Advanced Secure Data Transfer Protocols For Wide Area Network
Advanced Secure Data Transfer Protocols For Wide Area Network
Network
Sanskruti Gedam AD21006
Prachi Kale AD21031
Srushti Hanwate AD21040
Disha Mohatkar AD21057
Abstract
In the internet along with other network applications, the requirement for security is
increasing each day due to its wide usage. Loads of algorithms were established for the
safe transmission of data. All the sensed information must have to be transmitted and
stored in the cloud. Latency and bandwidth constraints often cause performance issues
in enterprise WANs. WAN optimization uses a variety of techniques,
including deduplication, compression, protocol optimization, traffic shaping, and local
caching. These techniques improve packet delivery and traffic control, in turn allowing
network bandwidth to grow or shrink dynamically as needed.
To make a decision and for making analysis all the data stored in the cloud has to be
retrieved. challenges. One of the main challenges is their centralized system, which
leads to high-security risk and low user reachability. One solution could be to simply
change the system to a decent-centralized network by using the blockchain network to
store these files. However, it may solve the low user reachability and security problem
at the cost of low latency, longer response time, scalability, and privacy issues.
Therefore, this article uses the advanced blockchain scheme and distributes the
InterPlanetary File System.
Key Words: Decryption, Encryption, Private Key, Security, Public Key.
1. INTRODUCTION
Cloud computing is a term that refers to a number of various types of computing
concepts that involve a large number of computers connected via a real-time
communication network (typically the internet). Cloud computing is a jargon word that
lacks a well-defined scientific or technological definition. Cloud computing is a
synonym for distributed computing via a network in science, and it refers to the ability
to run a program on multiple linked machines at once. More generally, the term
SUMMARY
This paper dealt with the advancement of a secure approach for data transmission via
computer networks. The MAES algorithm was developed as an enhancement to the
traditional AES. The generation of the key in the MAES algorithm was done using
the FPA. This improved the randomness of the process of producing the key aimed at
encryption along with decryption. The MAES algorithm encompasses outstanding
results when contrasted to the other existent algorithms. From the experimental
results, it is evident that the encryption time, decryption time, memory usage and
security level have yielded promising results. This justifies the MAES algorithm’s
performance. This work can be further extended for diverse applications.