Click the Desired Domain to Read the Research Articles      

Internet of Things     UAV/USV/Vehicular Ad Hoc Network      Mobile Ad Hoc Network     Underwater/Wireless Sensor Network

     Cloud Computing     Machine Learning     Web/Social Network      Wireless Communication     Cryptography/Network Security     

Intrusion Detection System      Big Data     Image Processing     Data Mining      Malware/Applications

Network Security      

A Novel Algorithm for Secured Data Sharing in Cloud using GWOA-DNA Cryptography
Mercy Joseph, Gobi Mohan

Abstract - Cloud is a recent technology that enables wide access and storage on the internet. Moreover, the cloud computing environment allows storing and sharing plenty of digital data including text, image, video, audio, etc. through the internet. Although it is cost-effective and has numerous advantages, cloud technology still faces a lot of challenges like data loss, quality issues, and data security. In this paper, an effective algorithm is introduced using deoxyribonucleic acid (DNA)-based cryptography to enhance data security while sharing the data over the internet. For this process, an optimized encryption model is implemented using Grey Wolf Optimization (GWO) Algorithm to generate optimal encrypted data while sharing. Various datasets have been implemented to verify the efficiency of the proposed GWO Assisted-DNA (GWOA-DNA) cryptography in terms of accuracy and execution time.

Published: 2022Read / Download
Blockchain Powered Mutual Authentication and Access Control Protocol
Geeta Kakarla, S. Phani Kumar

Abstract - With the advancement in the network connectivity, services can be subscribed for limited period of time. Subscribing for certain services is always an economic option rather than owning them. Implementing adequate procedures in the establishments, meeting the access control policies is challenging. Although the essential procedures are implemented using the centralized scheme where the single central server cater to the access control requests and the authorization mechanisms with the help of the stored identifiable attributes of the workstations in the web. In our article, we are proposing a blockchain powered lightweight, decentralized and secure framework for mutually authenticating the participating entities and levy the access control model among them. In our protocol, the device administrators (DA) can maintain their signed device policies for any of its services in the blockchain network which increases its visibility to more subscribers and at the same time, DAs can get rid of tedious job of authenticating each and every user/subscriber. On the other hand, users can also come to know about the wide range of services provided by different service providers and can avail appropriate service with the optimal constraints. We used elliptic curve cryptography (ECC) to transmit the secret sign parameters which makes our protocol lightweight. Secret sign parameters are used to verify the signature of any entity at the other end.

Published: 2022Read / Download
A Review of Chronological Development in Group and Hierarchical Key management Schemes in Access Control Model: Challenges and Solutions
Smita Athanere, Ramesh Thakur

Abstract - With tremendous growth in communication model, the application dependent on group communication like stock exchange activities, file sharing, war gaming, teleconferencing, pay per view, online education also grown. But in such application security is prime concern. All related things are encrypted via keys and shared to achieve privacy and security. In this paper we identified all methodologies used for group and hierarchical key management and done their analysis. We identified major algorithms for management of group key in communication networks and study several criteria of performance such as computation, storage, and communication overhead at the time of revocation of different users considering evaluation parameters. We find challenges in designing key management algorithm based on various factors. We found power of key management lies in minimization of overhead involved in time and storage at the moment of generation of key, distribution of keys and key updation when a node member joins or leaves the communication group. So it is need to guarantee to safe group key and safe group communication. Research work must be intended toward secure generation of keys, distribution of keys and exchanges of messages in secure environment. Analysis of all methodologies gives an idea for designing a good group key management algorithm either for wired, wireless, IoT devices and cloud platform. This review paper explored various security challenges and issues for handling group key like network compatibility, related to performance and security. This paper enables researcher to take better decisions since all schemes are mentioned in chronological order.

Published: 2022Read / Download
Reduce the Memory Used in Key Management for Security Systems
Yasser Ali Alahmadi, Mokhtar Alsorori, Saleh Noman Alassali

Abstract - Nowadays, most of the applications are distributed and require two or more parties to establish a secure communication channel over an open network. Key management is one of the major security issues in such applications. A good security system should reduce more complex problems related to the proper key management and secure-saving of a little number of secret keys at every endpoint. So it is difficult to save one key secretly, and the difficulty will be more and more if the number of secret keys increased. In the literature, many schemes have been proposed for key distribution and management. Although, such schemes have reduced the number of secret keys stored at the users to only one key, Key Distribution Center (KDC), known here as Key Managing Center (KMC), still maintains a shared secret key with each user in the network. In this paper, we propose a method to reduce the number of secret keys stored at the KDC to only one key, regardless of the network size. In the proposed method, the KMC will store a unique stuff data for every user. The user's secret key will be generated by taking the stuff data, adding the lifetime of the secret key, and then hashing the resulting string using the manager secret key. The output digest will be used as the user's secret key. By this way, KMC will only store one key called the manager secret key. Furthermore, we will combine the proposed method with our previous work to build an efficient key management model. Analysis and experimental results indicate that the developed model is highly secure, practical and efficient.

Published: 2021Read / Download
Enhancing Security of Cloud Data through Encryption with AES and Fernet Algorithm through Convolutional-Neural-Networks (CNN)
Pronika, S.S.Tyagi

Abstract - Cloud as a storage in the recent technological development had been focused by researchers, since it offers more insight towards meta-data based security and safety along with techniques in encryption and decryption of messages. "Data" being a crucial and complicated means-of-information in current technological era, it has been majorly accessed and utilized for varied purposes (example: image storage/access) by people globally through 'cloud computing' via social platforms, personal data-storage, professional data-accumulation, research based studies, etc. Thus to protect data in cloud, especially the images, the current study developed the algorithm by combining 'AES' and 'Fernet' where double-level encryption with CNN Auto-Encoders. Thus by developing the model, the study aims to provide more secured cloud computing model than existing models. The original images as input are processed, encrypted/decrypted, converted into bitmap images as outputs that are decrypted by users with 'key' when needed. The study was a success and found to be effective in image encryption field with high RMSE (0.040206), less MSE-Loss (0.001616) and MAE (0.0266323) scores than estimated scores.

Published: 2021Read / Download
An Empirical Review on Blockchain Smart Contracts: Application and Challenges in Implementation
Jasvant Mandloi, Pratosh Bansal

Abstract - This paper focuses on an extensive review of Blockchain Smart contract applications in real-world scenarios and challenges in it. As in today's world, Blockchain has got tremendous importance in different types of services, so it will be beneficial to analyze the loopholes in the cybersecurity aspect as well as other technical issues in privacy and governance. A smart contract is the software code that comprises a self-executed set of rules and regulations that runs on Blockchain. To implement various real-world services over different decentralized platforms, a lot of research work is going on. In this paper, a detailed review is done on more than 100 latest published documents based on the Blockchain Smart contract and applications. By following the systematic mapping research methodology first, we have identified paper relevant to our research domain, and then by applying various filters, we extracted relevant information. At last, the article highlighted the challenges and research gaps that have to be addressed in the future.

Published: 2020Read / Download
Performance Evaluation of SHA-3(KECCAK) on ARM Cortex-A9 and Comparison with ARM 7TDMI and Cortex-M4
Pooja Kaplesh

Abstract - Cryptography is the main area which deals with security. Cryptographic hash functions are essential elements of cryptography which is helpful for various security application areas. This paper presents cryptography, cryptographic hash functions, their properties, applications and some popular cryptographic hash standards. In this paper, KECCAK (SHA-3) algorithm has been tested on ARM based platforms (Cortex-A9) and analyzed its performance on the same. Comparative study is also discussed between Cortex-A9, Cortex-M4 and ARM7TDMI to check on which ARM platform KECCAK performs well. KECCAK has strong design construction that is "sponge construction" which differentiates it from other SHA-3 candidates.

Published: 2020Read / Download
Vulnerability Exploitations Using Steganography in PDF Files
Istteffanny Isloure Araujo, Hassan Kazemian

Abstract - This article analyses the ways malicious executable files hides with Steganography on the most used files of our daily basis such as PDF, Word, Text, and Image. It demonstrates how data is hidden and gathers innovative ways of identifying potential attacks to prevent them by engaging the safety and exploitation of files distributed online. It is concerned with infected files that can have malicious executable applications embedded, executing itself upon the opening of the original file. Several experiments are detailed exploiting gaps in PDF, email and image files in order to draw awareness to security professionals and Ethical hackers' trainees................................

Published: 2020Read / Download
Textual Data Hiding in Digital Images Using Chaotic Maps
Vipul Sharma, Roohie Naaz Mir

Abstract - In this research paper another methodology for covering up literary information in computerized hued pictures has been proposed. Digital colored pictures will simply be used as a canopy media in steganography as a result of numerous deficiencies rumored in sensory system of mortals. In the proposed system we have utilized two non-subordinate disordered arrangement, for distinguishing the fundamental pixel positions where the bits relating to the mystery message must be inserted in the computerized cover picture. For implanting the message bits in the clamorously chosen pixels a 3-3-2 Least Significant Bit (LSB) addition strategy has been utilized. The proposed technique also provides a sufficient level of security because of the fact that same series of chaotically generated pixel locations for embedding the message bits is very difficult to be reproduced, till and unless the initial conditions of the 2 chaotic maps used for pixel selection method are well known. Additionally, the arranged method gives higher...............................

Published: 2018Read / Download
A Robust Hybrid Steganography Mechanism for Security in Data Communication Networks
Neha Tayal, Sangeeta Dhall, Shailender Gupta

Abstract - Steganography is an art and science of hiding the secret information into a carrier such as image, audio etc. in order to conceal the existence of the data. It can be broadly classified into two categories: Spatial (Time) and Frequency domain. The former technique preserves the quality of the cover image while the latter technique provides robustness during the embedding process. As mentioned, both the techniques have their certain pros. Therefore, in this paper a hybrid scheme based on the merits of the two has been proposed. The scheme is implemented in MATLAB-10 and various performance metrics such as Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE), Correlation coefficient, Time Complexity, Bit Error Rate(BER), effect of Gaussian Noise & salt & paper noise on image are used to evaluate the efficacy of the proposed mechanism in comparison to others in literature. The results show that the proposed mechanism is highly robust to various kinds of attacks and has low time complexity.

Published: 2016Read / Download
A Fine-Grained Spatial Cloaking With Query Probability Levels for Privacy in LBS
Albelaihy Abdullah, Jonathan Cazalas

Abstract - In the technology of LBS i.e. location based services, location related queries are submitted to the mobile users. These queries are submitted to untrusted server of LBS for obtaining service. However, these queries considerably stimulate and produce privacy issues associated with mobile users. FGcloak has been proposed so as to address this privacy related issue. It has been revealed that the FGcloak is considered as the fine grained spatial cloaking method based on the query probability levels to generate k-anonymity used for the privacy aware mobile users in the location based services. The modified Hilbert Curve is used so as to efficiently guarantee k-anonymity and simultaneously offers bigger cloaking region.

Published: 2015Read / Download
Efficient Collaborative Technique using Intrusion Detection System for Preserving Privacy in Location-based Services
Muhammad Jawad Ikram, Jonathan Cazalas

Abstract - The ubiquitous nature of smartphones and GPS-enabled devices, coupled with the increasingly popular usage of location-based services, has effectively created an environment where data access truly is anywhere at any time. While said environment is indeed convenient and quite useful, the unfortunate reality is that users are exposed to a variety of privacy and security threats. User location information can be tracked and then used in malicious ways by non-trusted applications and adversaries. We address this problem by proposing an efficient, collaborative technique that is integrated with an intrusion detection system and rekeying techniques. The algorithm is parameterized by defining performance and security metrics, which can then be used to find optimal settings, both in terms of privacy and quality of service. Based on the proposed performance-security metrics, the tradeoff between privacy and quality of service can be quantified.

Published: 2015Read / Download
The Provision of Information Technology Security Considerations by Legal Prescripts: South African Case
Ntjatji Gosebo, Sipho Seepe

Abstract - The purpose of this paper is to establish whether IT security considerations are provided for, in the case of South Africa, by legal prescripts on each computer-based Information Systems' component. A descriptive research approach was employed to accomplish the aim of this paper. Findings are that avoidance IT security consideration is the least covered by legal prescripts, while the deterrence IT security consideration is comprehensively covered by legal prescripts. While legal prescripts related to deterrence IT security consideration are almost similar, they prescribe different punishments for the same violation. A further study is needed to establish whether IT security considerations not covered by legal prescripts are mitigated by other means, and a different further study to determine the efficacy of deterrence without detection is also needed. A consolidated IT security legal prescript might deliver a better remedy to prevailing disjointedness and duplications. This paper develops a rubric or model that guides .............................

Published: 2015Read / Download
Design and Develop an Approach for Integrating Compression and Encryption on Textual Data
Amit Jain, Avinash Panwar, Divya Bhatnagar

Abstract - The primary intention of this research is to design and develop an approach for integrating compression and encryption on textual data. This improved approach can provide the better security with the aid of encryption and also, can provide better compression with the help of encoding procedure. The advantage of combining the encoding procedure with the encryption technique is that the attacks relevant to storage can be easily avoided since the data is fully within encoded domain also; the storage space required will be less due to good compression ratio. With the advantages of this, we have planned to utilize the dictionary-based encoding procedure and proposed encryption method to comcryption protocol (Compression + encryption). For integrating the compression and encryption, dictionary-based compression and the encryption based on permutation, sorting and reordering will be used. Dictionary-based methods are capable of giving better compression rate as like huffman encoding also follows dictionary-based method...............................

Published: 2015Read / Download
Improved Signcryption Algorithm for Information Security in Networks
R. Bhagavath Nishanth, B. Ramakrishnan, M. Selvi

Abstract - In a Cryptographic primordial, the functions of the digital signature and the public key encryption are concurrently carried out. To safely communicate incredibly large messages, the cryptographic primordial known as the signcryption is effectively employed. Though a lion's share of the public key based mechanism are appropriate for miniature messages, the hybrid encryption (KEM-DEM) offers a proficient and realistic method. In this document, we are cheered to launch an improved signcryption method, which takes cues from the KEM and DEM approaches. The KEM algorithm employs the KDF approach to summarize the symmetric key. The DEM algorithm makes use of the Elliptic curve cryptography technique to encrypt the original message. With an eye on safety aspects, we have testes three attacks and we are cheered to state that the attackers have failed miserably in locating the safety traits of our improved signcryption technique.

Published: 2015Read / Download
The Influence of Smart Phones on Human Health and Behavior: Jordanians' Perceptions
Emad Abu-Shanab, Eman Haddad

Abstract - The advent of new touch technologies and the wide spread of smart mobile phones made humans embrace technology more and depend on it extensively in their lives. With new communication technologies and smart phones the world really became a small village. Although these technologies provided many positive features, we cannot neglect the negative influences inherited in these technologies. One of the major negative sides of smart phones is their side effects on human health. This paper will address this issue by exploring the exiting literature related to the negative side of smart phones on human health and behavior by investigating the literature related to three major dimensions: health, addiction and behavior. The third section will describe the research method used. The fourth section will discuss the analysis side followed by a section on the conclusions and future work.

Published: 2015Read / Download
Public-Key Cryptography Techniques Evaluation
Reham M. Abobeah, Mohamed M. Ezz, Hany M. Harb

Abstract - Cryptography techniques play an important role in modern world. The purpose of such techniques is to ensure the contents being unreadable to anyone except for parties who agreed to use some specific scheme. Moreover, current cryptography techniques provide more sophisticated services, such as message integrity, authentication, time stamping, and many others. There are two main approaches for cryptography: private-key cryptography and public-key cryptography (PKC). In this paper we focus on PKC techniques giving a comparison between three main techniques, namely, Public key Infrastructure (PKI), Identity- Based Cryptography (IBC) and Certificate less Public Key Cryptography (CL-PKC). In this research, a brief definition, advantages and disadvantages and analysis of main problem, namely, the revocation problem, are introduced for the three techniques. Also, a variety of available solutions to overcome the revocation problem in each technique are highlighted. Finally, some common applications and schemes for each technique are summarized.

Published: 2015Read / Download
Security Enhancement in Shoulder Surfing Attacks using Passpoints for Random Similar Images (PRSIm)
A. Meiappane, V. Prasanna Venkataesan, V. Premanand

Abstract - Money laundering is a global problem that affects all countries to various degrees. Although, many countries take benefits from money laundering, by accepting the money from laundering but keeping the crime abroad, at the long run, "money laundering attracts crime". Criminals come to know a country, create networks and eventually also locate their criminal activities there. Most financial institutions have been implementing anti-money laundering solutions (AML) to fight investment fraud. The key pillar of a strong Anti-Money Laundering system for any financial institution depends mainly on a well-designed and effective monitoring system. The main purpose of the Anti-Money Laundering transactions monitoring system is to identify potential suspicious behaviors embedded in legitimate transactions. This paper presents a monitor framework that uses various techniques to enhance the monitoring capabilities. This framework is depending on rule base monitoring, behavior detection monitoring, cluster monitoring and link analysis based monitoring. The monitor detection processes are based on a money laundering deterministic finite automaton that has been obtained from their corresponding regular expressions....................................

Published: 2014Read / Download

Talk to Us

Mobile: +91 9442777224

Email Us

everscience2015@gmail.com
Write to Us

EverScience Publications
Nagercoil,
Kanyakumari District,
Tamil Nadu, India.
    EverScience Publications
    Computer Science Research Articles
    A Single Platform to Read Reserch Articles in the Field of Computer Science