Cloud computing has been extending extensively, involving multiple users on the service it provides. Cloud based email is one of services provided by cloud computing with number of users expanding on yearly basis. Clo...
详细信息
Cloud computing has been extending extensively, involving multiple users on the service it provides. Cloud based email is one of services provided by cloud computing with number of users expanding on yearly basis. Cloud computing faces concerning problem of security and privacy mainly based on its working environment. Identity authentication is one reliable method in cloud environment to identify users requesting for cloud services, currently user authentication in cloud computing is based on the credentials possessed by the user mostly username & password. However, this method has vulnerability of being compromised by illegitimate users when users' passwords have been revealed or cracked. The paper proposes a more secure structure, i.e the two-factor authentication which authenticates by requiring the username/password pair also needs a second factor to completely grant access. The second factor is App stored in users' smart devices. Username & password/Apps method will continue to allow users to set up passwords for their accounts, it will make a random compulsory code to be entered through App on smart phone devices hence keep privacy of cloud emails. Testing has been done with help of Python program environment. Comparing to recent related proposed schemes, our proposed scheme has advantage of high unbreakable security feature with low implement cost.
With the rapid development of the IT technology, users increasingly rely on data. While cloud storage and other online service platform make user's privacy data protection become an important issue. In this paper,...
详细信息
With the rapid development of the IT technology, users increasingly rely on data. While cloud storage and other online service platform make user's privacy data protection become an important issue. In this paper, we have designed an encryption and decryption system for user's privacy data files, it can be used to encrypt and decrypt the privacy data. The system uses the des algorithm to provide certain security to the data files, and supports a variety of data types and file types with good operability.
With the global development of IOT,people are more worried about their personal information security *** the analysis of security problems,this paper introduces symmetric grouping algorithmdes to encrypt the data bet...
详细信息
With the global development of IOT,people are more worried about their personal information security *** the analysis of security problems,this paper introduces symmetric grouping algorithmdes to encrypt the data between tags and readers based on Hash-Lock protocol,.In order to reduce the workload of the backend database,this paper increases a pre-treatment process to judge whether the tag belongs to this database.
Facing the Internet information transmission of WAN or LAN, it is difficult to ensure the security and stability of data transmission after key encryption by using traditional one-way password encryption and two-way s...
详细信息
ISBN:
(纸本)9781450397247
Facing the Internet information transmission of WAN or LAN, it is difficult to ensure the security and stability of data transmission after key encryption by using traditional one-way password encryption and two-way stream password encryption. Therefore, a hybrid encryption algorithm of RSA, des and BASE64 developed based on python language is proposed, and the encryption and decryption scheme of information transmission between network client and client, client and server is set up, including the encryption and decryption implementation of digital certificate accuracy, server registration, user login and communication, file transmission, password modification and log processing, etc., to improve the encryption and decryption security level of data file transmission and log processing, and to maximize the protection of network instant messaging Security and stability.
Block cipher algorithms are the typical representive of symmetric *** paper especially reserches on the two typicle cipher algorithms (des and AES algorithm) of block cipher *** also analy their weaknesses and improve...
详细信息
Block cipher algorithms are the typical representive of symmetric *** paper especially reserches on the two typicle cipher algorithms (des and AES algorithm) of block cipher *** also analy their weaknesses and improve their defects.
Analyzed and studied on public key and private key cryptography, studied and compared the RSA and des algorithm, achieved a basic process of file encryption and decryption, provided effectivly protection to document s...
详细信息
Analyzed and studied on public key and private key cryptography, studied and compared the RSA and des algorithm, achieved a basic process of file encryption and decryption, provided effectivly protection to document security.
Block cipher algorithms arc the typical representive of symmetric cryptography. This paper especially reserches on the two typicle cipher algorithms ( des and AES algorithm ) of block cipher *** also analy their w...
详细信息
ISBN:
(纸本)9781424479573
Block cipher algorithms arc the typical representive of symmetric cryptography. This paper especially reserches on the two typicle cipher algorithms ( des and AES algorithm ) of block cipher *** also analy their weaknesses and improve their defects.
暂无评论