Hybrid cryptographic technique to secure data in web application

被引:1
|
作者
Gupta, Neha [1 ]
Kapoor, Vivek [1 ]
机构
[1] Devi Ahilya Vishwavidyalaya, Dept Informat Technol, Inst Engn & Technol, Indore 452001, Madhya Pradesh, India
关键词
Blowfish; RC6; ECC; Kerberos protocol; Web Application;
D O I
10.1080/09720529.2020.1721872
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Web applications have become part of daily life. They help us to aid the system with cross-platform functionality regardless of the location. Due to public environment and involvement of internet it has become vulnerable for several security threats. At this point, hackers attack may break down the security and leak the information. In web application data is recognized as an important corporate asset that needs to be safeguarded from unwanted internal or external threats. Data encryption not only provides data protection on sensitive data but also raise computation and memory overhead on web application during large data processing. Web Application always demands low processing overhead to keep computation as fast as possible. In the proposed hybrid model the AES algorithm is replaced by Blowfish security algorithm, which is faster than AES and ECC algorithm is replaced by RSA algorithm. ECC algorithm can provide the same level of security afforded by RSA with a large modulus and corresponding large key. To verify the originality of data MD5 algorithm is implemented and to authenticate the client modified Kerberos protocol is applied.
引用
收藏
页码:125 / 135
页数:11
相关论文
共 50 条
  • [41] Probit Cryptographic Blockchain for Secure Data Transmission in Intelligent Transportation Systems
    Dhanaraj, Rajesh Kumar
    Kadry, Seifedine
    Kang, Byeong-Gwon
    Nam, Yunyoung
    JOURNAL OF INTERNET TECHNOLOGY, 2022, 23 (06): : 1303 - 1313
  • [42] A Hybrid Cryptographic Technique for File Storage Mechanism Over Cloud
    Sharma, Shivam
    Singla, Kanav
    Rathee, Geetanjali
    Saini, Hemraj
    FIRST INTERNATIONAL CONFERENCE ON SUSTAINABLE TECHNOLOGIES FOR COMPUTATIONAL INTELLIGENCE, 2020, 1045 : 241 - 256
  • [43] A cognitive approach for blockchain-based cryptographic curve hash signature (BC-CCHS) technique to secure healthcare data in Data Lake
    Panwar, Arvind
    Bhatnagar, Vishal
    SOFT COMPUTING, 2021, 28 (Suppl 2) : 429 - 429
  • [44] Secure Composition of Cryptographic Protocols
    Goyal, Vipul
    PROVABLE SECURITY, 2011, 6980 : 2 - 2
  • [45] Hierarchical Metadata-Based Secure Data Retrieval Technique for Healthcare Application
    Saha, Sayantani
    Saha, Priyanka
    Neogy, Sarmistha
    ADVANCED COMPUTING AND COMMUNICATION TECHNOLOGIES, 2018, 562 : 175 - 182
  • [46] A scalable and secure cryptographic service
    Xu, Shouhuai
    Sandhu, Ravi
    DATA AND APPLICATIONS SECURITY XXI, PROCEEDINGS, 2007, 4602 : 144 - +
  • [47] A Secure Cryptographic Token Interface
    Cachin, Christian
    Chandran, Nishanth
    PROCEEDINGS OF THE 22ND IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM, 2009, : 141 - +
  • [48] Secure Data Provenance in Internet of Things using Hybrid Attribute based Crypt Technique
    S. Porkodi
    D. Kesavaraja
    Wireless Personal Communications, 2021, 118 : 2821 - 2842
  • [49] Secure Composition of Cryptographic Protocols
    Goyal, Vipul
    INFORMATION SYSTEMS SECURITY, 2011, 7093 : 71 - 71
  • [50] Designing Secure Cryptographic Circuits
    Homma, N.
    2019 IEEE INTERNATIONAL ELECTRON DEVICES MEETING (IEDM), 2019,