The Security Enhancement of Symmetric Key Crypto Mechanism based on Double Stage Secret Model

被引:3
作者
Chakrabarti, Sreeparna [1 ,2 ]
Suresh Babu, G. N. K. [3 ]
机构
[1] Visvesvaraya Technol Univ, Dept MCA, Belgaum 590018, Karnataka, India
[2] Kristu Jayanti Coll, Dept Comp Sci, Bengaluru, India
[3] Prince Dr K Vasudevan Coll Engn & Technol, Comp Sci & Engn, Chennai, Tamil Nadu, India
来源
INFORMATION SECURITY JOURNAL | 2021年 / 30卷 / 06期
关键词
Cloud computing; encryption; decryption; cryptography; attacks in channel; transmission channel; ENCRYPTION;
D O I
10.1080/19393555.2020.1842945
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
All smart services in cloud computing platforms have a data-sharing process to execute the task. Moreover, several crypto techniques were implemented to provide efficient and secure data transmission channel. However, it has been suffered with a number of issues because of several harmful attacks and unauthenticated key retrieval. Thus in the wireless medium, transferring the data amid two users are challengeable task. To overcome this issue, a novel Double-Stage Secret (DSS) cryptosystem is proposed to prevent the attacks in the communication channel, here the encryption and decryption function is processed based on some specific condition. If the DSS condition is satisfied then the client or user is requested to decrypt the message. To validate the secure and success rate of the proposed model, an efficient novel back sniff is developed and launched in the data transmission channel and its secure range is evaluated. In addition, the simulation of this research is done by Java, running on net beans IDE 8.2 in windows 10 platform and the results illustrated that the proposed model has attained high performance by gaining a high secure rate and less processing time of encryption and decryption than the existing algorithms.
引用
收藏
页码:325 / 341
页数:17
相关论文
共 33 条
[1]  
Abdelwahab M.M, 2018, U KHARTOUM ENG J, V8
[2]   A high-performance and energy-efficient exhaustive key search approach via GPU on DES-like cryptosystems [J].
Ahmadzadeh, Armin ;
Hajihassani, Omid ;
Gorgin, Saeid .
JOURNAL OF SUPERCOMPUTING, 2018, 74 (01) :160-182
[3]   Combining RSA and audio steganography on personal computers for enhancing security [J].
Al-Juaid, Nouf ;
Gutub, Adnan .
SN APPLIED SCIENCES, 2019, 1 (08)
[4]  
Alassaf N., 2017, Journal of Research in Engineering and Applied Sciences, V2, P50
[5]   Simulating Light-Weight-Cryptography Implementation for IoT Healthcare Data Security Applications [J].
Alassaf, Norah ;
Gutub, Adnan .
INTERNATIONAL JOURNAL OF E-HEALTH AND MEDICAL COMMUNICATIONS, 2019, 10 (04) :1-15
[6]   Enhancing speed of SIMON: A light-weight-cryptographic algorithm for IoT applications [J].
Alassaf, Norah ;
Gutub, Adnan ;
Parah, Shabir A. ;
Al Ghamdi, Manal .
MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (23) :32633-32657
[7]  
Almutairi SM, 2020, INT J TECHNOL ENHANC, V12, P200
[8]  
Alotaibi M., 2019, Journal of Information Security and Cybercrimes Research, V2, P9, DOI 10.26735/16587790.2019.001
[9]  
Alsaidi A., 2018, J COMPUTER SCI COMPU, V8, DOI [10.20967/jcscm.2018.03.002, DOI 10.20967/jcscm.2018.03.002]
[10]  
[Anonymous], 2018, J Res Eng Appl Sci