IMPROVING SECURITY AND EFFICIENCY IN ATTRIBUTE BASED DATA SHARING NURUL SYAFIQAH BINTI JOHARI
|
|
- Phillip Morgan
- 6 years ago
- Views:
Transcription
1 IMPROVING SECURITY AND EFFICIENCY IN ATTRIBUTE BASED DATA SHARING NURUL SYAFIQAH BINTI JOHARI BACHELOR OF COMPUTER SCIENCE (NETWORK SECURITY) UNIVERSITI SULTAN ZAINAL ABIDIN 2017
2 IMPROVING SECURITY AND EFFICIENCY IN ATTRIBUTE BASED DATA SHARING NURUL SYAFIQAH BINTI JOHARI Bachelor of Computer Science (Network Security) Faculty of Informatics and Computing Universiti Sultan Zainal Abidin, Terengganu, Malaysia MAY 2017
3 DECLARATION I hereby declare that this report is based on my original work except for quotations and citations, which have been duly acknowledged. I also declare that it has not been previously or concurrently submitted for any other degree at Universiti Sultan Zainal Abidin or other institutions. Name : Nurul Syafiqah Binti Johari Date :... i
4 CONFIRMATION This is to confirm that: The research conducted and the writing of this report was under my supervisor. Name : Dr Ahmad Nazari Bin Mohd Rose Date :... ii
5 DEDICATION Firstly and foremost praised to Allah, the most Merciful for giving bless and opportunity to undergo the final year project, Improving Security and Efficiency in Attribute Based Data Sharing. Besides, I would like to express my gratitude to my supervisor, Dr Ahmad Nazari Bin Mohd Rose for his full support, expert guidance, ideas, understanding, motivation and encouragement towards research of this project. I feel so proudly to be supervised by Dr Ahmad Nazari Bin Mohd Rose with his guidance and invaluable advices. Next, I would to thank to the Faculty of Informatics and Computing for giving me an opportunity to discover and explore new things as my final year project. Last but not least, I would to thank my family, all others lecturers and my fellow friends for helping me a lot of moral support in order to complete this final year project. I am very pleasure for their kindness and encouragement that make me able to endure all the hardship that I have face to complete this project. iii
6 ABSTRACT Nowadays, many people easily sharing data through network and computing technology using online external storages. The key generation center (KGC) can decrypt all cipher text addressed to specific users by generating their attribute keys. This can be a potential threat to the data privacy in the data sharing system. To overcome this problem, we improve the security in data sharing by attribute-based encryption (ABE) which is a cryptographic approach that achieves fine-grained data access control. Then, cipher text-policy attribute-based encryption (CP-ABE) scheme can encrypt the attribute and secure data sharing system. The advantage of (CP-ABE) is a major drawback which is known as a key escrow problem that can be solved by escrow-free key issuing protocol. The key issuing protocol can generate user secret key by use a secure two-party computation (2PC) protocol between the KGC and data storing center with their own master secrets. In conclusion, we can more secure and fine-grained data access control in the data sharing system by using (CP-ABE) scheme. The data confidentiality can be cryptographically applied against any KGC or data storing center in the scheme.. iv
7 ABSTRAK Pada masa kini, ramai orang dengan mudah berkongsi data melalui rangkaian dan teknologi pengkomputeran menggunakan penyimpanan luar talian. Key Generation Center (KGC) boleh menyahsulit semua cipher text yang ditujukan kepada pengguna tertentu dengan menjana kunci atribut mereka. Ini boleh menjadi satu ancaman kepada privasi data dalam sistem perkongsian data. Untuk mengatasi masalah ini, kita meningkatkan keselamatan dalam perkongsian data dengan Attribute-Based Encrypton (ABE) yang merupakan pendekatan kriptografi yang mencapai kawalan akses data halus. Kemudian, Cipher text Policy Attribute-Based Encryption (CP-ABE) boleh menyulitkan sifat dan sistem perkongsian data yang selamat. Kelebihan (CP-ABE) merupakan kelemahan utama yang dikenali sebagai masalah escrow utama yang boleh diselesaikan dengan protokol pengeluaran utama escrow bebas. Protokol pengeluaran utama boleh menjana pengguna kunci rahsia dengan menggunakan secure two-party computation (2PC) antara KGC dan data menyimpan pusat dengan rahsia tuan mereka sendiri. Kesimpulannya, kita boleh mengawal akses data lebih selamat dan halus dalam sistem perkongsian data dengan menggunakan (CP-ABE) skim. Kerahsiaan data boleh secara kriptografi digunakan terhadap mana-mana KGC atau data menyimpan pusat dalam skim ini. v
8 CONTENTS DECLARATION CONFIRMATION DEDICATION ABSTRACT ABSTRAK CONTENTS PAGE i ii iii iv v vi CHAPTER I INTRODUCTION 1.1 Background Problem statement Objectives Project Scopes Limitation of work 3 3 CHAPTER II LITERATURE REVIEW 2.1 Introduction Overview of Cipher text Policy Attribute-Based 4 Encryption 2.3 Elements of Cipher text Policy Attribute-Based 5 Encryption 2.4 RSA Cryptography 5 vi
9 2.5 Analysis of Existing Research Paper Secure Data Sharing and Retrieval Using Attribute-Based Encryption in Cloud-Based OSN Cipher text-policy Attribute Based Data- Sharing with Enhanced Productivity and Security A Survey on Attribute-based Encryption Schemes of Access Control in Cloud Environments Applied Attribute-based Encryption Scheme Cipher text Policy Attribute Based Encryption Using 2Party Computation Protocol Data Sharing Summary CHAPTER III METHODOLOGY Introduction Waterfall Model Requirement Gathering and Analysis System Design Implementation Testing Deployment of System Maintenance 3.3 Technique Used Why RSA Algorithm vii
10 How RSA Algorithm works How to Determine Suitable Value of e, d and n Diagram of Integration Data sharing with RSA Algorithm Framework of Project Process Model of Data Sharing Data Model of Data Sharing REFERENCES 23 viii
11 CHAPTER I INTRODUCTION 1.1 Background The data sharing model in distributed system such as online network have been increasing request for distributed data security. The problems that have been arising are the data by the storage server by outside users could be possible dangers to their data with using the key generation center (KGC). The KGC is defined the process of generating keys in cryptography. Furthermore, KGC can decrypt all messages or data with using their private keys. Thus, KGC is not suitable for data sharing because the owner want to make their private data that only can available to designated users key. [6] By using technique Cipher text Policy Attribute-Based Encryption (CP-ABE), the encrypted data can be kept private even if the storage server is untrusted but our techniques are secure against conspiracy attacks. The CP-ABE is enabling to encrypt the attribute set over a universe of attributes that a decrypt to possess in order to decrypt the cipher text and apply it. [9] 1
12 1.2 Problem Statement Security is an important thing in the data sharing. While the data are was sharing on the network because there are several problem where the data is not secure. The leakage of data may occur and intruders or attackers will steal or change the data. To prevent the leakage of the data owner s from intruders, attackers or unauthorized user; the data owner should provide access to large amount of consumer while also being able to efficiently cancel consumers from data access at any time. This project intends to solve the problem when data sharing occur and to prevent leakage of data happened through using Cipher text Policy Attribute-Based Encryption technique. 1.3 Objectives a) To design a system using CP-ABE b) To implement the encryption technique for data sharing using RSA algorithm c) To test and evaluate the successfulness of RSA algorithm in CP-ABE for data sharing 2
13 1.4 Project Scope This project is using JAVA language programming as a platform to develop this application. A user friendly Graphic User Interface (GUI) will be developed by using JAVA programming in NetBeans application. This interface will interact with user throughout the process. The data that want to share will be encrypted by using RSA algorithm. This project is mainly focused to protect data from other person in the network by encrypting it and will send it in the social networks. The authorized user that received the message will send the key request to the data owner. After receiving the key from sender only the message will be decrypted 1.5 Limitation of Work This project is about data sharing between two users in Attribute-Based Data Sharing using CP-ABE technique and RSA algorithm. This project cannot be applied on many users at the same time. As example, when User 1 want to share data to User 2 they can use the one public key and one private key at that time. Thus, when came new User 3 they need to request the new public key to share the data. 3
14 CHAPTER 2 LITERATURE REVIEW 2.1 Introduction The main objective of this project is to improve the security and efficiency in attribute-based data sharing. This chapter describes the previous research that related to on-going project. Furthermore, this chapter also describes the technique or method to be taken in the implementation of projects. There are similar published studies concerning about Cipher text-policy Attribute Based Encryption (CP-ABE) and Attribute Based Encryption. For this chapter, there are some reference such as journal article, internet and thesis. However, there are less likely of this study to be related to secure data sharing using RSA algorithm. 2.2 Overview of Cipher text Policy Attribute-Based Encryption Cipher text Policy Attribute-Based Encryption is a type of identity-based encryption that has one public key and master private key used to make more limited private keys. Moreover, the attributes in the CP-ABE are attached to the user secret key and access policy is attached to the cipher text. Thus, CP-ABE enables an encryption to define the attribute set over a universe of attributes that a decryption needs to possess in order to decrypt the cipher text and enforce it on the contents.[1] 4
15 2.3 Elements of Cipher text Policy Attribute-Based Encryption There are four fundamental algorithms to be executed in CP-ABE which are Setup, Keygen, Encrypt and Decrypt. Firstly, Setup algorithm takes no input other than implicit security parameter and the output is the public parameters PK and a master key MK. Secondly, Keygen algorithm. It is takes input as the master key MK and a set of attributes S as key. Then, it outputs is private key SK. Next, Encrypt (PK, M, A) takes the public parameters PK as input, M is a message and A is an access structure over the universe of attributes. Lastly, Decrypt algorithm (PK, CT, SK) is as an input in the public parameters PK, a CT cipher text which contain an access policy A and private key for a set S of attributes.[8] 2.4 RSA Cryptography The RSA Algorithm is named after Ron Rivest, Adi Shamir and Len Adleman that who designed it in The RSA is the most widely-used public key cryptography algorithm in the world. It can be used to encrypt message without need to exchange a secret key separately. Furthermore, the RSA algorithm can be used for both public key encryption and digital signatures. The public key cryptography is also known as an asymmetric cryptography that used two different but it is mathematically linked keys that contain one public and one private. Moreover, the RSA has provides a method the confidentiality, integrity, authenticity and non-reputability of data storage. [2] 5
16 2.5 Analysis of Existing Research Paper Secure Data Sharing and Retrieval Using Attribute Based Encryption in Cloud Based OSNs The outcome of this project is to allow data owners to outsource encrypted data to the OSNs (Online Social Networks) service provider for sharing and enables data disseminators to disseminate the data owner s by converting new access policy that based on using Cipher text Policy Attribute-Based Encryption (CP-ABE). Furthermore, the most access control in OSNs is achieved by requiring the users to manually maintain the Access Control List (ACL) which is inflexible and coarsegrained. This means the users can only choose that either publish their data to all users or grant authorities merely to their approved friends by manually maintaining ACL. Based on Attribute-Based Encryption (ABE), the users can get a set of attributes and the data owner can encrypt data with access policy. This will protect data from unauthorized users or malicious OSNs service provider. Data security is very important when sharing data thus the solution is encrypt data before sending it to OSNs service provider. Then, users in OSNs can share their private data based on Proxy re-encryption (PRE).[3] 6
17 2.5.2 Cipher text-policy Attribute based Data Sharing with Enhanced Productivity and Security Attribute Based Encryption (ABE) is a technique that is suitable for storing data with encryption. In this paper, the main objective is to improve the security data integrity. The benefits of using ABE are reduces the communicational overhead of the Internet. Furthermore, it is a fine grained access control. Thus, the major drawback is the Key Escrow problem that s means that can resolved by escrow free key issuing protocol which is constructed by using the secure two-party computation between the data centre and key generation centre. The proposed system in this project for system data becomes more secure when applied CP-ABE in data sharing system. Furthermore, in CP-ABE for users Key Generation Centre (KGC) will generates private keys by applying the KGC s master secret keys to users corresponding set of attributes. The benefits are it is much secured data transfer with advanced encryption technique so that other person cannot decrypt it easily. Then, the receiver can send multiple key requests to the data owner for the single data.[1] 7
18 2.5.3 A Survey on Attribute-based Encryption Schemes of Access Control in Cloud Environments In Attribute-based Encryption schemes, the attributes play a very important role. The attribute is to generate a public key for encrypting data and used as an access policy to control user s access. The access policy can be categorized as either key-policy or cipher text-policy. The advantages of ABE schemes are to reduce the communication overhead the Internet and also to provide a fine-grained access control. In this project, the authors had survey a basic attribute-based encryption scheme, two various access policy attribute based encryption-based encryption schemes and two various access structures that are analyzed for cloud environments. Firstly, the Key-Policy Attributebased Encryption (KP-ABE) is proposed by Goyal in This scheme uses as set attributes to describe the encrypted data and builds an access policy in user s private key. Secondly, the Cipher text-policy Attribute-Based Encryption scheme by Bethencourt et al. in 2007 and the access policy in the encrypted data cipher text. The access control method is same as key-policy attributed-based encryption. In KP-ABE, the access policy is in user s private key while the access policy is switched to the encrypted data in CP-ABE. Thus, a set of descriptive attributes are related with the user private key and the access policy is built in the encrypted data. [7] 8
19 2.5.4 Applied Attribute-based Data Encryption Schemes The schemes of Attribute-based Encryption (ABE) became most popular including cipher text-policy and key-policy ABE. This article gives an overview about the existing implementations and elaborates on value in specific cloud computing and IoT application situations. There are many existing of cryptographic schemes that depend on the idea of a secret key which is a private key within symmetric or asymmetric cryptography. ABE is an asymmetric encryption schemes that means keys come in pairs such as one key encrypts and the other one is decrypt. It is also called as public key that use different keys for encryption and decryption. The important characteristic of ABE is the prevention of collusion attacks. There are two main options of ABE. Firstly, Cipher text-policy ABE (CP-ABE) that is Boolean formula is saved in the cipher text. The attributes that are needed is to satisfy policies are saved in a private key. Secondly, Key-Policy ABE (KP-ABE) which is the private keys that holds the formula and the cipher text saves attributes. In the IoT world, securing the data transfer is sometimes difficult. By applying ABE schemes, it will prove the security can be increase and have advantages such as grouping sensors that share a certain characteristics and can apply attributes to them for end-to-end encryption method are achievable. [6] 9
20 2.5.5 Cipher text Policy Attribute Based Encryption Using 2 Party Computation Protocol in Data Sharing Data sharing in distributed system such as in online social network that demands for distributed data security. In this paper, it is proposed a Cipher text Policy Attribute Based Encryption (CP-ABE) scheme for overcoming the key escrow problem by solved it with using the secure two-party computation protocol between key generation centre and data storing centre. Furthermore, the performance and security analyses show that this scheme is efficient to securely manage the data distributed in the data sharing system. The CP-ABE scheme is the most powerful cryptographic solution to the issue of updates access policy in a distributed data sharing system. In this paper, the author had proposed a 2 Party Computation Protocol that are completely removes the problem of key escrow. The key escrow was removed by 2 PC Protocol that are establishes two secret key components where is one from the KGC SK and another is from the data storing centre SK. [5] 10
21 2.6 Summary In a nutshell, the security for data sharing is very important to secure our data from being stolen from unauthorized user. A scheme to achieve more secure and fine grained data access control in the data sharing system, it is should to demonstrate the efficient and scalable to securely manage user data in the data sharing system.[4] 11
22 CHAPTER 3 METHODOLOGY 3.1 Introduction This chapter reports the model development of a comprehensive framework taken in a development system, application or implementation of study. The waterfall model has been used in this project because it is simple, suitable and easy to understand and use. In a waterfall model, each phase must be fully completed before the next phase can begin. This model phase does not overlap. Requirement gathering and analysis System design Implementation Testing Deployment of System Maintenance Figure 1: Waterfall Model 12
23 3.2 Waterfall Model This project used a sequential order and move to next step of development and testing if the previous steps is successfully which a waterfall model is shown in Figure 1. The waterfall model concept carried out in downward mechanism like water falls towards down. In waterfall model, when the first step is complete and next step has to start in development process. Thus, the waterfall model cannot revert back to the previous step to perform any change Requirement Gathering and Analysis In this phase, detailed requirement of the system to be developed are gathered. Then, analysed all the gather requirements whether the requirements are valid or invalid System Design In this phase, all the system design is analysed and specified such as system configuration and architecture of the system. Furthermore, it is contain framework and use case diagram Implementation In this phase, all the development works are achieved and development components are handed over to testing team Testing For testing phase, the testing team will test each component and make sure the developed components are working as expected. All the testing activities are performed in this phase. 13
24 3.2.5 Deployment of System Once the testing phase is completed and make sure there is no any kind of issue, then the project is ready to be deployed. Once the product is deployed to production the end users can start using the product Maintenance For keep the maintenance in a good condition, we must always keep eye on the product and provide all the necessary issues fix if occurs in production and get report by end users.. 14
25 3.3 Technique Used In this project, tools that have been used are latest NetBeans application to develop data sharing system using JAVA programming language. Furthermore, RSA algorithm is improved and integrate with the system that have been developed to make encryption and decryption process. RSA is an asymmetric cryptographic algorithm that means have two different keys. The asymmetric algorithms use different keys for encryption and decryption. Thus, it is important because they can used for transmitting encryption keys or other data securely even when the parties have no opportunity to agree on a secret key in private. The most important, RSA implements a public-key cryptosystem. Moreover, Cipher text Policy Attribute-Based Encryption much more flexible than plain identity-based encryption, it is allows complex rules specifying which private keys can decrypt which is cipher texts. Specifically, the private keys are associated with sets of attributes or labels, and when encrypt an access policy which specifies which keys will be able to decrypt. 15
26 3.4 Why RSA algorithms: RSA stands for Ron Rivest, Adi Shamir and Len Adleman, who first publicly described it in In this project, using RSA algorithm to encrypt the data to provide security so that only the concerned user can access it. By securing the data, we are not allowing unauthorized access to it. User data is encrypted first and then it is stored in the cloud. When it is required, user places a request for the data for the cloud provider. Then, cloud provider will authenticate the user and delivers the data. Furthermore, RSA is a block cipher in which every message is mapped to an integer. RSA consists of public key and private key. [5] In cloud environment, public key is recognized to all, whereas private key is recognized only to the user who originally has the data. Thus, encryption is done by the cloud service provider and decryption is done by the cloud user. Once the data is encrypted with the public key, it can be decrypted with the private key only. Moreover, the RSA algorithm has involves three operation where are key generation, encryption and decryption. [10] 1) Key Generation - The key generation algorithm takes the master key MK and a set of attributes S that describe the key as input. It delivers a private key SK as the output. 2) Encryption - The encryption algorithm consumes the public parameters PK, a message M, and an access structure A as input. The algorithm will encrypt M and produce a cipher text CT such that only a user that keeps a set of attributes that fulfills the access structure will be able to decrypt the message. 3) Decryption - The decryption algorithm takes the public parameters PK, a cipher text CT, and a private key SK, as input. Then, the algorithm will decrypt the cipher text and return a message M as output. 16
27 Key Generation Select p, q p, q both prime, p q Calculate n = p x q Calculate ɸ (n) = (p-1) x (q-1) Select integer e gcd (ɸ(n),e) = 1; 1 < e < ɸ (n) Calculate d Public key KU = {e, n} Private key KR = {d, n} Encryption Plaintext : M < n Cipher text : C = M e (mod n) Decryption Cipher text : C Plaintext : M = C d (mod n) Table 1 : Operation of RSA Algorithm 17
28 3.5 How RSA Algorithm works RSA is one of the first applied public-key cryptosystems and is widely used for secure data transmission. In a cryptosystem, the encryption key is public and varies from the decryption key which is kept secret. The RSA algorithm take advantage of on the fact that there is no efficient way to factor very large ( digit) numbers. Using an encryption key (e, n), the algorithm is as follows: 1. Represent the message as an integer between 0 and (n-1). Large messages can be broken up into a number of blocks. Each block would then be represented by an integer in the same range. 2. Encrypt the message by raising it to the e th power modulo n. The result is a cipher text message C. 3. To decrypt cipher text message C, raise it to another power d modulo n The encryption key (e, n) is made public. The decryption key (d, n) is kept private by the user How to Determine Suitable Values for e, d, and n 1. Choose two very large (100+ digit) prime numbers. Denote these numbers as p and q. 2. Set n equal to p * q. 3. Choose any large integer, d, such that GCD(d, ((p-1) * (q-1))) = 1 4. Find e such that e * d = 1 (mod ((p-1) * (q-1))) 18
29 3.6 Diagram of Integration Data Sharing with RSA Algorithm Figure 2: Integration of Data Sharing of RSA 19
30 3.7 Framework of project Data Cipher text Attribute Encryption using RSA algorithm Encrypted USER 1 Attribute Attribute Encryption Cipher text Encrypted Verification Attribute Access USER 2 Structure Decrypt using RSA algorithm Plaintext Figure 3: Framework 20
31 3.8 Process Model of Data Sharing Register Log In Share Data Upload View Data USER 1 USER 2 Encrypt Decrypt Download data Log Out Figure 4: Use Case Diagram Figure 4: Use Case Diagram 21
32 3.9 Data Model of Data Sharing user1 user2 +username +password +register () +log in () +share data () +encrypt data () +upload data () +view data () +log out () +username +password +register () +log in () +view data () +decrypt data () +download data () +log out () Figure 5: Class Diagram 22
33 REFERENCES [1] K. Patil and V. Chitre, Ciphertext-Policy Attribute based Data-Sharing with Enhanced Productivity and Security, vol. 4, no. 11, pp , [2] J. Jones, The RSA algorithm, ACM Commun. Comput. Algebr., no. June, pp. 1 11, [3] Q. Huang, Z. Ma, Y. Yang, J. Fu, and X. Niu, Secure data sharing and retrieval using attribute-based encryption in cloud-based OSNs, Chinese J. Electron., vol. 23, no. 3, pp , [4] M. Pratheepa and R. Bharathi, Improving Security and Efficiency in Attribute Based Data Sharing, vol. 3, no. 1, pp , [5] N. Y. Goshwe, Data Encryption and Decryption Using RSA Algorithm in a Network Environment, vol. 13, no. 7, pp. 9 13, [6] Junbeom Hur, "Improving Security and Efficiency in Attribute-Based Data Sharing," vol. 25, no. 10, [7] Cheng-Chi Lee, Pei Shan Chung and Min-Shiang Hwang, "A Survey on Attribute-based Encryption Schemes of Access Control in Cloud Environments," vol. 15, no. 4, pp , [8] John Bethencourt, Amit Sahai and Brent Waters," Ciphertext-Policy Attribute- Based Encryption,"pp , [9] K.Gonnade and F.Zama, "Design Secure Sharing Protocol," vol. 4, no. 6, pp , [10] Matthew Pirretti, Pattrick Traynor, Pattrick Mcdaniel and Brent Waters, "Secure Attribute-Based System,"
A compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems.
A compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems. G Swetha M.Tech Student Dr.N.Chandra Sekhar Reddy Professor & HoD U V N Rajesh Assistant Professor Abstract Cryptography
More informationAN IMPROVED PACKET FORWARDING APPROACH FOR SOURCE LOCATION PRIVACY IN WIRELESS SENSORS NETWORK MOHAMMAD ALI NASSIRI ABRISHAMCHI
AN IMPROVED PACKET FORWARDING APPROACH FOR SOURCE LOCATION PRIVACY IN WIRELESS SENSORS NETWORK MOHAMMAD ALI NASSIRI ABRISHAMCHI A thesis submitted in partial fulfillment of the requirements for the award
More informationDETECTION OF WORMHOLE ATTACK IN MOBILE AD-HOC NETWORKS MOJTABA GHANAATPISHEH SANAEI
ii DETECTION OF WORMHOLE ATTACK IN MOBILE AD-HOC NETWORKS MOJTABA GHANAATPISHEH SANAEI A project report submitted in partial fulfillment of the requirements for the award of the degree of Master of Computer
More informationOPTIMIZE PERCEPTUALITY OF DIGITAL IMAGE FROM ENCRYPTION BASED ON QUADTREE HUSSEIN A. HUSSEIN
OPTIMIZE PERCEPTUALITY OF DIGITAL IMAGE FROM ENCRYPTION BASED ON QUADTREE HUSSEIN A. HUSSEIN A thesis submitted in partial fulfillment of the requirements for the award of the degree of Master of Science
More informationLOGICAL OPERATORS AND ITS APPLICATION IN DETERMINING VULNERABLE WEBSITES CAUSED BY SQL INJECTION AMONG UTM FACULTY WEBSITES NURUL FARIHA BINTI MOKHTER
LOGICAL OPERATORS AND ITS APPLICATION IN DETERMINING VULNERABLE WEBSITES CAUSED BY SQL INJECTION AMONG UTM FACULTY WEBSITES NURUL FARIHA BINTI MOKHTER UNIVERSITI TEKNOLOGI MALAYSIA i LOGICAL OPERATORS
More informationA TRUST MODEL FOR BUSINESS TO CUSTOMER CLOUD E-COMMERCE HOSSEIN POURTAHERI
A TRUST MODEL FOR BUSINESS TO CUSTOMER CLOUD E-COMMERCE HOSSEIN POURTAHERI A dissertation submitted in partial fulfillment of the requirements for the award of the degree of Master of Science (Information
More informationPRIVACY FRIENDLY DETECTION TECHNIQUE OF SYBIL ATTACK IN VEHICULAR AD HOC NETWORK (VANET) SEYED MOHAMMAD CHERAGHI
i PRIVACY FRIENDLY DETECTION TECHNIQUE OF SYBIL ATTACK IN VEHICULAR AD HOC NETWORK (VANET) SEYED MOHAMMAD CHERAGHI A project report submitted in partial fulfillment of the Requirements for the award of
More informationSECURE-SPIN WITH HASHING TO SUPPORT MOBILITY AND SECURITY IN WIRELESS SENSOR NETWORK MOHAMMAD HOSSEIN AMRI UNIVERSITI TEKNOLOGI MALAYSIA
SECURE-SPIN WITH HASHING TO SUPPORT MOBILITY AND SECURITY IN WIRELESS SENSOR NETWORK MOHAMMAD HOSSEIN AMRI UNIVERSITI TEKNOLOGI MALAYSIA SECURE-SPIN WITH HASHING TO SUPPORT MOBILITY AND SECURITY IN WIRELESS
More informationISOGEOMETRIC ANALYSIS OF PLANE STRESS STRUCTURE CHUM ZHI XIAN
ISOGEOMETRIC ANALYSIS OF PLANE STRESS STRUCTURE CHUM ZHI XIAN A project report submitted in partial fulfilment of the requirements for the award of the degree of Master of Engineering (Civil-Structure)
More informationAoT: Authentication and Access Control for the Entire IoT Device Life-Cycle
AoT: Authentication and Access Control for the Entire IoT Device Life-Cycle Noura Alomar November 7th, 2018 1 AoT The AoT paper is one of the earliest and most cited papers on IoT defense and it considers
More informationHARDWARE AND SOFTWARE CO-SIMULATION PLATFORM FOR CONVOLUTION OR CORRELATION BASED IMAGE PROCESSING ALGORITHMS SAYED OMID AYAT
HARDWARE AND SOFTWARE CO-SIMULATION PLATFORM FOR CONVOLUTION OR CORRELATION BASED IMAGE PROCESSING ALGORITHMS SAYED OMID AYAT UNIVERSITI TEKNOLOGI MALAYSIA HARDWARE AND SOFTWARE CO-SIMULATION PLATFORM
More informationSUPERVISED MACHINE LEARNING APPROACH FOR DETECTION OF MALICIOUS EXECUTABLES YAHYE ABUKAR AHMED
i SUPERVISED MACHINE LEARNING APPROACH FOR DETECTION OF MALICIOUS EXECUTABLES YAHYE ABUKAR AHMED A project submitted in partial fulfillment of the requirements for the award of the degree of Master of
More informationA NEW STEGANOGRAPHY TECHNIQUE USING MAGIC SQUARE MATRIX AND AFFINE CIPHER WALEED S. HASAN AL-HASAN UNIVERSITI TEKNOLOGI MALAYSIA
1 A NEW STEGANOGRAPHY TECHNIQUE USING MAGIC SQUARE MATRIX AND AFFINE CIPHER WALEED S. HASAN AL-HASAN UNIVERSITI TEKNOLOGI MALAYSIA 4 A NEW STEGANOGRAPHY TECHNIQUE USING MAGIC SQUARE MATRIX AND AFFINE CIPHER
More informationADAPTIVE ONLINE FAULT DETECTION ON NETWORK-ON-CHIP BASED ON PACKET LOGGING MECHANISM LOO LING KIM UNIVERSITI TEKNOLOGI MALAYSIA
ADAPTIVE ONLINE FAULT DETECTION ON NETWORK-ON-CHIP BASED ON PACKET LOGGING MECHANISM LOO LING KIM UNIVERSITI TEKNOLOGI MALAYSIA ADAPTIVE ONLINE FAULT DETECTION ON NETWORK-ON-CHIP BASED ON PACKET LOGGING
More informationSession Based Ciphertext Policy Attribute Based Encryption Method for Access Control in Cloud Storage
IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 04, Issue 09 (September. 2014), V3 PP 21-25 www.iosrjen.org Session Based Ciphertext Policy Attribute Based Encryption
More informationPERFOMANCE ANALYSIS OF SEAMLESS VERTICAL HANDOVER IN 4G NETWOKS MOHAMED ABDINUR SAHAL
PERFOMANCE ANALYSIS OF SEAMLESS VERTICAL HANDOVER IN 4G NETWOKS MOHAMED ABDINUR SAHAL A project report submitted in partial fulfillment of the requirements for the award of the degree of Master of Engineering
More informationLecture 6: Overview of Public-Key Cryptography and RSA
1 Lecture 6: Overview of Public-Key Cryptography and RSA Yuan Xue In this lecture, we give an overview to the public-key cryptography, which is also referred to as asymmetric cryptography. We will first
More informationSecure Data Storage and Data Retrieval in Cloud Storage using Cipher Policy Attribute based Encryption
Indian Journal of Science and Technology, Vol 8(S9), 318 325, May 2015 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 DOI: 10.17485/ijst/2015/v8iS9/65600 Secure Data Storage and Data Retrieval in Cloud
More informationIMPLEMENTATION AND PERFORMANCE ANALYSIS OF IDENTITY- BASED AUTHENTICATION IN WIRELESS SENSOR NETWORKS MIR ALI REZAZADEH BAEE
IMPLEMENTATION AND PERFORMANCE ANALYSIS OF IDENTITY- BASED AUTHENTICATION IN WIRELESS SENSOR NETWORKS MIR ALI REZAZADEH BAEE A thesis submitted in fulfilment of the requirements for the award of the degree
More informationIMPLEMENTATION OF UNMANNED AERIAL VEHICLE MOVING OBJECT DETECTION ALGORITHM ON INTEL ATOM EMBEDDED SYSTEM
IMPLEMENTATION OF UNMANNED AERIAL VEHICLE MOVING OBJECT DETECTION ALGORITHM ON INTEL ATOM EMBEDDED SYSTEM CHEONG WEI WEI UNIVERSITI TEKNOLOGI MALAYSIA IMPLEMENTATION OF UNMANNED AERIAL VEHICLE MOVING OBJECT
More informationSEMANTICS ORIENTED APPROACH FOR IMAGE RETRIEVAL IN LOW COMPLEX SCENES WANG HUI HUI
SEMANTICS ORIENTED APPROACH FOR IMAGE RETRIEVAL IN LOW COMPLEX SCENES WANG HUI HUI A thesis submitted in fulfilment of the requirements for the award of the degree of Doctor of Philosophy (Computer Science)
More information06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security
1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security Dr. L. Christofi 1 0. Overview As the knowledge of computer networking and protocols has become more widespread, so the threat of
More informationIMPROVED IMAGE COMPRESSION SCHEME USING HYBRID OF DISCRETE FOURIER, WAVELETS AND COSINE TRANSFORMATION MOH DALI MOUSTAFA ALSAYYH
4 IMPROVED IMAGE COMPRESSION SCHEME USING HYBRID OF DISCRETE FOURIER, WAVELETS AND COSINE TRANSFORMATION MOH DALI MOUSTAFA ALSAYYH A thesis submitted in fulfilment of the requirements for the award of
More informationThis item is protected by original copyright
A-PDF Merger DEMO : Purchase from www.a-pdf.com to remove the watermark MEDICAL FACILITIES DATABASE MANAGEMENT SYSTEM By MUHAMMAD FAIZAL BIN OSMAN Report submitted in partial fulfillment of the requirements
More informationSecure Role-Based Access Control on Encrypted Data in Cloud Storage using ARM
Secure Role-Based Access Control on Encrypted Data in Cloud Storage using ARM Rohini Vidhate, V. D. Shinde Abstract With the rapid developments occurring in cloud computing and services, there has been
More informationA Procedural Based Encryption Technique for Accessing Data on Cloud
A Procedural Based Encryption Technique for Accessing Data on Cloud Avinash N 1, Divya C 2 P.G. Student, Department of Computer Science and Engineering, SVIT, Bangalore, Karnataka, India 1 Assistant Professor,
More informationAttribute Based Encryption with Privacy Protection in Clouds
Attribute Based Encryption with Privacy Protection in Clouds Geetanjali. M 1, Saravanan. N 2 PG Student, Department of Information Technology, K.S.R College of Engineering, Tiruchengode, Tamilnadu, India
More informationEfficient Auditable Access Control Systems for Public Shared Cloud Storage
Efficient Auditable Access Control Systems for Public Shared Cloud Storage Vidya Patil 1, Prof. Varsha R. Dange 2 Student, Department of Computer Science Dhole Patil College of Engineering, Pune, Maharashtra,
More informationFINGERPRINT DATABASE NUR AMIRA BINTI ARIFFIN THESIS SUBMITTED IN FULFILMENT OF THE DEGREE OF COMPUTER SCIENCE (COMPUTER SYSTEM AND NETWORKING)
FINGERPRINT DATABASE NUR AMIRA BINTI ARIFFIN THESIS SUBMITTED IN FULFILMENT OF THE DEGREE OF COMPUTER SCIENCE (COMPUTER SYSTEM AND NETWORKING) FACULTY OF COMPUTER SYSTEM AND SOFTWARE ENGINEERING 2015 i
More informationA Survey on Secure Sharing In Cloud Computing
A Survey on Secure Sharing In Cloud Computing Aakanksha maliye, Sarita Patil Department of Computer Engineering, G.H.Raisoni College of Engineering & Management, Wagholi, India ABSTRACT: Cloud computing
More informationBLOCK-BASED NEURAL NETWORK MAPPING ON GRAPHICS PROCESSOR UNIT ONG CHIN TONG UNIVERSITI TEKNOLOGI MALAYSIA
BLOCK-BASED NEURAL NETWORK MAPPING ON GRAPHICS PROCESSOR UNIT ONG CHIN TONG UNIVERSITI TEKNOLOGI MALAYSIA BLOCK-BASED NEURAL NETWORK MAPPING ON GRAPHICS PROCESSOR UNIT ONG CHIN TONG A project report submitted
More informationINSTRUCTION: This section consists of TWO (2) structured questions. Answer ALL questions.
SECTION B : 55 MARKS BAHAGIAN B : 55 MARKAH INSTRUCTION: This section consists of TWO (2) structured questions. Answer ALL questions. ARAHAN: Bahagian ini mengandungi DUA (2) soalan berstruktur. Jawab
More informationIntroduction to Cryptography and Security Mechanisms. Abdul Hameed
Introduction to Cryptography and Security Mechanisms Abdul Hameed http://informationtechnology.pk Before we start 3 Quiz 1 From a security perspective, rather than an efficiency perspective, which of the
More informationPublic Key Encryption. Modified by: Dr. Ramzi Saifan
Public Key Encryption Modified by: Dr. Ramzi Saifan Prime Numbers Prime numbers only have divisors of 1 and itself They cannot be written as a product of other numbers Prime numbers are central to number
More informationCryptography and Network Security. Sixth Edition by William Stallings
Cryptography and Network Security Sixth Edition by William Stallings Chapter 9 Public Key Cryptography and RSA Misconceptions Concerning Public-Key Encryption Public-key encryption is more secure from
More informationPublic Key Cryptography
graphy CSS322: Security and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 29 December 2011 CSS322Y11S2L07, Steve/Courses/2011/S2/CSS322/Lectures/rsa.tex,
More informationDECENTRALIZED ATTRIBUTE-BASED ENCRYPTION AND DATA SHARING SCHEME IN CLOUD STORAGE
DECENTRALIZED ATTRIBUTE-BASED ENCRYPTION AND DATA SHARING SCHEME IN CLOUD STORAGE ABSTRACT We propose a Multi-Authority Attribute-Based Encryption (ABE) system. In our system, any party can become an authority
More informationAUTOMATIC APPLICATION PROGRAMMING INTERFACE FOR MULTI HOP WIRELESS FIDELITY WIRELESS SENSOR NETWORK
AUTOMATIC APPLICATION PROGRAMMING INTERFACE FOR MULTI HOP WIRELESS FIDELITY WIRELESS SENSOR NETWORK MOHD HUSAINI BIN MOHD FAUZI UNIVERSITI TEKNOLOGI MALAYSIA AUTOMATIC APPLICATION PROGRAMMING INTERFACE
More informationTHE COMPARISON OF IMAGE MANIFOLD METHOD AND VOLUME ESTIMATION METHOD IN CONSTRUCTING 3D BRAIN TUMOR IMAGE
THE COMPARISON OF IMAGE MANIFOLD METHOD AND VOLUME ESTIMATION METHOD IN CONSTRUCTING 3D BRAIN TUMOR IMAGE SHAMSHIYATULBAQIYAH BINTI ABDUL WAHAB UNIVERSITI TEKNOLOGI MALAYSIA THE COMPARISON OF IMAGE MANIFOLD
More informationDr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010
CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Public Key Cryptography Modular Arithmetic RSA
More informationAttribute-based encryption with encryption and decryption outsourcing
Edith Cowan University Research Online Australian Information Security Management Conference Conferences, Symposia and Campus Events 2014 Attribute-based encryption with encryption and decryption outsourcing
More informationChannel Coding and Cryptography Part II: Introduction to Cryptography
Channel Coding and Cryptography Part II: Introduction to Cryptography Prof. Dr.-Ing. habil. Andreas Ahrens Communications Signal Processing Group, University of Technology, Business and Design Email: andreas.ahrens@hs-wismar.de
More informationINTEGRATION OF CUBIC MOTION AND VEHICLE DYNAMIC FOR YAW TRAJECTORY MOHD FIRDAUS BIN MAT GHANI
INTEGRATION OF CUBIC MOTION AND VEHICLE DYNAMIC FOR YAW TRAJECTORY MOHD FIRDAUS BIN MAT GHANI A thesis submitted in fulfilment of the requirements for the award of the degree of Master ofengineering (Mechanical)
More informationMODELLING AND REASONING OF LARGE SCALE FUZZY PETRI NET USING INFERENCE PATH AND BIDIRECTIONAL METHODS ZHOU KAIQING
MODELLING AND REASONING OF LARGE SCALE FUZZY PETRI NET USING INFERENCE PATH AND BIDIRECTIONAL METHODS ZHOU KAIQING A thesis submitted in fulfilment of the requirements for the award of the degree of Doctor
More informationA LEVY FLIGHT PARTICLE SWARM OPTIMIZER FOR MACHINING PERFORMANCES OPTIMIZATION ANIS FARHAN BINTI KAMARUZAMAN UNIVERSITI TEKNOLOGI MALAYSIA
A LEVY FLIGHT PARTICLE SWARM OPTIMIZER FOR MACHINING PERFORMANCES OPTIMIZATION ANIS FARHAN BINTI KAMARUZAMAN UNIVERSITI TEKNOLOGI MALAYSIA A LEVY FLIGHT PARTICLE SWARM OPTIMIZER FOR MACHINING PERFORMANCES
More informationENHANCING TIME-STAMPING TECHNIQUE BY IMPLEMENTING MEDIA ACCESS CONTROL ADDRESS PACU PUTRA SUARLI
ENHANCING TIME-STAMPING TECHNIQUE BY IMPLEMENTING MEDIA ACCESS CONTROL ADDRESS PACU PUTRA SUARLI A project report submitted in partial fulfillment of the requirements for the award of the degree of Master
More informationSTUDY OF FLOATING BODIES IN WAVE BY USING SMOOTHED PARTICLE HYDRODYNAMICS (SPH) HA CHEUN YUEN UNIVERSITI TEKNOLOGI MALAYSIA
STUDY OF FLOATING BODIES IN WAVE BY USING SMOOTHED PARTICLE HYDRODYNAMICS (SPH) HA CHEUN YUEN UNIVERSITI TEKNOLOGI MALAYSIA STUDY OF FLOATING BODIES IN WAVE BY USING SMOOTHED PARTICLE HYDRODYNAMICS (SPH)
More informationA SEED GENERATION TECHNIQUE BASED ON ELLIPTIC CURVE FOR PROVIDING SYNCHRONIZATION IN SECUERED IMMERSIVE TELECONFERENCING VAHIDREZA KHOUBIARI
A SEED GENERATION TECHNIQUE BASED ON ELLIPTIC CURVE FOR PROVIDING SYNCHRONIZATION IN SECUERED IMMERSIVE TELECONFERENCING VAHIDREZA KHOUBIARI A project report submitted in partial fulfillment of the requirements
More informationMAC PROTOCOL FOR WIRELESS COGNITIVE NETWORK FARAH NAJWA BINTI MOKHTAR
MAC PROTOCOL FOR WIRELESS COGNITIVE NETWORK FARAH NAJWA BINTI MOKHTAR This report is submitted in partial fulfillment of the requirements for the award of Bachelor of Electronic Engineering (Computer Engineering)
More informationVHDL for RSA Public Key System
VHDL for RSA Public Key System Rui He, Jie Gu, Liang Zhang, Cheng Li Engineering and Applied Science Memorial University of Newfoundland St. John s, NL, Canada, A1B3X5 E-mail: {ruihe, jiegu, lzhang, licheng}@engr.mun.ca
More informationMICRO-SEQUENCER BASED CONTROL UNIT DESIGN FOR A CENTRAL PROCESSING UNIT TAN CHANG HAI
MICRO-SEQUENCER BASED CONTROL UNIT DESIGN FOR A CENTRAL PROCESSING UNIT TAN CHANG HAI A project report submitted in partial fulfillment of the requirement for the award of the degree of Master of Engineering
More informationNetwork Security Issues and Cryptography
Network Security Issues and Cryptography PriyaTrivedi 1, Sanya Harneja 2 1 Information Technology, Maharishi Dayanand University Farrukhnagar, Gurgaon, Haryana, India 2 Information Technology, Maharishi
More informationCryptographic Concepts
Outline Identify the different types of cryptography Learn about current cryptographic methods Chapter #23: Cryptography Understand how cryptography is applied for security Given a scenario, utilize general
More informationSecure Data Sharing using Attribute Based Encryption with Revocation in Cloud Computing
ISSN No: 2454-9614 Secure Data Sharing using Attribute Based Encryption with Revocation in Cloud Computing *Corresponding Author: D. Vaduganathan E-mail:vaduganathan.kce@gmail.com D. Vaduganathan a a)
More informationHARDWARE/SOFTWARE SYSTEM-ON-CHIP CO-VERIFICATION PLATFORM BASED ON LOGIC-BASED ENVIRONMENT FOR APPLICATION PROGRAMMING INTERFACING TEO HONG YAP
HARDWARE/SOFTWARE SYSTEM-ON-CHIP CO-VERIFICATION PLATFORM BASED ON LOGIC-BASED ENVIRONMENT FOR APPLICATION PROGRAMMING INTERFACING TEO HONG YAP A project report submitted in partial fulfilment of the requirements
More informationPublic Key Cryptography and RSA
Public Key Cryptography and RSA Major topics Principles of public key cryptosystems The RSA algorithm The Security of RSA Motivations A public key system is asymmetric, there does not have to be an exchange
More informationPublic Key Algorithms
Public Key Algorithms 1 Public Key Algorithms It is necessary to know some number theory to really understand how and why public key algorithms work Most of the public key algorithms are based on modular
More informationThree Levels of Access Control to Personal Health Records in a Healthcare Cloud
Three Levels of Access Control to Personal Health Records in a Healthcare Cloud Gabriel Sanchez Bautista and Ning Zhang School of Computer Science The University of Manchester Manchester M13 9PL, United
More informationENHANCING SRAM PERFORMANCE OF COMMON GATE FINFET BY USING CONTROLLABLE INDEPENDENT DOUBLE GATES CHONG CHUNG KEONG UNIVERSITI TEKNOLOGI MALAYSIA
ENHANCING SRAM PERFORMANCE OF COMMON GATE FINFET BY USING CONTROLLABLE INDEPENDENT DOUBLE GATES CHONG CHUNG KEONG UNIVERSITI TEKNOLOGI MALAYSIA ENHANCING SRAM PERFORMANCE OF COMMON GATE FINFET BY USING
More informationIntroduction to Cryptography and Security Mechanisms: Unit 5. Public-Key Encryption
Introduction to Cryptography and Security Mechanisms: Unit 5 Public-Key Encryption Learning Outcomes Explain the basic principles behind public-key cryptography Recognise the fundamental problems that
More informationCOLOUR IMAGE WATERMARKING USING DISCRETE COSINE TRANSFORM AND TWO-LEVEL SINGULAR VALUE DECOMPOSITION BOKAN OMAR ALI
COLOUR IMAGE WATERMARKING USING DISCRETE COSINE TRANSFORM AND TWO-LEVEL SINGULAR VALUE DECOMPOSITION BOKAN OMAR ALI A dissertation submitted in partial fulfillment of the requirements for the award of
More informationUniversiti Teknologi MARA. An Analysis on The Uses of Data Modeling in Database Application Development
CAJ (yo&ao 3 ĕr^?^ Universiti Teknologi MARA An Analysis on The Uses of Data Modeling in Database Application Development Hafiza Binti Ahmad Thesis submitted in fulfillment of the requirements for Bachelor
More informationCryptography (DES+RSA) by Amit Konar Dept. of Math and CS, UMSL
Cryptography (DES+RSA) by Amit Konar Dept. of Math and CS, UMSL Transpositional Ciphers-A Review Decryption 1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8 Encryption 1 2 3 4 5 6 7 8 A G O O D F R I E N D I S A T R E
More informationInternational Journal of Computer Science Trends and Technology (IJCST) Volume 5 Issue 4, Jul Aug 2017
RESEARCH ARTICLE OPEN ACCESS Optimizing Fully Homomorphic Encryption Algorithm using Greedy Approach in Cloud Computing Kirandeep Kaur [1], Jyotsna Sengupta [2] Department of Computer Science Punjabi University,
More informationEFFICIENT DATA SHARING WITH ATTRIBUTE REVOCATION FOR CLOUD STORAGE
EFFICIENT DATA SHARING WITH ATTRIBUTE REVOCATION FOR CLOUD STORAGE Chakali Sasirekha 1, K. Govardhan Reddy 2 1 M.Tech student, CSE, Kottam college of Engineering, Chinnatekuru(V),Kurnool,Andhra Pradesh,
More informationThe Application of Elliptic Curves Cryptography in Embedded Systems
The Application of Elliptic Curves Cryptography in Embedded Systems Wang Qingxian School of Computer Science and Engineering University of Electronic Science and Technology China Introduction to Cryptography
More informationCAMERA CALIBRATION FOR UNMANNED AERIAL VEHICLE MAPPING AHMAD RAZALI BIN YUSOFF
CAMERA CALIBRATION FOR UNMANNED AERIAL VEHICLE MAPPING AHMAD RAZALI BIN YUSOFF A thesis submitted in fulfilment of the requirement for the award of the degree of Master of Science (Geomatic Engineering)
More informationLECTURE NOTES ON PUBLIC- KEY CRYPTOGRAPHY. (One-Way Functions and ElGamal System)
Department of Software The University of Babylon LECTURE NOTES ON PUBLIC- KEY CRYPTOGRAPHY (One-Way Functions and ElGamal System) By College of Information Technology, University of Babylon, Iraq Samaher@itnet.uobabylon.edu.iq
More informationENSURING PRIVACY OF E-MEDICAL HEALTH RECORDS USING TRIPLE- DES ALGORITHM
ENSURING PRIVACY OF E-MEDICAL HEALTH RECORDS USING TRIPLE- DES ALGORITHM Ms. S. P. Vidhya Priya 1, Dharani.N.R 2, Gokilavani.M 3, Jeevitha.R 4 1,2,3,4 Department of Information Technology, Kathir College
More informationKey Exchange. Secure Software Systems
1 Key Exchange 2 Challenge Exchanging Keys &!"#h%&'() & & 1 2 6(6 1) 2 15! $ The more parties in communication, the more keys that need to be securely exchanged " # Do we have to use out-of-band methods?
More informationCryptography III. Public-Key Cryptography Digital Signatures. 2/1/18 Cryptography III
Cryptography III Public-Key Cryptography Digital Signatures 2/1/18 Cryptography III 1 Public Key Cryptography 2/1/18 Cryptography III 2 Key pair Public key: shared with everyone Secret key: kept secret,
More informationONTOLOGY-BASED SEMANTIC HETEROGENEOUS DATA INTEGRATION FRAMEWORK FOR LEARNING ENVIRONMENT
ONTOLOGY-BASED SEMANTIC HETEROGENEOUS DATA INTEGRATION FRAMEWORK FOR LEARNING ENVIRONMENT ARDA YUNIANTA UNIVERSITI TEKNOLOGI MALAYSIA iii This thesis is dedicated to My Wife, who always give me full of
More informationEnhancing Reliability and Scalability in Dynamic Group System Using Three Level Security Mechanisms
Enhancing Reliability and Scalability in Dynamic Group System Using Three Level Security Mechanisms A.Sarika*1, Smt.J.Raghaveni*2 M.Tech Student, Dept of CSE, S.R.K.R Engineering college, Bhimavaram, AP,
More informationEnhanced Asymmetric Public Key Cryptography based on Diffie-Hellman and RSA Algorithm
Enhanced Asymmetric Public Key Cryptography based on Diffie-Hellman and RSA Algorithm Princess Arleen S Zamora Gaduate Programs, Technological Institute of the Philippines Quezon City 1901, Philippines
More informationINFORM DEPARTURE AND ARRIVING OF BUSSES USING BLUETOOTH MOHD SUHKRI BIN YASRI
INFORM DEPARTURE AND ARRIVING OF BUSSES USING BLUETOOTH By MOHD SUHKRI BIN YASRI Report submitted in partial fulfilment of the requirements for the degree of Bachelor of Engineering MARCH 2007 ACKNOWLEDGMENT
More informationSecurity Weaknesses of an Anonymous Attribute Based Encryption appeared in ASIACCS 13
Security Weaknesses of an Anonymous Attribute Based Encryption appeared in ASIACCS 13 Payal Chaudhari, Manik Lal Das, Anish Mathuria DA-IICT, Gandhinagar, India {payal chaudhari, maniklal das, anish mathuria}@daiict.ac.in
More informationAMBA AXI BUS TO NETWORK-ON-CHIP BRIDGE NG KENG YOKE UNIVERSITI TEKNOLOGI MALAYSIA
AMBA AXI BUS TO NETWORK-ON-CHIP BRIDGE NG KENG YOKE UNIVERSITI TEKNOLOGI MALAYSIA AMBA AXI BUS TO NETWORK-ON-CHIP BRIDGE NG KENG YOKE A project report submitted in partial fulfilment of the requirements
More informationPublic-key Cryptography: Theory and Practice
Public-key Cryptography Theory and Practice Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Chapter 1: Overview What is Cryptography? Cryptography is the study of
More informationSignature :.~... Name of supervisor :.. ~NA.lf... l.?.~mk.. :... 4./qD F. Universiti Teknikal Malaysia Melaka
"I hereby declare that I have read this thesis and in my opinion this thesis is sufficient in term of scope and quality for the reward of the Bachelor' s degree of Mechanical Engineering (Structure and
More informationHERMAN. A thesis submitted in fulfilment of the requirements for the award of the degree of Doctor of Philosophy (Computer Science)
i SERVICE QUALITY OPTIMISATION SCHEME OF MOBILE VIDEO STREAM SERVICE HERMAN A thesis submitted in fulfilment of the requirements for the award of the degree of Doctor of Philosophy (Computer Science) Faculty
More information1.264 Lecture 28. Cryptography: Asymmetric keys
1.264 Lecture 28 Cryptography: Asymmetric keys Next class: Anderson chapters 20. Exercise due before class (Reading doesn t cover same topics as lecture) 1 Asymmetric or public key encryption Receiver
More informationCryptography & Key Exchange Protocols. Faculty of Computer Science & Engineering HCMC University of Technology
Cryptography & Key Exchange Protocols Faculty of Computer Science & Engineering HCMC University of Technology Outline 1 Cryptography-related concepts 2 3 4 5 6 7 Key channel for symmetric cryptosystems
More informationCloudSky: A Controllable Data Self-Destruction System for Untrusted Cloud Storage Networks
CloudSky: A Controllable Data Self-Destruction System for Untrusted Cloud Storage Networks The material in these slides mainly comes from the paper CloudSky: A Controllable Data Self-Destruction System
More informationIMPROVING DATA SECURITY USING ATTRIBUTE BASED BROADCAST ENCRYPTION IN CLOUD COMPUTING
IMPROVING DATA SECURITY USING ATTRIBUTE BASED BROADCAST ENCRYPTION IN CLOUD COMPUTING 1 K.Kamalakannan, 2 Mrs.Hemlathadhevi Abstract -- Personal health record (PHR) is an patient-centric model of health
More informationCloud Computing: Security Issues & Solution
International Journal of Computational Intelligence Research ISSN 0973-1873 Volume 13, Number 6 (2017), pp. 1419-1429 Research India Publications http://www.ripublication.com Cloud Computing: Security
More informationHIGH LEVEL SECURITY IMPLEMENTATION IN DATA SHARING ON SOCIAL WEBSITES
HIGH LEVEL SECURITY IMPLEMENTATION IN DATA SHARING ON SOCIAL WEBSITES P.Senthil Kumar 1 Associate professor, PSNA college of engineering and technology,dindigul,tamilnadu,india Abstract: With the recent
More informationIMPLEMENTATION OF KERBEROS BASED AUTHENTICATED KEY EXCHANGE PROTOCOL FOR PARALLEL NETWORK FILE SYSTEMS IN CLOUD
[1] [1] ISSN: 0976-3104 SPECIAL ISSUE: Emerging Technologies in Networking and Security (ETNS) Chandravathi et al. ARTICLE OPEN ACCESS IMPLEMENTATION OF KERBEROS BASED AUTHENTICATED KEY EXCHANGE PROTOCOL
More informationA LTERATURE SURVEY ON REVOCABLE MULTIAUTHORITY CIPHER TEXT-POLICY ATTRIBUTE-BASED ENCRYPTION (CP-ABE) SCHEME FOR CLOUD STORAGE
A LTERATURE SURVEY ON REVOCABLE MULTIAUTHORITY CIPHER TEXT-POLICY ATTRIBUTE-BASED ENCRYPTION (CP-ABE) SCHEME FOR CLOUD STORAGE Vinoth Kumar P, Dr.P.D.R. Vijaya Kumar 1 PG Student, INFO Institute of Engineering,
More informationOutline. Data Encryption Standard. Symmetric-Key Algorithms. Lecture 4
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 4 Department of Electrical and Computer Engineering Cleveland State University wenbing@ieee.org Outline Review
More informationRSA (material drawn from Avi Kak Lecture 12, Lecture Notes on "Computer and Network Security" Used in asymmetric crypto.
RSA (material drawn from Avi Kak (kak@purdue.edu) Lecture 12, Lecture Notes on "Computer and Network Security" Used in asymmetric crypto. protocols The RSA algorithm is based on the following property
More informationSecure Data Sharing in Cloud Computing: Challenges and Research Directions
Cyber Summer School Melbourne, 12-13 Feb 2018 Secure Data Sharing in Cloud Computing: Challenges and Research Directions Willy Susilo Institute of Cybersecurity and Cryptology School of Computing and Information
More informationRGB COLOR IMAGE WATERMARKING USING DISCRETE WAVELET TRANSFORM DWT TECHNIQUE AND 4-BITS PLAN BY HISTOGRAM STRETCHING KARRAR ABDUL AMEER KADHIM
RGB COLOR IMAGE WATERMARKING USING DISCRETE WAVELET TRANSFORM DWT TECHNIQUE AND 4-BITS PLAN BY HISTOGRAM STRETCHING KARRAR ABDUL AMEER KADHIM A dissertation submitted in partial fulfilment of the requirements
More informationA nice outline of the RSA algorithm and implementation can be found at:
Cryptography Lab: RSA Encryption and Decryption Lab Objectives: After this lab, the students should be able to Explain the simple concepts of encryption and decryption to protect information in transmission.
More informationSecurity+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 11 Basic Cryptography Objectives Define cryptography Describe hashing List the basic symmetric cryptographic algorithms 2 Objectives
More informationBOARDING SCHOOL OUTING MANAGEMENT SYSTEM SITI NAZIRAH BINTI ABD HALIM
BOARDING SCHOOL OUTING MANAGEMENT SYSTEM SITI NAZIRAH BINTI ABD HALIM BACHELOR OF COMPUTER SCIENCE (SOFTWARE DEVELOPMENT) UNIVERSITI SULTAN ZAINAL ABIDIN 2018 DECLARATION I hereby declare that this report
More informationDistributed Systems. 26. Cryptographic Systems: An Introduction. Paul Krzyzanowski. Rutgers University. Fall 2015
Distributed Systems 26. Cryptographic Systems: An Introduction Paul Krzyzanowski Rutgers University Fall 2015 1 Cryptography Security Cryptography may be a component of a secure system Adding cryptography
More informationApplied Cryptography and Computer Security CSE 664 Spring 2018
Applied Cryptography and Computer Security Lecture 13: Public-Key Cryptography and RSA Department of Computer Science and Engineering University at Buffalo 1 Public-Key Cryptography What we already know
More informationA Modified Approach for Kerberos Authentication Protocol with Secret Image by using Visual Cryptography
A Modified Approach for Kerberos Authentication Protocol with Secret Image by using Visual Cryptography Ashok Kumar J 1, and Gopinath Ganapathy 2 1,2 School of Computer Science, Engineering and Applications
More informationSYSTEMATIC SECURE DESIGN GUIDELINE TO IMPROVE INTEGRITY AND AVAILABILITY OF SYSTEM SECURITY ASHVINI DEVI A/P KRISHNAN
iii SYSTEMATIC SECURE DESIGN GUIDELINE TO IMPROVE INTEGRITY AND AVAILABILITY OF SYSTEM SECURITY ASHVINI DEVI A/P KRISHNAN A dissertation submitted in partial fulfillment of the requirements for the award
More informationImproved Delegation Of Computation Using Somewhat Homomorphic Encryption To Reduce Storage Space
Improved Delegation Of Computation Using Somewhat Homomorphic Encryption To Reduce Storage Space Dhivya.S (PG Scholar) M.E Computer Science and Engineering Institute of Road and Transport Technology Erode,
More information