23 research outputs found

    Data Outsourcing on Cloud using Secret Key Distribution for Privacy Preserving

    Get PDF
    Cloud computing has turn out to be a trend with the delivery of innumerable advantages. Cloud has come to be a rising widely recognized that brings about diverse era and computing mind for internet at very low rate. Massive garage centres are supplied with the aid of the cloud which may be accessed without problem from any corner of the centre and at any time however there are positive problems and demanding situations faced thru the person at the same time as using cloud computing with reference to protection. But new stressful situations popped out to ensure Confidentiality, integrity and access control of the records. To deal with the ones troubles we will be inclined to suggest a topic depend that makes use of threshold cryptography internal which records proprietor divides clients in businesses and offers single key to every organization within the imply time, that single key (separate thru approach that will become special mystery key) is distribute to each purchaser of that cluster for decoding of information. The most function of this subject is that cut once more the number of safety key and it additionally make sure that absolutely attested users can get entry to the outsourced know-how

    A Computational Analysis of ECC Based Novel Authentication Scheme in VANET

    Get PDF
    A recent development in the adhoc network is a vehicular network called VANET (Vehicular Adhoc Network). Intelligent Transportation System is the Intelligent application of VANET. Due to open nature of VANET attacker can launch various kind of attack. As VANET messages are deal with very crucial information’s which may save the life of passengers by avoiding accidents, save the time of people on a trip, exchange of secret information etc., because of this security is must be in the VANET. To ensure the highest level of security the network should be free from attackers, there by all information pass among nodes in the network must be reliable i.e. should be originated by an authenticated node. Authentication is the first line of security in VANET; it avoids nonregistered vehicle in the network. Previous research come up with some Cryptographic, Trust based, Id based, Group signature based authentication schemes. A speed of authentication and privacy preservation is important parameters in VANET authentication. This paper addresses the computational analysis of authentication schemes based on ECC. We started analysis from comparing plain ECC with our proposed AECC (Adaptive Elliptic Curve Cryptography) and EECC (Enhanced Elliptic Curve Cryptography). The result of analysis shows proposed schemes improve speed and security of authentication. In AECC key size is adaptive i.e. different sizes of keys are generated during key generation phase. Three ranges are specified for key sizes small, large and medium. In EECC we added an extra parameter during transmission of information from the vehicle to RSU for key generation. Schemes of authentications are evaluated by comparative analysis of time required for authentication and key breaking possibilities of keys used in authentication

    Analysis of Security methods in Internet of Things

    Get PDF
    Internet of Things (IoT) is a new revolution for the internet. IoT is to enable things to be connected anytime, anyplace, with anything and anyone ideally using any path/network and any service. In addition, the Internet of Things can be providing variety applications via convergence with other technology such as machine-to-machine, Wireless Sensor Network, and Web technology. In this paper describes the analysis of security methods in the area of IoT and also describes a protocol which combines zero knowledge proof and key exchange algorithm to provide secure and authenticated communication that can be applied in IoT environment. DOI: 10.17762/ijritcc2321-8169.16044

    An analyzing process on wireless protection criteria focusing on (WPA) within computer network security

    Get PDF
    Network security from a long ago approaches to cryptography and hash functions which are tremendous and due to the weakness of different vulnerabilities in the networks and obviously there is a significant need for analyzes. In this manuscript, the state-of-the-art wireless environment is focused solely on the sensor technology, in which security needs to be integrated with the Wireless Protected Access (WPA) standards. Wireless networking includes numerous points of view from wireless sensor systems, ad hoc mobile devices, Wi-Max and many more. The authentication and dynamic encryption is modified by system managers so that general communication can be anchored without any sniper effort in order to perform higher degrees of security and overall execution. The key exchange mechanism in wireless systems such as forward cases is accompanied by the sophisticated cryptography so as to anchor the whole computer state. The manuscript carries out a significant audit of test points of view using the methodologies used for the cryptography angle for protection and honesty in the wireless case, stressing Wi-Fi Secure Protected (WPA) needs

    Identity Management Framework for Internet of Things

    Get PDF

    A Review of Hash Function Types and their Applications

    Get PDF
    In the recent decade, global community has been one of the world's most prominent targets of terrorist strikes. There is still study being done and improved efficiency procedures needed in this sector, however the security forces and law enforcement agencies are creating and launching high security weaponry to secure their territories. There is a huge necessity to include the greater level of protection into military vehicles in the wake of several terrorist attacks and sniffing of security officers. Terrorists rely heavily on infiltration while avoiding detection by security measures because of the holes in these hypothetical situations. This paper presents the central methods of hash functions, cryptography and dynamic encryption that may be utilised by the military personnel to increase the safety, privacy, and resistance to sniffing of their communications with one another. This article details the many methods and algorithms that may be included into laser guided defensive weapons and vehicles to provide safe communication across the system

    Group Authentication Scheme for Neighbourhood Area Networks(NANs) In Smart Grids

    Get PDF
    A Neighbourhood Area Network is a functional component of the Smart Grid that interconnects the end user domain with the Energy Services Provider (ESP) domain. It forms the “edge” of the provider network, interconnecting homes instrumented with Smart Meters (SM) with the ESP. The SM is a dual interface, wireless communication device through which information is transacted across the user (a home) and ESP domains. The security risk to the ESP increases since the components within the home, interconnected to the ESP via the SM, are not managed by the ESP. Secure operation of the SM is a necessary requirement. The SM should be resilient to attacks, which might be targeted either directly or via the network in the home. This paper presents and discusses a security scheme for groups of SMs in a Neighbourhood Area Network that enable entire groups to authenticate themselves, rather than one at a time. The results show that a significant improvement in terms of resilience against node capture attacks, replay attacks, confidentiality, authentication for groups of SMs in a NAN that enable entire groups to authenticate themselves, rather than one at a time
    corecore