Identity based distributed data storage using digital signature and diffie hellmann key exchange mechanism

被引:0
|
作者
Allvijay, R. [1 ]
Sivagami, V.M. [2 ]
机构
[1] PG Scholar Sri Venkateswara College of Engineering, Pennalur
[2] Sri Venkateswara College of Engineering, Pennalur
关键词
Decryption; Digital signature; Encryption;
D O I
10.5120/16412-6002
中图分类号
学科分类号
摘要
The widespread use of Internet has increased the demand for computing. Grid computing is a large scale heterogeneous distributed system which helps in sharing of resources such as data storage, computational power, network dynamically. Grid security is an important component of computational grid infrastructure Grid Security solutions addresses critical requirements and are constructed from building blocks comprising cryptographic algorithms and protocols. Choosing the most appropriate algorithm and protocols require an evaluation of performance of various cryptographic technique. Since Grid computing rest on networks, Security issues like privacy, Data Integrity, Authentication and Confidentiality is encountered. Hence, the combination of different mechanisms like encryption, decryption and digital signatures are used to overcome those issues. On these similar terms, a combination of authentication technique, key exchange algorithm blended with an encryption algorithm is employed. RSA Digital Signature algorithm is used to make use of Digital Signature, Diffie- Hellmann Key exchange mechanism for exchanging keys and Data Encryption Standard [DES] for Confidentiality. I propose a three way mechanism for improving the security features of the system. As a part of the work, a performance evaluation of various cryptographic algorithms is made and the results are used for increasing the security features.
引用
收藏
页码:27 / 30
页数:3
相关论文
共 13 条
  • [1] Integrating Diffie-Hellman key exchange into the Digital Signature Algorithm (DSA)
    Harn, L
    Mehta, M
    Hsin, WJ
    IEEE COMMUNICATIONS LETTERS, 2004, 8 (03) : 198 - 200
  • [2] FPGA implementation of hybrid asymmetric key-based digital signature and Diffie-Hellman key exchange algorithm for IoT application
    Peroumal, Vijayakumar
    Krishna, Sujan
    Reddy, Harivamsi
    Ramakrishna, Polineni
    Jagannath, M.
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2022, 14 (05) : 534 - 546
  • [3] Making the Identity-Based Diffie-Hellman Key Exchange Efficiently Revocable
    Nakagawa, Kohei
    Fujioka, Atsushi
    Nagai, Akira
    Tomida, Junichi
    Xagawa, Keita
    Yasuda, Kan
    PROGRESS IN CRYPTOLOGY, LATINCRYPT 2023, 2023, 14168 : 171 - 191
  • [4] Improvement and Implementation of digital content protection scheme using identity based signature
    Fujisaki, Mutsumi
    Iwamura, Keiichi
    Inamura, Masaki
    Kaneda, Kitahiro
    PROCEEDINGS OF THE 2018 FOURTH INTERNATIONAL CONFERENCE ON MOBILE AND SECURE SERVICES (MOBISECSERV), 2018,
  • [5] Smart Home Security: A Distributed Identity-based Security Protocol for Authentication and Key Exchange
    Rathore, M. Mazhar
    Bentafat, Elmahdi
    Bakiras, Spiridon
    2019 28TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN), 2019,
  • [6] An identity attribute-based encryption using elliptic curve digital signature for patient health record maintenance
    Athena, J.
    Sumathy, V.
    Kumar, K.
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (02)
  • [7] Digital Signature Based Key Management Protocol for Secure Data Transfer in Dynamic Wireless Sensor Networks
    Shruthi, G. J.
    Hemavathi
    2016 IEEE INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ELECTRONICS, INFORMATION & COMMUNICATION TECHNOLOGY (RTEICT), 2016, : 499 - 502
  • [8] A Key Escrow-Free Identity-Based Signature Scheme without using Secure Channel
    Das, Manik Lal
    CRYPTOLOGIA, 2011, 35 (01) : 58 - 72
  • [9] Efficient Identity-Based Data Integrity Auditing With Key-Exposure Resistance for Cloud Storage
    Shen, Wenting
    Yu, Jia
    Yang, Ming
    Hu, Jiankun
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (06) : 4593 - 4606
  • [10] A provable secure key-escrow-free identity-based signature scheme without using secure channel at the phase of private key issuance
    SUBHAS CHANDRA SAHANA
    MANIK LAL DAS
    BUBU BHUYAN
    Sādhanā, 2019, 44