Cyber Security using Cryptographic Algorithms

  IJCTT-book-cover
 
         
 
© 2024 by IJCTT Journal
Volume-72 Issue-1
Year of Publication : 2024
Authors : Shiva Kumar Sriramulugari, Venkata Ashok K Gorantla
DOI :  10.14445/22312803/IJCTT-V72I1P110

How to Cite?

Shiva Kumar Sriramulugari, Venkata Ashok K Gorantla, "Cyber Security using Cryptographic Algorithms," International Journal of Computer Trends and Technology, vol. 72, no. 1, pp. 60-67, 2024. Crossref, https://doi.org/10.14445/22312803/IJCTT-V72I1P110

Abstract
Nowadays, individuals can connect with each other and do business anywhere in the globe, which saves time, effort, and money. This is made possible by the fast rise of Internet applications. Nevertheless, the efficacy of these apps relies on safeguarding the data from unauthorized access by malicious individuals. The protection of sensitive data from unauthorized access during transmission over the global network is widely recognized as a significant concern. A variety of strategies are used for the purpose of data security. Certain strategies include the transformation of a legible text into an illegible form using mathematical processes. At the same time, other ways involve the conversion of a legible text into either a picture or musical notes, facilitated by an encryption key. It is essential that the encryption key has a high level of security and is not transmitted through the Internet. This study presents a novel approach called the Multiplicative Cypher Homomorphic Adleman Algorithm (MCHAA), which introduces an additional layer of security to the cyber network. The research also illustrates the process of exchanging the encryption key generated by the proposed method with a second party using the MCHAA. In this scenario, when the data owner initiates a request for the file, the server will produce an authentication key and verify it with the user afterward. Upon receiving the designated key, the encrypted file undergoes decryption, hence enabling the user to get access to the decrypted file via the use of the MCHAA protocol. Ultimately, the performance analysis is conducted to evaluate the efficiency of the proposed method by comparing it with current procedures.

Keywords
Cyber security, Multiplicative Cipher, Homomorphic Adleman Algorithm, Cryptography.

Reference

[1] Mazin H.R. Al-Shaikhly, Hazem M. El-Bakry, and Ahmed A. Saleh, “Cloud Security Using Markov Chain and Genetic Algorithm,” International Journal of Electronics and Information Engineering, vol. 8, no. 2, pp. 96-106, 2018.
[Google Scholar]
[2] Sana Belguith et al., “PHOABE: Securely Outsourcing Multi-Authority Attribute Based Encryption with Policy Hidden for Cloud Assisted IoT,” Computer Networks, vol. 133, pp. 141-156, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Chang Choi, Junho Choi, and Pankoo Kim, “Ontology-Based Access Control Model for Security Policy Reasoning in Cloud Computing,” The Journal of Supercomputing, vol. 67, pp. 711-722, 2014.
[CrossRef] [Google Scholar] [Publisher Link]
[4] N. Deepa, and P. Pandiaraja, “Retracted Article: E Health Care Data Privacy Preserving Efficient File Retrieval from the Cloud Service Provider Using Attribute Based File Encryption,” Journal of Ambient Intelligence and Humanized Computing, vol. 12, pp. 4877-4887, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[5] T.J.B. Durga Devi, A. Subramani, and P. Anitha, “Retracted Article: Modified Adaptive Neuro Fuzzy Inference System Based Load Balancing for Virtual Machine with Security in Cloud Computing Environment,” Journal of Ambient Intelligence and Humanized Computing, vol. 12, pp. 3869-3876, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Mohamed Amine Ferrag et al., “Deep Learning for Cyber Security Intrusion Detection: Approaches, Datasets, and Comparative Study,” Journal of Information Security and Applications, vol. 50, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Partha Ghosh et al., “An Improved Intrusion Detection System to Preserve Security in Cloud Environment,” International Journal of Information Security and Privacy, vol. 14, no. 1, pp.1-14, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Reetu Gupta, Priyesh Kanungo, and Nirmal Dagdee, HD-MAABE: Hierarchical Distributed Multi-Authority Attribute Based Encryption for Enabling Open Access, International Conference on Intelligent Computing and Smart Communication, pp. 183-193, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[9] C. Linda Hepsiba, and J.G.R. Sathiaseelan, “Security Issues in Service Models of Cloud Computing,” International Journal of Computer Science and Mobile Computing, vol. 5, no. 3, pp. 610-615, 2016.
[Google Scholar] [Publisher Link]
[10] Kumar SS, Prasad S, Parimala M & Someswar GM 2016, ‘Scalable and Secure Sharing of Personal Health records in Cloud Computing Using Attribute Based Encryption’, COMPUSOFT: An International Journal of Advanced Computer Technology, vol. 5, no. 6
[11] Chao Lei et al., “A Service Recommendation Algorithm with the Transfer Learning Based Matrix Factorization to Improve Cloud Security,” Information Sciences, vol. 513, pp. 98-111, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Marco Rasori, Pericle Perazzo, and Gianluca Dini, “A Lightweight and Scalable Attribute-Based Encryption System for Smart Cities,” Computer Communications, vol. 149, pp. 78-89, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[13] F. Sammy, and S. Maria Celestin Vigila, An Efficient Multiauthority Attribute-Based Encryption Technique for Storing Personal Health Record by Compressing the Attributes, Advances in Communication Systems and Networks, pp. 571-575, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Honggang Wang, “Security Protection between Users and the Mobile Media Cloud,” IEEE Communications Magazine, vol. 52, no. 3, pp. 73-79, 2014.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Lifei Wei et al., “Security and Privacy for Storage and Computation in Cloud Computing,” Information Sciences, vol. 258, pp. 371-386, 2014.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Ritesh Shivhare, Ritu Shrivastava, and Chetan Gupta, “An Enhanced Image Encryption Technique Using DES Algorithm with Random Image Overlapping and Random Key Generation,” 2018 International Conference on Advanced Computation and Telecommunication (ICACAT), Bhopal, India, pp. 1-9, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Rao V. Seetha Rama et al., “FPGA Implementation of Digital Data Using RSA Algorithm,” Journal of Innovation in Electronics and Communication Engineering, vol. 9, no. 1, pp. 34-37, 2019.
[Google Scholar] [Publisher Link]
[18] Xiao Dong, David A. Randolph, and Subhash Kolar Rajanna, “Enabling Privacy Preserving Record Linkage Systems Using Asymmetric Key Cryptography,” AMIA Annual Symposium Proceedings, vol. 2019, pp. 380-388, 2019.
[Google Scholar] [Publisher Link]