data files. A deduplication technique is used to avoid storing duplicate data and save cloud storage space. Search results are ranked using term frequency and inverse document frequency to improve the user search experience. The experimental results show that the proposed system performs better than existing systems in terms of storage space and search time requirements.
The document proposes two novel techniques for authenticating short encrypted messages in mobile and pervasive computing applications. The techniques aim to be more efficient than existing message authentication codes by utilizing the security provided by the underlying encryption algorithm. Specifically, one technique appends a short random string during authentication to benefit from unconditional security without managing long keys. The second technique further improves efficiency by leveraging block cipher-based encryption. Security analyses show the techniques meet confidentiality and integrity requirements for authenticated encryption.
This document discusses image cryptography using the RSA algorithm. It begins with an abstract that provides an overview of encrypting images through a combination of RSA encryption and a 2-bit rotation mechanism. The document then reviews literature on modifications made to the original RSA algorithm. It discusses current applications of RSA, including uses in email encryption, cloud services, and digital signatures. The design architecture and working of the RSA algorithm are explained. The document concludes that image encryption using RSA is efficient and secure, though further research is needed to develop quantum-resistant encryption systems.
Key Management Scheme for Secure Group Communication in WSN with Multiple Gr...csandit
Security is one of the inherent challenges in the area of Wireless Sensor Network (WSN). At
present, majority of the security protocols involve massive iterations and complex steps of
encryptions thereby giving rise to degradation of quality of service. Many WSN applications are
based on secure group communication. In this paper, we have proposed a scheme for secure
group key management with simultaneous multiple groups. The scheme uses a key-based
approach for managing the groups and we show that membership change events can be
handled with less storage, communication and computation cost. The scheme also offers
authentication to the messages communicated within and among the groups.
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUDNaseem nisar
1. EASiER proposes an encryption-based access control architecture for social networks that uses attribute-based encryption. It introduces a minimally trusted proxy to enable efficient revocation without reissuing keys.
2. Multi-authority attribute based encryption schemes allow multiple authorities to issue secret keys for attributes. This is useful in applications with attributes managed by different authorities.
3. Existing social network privacy architectures focus on encryption-based access control but do not address efficient revocation of users or attributes. EASiER addresses this issue.
Efficient authentication for mobile and pervasive computingIGEEKS TECHNOLOGIES
This document proposes two novel techniques for authenticating short encrypted messages for mobile and pervasive applications. Existing message authentication codes (MACs) are not designed to utilize encryption functionality and are inefficient for short messages. The proposed techniques are more efficient by using the encryption process to generate authentication information, rather than applying encryption and a MAC separately. The first technique appends a short random string during encryption for authentication. The second improves on this by leveraging properties of block ciphers. Analysis shows the techniques provide security while maintaining efficiency needed for mobile applications.
Security Issues related with cloud computingIJERA Editor
The term CLOUD means Common Location Independent Online Utility on Demand. It‟s an emerging technology in IT industries. Cloud technologies are improving day by day and now it become a need for all small and large scale industries. Companies like Google, Amazon, Microsoft etc. is providing virtualized environment for user by which it omits the need for physical storage and others. But as the advantage of cloud computing is increasing day by day the issues are also threatening the IT industries. These issues related with the security of the data. The basic idea of this review paper is to elaborate the security issues related with cloud computing and what methods are implemented to improve these security. Certain algorithms like RSA, DES, and Ceaser Cipher etc. implemented to improve the security issues. In this paper we have implemented Identity based mRSA algorithm in this paper for improving security of data.
File transfer using cryptography techniquesmiteshkumar82
The document discusses implementing IT auditing mechanisms for cloud computing applications to ensure security. It proposes using checklists based on cloud computing deployment and service models to audit the lifecycle of cloud applications like customer relationship management. The goal is to present implications for large enterprises and achieve desired security levels by designing and implementing IT auditing techniques. Practical investigations show IT auditing can assure security, regulations, and compliance for enterprise applications in the cloud.
Security analysis of fbdk block cipher for digital imageseSAT Journals
Abstract Network security is one of the major concerns in the modern world. In this regard, a strong security technique is required to protect user data. Cryptography techniques plays an important role in secured transmission through encryption of data and thus ensuring integrity, authenticity, confidentiality of information. Several encryption algorithms have been proposed like AES (Advanced Encryption Standard), DES (Data Encryption Standard) and RSA. These provide very good encryption for text applications. However, these encryption schemes appear not to be ideal for image applications. Some algorithms like GKSBC and RC6 provide very good encryption for digital images. New techniques are emerging that are aimed at providing secured transmission of images over networks. The FBDK (Fixed Block with Dynamic Key Size) block cipher is a new cryptography technique designed using simple operations like XOR, substitutions, circular shifting. The FBDK algorithm is applicable for blocks of any size with key size being dynamic for each block. It does not involve any complex mathematical operations like modular exponentiation. It is a hybrid cryptography technique based on symmetric key and asymmetric key cryptosystems. This paper investigates the security of FBDK block cipher for digital images against brute-force attack, statistical analysis and Differential analysis attacks. In this paper, various security analysis tests has been discussed which are helpful in finding out whether the FBDK encryption algorithm can do secure encryption or not. Experimental results proves the security and efficiency of FBDK cipher for images against all aforementioned types of attacks which justifies its consideration for real time image applications. Keywords: Cryptography, Ciphers, Encryption, Security, and cryptanalysis.
Abstract: In an online security, authentication plays a crucial role in shielding resources against unauthorized and illegal use of information. Authentication processes may differ from simple password based authentication system to complex, costly and computation strengthened authentication systems. In recent days, increasing security has always been an important issue since Internet and Web Development came into actuality. Text based password is not enough to counter such problems, which is also an obsolete approach now. Consequently, this demands the need for something more secure along with being more user-friendly. Therefore, we have strained to rise the security by involving a multiple level security tactic, involving Text based using Cryptography, Grid Authentication and Image Based Password. The cryptography technique is very essential for the text based password while encrypting it with the principle of substitution method like Caesar Cipher. Session passwords are also necessary for eliminating the time factor attacks such as Brute Force attack. Grid Authentication makes the system more dynamic due ever changing nature. Image based authentication makes the system more user friendly, reliable and secure.Keywords: Cryptography, Grid Authentication, Image Based Password, Shoulder Attack.
Title: Multilevel Security and Authentication System
Author: Pratik Anap, Sanjay Gholap, Prasad Anpat, Abhijit Bhapkar
International Journal of Recent Research in Mathematics Computer Science and Information Technology
ISSN 2350-1022
Paper Publications
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...eSAT Journals
This document summarizes a research paper on key-aggregate cryptosystem (KAC) for secure data sharing in cloud storage. KAC allows data owners to efficiently share decryption keys for selected ciphertext classes by generating an aggregate key of constant size. The data owner first encrypts data and generates keys, then can create an aggregate key over a set of ciphertexts to share with others. When received, the aggregate key allows downloading and accessing the selected encrypted data. KAC provides an efficient way to delegate decryption rights for cloud-stored data while maintaining security and flexibility in data sharing.
A Review Paper on Secure authentication and data sharing in cloud storage usi...ijsrd.com
This document summarizes a research paper on secure authentication and data sharing in cloud storage using a key aggregate cryptosystem. It begins with an abstract that describes using public key cryptography to encrypt data and delegate decryption rights for any subset of ciphertexts with a constant size key. It then provides details on the proposed key aggregate cryptosystem, including an introduction, related work comparing it to other solutions, the system architecture, and sections on key aggregate encryption and a conclusion. The key aggregate cryptosystem allows a master key holder to release an aggregate key that decrypts a flexible set of ciphertexts in cloud storage while keeping other files encrypted.
This document summarizes security solutions that have been proposed to counter security threats in mobile ad hoc networks (MANETs). It discusses approaches that use heavy encryption and digital signatures which require significant resources versus simpler trust-based and observation-based methods. It surveys common attack types and solutions for alleviating them. Several specific solutions are described in detail, including using a trusted certificate server, public/private key approaches, detecting node capture through observation of meeting times between nodes, and detecting forged routing messages. The goal is to provide researchers an overview of security issues and different approaches to consider based on their needs and constraints.
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...revathirram
This document summarizes a research paper that proposes a mediated certificateless public key encryption (mCL-PKE) scheme for secure data sharing in cloud storage. The key points are:
1) The mCL-PKE scheme solves problems of key escrow and certificate revocation without using computationally expensive bilinear pairing operations.
2) It uses a security mediator to instantly revoke compromised users and enforce access policies. The mediator also supports partial decryption to preserve data confidentiality.
3) The scheme extends mCL-PKE with an access control list to allow the data owner to encrypt data only once for multiple authorized users, improving efficiency over previous pairing-based schemes.
Analysis of Cryptographic Algorithms for Network SecurityEditor IJCATR
This document discusses and analyzes various cryptographic algorithms used for network security. It begins with definitions of key cryptographic terms like plain text, cipher text, encryption, decryption, and keys. It then describes different types of cryptographic schemes, including symmetric, asymmetric, and hash functions. Specific algorithms are analyzed like DES, AES, RSA, and Diffie-Hellman. Factors to consider when selecting a cryptographic algorithm like speed, memory requirements, security needs, and data type are also discussed. Overall the document provides a comprehensive overview and comparison of cryptographic algorithms and their applications for network security.
File transfer with multiple security mechanismShubham Patil
The system enhances the security and the data confidentiality between the users and receiver by the two-layer encryption mechanism and the QR code for verification. The system consists of three main components which are very important to providing the security between sender and receiver while transmitting the data
This document summarizes several proposed solutions for improving security in mobile ad hoc networks (MANETs). It discusses approaches that use cryptography, trust models, observation-based detection of misbehaving nodes, analyzing routing message semantics, watchdog mechanisms, controlling routing message trust levels, using redundant routing messages, reputation-based models, and firewalls. The document surveys the key techniques proposed in recent literature and discusses their advantages and limitations to provide researchers an overview of the security challenges and approaches in MANETs.
UNIT - 2
SYMMETRIC CIPHERS: Symmetric Cipher Model, Substitution Techniques,
Transposition Techniques, Simplified DES, Data encryption standard (DES), The strength of
DES, Differential and Linear Cryptanalysis, Block Cipher Design Principles and Modes of
Operation, Evaluation Criteria for Advanced Encryption Standard, The AES Cipher.
RSA and RC4 Cryptosystem Performance Evaluation Using Image and TextYekini Nureni
This document compares the performance of the RSA and RC4 encryption algorithms. An application was developed to encrypt text and image files of varying sizes (10-200KB) using RSA and RC4. The encryption time (TE) for each algorithm on each file size was measured and recorded. The results showed that RC4 had significantly faster encryption times than RSA for all file sizes, both for text and image files. However, RSA is considered more securely than RC4. In conclusion, while RSA is more secure, RC4 has better performance and faster encryption/decryption speeds compared to RSA.
This document describes an RSA encryption software project. The software allows users to encrypt images and text for secure transmission. It uses the RSA encryption algorithm with public and private keys. The software has options to encrypt and decrypt files with a password. Screenshots show the user interface for selecting files to encrypt, entering passwords, and viewing encrypted and decrypted files. The document discusses the software's features, how RSA encryption works, and possibilities for future improvements.
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...IRJET Journal
This document proposes a system for efficient and secure attribute-based keyword searching and data deduplication on encrypted cloud data. The system uses attribute-based encryption to allow only authorized users to search and access encrypted data files. A deduplication technique is used to avoid storing duplicate data and save cloud storage space. Search results are ranked using term frequency and inverse document frequency to improve the user search experience. The experimental results show that the proposed system performs better than existing systems in terms of storage space and search time requirements.
AWS Cloud Based Encryption Decryption SystemIRJET Journal
This document describes an AWS cloud-based encryption and decryption system. The system uses a web app that allows users to easily encrypt and decrypt files for added security and privacy. Files are encrypted using the XOR cipher and SHA-512 hashing algorithm, making them very difficult to decrypt without the proper password. Encrypted files can only be decrypted using the web app. The system aims to increase security awareness and provide a simple encryption tool for common users to protect their confidential data.
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET Journal
This document proposes a novel approach to implementing data deduplication on the cloud using message locked encryption. It aims to overcome limitations of existing deduplication techniques like convergent encryption by using erasure code technology, encryption algorithms like DES and MD5 hashing, and tokenization to securely store and protect client data on the cloud. The proposed system gives clients proof of ownership of their data by allowing them to choose who can access their files and see any changes made over time. The system architecture involves a client uploading encrypted data to the cloud, and recipients selected by the client being able to access and retrieve encrypted pieces of the data.
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...Editor IJCATR
The Data sharing is an important functionality in cloud storage. In this article, we show how to securely, efficiently, and
flexibly share data with others in cloud storage. We describe new public-key cryptosystems which produce constant-size ciphertexts
such that efficient delegation of decryption rights for any set of ciphertexts are possible. The novelty is that one can aggregate any set
of secret keys and make them as compact as a single key, but encompassing the power of all the keys being aggregated. In other
words, the secret key holder can release a constant-size aggregate key for flexible choices of ciphertext set in cloud storage, but the
other encrypted files outside the set remain confidential. This compact aggregate key can be conveniently sent to others or be stored in
a smart card with very limited secure storage. We provide formal security analysis of our schemes in the standard model. We also
describe other application of our schemes. In particular, our schemes give the first public-key patient controlled encryption for flexible
hierarchy, which was yet to be known.
Multi-part Dynamic Key Generation For Secure Data EncryptionCSCJournals
Storage of user or application-generated user-specific private, confidential data on a third party storage provider comes with its own set of challenges. Although such data is usually encrypted while in transit, securely storing such data at rest presents unique security challenges. The first challenge is the generation of encryption keys to implement the desired threat containment. The second challenge is secure storage and management of these keys. This can be accomplished in several ways. A naive approach can be to trust the boundaries of a secure network and store the keys within these bounds in plain text. A more sophisticated method can be devised to calculate or infer the encryption key without explicitly storing it. This paper focuses on the latter approach. Additionally, the paper also describes the implementation of a system that in addition to exposing a set of REST APIs for secure CRUD operations also provides a means for sharing the data among specific users.
1. The document proposes a system for secure user authentication and access control for encrypted data stored in the cloud. It aims to address issues with centralized access control and storing data in plaintext.
2. The proposed system uses a key distribution center to generate public, private, and access keys for authentication at different levels. Data is encrypted before being fragmented and distributed across multiple servers.
3. Only authorized users with proper keys can decrypt the data. Access policies set by data creators restrict which users can access files. Storing encrypted and distributed data along with key-based authentication aims to improve security over existing cloud storage systems.
Privacy preserving multi-keyword ranked search over encrypted cloud dataIGEEKS TECHNOLOGIES
This document proposes a system called privacy-preserving multi-keyword ranked search over encrypted cloud data (MRSE). Existing searchable encryption systems only support single-keyword or boolean keyword search without result ranking. The proposed MRSE system allows a user to search for multiple keywords and returns documents ranked by relevance. It establishes privacy requirements and uses an efficient "coordinate matching" semantic to quantify document similarity based on keyword matches. The system architecture includes modules for data owners to encrypt and upload files, for users to search and download encrypted files, and for ranking search results.
Privacy preserving multi-keyword ranked search over encrypted cloud dataIGEEKS TECHNOLOGIES
This document proposes a system called privacy-preserving multi-keyword ranked search over encrypted cloud data (MRSE). Existing searchable encryption systems only support single-keyword or boolean keyword search without result ranking. The proposed MRSE system allows multi-keyword searches over encrypted cloud data and ranks the results based on relevance to the search keywords. It establishes privacy requirements and uses an efficient "coordinate matching" semantic to capture document relevance. The system architecture includes modules for data users, owners, file upload/download and rank search over encrypted data.
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...IRJET Journal
The document summarizes a proposed system for multi-keyword search over encrypted data in cloud computing. It aims to retrieve the top k most relevant documents matching a user's query while preserving data privacy. The system uses Lucene indexing to build an index of keywords extracted from outsourced documents. When documents are added or removed, the index is updated. A top-k query technique ranks document relevance and returns the top matching results. Encryption is done using the Blowfish algorithm before documents are outsourced to the untrusted cloud server. This allows efficient search over the encrypted data based on keyword queries.
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET Journal
This document discusses using homomorphic encryption to securely store and process data in the cloud. It begins with an introduction to cloud computing and data security challenges. The proposed system would encrypt user data before transferring it to the cloud server using homomorphic encryption. This allows computations to be performed on the encrypted data without decrypting it first, protecting data privacy. The document reviews related work on authentication schemes and secure file storage using encryption. It presents the proposed system architecture and concludes that homomorphic encryption can help address cloud computing security issues by allowing operations on encrypted user data.
Improving Efficiency of Security in Multi-CloudIJTET Journal
Abstract--Due to risk in service availability failure and the possibilities of malicious insiders in the single cloud, a movement towards “Multi-clouds” has emerged recently. In general a multi-cloud security system there is a possibility for third party to access the user files. Ensuring security in this stage has become tedious since, most of the activities are done in network. In this paper, an enhanced security methodology has been introduced in order to make the data stored in cloud more secure. Duple authentication process introduced in this concept defends malicious insiders and shields the private data. Various disadvantages in traditional systems like unauthorized access, hacking have been overcome in this proposed system and a comparison made with the traditional systems in terms of performance and computational time have shown better results.
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET Journal
This document discusses various cryptographic techniques for securing data shared over cloud computing. It begins with an introduction to cloud computing and the types of cloud services. It then discusses some critical threats to cloud security like unauthorized access, lack of integrity checks, and denial of service attacks. The document analyzes popular encryption algorithms like RSA, AES, DES, Blowfish and IDEA that can be applied for cloud data security. It provides details on how each algorithm works and compares their characteristics. The document concludes that a multilevel security architecture applying multiple encryption algorithms is needed to securely transmit data over the cloud.
The document proposes a secure client-side deduplication scheme called KeyD that uses identity-based broadcast encryption instead of independent key management to effectively manage convergent keys for deduplication. KeyD ensures data confidentiality and convergent key security while providing ownership privacy. Experimental results show that KeyD achieves better tradeoffs between storage costs, communication overhead, and computation overhead compared to traditional deduplication schemes.
IRJET- Storage Security in Cloud ComputingIRJET Journal
This document summarizes a research paper that proposes a dual encryption method for securing data in cloud computing. The method first encrypts data files using the AES symmetric encryption algorithm, producing ciphertext-1. It then encrypts ciphertext-1 again using the Blowfish asymmetric encryption algorithm with a randomly generated key, producing ciphertext-2. This double encryption makes the data more secure, as an attacker would need to decrypt both ciphers to access the original content. The method aims to protect sensitive data from hackers and provide stronger security for cloud storage compared to single encryption algorithms.
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...Yashwanth Reddy
This document proposes a revocable-storage identity-based encryption (RS-IBE) scheme to provide secure data sharing in cloud computing. It discusses the system architecture, modules, UML diagrams, and testing process. The key components are the data provider, cloud users, and auditor. The data provider encrypts and uploads data to the cloud, and can later revoke access and update ciphertexts. Cloud users search for files and request decryption keys from the auditor. The auditor generates and provides the necessary keys. The document presents formal definitions for RS-IBE and describes a prototype implementation to demonstrate the approach.
Semantic annotation, which is considered one of the semantic web applicative aspects, has been adopted by researchers from different communities as a paramount solution that improves searching and retrieval of information by promoting the richness of the content. However, researchers are facing challenges concerning both the quality and the relevance of the semantic annotations attached to the annotated document against its content as well as its semantics, without ignoring those regarding automation process which is supposed to ensure an optimal system for information indexing and retrieval. In this article, we will introduce the semantic annotation concept by presenting a state of the art including definitions, features and a classification of annotation systems. Systems and proposed approaches in the field will be cited, as well as a study of some existing annotation tools. This study will also pinpoint various problems and limitations related to the annotation in order to offer solutions for our future work.
Linux is poised to replace Windows NT as the dominant server operating system of choice. Linux offers a cheaper, more versatile, scalable, and reliable server solution compared to NT. It meets or exceeds all user requirements provided by NT. As a free and open-source multi-vendor platform, Linux is growing in popularity for network services. Linux will likely surpass NT adoption in most server applications as businesses seek more cost-effective options.
Data Sharing: Ensure Accountability Distribution in the CloudSuraj Mehta
The document proposes a system for ensuring distributed accountability and security for user data stored in the cloud. The system encrypts user data and wraps it in a JAR file along with access policies. It uses DES for encryption, RSA for JAR file security, and MD5 for authentication. Log records of access are generated, encrypted, and stored in log files. A log harmonizer tracks the logs and can push or pull them to ensure the data owner's data is secure. The system aims to provide accountability, enforce access controls, and prevent attacks like copying or disassembling protected data.
This document summarizes a research paper that proposes a security architecture for cloud computing that dynamically configures cryptographic algorithms and keys based on security policies and inputs like network access risk and data sensitivity. The architecture aims to improve security while reducing costs by only using the necessary level of encryption for each situation. It describes using the Blowfish algorithm instead of AES and adjusting the key size from 128 to 448 bits depending on factors like network type and data size. Results show Blowfish has better performance than AES, especially with larger keys on larger amounts of data. The goal is to provide flexible, efficient security tailored to each user's needs.
Similar to A NETWORK CODING AND DES BASED DYNAMIC ENCRYPTION SCHEME FOR MOVING TARGET DEFENSE (20)
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEMHODECEDSIET
Time Division Multiplexing (TDM) is a method of transmitting multiple signals over a single communication channel by dividing the signal into many segments, each having a very short duration of time. These time slots are then allocated to different data streams, allowing multiple signals to share the same transmission medium efficiently. TDM is widely used in telecommunications and data communication systems.
### How TDM Works
1. **Time Slots Allocation**: The core principle of TDM is to assign distinct time slots to each signal. During each time slot, the respective signal is transmitted, and then the process repeats cyclically. For example, if there are four signals to be transmitted, the TDM cycle will divide time into four slots, each assigned to one signal.
2. **Synchronization**: Synchronization is crucial in TDM systems to ensure that the signals are correctly aligned with their respective time slots. Both the transmitter and receiver must be synchronized to avoid any overlap or loss of data. This synchronization is typically maintained by a clock signal that ensures time slots are accurately aligned.
3. **Frame Structure**: TDM data is organized into frames, where each frame consists of a set of time slots. Each frame is repeated at regular intervals, ensuring continuous transmission of data streams. The frame structure helps in managing the data streams and maintaining the synchronization between the transmitter and receiver.
4. **Multiplexer and Demultiplexer**: At the transmitting end, a multiplexer combines multiple input signals into a single composite signal by assigning each signal to a specific time slot. At the receiving end, a demultiplexer separates the composite signal back into individual signals based on their respective time slots.
### Types of TDM
1. **Synchronous TDM**: In synchronous TDM, time slots are pre-assigned to each signal, regardless of whether the signal has data to transmit or not. This can lead to inefficiencies if some time slots remain empty due to the absence of data.
2. **Asynchronous TDM (or Statistical TDM)**: Asynchronous TDM addresses the inefficiencies of synchronous TDM by allocating time slots dynamically based on the presence of data. Time slots are assigned only when there is data to transmit, which optimizes the use of the communication channel.
### Applications of TDM
- **Telecommunications**: TDM is extensively used in telecommunication systems, such as in T1 and E1 lines, where multiple telephone calls are transmitted over a single line by assigning each call to a specific time slot.
- **Digital Audio and Video Broadcasting**: TDM is used in broadcasting systems to transmit multiple audio or video streams over a single channel, ensuring efficient use of bandwidth.
- **Computer Networks**: TDM is used in network protocols and systems to manage the transmission of data from multiple sources over a single network medium.
### Advantages of TDM
- **Efficient Use of Bandwidth**: TDM all
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSIJNSA Journal
The smart irrigation system represents an innovative approach to optimize water usage in agricultural and landscaping practices. The integration of cutting-edge technologies, including sensors, actuators, and data analysis, empowers this system to provide accurate monitoring and control of irrigation processes by leveraging real-time environmental conditions. The main objective of a smart irrigation system is to optimize water efficiency, minimize expenses, and foster the adoption of sustainable water management methods. This paper conducts a systematic risk assessment by exploring the key components/assets and their functionalities in the smart irrigation system. The crucial role of sensors in gathering data on soil moisture, weather patterns, and plant well-being is emphasized in this system. These sensors enable intelligent decision-making in irrigation scheduling and water distribution, leading to enhanced water efficiency and sustainable water management practices. Actuators enable automated control of irrigation devices, ensuring precise and targeted water delivery to plants. Additionally, the paper addresses the potential threat and vulnerabilities associated with smart irrigation systems. It discusses limitations of the system, such as power constraints and computational capabilities, and calculates the potential security risks. The paper suggests possible risk treatment methods for effective secure system operation. In conclusion, the paper emphasizes the significant benefits of implementing smart irrigation systems, including improved water conservation, increased crop yield, and reduced environmental impact. Additionally, based on the security analysis conducted, the paper recommends the implementation of countermeasures and security approaches to address vulnerabilities and ensure the integrity and reliability of the system. By incorporating these measures, smart irrigation technology can revolutionize water management practices in agriculture, promoting sustainability, resource efficiency, and safeguarding against potential security threats.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
Comparative analysis between traditional aquaponics and reconstructed aquapon...bijceesjournal
The aquaponic system of planting is a method that does not require soil usage. It is a method that only needs water, fish, lava rocks (a substitute for soil), and plants. Aquaponic systems are sustainable and environmentally friendly. Its use not only helps to plant in small spaces but also helps reduce artificial chemical use and minimizes excess water use, as aquaponics consumes 90% less water than soil-based gardening. The study applied a descriptive and experimental design to assess and compare conventional and reconstructed aquaponic methods for reproducing tomatoes. The researchers created an observation checklist to determine the significant factors of the study. The study aims to determine the significant difference between traditional aquaponics and reconstructed aquaponics systems propagating tomatoes in terms of height, weight, girth, and number of fruits. The reconstructed aquaponics system’s higher growth yield results in a much more nourished crop than the traditional aquaponics system. It is superior in its number of fruits, height, weight, and girth measurement. Moreover, the reconstructed aquaponics system is proven to eliminate all the hindrances present in the traditional aquaponics system, which are overcrowding of fish, algae growth, pest problems, contaminated water, and dead fish.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
A NETWORK CODING AND DES BASED DYNAMIC ENCRYPTION SCHEME FOR MOVING TARGET DEFENSE
1. A NETWORK CODING AND DES BASED
DYNAMIC ENCRYPTION SCHEME FOR
MOVING TARGET DEFENSE
BY
Y.MOHAN SAI KRISHNA (15831A1260)
P.GANGA BHAVANI (15831A1248)
P.AKHIL KUMAR (15831A1244)
P.BHUVANA (15831A1245)
UNDER THE GUIDANCE OF
B.SWETHA
ASSISTANT PROFESSOR
3. ABSTRACT
Not in the least like prior undertakings in cyber security investigate, a dynamic
insurance speculation, called moving target protect (MTD), grows the
multifaceted nature and costs for attacks by sufficiently binding the vulnerability
presentation and the ambush openings through various industriously developing
appraisal, progression parts and procedure. Data Encryption Standard (DES) was
the set up plan of the standard symmetric-key encryption designs. By and by it has
been well ordered supplanted by the triple DES or AES so that the encoder has a
greater key space. Nevertheless, both the triple DES and AES can't meet the
dynamic security necessities of dynamic obstruction as a result of their static
extension to the key space. In this paper, we propose a dynamic 3-layer
encryption scheme in light of DES and framework coding, with a low-
multifaceted design mostly key invigorate instrument. In perspective of the
theoretical examination, the new arrangement is seemed to have the favorable
position to achieve a dynamic change among viability and security, which grows
its adaptability to various computerized conditions. The multiplication comes to
fruition moreover show that the running extent of the new arrangement is by and
large lower than or proportionate to the triple DES.
5. USER INTERFACE DESIGN
In this module we design the windows for the project .These
windows are used for secure login for all users. To connect with
server user must give their username and password then only they
can able to connect the server. If the user already exits directly can
login into the server else user must register their details such as
username, password and Email id, into the server. Server will create
the account for the entire user to maintain upload and download
rate. Name will be set as user id. Logging in is usually used to enter
a specific page.
7. 7
ADMIN
This is the first module of this project. In this module admin can login.
Admin will see the details of data owners and users. Admin has information
about files, and he need to protect the keys from attacker by updating the
file keys regularly. Admin need to approve the file request from user and
send to data owner to give permission to access the files. Admin will see the
attacker details, users who will access the files without data owner
permission.
9. DATA OWNER
This is the second module of this project. In this module data owner
should login. Data owner will upload the files. Those files are split into
multiple parts and then triple encrypted and stored into the database. If
any user want to access that files then data owner need to provide the
keys for that file. If admin accept the users request to access the file then
data owner will provide the keys for that file.
11. MOVING TARGET DEFENSE
This is the third module of the project. In this module file uploaded by the
data owner will split into multiple parts, then first the content will
encoded in the network, then it will undergo DES encryption, then again
that encrypted data is encoded, and then store in the database. And admin
need to modify the keys to protect the data from the attackers. He will
alter the key size also.
13. USER
This is the fifth module of this project. In this module user need to register
and then login. Then user can search the files based on the file name. If the
file exist it will display, else it show the message that file not exist. The file
available, then user will download the file, which is triple encrypted format.
So, then user required the keys to decrypt the file. So, user will send the
request to provide the keys. Then admin will accept his request. Some
updated keys will display to the user, at the time user try to download
original file multiple times then user treated as attacker. Data owner will
provide the keys for file then user can download the original file.
15. EXISTING SYSTEM
Nowadays, network security configurations are typically deterministic,
static and homogeneous.
File Data may easily hacked or theft by the untrusted Server.
Thus, the attackers take the asymmetric advantages of building up,
launching and spreading attacks, and the defenders are at a passive position.
The existing defense mechanisms and approaches cannot reverse this
situation.
16. DRAWBACKS
• Can Upload Single Data at a time.
• Produce Single key for Security of each parameters.
17. PROPOSED SYSTEM
• The outsourced computation data is more secured.
• The publicly and efficiently verify the inner product evaluation over the
outsourced data streams under multiple keys still make more security and
accessing data is efficient.
• Here admin will upload all the details about that content.
• If any user wants they have to send a request. if admin accept they will
provide 4 keys with file if the user enter that key exactly then only that
original content will be decrypt.
• Them only the file will be full and securely we can transfer to user.
20. SYSTEM REQUIREMENTS
HARDWARE
PROCESSOR : DUAL CORE DUOS
RAM : 4GB DD RAM
HARD DISK : 250 GB
SOFTWARE
FRONT END : JAVA (J2EE,SERVLETS)
BACK END : MY SQL
OPERATING SYSTEM : WINDOWS 07
IDE : NET BEANS, ECLIPSE
21. LITERATURE SURVEY
• Title: Moving Target Defense Creating Asymmetric Uncertainty For
Cyber Threats
• Author: S. Jajodia
• Year: 2011
• Description: Excellent book is always being the best friend for spending
little time in your office, night time, bus, and everywhere. It will be a good
way to just look, open, and read the book while in that time. As known,
experience and skill don't always come with the much money to acquire
them. Reading this book with the PDF moving target defense creating
asymmetric uncertainty for cyber threats will let you know more things.
• As known, adventure and experience about lesson, entertainment, and
knowledge can be gained by only reading a book. Even it is not directly
done, you can know more about this life, about the world. We offer you
this proper and easy way to gain those all. We offer many book collections
from fictions to science at all. One of them is this moving target defense
creating asymmetric uncertainty for cyber threats that can be your partner.
22. • Title: Moving Target Defense II: Application of Game Theory and
Adversarial Modeling
• Author: S. Jajodia
• Year: 2013
• Description: Our cyber defenses are static and are governed by lengthy
processes, e.g., for testing and security patch deployment. Adversaries could
plan their attacks carefully over time and launch attacks at cyber speeds at any
given moment. We need a new class of defensive strategies that would force
adversaries to continually engage in reconnaissance and re-planning of their
cyber operations. One such strategy is to present adversaries with a moving
target where the attack surface of a system keeps changing. Moving Target
Defense II: Application of Game Theory and Adversarial Modeling includes
contributions from world experts in the cyber security field. In the first volume
of MTD, we presented MTD approaches based on software transformations,
and MTD approaches based on network and software stack configurations. In
this second volume of MTD, a group of leading researchers describe game
theoretic, cyber maneuver, and software transformation approaches for
constructing and analyzing MTD systems. Designed as a professional book for
practitioners and researchers working in the cyber security field, advanced -
level students and researchers focused on computer science will also find this
book valuable as a secondary text book or reference.
23. • Title: Linear Network Coding: Theory and Algorithms
• Author: Shuo-Yen Robert Li
• Year: 2011
• Description: Network coding is a new paradigm in data transport that combines
coding with data propagation over a network. Theory of linear network coding
(LNC) adopts a linear coding scheme at every node of the network and promises
the optimal data transmission rate from the source to all receivers. Linearity
enhances the theoretic elegance and engineering simplicity, which leads to wide
applicability. This paper reviews the basic theory of LNC and construction
algorithms for optimal linear network codes. Exemplifying applications are
presented, including random LNC. The fundamental theorem of LNC applies to
only acyclic networks, but practical applications actually ignore the acyclic
restriction. The theoretic justification for this involves convolutional network
coding (CNC), which, however, incurs the difficulty of precise synchronization.
The problem can be alleviated when CNC is generalized by selecting an
appropriate structure in commutative algebra for data units. This paper tries to
present the necessary algebraic concepts as much as possible in engineering
language.