1,731 results on '"DATA encryption"'
Search Results
2. Advanced Authentication and Energy-Efficient Routing Protocol for Wireless Body Area Networks.
- Author
-
Padma Vijetha Dev, Bakkaiahgari and Prasad, K. Venkata
- Subjects
- *
BODY area networks , *OPTIMIZATION algorithms , *DATA transmission systems , *DATA security , *PYTHON programming language , *MULTICASTING (Computer networks) , *DATA encryption - Abstract
Recently, wireless body area network (WBAN) becomes a hot research topic in the advanced healthcare system. The WBAN plays a vital role in monitoring the physiological parameters of the human body with sensors. The sensors are small in size, and it has a small-sized battery with limited life. Hence, the energy is limited in the multi-hop routing process. The patient data is collected by the sensor, and the data are transmitted with high energy consumption. It causes failure in the data transmission path. To avoid this, the data transmission process should be optimized. This paper presents an advanced authentication and energy-efficient routing protocol (AAERP) for optimal routing paths in WBAN. Patients' data are aggregated from the WBAN through the IoMT devices in the initial stage. To secure the patient's private data, a hybrid mechanism of the elliptic curve cryptosystem (ECC) and Paillier cryptosystem is proposed for the data encryption process. Data security is improved by authenticating the data before transmission using an encryption algorithm. Before the routing process, the data encryption approach converts the original plain text data into ciphertext data. This encryption approach assists in avoiding intrusions in the network system. The encrypted data are optimally routed with the help of the teamwork optimization algorithm (TOA) approach. The optimal path selection using this optimization technique improves the effectiveness and robustness of the system. The experimental setup is performed by using Python software. The efficacy of the proposed model is evaluated by solving parameters like network lifetime, network throughput, residual energy, success rate, number of packets received, number of packets sent, and number of packets dropped. The performance of the proposed model is measured by comparing the obtained results with several existing models. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
3. Residue Number System Based S-box Generation and its Applications in AES for Image Encryption.
- Author
-
Upadhyaya, Arun, Rai, C. Shantharama, and Aithal, Ganesh
- Subjects
- *
DATA encryption , *DATA security , *DIGITAL images , *NUMBER systems , *SECURITY systems - Abstract
It is now more crucial than ever to provide data security, as the goals and capabilities of eavesdroppers are constantly changing. Therefore, different developers are creating cipher systems that employ various innovative techniques. Standard ciphers, such as DES and AES, use substitution boxes to ensure secure encryption and decryption of data. The substitution box (S-box) is a core module used in modern ciphers to secure data. This study introduces an efficient and straightforward method that leverages a Residue Number System (RNS) to construct an S-box. Furthermore, the AES algorithm uses the generated S-box to encrypt digital images. Parameters such as entropy, NPCR, and UACI effectively measure the security of the proposed method. The results of the performance and comparison study confirm that the proposed S-box outperforms existing methods, establishing it as a strong candidate for cryptographic use in various image security applications. [ABSTRACT FROM AUTHOR]
- Published
- 2024
4. An Effective Metaheuristic Based Dynamic Fine Grained Data Security Framework for Big Data.
- Author
-
Gupta, Lalit Mohan, Samad, Abdus, Garg, Hitendra, and Shah, Kaushal
- Subjects
METAHEURISTIC algorithms ,MESSAGE authentication codes ,ELECTRONIC health records ,DATA security ,DATA encryption - Abstract
Medical records are transmitted between medical institutions using cloud-based Electronic health record (EHR) systems, which are intended to improve various medical services. Due to the potential of data breaches and the resultant loss of patient data, medical organizations find it challenging to employ cloud-based electronic medical record systems. EHR systems frequently necessitate high transmission costs, energy use, and time loss for physicians and patients. Furthermore, EHR security is a critical concern that jeopardizes patient privacy. Compared to a single system, cloud-based EHR solutions may bring extra security concerns as the system architecture gets more intricate. Access control strategies and the development of efficient security mechanisms for cloud-based EHR data are critical. For privacy reasons, the Dynamic constrained message authentication (DCMA) technique is used in the proposed system to encrypt the outsourced medical data by using symmetric key cryptography, which uses the Seagull optimization algorithm (SOA) to choose the best random keys for encryption and then resultant data is hashed using the SHA-256 technique. The results of the proposed model are evaluated using performance metrics, and the model attained a security of about 98.58%, which is proven to be superior because it adopts advanced random secret key generation, which adds more security to the system. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
5. Hierarchical Privacy Protection Model in Advanced Metering Infrastructure Based on Cloud and Fog Assistance.
- Author
-
Kuang, Linghong, Shi, Wenlong, and Zhang, Jing
- Subjects
DATA privacy ,DATA encryption ,INFORMATION & communication technologies ,DATA security ,ELECTRIC power consumption - Abstract
The Advanced Metering Infrastructure (AMI), as a crucial subsystem in the smart grid, is responsible for measuring user electricity consumption and plays a vital role in communication between providers and consumers. However, with the advancement of information and communication technology, new security and privacy challenges have emerged for AMI. To address these challenges and enhance the security and privacy of user data in the smart grid, a Hierarchical Privacy Protection Model in Advanced Metering Infrastructure based on Cloud and Fog Assistance (HPPM-AMICFA) is proposed in this paper. The proposed model integrates cloud and fog computing with hierarchical threshold encryption, offering a flexible and efficient privacy protection solution that significantly enhances data security in the smart grid. The methodology involves setting user protection levels by processing missing data and utilizing fuzzy comprehensive analysis to evaluate user importance, thereby assigning appropriate protection levels. Furthermore, a hierarchical threshold encryption algorithm is developed to provide differentiated protection strategies for fog nodes based on user IDs, ensuring secure aggregation and encryption of user data. Experimental results demonstrate that HPPM-AMICFA effectively resists various attack strategies while minimizing time costs, thereby safeguarding user data in the smart grid. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
6. Blockchain and Homomorphic Encryption for Data Security and Statistical Privacy.
- Author
-
Raj, Rahul, Kurt Peker, Yeşem, and Mutlu, Zeynep Delal
- Subjects
DATA privacy ,DATA encryption ,BIG data ,DATA security ,DATA integrity ,BLOCKCHAINS - Abstract
This study proposes a blockchain-based system that utilizes fully homomorphic encryption to provide data security and statistical privacy when data are shared with third parties for analysis or research purposes. The proposed system not only provides security of data in transit, at rest, and in use but also assures privacy and computational integrity for simple statistical computations. This is achieved by leveraging the attributes of the blockchain technology, which provides availability and data integrity, combined with homomorphic encryption, which provides confidentiality of data in use. The computations are performed on smart contracts residing on the blockchain, providing computational integrity. The proposed system is implemented on the Zama blockchain and performs statistical operations including mean, median, and variance on encrypted data. The results indicate that it is possible to perform fully homomorphic computations on the blockchain. Even though current computing limitations on the blockchain do not allow running the system for large data sets, the technology is available, and with advancements toward more efficient homomorphic operations on blockchains, the proposed system will provide an ultimate solution for providing the much-desired security properties in applications, including data and statistical privacy, confidentiality, and integrity at rest, in transit, and in use. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
7. A Sustainable Data Encryption Storage and Processing Framework via Edge Computing-Driven IoT.
- Author
-
Qi Li, Jian Huang, Sihan Li, and Chenze Huang
- Subjects
- *
DATA warehousing , *SERVER farms (Computer network management) , *INTERNET of things , *EDGE computing , *PUBLIC key cryptography , *DATA security , *DATA integrity , *DATA encryption - Abstract
Edge computing serves as a critical intermediary for secure data exchange between IoT devices and data centres in healthcare, where the protection of sensitive patient data is paramount. This study presents UdesMec, a comprehensive edge computing framework designed for efficient and secure data storage and processing in such contexts. Focusing on the challenge of implementing robust data security models in the presence of limited resources at edge nodes, UdesMec employs a unified encryption approach that is particularly suited for expert knowledge-based prediction of complex critical medical events. Using secret sharing and homomorphic encryption, it ensures the confidentiality and integrity of sensitive patient data transmitted by IoT devices, while enabling efficient computation of prediction algorithms on a cloud server. The experimental evaluation confirms the strong encryption performance and the ease of use of UdesMec, positioning it as a promising solution for the secure and reliable prediction of complex critical medical events in healthcare systems based on edge computing. [ABSTRACT FROM AUTHOR]
- Published
- 2024
8. Blockchain-Enabled Secure Data Sharing with Honey Encryption and DSNN-Based Key Generation.
- Author
-
Siyal, Reshma, Long, Jun, Asim, Muhammad, Ahmad, Naveed, Fathi, Hanaa, and Alshinwan, Mohammad
- Subjects
- *
INFORMATION sharing , *ACCESS control , *HONEY , *DATA protection , *DATA security , *DATA encryption - Abstract
Ensuring data confidentiality is a critical requirement for modern security systems globally. Despite the implementation of various access-control policies to enhance system security, significant threats persist due to insecure and inadequate access management. To address this, Multi-Party Authorization (MPA) systems employ multiple authorities for authorization and authentication, utilizing blockchain technology to store and access data securely, ensuring immutable and trusted audit trails. In this work, we propose a hybrid key-generation approach called the Identity and Attribute-Based Honey Encryption (IABHE) Algorithm combined with Deep Spiking Neural Network (DSNN) denoted by IABHE+DSNN for secure data sharing in a multi-party blockchain-based system. This approach incorporates various entities and multiple security functionalities to ensure data security. The data-sharing process involves several steps: initialization, authentication, initial registration, data protection, validation, and data sharing. Data protection is executed within the MapReduce framework, with data encryption performed using IABHE and key generation managed by DSNN. Experimental results demonstrate that the proposed IABHE+DSNN approach achieves a decryption time of 10.786 s, an encryption time of 15.765 s, and a key complexity of 0.887, outperforming existing methods. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
9. Lightweight Information-Sharing System with Access Control in Disaster Management with Security against Dishonest Users.
- Author
-
Yuki Kawahara, Aminuddin Mohd Kamal, Ahmad Akmal, and Masaya Fujisawa
- Subjects
INFORMATION sharing ,EMERGENCY management ,DRONE aircraft ,DATA encryption ,DATA security - Abstract
One of the requirements in times of disaster is to obtain information to confirm the safety of victims and to grasp the damage situation in the disaster area. To satisfy this, a system for building a temporary network using drones has been proposed. However, when a user shares his safety information with other users through the drone network, there is a risk of information leakage if the other user is malicious. Furthermore, it should be considered that disaster victims require communication terminals to be as small as possible and to have a long battery life as a requirement. Therefore, a costeffective and secure information-sharing system that allows access control is required. We present a system that employs (2, 3)-threshold secret sharing and realizes a lightweight access control process specifically designed for drone networks in the event of communication failures during disasters. Furthermore, it incorporates security measures to protect against dishonest users. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
10. SECURE ENCRYPTED TRANSMISSION OF NETWORK DATA IN CLOUD COMPUTING TECHNOLOGY ENVIRONMENT.
- Author
-
ZHIFENG MIAO and CHUNPING ZHAO
- Subjects
DATA transmission systems ,CLOUD computing ,TELECOMMUNICATION systems ,DATA encryption ,MULTICASTING (Computer networks) ,DATA security ,COMPUTER network security ,COMMUNICATION barriers - Abstract
In order to solve the problem of communication data theft in conventional network communication data transmission methods and ensure the security of network communication data transmission, it is necessary to design new network communication data security transmission methods based on cloud computing technology, formulate network communication data security transmission agreements, construct a network communication data security transmission model based on cloud computing technology, and design a network communication data security transmission scheme, implement secure transmission of network communication data. The experimental results show that after using the designed network communication data secure transmission method, the amount of stolen communication data is less than that of conventional methods. This proves that the designed network communication data secure transmission method has high transmission security, good transmission effect, and reliability, and can be used as a reference for subsequent network communication data encryption transmission. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
11. “Implementing a Secure Mobile Application for Cardless Transactions using QR Code and Hybrid AES-ECC Encryption”.
- Author
-
Hamad, Noor Jaber, Abdulhameed, Abbas Abdulazeez, and Ali, Mudhafar Hussein
- Subjects
TWO-dimensional bar codes ,PHISHING ,MOBILE apps ,ADVANCED Encryption Standard ,ELLIPTIC curve cryptography ,DATA security ,DATA encryption ,DATA security failures - Abstract
Copyright of Arab Journal for Scientific Publishing is the property of Research & Development of Human Recourses Center (REMAH) and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
12. A data security model for internet of things applications.
- Author
-
Gautam, Krishan Kant Singh and Kumar, Rajendra
- Subjects
- *
DATA security , *INTERNET security , *INTERNET of things , *DATA modeling , *TELECOMMUNICATION systems , *DATA encryption - Abstract
A new data encryption model has been designed. It is envisioned that the proposed data encryption model would be able to transfer IoT devices data securely over the open communication network. It also enhanced the data integrity of the model. The size of the generated cipher is unaffected if XORed with parity bits which makes it lightweight in nature. To make the cipher highly sensitive, a secret key was generated using the chaotic dynamical systems. Key was updated in each run to make the generated cipher input plaintext dependent. Key size is kept 128-bit to make the model resistive against brute force attack. Finally, a diffusion model is used to make certain the impact even of single bit change, maintain and fetch all around the process. Average NPCR score is found to be more than 99.60, which makes the model potential and complex to be used in IoT devices. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
13. Data Security in Accounting and Information Management During the COVID-19 Pandemic
- Author
-
Odularu, Oluwayemi IbukunOluwa, Akande, Joseph Olorunfemi, editor, Mugova, Shame, editor, and Odularu, Oluwayemi IbukunOluwa, editor
- Published
- 2024
- Full Text
- View/download PDF
14. Medical Data in Wireless Body Area Networks: Device Authentication Techniques and Threat Mitigation Strategies Based on a Token-Based Communication Approach.
- Author
-
Herbst, Jan, Rüb, Matthias, Sanon, Sogo Pierre, Lipps, Christoph, and Schotten, Hans D.
- Subjects
BODY area networks ,WIRELESS communications ,DATA encryption ,DATA privacy ,DATA security - Abstract
Wireless Body Area Networks (WBANs), low power, and short-range wireless communication in a near-body area provide advantages, particularly in the medical and healthcare sector: (i) they enable continuous monitoring of patients and (ii) the recording and correlation of physical and biological information. Along with the utilization and integration of these (sensitive) private and personal data, there are substantial requirements concerning security and privacy, as well as protection during processing and transmission. Contrary to the star topology frequently used in various standards, the overall concept of a novel low-data rate token-based WBAN framework is proposed. This work further comprises the evaluation of strategies for handling medical data with WBANs and emphasizes the importance and necessity of encryption and security strategies in the context of sensitive information. Furthermore, this work considers the recent advancements in Artificial Intelligence (AI), which are opening up opportunities for enhancing cyber resilience, but on the other hand, also new attack vectors. Moreover, the implications of targeted regulatory measures, such as the European AI Act, are considered. In contrast to, for instance, the proposed star network topologies of the IEEE 802.15.6 WBAN standard or the Technical Committee (TC) SmartBAN of the European Telecommunication Standards Institute (ETSI), the concept of a ring topology is proposed which concatenates information in the form of a 'data train' and thus results in faster and more efficient communication. Beyond that, the conductivity of human skin is included in the approach presented to incorporate a supplementary channel. This direct contact requirement not only fortifies the security of the system but also facilitates a reliable means of secure communication, pivotal in maintaining the integrity of sensitive health data. The work identifies different threat models associated with the WBAN system and evaluates potential data vulnerabilities and risks to maximize security. It highlights the crucial balance between security and efficiency in WBANs, using the token-based approach as a case study. Further, it sets a foundation for future healthcare technology advancements, aiming to ensure the secure and efficient integration of patient data. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
15. Large file encryption in a Reduced-Round Permutation-Based AES file management system.
- Author
-
Baladhay, Jerico S., Gamido, Heidilyn V., and De Los Reyes, Edjie M.
- Subjects
RECORDS management ,ADVANCED Encryption Standard ,DATA security ,IMAGE encryption ,DATA encryption ,RSA algorithm - Abstract
In the rapid evolving digital landscape, the imperative to ensure data security has never been more crucial. This paper addresses the pressing challenges in data security by introducing a file encryption management system, leveraging a modified advanced encryption standard (AES) algorithm with reduced round iterations and bit permutation. This system aims to comprehensively secure various file types, providing a dependable solution for file exchange. Our findings reveal substantial improvements in both encryption and decryption processes using the reduced-round permutationbased AES (RRPBA). The adapted algorithm demonstrates a significant 38.8% acceleration in encryption time and a remarkable 44.86% improvement in decryption time, positioning it as a pivotal component for efficient file operations within the management system. Moreover, the throughput assessments showcase a remarkable 33.73% improvement in encryption and 23.72% in decryption, outperforming the original AES, emphasizing the algorithm's superior computational effectiveness, signaling positive implications for future high-performance applications. In conclusion, the study not only addresses critical security challenges but also presents a viable solution with tangible speed advantages for file encryption and decryption processes within digital file management systems. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
16. A Usable Encryption Solution for File-Based Geospatial Data within a Database File System.
- Author
-
Sharma, Pankajeshwara, Govorov, Michael, and Martin, Michael
- Subjects
GEOGRAPHIC information systems ,DATA encryption ,GEOSPATIAL data ,DATA security ,AUTOMATION - Abstract
Developing a security solution for spatial files within today's enterprise Geographical Information System (GIS) that is also usable presents a multifaceted challenge. These files exist in "data silos" of different file server types, resulting in limited collaboration and increased vulnerability. While cloud-based data storage offers many benefits, the associated security concerns have limited its uptake in GIS, making it crucial to explore comparable alternative security solutions that can be deployed on-premise and are also usable. This paper introduces a reasonably usable security solution for spatial files within collaborative enterprise GIS. We explore a Database File System (DBFS) as a potential repository to consolidate and manage spatial files based on its enterprise document management capabilities and security features inherited from the underlying legacy DBMS. These files are protected using the Advanced Encryption Standard (AES) algorithm with practical encryption times of 8 MB per second. The final part focuses on an automated encryption solution with schemes for single- and multi-user files that is compatible with various GIS programs and protocol services. Usability testing is carried out to assess the solution's usability and focuses on effectiveness, efficiency, and user satisfaction, with the results demonstrating its usability based on the minimal changes it makes to how users work in a collaborative enterprise GIS environment. The solution furnishes a viable means for consolidating and protecting spatial files with various formats at the storage layer within enterprise GIS. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
17. An optimal multipath routing protocol using hybrid gravitational search particle swarm optimization for secure communication.
- Author
-
Roopa Devi, Erode Mohan, Hemalatha, Thangaraj, Usha, Dhanabalan, and Nanda, Ashok Kumar
- Subjects
- *
PARTICLE swarm optimization , *PUBLIC key cryptography , *RSA algorithm , *DATA encryption , *ENERGY conservation , *SEARCH algorithms - Abstract
Summary: Communicating large amounts of data requires an encryption solution that ensures fast and secure data transfer. Unfortunately, it faced privacy and security issues, resulting in higher power consumption, data scarcity, energy, diversity, data reliability, low security, and packet loss in the communication process. The goal of this research is to ensure data transfer while conserving energy and protecting data transmission in WSNs. Therefore, this paper proposes a multipath routing protocol using the HGSPSO algorithm, which is a combination of hybrid gravitational search algorithm (HGSA) and particle swarm optimization (PSO), to securely transmit data from one node to another node under public and private key cryptography. The PSO approach is utilized to resolve the energy hole problem by selecting the cluster head in the sink coverage area. The RSA can be employed for data encryption, data decryption, key generation, and sharing. The metrics like acceleration constants and inertial weights are used for the HGSPSO algorithm. The result of this implementation demonstrated that the scheme had a low energy consumption of 36%, a maximum packet delivery ratio (PDR) of 96%, a higher throughput rate of 88%, and a low packet loss of 39%. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
18. Event‐based privacy‐preserving security consensus of multi‐agent systems with encryption–decryption mechanism.
- Author
-
Liu, Jinliang, Deng, Ying, Zha, Lijuan, Xie, Xiangpeng, and Tian, Engang
- Subjects
- *
SLIDING mode control , *MULTIAGENT systems , *DATA encryption , *DATA privacy , *RSA algorithm , *DATA security , *DATA transmission systems , *RESOURCE allocation - Abstract
The article concentrates on exploring the issue of privacy‐preserving sliding mode consensus of multi‐agent systems (MASs) with disturbance. An encryption and decryption algorithm has been proposed to address data security and privacy issues during data transmission. To optimize network resource allocation, a dynamic event‐triggering mechanism has been introduced, which reduces the number of encrypted data while saving the computation cost. The consensus performance based on the sliding mode control strategy is achieved when the reachability of the slide‐mode surface is guaranteed, and then the slide‐mode controller is developed. Finally, an empirical demonstration through a numerical example validates the efficacy of the proposed strategy. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
19. Emergence of Novel WEDEx-Kerberotic Cryptographic Framework to Strengthen the Cloud Data Security against Malicious Attacks.
- Author
-
Zahra, Syeda Wajiha, Nadeem, Muhammad, Arshad, Ali, Riaz, Saman, Ahmed, Waqas, Abu Bakr, Muhammad, and Alabrah, Amerah
- Subjects
- *
DATA security , *CLOUD storage , *DATA protection , *DATA encryption , *RESEARCH personnel , *PUBLIC key cryptography , *BIOMETRIC identification , *CRYPTOGRAPHY , *CIPHERS - Abstract
Researchers have created cryptography algorithms that encrypt data using a public or private key to secure it from intruders. It is insufficient to protect the data by using such a key. No research article has identified an algorithm capable of protecting both the data and the associated key, nor has any mechanism been developed to determine whether access to the data is permissible or impermissible based on the authentication of the key. This paper presents a WEDEx-Kerberotic Framework for data protection, in which a user-defined key is firstly converted to a cipher key using the "Secure Words on Joining Key (SWJK)" algorithm. Subsequently, a WEDEx-Kerberotic encryption mechanism is created to protect the data by encrypting it with the cipher key. The first reason for making the WEDEx-Kerberotic Framework is to convert the user-defined key into a key that has nothing to do with the original key, and the length of the cipher key is much shorter than the original key. The second reason is that each ciphertext and key value are interlinked. When an intruder utilizes the snatching mechanism to obtain data, the attacker obtains data or a key unrelated to the original data. No matter how efficient the algorithm is, an attacker cannot access the data when these methods and algorithms are used to protect it. Finally, the proposed algorithm is compared to the previous approaches to determine the uniqueness of the algorithm and assess its superiority to the previous algorithms. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
20. Privacy-Preserving Confidential Reporting System With Designated Reporters.
- Author
-
Han, Jinguang, Susilo, Willy, Chen, Liquan, Lai, Jianchang, and Wu, Ge
- Subjects
- *
DATA encryption , *DATA privacy , *DATA security , *CRYPTOSYSTEMS , *CLOUD computing - Abstract
A confidential reporting system (CRS) allows reporters to report concerns or problems in confidence without the fear of blame or reprisals. Nevertheless, privacy has been the primary concern of reporters. In this paper, we propose a privacy-preserving confidential reporting system with designated reporters (PPCRS-DR) to protect the privacy of reporters and the confidentiality of reports. Our PPCRS-DR provides the following interesting features: (1) for an event, an auditor can designate a reporter to report; (2) an auditor can neither see the report nor know the reporter's identity from an encrypted report if the reporter is not the designated one; (3) when an auditor is unavailable, he/she can temporarily designate a delegatee to collect and review reports on behalf of him/her. We formalize both the definition and security model of our PPCRS-DR, and propose a concrete construction. Furthermore, the security of the proposed PPCRS-DR is formally proven. The implementation shows that it is efficient. The novelty is to implement flexible decryption delegation of CRSs and protect reporters' privacy. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
21. AN ADAPTIVE ELLIPTICAL CURVE CRYPTOGRAPHY-RIVEST-SHAMIR-ADLEMAN-BASED ENCRYPTION FOR IoT HEALTHCARE SECURITY MODEL WITH BLOCKCHAIN TECHNOLOGY.
- Author
-
MOHANA, M., DEOTARE, VILAS V., PREETHA, N. S. NINU, and BRAMMYA, G.
- Subjects
- *
BLOCKCHAINS , *DATA encryption , *DATA privacy , *INTERNET of things , *DATA security , *DATA management , *INTELLIGENT transportation systems - Abstract
The healthcare systems follow the path of client-server architecture in a centralized manner for managing the patient's health information with the secure storage process. Medical data can be preserved in every medical institution that remains safely in silos. It could be able to access without proper authorization and cannot be transferred. At the same time, while handling massive data, the clinics or hospitals are fragile enough to govern the patient's health information as the system is confined with such security constraints. Rather than other methodologies, blockchain plays a pivotal part in the medical industry for storing medical data in a secure manner. Since the blockchain represents a reliable and scalable decentralized network, it can conquer certain challenges of classical methods. Furthermore, the Internet of Things (IoT) is an emerging process of fetching data by wearing some sensors and devices. Through these intelligent elements, the healthcare data can be shared and enriched with the data quality for effective healthcare services. Nevertheless, this connection becomes vulnerable to data privacy and security because the data management relies on open service networks. In order to overcome these effects, a novel IoT-derived blockchain model is proposed for storing and authenticating purposes. Initially, medical data are collected from different benchmark sources and subjected to the data encryption phase. Then, encryption is performed with the help of Adaptive Elliptical Curve Cryptography and Rivest-Shamir-Adleman (A-ECC-RSA), where the key optimization is done by utilizing Enhanced Sand Cat Swarm Optimization (ESCSO). Further, encrypted data are stored in the blockchain and finally authentication access is performed with the help of Adaptive Bidirectional Long Short-Term Memory (ABiLSTM) using biometric information, where the BiLSTM parameters are optimally selected by developed ESCSO. Thus, the developed model will attain an effective security rate than conventional models that can be established through several experiments on the proposed model. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
22. Constructive approach and randomization of a two-parameter chaos system for securing data.
- Author
-
Wahab, Olalekan Taofeek, Musa, Salaudeen Alaro, Jimoh, AbdulAzeez Kayode, and Dauda, Kazeem Adesina
- Subjects
- *
CRYPTOSYSTEMS , *DATA security , *LYAPUNOV exponents , *HILBERT space , *DATA encryption - Abstract
Secure communication techniques are important due to the increase in the number of technology users across the world. Likewise, a more random encryption algorithm suitable to secure data from unauthorised users is highly expected. This paper proposes a two-parameter nonlinear chaos map that is sensitive to the trio seed (s0, α, λ) and has better information encryption. We introduce the parameter a to linearise the conventional chaos system, which in turn brings a delay in the cryptosystems. The delay is a phenomenon that changes the chaotic features of a system. A small delay in the system leads to more aperiodicity and the unpredictability of the chaotic attractions. We normalise the new chaos map and use the Lipschitz and pseudo-contractive operators to obtain its irregularity region in Hilbert spaces. We also analyse the chaos map in terms of trajectory, Lyapunov exponent, complexity, and information entropy. Results obtained show that the new chaos map has a wide chaotic range and better statistical properties. It also maintains low complexity due to its linearity and produces more key spaces than most existing chaotic maps. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
23. A Review on Searchable Encryption Functionality and the Evaluation of Homomorphic Encryption.
- Author
-
Kishiyama, Brian and Alsmadi, Izzat
- Subjects
- *
DATA encryption , *WEB services , *PRIVACY , *SECURITY systems , *CLOUD computing , *UPLOADING of data , *DATA security , *DATA protection - Abstract
Cloud Service Providers, exemplified by industry leaders like Google Cloud Platform, Microsoft Azure, and Amazon Web Services, deliver a dynamic array of cloud services in an ever-evolving landscape. This sector is witnessing substantial growth, with enterprises such as Netflix and PayPal heavily relying on cloud infrastructure for various needs such as data storage, computational resources, and various other services. The adoption of cloud solutions by businesses not only facilitates cost reduction but also fosters flexibility and supports scalability. Despite the undeniable advantages, concerns surrounding security and privacy persist in the realm of Cloud Computing. Given that Cloud services are accessible via the internet, there is a potential vulnerability to unauthorized access by hackers or malicious entities from anywhere in the world. A crucial aspect of addressing this challenge is the implementation of robust security measures, particularly focusing on data protection. To safeguard data in the Cloud, a fundamental recommendation is the encryption of data prior to uploading. Encryption should be maintained consistently, both during storage and in transit. While encryption enhances security, it introduces a potential challenge for data owners who may need to perform various operations on their encrypted data, such as accessing, modifying, updating, deleting, reading, searching, or sharing them with others. One viable solution to balance the need for data security and operational functionality is the adoption of Searchable Encryption (SE). SE operates on encrypted data, allowing authorized users to perform certain operations without compromising the security of sensitive information. The effectiveness of SE has notably advanced since its inception, and ongoing research endeavors aim to further enhance its capabilities. This paper provides a comprehensive review of the functionality of Searchable Encryption, with a primary focus on its applications in Cloud services during the period spanning 2019 to 2023. Additionally, the study evaluates one of its prominent schemes, namely Fully Homomorphic Encryption (FHE). The analysis indicates an overall positive trajectory in SE research, showcasing increased efficiency as multiple functionalities are aggregated and rigorously tested. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
24. A combination of hill cipher and RC4 methods for text security.
- Author
-
Azanuddin, Kartadie, Rikie, Erwis, Fauzi, Boy, Ahmad Fitri, and Nasyuha, Asyahri Hadi
- Subjects
- *
SYMMETRIC-key algorithms , *CRYPTOGRAPHY , *ADVANCED Encryption Standard , *CIPHERS , *STREAM ciphers , *DATA encryption - Abstract
To hide confidential messages from people who are not responsible or who can access the messages, a way is needed to hide the messages. One way to hide messages in transmission is to change the data into something unintelligible by encoding and embedding it using cryptography and steganography techniques. This application was built using the hill cipher algorithm and the Rivest Cipher 4 (RC4) method. This algorithm is a symmetric key algorithm which has several advantages in data encryption. The hill chiper algorithm uses a mxm matrix as the encryption and decryption key. Meanwhile, the RC4 symmetric key is in the form of a stream cipher which can process input data as well as messages or information. Input data is generally in the form of bytes or even bits. The results of this research show that hill cipher and RC4 have their respective advantages and disadvantages. However, currently, RC4 is generally considered less safe for use in securitycritical scenarios due to its vulnerability to attack. It is highly recommended to use an encryption algorithm such as advanced encryption standard (AES) which is modern and strong and has been tested and proven to be more resilient. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
25. The Vulnerabilities of Electronic Land Certificates and Legal Adaptation in Indonesia's Land Registration System.
- Author
-
Ali, Mahrus, Ismail, Rendi Susiswo, and Erwiningsih, Winahyu
- Subjects
INFORMATION technology ,TECHNOLOGICAL innovations ,DATA encryption ,DATA security ,LAND tenure ,LEGAL norms - Abstract
In the era of rapid technological advancement, the proper adaptation of legal frameworks and secure technologies is crucial to ensure legal certainty in land ownership. The National Land Agency (Badan Pertanahan Nasional or ATR/BPN) plays a central role in managing the issuance of electronic land certificates. This research aims to investigate the role of electronic land certificates in providing legal protection in Indonesia and analyze the challenges and vulnerabilities that arise with the development of information technology. Employing a normative legal method, this study focuses on the analysis of norms and legal regulations governing the use of electronic land certificates in the land registration system. The research approach includes a legislative approach, a conceptual approach, and the use of primary and secondary legal materials. The results emphasize the importance of careful adaptation to information technology developments to maintain legal certainty in land ownership, highlighting the central role of the ATR/BPN and the necessity of appropriate regulations, data security, legal validity, technical requirements, and technology utilization, including data encryption and network security measures, to address vulnerabilities. Adequate awareness and training are also deemed essential for all stakeholders involved. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
26. Advancing User Privacy in Virtual Power Plants: A Novel Zero-Knowledge Proof-Based Distributed Attribute Encryption Approach.
- Author
-
Yang, Ruxia, Gao, Hongchao, Si, Fangyuan, and Wang, Jun
- Subjects
DATA privacy ,PRIVACY ,DATA security failures ,DATA security ,DATA encryption ,INTERNET privacy - Abstract
In virtual power plants, diverse business scenarios involving user data, such as queries, transactions, and sharing, pose significant privacy risks. Traditional attribute-based encryption (ABE) methods, while supporting fine-grained access, fall short of fully protecting user privacy as they require attribute input, leading to potential data leaks. Addressing these limitations, our research introduces a novel privacy protection scheme using zero-knowledge proof and distributed attribute-based encryption (DABE). This method innovatively employs Merkel trees for aggregating user attributes and constructing commitments for zero-knowledge proof verification, ensuring that user attributes and access policies remain confidential. Our solution not only enhances privacy but also fortifies security against man-in-the-middle and replay attacks, offering attribute indistinguishability and tamper resistance. A comparative performance analysis demonstrates that our approach outperforms existing methods in efficiency, reducing time, cost, and space requirements. These advancements mark a significant step forward in ensuring robust user privacy and data security in virtual power plants. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
27. Unlocking the Potential of Fully Homomorphic Encryption: Exploring the transformational potential of FHE and the path toward adoption of its "stack".
- Author
-
GORANTALA, SHRUTHI, SPRINGER, ROB, and GIPSON, BRYANT
- Subjects
- *
DATA encryption , *ENCRYPTION protocols , *DATA security , *COMPILERS (Computer programs) - Abstract
The author presents information on an encryption technology that permits encrypted data computation without necessitating decryption, enabling the protection of privacy. This type of encryption is referred to as fully homomorphic encryption. The article mentions that development of a general purpose transpiler will simplify the use of fully homomorphic encryption and allow for widespread use of the technology, transforming the way sensitive data is handled.
- Published
- 2023
- Full Text
- View/download PDF
28. Secure Cloud-Based Electronic Health Records: Cross-Patient Block-Level Deduplication with Blockchain Auditing.
- Author
-
Vivekrabinson, K, Ragavan, K, Jothi Thilaga, P, and Bharath Singh, J
- Subjects
- *
DATA security , *AUDITING , *DATABASE management , *PRIVACY , *SYSTEMS design , *MEDICAL record linkage , *BLOCKCHAINS , *SECURITY systems , *DATA encryption , *ELECTRONIC health records , *QUALITY assurance , *CLOUD computing , *MEDICAL ethics , *COPYING - Abstract
In today's data-driven world, the exponential growth of digital information poses significant challenges in data management. In recent years, the adoption of cloud-based Electronic Health Records (EHR) sharing schemes has yielded numerous advantages like improved accessibility, availability, and enhanced interoperability. However, the centralized nature of cloud storage presents challenges in terms of information storage, privacy protection, and security. Despite several approaches that have been presented to ensure secure deduplication of similar EHRs, the validation of data integrity without a third-party auditor (TPA) remains a persistent task. Because involving a TPA raises concerns about the confidentiality and privacy of crucial healthcare information. To tackle this challenge, a novel cloud storage auditing technique is proposed that incorporates cross-patient block-level deduplication while upholding strong privacy protection, ensuring that EHR is not compromised. Here, we introduced blockchain technology to achieve integrity verification, thus eliminating the need for a TPA by providing a decentralized and transparent mechanism. Additionally, an index for all EHRs has been generated to facilitate block-level duplicate checks and employ a novel strategy to prevent adversaries from acquiring original information saved in the cloud storage. The security of the proposed approach is established against factorization attacks and decrypt exponent attacks. The performance evaluation demonstrates the superior efficiency of the proposed scheme in terms of file authenticator generation, challenge creation, and proof verification to other existing client-side deduplication approaches. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
29. End-to-end security enabled intelligent remote IoT monitoring system.
- Author
-
Saleem, Kashif, Zinou, Mohammed Farouk, Mohammad, Farah, Ouni, Ridha, Elhendi, Ahmed Zohier, Almuhtadi, Jalal, Palai, G., and Khan, Ullah
- Subjects
REDUNDANCY in engineering ,ADVANCED Encryption Standard ,INTERNET of things ,CLOUD storage ,DATA security ,DATA encryption ,POCKET computers - Abstract
Introduction: Internet of things (IoT) compose of million of devices connected together over the internet. IoT plays a vital role now a days and especially in future, the most of the monitoring and data collection. The data should be secure while collection and as well in the process of transferring till the destination whether Service Organization Control (SOC) or to cloud for storage. In this paper, a secure IoT based intelligent monitoring system is proposed. Methods: An intelligent IoT station that interacts via cellular connection to relay data to the cloud is constructed using the Waspmote platform. The algorithm is injected to automatically filter and only keep the new data for transfer to avoid redundancy. The advanced encryption standard (AES) 256-bit method is enabled for onboard data encryption and then the generated cipher text is transmitted. The encrypted data is then stored over the cloud to ensure privacy. Moreover, the mobile application (mApp) is developed to be installed on handheld devices for calling the secure data from the cloud, decrypting it, and displaying it as per user input, whether real-time or historical. Results and Discussion: The encryption algortihm helps in securing the proposed monitoring system from brute force, man in the middle, phishing, spoofing, and denial of service (DoS) attacks. The results of the real testbed experimentation demonstrate the complexity evaluation and reliability of IoT monitoring systems with end-to-end data security in terms of encryption algorithm delay and data rate, respectively. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
30. Image security using steganography and cryptography with sweeping computational ghost imaging.
- Author
-
Sajjad Rajabi-Ghaleh, Babak Olyaeefar, Reza Kheradmand, Sohrab Ahmadi-Kandjani, and Ma Hongyang
- Subjects
PUBLIC key cryptography ,CRYPTOGRAPHY ,DATA encryption ,IMAGE reconstruction ,ROOT-mean-squares ,DATA security ,SIGNAL-to-noise ratio - Abstract
A sweeping computational ghost imaging (SCGI)-based encryption system is intended for increased data security and speedier data transport. SCGI is combined with steganography and cryptography processes in this system. SCGI requires fewer shots, resulting in faster image capture, transmission, encryption, and decryption. This strategy also results in smaller, more compact data packages and higher bitrates. Least significant bit (LSB) uses steganography to conceal the hidden picture. In the case of Rivest-Shamir-Adleman (RSA) encryption, public and private keys are generated via a one-way function based on bucket values. Encryption is performed on two levels, with an asymmetric approach divided into three sub-items that significantly increase encryption. Surprisingly, the method uses fewer pictures for image reconstruction, resulting in faster image reconstruction. SCGI promises applications in an extensive number of data encryption sectors since this technology leads to smaller data packages and higher bitrates. The presented approach is examined using the number of pixel change rate (NPCR), normalized root mean square (NRMS), peak signal-to-noise ratio (PSNR), and correlation coefficient (CC), which indicates constant encryption improvement. We experimentally and situationally demonstrate our findings under eavesdropping, which prove the resistance and robustness of our methods. In optimal settings, this innovation enhances encryption by up to 90% when compared to traditional encryption methods. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
31. Functional integration of handwritten digit recognition and encryption/decryption based on Pt/GaOx/TiN memristor array for a new data security system.
- Author
-
Xiao, Yongyue, Ke, Shanwu, Jin, Yaoyao, Zhang, Tianyi, Jiang, Bei, Meng, Jiahao, Chen, Siqi, Li, Ruiqi, Zhang, Zihao, and Ye, Cong
- Subjects
- *
HANDWRITING recognition (Computer science) , *DATA encryption , *DATA security , *SECURITY systems , *COMPUTER passwords , *FUNCTIONAL integration , *INFORMATION technology security , *TITANIUM nitride - Abstract
In the age of big data, information security has become more and more essential for the Internet of Things. Since the software encryption algorithm can be easily hacked, the hardware security system has emerged as a reliable way to safeguard information. Here, a GaOx-based memristor array is experimentally demonstrated, which features a good multi-level storage capacity, 20 ns switching speed, and highly linear conductance modulation of over 500 states by multi pulses. An artificial neural network and an XOR circuit were further constructed based on this memristor array. This work connects memristor array-based handwritten digit recognition and data security circuit, forming a new data security management system for secure password input and transmission. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
32. A comparative analysis of chaos theory based medical image steganography to enhance data security.
- Author
-
Ghosh, Sharmila, Saha, Ashim, Pal, Tannistha, and Jha, Anand Kumar
- Subjects
DATA security ,TELEMEDICINE ,CRYPTOGRAPHY ,DATA encryption ,DIAGNOSTIC imaging ,DATA transmission systems ,CHAOS theory - Abstract
The security of patient data is a critical problem for health networks due to the rising popularity of telehealth services and the requirements for clinical data sharing between surgeons, consultants, and medical groups. In contrast to protecting medical data, which includes the cover (i.e., clinical picture), the requirements for protecting other pertinent data are more general. The paper advocates for data encryption before concealment as a robust strategy to uphold patient privacy during medical information exchange. The primary focus of this analysis revolves around a comprehensive exploration of different steganography methods. Through a meticulous examination of various steganographic techniques, including LSB, PVD, and transform domain approaches, this paper provides a detailed analysis of their strengths and limitations. Objective metrics like PSNR and SSIM are employed to dissect the trade-offs between data security and visual fidelity. The research leads to the conclusion that the diagonal queue-based steganog-raphy methodology, supported by chaotic methods, the Linear Feedback Shift Register (LFSR), and the durable Rabin encryption system, is the best course of action. This method enables autonomous data transmission among numerous contacts while ensuring the highest level of confidentiality and integrity of patient data inside e-health networks. In summary, this study provides a comprehensive solution that protects patient data and speeds data transmission inside the expanding framework of e-health networks in order to meet urgent data security concerns in telemedicine and healthcare data exchange. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
33. Using encrypted genotypes and phenotypes for collaborative genomic analyses to maintain data confidentiality.
- Author
-
Zhao, Tianjing, Wang, Fangyi, Mott, Richard, Dekkers, Jack, and Cheng, Hao
- Subjects
- *
DATA security , *INTELLECTUAL property , *INTERPROFESSIONAL relations , *GENOME-wide association studies , *RESEARCH funding , *PRIVACY , *PROBABILITY theory , *QUANTITATIVE research , *DATA encryption , *GENOTYPES , *PHENOTYPES , *MEDICAL ethics - Abstract
To adhere to and capitalize on the benefits of the FAIR (findable, accessible, interoperable, and reusable) principles in agricultural genome-to-phenome studies, it is crucial to address privacy and intellectual property issues that prevent sharing and reuse of data in research and industry. Direct sharing of genotype and phenotype data is often prohibited due to intellectual property and privacy concerns. Thus, there is a pressing need for encryption methods that obscure confidential aspects of the data, without affecting the outcomes of certain statistical analyses. A homomorphic encryption method for genotypes and phenotypes (HEGP) has been proposed for single-marker regression in genome-wide association studies (GWAS) using linear mixed models with Gaussian errors. This methodology permits frequentist likelihood-based parameter estimation and inference. In this paper, we extend HEGP to broader applications in genome-to-phenome analyses. We show that HEGP is suited to commonly used linear mixed models for genetic analyses of quantitative traits including genomic best linear unbiased prediction (GBLUP) and ridge-regression best linear unbiased prediction (RR-BLUP), as well as Bayesian variable selection methods (e.g. those in Bayesian Alphabet), for genetic parameter estimation, genomic prediction, and GWAS. By advancing the capabilities of HEGP, we offer researchers and industry professionals a secure and efficient approach for collaborative genomic analyses while preserving data confidentiality. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
34. Homomorphic encryption algorithm providing security and privacy for IoT with optical fiber communication.
- Author
-
Alqahtani, Abdulrahman Saad, Trabelsi, Youssef, Ezhilarasi, P., Krishnamoorthy, R., Lakshmisridevi, S., and Shargunam, S.
- Subjects
- *
OPTICAL fiber communication , *DATA privacy , *DATA encryption , *INTERNET of things , *DATA security , *OPTICAL communications - Abstract
Data privacy is becoming more important as the internet of things (IoT) rapidly expands. There are significant consequences for the broad adoption of the internet of things. Homomorphic encryption is one possible solution for protecting sensitive data in the IoT. However, there is a great deal of potential for efficiency gains. In order to get enough privacy and security, it is also crucial. Our homomorphic encryption technique for secure and private optical fibre communication is detailed in this publication. The data owner, fog server, and data consumers' privacy is the primary focus of the proposed architectural design. The performance of this research shows that our FCHE solution improves data security throughout the data storage operation and reduces encryption length. This research also aims to analyse the factors of optical fiber communication cost, storage cost, and computing cost in the context of FCHE. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
35. Lightweight Secure Compression Scheme for Green IoT Applications.
- Author
-
FALLAH, Samia AL, ARIOUA, Mounir, and OUALKADI, Ahmed EL
- Subjects
INTERNET of things ,DATA privacy ,DATA compression ,DATA integrity ,ENERGY security ,DATA security ,DATA encryption - Abstract
The Internet of Things (IoT) is a revolutionary paradigm that has gained significant prominence in recent years. It represents the interconnection of everyday objects, devices and machines to the internet, allowing them to collect, exchange and analyze data. As the number of connected objects grows exponentially, energy consumption and data security become essential challenges to ensure a sustainable development of green IoT. Data compression theory can be used as an enticing key to downsize the large amount of circulated information, since wireless communication is the prime energy consuming component in IoT devices. In addition, data encryption algorithms are crucial to protect sensitive information and ensure the integrity and confidentiality of IoT systems. Therefore, combining compression and encryption can lead to improved overall IoT system performance in terms of both power cost and data privacy. In this paper, a lightweight and secure compression approach is introduced to efficiently manage the energy expenditure and provide end-to-end security for energy constrained devices. This proposed algorithm combines the performance of LTC compression and AES encryption to securely encode collected data in IoT devices. The energy model analysis has shown that the suggested method is effective in terms of processing energy, reduces the volume of transmitted data and guarantees end-to-end information privacy. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
36. A blockchain-based ubiquitous entity authentication and management scheme with homomorphic encryption for FANET.
- Author
-
Xie, Hui, Zheng, Jun, He, Teng, Wei, Shengjun, and Hu, Changzhen
- Subjects
DATA security ,DATA encryption ,BLOCKCHAINS ,ACCESS control - Abstract
The rapid development of network technology makes the implementation of ubiquitous tasks possible in which the Flying Ad-Hoc Network(FANET) plays an important role. Control stations distributed in different task areas can control UAVs in FANET to complete a complex task. However, the application of FANET brings about problems of identity security and data security. Attackers can impersonate legal entities to issue fake commands or modify task data, which will hinder the smooth execution of tasks. The existing centralized entity authorization method has the single point of failure problem, and the distributed method based on the blockchain does not consider the entity security and data security issues at the task level. Therefore, to protect the entity identity security and task data security of ubiquitous tasks in FANET, in this paper, we propose a blockchain-based ubiquitous entity authorization and management scheme (BUAMH), which uses smart contracts and homomorphic encryption technology to achieve entity registration, access control and dynamic task member management. Specifically, the blockchain is used to record and protect entity behavior information and the results of smart contracts. Five smart contracts are designed to realize the authorization and management of entity identity. Besides, Homomorphic encryption technology is used to manage UAVs while protecting entity privacy. Furthermore, a side-chain structure is constructed and an identity consensus mechanism(ICM) is proposed to manage multi tasks and speed up the consensus of miners, respectively. The experimental results show that the computational costs and communication costs of the proposed BUAMH are superior to the existing technology. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
37. MMCNN-ZO: Modified multi-scale convolutional neural network-based zebra optimization for enhancing data encryption system.
- Author
-
M, Anuradha, J, Jean Justus, and L, Mary Immaculate Sheela
- Subjects
DATA encryption ,DATA recovery ,ZEBRAS ,CONVOLUTIONAL neural networks ,TIME complexity ,DATA security - Abstract
Cloud computing (CC) is a rapidly growing technology that is deployed by various organizations due to the high level of scalability, elasticity, and virtualization it offers. However, security-related challenges arise due to insecure access control points. Security models in the cloud such as authentication, data recovery, confidentiality, accessibility, and data integrity. This includes the deployment model, barriers in cloud computing, cloud services, and security issues. Data security can be improved via the usage of encryption and decryption keys during transmission. However, the existing techniques often suffered from improved time consumption and complexity in handling more users. This paper mainly focuses on the data security issue with the outsourced sensitive data in the cloud server by designing a novel Modified Multi-scale Convolutional Neural Network-based Zebra Optimization (MMCNN-ZO) approach to improve the cloud data sharing system. The proposed MMCNN-ZO approach safeguards the crucial data effectively and outputs in the form of cipher text/image. Here, the weight functions of the MMCNN are tuned mechanically using the ZO algorithm for the enhanced encryption process. The decryption process is performed to obtain the data in user understandable format. These procedures make the proposed system effectively secure the data content by protecting against intrusions. The efficacy of the proposed MMCNN-ZO method is investigated using diverse evaluation indicators namely throughput, decryption, and encryption time. The proposed MMCNN-ZO algorithm achieved improvements in terms of throughput, encryption time, and decryption time of 7450 bits/sec, 4.82 ms, and 4.86 ms respectively compared to other existing methods of SVM, ANN, BPPSVC, and GBCRP. The experimental results inherit the better performances of the suggested MMCNN-ZO approach over other methods in terms of all metrics. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
38. Data Security in Cloud Environment by Using Hybrid Encryption Technique: A Comprehensive Study on Enhancing Confidentiality and Reliability.
- Author
-
Pothireddy, Susmitha, Peddisetty, Nikhila, Yellamma, Pachipala, Botta, Gitanjani, and Gottipati, Kailash Nadh
- Subjects
DATA security ,RSA algorithm ,DATA encryption ,INFRASTRUCTURE (Economics) ,INTERNET security ,DATA warehousing ,MATHEMATICAL functions ,CLOUD computing - Abstract
Hybrid encryption techniques are gaining popularity in the cloud platform due to their ability to address security concerns and data storage challenges. In order to ensure confidentiality at every stage of processing, this article presents an innovative strategy that merges fully homomorphic encryption (FHE) and secure hash algorithm 3 (SHA-3), offering robust protection against cyber threats. FHE and SHA-3 offer a solution to this problem. We conducted experiments using different datasets to test the performance and security strength of this hybrid approach. Our method takes into account factors such as computational overheads, complexity requirements, key management challenges, and limited support from vendors/providers offering specialized hardware/software capable of supporting complex mathematical functions required by each technique separately before combined into a hybrid form suitable enough scaled-out horizontally across different nodes within clouds themselves today globally among end-users relying upon them heavily day-to-day tasks involving mission-critical workloads running inside virtualized machines hosted on public/private clouds ecosystems worldwide. The results show that implementing FHE together with SHA-3 can significantly improve an organization's overall cyber security posture when operating critical infrastructure components residing within cloud environments. According to the results, it performs better than other methods that are currently in used complexity of encryption and decoding, including homomorphic encryption and RSA, AES & DSA, and AES & RSA. The hybrid algorithm we are proposed using fully homomorphic & SHA3 with 2048 bits 0.789 seconds of encryption time and decryption time with 0.001 seconds and execution time with 4.25 seconds. Therefore, we conclude that our proposed hybrid encryption technique is the best approach to address cyber security risks associated with storing sensitive data in cloud computing environments. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
39. Traceable Attribute-Based Encryption Scheme Using BIM Collaborative Design.
- Author
-
Liu, Jie, Xiang, Guangli, Li, Chengde, and Xie, Weiping
- Subjects
ACCESS control ,DATA encryption ,DATA integrity ,CLOUD storage ,DATA transmission systems ,DATA security ,FUNCTIONAL analysis ,BLOCKCHAINS - Abstract
BIM collaborative design involves numerous participants from various specialties who create and share vast amounts of design data at different design stages to ensure the efficient transmission of design data between these specialties. It is imperative for the BIM collaborative design platform to guarantee the security of design data and effectively trace any instances of malicious leakage or tampering. Therefore, this paper proposes a traceable ciphertext-policy attribute-based encryption scheme (TCP-ABE) that formulates a dynamic data access control mechanism based on different participants and effectively tracks malicious users in the event of risks such as tampering, theft, and unauthorized access to BIM data. In this scheme, the user's identity information is embedded into their private key as a key component, ensuring that only users who satisfy the access policy can decrypt it. The compromised private key allows for tracing of the user's identity. Additionally, Linear Secret Sharing Scheme (LSSS) is employed as the access structure with the user's attribute set divided into an attribute name set and an attribute value set to protect privacy by concealing the latter within the access policy. Furthermore, the scheme integrates blockchain with cloud storage as a trusted third-party storage mechanism to ensure data integrity. Finally, the TCP-ABE scheme is comprehensively evaluated by comparing its strengths and weaknesses with other algorithms. This evaluation includes a theoretical analysis of functional and computational time overhead aspects, as well as an experimental analysis of initialization time, data encryption time, and data decryption time. The scheme exhibits excellent performance across all stages and encompasses the most comprehensive functionalities, as demonstrated by the comparative analysis and experimental results. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
40. A secure SoC architecture design with dual DMA controllers.
- Author
-
Wang, Wei, He, Cong, and Shi, Jiaqi
- Subjects
- *
ARCHITECTURAL design , *DATA security , *DATA integrity , *DATA encryption , *SYSTEMS on a chip - Abstract
With the continuous advancement of System-on-Chip (SoC) technologies, the burgeoning data volumes emphasize the paramount importance of safeguarding data security and integrity. In this study, by leveraging Ascon in conjunction with enhancements to the SHA-1 algorithm, two secure Direct Memory Access (DMA) controllers are designed to facilitate data encryption and comparison, respectively, culminating in the proposal of an SoC architecture featuring dual DMA controllers. Simulation outcomes demonstrate the system's ability to achieve a maximum clock frequency of 120 MHz, offering a throughput rate of up to 3.2 GB/s. The multi-master multi-slave AHB bus matrix within the system operates impeccably, ensuring smooth functionality. Furthermore, the two DMA controllers exhibit independent operation, featuring flexible start-stop capabilities. Notably, they operate harmoniously without conflicts, optimizing the area utilization while adhering to a low power consumption design methodology. The results unequivocally affirm the feasibility of designing a secure SoC integrated with two DMA controllers. This hardware-based approach effectively ensures data security, showcasing promising prospects for real-world applications. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
41. Advancing Cloud Image Security via AES Algorithm Enhancement Techniques.
- Author
-
Mohammed, Zahraa A., Gheni, Hadeel Qasem, Hussein, Zahraa Jabbar, and Al-Qurabat, Ali Kadhum M.
- Subjects
ADVANCED Encryption Standard ,DATA encryption ,IMAGE encryption ,DIGITAL signatures ,DATA security ,CLOUD storage ,ALGORITHMS ,CRYPTOGRAPHY ,QUANTUM cryptography - Abstract
Communication system and internet dominance in our society, has made image security a matter of paramount concern. Cryptography involves encrypting data to protect information exchange between senders and receivers, establishing a foundation for secure communication. The Advanced Encryption Standard (AES) is an exceptional algorithm that plays a pivotal role in this area because of its ability to consistently transform plain data into cipher data using the same encryption key. This algorithm engages intricate encryption techniques, harnessing a variety of algorithms and transformations to ensure robust data security. This study introduces an image encryption technique to comprehensively address security requirements. The proposed approach uses encryption to provide high reliability and security, effectively protecting sensitive media from unauthorized access. The sender's file is divided into multiple pieces to maximize confidentiality, using an advanced algorithm. Upon proper decryption, these pieces seamlessly reconstruct the original file. The suggested technique enables customers to securely keep information on cloud storage, addressing concerns about possible leakage, damage or corruption. By integrating cloud storage and digital signatures, this method ensures protection and reliability for sensitive information. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
42. A Novel Efficient Hybrid Encryption Algorithm Based on Twofish and Key Generation Using Optimization for Ensuring Data Security in Cloud.
- Author
-
Maddila, Suresh Kumar and Vadlamani, Nagalakshmi
- Subjects
DATA security ,DATA encryption ,ALGORITHMS ,DATA protection ,INFORMATION sharing ,CLOUD computing - Abstract
Cloud computing is a rapidly advancing paradigm that enables users to access various services and resources anytime, anywhere. With this advancement, security has become a major concern for business organisations and individuals, and hence, it is essential to ensure that the services are provided with high data security. Numerous researches have focused on devising effective techniques to enhance data security. However, with the increasing connectivity, security still remains to be a major challenge. This paper devises a novel data protection scheme in the cloud by using the Twofish encryption algorithm and a key generation scheme with the Bald Eagle Pelican Optimization (BEPO) Algorithm. The proposed Twofish+BEPO_KeyGen is implemented in various phases, like initialization, registration, key generation, data encryption, authentication, validation and data sharing, and data decryption. Here, the Twofish algorithm is used to encrypt the data that has to be outsourced to the cloud, and for encryption, the security key required is generated by the BEPO algorithm. The efficacy of the Twofish+BEPO_KeyGen approach is examined by considering metrics, like memory usage, validation time, normalized variance, and conditional privacy, and is detected to have achieved values of 76.3 MB, 37.278 s, 1.665, and 0.926, correspondingly. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
43. Distributed power analysis attack on SM4 encryption chip.
- Author
-
Gong, Haoran and Ju, Tailiang
- Subjects
- *
DATA encryption , *ENCRYPTION protocols , *INTEGRATED circuits , *DATA security , *STATISTICAL correlation , *PRIOR learning - Abstract
Encryption chips are specialized integrated circuits that incorporate encryption algorithms for data encryption and decryption, ensuring data confidentiality and security. In China, the domestic SM4 algorithm is commonly utilized, as opposed to the international AES encryption algorithm. These widely implemented encryption standards have been proven to be difficult to crack through crypt analysis methods Currently, power consumption side-channel attacks are the most prevalent method. They involve capturing power consumption data during the encryption process and subsequently recovering the encryption key from this data. The two leading methods are Differential Power Analysis (DPA) and machine learning techniques. DPA does not necessitate prior knowledge but relies heavily on the number of power consumption curves. With only 50 power consumption data points, the accuracy is a mere 80%. Machine learning methods require prior knowledge, achieving an accuracy rate above 95% with only 30 power traces, albeit with training times typically exceeding 15 min. In this paper, a distributed energy analysis attack approach was presented based on Correlation Power Analysis (CPA). The power consumption data was divided into 16 subsets, with each subset corresponding to 8 bytes of the key. By training each subset separately, the 8-byte key's corresponding power consumption data is reduced to only 100 dimensions, resulting in a 76% decrease in cracking time and a 3% improvement in cracking accuracy rate.This article also trains a more complex 256 classification model to directly crack the final key, achieving a success rate of 28% in cracking 128-bit passwords with only 1 power trace [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
44. Cloud Multimedia Data Security by Optimization-Assisted Cryptographic Technique.
- Author
-
Gadde, Swetha, Amutharaj, J., and Usha, S.
- Subjects
- *
DATA security , *DATA protection , *BIG data , *CLOUD computing , *DATA encryption , *PUFFERS (Fish) , *DATA integrity - Abstract
Currently, the size of multimedia data is rising gradually from gigabytes to petabytes, due to the progression of a larger quantity of realistic data. The majority of big data is conveyed via the internet and they were accumulated on cloud servers. Since cloud computing offers internet-oriented services, there were a lot of attackers and malevolent users. They always attempt to deploy the private data of users without any right access. At certain times, they substitute the real data by any counterfeit data. As a result, data protection has turned out to be a noteworthy concern in recent times. This paper aims to establish an optimization-based privacy preservation model for preserving multimedia data by selecting the optimal secret key. Here, the encryption and decryption process is carried out by Improved Blowfish cryptographic technique, where the sensitive data in cloud server is preserved using the optimal key. Optimal key generation is the significant procedure to ensure the objectives of integrity and confidentiality. Likewise, data restoration is the inverse process of sanitization (decryption). In both the cases, key generation remains a major aspect, which is optimally chosen by a novel hybrid algorithm termed as "Clan based Crow Search with Adaptive Awareness probability (CCS-AAP). Finally, an analysis is carried out to validate the improvement of the proposed method. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
45. Efficient time-oriented latency-based secure data encryption for cloud storage.
- Author
-
Ahmad, Shahnawaz and Mehfuz, Shabana
- Subjects
DATA encryption ,CLOUD computing ,DATA security ,TIMESTAMPS ,QUALITY of service ,CLOUD storage - Abstract
To ensure data security in the cloud, there exist several techniques proposed by various researchers. The most common method is the usage of data encryption techniques like profile, rule, and attribute-based encryption techniques. However, they struggle in achieving higher data security performance due to insufficient resistance to tampering. Also, the existing techniques are not good enough for achieving a higher quality of service performance. To handle this issue, an efficient time-oriented latency approximation-based data encryption technique (TLADE) has been presented in this article. The method focuses on the selection of optimal encryption techniques at different time stamps according to the latency approximation. Accordingly, the method would select an optimal technique for data encryption based on the QoS values. To perform this, different encryption schemes have been implemented and each of them is measured for their QoS support values (QoSV) based on latency. Based on the values of QoSV, an efficient approach for the current duty cycle has been selected and applied to the cloud service data. The proposed approach improves the performance of different QoS factors and also has reduced the latency factor. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
46. Research on privacy and secure storage protection of personalized medical data based on hybrid encryption.
- Author
-
Lv, Jialu
- Subjects
DATA encryption ,DATA privacy ,CLOUD storage ,DATA security ,DATA warehousing ,DATA protection ,PRIVACY - Abstract
Personalized medical data privacy and secure storage protection face serious challenges, especially in terms of data security and storage efficiency. Traditional encryption and storage solutions cannot meet the needs of modern medical data protection, which has led to an urgent need for new data protection strategies. Research personalized medical data privacy and secure storage protection based on hybrid encryption, in order to improve the security and efficiency of data storage. A hybrid encryption mechanism was proposed, which uses user attributes as keys for data encryption. The results show that the storage consumption of user attribute keys increases with the number of user attributes, but the consumption of hybrid encryption privacy storage technology is much smaller than that of traditional schemes. In the test, when the number of users increased to 30, the processing time first reached 1200 ms. During the increase in data volume, both test data and real data showed a brief decrease in attack frequency, but after the data volume reached 730–780, the attack frequency increased. It is worth noting that the performance of test data is better than that of real data. Personalized medical data privacy and secure storage protection based on hybrid encryption can not only effectively improve data security and reduce the risk of attack, but also greatly outperform traditional solutions in storage consumption and processing time. It has important practical significance for modern medical data storage protection. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
47. An In-Depth Analysis of Steganography Techniques: From Classical Edge Detection to Adaptive Approaches.
- Author
-
Abdullah, Noor Gh. and Hasso, Shahd A.
- Subjects
CRYPTOGRAPHY ,DIGITAL image processing ,IMAGE encryption ,DATA security ,DATA encryption - Abstract
This paper delves into the realm of steganography, focusing on the evolution of techniques employed to conceal data within digital images. Beginning with an exploration of the motivations behind information security and the role of cryptography, the paper introduces adaptive steganography as a discreet means of incorporating private data into a cover medium. The discussion then shifts to the three key factors in image steganography - resilience, capacity, and imperceptibility - forming the foundation of effective data hiding. The spatial and frequency domain methods are compared, with specific emphasis on the classical Least Significant Bit insertion and more advanced adaptive steganography techniques. The paper further introduces edge-based steganography, highlighting the advantage of manipulating edge areas for increased imperceptibility. Moving beyond definitions and types, the paper provides a comprehensive analysis of notable research works in the field, elucidating their objectives, methodologies, results, strengths, and limitations. The conclusion reflects on the dynamic landscape of steganography, acknowledging both achievements and areas for improvement. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
48. Modifications and improvements to the two fish encryption algorithm: A review.
- Author
-
Saieed, Ali Hussein and Hattab, Anwar Abbas
- Subjects
- *
MULTIMEDIA communications , *ALGORITHMS , *DATA transmission systems , *DATA security , *DATA encryption , *COMPUTER hacking , *PATTERN matching - Abstract
In recent years, data (text, voice, image, animation, and video) has been increasingly used to transmit advanced digital content. Academics are concerned about the security of multimedia content as network technology increasingly focuses on the Internet. The transmission of data through a network exposes it to a variety of forms of abuse, including brute force assaults, illegal access, and network hacking. As a result, the system must be protected by an effective media-aware security framework, such as encryption algorithms based on standard (symmetric-encryption-algorithms), which will be in charge of ensuring data security. The Twofish algorithm is a well-known cryptographic algorithm for encrypting electronic data. It is (symmetric-block-cipher) that was developed by the U.S. National Institute of Standards and Technology (NIST). However, some of the drawbacks of this technique include the processing overhead, the use of an S-Box, and pattern difficulties that arise when dealing with more sophisticated multimedia data types such as text, image, and video. Numerous scholars have conducted research to optimize the algorithm's performance. This article talks about the changes and improvements made to the performance of the modified Twofish algorithms that were proposed in previous research. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
49. A novel comparative data security analysis in public auditing for trusted cloud service with SSL encryption over multi-tenancy based access control technique.
- Author
-
Venkatalakshmi, G. and Sridhar, S.
- Subjects
- *
DATA security , *DATA encryption , *TRUST , *SECURE Sockets Layer (Computer network protocol) , *ACCESS control , *CLOUD computing , *DATA analysis - Abstract
The main aim of the research work is to analyze the lack of data security in cloud service using Secure Socket Layer (SSL) and compare it with Multi-tenancy based access control (MTBAC). Materials and Methods: Number of samples in the current research are two in which Group 1 is SSL and Group 2 is MTBAC algorithm. Samples were taken from the device and iterated 10 times to get desired accuracy with G power 80%, threshold 0.05% and CI 95%. Result: SSL provides a higher accuracy of 90.40% compared to MTBAC algorithm with 78.90%. There is an insignificant difference between two groups with P value of 0.15 (p>0.05). SSL algorithm provides more security in data sharing better than MTBAC algorithm. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
50. Hopewind launched hopeCloud 4.0 to revolutionize future energy management.
- Subjects
ENERGY futures ,ENERGY management ,DATA privacy ,DATA security ,DIGITAL technology ,DATA encryption - Abstract
Hopewind has launched hopeCloud 4.0, an advanced energy management platform that utilizes cloud computing and big data technology. This platform aims to revolutionize the future of energy management by offering comprehensive energy solutions, including power generation, consumption, quality, and management. The new hopeCloud 4.0 features hassle-free operation and maintenance with SmartDiagnosis and SmartOTA, faster data processing, a user-friendly mobile app interface, and enhanced data security. Hopewind plans to achieve cloud-edge integration and utilize big data and AI technology to provide one-stop services for digital energy in the future. [Extracted from the article]
- Published
- 2024
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.