Cloud Computing is the impending need of computing which is used for the IT Industries It is one of the hottest topic in research areas. Scalibility and Flexibility increases for the computing services. Cloud Computin...
详细信息
ISBN:
(纸本)9781479939145
Cloud Computing is the impending need of computing which is used for the IT Industries It is one of the hottest topic in research areas. Scalibility and Flexibility increases for the computing services. Cloud Computing is the fastest growing technology for IT Industry. The Information is being transmitted via the network therefore security is one of the major issue. The Application is deployed on the Cloud and for the secure transmission of the data we will be using ECC Algorithm in our project because of its advantages in terms of CPU utilization, time for encryption and Key Size. This Paper will explore the deployment of Application on the Cloud and increases the security level by implementing ECC Algorithm, Digital Signature and encryption.
Data storage devices such as disk drives and personal storage devices (PSD) such as flash disks are now widely used in everyday appliances. Data breaches have grown rapidly in the recent years due to compromised confi...
详细信息
ISBN:
(纸本)9780769536545
Data storage devices such as disk drives and personal storage devices (PSD) such as flash disks are now widely used in everyday appliances. Data breaches have grown rapidly in the recent years due to compromised confidential data from storage devices. These trends forced standardization of encryption methods to secure storage devices. This paper provides a comparison review of existing encryption algorithms and modes of operations that are suitable for securing storage devices, mainly disk drives. The recent IEEE approved standard for encryption mode of operation, XTS will be evaluated in term of performance with different algorithms (AES, Twofish, and RC6). The performance of XTS mode with other modes of operations (LRW and CBC) will be explored. This detailed review and performance analysis will provide guidelines for storage devices designers to implement disk encryption.
security and the privacy features concerning e-banking needs to be improved rapidly to continue its growing. It is really difficult to ensure enough adequate security by using the conventional algorithms for a long ti...
详细信息
ISBN:
(纸本)9780769550053
security and the privacy features concerning e-banking needs to be improved rapidly to continue its growing. It is really difficult to ensure enough adequate security by using the conventional algorithms for a long time period, due to recent advances such as high progress in cryptanalysis techniques, improvement of computing skills and continuous hacking trials. This paper refers important issues regarding how to enhance the transition to more secure cryptographic and encryption algorithms in the financial sector. This paper recommends that adopting and implementing open source applications following international standards can be considered as a good replacement to the conventional algorithms to offer more enhancement security techniques and highest performance encryption algorithms for e-banking transaction services. We proposed a modified algorithm for AES, in which substitute byte, shift row will remain as in the original AES while mix column operation is replaced by 128 permutation operation followed by add round key operation. Comparative study with traditional encryption algorithms is shown the superiority of the modified algorithm and its high ability to overcome the problem of computational overhead. We additionally suggested another level of e-banking security services using Confidence Building Metric (CBM). The CBMs are computed based on certain parameters and can be implemented on any platform at the client side.
The rapid development of mobile platform leads to growing demand for network communications, which suffer from increasingly severe security threats as well. Considering the urgent security demand and the limitation of...
详细信息
ISBN:
(纸本)9780769551593
The rapid development of mobile platform leads to growing demand for network communications, which suffer from increasingly severe security threats as well. Considering the urgent security demand and the limitation of battery capacity, the power consumption of the encryption algorithms plays a pivotal role for mobile device. Aiming at the above problem, this paper proposes a performance evaluation system on Android platform, which can evaluate the state parameters of device battery. Our work provides elaborate analysis and exploration of 10 security algorithms' energy consumption through extensive simulation results. With the popularity of mobile network and the rapid increase of related applications, it is significant to reduce the power consumption of security encryption algorithms on mobile devices in both academic field and industry.
Cloud Computing is the impending need of computing which is used for the IT Industries It is one of the hottest topic in research areas. Scalibility and Flexibility increases for the computing services. Cloud Computin...
详细信息
ISBN:
(纸本)9781479939152
Cloud Computing is the impending need of computing which is used for the IT Industries It is one of the hottest topic in research areas. Scalibility and Flexibility increases for the computing services. Cloud Computing is the fastest growing technology for IT Industry. The Information is being transmitted via the network therefore security is one of the major issue. The Application is deployed on the Cloud and for the secure transmission of the data we will be using ECC Algorithm in our project because of its advantages in terms of CPU utilization, time for encryption and Key *** Paper will explore the deployment of Application on the Cloud and increases the security level by implementing ECC Algorithm,Digital Signature and encryption.
Vehicular Ad-Hoc networks (VANET'S) represent a rapidly emerging research field and are considered essential for cooperative driving among vehicles on the road. It is a kind of special wireless ad hoc networks whi...
详细信息
ISBN:
(纸本)9781467327589;9781467327565
Vehicular Ad-Hoc networks (VANET'S) represent a rapidly emerging research field and are considered essential for cooperative driving among vehicles on the road. It is a kind of special wireless ad hoc networks which has characteristics of high node mobility and fast topology changes. To avoid accidents broadcasting of safety messages typically require to deliver the information to all vehicles travelling over geographical area with high reliability and low delay. Existing solutions for message verification are not efficient. Hence, a multilevel authentication scheme in Vehicular Ad-Hoc networks (VANET'S) using bilinear pairings method has been proposed. Here messages are signed and verified by MD5 and SHA-1. In this paper, we propose a one to one communications within a group in combination with multilevel authentication scheme. This scheme examines the accuracy of a Road Side Unit can concurrently verify multiple received signatures, thus by reducing total verification time compared with existing schemes.
Recently, data-dependent permutations (DDP) that are very suitable for intelligent multimedia and ubiquitous computing systems have been introduced as a new cryptographic primitive for the design of fast encryption sy...
详细信息
Recently, data-dependent permutations (DDP) that are very suitable for intelligent multimedia and ubiquitous computing systems have been introduced as a new cryptographic primitive for the design of fast encryption systems. The CIKS-128 and CIKS-128H block ciphers are the typical examples of DDP-based encryption algorithms. In this paper. we show that CIKS-128 and CIKS-128H are vulnerable to related-key differential attacks. We first describe how to construct their full-round related-key differential characteristics with high probabilities and then we exploit them to break the full-round CIKS-128 and CIKS-128H with 2(44), and 2(48) data/time complexities, respectively.
Games hosted in social networks, gaming servers or mobile phones can be used as massively parallel, but surreptitious processing networks. These grids, and the activities of the unwitting players, can be used for good...
详细信息
Games hosted in social networks, gaming servers or mobile phones can be used as massively parallel, but surreptitious processing networks. These grids, and the activities of the unwitting players, can be used for good (such as solving large resource allocation problems or finding improvised explosive devices) or for evil (to allow criminals to gain unauthorized access to a system or break encryption algorithms). Surreptitious processing networks differ from botnets in that no rouge processing elements are present on the user side; instead, the computational payload is outsourced to humans who unknowingly provide partial solutions as they play the game. This approach makes the solution of large computational problems and the recruitment and exploitation of participants easy. This department is part of a special issue on social networking.
Securing embedded systems is a challenging and important research topic due to limited computational and memory resources. Moreover, battery powered embedded systems introduce power constraints that make the problem o...
详细信息
ISBN:
(纸本)9789881821065
Securing embedded systems is a challenging and important research topic due to limited computational and memory resources. Moreover, battery powered embedded systems introduce power constraints that make the problem of deploying security more difficult. This problem may be addressed by improving the trade-off between minimizing energy consumption and maintaining a proper security level. This paper proposes an energy-aware method to determine the security resources consistent with the requirements of the system. The proposed solution is based on a multi-criteria decision mechanism, the Weighted Product Model (WPM), used to evaluate the relations between different security solutions and to select the appropriate one based on variable runtime requirements.
To deal with database security of Management Information System(MIS),a database encryption solution is designed and *** the relation of database openness and security in the traditional model of MIS,the paper construc...
详细信息
To deal with database security of Management Information System(MIS),a database encryption solution is designed and *** the relation of database openness and security in the traditional model of MIS,the paper constructs an improved security model of *** on database encryption theory,a multilevel cipher solution of application system is implemented in SQL Server *** experiments are carried out to compare the time spending of data manipulation based on some encryption algorithms in database. The result shows that the symmetric encryption increases the time cost about 1/3 while the asymmetric encryption increases much *** solution is effective if it is applied to sensible data.
暂无评论