With the advent of complex systems the need for large data storage with less space utility & high performance have become the vital features. Another important concern of the data is the security which is assured via the cryptographic techniques implemented at all levels of data storage. In this survey paper we introduce the concept of security between two hierarchical data accesses and propose the concept of hierarchical cryptography between data of different classes of different hierarchies.
Abstract: Data Mining has wide applications in many areas such as banking, medicine, scientific research and among government agencies. Classification is one of the commonly used tasks in data mining applications. The cloud computing, users have the opportunity to outsource their data, in encrypted form, as well as the data mining tasks to the cloud. Since the data on the cloud is in encrypted form, existing privacy preserving classification techniques are not applicable. On solving the classification problem over encrypted data. A secure k-NN classifier over encrypted data in the cloud. The k-NN protocol protects the confidentiality of the data, user’s input query, and data access patterns. To develop a secure k-NN classifier over encrypted data under the standard semi-honest model. Also, we empirically analyze the efficiency of our solution through various experiments.
Improved Image Encryption for Real-Time Application over Wireless Communicati...ijeei-iaes
Advances in communication networks have enabled organization to send confidential data such as digital images over wireless networks. However, the broadcast nature of wireless communication channel has made it vulnerable to attack from eavesdroppers. We have developed a hybrid cryptography technique, and we present its application to digital images as a means of improving the security of digital image for transmission over wireless communication networks. The hybrid technique uses a combination of a symmetric (Data Encryption Standard) and asymmetric (Rivest Shamir Adleman) cryptographic algorithms to secure data to be transmitted between different nodes of a wireless network. Three different image samples of type jpeg, png and jpg were tested using this technique. The results obtained showed that the hybrid system encrypt the images with minimal simulation time, and high throughput. More importantly, there is no relation or information between the original images and their encrypted form, according to Shannon’s definition of perfect security, thereby making the system much more secure.
Security analysis of fbdk block cipher for digital imageseSAT Journals
Abstract Network security is one of the major concerns in the modern world. In this regard, a strong security technique is required to protect user data. Cryptography techniques plays an important role in secured transmission through encryption of data and thus ensuring integrity, authenticity, confidentiality of information. Several encryption algorithms have been proposed like AES (Advanced Encryption Standard), DES (Data Encryption Standard) and RSA. These provide very good encryption for text applications. However, these encryption schemes appear not to be ideal for image applications. Some algorithms like GKSBC and RC6 provide very good encryption for digital images. New techniques are emerging that are aimed at providing secured transmission of images over networks. The FBDK (Fixed Block with Dynamic Key Size) block cipher is a new cryptography technique designed using simple operations like XOR, substitutions, circular shifting. The FBDK algorithm is applicable for blocks of any size with key size being dynamic for each block. It does not involve any complex mathematical operations like modular exponentiation. It is a hybrid cryptography technique based on symmetric key and asymmetric key cryptosystems. This paper investigates the security of FBDK block cipher for digital images against brute-force attack, statistical analysis and Differential analysis attacks. In this paper, various security analysis tests has been discussed which are helpful in finding out whether the FBDK encryption algorithm can do secure encryption or not. Experimental results proves the security and efficiency of FBDK cipher for images against all aforementioned types of attacks which justifies its consideration for real time image applications. Keywords: Cryptography, Ciphers, Encryption, Security, and cryptanalysis.
COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...IJCNCJournal
In this paper a detailed analysis of Data Encryption Standard (DES), Triple DES (3DES) and Advanced
Encryption Standard (AES) symmetric encryption algorithms in MANET was done using the Network
Simulator 2 (NS-2) in terms of energy consumption, data transfer time, End-to-End delay time and
throughput with varying data sizes. Two simulation models were adopted: the first simulates the network
performance assuming the availability of the common key, and the second simulates the network
performance including the use of the Diffie-Hellman Key Exchange (DHKE) protocol in the key
management phase. The obtained simulation results showed the superiority of AES over DES by 65%, 70%
and 83% in term of the energy consumption, data transfer time, and network throughput respectively. On
the other hand, the results showed that AES is better than 3DES by approximately 90% for all of the
performance metrics. Based on these results the AES was the recommended encryption scheme.
Abstract: Data Mining has wide applications in many areas such as banking, medicine, scientific research and among government agencies. Classification is one of the commonly used tasks in data mining applications. The cloud computing, users have the opportunity to outsource their data, in encrypted form, as well as the data mining tasks to the cloud. Since the data on the cloud is in encrypted form, existing privacy preserving classification techniques are not applicable. On solving the classification problem over encrypted data. A secure k-NN classifier over encrypted data in the cloud. The k-NN protocol protects the confidentiality of the data, user’s input query, and data access patterns. To develop a secure k-NN classifier over encrypted data under the standard semi-honest model. Also, we empirically analyze the efficiency of our solution through various experiments.
Improved Image Encryption for Real-Time Application over Wireless Communicati...ijeei-iaes
Advances in communication networks have enabled organization to send confidential data such as digital images over wireless networks. However, the broadcast nature of wireless communication channel has made it vulnerable to attack from eavesdroppers. We have developed a hybrid cryptography technique, and we present its application to digital images as a means of improving the security of digital image for transmission over wireless communication networks. The hybrid technique uses a combination of a symmetric (Data Encryption Standard) and asymmetric (Rivest Shamir Adleman) cryptographic algorithms to secure data to be transmitted between different nodes of a wireless network. Three different image samples of type jpeg, png and jpg were tested using this technique. The results obtained showed that the hybrid system encrypt the images with minimal simulation time, and high throughput. More importantly, there is no relation or information between the original images and their encrypted form, according to Shannon’s definition of perfect security, thereby making the system much more secure.
Security analysis of fbdk block cipher for digital imageseSAT Journals
Abstract Network security is one of the major concerns in the modern world. In this regard, a strong security technique is required to protect user data. Cryptography techniques plays an important role in secured transmission through encryption of data and thus ensuring integrity, authenticity, confidentiality of information. Several encryption algorithms have been proposed like AES (Advanced Encryption Standard), DES (Data Encryption Standard) and RSA. These provide very good encryption for text applications. However, these encryption schemes appear not to be ideal for image applications. Some algorithms like GKSBC and RC6 provide very good encryption for digital images. New techniques are emerging that are aimed at providing secured transmission of images over networks. The FBDK (Fixed Block with Dynamic Key Size) block cipher is a new cryptography technique designed using simple operations like XOR, substitutions, circular shifting. The FBDK algorithm is applicable for blocks of any size with key size being dynamic for each block. It does not involve any complex mathematical operations like modular exponentiation. It is a hybrid cryptography technique based on symmetric key and asymmetric key cryptosystems. This paper investigates the security of FBDK block cipher for digital images against brute-force attack, statistical analysis and Differential analysis attacks. In this paper, various security analysis tests has been discussed which are helpful in finding out whether the FBDK encryption algorithm can do secure encryption or not. Experimental results proves the security and efficiency of FBDK cipher for images against all aforementioned types of attacks which justifies its consideration for real time image applications. Keywords: Cryptography, Ciphers, Encryption, Security, and cryptanalysis.
COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...IJCNCJournal
In this paper a detailed analysis of Data Encryption Standard (DES), Triple DES (3DES) and Advanced
Encryption Standard (AES) symmetric encryption algorithms in MANET was done using the Network
Simulator 2 (NS-2) in terms of energy consumption, data transfer time, End-to-End delay time and
throughput with varying data sizes. Two simulation models were adopted: the first simulates the network
performance assuming the availability of the common key, and the second simulates the network
performance including the use of the Diffie-Hellman Key Exchange (DHKE) protocol in the key
management phase. The obtained simulation results showed the superiority of AES over DES by 65%, 70%
and 83% in term of the energy consumption, data transfer time, and network throughput respectively. On
the other hand, the results showed that AES is better than 3DES by approximately 90% for all of the
performance metrics. Based on these results the AES was the recommended encryption scheme.
Efficient two-stage cryptography scheme for secure distributed data storage i...IJECEIAES
Cloud computing environment requires secure access for data from the cloud server, small execution time, and low time complexity. Existing traditional cryptography algorithms are not suitable for cloud storage. In this paper, an efficient two-stage cryptography scheme is proposed to access and store data into cloud safely. It comprises both user authentication and encryption processes. First, a two-factor authentication scheme one-time password is proposed. It overcomes the weaknesses in the existing authentication schemes. The proposed authentication method does not require specific extra hardware or additional processing time to identity the user. Second, the plaintext is divided into two parts which are encrypted separately using a unique key for each. This division increases the security of the proposed scheme and in addition decreases the encryption time. The keys are generated using logistic chaos model theory. Chaos equation generates different values of keys which are very sensitive to initial condition and control parameter values entered by the user. This scheme achieves high-security level by introducing different security processes with different stages. The simulation results demonstrate that the proposed scheme reduces the size of the ciphertext and both encryption and decryption times than competing schemes without adding any complexity.
Three Party Authenticated Key Distribution using Quantum CryptographyIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
Attribute Based Encryption with Privacy Preserving In Clouds Swathi Rampur
This is a ppt made by shrihari ,in this encryption with privacy preserving in clouds is described!
It will be helpfull for those who are doing projects on cloud!
A new hybrid text encryption approach over mobile ad hoc network IJECEIAES
Data exchange has been rapidly increased recently by increasing the use of mobile networks. Sharing information (text, image, audio and video) over unsecured mobile network channels is liable for attacking and stealing. Encryption techniques are the most suitable methods to protect information from hackers. Hill cipher algorithm is one of symmetric techniques, it has a simple structure and fast computations, but weak security because sender and receiver need to use and share the same private key within a non-secure channel. Therefore, a novel hybrid encryption approach between elliptic curve cryptosystem and hill cipher (ECCHC) is proposed in this paper to convert Hill Cipher from symmetric technique (private key) to asymmetric one (public key) and increase its security and efficiency and resist the hackers. Thus, no need to share the secret key between sender and receiver and both can generate it from the private and public keys. Therefore, the proposed approach presents a new contribution by its ability to encrypt every character in the 128 ASCII table by using its ASCII value direct without needing to assign a numerical value for each character. The main advantages of the proposed method are represented in the computation simplicity, security efficiency and faster computation.
With the growth of cloud technologies, computing
resources and cloud storage have become the most
demanding online services. There are several companies
desiring to outsource their data storage and resources as
well. While storing private and sensitive data on a third
party data center, it is necessary to consider security and
privacy which become major issues. In this paper, a novel
Double Encryption with Single Decryption (DESD) crypto
technique is proposed to secure the data in cloud storage.
The proposed technique comprises of encryption and
decryption phases where in the encryption phase the data is
randomly partitioned into multiple fragments. Double
encryption is done on each fragment by prime numbers, as
well as Invertible Non-linear Function (INF). These
multiple encrypted data are stored at the multiple cloud
storages with the help of cloud service provider (CSP).
After all verification process the data user collects the key
from the data owner and decrypts the gathered data from
the cloud with the knowledge of inverse INF. The proposed
crypto technique provides more security and privacy to
cloud data and any illegitimate users cannot retrieve the
original data. The performance of the proposed DESD
technique is compared with AES and Triple DES
techniques and the experimental results are plotted which
shows the proposed technique is efficient and faster.
File transfer with multiple security mechanismShubham Patil
The system enhances the security and the data confidentiality between the users and receiver by the two-layer encryption mechanism and the QR code for verification. The system consists of three main components which are very important to providing the security between sender and receiver while transmitting the data
A new algorithm for implementing message authentication and integrity in soft...TELKOMNIKA JOURNAL
IT systems and data that you store, and process are valuable resources that need protection. Validation and reliability of information are essential in networks and computer systems. The communicating is done by two parties via an unsafe channel require a way to validate the data spent by one party as valid (or unaltered) by the other party. In our study, we suggest new one-way defragmentation algorithm to implement message authentication and integration in program execution. These software applications are readily available and freely available because most of the hash functions are faster than their existing radioactive blocks.
Mutual query data sharing protocol for public key encryption through chosen-c...IJECEIAES
In this paper, we are proposing a mutual query data sharing protocol (MQDS) to overcome the encryption or decryption time limitations of exiting protocols like Boneh, rivest shamir adleman (RSA), Multi-bit transposed ring learning parity with noise (TRLPN), ring learning parity with noise (Ring-LPN) cryptosystem, key-Ordered decisional learning parity with noise (kO-DLPN), and KD_CS protocol’s. Titled scheme is to provide the security for the authenticated user data among the distributed physical users and devices. The proposed data sharing protocol is designed to resist the chosen-ciphertext attack (CCA) under the hardness solution for the query shared-strong diffie-hellman (SDH) problem. The evaluation of proposed work with the existing data sharing protocols in computational and communication overhead through their response time is evaluated.
Automated hierarchical classification of scanned documents using convolutiona...IJECEIAES
This research proposed automated hierarchical classification of scanned documents with characteristics content that have unstructured text and special patterns (specific and short strings) using convolutional neural network (CNN) and regular expression method (REM). The research data using digital correspondence documents with format PDF images from Pusat Data Teknologi dan Informasi (Technology and Information Data Center). The document hierarchy covers type of letter, type of manuscript letter, origin of letter and subject of letter. The research method consists of preprocessing, classification, and storage to database. Preprocessing covers extraction using Tesseract optical character recognition (OCR) and formation of word document vector with Word2Vec. Hierarchical classification uses CNN to classify 5 types of letters and regular expression to classify 4 types of manuscript letter, 15 origins of letter and 25 subjects of letter. The classified documents are stored in the Hive database in Hadoop big data architecture. The amount of data used is 5200 documents, consisting of 4000 for training, 1000 for testing and 200 for classification prediction documents. The trial result of 200 new documents is 188 documents correctly classified and 12 documents incorrectly classified. The accuracy of automated hierarchical classification is 94%. Next, the search of classified scanned documents based on content can be developed.
IMAGE ENCRYPTION TECHNIQUES USING FRACTAL FUNCTION: A REVIEWijcsit
An increasing demand of secure data transmission over internet leads to the challenge of implementing a consistent cryptosystem. In 2004, USA navy published the patent which highlights the importance of fractal
as an encryption/decryption key in a cryptosystem [1]. Fractal possess butterfly effect i.e. sensitivity to initial condition, due to which small change in input produces a major change in output. This paper summarizes the various recent image encryption techniques in which fractal key is used to encrypt/decrypt
followed by substitution, scrambling and diffusion techniques to provide strong cryptosystem. The algorithms covered both private key encryption as well as public key encryption technique in the paper. The analysed algorithms include a set of fractal function such as Mandelbrot set, Julia set, Hilbert curve, 3D fractal, multi-fractal, IFS and chaotic function to generate a complex key used in the encryption process.
Corresponding performance of each algorithm is analysed by PSNR test, key space, sensitivity analysis and correlation coefficient value between the adjacent pixels of both images (Original image and encrypted image) which shows significant improvement in performance over the traditional encryption methods.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Creation of smart spaces and scaling of devices to achieve miniaturization in pervasive computing environments has put forth a question on the degree of security of such devices. Security being a unique challenge in such environments, solution demands scalability, access control, heterogeneity, trust. Most of the existing cryptographic solutions widely in use rely on the hardness of factorization and number theory
problems. With the increase in cryptanalytic attacks these schemes will soon become insecure. We need an alternate security mechanism which is as hard as the existing number theoretic approaches. In this work, we discuss the aspects of Lattice based cryptography as a new dimension of providing security whose strength lies in the hardness of lattice problems. We discuss about a cryptosystem whose security relies on high lattice dimension.
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...Editor IJCATR
with the arrival of the information age and much more important information systems and communication in human
everyday life, necessity immunization information and communication strategy were also raised. The easiest way to meet this
necessity is conventional encryption algorithms. Encryption is a right tool for data protection in an unsecure channel. To this end, from
two-method symmetric key encryption and public-key cryptography are used. In this paper we examine text cryptography, one of the
most important topics in cryptography. A unique attribute of this kind of encryption has been of interest to many researchers in this
field. This paper, considering the symmetric encryption algorithm, provides a text encryption algorithm using a 128-bit key. The
proposed algorithm uses a 128-bit key, the text data using the XOR operator to convert the encrypted information. Therefore, the aim
of this method is to provide a convenient method for symmetrically encrypting data not to be easily decoded, and finally, the results of
the tests show that the proposed method is better in terms of security and speed of execution
development of a novel keyboard interface unit for writing quran using computerINFOGAIN PUBLICATION
There is a lot of computer keyboard layouts in different languages were produced including Arabic keyboards. Up to date, there is no any type of keyboards which used to write holy Quran according to Uthmanic script – that is the standard script to writing Quran. In North Africa they are using special Quranic font called Al-dani. This paper focus on designing and implementing special Quranic keyboard based on Al-dani. To use this font with more accurate positioning of the diacriticals over the letters or below of them, and to achieve the optimum connectivity and kerning between the letters, distinctive type of keyboard should be used to interface with Al-dani Quranic font to facilitate Quran text writing. This paper explains the techniques used to development a keyboard interface unit for writing Quran using computer. Sample of results for using of this keyboard are presented.
Efficient two-stage cryptography scheme for secure distributed data storage i...IJECEIAES
Cloud computing environment requires secure access for data from the cloud server, small execution time, and low time complexity. Existing traditional cryptography algorithms are not suitable for cloud storage. In this paper, an efficient two-stage cryptography scheme is proposed to access and store data into cloud safely. It comprises both user authentication and encryption processes. First, a two-factor authentication scheme one-time password is proposed. It overcomes the weaknesses in the existing authentication schemes. The proposed authentication method does not require specific extra hardware or additional processing time to identity the user. Second, the plaintext is divided into two parts which are encrypted separately using a unique key for each. This division increases the security of the proposed scheme and in addition decreases the encryption time. The keys are generated using logistic chaos model theory. Chaos equation generates different values of keys which are very sensitive to initial condition and control parameter values entered by the user. This scheme achieves high-security level by introducing different security processes with different stages. The simulation results demonstrate that the proposed scheme reduces the size of the ciphertext and both encryption and decryption times than competing schemes without adding any complexity.
Three Party Authenticated Key Distribution using Quantum CryptographyIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
Attribute Based Encryption with Privacy Preserving In Clouds Swathi Rampur
This is a ppt made by shrihari ,in this encryption with privacy preserving in clouds is described!
It will be helpfull for those who are doing projects on cloud!
A new hybrid text encryption approach over mobile ad hoc network IJECEIAES
Data exchange has been rapidly increased recently by increasing the use of mobile networks. Sharing information (text, image, audio and video) over unsecured mobile network channels is liable for attacking and stealing. Encryption techniques are the most suitable methods to protect information from hackers. Hill cipher algorithm is one of symmetric techniques, it has a simple structure and fast computations, but weak security because sender and receiver need to use and share the same private key within a non-secure channel. Therefore, a novel hybrid encryption approach between elliptic curve cryptosystem and hill cipher (ECCHC) is proposed in this paper to convert Hill Cipher from symmetric technique (private key) to asymmetric one (public key) and increase its security and efficiency and resist the hackers. Thus, no need to share the secret key between sender and receiver and both can generate it from the private and public keys. Therefore, the proposed approach presents a new contribution by its ability to encrypt every character in the 128 ASCII table by using its ASCII value direct without needing to assign a numerical value for each character. The main advantages of the proposed method are represented in the computation simplicity, security efficiency and faster computation.
With the growth of cloud technologies, computing
resources and cloud storage have become the most
demanding online services. There are several companies
desiring to outsource their data storage and resources as
well. While storing private and sensitive data on a third
party data center, it is necessary to consider security and
privacy which become major issues. In this paper, a novel
Double Encryption with Single Decryption (DESD) crypto
technique is proposed to secure the data in cloud storage.
The proposed technique comprises of encryption and
decryption phases where in the encryption phase the data is
randomly partitioned into multiple fragments. Double
encryption is done on each fragment by prime numbers, as
well as Invertible Non-linear Function (INF). These
multiple encrypted data are stored at the multiple cloud
storages with the help of cloud service provider (CSP).
After all verification process the data user collects the key
from the data owner and decrypts the gathered data from
the cloud with the knowledge of inverse INF. The proposed
crypto technique provides more security and privacy to
cloud data and any illegitimate users cannot retrieve the
original data. The performance of the proposed DESD
technique is compared with AES and Triple DES
techniques and the experimental results are plotted which
shows the proposed technique is efficient and faster.
File transfer with multiple security mechanismShubham Patil
The system enhances the security and the data confidentiality between the users and receiver by the two-layer encryption mechanism and the QR code for verification. The system consists of three main components which are very important to providing the security between sender and receiver while transmitting the data
A new algorithm for implementing message authentication and integrity in soft...TELKOMNIKA JOURNAL
IT systems and data that you store, and process are valuable resources that need protection. Validation and reliability of information are essential in networks and computer systems. The communicating is done by two parties via an unsafe channel require a way to validate the data spent by one party as valid (or unaltered) by the other party. In our study, we suggest new one-way defragmentation algorithm to implement message authentication and integration in program execution. These software applications are readily available and freely available because most of the hash functions are faster than their existing radioactive blocks.
Mutual query data sharing protocol for public key encryption through chosen-c...IJECEIAES
In this paper, we are proposing a mutual query data sharing protocol (MQDS) to overcome the encryption or decryption time limitations of exiting protocols like Boneh, rivest shamir adleman (RSA), Multi-bit transposed ring learning parity with noise (TRLPN), ring learning parity with noise (Ring-LPN) cryptosystem, key-Ordered decisional learning parity with noise (kO-DLPN), and KD_CS protocol’s. Titled scheme is to provide the security for the authenticated user data among the distributed physical users and devices. The proposed data sharing protocol is designed to resist the chosen-ciphertext attack (CCA) under the hardness solution for the query shared-strong diffie-hellman (SDH) problem. The evaluation of proposed work with the existing data sharing protocols in computational and communication overhead through their response time is evaluated.
Automated hierarchical classification of scanned documents using convolutiona...IJECEIAES
This research proposed automated hierarchical classification of scanned documents with characteristics content that have unstructured text and special patterns (specific and short strings) using convolutional neural network (CNN) and regular expression method (REM). The research data using digital correspondence documents with format PDF images from Pusat Data Teknologi dan Informasi (Technology and Information Data Center). The document hierarchy covers type of letter, type of manuscript letter, origin of letter and subject of letter. The research method consists of preprocessing, classification, and storage to database. Preprocessing covers extraction using Tesseract optical character recognition (OCR) and formation of word document vector with Word2Vec. Hierarchical classification uses CNN to classify 5 types of letters and regular expression to classify 4 types of manuscript letter, 15 origins of letter and 25 subjects of letter. The classified documents are stored in the Hive database in Hadoop big data architecture. The amount of data used is 5200 documents, consisting of 4000 for training, 1000 for testing and 200 for classification prediction documents. The trial result of 200 new documents is 188 documents correctly classified and 12 documents incorrectly classified. The accuracy of automated hierarchical classification is 94%. Next, the search of classified scanned documents based on content can be developed.
IMAGE ENCRYPTION TECHNIQUES USING FRACTAL FUNCTION: A REVIEWijcsit
An increasing demand of secure data transmission over internet leads to the challenge of implementing a consistent cryptosystem. In 2004, USA navy published the patent which highlights the importance of fractal
as an encryption/decryption key in a cryptosystem [1]. Fractal possess butterfly effect i.e. sensitivity to initial condition, due to which small change in input produces a major change in output. This paper summarizes the various recent image encryption techniques in which fractal key is used to encrypt/decrypt
followed by substitution, scrambling and diffusion techniques to provide strong cryptosystem. The algorithms covered both private key encryption as well as public key encryption technique in the paper. The analysed algorithms include a set of fractal function such as Mandelbrot set, Julia set, Hilbert curve, 3D fractal, multi-fractal, IFS and chaotic function to generate a complex key used in the encryption process.
Corresponding performance of each algorithm is analysed by PSNR test, key space, sensitivity analysis and correlation coefficient value between the adjacent pixels of both images (Original image and encrypted image) which shows significant improvement in performance over the traditional encryption methods.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Creation of smart spaces and scaling of devices to achieve miniaturization in pervasive computing environments has put forth a question on the degree of security of such devices. Security being a unique challenge in such environments, solution demands scalability, access control, heterogeneity, trust. Most of the existing cryptographic solutions widely in use rely on the hardness of factorization and number theory
problems. With the increase in cryptanalytic attacks these schemes will soon become insecure. We need an alternate security mechanism which is as hard as the existing number theoretic approaches. In this work, we discuss the aspects of Lattice based cryptography as a new dimension of providing security whose strength lies in the hardness of lattice problems. We discuss about a cryptosystem whose security relies on high lattice dimension.
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...Editor IJCATR
with the arrival of the information age and much more important information systems and communication in human
everyday life, necessity immunization information and communication strategy were also raised. The easiest way to meet this
necessity is conventional encryption algorithms. Encryption is a right tool for data protection in an unsecure channel. To this end, from
two-method symmetric key encryption and public-key cryptography are used. In this paper we examine text cryptography, one of the
most important topics in cryptography. A unique attribute of this kind of encryption has been of interest to many researchers in this
field. This paper, considering the symmetric encryption algorithm, provides a text encryption algorithm using a 128-bit key. The
proposed algorithm uses a 128-bit key, the text data using the XOR operator to convert the encrypted information. Therefore, the aim
of this method is to provide a convenient method for symmetrically encrypting data not to be easily decoded, and finally, the results of
the tests show that the proposed method is better in terms of security and speed of execution
development of a novel keyboard interface unit for writing quran using computerINFOGAIN PUBLICATION
There is a lot of computer keyboard layouts in different languages were produced including Arabic keyboards. Up to date, there is no any type of keyboards which used to write holy Quran according to Uthmanic script – that is the standard script to writing Quran. In North Africa they are using special Quranic font called Al-dani. This paper focus on designing and implementing special Quranic keyboard based on Al-dani. To use this font with more accurate positioning of the diacriticals over the letters or below of them, and to achieve the optimum connectivity and kerning between the letters, distinctive type of keyboard should be used to interface with Al-dani Quranic font to facilitate Quran text writing. This paper explains the techniques used to development a keyboard interface unit for writing Quran using computer. Sample of results for using of this keyboard are presented.
Marquise Square is an ultra-luxurious property introduced next to the Dubai Canal, the upcoming marina of the city. It is a superior-quality apartment constructed in the striking 29-level development boasted with a wonderful view of high-rising skylines of Dubai including the iconic place like Burj Khalifa. Investors will witness a high growth in investment through this opportunity of the real estate development. These finest homes of Marquise Square are prominent in terms of development and they are constructed with studio apartments along with 1, 2, and 3 bedrooms units.
Weekly Outlook for Nifty and major indices (January 02, 2017 - January 06, 2017)equitypandit
Nifty ended the week on positive note gaining around 2.50%.
As we have mentioned last week that support for the index lies in the zone of 7900 to 8000 levels from where the index has bounced couple of times in recent past and this range is the strong support zone for the index. If the index breaks below these levels on closing basis for couple of days then the index can drift to the levels of around 7500 to 7700. During the week the index manages to hit a low of 7894 and close the week around the levels of 8186.
Minor support for the index lies in the zone of 8080 to 8120. Support for the index lies in the zone of 7900 to 8000 levels from where the index has bounced couple of times in recent past and this range is the strong support zone for the index. If the index breaks below these levels on closing basis for couple of days then the index can drift to the levels of around 7500 to 7700.
Resistance for the index lies in the zone of 8250 to 8300 where the index has form a right shoulder of the H & S pattern and medium & long term moving averages are lying. If the index manages to close above these levels then the index can move to the levels of 8450 to 8500 where neckline of the H & S pattern of 8500 to 8900 is lying.
Broad range for the week is seen from 8000 on downside to 8400 on upside.
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmIJECEIAES
Cloud computing is a structure for rendering service to the user for free or paid basis through internet facility where we can access to a bulk of shared resources which results in saving managing cost and time for large companies, The data which are stored in the data center may incur various security, damage and threat issues which may result in data leakage, insecure interface and inside attacks. This paper will demonstrate the implementation of hybrid cryptography security in public cloud by a combination of Elliptical Curve Cryptography and Twofish algorithm, which provides an innovative solution to enhance the security features of the cloud so that we can improve the service thus results in increasing the trust over the technology.
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...IJECEIAES
he Wireless Sensor Networks (WSNs) have spread its roots in almost every application. Owing to their scattered nature of sensor nodes, they are more prone to attacks. There are certain applications e.g. military, where sensor data‟s confidentiality requirement during transmission is essential. Cryptography has a vital role for achieving security in WSNs.WSN has resource constraints like memory size, processing speed and energy consumption which bounds the applicability of existing cryptographic algorithms for WSN. Any good security algorithms has higher energy consumption by the nodes, so it‟s a need to choose most energy-efficient cryptographic encryption algorithms for WSNs. This paper surveys different asymmetric algorithms such as RSA, Diffie-Hellman, DSA, ECC, hybrid and DNA cryptography. These algorithms are compared based on their key size, strength, weakness, attacks and possible countermeasures in the form of table.
In attribute based encryption (ABE) scheme, attributes plays a very important role. Attribute –based encryption provides privacy protection for the users by a set of attributes. Now a days as cloud is most widely used in mostly all fields so there is need of keeping data more secure and confidential which is outsourced on the cloud. Security of the data in cloud database server is the key area of concern in the acceptance of cloud. It is required very high degree of privacy and authentication. In existing system used hierarchical authorization structure to reduce the burden and risk of a single authority .this paper proposes a hierarchical attribute based encryption which directly provides attribute value by user as well as data stored in different types of media.
Improving Efficiency of Security in Multi-CloudIJTET Journal
Abstract--Due to risk in service availability failure and the possibilities of malicious insiders in the single cloud, a movement towards “Multi-clouds” has emerged recently. In general a multi-cloud security system there is a possibility for third party to access the user files. Ensuring security in this stage has become tedious since, most of the activities are done in network. In this paper, an enhanced security methodology has been introduced in order to make the data stored in cloud more secure. Duple authentication process introduced in this concept defends malicious insiders and shields the private data. Various disadvantages in traditional systems like unauthorized access, hacking have been overcome in this proposed system and a comparison made with the traditional systems in terms of performance and computational time have shown better results.
Mobile nodes in military environments like a field of battle or a hostile region ar seemingly to suffer from intermittent network property and frequent partitions. Disruption-tolerant network (DTN) technologieshave become eminent solutions that enable wireless devices carried by troopers to speak with one another and access the guidance or command faithfully by exploiting secondary storage nodes.a number of the foremost difficult problems during this state of affairs ar the social control of authorization policiesand also the policies update for secure information retrieval. Ciphertext- policy attribute-based secret writing (CP-ABE) could be a promising cryptologic resolution to the access management problems. However, the matter of applying CP-ABE in suburbanised DTNs introduces many security and privacy challenges with respect to the issued fromtotally different authorities. during this paper, we have a tendencyto propose se- cure information retrieval theme victimization CP-ABE for suburbanised DTNs wherever multiple key authorities manage their attributes severally. we have a tendency to demonstrate a way to apply the projected mechanism and with efficiency manage confidential information distributed within the disruption-tolerant military network.
Enhancing the Techniques to Secure Grid Computingijtsrd
Security is important issue in every aspect in todays world if you are using the networks. Various algorithms are there to secure your network so that unauthorized user cant breach into your accounts. SO for this authentication and authorization plays an important role but apart from these use of various encryption algorithms are there for grid data security. By using these algorithms you can easily secure your network and it will also enhance the performance of our grid networks. In this paper model has been designed for grid security that is been implemented on network Simulator and the performance has been measured with the previous models. By using various cryptographic algorithms the efficiency and the packed delivery ratio is increased incredibly. Simranjeet Kaur"Enhancing the Techniques to Secure Grid Computing" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-1 | Issue-6 , October 2017, URL: http://www.ijtsrd.com/papers/ijtsrd2531.pdf http://www.ijtsrd.com/computer-science/computer-network/2531/enhancing-the-techniques-to-secure-grid-computing/simranjeet-kaur
Secure Data Sharing Algorithm for Data Retrieval In Military Based NetworksIJTET Journal
Abstract— Mobile knots now armed atmospheres such equally battlefield or aggressive area remain expected toward smart after irregular net connectivity and regular panels. Disruption Tolerant Network (DTN) tools stay attractive positive keys that agree knots toward connect with each other in these dangerous interacting atmospheres.The problem of applying the security mechanisms to DTN introduces several security challenges.Since nearly handlers could modification their related characteristics by approximately argument and reliability of data should be changed otherwise around isolated secrets power remain bargained significant reversal aimed at respectively characteristic is essential in command toward create organisms safe in this research a novel approaches are used to overcome the above mentioned problems called secure data sharing algorithm. This algorithm calculate hash importance aimed at coded documents which is used to check the reliability of encrypted confidential data.
Similar to survey paper on object oriented cryptographic security for runtime entities (20)
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
HEAP SORT ILLUSTRATED WITH HEAPIFY, BUILD HEAP FOR DYNAMIC ARRAYS.
Heap sort is a comparison-based sorting technique based on Binary Heap data structure. It is similar to the selection sort where we first find the minimum element and place the minimum element at the beginning. Repeat the same process for the remaining elements.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERSveerababupersonal22
It consists of cw radar and fmcw radar ,range measurement,if amplifier and fmcw altimeterThe CW radar operates using continuous wave transmission, while the FMCW radar employs frequency-modulated continuous wave technology. Range measurement is a crucial aspect of radar systems, providing information about the distance to a target. The IF amplifier plays a key role in signal processing, amplifying intermediate frequency signals for further analysis. The FMCW altimeter utilizes frequency-modulated continuous wave technology to accurately measure altitude above a reference point.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
We have compiled the most important slides from each speaker's presentation. This year’s compilation, available for free, captures the key insights and contributions shared during the DfMAy 2024 conference.
survey paper on object oriented cryptographic security for runtime entities
1. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-12, Dec- 2016]
Infogain Publication (Infogainpublication.com) ISSN : 2454-1311
www.ijaems.com Page | 2112
Survey Paper on Object Oriented Cryptographic
Security for Runtime Entities
Prof. Supriya Sarkar, Sohina Hasan
Department of Computer Engineering, Department of Computer Engineering, SKNSITS, Lonavala, India
Abstract— With the advent of complex systems the need for
large data storage with less space utility & high
performance have become the vital features. Another
important concern of the data is the security which is
assured via the cryptographic techniques implemented at all
levels of data storage. In this survey paper we introduce the
concept of security between two hierarchical data accesses
and propose the concept of hierarchical cryptography
between data of different classes of different hierarchies.
Keywords— Hierarchical inheritance, cryptree,
cryptographic file system, Elliptical curve, Dual level key
management, Chinese Remainder Theorem, cipher text
policy attribute based encryption, Two level based
Encryption construction.
I. INTRODUCTION
We have a lot of emerging trends for providing security to
the data at different levels in the system. The data is usually
organized as: (i) hierarchically (i.e. in the form of classes
where each class extracts data from the other class. (ii) In
the form of Grid (which emphasizes on large scale resource
sharing & multi institutional collaboration). (iii) Multilevel
access of data, (iv) data access in file system & storage area
network, (v) general access & (vi) cloud computing (i.e.
access of data from remote login ).
All the data access & storage units are dealing with the
problems of attacks which can be characterized as: (a)
Passive Attacks: which consist of eavesdropping Or traffic
analysis. (b) Active Attacks: which deal with masquerading,
replaying modification, denial of service(DOS) attack.
During storage of data the data is static while during
runtime the data has to be updated on and off depending
upon the need. The access of data & its updating should be
provided to only authentic users such that the key factors
like confidentiality & integrity are maintained. In order to
maintain such factors we use the technique of cryptography
where we encrypt the data into cipher text & then on use
decrypt it back to plain text. We also overcome the issue of
general access in hierarchy via the Chinese Remainder
Theorem.
Coming back to the aspect of Cryptography; it deals with
key generation to decode the text. Depending upon the need
either a single key is generated or dual keys are generated.
We have two types of keys in cryptographic techniques.
They are
(i) Symmetric Key: It is the same key used for both
encryption of plaintext & decryption of cipher text.
(ii) Asymmetric Key: It uses two different keys namely
public key & private key for encryption &
decryption of text.
At hierarchical level when we extract information then
depending upon the access specifier the data under the class
is extracted & only authorized user has to be provided
access for it. We generate a single key to encrypt data of a
same class whereas on any update via the authorized user
the key also will have to b updated. All the more here in
section 1 we will emphasize more on the cryptography for
the classes existing between different hierarchies which will
require the data exchange via there objects. Section 2 gives
literature survey followed by existing systems, conclusions
& references in section 3, 4 & 5 respectively.
II. LITERATURE SURVEY
The literature survey contains study of different schemes
available in cryptographic hierarchical access control for
dynamic structures.
2.1 Dual key management scheme for secure grid : It is the
mechanism using an innovative concept of Access Control
Polynomial(ACP) & one way functions. The first level
provides a flexible & secure group communication
technology while the second level offers hierarchical access
control.
2.2 Elliptical Curve cryptography: Elliptical curves are
named so as they appear to be similar to the equation
defining the roots of an ellipse. They are equations
containing two variables & coefficients where the elements
are in finite field. The elliptical equation is in the form of y2
=x3
+ax +b. The coefficients a, b should satisfy the
condition 4a3
-27b2
≠0 so that there are no repeated factors.
2. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-12, Dec- 2016]
Infogain Publication (Infogainpublication.com) ISSN : 2454-1311
www.ijaems.com Page | 2113
For given values of a & b, the elliptical curve consists of
positive & negative values of y for each value of x. A
special point which acts as an identity is used. The
following addition rules are used in elliptical curve
arithmetic.
2.3 Cryptree: A cryptree is a cryptographic data structure
consisting of keys & cryptographic links. It can be seen as
directed graph with keys as vertices & cryptographic links
as edges. Due to this tree structure cryptrees can be used
efficiently manage the keys of nested folders in
cryptographic file system, typically by making the links of
the cryptographic tree publicly available.
2.4 Chinese Remainder Theorem(CRT): It works on 2
categories: data based solution and key based solution.
Assume a data item is to be shared with k shares. In the data
based solution, this data item is first encrypted by k shares’
public keys respectively; then these k individual cipher text
are combined by CRT . As a result, the final share cipher
text is k times bigger than the data item. In the key based
solution, the data item is first encrypted by a symmetric key
to produce a data cipher text. Next, this symmetric key is
encrypted by k shares’ public keys respectively. Finally,
these k individual cipher text are combined by CRT to
produce a symmetric key share cipher text. The Data cipher
text & the symmetric key share cipher text are concatenated
& shared with those k shares.
2.5 File Encryption Integrity Protection Through Hash
Trees: To compute the hash trees, a file is divided into 4kB
blocks, a corresponding to Linux page size. We recall the
construction of a k-ary Merkel tree using a hash function
H(): Every leaf node stores the output of H applied to a data
page of length b bytes, & every internal node stores the
hash value computed on the concatenation of the hash
values in its children. As the maximum file size in SAN.FS
is fixed the maximum depth of the hash tree can be
computed in advance, given the degree k. A high degree k
results in a flat tree structure & has therefore similar
unfavorable properties as using a single hash value for the
whole life.
2.6 Dynamic Exterior Attacks: When an illegal user wishes
to access the security key through the related public
information when a new class joins the hierarchy.
2.7 Cipher text policy Attribute-based Encryption(CP-
ABE): it is a public key cryptography primitive for one-to-
many communications in cloud. In this algorithm, a user’s
private key is associated with a set of attributes, encrypts
the file with an access tree. The access tree is organized in a
way that its interior nodes are threshold gates & its leaf
nodes are associated with user attributes. The user is able to
decrypt if and only if that his attributes satisfy the access
tree.
2.7.1 Proxy Re-Encryption: It is a semi trusted proxy in
which the given proxy re-encryption key translates cipher
texts under public key into cipher text under public key &
vice versa.
2.8 Two Level Encryption Based Construction (TLEBC): It
uses two level graphs. In two level partially ordered
hierarchy, where each level contains the same number of
classes & there are no edges between classes at the same
level. Also in TLEBC dynamic updates to the hierarchy can
be accomplished by means of only local updates to the
public information only means of only local updates to the
public information only.
S.
No
Title Year Method Used Algorithm Implemented Problem/ Drawback
1. A
Cryptographic
Solution For
General
Access Control
2005 Chinese Remainder
Theorem (CRT) &
hierarchical
Encryption
CRT based on database solution and
key based solution by : (i) fast
modular exponentiation algorithm
(ii) Garner’s algorithm
It is too complex and
lengthy. Security issues are
a prominent problem with
this algorithm. It lacks
user/programmer friendly
interface.
2. Dual-Level
Key
Management
for secure grid
communication
in dynamic &
hierarchical
2006 Dual key
management
mechanism using
access control
polynomial one-way
function .
First level provides a flexible &
secure group communication &
second level offer hierarchical access
control.
Due to high dynamic
nature of grid computing
updates of group keys
efficiently & effectively
becomes a challenging
problem.
3. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-12, Dec- 2016]
Infogain Publication (Infogainpublication.com) ISSN : 2454-1311
www.ijaems.com Page | 2114
groups
3. Multilevel
Access
Control in a
MANET for A
Defense
Messaging
system using
Elliptical
Curve
Cryptography
2009 Elliptic Curve
Cryptography
Steps of elliptical Cryptography are:
(i) Decide on the elliptical
curve E, the elliptical curve
should not have two
coefficients a, b such that
4a3
-27b2
≠0 & a prime
number p.
(ii) For the elliptical curve
equation apply values of x
from 1 to p-1 & generate y
values
(iii) find the quadratic residues
to avoid repetition in mod
values & then collect all
points on the elliptical curve
Management of traffic
over the network &
network congestion issues.
4. Cryptree: A
folder tree
structure for
cryptographic
file systems.
__
Data encapsulation
under a Cryptree .
Hierarchical access via
both types of
cryptrees.
(i) General
Cryptree
(ii) Read Access
Cryptree
Cryptree does not provide
proper information.
Medium
5. Cryptographic
Security for a
high
performance
Distributed
File System
2010 Key Management is
integrated with the
meta data service of
the SAN file system.
File Encryption &
integrity protection
through hash trees.
(i) Hash tree implementation
should include more
sophisticated locking
mechanism.
(ii) Recovery issues.
High
6. An Efficient &
Secure key
Management
Scheme for
hierarchical
Access Control
Based on ECC
2011 Efficient key
management &
derivation based on
elliptical curve
cryptosystem.
The product of the
algorithm proposed by
Jeng Wang Scheme is
proned to dynamic
exterior attacks.
No cryptographic solution is
given to over come dynamic
exterior attack.
Low
7. Survey Paper
on a Dynamic
Cryptographic
Access
Control
Scheme in
Cloud Storage
Services.
2014 Cipher text policy
attribute based
Encryption.(CPABE)
(i) Proxy Re-
encryption
Algorithm
(PRE)
(ii) Lazy Re-
encryption
Algorithm
Data security is at risk Low
4. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-12, Dec- 2016]
Infogain Publication (Infogainpublication.com) ISSN : 2454-1311
www.ijaems.com Page | 2115
8. Cryptographic
hierarchical
Access Control
For Dynamic
Structures.
2016 Hierarchical key
assignment scheme
with dynamic updates.
Construction based on
symmetric encryption
schemes.
(i) Protected data could be
accessed i.e. it can be seen
by unauthorized user since
key decryption is not to
reliable here.
(ii) Cannot be used for
different classes of different
hierarchies.
III. CONCLUSION
In this paper we propose the model from the knowledge
gained by the literature survey of various survey papers the
data should go triple encryption where data is organized
under cryptees. Then the cryptographic key for every class
function should be enveloped under hash functions. And at
the end all this data should again be Encrypted using 128 bit
AES algorithm.
ACKNOWLEDGEMENT
This paper has been completed with the help of Prof.
Supriya Sarkar. I thank her for her help, support &
guidance. I also thank the anonymous reviewers for their
useful comments.
REFERENCES
[1] William Stalings, ”Cryptography & network Security
principles & practices”, Third edition, pearson
education.2001
[2] M. Atallah, K.Frikken,& M. Blanton, ”Dynamic &
Efficient Key Management For Access Hierarchies,”
CERIAS Tech report 2006-02, Center for education &
research in, information Assurance & security, Purdue
University.
[3] X. Zou, B. Ramamurthy, & S. Magliveras, “Chinese
remainder theorem based hierarchical access controller
secure group communications.” Lecture notes in
computer Science (LNCS), 2229:381.385, Nov. 2001
[4] A. Azagury, R. Canettii, M. Factor, S. Halevi, E.Henis
D. Naor, N. Rinetzky, O. Rodeh, & J.Sataran, “A two
layered approach for securing an object store network,
“ in Proc. 1st
International IEEE Security in storage
Workshop (SISW 2002), 2002.
[5] B. Gassend, G. E. Suh, D. Clarke, M. van Dijk, &
S.Devdas, “Caches & hash trees for efficient memory
integrity verification, “ in Proc. 9th
Intl. Symposium on
high Performance Computer Architecture(HPCA ‘03),
2003.
[6] R. Pletka & C.Cachin, “Cryptographic security for a
high- performance distributed file system,“ Research
Report RZ 3661, IBM Research, Sept. 2006.
[7] C. C. Chang, I. C. Lin, H. M. Tsai, & H. H. Wang. “A
key assignment Scheme for controlling Access in
Partially Ordered User Hierarchies”. In Proceedings of
18th
International Conference On Advanced
Information Networking & Applications(AINA’04),
volume 2, pages 376-379, 2004.
[8] H. M. Tsai & C. C. Chang. “A Cryptographic
implementation for dynamic access control in a user
hierarchy.” Computers & Security, 14(2): 159-166,
1995.
[9] Laxminath Tripathy & Nayan Rajan Paul “ An
Efficient and secure Key Management Scheme for
Hierarchical Access Control Based on ECC” .
[10]Roman Pletka & Christian Cachin “Cryptographic
Security for a high-Performance Distributed File
System”.
[11]Prof. D. N. Rewadkar(H.O.D) & Juhi M. Shah
“Survey Paper on a Dynamic Cryptographic Access
Control Scheme in Cloud Storage Services” Juhi M
Shah et al, Int. J. Computer Technology &
Applications, Vol5(3), 1309-1315
[12]Bethencourt, A. Sahai, B. Wwters, “Ciphertext-policy
attribute based encryption” IEEE Symposium on
security and Privacy. Berkeley, California, USA, pp.
321-334, 2007.
[13]Rui Zhang, Pei Shuai Chen “A Dynamic
Cryptographic Access Control Scheme in cloud
Storage Services”
[14]Yibing Kong, Jennifer Seberry, Jansuz R. Getta, &
Ping yu, “ A Cryptographic Solution For General
Access Control” School of Information Technology &
Computer Science, University of Wollongong, NSW,
Australia
[15]Rivest, R. L, Shamir, A., Adleman, L. A method for
obtaining Digital Signatures & Public key
5. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-12, Dec- 2016]
Infogain Publication (Infogainpublication.com) ISSN : 2454-1311
www.ijaems.com Page | 2116
Cryptosystems. Communications of the ACM, Vol.
21, no. 2. ACM Press(1978) 120-126
[16]Dominik Grolimund, Luzius Meisser, Stefan Schmid,
Roger Wattenhofer, “Cryptree: A Folder Tree
Structure for Cryptographic File Systems” ethz.ch
Computer Engineering & Networks Laboratory(TIK),
ETH Zurich, CH-8092 Zurich
[17]H. Chien, Y. Chung, . Tian. A Novel Key
Management Scheme for dynamic Access Control in a
user Hierarchy, IEEE COMPSAC, 2004.
[18]J. Nafeesa Begum, K.Kumar, Dr. V. Sumathy
“Multilevel Access Control in a MANET for a
Defense Messaging system using Elliptical Curve
Cryptography”
[19]Xukai Zou, Yuan-Shun Dai, Xiang Ran, “Dual- level
Key Management for secure grid communication in
dynamic & hierarchical groups. Department of
computer & Information Science, Purdue University
School of Science, Indiana University, Purdue
University, Indianapolis, 46202, USA.
[20]Arpana Mahajan & prof. Yask Patel, “Enhancing PHR
Services in cloud computing: Patient Centric & fine
Grained data Access using ABE”.
[21]Jason Crampton, Keith Martin & Peter Wild, “On Key
Assignment for Hierarchical Access Control”,
Information security Group Royal Holloway,
University of London, UK.
[22]Minu George, Dr. C. Suresh Gnanandhas, Saranya. K,
“A Survey on Attribute Based Encryption Scheme in
Cloud Computing” Department of CSE, Vivekanandha
College Of Engineering for Women, Tamil Nadu,
India
[23]”Cryptographic Hierarchical Access Control for
Dynamic Structures” by Arcangelo Castiglione,
Alfredo De Santis, Member, IEEE, Barbara Masucci,
Francesco Palmieri, Aniello Castiglione, Member,
IEEE, and Xinyi Huang