SlideShare a Scribd company logo
A Novel Approach to Provide the Security for
Distributed Adaptive Networks Using RSA
Algorithm
ABSTRACT
Information security in distributed systems and the use of networks for carrying data
between computers is a major factor that has affected security. In this paper, we discuss
security and propose security metrics issues in the context of Adaptive Distributed Systems
[ADS]. A key premise of ADS is to collect detailed information based on the changes in the
environment and choose efficient mechanisms (algorithms and/or encryption techniques, and
secured and cost effective communication channel) for exchanging the gathered information
between the targets distributed systems and the central monitoring system. Security issues in
distributed systems have been solved using techniques such as cryptographic algorithms i.e.
using RSA algorithm.
Keywords: Adaptive distributed Systems, Encryption techniques, Cryptographic algorithms, Security metrics,
and RSA algorithm.
INTRODUCTION
A distributed system consists of a
collection of autonomous Computers linked
by a computer network and equipped with
distributed system software. The security of
data transmission is a vital problem in
Distributed Systems [5]. Usually, users
exchange personal sensitive information or
important documents. In this case; security,
integrity, authenticity and confidentiality of
the exchanged data should be provided over
the transmission medium. Nowadays, internet
multimedia is very popular such as social
networking, E-initiative (e-banking, e–
commerce, e–shopping) etc. These
phenomenal changes have brought about the
need for tight security to data and information
as a significant amount of data is exchanged
every second over an unsecure channel, which
may not be safe. Therefore, it is essential to
protect the data from attackers [4]. Data in
transit is data being accessed over the
network, and therefore could be intercepted by
someone else on the network or with access to
the physical media the network uses. E-
banking, e-commerce, e-shopping, etc.,
transactions over the un-trusted
Communications channels are now possible
because of the application of data encryption
mechanisms.
Data encryption solution provides
solid protection in the event of a security
breach. There is an increasing use of end-to-
end encryption of traffic to hide the content of
transactions from the network. With
encrypted traffic the users are no longer
incidentally exposing their communications to
the network and thereby risking exposure of
their communications to unknown third
parties [8].
To improve security and reliability of
data being transmitted on information and
communications systems; cryptography is
used. Cryptography is especially useful in the
cases of transmission of financial and personal
data. Hence, information security is a
precondition of e-application systems when
communicating over un-trusted medium like
the Internet. Cryptography is the science of
keeping the transmitted data secure. It
provides data encryption for secure
communication. The encryption process is
applied before transmission, and the
Decryption process is applied after receiving
the encrypted data. The information hiding
ISBN-13: 978-1535448697
www.iaetsd.in
Proceedings of ICRMET-2016
©IAETSD 201616
VARTIKA SHARMA
Process is applied before transmission and the
extraction process is applied after receiving.
REVIEW OF LITERATURE
Adaptive Distributed Systems (ADSs) are
distributed systems that can evolve their
behaviors based on changes in their
environments. A mainstay with adaptation of
distributed systems is that in order to detect
changes, information must be collected by
monitoring the system and its environment.
Contrariwise, the impact of implementation of
security mechanism on the adaptation of
distributed system is also determined. There
should be security against the unauthorized
access of the network and the information
transmitted over the networks.
There are many researches done and are being
done on the various security issues in
distributed adaptive networks. The most of the
literature works which are considered here
discusses about the various security metrics
involved in a secure distributed adaptive
network.
The various research works on several
cryptographic algorithms are also explored.
Those works elucidate the different kinds of
cryptographic algorithms like, Symmetric and
Asymmetric cryptography. They also unfold
the algorithms that comes under these types
and discusses their pros and cons.
A survey on these research works gives a
conclusion that RSA algorithm is best in order
to secure a distributed adaptive network. It is
a asymmetric algorithm having two separate
keys each for encryption and decryption
making the data over network shielded from
an unauthorized intruder.
[1] “Network Security with Cryptography”
In this paper, a concept to protect
network and data transmission over a network
is discussed. It states that data Security is the
main aspect of secure data transmission over
unreliable network. Network security
involves the authorization of access to data in
a network, which is controlled by the network
administrator. Network security covers a
variety of computer networks, both public and
private, that are used in everyday jobs
conducting transactions and communications
among businesses, government agencies and
individuals. Networks can be private, such as
within a company, and others which might be
open to public access. Network security is
involved in organizations, enterprises, and
other types of institutions. In this paper we
also studied cryptography along with its
principles. Cryptographic systems with
ciphers are described. The cryptographic
models and algorithms are outlined.
[2] “Secure Communication using RSA
Algorithm for Network Environment”
This paper discusses that secure
communication in network environment is
primary requirement to access remote
resources in a controlled and efficient way.
For validation and authentication in e-banking
and e-commerce transactions, digital
signatures using public key cryptography is
extensively employed. To maintain
confidentiality, Digital Envelope, which is the
combination of the encrypted message and
signature with the encrypted symmetric key,
is also used. This research paper has proposed
to develop a hybrid technique using
Symmetric & Asymmetric key cryptography.
It will also include Message authentication
code to maintain integrity of message.
Therefore, proposed model will not only help
to maintain confidentiality and authentication
of message and user but integrity of data too.
[3] “Hybrid Cryptographic Technique
using RSA algorithm and scheduling
concepts”
It states that RSA algorithm is one of
the most commonly used efficient
cryptographic algorithms as it provides the
required amount of confidentiality, data
integrity and privacy.
ISBN-13: 978-1535448697
www.iaetsd.in
Proceedings of ICRMET-2016
©IAETSD 201617
This paper integrates the RSA Algorithm with
round-robin priority scheduling scheme in
order to extend the level of security and
reduce the effectiveness of intrusion.
In this method the user uses the RSA
algorithm and generates the encrypted
messages that are sorted priority-wise and
then sent. The receiver, on receiving the
messages decrypts them using the RSA
algorithm according to their priority. This
method reduces the risk of man-in-middle
attacks and timing attacks as the encrypted
and decrypted messages are further jumbled
based on their priority
[4] “Analysis of Different Security Issues
and Attacks in Distributed System A-
Review”
It states that so many people are
connected to the internet to access the
different resources of their use and different
companies are using distributed environment
to provide their services to the customers. All
these activities affect the economy of the
country or world. So there is a need of more
secure distributed environment in which all
transaction and operations can be complete
successfully in a secure way. In distributed
System environment it is very important to
provide service at anytime, anywhere to the
customers, this require proper time
management of all computing and networking
resources, resource allocation on time and
their proper utilization. In distributed
environment security is primary concern. In
this paper an analysis of different security
issues related to data, physical security,
network security, possible distributed system
attacks, has been made.
[5] “A Review on Security Issues in
Distributed Systems”
This paper discusses about the
development of secured and trusted
distributed systems. This paper is a
contribution towards the summarization of
work carried out in this field as well as
identifies new research lines. It states that
security techniques in distributed systems are
the important issues. Several elements of
distributed system security are identified, like
authentication, authorization, encryption and
system protection. Several approaches about
security aspects in distributed systems have
been discussed, like authentication based
approaches, development of trust based
models, access control based approaches, etc.
A summarization of these issues is given in
conclusion section. Apart from this, many
research lines about secure distributed
systems are discussed.
[6] “Data Security Using Private Key
Encryption System Based on Arithmetic
Coding”
This paper discusses about the
problems faced by today’s communicators
and it states that not only security but also the
speed of communication and size of content is
important. In the present paper, a scheme has
been proposed which uses the concept of
compression and data encryption. In first
phase the focus has been made on data
compression and cryptography. In the next
phase it emphasizes on compression
cryptosystem. Finally, proposed technique has
been discussed which used the concept of data
compression and encryption. In this first data
is compressed to reduce the size of the data
and increase the data transfer rate. Thereafter
compress data is encrypted to provide
security. Hence the proposed technique of this
paper is effective.
[7] “Implementation of Security in
Distributed Systems – A Comparative
Study”
This paper presents a comparative
study of distributed systems and the security
issues associated with those systems. Four
commonly used distributed systems were
considered for detailed analysis in terms of
technologies involved, security issues faced
by them and solution proposed to circumvent
those issues. Finally the security issues and
the solutions were summarized and compared
with each other. It also states that security
ISBN-13: 978-1535448697
www.iaetsd.in
Proceedings of ICRMET-2016
©IAETSD 201618
becomes more prominent when the systems
have been distributed across over multiple
geographic locations. Each type of distributed
system has its own peculiar security
requirements.
PROPOSED METHOD
The proposed system uses Adaptive
systems which makes a wider variety of
actions possible to compensate for the
changes in the environment. In this system,
security issues are addressed, in particular
security metrics, in the context of ADSs and
an approach is proposed towards assessing the
impact of monitoring for adaptation on
effectiveness of security mechanisms.
The system monitors the
communication channels to obtain secure
communication. It maintains information
about each client. If an anonymous tries to
enter into the network and tries to access the
authorized client’s data, he receives encrypted
data. Therefore, it presents a good quality of
service to the users of distributed systems.
The primary advantage of RSA
public-key cryptography is increased security
and convenience: private keys never need to
be transmitted or revealed to anyone. In a
secret-key system, by contrast, the secret keys
must be transmitted since the same key is used
for encryption and decryption.
Security is ensured in two ways: In
this encryption the two parties don't need to
have already shared their secret in order to
communicate using encryption and that both
authentication and non-repudiation are
possible. (Authentication means that you can
encrypt the message with my public key and
only I can decrypt it with my private key.
Non-repudiation means that you can "sign"
the message with your private key and I can
verify that it came from you with your public
key.) . Therefore, the encryption serves as a
fingerprint, since only your private key could
have encrypted the data.
METHODOLOGY
Many encryption algorithms are
widely available and used in information
security. They can be categorized into
Symmetric (private) and Asymmetric (public)
keys encryption. In Symmetric keys
encryption or secret key encryption, only one
key is used to encrypt and decrypt data. In
Asymmetric keys, two keys are used; private
and public keys. Public key is used for
encryption and private key is used for
decryption (e.g. RSA and ECC).
Symmetric algorithms are relatively simple
and quick, but if third parties intercept the key
they can decrypt the messages. To overcome
this drawback asymmetric encryption comes
into picture.
Cryptography encrypts the message
and transmits it; anyone can view the
encrypted message, but is very difficult to be
understood, especially if it has been encrypted
with a strong cryptographic algorithm such as
RSA cryptographic algorithm. It is an
asymmetric cryptographic algorithm.
In RSA cryptography, RSA stands for
Ron Rivest, Adi Shamir and Leonard
Adleman is an algorithm used by modern
computers to encrypt and decrypt messages.
This is also called public key cryptography,
because one of them can be given to everyone.
The other key must be kept private both the
public and the private keys can encrypt a
message; the opposite key from the one used
to encrypt a message is used to decrypt it. This
attribute is one reason why RSA has become
the most widely used asymmetric algorithm:
It provides a method of assuring the
confidentiality, integrity, authenticity and
non-reputability of electronic
communications and data storage.
A user of RSA creates and then publishes the
product of two large prime numbers, along
with an auxiliary value, as their public key [9].
The prime factors must be kept secret. Anyone
can use the public key to encrypt a message.
The RSA algorithm involves three steps:
 Key generation
 Encryption and
ISBN-13: 978-1535448697
www.iaetsd.in
Proceedings of ICRMET-2016
©IAETSD 201619
 Decryption.
Key generation
RSA involves a public key and a private key.
The public key can be known by everyone and
is used for encrypting messages. The private
key is used to decrypt the message which is
encrypted with the public key.
The keys for the RSA algorithm are generated
the following way:
e numbers p and
q, the integers p and q should be chosen at
random.
n = pq. n is used as the modulus
for both the public and private keys. Its length,
usually expressed in bits, is the key length.
n) = φ(p)φ(q) = (p − 1)(q −1),
where φ is Euler's totient function. Choose an
integer e such that 1 < e < φ(n) and gcd(e,
φ(n)) = 1; i.e. e and φ(n) are co-prime. e is
released as the public key exponent.
Determine d as d−1 ≡ e (mod φ(n)), i.e., d is
the multiplicative inverse of e (modulo φ(n)).
This is more clearly stated as solve for d given
d⋅e ≡ 1 (mod
φ(n)) d is kept as the private key exponent. By
construction, d⋅e ≡ 1 (mod φ(n)).
n
and the public (or encryption) exponent e.
rivate key consists of the modulus n
and the private (or decryption) exponent d,
which must be kept secret. p, q, and φ(n) must
also be kept secret because they can be used to
calculate d [9].
Encryption
Consider an analogy where two people Alice
and Bob are communicating. Alice transmits
her public key (n, e) to Bob and keeps the
private key secret. Bob then wishes to send
message M to Alice. He then computes the
cipher text c corresponding to
c=m^e(mod m)
Bob then transmits c to Alice.
Decryption
Alice can recover m from c by using her
private key exponent d via computing
m=c^d(mod n).
Given m, she can recover the original message
M by reversing the padding scheme.
Fig 1: RSA Encryption and Decryption
CONCLUSIONS
In this study, we did a comprehensive
review of public and private key cryptosystem
called RSA algorithm. RSA encrypts message
with strongly secure key which is known only
by sending and receiving end, is a significant
aspect to acquire robust security. The secure
exchange of key between sender and receiver
is an important task. The key management
helps to maintain confidentiality of secret
information from unauthorized users. It can
also check the integrity of the exchanged
message to verify the authenticity.
The system monitors the communication
channels to obtain secure communication. It
maintains information about each client.
In the future, work can be done on key
distribution and management as well as
optimal cryptography algorithm for data
security over clouds.
REFERENCES
[1]. Mukund R.Joshi, Renuka Avinash Karkale
“Network security with Cryptography”, Vol. 4,
January 2015.
[2]. Amrita Jain, Vivek Kapoor. “Secure
Communication using RSA Algorithm for
Network Environment”, International Journal of
Computer Applications (0975 – 8887) Volume
118 – No. 7, May 2015.
ISBN-13: 978-1535448697
www.iaetsd.in
Proceedings of ICRMET-2016
©IAETSD 201620
[3]. Meenakshi Shankar Akshaya.P, “Hybrid
Cryptographic Technique using RSA algorithm
and Scheduling concepts”, International Journal of
Network Security and its Application, Vol. 6, Nov
2014.
[4]. Manoj Kumar, Nikhil Agrawal, “Analysis of
Different Security Issues and Attacks in
Distributed System”, International Journal of
Advanced Research in Computer Science and
Software Engineering, April 2013.
[5]. Vijay Prakash, Manuj Darbari, “A Review on
Security Issues in Distributed Systems”,
International Journal of Scientific and
Engineering Research, Vol. 3, Sept. 2012.
[6]. Ajit Singh and Rimple Gilhotra, “Data Security
Using Private Key Encryption System Based on
Arithmetic Coding”, International Journal of
Network Security & Its Applications (IJNSA),
Vol.3, No.3, May 2011
[7]. Mohamed Firdhous, “Implementation of Security
in Distributed Systems – A Comparative Study”,
International Journal of Computer Information
Systems, Vol. 2, No. 2, 2011.
[8]. Oleksandr Bodriagov, Sonja Buchegger,
”Encryption for Peer-to-Peer Social Networks”,
IEEE Third International Conference on Social
Computing, 2011.
[9]. Chandra M. Kota et al., “Implementation of the
RSA algorithm and its cryptanalysis,” In
proceedings of the 2002 ASEE Gulf-Southwest
Annual Conference, March 20 – 22, 2002.
[10]. Erfaneh Noorouzil, “A New Digital Signature
Algorithm”, International Conference on Machine
Learning and Computing, IPCSIT vol.3, 2011.
[11]. Jawahar Thakur, Nagesh Kumar, “DES, AES and
Blowfish: Symmetric Key Cryptography
Algorithms Simulation Based Performance
Anaysis”, International Journal of Emerging
Technology and Advanced Engineering, Volume
1, Issue 2, December 2011
[12]. Manjunath Kotari, Dr.Niranjan N, “Monitoring
and its Impacts over Distributed Systems and
Possible Solutions”, International Journal of
Computer Science and Mobile Computing, Vol. 2,
June 2013.
[13]. Simon Blake Wilson, “Key agreement protocols
and their security analysis,” 9-sep-1997.
[14]. Prince Oghenekaro Asagba, Enoch
O.Nwachukwu, “A Review of RSA
Cryptosystems and Cryptographic Protocols”,
West African Journal of Industrial & academic
researchVol.10 No.1. April, 2014.
[15]. Pratap Chandra Mandal, “ Evaluation of
performance of the Symmetric Key Algorithms:
DES, 3DES ,AES and Blowfish”, Journal of
Global Research in Computer Science, Volume 3,
No. 8, August 2012.
[16]. Rajdeep Bhanot, Rahul Hans, “A Review and
Comparative Analysis of Various Encryption
Algorithms”, International Journal of Security and
its Applications, Vol. 9, 2015.
[17]. Rajan.S.Jamgekar, Geeta Shantanu Joshi, “File
Encryption and Decryption Using Secure RSA”,
International Journal of Emerging Science and
Engineering (IJESE) ISSN: 2319–6378, Volume-
1, Issue-4, February 2013
[18]. Akankasha Bali, Dr.Shailendra Narayan Singh,”A
Review on Network Security related to Wireless
Sensor network”, International Journal of
Advanced research in Computer Science and
Software Engineering, Vol.5,March 2015.
ISBN-13: 978-1535448697
www.iaetsd.in
Proceedings of ICRMET-2016
©IAETSD 201621

More Related Content

What's hot

Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud StorageSecure Privacy Preserving Using Multilevel Trust For Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
IRJET Journal
 
C017421624
C017421624C017421624
C017421624
IOSR Journals
 
Data centric security key to cloud and digital business
Data centric security key to cloud and digital businessData centric security key to cloud and digital business
Data centric security key to cloud and digital business
Ulf Mattsson
 
Isaca global journal - choosing the most appropriate data security solution ...
Isaca global journal  - choosing the most appropriate data security solution ...Isaca global journal  - choosing the most appropriate data security solution ...
Isaca global journal - choosing the most appropriate data security solution ...
Ulf Mattsson
 
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET Journal
 
Ieeepro techno solutions 2014 ieee java project - decentralized access cont...
Ieeepro techno solutions   2014 ieee java project - decentralized access cont...Ieeepro techno solutions   2014 ieee java project - decentralized access cont...
Ieeepro techno solutions 2014 ieee java project - decentralized access cont...
hemanthbbc
 
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA AlgorithmEncryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
ijtsrd
 
Threat Modeling of Cloud based Implementation of Homomorphic Encryption
Threat Modeling of Cloud based Implementation of Homomorphic EncryptionThreat Modeling of Cloud based Implementation of Homomorphic Encryption
Threat Modeling of Cloud based Implementation of Homomorphic Encryption
ijcisjournal
 
Preserving Privacy Policy- Preserving public auditing for data in the cloud
	Preserving Privacy Policy- Preserving public auditing for data in the cloud	Preserving Privacy Policy- Preserving public auditing for data in the cloud
Preserving Privacy Policy- Preserving public auditing for data in the cloud
inventionjournals
 
Cloud Data Security and Secure Data Sharing Methods
Cloud Data Security and Secure Data Sharing MethodsCloud Data Security and Secure Data Sharing Methods
Cloud Data Security and Secure Data Sharing Methods
IJCSIS Research Publications
 
Kp3419221926
Kp3419221926Kp3419221926
Kp3419221926
IJERA Editor
 
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGEHYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
AM Publications,India
 
Paper id 27201448
Paper id 27201448Paper id 27201448
Paper id 27201448
IJRAT
 
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
IJERA Editor
 
Cloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge PrivacyCloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge Privacy
IJERA Editor
 
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET Journal
 
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEMSECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
Journal For Research
 
INFORMATION AND COMMUNICATION SECURITY MECHANISMS FOR MICROSERVICES-BASED SYS...
INFORMATION AND COMMUNICATION SECURITY MECHANISMS FOR MICROSERVICES-BASED SYS...INFORMATION AND COMMUNICATION SECURITY MECHANISMS FOR MICROSERVICES-BASED SYS...
INFORMATION AND COMMUNICATION SECURITY MECHANISMS FOR MICROSERVICES-BASED SYS...
IJNSA Journal
 
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHYA SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
csandit
 
A novel ppdm protocol for distributed peer to peer information sources
A novel ppdm protocol for distributed peer to peer information sourcesA novel ppdm protocol for distributed peer to peer information sources
A novel ppdm protocol for distributed peer to peer information sourcesIAEME Publication
 

What's hot (20)

Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud StorageSecure Privacy Preserving Using Multilevel Trust For Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
 
C017421624
C017421624C017421624
C017421624
 
Data centric security key to cloud and digital business
Data centric security key to cloud and digital businessData centric security key to cloud and digital business
Data centric security key to cloud and digital business
 
Isaca global journal - choosing the most appropriate data security solution ...
Isaca global journal  - choosing the most appropriate data security solution ...Isaca global journal  - choosing the most appropriate data security solution ...
Isaca global journal - choosing the most appropriate data security solution ...
 
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
 
Ieeepro techno solutions 2014 ieee java project - decentralized access cont...
Ieeepro techno solutions   2014 ieee java project - decentralized access cont...Ieeepro techno solutions   2014 ieee java project - decentralized access cont...
Ieeepro techno solutions 2014 ieee java project - decentralized access cont...
 
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA AlgorithmEncryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
 
Threat Modeling of Cloud based Implementation of Homomorphic Encryption
Threat Modeling of Cloud based Implementation of Homomorphic EncryptionThreat Modeling of Cloud based Implementation of Homomorphic Encryption
Threat Modeling of Cloud based Implementation of Homomorphic Encryption
 
Preserving Privacy Policy- Preserving public auditing for data in the cloud
	Preserving Privacy Policy- Preserving public auditing for data in the cloud	Preserving Privacy Policy- Preserving public auditing for data in the cloud
Preserving Privacy Policy- Preserving public auditing for data in the cloud
 
Cloud Data Security and Secure Data Sharing Methods
Cloud Data Security and Secure Data Sharing MethodsCloud Data Security and Secure Data Sharing Methods
Cloud Data Security and Secure Data Sharing Methods
 
Kp3419221926
Kp3419221926Kp3419221926
Kp3419221926
 
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGEHYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
 
Paper id 27201448
Paper id 27201448Paper id 27201448
Paper id 27201448
 
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
 
Cloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge PrivacyCloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge Privacy
 
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
 
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEMSECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
 
INFORMATION AND COMMUNICATION SECURITY MECHANISMS FOR MICROSERVICES-BASED SYS...
INFORMATION AND COMMUNICATION SECURITY MECHANISMS FOR MICROSERVICES-BASED SYS...INFORMATION AND COMMUNICATION SECURITY MECHANISMS FOR MICROSERVICES-BASED SYS...
INFORMATION AND COMMUNICATION SECURITY MECHANISMS FOR MICROSERVICES-BASED SYS...
 
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHYA SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
 
A novel ppdm protocol for distributed peer to peer information sources
A novel ppdm protocol for distributed peer to peer information sourcesA novel ppdm protocol for distributed peer to peer information sources
A novel ppdm protocol for distributed peer to peer information sources
 

Similar to Iaetsd a novel approach to provide the security for distributed adaptive networks using rsa algorithm

ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENTACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
IJNSA Journal
 
Design of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure CommunicationDesign of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure Communication
IRJET Journal
 
Target Unncryption Case Study
Target Unncryption Case StudyTarget Unncryption Case Study
Target Unncryption Case Study
Evelyn Donaldson
 
Dnssec Case Study
Dnssec Case StudyDnssec Case Study
Dnssec Case Study
Lindsey Rivera
 
Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...
Editor IJCATR
 
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...
A PPLICATION OF  C LASSICAL  E NCRYPTION  T ECHNIQUES FOR  S ECURING  D ATA -...A PPLICATION OF  C LASSICAL  E NCRYPTION  T ECHNIQUES FOR  S ECURING  D ATA -...
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...
IJCI JOURNAL
 
Hybrid cryptographic technique using rsa algorithm and scheduling concepts
Hybrid cryptographic technique using rsa algorithm and scheduling conceptsHybrid cryptographic technique using rsa algorithm and scheduling concepts
Hybrid cryptographic technique using rsa algorithm and scheduling concepts
IJNSA Journal
 
File transfer with multiple security mechanism
File transfer with multiple security mechanismFile transfer with multiple security mechanism
File transfer with multiple security mechanism
Shubham Patil
 
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin AlgorithmA Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
Editor IJMTER
 
CRYPTOGRAPHY ALGORITHMS FOR WEB SECURITY
CRYPTOGRAPHY ALGORITHMS FOR WEB SECURITYCRYPTOGRAPHY ALGORITHMS FOR WEB SECURITY
CRYPTOGRAPHY ALGORITHMS FOR WEB SECURITY
IRJET Journal
 
Secure Cloud Environment Using RSA Algorithm
Secure Cloud Environment Using RSA AlgorithmSecure Cloud Environment Using RSA Algorithm
Secure Cloud Environment Using RSA Algorithm
IRJET Journal
 
Mitigating the Integrity Issues in Cloud Computing Utilizing Cryptography Alg...
Mitigating the Integrity Issues in Cloud Computing Utilizing Cryptography Alg...Mitigating the Integrity Issues in Cloud Computing Utilizing Cryptography Alg...
Mitigating the Integrity Issues in Cloud Computing Utilizing Cryptography Alg...
AJASTJournal
 
Cloud Cryptography
Cloud CryptographyCloud Cryptography
Cloud Cryptography
ijtsrd
 
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKINGIMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
International Journal of Technical Research & Application
 
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET Journal
 
Multilayer security mechanism in computer networks
Multilayer security mechanism in computer networksMultilayer security mechanism in computer networks
Multilayer security mechanism in computer networksAlexander Decker
 
11.multilayer security mechanism in computer networks
11.multilayer security mechanism in computer networks11.multilayer security mechanism in computer networks
11.multilayer security mechanism in computer networksAlexander Decker
 
CRYPTOGRAPHY & NETWORK SECURITY.pptx
CRYPTOGRAPHY & NETWORK SECURITY.pptxCRYPTOGRAPHY & NETWORK SECURITY.pptx
CRYPTOGRAPHY & NETWORK SECURITY.pptx
NavanathDarwante1
 
An Efficient Approach for Data Security in Cloud Environment using Watermarki...
An Efficient Approach for Data Security in Cloud Environment using Watermarki...An Efficient Approach for Data Security in Cloud Environment using Watermarki...
An Efficient Approach for Data Security in Cloud Environment using Watermarki...
IRJET Journal
 
The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...
Kimberly Thomas
 

Similar to Iaetsd a novel approach to provide the security for distributed adaptive networks using rsa algorithm (20)

ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENTACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
 
Design of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure CommunicationDesign of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure Communication
 
Target Unncryption Case Study
Target Unncryption Case StudyTarget Unncryption Case Study
Target Unncryption Case Study
 
Dnssec Case Study
Dnssec Case StudyDnssec Case Study
Dnssec Case Study
 
Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...
 
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...
A PPLICATION OF  C LASSICAL  E NCRYPTION  T ECHNIQUES FOR  S ECURING  D ATA -...A PPLICATION OF  C LASSICAL  E NCRYPTION  T ECHNIQUES FOR  S ECURING  D ATA -...
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...
 
Hybrid cryptographic technique using rsa algorithm and scheduling concepts
Hybrid cryptographic technique using rsa algorithm and scheduling conceptsHybrid cryptographic technique using rsa algorithm and scheduling concepts
Hybrid cryptographic technique using rsa algorithm and scheduling concepts
 
File transfer with multiple security mechanism
File transfer with multiple security mechanismFile transfer with multiple security mechanism
File transfer with multiple security mechanism
 
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin AlgorithmA Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
 
CRYPTOGRAPHY ALGORITHMS FOR WEB SECURITY
CRYPTOGRAPHY ALGORITHMS FOR WEB SECURITYCRYPTOGRAPHY ALGORITHMS FOR WEB SECURITY
CRYPTOGRAPHY ALGORITHMS FOR WEB SECURITY
 
Secure Cloud Environment Using RSA Algorithm
Secure Cloud Environment Using RSA AlgorithmSecure Cloud Environment Using RSA Algorithm
Secure Cloud Environment Using RSA Algorithm
 
Mitigating the Integrity Issues in Cloud Computing Utilizing Cryptography Alg...
Mitigating the Integrity Issues in Cloud Computing Utilizing Cryptography Alg...Mitigating the Integrity Issues in Cloud Computing Utilizing Cryptography Alg...
Mitigating the Integrity Issues in Cloud Computing Utilizing Cryptography Alg...
 
Cloud Cryptography
Cloud CryptographyCloud Cryptography
Cloud Cryptography
 
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKINGIMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
 
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
 
Multilayer security mechanism in computer networks
Multilayer security mechanism in computer networksMultilayer security mechanism in computer networks
Multilayer security mechanism in computer networks
 
11.multilayer security mechanism in computer networks
11.multilayer security mechanism in computer networks11.multilayer security mechanism in computer networks
11.multilayer security mechanism in computer networks
 
CRYPTOGRAPHY & NETWORK SECURITY.pptx
CRYPTOGRAPHY & NETWORK SECURITY.pptxCRYPTOGRAPHY & NETWORK SECURITY.pptx
CRYPTOGRAPHY & NETWORK SECURITY.pptx
 
An Efficient Approach for Data Security in Cloud Environment using Watermarki...
An Efficient Approach for Data Security in Cloud Environment using Watermarki...An Efficient Approach for Data Security in Cloud Environment using Watermarki...
An Efficient Approach for Data Security in Cloud Environment using Watermarki...
 
The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...
 

More from Iaetsd Iaetsd

iaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissioniaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmission
Iaetsd Iaetsd
 
iaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdliaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdl
Iaetsd Iaetsd
 
iaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarmiaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarm
Iaetsd Iaetsd
 
iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...
Iaetsd Iaetsd
 
iaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seatiaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seat
Iaetsd Iaetsd
 
iaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan applicationiaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan application
Iaetsd Iaetsd
 
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBSREVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
Iaetsd Iaetsd
 
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
Iaetsd Iaetsd
 
Fabrication of dual power bike
Fabrication of dual power bikeFabrication of dual power bike
Fabrication of dual power bike
Iaetsd Iaetsd
 
Blue brain technology
Blue brain technologyBlue brain technology
Blue brain technology
Iaetsd Iaetsd
 
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
Iaetsd Iaetsd
 
iirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic birdiirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic bird
Iaetsd Iaetsd
 
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growthiirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
Iaetsd Iaetsd
 
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithmiirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
Iaetsd Iaetsd
 
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
Iaetsd Iaetsd
 
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
Iaetsd Iaetsd
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocol
Iaetsd Iaetsd
 
iaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databasesiaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databases
Iaetsd Iaetsd
 
iaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineriesiaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineries
Iaetsd Iaetsd
 
iaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using paraboliciaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using parabolic
Iaetsd Iaetsd
 

More from Iaetsd Iaetsd (20)

iaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissioniaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmission
 
iaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdliaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdl
 
iaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarmiaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarm
 
iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...
 
iaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seatiaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seat
 
iaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan applicationiaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan application
 
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBSREVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
 
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
 
Fabrication of dual power bike
Fabrication of dual power bikeFabrication of dual power bike
Fabrication of dual power bike
 
Blue brain technology
Blue brain technologyBlue brain technology
Blue brain technology
 
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
 
iirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic birdiirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic bird
 
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growthiirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
 
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithmiirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
 
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
 
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocol
 
iaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databasesiaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databases
 
iaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineriesiaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineries
 
iaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using paraboliciaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using parabolic
 

Recently uploaded

Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
PrashantGoswami42
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
Intella Parts
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
Kamal Acharya
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
ShahidSultan24
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 

Recently uploaded (20)

Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 

Iaetsd a novel approach to provide the security for distributed adaptive networks using rsa algorithm

  • 1. A Novel Approach to Provide the Security for Distributed Adaptive Networks Using RSA Algorithm ABSTRACT Information security in distributed systems and the use of networks for carrying data between computers is a major factor that has affected security. In this paper, we discuss security and propose security metrics issues in the context of Adaptive Distributed Systems [ADS]. A key premise of ADS is to collect detailed information based on the changes in the environment and choose efficient mechanisms (algorithms and/or encryption techniques, and secured and cost effective communication channel) for exchanging the gathered information between the targets distributed systems and the central monitoring system. Security issues in distributed systems have been solved using techniques such as cryptographic algorithms i.e. using RSA algorithm. Keywords: Adaptive distributed Systems, Encryption techniques, Cryptographic algorithms, Security metrics, and RSA algorithm. INTRODUCTION A distributed system consists of a collection of autonomous Computers linked by a computer network and equipped with distributed system software. The security of data transmission is a vital problem in Distributed Systems [5]. Usually, users exchange personal sensitive information or important documents. In this case; security, integrity, authenticity and confidentiality of the exchanged data should be provided over the transmission medium. Nowadays, internet multimedia is very popular such as social networking, E-initiative (e-banking, e– commerce, e–shopping) etc. These phenomenal changes have brought about the need for tight security to data and information as a significant amount of data is exchanged every second over an unsecure channel, which may not be safe. Therefore, it is essential to protect the data from attackers [4]. Data in transit is data being accessed over the network, and therefore could be intercepted by someone else on the network or with access to the physical media the network uses. E- banking, e-commerce, e-shopping, etc., transactions over the un-trusted Communications channels are now possible because of the application of data encryption mechanisms. Data encryption solution provides solid protection in the event of a security breach. There is an increasing use of end-to- end encryption of traffic to hide the content of transactions from the network. With encrypted traffic the users are no longer incidentally exposing their communications to the network and thereby risking exposure of their communications to unknown third parties [8]. To improve security and reliability of data being transmitted on information and communications systems; cryptography is used. Cryptography is especially useful in the cases of transmission of financial and personal data. Hence, information security is a precondition of e-application systems when communicating over un-trusted medium like the Internet. Cryptography is the science of keeping the transmitted data secure. It provides data encryption for secure communication. The encryption process is applied before transmission, and the Decryption process is applied after receiving the encrypted data. The information hiding ISBN-13: 978-1535448697 www.iaetsd.in Proceedings of ICRMET-2016 ©IAETSD 201616 VARTIKA SHARMA
  • 2. Process is applied before transmission and the extraction process is applied after receiving. REVIEW OF LITERATURE Adaptive Distributed Systems (ADSs) are distributed systems that can evolve their behaviors based on changes in their environments. A mainstay with adaptation of distributed systems is that in order to detect changes, information must be collected by monitoring the system and its environment. Contrariwise, the impact of implementation of security mechanism on the adaptation of distributed system is also determined. There should be security against the unauthorized access of the network and the information transmitted over the networks. There are many researches done and are being done on the various security issues in distributed adaptive networks. The most of the literature works which are considered here discusses about the various security metrics involved in a secure distributed adaptive network. The various research works on several cryptographic algorithms are also explored. Those works elucidate the different kinds of cryptographic algorithms like, Symmetric and Asymmetric cryptography. They also unfold the algorithms that comes under these types and discusses their pros and cons. A survey on these research works gives a conclusion that RSA algorithm is best in order to secure a distributed adaptive network. It is a asymmetric algorithm having two separate keys each for encryption and decryption making the data over network shielded from an unauthorized intruder. [1] “Network Security with Cryptography” In this paper, a concept to protect network and data transmission over a network is discussed. It states that data Security is the main aspect of secure data transmission over unreliable network. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Network security covers a variety of computer networks, both public and private, that are used in everyday jobs conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access. Network security is involved in organizations, enterprises, and other types of institutions. In this paper we also studied cryptography along with its principles. Cryptographic systems with ciphers are described. The cryptographic models and algorithms are outlined. [2] “Secure Communication using RSA Algorithm for Network Environment” This paper discusses that secure communication in network environment is primary requirement to access remote resources in a controlled and efficient way. For validation and authentication in e-banking and e-commerce transactions, digital signatures using public key cryptography is extensively employed. To maintain confidentiality, Digital Envelope, which is the combination of the encrypted message and signature with the encrypted symmetric key, is also used. This research paper has proposed to develop a hybrid technique using Symmetric & Asymmetric key cryptography. It will also include Message authentication code to maintain integrity of message. Therefore, proposed model will not only help to maintain confidentiality and authentication of message and user but integrity of data too. [3] “Hybrid Cryptographic Technique using RSA algorithm and scheduling concepts” It states that RSA algorithm is one of the most commonly used efficient cryptographic algorithms as it provides the required amount of confidentiality, data integrity and privacy. ISBN-13: 978-1535448697 www.iaetsd.in Proceedings of ICRMET-2016 ©IAETSD 201617
  • 3. This paper integrates the RSA Algorithm with round-robin priority scheduling scheme in order to extend the level of security and reduce the effectiveness of intrusion. In this method the user uses the RSA algorithm and generates the encrypted messages that are sorted priority-wise and then sent. The receiver, on receiving the messages decrypts them using the RSA algorithm according to their priority. This method reduces the risk of man-in-middle attacks and timing attacks as the encrypted and decrypted messages are further jumbled based on their priority [4] “Analysis of Different Security Issues and Attacks in Distributed System A- Review” It states that so many people are connected to the internet to access the different resources of their use and different companies are using distributed environment to provide their services to the customers. All these activities affect the economy of the country or world. So there is a need of more secure distributed environment in which all transaction and operations can be complete successfully in a secure way. In distributed System environment it is very important to provide service at anytime, anywhere to the customers, this require proper time management of all computing and networking resources, resource allocation on time and their proper utilization. In distributed environment security is primary concern. In this paper an analysis of different security issues related to data, physical security, network security, possible distributed system attacks, has been made. [5] “A Review on Security Issues in Distributed Systems” This paper discusses about the development of secured and trusted distributed systems. This paper is a contribution towards the summarization of work carried out in this field as well as identifies new research lines. It states that security techniques in distributed systems are the important issues. Several elements of distributed system security are identified, like authentication, authorization, encryption and system protection. Several approaches about security aspects in distributed systems have been discussed, like authentication based approaches, development of trust based models, access control based approaches, etc. A summarization of these issues is given in conclusion section. Apart from this, many research lines about secure distributed systems are discussed. [6] “Data Security Using Private Key Encryption System Based on Arithmetic Coding” This paper discusses about the problems faced by today’s communicators and it states that not only security but also the speed of communication and size of content is important. In the present paper, a scheme has been proposed which uses the concept of compression and data encryption. In first phase the focus has been made on data compression and cryptography. In the next phase it emphasizes on compression cryptosystem. Finally, proposed technique has been discussed which used the concept of data compression and encryption. In this first data is compressed to reduce the size of the data and increase the data transfer rate. Thereafter compress data is encrypted to provide security. Hence the proposed technique of this paper is effective. [7] “Implementation of Security in Distributed Systems – A Comparative Study” This paper presents a comparative study of distributed systems and the security issues associated with those systems. Four commonly used distributed systems were considered for detailed analysis in terms of technologies involved, security issues faced by them and solution proposed to circumvent those issues. Finally the security issues and the solutions were summarized and compared with each other. It also states that security ISBN-13: 978-1535448697 www.iaetsd.in Proceedings of ICRMET-2016 ©IAETSD 201618
  • 4. becomes more prominent when the systems have been distributed across over multiple geographic locations. Each type of distributed system has its own peculiar security requirements. PROPOSED METHOD The proposed system uses Adaptive systems which makes a wider variety of actions possible to compensate for the changes in the environment. In this system, security issues are addressed, in particular security metrics, in the context of ADSs and an approach is proposed towards assessing the impact of monitoring for adaptation on effectiveness of security mechanisms. The system monitors the communication channels to obtain secure communication. It maintains information about each client. If an anonymous tries to enter into the network and tries to access the authorized client’s data, he receives encrypted data. Therefore, it presents a good quality of service to the users of distributed systems. The primary advantage of RSA public-key cryptography is increased security and convenience: private keys never need to be transmitted or revealed to anyone. In a secret-key system, by contrast, the secret keys must be transmitted since the same key is used for encryption and decryption. Security is ensured in two ways: In this encryption the two parties don't need to have already shared their secret in order to communicate using encryption and that both authentication and non-repudiation are possible. (Authentication means that you can encrypt the message with my public key and only I can decrypt it with my private key. Non-repudiation means that you can "sign" the message with your private key and I can verify that it came from you with your public key.) . Therefore, the encryption serves as a fingerprint, since only your private key could have encrypted the data. METHODOLOGY Many encryption algorithms are widely available and used in information security. They can be categorized into Symmetric (private) and Asymmetric (public) keys encryption. In Symmetric keys encryption or secret key encryption, only one key is used to encrypt and decrypt data. In Asymmetric keys, two keys are used; private and public keys. Public key is used for encryption and private key is used for decryption (e.g. RSA and ECC). Symmetric algorithms are relatively simple and quick, but if third parties intercept the key they can decrypt the messages. To overcome this drawback asymmetric encryption comes into picture. Cryptography encrypts the message and transmits it; anyone can view the encrypted message, but is very difficult to be understood, especially if it has been encrypted with a strong cryptographic algorithm such as RSA cryptographic algorithm. It is an asymmetric cryptographic algorithm. In RSA cryptography, RSA stands for Ron Rivest, Adi Shamir and Leonard Adleman is an algorithm used by modern computers to encrypt and decrypt messages. This is also called public key cryptography, because one of them can be given to everyone. The other key must be kept private both the public and the private keys can encrypt a message; the opposite key from the one used to encrypt a message is used to decrypt it. This attribute is one reason why RSA has become the most widely used asymmetric algorithm: It provides a method of assuring the confidentiality, integrity, authenticity and non-reputability of electronic communications and data storage. A user of RSA creates and then publishes the product of two large prime numbers, along with an auxiliary value, as their public key [9]. The prime factors must be kept secret. Anyone can use the public key to encrypt a message. The RSA algorithm involves three steps:  Key generation  Encryption and ISBN-13: 978-1535448697 www.iaetsd.in Proceedings of ICRMET-2016 ©IAETSD 201619
  • 5.  Decryption. Key generation RSA involves a public key and a private key. The public key can be known by everyone and is used for encrypting messages. The private key is used to decrypt the message which is encrypted with the public key. The keys for the RSA algorithm are generated the following way: e numbers p and q, the integers p and q should be chosen at random. n = pq. n is used as the modulus for both the public and private keys. Its length, usually expressed in bits, is the key length. n) = φ(p)φ(q) = (p − 1)(q −1), where φ is Euler's totient function. Choose an integer e such that 1 < e < φ(n) and gcd(e, φ(n)) = 1; i.e. e and φ(n) are co-prime. e is released as the public key exponent. Determine d as d−1 ≡ e (mod φ(n)), i.e., d is the multiplicative inverse of e (modulo φ(n)). This is more clearly stated as solve for d given d⋅e ≡ 1 (mod φ(n)) d is kept as the private key exponent. By construction, d⋅e ≡ 1 (mod φ(n)). n and the public (or encryption) exponent e. rivate key consists of the modulus n and the private (or decryption) exponent d, which must be kept secret. p, q, and φ(n) must also be kept secret because they can be used to calculate d [9]. Encryption Consider an analogy where two people Alice and Bob are communicating. Alice transmits her public key (n, e) to Bob and keeps the private key secret. Bob then wishes to send message M to Alice. He then computes the cipher text c corresponding to c=m^e(mod m) Bob then transmits c to Alice. Decryption Alice can recover m from c by using her private key exponent d via computing m=c^d(mod n). Given m, she can recover the original message M by reversing the padding scheme. Fig 1: RSA Encryption and Decryption CONCLUSIONS In this study, we did a comprehensive review of public and private key cryptosystem called RSA algorithm. RSA encrypts message with strongly secure key which is known only by sending and receiving end, is a significant aspect to acquire robust security. The secure exchange of key between sender and receiver is an important task. The key management helps to maintain confidentiality of secret information from unauthorized users. It can also check the integrity of the exchanged message to verify the authenticity. The system monitors the communication channels to obtain secure communication. It maintains information about each client. In the future, work can be done on key distribution and management as well as optimal cryptography algorithm for data security over clouds. REFERENCES [1]. Mukund R.Joshi, Renuka Avinash Karkale “Network security with Cryptography”, Vol. 4, January 2015. [2]. Amrita Jain, Vivek Kapoor. “Secure Communication using RSA Algorithm for Network Environment”, International Journal of Computer Applications (0975 – 8887) Volume 118 – No. 7, May 2015. ISBN-13: 978-1535448697 www.iaetsd.in Proceedings of ICRMET-2016 ©IAETSD 201620
  • 6. [3]. Meenakshi Shankar Akshaya.P, “Hybrid Cryptographic Technique using RSA algorithm and Scheduling concepts”, International Journal of Network Security and its Application, Vol. 6, Nov 2014. [4]. Manoj Kumar, Nikhil Agrawal, “Analysis of Different Security Issues and Attacks in Distributed System”, International Journal of Advanced Research in Computer Science and Software Engineering, April 2013. [5]. Vijay Prakash, Manuj Darbari, “A Review on Security Issues in Distributed Systems”, International Journal of Scientific and Engineering Research, Vol. 3, Sept. 2012. [6]. Ajit Singh and Rimple Gilhotra, “Data Security Using Private Key Encryption System Based on Arithmetic Coding”, International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.3, May 2011 [7]. Mohamed Firdhous, “Implementation of Security in Distributed Systems – A Comparative Study”, International Journal of Computer Information Systems, Vol. 2, No. 2, 2011. [8]. Oleksandr Bodriagov, Sonja Buchegger, ”Encryption for Peer-to-Peer Social Networks”, IEEE Third International Conference on Social Computing, 2011. [9]. Chandra M. Kota et al., “Implementation of the RSA algorithm and its cryptanalysis,” In proceedings of the 2002 ASEE Gulf-Southwest Annual Conference, March 20 – 22, 2002. [10]. Erfaneh Noorouzil, “A New Digital Signature Algorithm”, International Conference on Machine Learning and Computing, IPCSIT vol.3, 2011. [11]. Jawahar Thakur, Nagesh Kumar, “DES, AES and Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance Anaysis”, International Journal of Emerging Technology and Advanced Engineering, Volume 1, Issue 2, December 2011 [12]. Manjunath Kotari, Dr.Niranjan N, “Monitoring and its Impacts over Distributed Systems and Possible Solutions”, International Journal of Computer Science and Mobile Computing, Vol. 2, June 2013. [13]. Simon Blake Wilson, “Key agreement protocols and their security analysis,” 9-sep-1997. [14]. Prince Oghenekaro Asagba, Enoch O.Nwachukwu, “A Review of RSA Cryptosystems and Cryptographic Protocols”, West African Journal of Industrial & academic researchVol.10 No.1. April, 2014. [15]. Pratap Chandra Mandal, “ Evaluation of performance of the Symmetric Key Algorithms: DES, 3DES ,AES and Blowfish”, Journal of Global Research in Computer Science, Volume 3, No. 8, August 2012. [16]. Rajdeep Bhanot, Rahul Hans, “A Review and Comparative Analysis of Various Encryption Algorithms”, International Journal of Security and its Applications, Vol. 9, 2015. [17]. Rajan.S.Jamgekar, Geeta Shantanu Joshi, “File Encryption and Decryption Using Secure RSA”, International Journal of Emerging Science and Engineering (IJESE) ISSN: 2319–6378, Volume- 1, Issue-4, February 2013 [18]. Akankasha Bali, Dr.Shailendra Narayan Singh,”A Review on Network Security related to Wireless Sensor network”, International Journal of Advanced research in Computer Science and Software Engineering, Vol.5,March 2015. ISBN-13: 978-1535448697 www.iaetsd.in Proceedings of ICRMET-2016 ©IAETSD 201621