Implementation And Performance Analysis of Proposed Security Framework For Uidai

International Journal of Computer Trends and Technology (IJCTT)          
© 2019 by IJCTT Journal
Volume-67 Issue-10
Year of Publication : 2019
Authors : Dr. Arpana Chaturvedi
DOI :  10.14445/22312803/IJCTT-V67I10P115


MLA Style:Dr. Arpana Chaturvedi"Implementation And Performance Analysis of Proposed Security Framework For Uidai" International Journal of Computer Trends and Technology 67.10 (2019):85-91.

APA Style Dr. Arpana Chaturvedi.Implementation And Performance Analysis of Proposed Security Framework For Uidai,  International Journal of Computer Trends and Technology, 67(10),85-91.

The development of new technologies like Hadoop, Map Reduce, used to store, manage, analyze vast amount of data, when associated with WSN (Wireless Sensor Network), the risk factor for information security increases. When it is applied in various applications of government like Aadhaar, DigiLocker etc., chances of hidden security issues increased. In this paper AES-XTS encryption mechanism and digital signature technology is used with AODV (Ad hoc On-Demand Distance Vector) routing protocol to get rid of various issues like DoS (Denial of Service), eavesdropping, imitation, coaxing etc. The theoretical analysis is shown using NS2 simulator and implementation assures to provide better data security, reliability, transmission and energy efficiency. This implementation shows that SAODV(Secure-AODV) routing protocol when used in routing layer in these applications and system, it increases its own self defensive ability to fight against various challenging hidden security issues.

[1] Kadre V., Chaturvedi S., “AES – MR: A Novel Encryption Scheme for securing Data in HDFS Environment using Map Reduce”, research/ volume129/ number12/kadre-2015-ijca-906994.pdf
[2] Mehak, Gagan, “Improving Data Storage Security in Cloud using Hadoop “, ISSN: 2248-9622, Vol. 4 , Issue 9(Version 3), September 2014, pp.133-138,
[3] Weeks B., Bean M., Rozylowicz T., Ficke C.,” Hardware Performance Simulations of Round 2 Advanced Encryption Standard Algorithms, National Security”, https:// media/ Projects/ Cryptographic-Standards-and-Guidelines/documents/aes-development/NSA-AESfinalreport.pdf doi=
[4] Clunie D., Public Comments on the XTS-AES Mode,”
[5] Public Comments-Modes Development - Block Cipher Techniques, " Development“,Comments submitted to Encryption Modes
[6] Dr. Hawthorne, NY, Computing Arbitrary Functions of Encrypted Data Craig Gentry IBM T.J. Watson Research Center 19 Skyline,This email address is being protected from spambots. You need JavaScript enabled to view it.
[7] Desai Spark Y., Gao J., Sang-Yoon Chang, Chungsik Song, “Improving Encryption Performance Using Map reduce”, Published in: High Performance Computing and Communications (HPCC), IEEE 17th International Conference, ISBN: 978-1-4799-8937-9, http:// ieeexplore. / document/7336355/
[8] G. Sujitha, M. Varadharajan, B. Raj Kumar and S. Mercy Shalinie ,”Provisioning Mapreduce for Improving Security of Cloud Data “,http:// qredirect.php? doi = jai.2013.220.228& linkid=pdf, International Journal of Computer Science and Applications, ? Technomathematics Research Foundation Vol. 13, No. 2, pp. 89 – 105, 2016.
[9] Alexander Uskov, Adam Byerly, Colleen Heinemann,” Advanced Encryption Standard Analysis with Multimedia Data on Intel® AES-NI Architecture”, Research Institute Bradley University, 1501 West Bradley Avenue Peoria, Illinois 61625, U.S.A. This email address is being protected from spambots. You need JavaScript enabled to view it.
[10] Demir L., Thiery M., Roca V., Jean-Louis Roch, Jean-Michel Tenkes, “Improving dm-crypt performance for XTS-AES mode through extended requests “, Nov 21, 2016 The 4th International Symposium on Research in Grey-Hat Hacking - aka GreHack, Nov 2016, Grenoble, France
[11] Philip Derbeko, Shlomi Dolev, Ehud Gudes, Shantanu Sharma” Security and Privacy Aspects in map reduce on Clouds: A Survey”, www.,, ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 2, No.2, 2012
[12] Liskov M., Mine Matsu K., “Comments on XTS-AES” September 2, 2008 This is a comment in response to the request for comment on XTS-AES, as specified in IEEE Std. 1619-2007 September 2, 2008, projects /block-cipher-techniques/ documents/ bcm/ comm. ents/xts/xts_comments-liskov_minematsu .pdf.
[13] Kirat Pal Singh, Shiwani,” An Efficient Hardware design and Implementation of Advanced Encryption Standard (AES) Algorithm “, https :// 2016/ 789.pdf.
[14] Vaidyaa M., Dr Shrinivas Deshpandeb ,” Study of Performance Parameters on Distributed File Systems using map reduce “, ICISP2015), 11-12 December 2015, 16000399/1-s2.0-S1877050916000399-main.pdf ?_tid=78 c69a4a-e233-11e7-8cfd-00000aab0f01& acdnat=15134098 15_ d18af66cf2c2e5fa578411397b06ce28
[15] Wei Li, Ming Chen, Mingming Li, “ Information Security Routing Protocol in the WSN”, Published in: 2009 Fifth International Conference on Information Assurance and Security, ISBN: 978-0-7695-3744-3,
[16] Sonkar Abhilash., Aggarwal Abhishek, “Enhancement of Security using greedy approach and encryption in Mobile Ad Hoc Network”, Published in: 2017 International Conference on Trends in Electronics and Informatics (ICEI),