RETRACTED: Enhancing the security using SRB18 method of Emb e dding Computing (Retracted article. See vol. 103, 2023)

被引:4
作者
Basha, C. Bagath [1 ]
Rajaprakash, S. [1 ]
机构
[1] Vinayaka Missions Res Fdn, Aarupadai Veedu Inst Technol, Dept Comp Sci & Engn, Chennai, Tamil Nadu, India
关键词
Salsa; encryption; decryption; security; polarity;
D O I
10.1016/j.micpro.2020.103125
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Today's world has witnessed the accumulation of data through social media like Twitter and Facebook, which have been growing enormously day by day. Using these social media, users tweet or post on many topics from anyplace in the world through the Internet. Tweets are used to analyze positive and negative messages to drive polarity scores and also to predict future trends. These polarity scores could be extracted from Twitter, even though polarity score data are placed under security. The data can be easily hacked, and changing the score results can lead to lots of issues, such as affecting the worldwide economic status, company brands, and the reputations of firms. To tackle these issues, Daniel Bernstein proposed the implementation of Salsa, which has faster encryption because of the quarter round with better data security. In the present work, a novel algorithm is proposed by modifying the Salsa20/4 to further enhance the security of the polarity scores, which is an important requirement of the present world. The proposed algorithm has two stages. The first stage consists of a secret key and the second stage constructs the diagonal keys in N-1 steps. The proposed algorithm is tested with different file sizes to calculate the encryption time. The results show that the proposed encryption algorithm takes relatively large execution time but provides high data security when compared to that of the existing algorithm of Salsa20/4. (c) 2020 Elsevier B.V. All rights reserved.
引用
收藏
页数:7
相关论文
共 15 条
[1]   Improving the Diffusion of the Stream Cipher Salsa20 by Employing a Chaotic Logistic Map [J].
Almazrooie, Mishal ;
Samsudin, Azman ;
Singh, Manmeet Mahinderjit .
JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2015, 11 (02) :310-324
[2]  
[Anonymous], 2010, Proceedings of the First Workshop on Social Media Analytics, SOMA '10, DOI DOI 10.1145/1964858.1964867
[3]  
Bernstein Daniel J., 2008, LECT NOTES COMPUTER
[4]  
Daemen Joan, 1999, AES PROPOSAL
[5]  
Fischer S, 2006, LECT NOTES COMPUT SC, V4329, P2
[6]   Like It or Not: A Survey of Twitter Sentiment Analysis Methods [J].
Giachanou, Anastasia ;
Crestani, Fabio .
ACM COMPUTING SURVEYS, 2016, 49 (02)
[7]  
Jolfaei A., 2012, INT J COMPUTER THEOR, V4, P938, DOI DOI 10.7763/IJCTE.2012.V4.611
[8]   Thumbs up? Sentiment classification using machine learning techniques [J].
Pang, B ;
Lee, L ;
Vaithyanathan, S .
PROCEEDINGS OF THE 2002 CONFERENCE ON EMPIRICAL METHODS IN NATURAL LANGUAGE PROCESSING, 2002, :79-86
[9]   Large-Scale Encryption in the Hadoop Environment. Challenges and Solutions [J].
Parmar, Raj R. ;
Roy, Sudipta ;
Bhattacharyya, Debnath ;
Bandyopadhyay, Samir Kumar ;
Kim, Tai-Hoon .
IEEE ACCESS, 2017, 5 :7156-7163
[10]  
Sobti R., 2016, INDIAN J SCI TECHNOL, V9