Implementation And Performance Analysis of Proposed Security Framework For Uidai
||International Journal of Computer Trends and Technology (IJCTT)||
|© 2019 by IJCTT Journal|
|Year of Publication : 2019|
|Authors : Dr. Arpana Chaturvedi|
|DOI : 10.14445/22312803/IJCTT-V67I10P115|
MLA Style:Dr. Arpana Chaturvedi"Implementation And Performance Analysis of Proposed Security Framework For Uidai" International Journal of Computer Trends and Technology 67.10 (2019):85-91.
APA Style Dr. Arpana Chaturvedi.Implementation And Performance Analysis of Proposed Security Framework For Uidai, International Journal of Computer Trends and Technology, 67(10),85-91.
The development of new technologies like Hadoop, Map Reduce, used to store, manage, analyze vast amount of data, when associated with WSN (Wireless Sensor Network), the risk factor for information security increases. When it is applied in various applications of government like Aadhaar, DigiLocker etc., chances of hidden security issues increased. In this paper AES-XTS encryption mechanism and digital signature technology is used with AODV (Ad hoc On-Demand Distance Vector) routing protocol to get rid of various issues like DoS (Denial of Service), eavesdropping, imitation, coaxing etc. The theoretical analysis is shown using NS2 simulator and implementation assures to provide better data security, reliability, transmission and energy efficiency. This implementation shows that SAODV(Secure-AODV) routing protocol when used in routing layer in these applications and system, it increases its own self defensive ability to fight against various challenging hidden security issues.
 Kadre V., Chaturvedi S., “AES – MR: A Novel Encryption Scheme for securing Data in HDFS Environment using Map Reduce”, www.ijcaonline.org/ research/ volume129/ number12/kadre-2015-ijca-906994.pdf
 Mehak, Gagan, “Improving Data Storage Security in Cloud using Hadoop “, ISSN: 2248-9622, Vol. 4 , Issue 9(Version 3), September 2014, pp.133-138,http://www.ijera.com/papers/Vol4_issue9/Version%203/U4903133138.pdf
 Weeks B., Bean M., Rozylowicz T., Ficke C.,” Hardware Performance Simulations of Round 2 Advanced Encryption Standard Algorithms, National Security”, https:// csrc.nist.gov/CSRC/ media/ Projects/ Cryptographic-Standards-and-Guidelines/documents/aes-development/NSA-AESfinalreport.pdf doi=10.1.1.35.6941
 Clunie D., Public Comments on the XTS-AES Mode,” https://csrc.nist.gov/csrc/media/projects/.../comments/xts/collected_xts_comments.pdf
 Public Comments-Modes Development - Block Cipher Techniques, "https://csrc.nist.gov/Projects/Block-Cipher-Techniques/BCM/Public-Comments-Modes- Development“,Comments submitted to Encryption Modes @nist.gov.
 Desai Spark Y., Gao J., Sang-Yoon Chang, Chungsik Song, “Improving Encryption Performance Using Map reduce”, Published in: High Performance Computing and Communications (HPCC), IEEE 17th International Conference, ISBN: 978-1-4799-8937-9, http:// ieeexplore. ieee.org / document/7336355/
 G. Sujitha, M. Varadharajan, B. Raj Kumar and S. Mercy Shalinie ,”Provisioning Mapreduce for Improving Security of Cloud Data “,http:// scialert.net/ qredirect.php? doi = jai.2013.220.228& linkid=pdf, International Journal of Computer Science and Applications, ? Technomathematics Research Foundation Vol. 13, No. 2, pp. 89 – 105, 2016.
 Demir L., Thiery M., Roca V., Jean-Louis Roch, Jean-Michel Tenkes, “Improving dm-crypt performance for XTS-AES mode through extended requests “, Nov 21, 2016 The 4th International Symposium on Research in Grey-Hat Hacking - aka GreHack, Nov 2016, Grenoble, France https://hal.inria.fr/hal-01399967
 Philip Derbeko, Shlomi Dolev, Ehud Gudes, Shantanu Sharma” Security and Privacy Aspects in map reduce on Clouds: A Survey”, www.https://arxiv.org/abs/1605.00677, www.iiste.org, ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 2, No.2, 2012
 Liskov M., Mine Matsu K., “Comments on XTS-AES” September 2, 2008 This is a comment in response to the request for comment on XTS-AES, as specified in IEEE Std. 1619-2007 September 2, 2008, https://csrc.nist.gov/csrc/media/ projects /block-cipher-techniques/ documents/ bcm/ comm. ents/xts/xts_comments-liskov_minematsu .pdf.
 Kirat Pal Singh, Shiwani,” An Efficient Hardware design and Implementation of Advanced Encryption Standard (AES) Algorithm “, https :// eprint.iacr.org/ 2016/ 789.pdf.
 Vaidyaa M., Dr Shrinivas Deshpandeb ,” Study of Performance Parameters on Distributed File Systems using map reduce “, www.sciencedirect.com ICISP2015), 11-12 December 2015, https://ac.els-cdn.com/S18770509 16000399/1-s2.0-S1877050916000399-main.pdf ?_tid=78 c69a4a-e233-11e7-8cfd-00000aab0f01& acdnat=15134098 15_ d18af66cf2c2e5fa578411397b06ce28
 Wei Li, Ming Chen, Mingming Li, “ Information Security Routing Protocol in the WSN”, Published in: 2009 Fifth International Conference on Information Assurance and Security, ISBN: 978-0-7695-3744-3, https://ieeexplore.ieee.org/document/5284242
 Sonkar Abhilash., Aggarwal Abhishek, “Enhancement of Security using greedy approach and encryption in Mobile Ad Hoc Network”, Published in: 2017 International Conference on Trends in Electronics and Informatics (ICEI), https://ieeexplore.ieee.org/document/8300887
AODV, SAODV, WSN, AES-XTS, UIDAI, DoS.