0% found this document useful (0 votes)
12 views

Advanced Secure Data Transfer Protocols For Wide Area Network

Uploaded by

prachik.aids21
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views

Advanced Secure Data Transfer Protocols For Wide Area Network

Uploaded by

prachik.aids21
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Advanced Secure Data Transfer Protocols for Wide Area

Network
Sanskruti Gedam AD21006
Prachi Kale AD21031
Srushti Hanwate AD21040
Disha Mohatkar AD21057

Abstract
In the internet along with other network applications, the requirement for security is
increasing each day due to its wide usage. Loads of algorithms were established for the
safe transmission of data. All the sensed information must have to be transmitted and
stored in the cloud. Latency and bandwidth constraints often cause performance issues
in enterprise WANs. WAN optimization uses a variety of techniques,
including deduplication, compression, protocol optimization, traffic shaping, and local
caching. These techniques improve packet delivery and traffic control, in turn allowing
network bandwidth to grow or shrink dynamically as needed.
To make a decision and for making analysis all the data stored in the cloud has to be
retrieved. challenges. One of the main challenges is their centralized system, which
leads to high-security risk and low user reachability. One solution could be to simply
change the system to a decent-centralized network by using the blockchain network to
store these files. However, it may solve the low user reachability and security problem
at the cost of low latency, longer response time, scalability, and privacy issues.
Therefore, this article uses the advanced blockchain scheme and distributes the
InterPlanetary File System.
Key Words: Decryption, Encryption, Private Key, Security, Public Key.
1. INTRODUCTION
Cloud computing is a term that refers to a number of various types of computing
concepts that involve a large number of computers connected via a real-time
communication network (typically the internet). Cloud computing is a jargon word that
lacks a well-defined scientific or technological definition. Cloud computing is a
synonym for distributed computing via a network in science, and it refers to the ability
to run a program on multiple linked machines at once. More generally, the term

refers to network-based services that appear to be delivered by real server hardware


but are delivered by virtual hardware emulated by software operating on one or more
real machines. Because virtual servers do not exist physically, they can be moved
around and scaled up (or down) on the go without affecting the end user - akin to
cloud computing. Cloud computing is the use of on-demand computer resources that
may be accessed across a network. Infrastructure-as-a-Service (IaaS), Platform-as-a-
Service (PaaS), and Software-as-a-Service (SaaS) are the three types of services
available (SaaS). Because of its ability to reduce processing costs while enhancing
scalability and flexibility for computer services, cloud computing is one of today's
trendiest study areas. next big thing in the coming years. Because it is new, it is
confronted with new security concerns and obstacles. It has progressed from a notion
to a significant portion of the IT business in recent years. Cloud computing is
commonly recognized as the adoption of SOA, virtualization, and utility computing,
and it is based on three architectures: SaaS, PaaS, and IaaS. Each cloud computing
technology has its own set of issues and obstacles. In contrast to traditional
computing methods, data, and applications are managed by the service provider in a
cloud computing environment. This naturally raises concerns about the data's security
and protection from both internal and external threats. Encryption is a common
method of concealing private or sensitive data within something that appears to be
nothing. Encryption essentially takes advantage of human perception; human senses
are not trained to hunt for files containing information. Decryption decodes encrypted
data such that it can only be decrypted by an authorized user since it contains a key or
password. Despite its benefits, storing user data in the cloud raises several security
risks that must be thoroughly examined before it can be considered a reliable solution
to the problem of avoiding local data storage.
SCOPE OF THE PROJECT
We can safely store data on the cloud in our proposed system by encrypting and
decrypting it. On the cloud, we can also safely share data. The transmitter encrypts
data with a public key, which is then decrypted by the receiver with a private key. As
a result, even if a hacker obtains the data, he will be unable to decode it until he
obtains the private key, ensuring that data on the cloud is secure.
LITERATURE SURVEY
The internet was introduced to the world in 1990, and for the first time, we saw
distributed computing power realized on a large scale.

Cloud computing is a process that allows us to use a scaled distributed computing


environment within the constraints of the internet. As we all know, cloud computing
is surrounded by a lot of hype. Because cloud computing is still in its early stages and
rapidly expanding, we are constantly discovering new security flaws that will pose a
challenge to cloud computing.
TECHNIQUE:
Follow the Diffie Hellman key exchange protocol's mathematical implementation.
The number p is a prime number.
The primitive root modulo of p is g.
1. Alice and Bob agree to use a p = 23 modulus and a g = 5 base.
2. Alice generates her private key (a key she should not disclose with anyone) as 4.
3. As a result, Alice's public key will be 54 percent 23 = 625 percent 23 = 4.
4. Bob generates his private key (a key he should not share with anyone) as 3.
5. As a result, Bob's public key will be 53 percent 23 = 125 percent 23 = 10.
6. Now Alice obtains Bob's public key and creates a secret key. i.e. (Bob's public key,
Alice's private key) mod p=> (104) % 23 => 10000 % 23 => 18.
7. On the other hand, Bob generates a secret key using a similar procedure,
i.e. (public key of Alice Private Key of Bob)
mod p => (43) percent 23 => 64 percent 23=> 18.
As a result, it is mathematically shown that they create the identical key without
knowing each other's private key. This is how the Diffie-Hellman Key Exchange
Protocol is implemented.

SUMMARY

This paper dealt with the advancement of a secure approach for data transmission via
computer networks. The MAES algorithm was developed as an enhancement to the
traditional AES. The generation of the key in the MAES algorithm was done using
the FPA. This improved the randomness of the process of producing the key aimed at
encryption along with decryption. The MAES algorithm encompasses outstanding
results when contrasted to the other existent algorithms. From the experimental
results, it is evident that the encryption time, decryption time, memory usage and
security level have yielded promising results. This justifies the MAES algorithm’s
performance. This work can be further extended for diverse applications.

You might also like