Cloud computing technology provides various internet-based services. Many cloud computing vendors are offering cloud services through their own service mechanism. These mechanisms consist of various service parameters such as authentication, security, performance, availability, etc. Customer can access these cloud services through web browsers using http protocols. Each protocol has its own way of achieving the request-response services, authentication, confidentiality and etc. Cloud computing is an internet-based technology, which provides Infrastructure, Storage, Platform services on demand through a browser using HTTP protocols. These protocol features can be enhanced using cloud specific protocol, which provides strong authentication, confidentiality, security, integrity, availability and accessibility. We are proposing and presenting the secure cloud transmission protocol (SCTP) engineering phases which sits on top of existing http protocols to provide strong authentication security and confidentiality using multi-models. SCTP has multi-level and multi-dimensional approach to achieve strong authentication and multi-level security technique to achieve secure channel. This protocol can add on to existing http protocols. It can be used in any cloud services. This paper presents proposed Protocol engineering phases such as Service Specification, Synthesis, Analysis, Modelling, and Implementation model with test suites. This paper is represents complete integration of our earlier proposed and published multilevel techniques
Efficient and Secure Single Sign on Mechanism for Distributed NetworkIJERA Editor
Distributed network act as core part to access the various services which are available in the network. But the security related to distributed network is main concern. In this paper single sign-on SSO mechanism is introduced which gives access to all services by allowing to sign on only once by users. In this mechanism once user logs in to the Trusted Authority Center TAC then application or services which are register to trusted center will automatically verifies the user’s credentials details and these credentials like password or digital signature will be only one for all applications or services. Unlike all other previous mechanisms where in, if user wants to have access multiple services then for every service distinct user credentials (username, password) must be required. SSO act as single authentication window to user for admittance multiple service providers in networks. Previously introduced technique based SSO technology proved to be secure over well-designed SSO system, but fails to provide security during communication. So here emphasis is given on authentication as open problem and on to refining the already proposed SSO process. And to do this along with RSA algorithm which was used in previous SSO process, we will be using MAC algorithm, which is intended to provide secured pathway for communication over distributed network.TAC i.e. Trusted Authority Center is used for sending token integrated with private and shared public key to user.
Security Mechanisms for Precious Data Protection of Divergent Heterogeneous G...RSIS International
This paper portrays security advancements and
components utilized as part of Grid computing environment. The
Grid Security Infrastructure (GSI) executed in the Globus
Toolkit also, is portrayed in detail. The principle concentrate is
on strategies for distinguishing proof, verification and approval,
in view of X.509 endorsements and SSL/TLS conventions. At
long last an answer of group based get to control over the
network assets is displayed, which is make over on the usage of
the Globus Toolkit
Identity-Based Key Management in MANETs Using Public Key CryptographyCSCJournals
Wireless mobile Ad Hoc Networks (MANETs) are an emerging area of mobile computing. MANETs face serious security problems due to their unique characteristics such as mobility, dynamic topology and lack of central infrastructure support. In conventional networks, deploying a robust and reliable security scheme such as Public Key Infrastructure (PKI) requires a central authority or trusted third party to provide fundamental security services including digital certificates, authentication and encryption. In the proposed scheme, a secure identity-based key management scheme is proposed for networks in environments without any PKI. This scheme solved the security problem in the MANET and is suitable for application to other wired network structures
IRJET - Securing Communication among IoT Devices using Blockchain ProxyIRJET Journal
This document proposes a blockchain proxy scheme to secure communication among IoT devices. The proxy requires a slim SDK on IoT devices to connect them to the blockchain while retaining full control over transactions. The proxy offloads communication tasks to save CPU and bandwidth for IoT devices. A preliminary implementation on Hyperledger Fabric shows potential savings. The proposed system uses a custom blockchain and smart contracts to analyze performance and security when IoT data is shared using this proxy scheme.
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...Editor IJMTER
In this paper the signature of a person is taken as input which is encrypted using
hierarchical visual cryptography. By using HVC the input signature will be divided into four shares.
From that any three are taken to generate key share. Another fragmentation should handover to the
authenticated server. The authenticated server should maintain the generated key and fourth
fragmentation. Only the authorized user can be accessed. If the receiver identifies the fourth
fragmentation and decrypt they got message by using HVC. It is insecure process because anybody
can hack the decrypted message easily. For the secure process the authenticated server generate a
password while transferring a message. The authenticated person can only able to got that message.
The authenticated server checks whether the person should be authorized user or not, while starting
their conversation. It provides more security and challenged for the hackers.
Reconsidering Public Key Infrastructure and its Place in Your Enterprise Stra...Omlis
Gartner's statement that certificates can no longer be blindly trusted; coupled with Microsoft VP of Trustworthy Computing, Scott Charney declaring “PKI is under attack” seems increasingly prophetic as the digital world relentlessly develops its capabilities. Undeniably, PKI plays a key role in internet security, but SSL (Secure Sockets Layer) / TLS (Transport Layer Security) systems are proving increasingly vulnerable under the weight of the latest digital ecosystem.
This document outlines an agenda for a training course on Public Key Infrastructure (PKI) that will take place from October 26-30, 2015 in Trinidad and Tobago. The training will cover topics such as the role of cryptography in building digital trust, elements of a PKI like digital certificates and certificate authorities, trust models, hardware security modules, standards, digital signatures, time stamping services, and practical labs involving setting up a PKI and securing communications.
The document discusses implementing public key infrastructures (PKIs). It introduces PKI concepts like public key cryptography, certificates, and the roles of registration authorities and certification authorities. It explores PKI design considerations like interfacing with applications, smart cards, and identity management systems. It also discusses lessons learned from past PKI deployments and factors to consider when deploying a PKI, such as whether to build an in-house PKI or outsource services.
Security+ Guide to Network Security Fundamentals, 3rd Edition, by Mark Ciampa
Knowledge and skills required for Network Administrators and Information Technology professionals to be aware of security vulnerabilities, to implement security measures, to analyze an existing network environment in consideration of known security threats or risks, to defend against attacks or viruses, and to ensure data privacy and integrity. Terminology and procedures for implementation and configuration of security, including access control, authorization, encryption, packet filters, firewalls, and Virtual Private Networks (VPNs).
CNIT 120: Network Security
http://samsclass.info/120/120_S09.shtml#lecture
Policy: http://samsclass.info/policy_use.htm
Many thanks to Sam Bowne for allowing to publish these presentations.
Strong zero knowledge authentication based on the session keys (sask)IJNSA Journal
This document proposes a new authentication protocol called Strong Zero-Knowledge Authentication Based on Session Keys (SASK). The protocol aims to strengthen user authentication and provide a secure communication channel. It uses a two-step authentication process: 1) regenerating a virtual password and ensuring integrity and confidentiality of nonces exchanged via symmetric encryption with a virtual password, and 2) calculating a session key shared between the client and server to encrypt via the session key. This allows strengthening the authentication process, updating it, and providing better cyber defense against various attack types by verifying identity, creating a secure channel, and using unpredictable session keys.
The document discusses various aspects of securing e-commerce networks. It describes digital certificates which serve to verify identity and are issued by a certification authority. There are four main types of digital certificates. The document also discusses selecting network security technologies based on principles like defense in depth. Technologies discussed for securing networks and protocols include firewalls, intrusion detection systems, virtual private networks, secure sockets layer (SSL), secure hypertext transfer protocol (HTTPS), and public key infrastructure.
This document summarizes a research paper on using public key cryptography with an offline centralized server for secure communication in mission-critical networks. It discusses how public-private key pairs can provide security features like authentication, integrity, confidentiality and non-repudiation. It then describes a proposed scheme called SMOCK that uses a small number of cryptographic keys pre-stored offline at individual nodes to enable authentication with almost zero communication overhead and high availability. The document provides background on public key infrastructure (PKI) components like certificate authorities, registration authorities, repositories, and applications before discussing security requirements.
Identity based proxy-oriented data uploading and remote data integrity checki...Finalyearprojects Toall
The document discusses an identity-based proxy-oriented data uploading and remote data integrity checking model called IDPUIC. It proposes allowing clients to delegate proxies to upload and process data when clients cannot directly access public cloud servers. It also addresses remote data integrity checking, which allows clients to check if their outsourced data remains intact without downloading the whole data. The document then provides a formal definition, system model, and security model for IDPUIC before describing an efficient and flexible IDPUIC protocol based on bilinear pairings that is provably secure based on the computational Diffie-Hellman problem.
This document presents two identity-based secure distributed data storage schemes. The first scheme is secure against chosen plaintext attacks, while the second is secure against chosen ciphertext attacks. Both schemes allow a file owner to independently set access permissions for receivers. When a receiver makes a query, they can only access one file rather than all files from the owner. The schemes also protect against collusion attacks.
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key SecurityIRJET Journal
This document proposes a method for anonymous and authentic data sharing with enhanced key security using identity-based ring signatures. It discusses how identity-based cryptography eliminates the need for public key certificates and the associated validation process. The proposed method uses identity-based ring signatures to allow a third party auditor to privately validate shared data in the cloud while maintaining signer anonymity. It also enhances security by providing forward security, meaning previously generated signatures remain valid even if a signer's private key is compromised in the future. This property is important for large-scale data sharing systems.
Reconsidering PKI and its Place in Your Enterprise Encryption StrategyNirmal Misra
This document discusses the challenges of PKI (Public Key Infrastructure) in today's fragmented digital landscape. It argues that PKI has become too complex, costly and inconsistent across different platforms to effectively provide security. The rise of smartphones, IoT devices and cloud computing has exposed vulnerabilities in PKI. The document introduces Omlis as an alternative encryption solution that is lightweight, adaptable across platforms and delivers security in a simpler and more cost-effective manner than traditional PKI systems.
IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKI...Nexgen Technology
TO GET THIS PROJECT COMPLETE SOURCE ON SUPPORT WITH EXECUTION PLEASE CALL BELOW CONTACT DETAILS
MOBILE: 9791938249, 0413-2211159, WEB: WWW.NEXGENPROJECT.COM,WWW.FINALYEAR-IEEEPROJECTS.COM, EMAIL:[email protected]
NEXGEN TECHNOLOGY provides total software solutions to its customers. Apsys works closely with the customers to identify their business processes for computerization and help them implement state-of-the-art solutions. By identifying and enhancing their processes through information technology solutions. NEXGEN TECHNOLOGY help it customers optimally use their resources.
The emerging pci dss and nist standardsUlf Mattsson
PCI DSS and NIST standards are evolving to address modern payment environments and security risks. A draft of PCI DSS v4.0 proposes new requirements around scope validation, encryption of cardholder data transmissions, security awareness training, and risk assessments. It also offers a customized validation approach with more flexibility in how organizations meet requirements. Major changes in v4.0 focus on strengthening security, adding flexibility, and supporting new payment technologies and cloud environments.
Iaetsd secure emails an integrity assured emailIaetsd Iaetsd
This document summarizes a research paper on developing a secure email system using public key infrastructure (PKI). It begins with an introduction describing the need for additional security mechanisms for email beyond what standard email protocols provide. It then provides an overview of how PKI works using public/private key encryption and digital signatures to provide security properties like authentication, integrity, confidentiality and non-repudiation. The document reviews PKI technologies and applications, how infrastructure is provided, and discusses information security and 'PAIN' properties that PKI enables. It concludes with a literature review of cryptography basics like symmetric and asymmetric key algorithms that PKI is built upon.
IRJET- Data Security with Multifactor AuthenticationIRJET Journal
This document discusses a multi-factor authentication system for improving data security. It proposes using passwords, one-time passwords via QR codes, and encryption/decryption of stored data. The system uses three stages of verification: login with username and password, verification with a randomly generated OTP QR code, and encrypting uploaded data and decrypting downloaded data with keys. By adding multiple layers of authentication and encrypting data, the system aims to minimize unauthorized access to secure systems and stored information.
This document discusses PKI (Public Key Infrastructure) and OpenSSL. It defines PKI as a structure that authenticates users and services to ensure secure information exchange. PKI uses digital certificates issued by Certificate Authorities to associate public keys with certificate owners. OpenSSL is an open source implementation of SSL/TLS that is used to set up and manage PKI environments through commands like generating certificate requests and certificates, revoking certificates, and creating CRLs (Certificate Revocation Lists). The document provides examples of OpenSSL commands for performing common PKI tasks.
Why Governments Depend on Open Source for Secure, Private EmailAll Things Open
All Things Open 2014 - Day 1
Wednesday, October 22nd, 2014
Olivier Thierry
Chief Marketing Officer of Zimbra
Open Government/Open Data
Why Governments Depend on Open Source for Secure, Private Email
documentation for identity based secure distrbuted data storage schemesSahithi Naraparaju
This document proposes two identity-based secure distributed data storage schemes. The first scheme provides confidentiality against chosen plaintext attacks, while the second achieves confidentiality against chosen ciphertext attacks. The schemes allow a file owner to independently set access permissions for individual files without help from a private key generator. They also protect against collusion attacks between receivers and proxy servers. To the best of the author's knowledge, these are the first identity-based distributed storage schemes that allow file-level access control and protect against collusion in the standard model.
IMPLEMENTATION TWOFISH ALGORITHM FOR DATA SECURITY IN A COMMUNICATION NETWOR...Budi Prasetiyo
ABSTRACT. Cryptography is required to secure the data networks communication. This study implements Twofish cryptographic algorithm using library Chilkat Encryption ActiveX Ms. Visual Basic. Twofish operate on a block of plaintext consisting of 128 bits. There are 3 steps in Twofish algorithm, the first step is divide input bit into 4 parts, the second step was performed XOR operation between bit input with a key, and the third step processing the input bits in 16 times Feistel network. To facilitate the implementation of the coding in Ms. Visual Basic we use Chilkat Encryption ActiveX. This research using agile methods with phases: plan, design, code, test, and release. Twofish algorithm implementation using Ms. Visual Basic and library Chilkat Encryption ActiveX can be used to secure the data. The data succeed to be encrypted or decrypted and irreversible. The program can be implemented to maintain the confidentiality of the data when transmitted over the Internet. The speed encryption process need 3 times longer than the decryption. Average of time in encryption process need 0,365 second, while decryption process need 0,0936 second.
Keywords: Data security, Twofish, Chilkat Encryption ActiveX
To the networks rfwkidea32 16, 32-8, 32-4, 32-2 and rfwkidea32-1, based on th...ijcisjournal
In this article, based on a network IDEA32-16, we have developed 5 new networks:RFWKIDEA32-16,RFWKIDEA32-8,
RFWKIDEA32-4, RFWKIDEA32-2, RFWKIDEA32, that do
not use round keys in round functions. It shows that in offered networks such Feistel network,
encryption and decryption using the same algorithm as a round function can be used any
transformation.
Agile development methods are commonly used to iteratively develop the information systems and they can
easily handle ever-changing business requirements. Scrum is one of the most popular agile software
development frameworks. The popularity is caused by the simplified process framework and its focus on
teamwork. The objective of Scrum is to deliver working software and demonstrate it to the customer faster
and more frequent during the software development project. However the security requirements for the
developing information systems have often a low priority. This requirements prioritization issue results in
the situations where the solution meets all the business requirements but it is vulnerable to potential
security threats.
The major benefit of the Scrum framework is the iterative development approach and the opportunity to
automate penetration tests. Therefore the security vulnerabilities can be discovered and solved more often
which will positively contribute to the overall information system protection against potential hackers.
In this research paper the authors propose how the agile software development framework Scrum can be
enriched by considering the penetration tests and related security requirements during the software
development lifecycle. Authors apply in this paper the knowledge and expertise from their previous work
focused on development of the new information system penetration tests methodology PETA with focus on
using COBIT 4.1 as the framework for management of these tests, and on previous work focused on
tailoring the project management framework PRINCE2 with Scrum.
The outcomes of this paper can be used primarily by the security managers, users, developers and auditors.
The security managers may benefit from the iterative software development approach and penetration tests
automation. The developers and users will better understand the importance of the penetration tests and
they will learn how to effectively embed the tests into the agile development lifecycle. Last but not least the
auditors may use the outcomes of this paper as recommendations for companies struggling with
penetrations testing embedded in the agile software development process.
The document discusses implementing public key infrastructures (PKIs). It introduces PKI concepts like public key cryptography, certificates, and the roles of registration authorities and certification authorities. It explores PKI design considerations like interfacing with applications, smart cards, and identity management systems. It also discusses lessons learned from past PKI deployments and factors to consider when deploying a PKI, such as whether to build an in-house PKI or outsource services.
Security+ Guide to Network Security Fundamentals, 3rd Edition, by Mark Ciampa
Knowledge and skills required for Network Administrators and Information Technology professionals to be aware of security vulnerabilities, to implement security measures, to analyze an existing network environment in consideration of known security threats or risks, to defend against attacks or viruses, and to ensure data privacy and integrity. Terminology and procedures for implementation and configuration of security, including access control, authorization, encryption, packet filters, firewalls, and Virtual Private Networks (VPNs).
CNIT 120: Network Security
http://samsclass.info/120/120_S09.shtml#lecture
Policy: http://samsclass.info/policy_use.htm
Many thanks to Sam Bowne for allowing to publish these presentations.
Strong zero knowledge authentication based on the session keys (sask)IJNSA Journal
This document proposes a new authentication protocol called Strong Zero-Knowledge Authentication Based on Session Keys (SASK). The protocol aims to strengthen user authentication and provide a secure communication channel. It uses a two-step authentication process: 1) regenerating a virtual password and ensuring integrity and confidentiality of nonces exchanged via symmetric encryption with a virtual password, and 2) calculating a session key shared between the client and server to encrypt via the session key. This allows strengthening the authentication process, updating it, and providing better cyber defense against various attack types by verifying identity, creating a secure channel, and using unpredictable session keys.
The document discusses various aspects of securing e-commerce networks. It describes digital certificates which serve to verify identity and are issued by a certification authority. There are four main types of digital certificates. The document also discusses selecting network security technologies based on principles like defense in depth. Technologies discussed for securing networks and protocols include firewalls, intrusion detection systems, virtual private networks, secure sockets layer (SSL), secure hypertext transfer protocol (HTTPS), and public key infrastructure.
This document summarizes a research paper on using public key cryptography with an offline centralized server for secure communication in mission-critical networks. It discusses how public-private key pairs can provide security features like authentication, integrity, confidentiality and non-repudiation. It then describes a proposed scheme called SMOCK that uses a small number of cryptographic keys pre-stored offline at individual nodes to enable authentication with almost zero communication overhead and high availability. The document provides background on public key infrastructure (PKI) components like certificate authorities, registration authorities, repositories, and applications before discussing security requirements.
Identity based proxy-oriented data uploading and remote data integrity checki...Finalyearprojects Toall
The document discusses an identity-based proxy-oriented data uploading and remote data integrity checking model called IDPUIC. It proposes allowing clients to delegate proxies to upload and process data when clients cannot directly access public cloud servers. It also addresses remote data integrity checking, which allows clients to check if their outsourced data remains intact without downloading the whole data. The document then provides a formal definition, system model, and security model for IDPUIC before describing an efficient and flexible IDPUIC protocol based on bilinear pairings that is provably secure based on the computational Diffie-Hellman problem.
This document presents two identity-based secure distributed data storage schemes. The first scheme is secure against chosen plaintext attacks, while the second is secure against chosen ciphertext attacks. Both schemes allow a file owner to independently set access permissions for receivers. When a receiver makes a query, they can only access one file rather than all files from the owner. The schemes also protect against collusion attacks.
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key SecurityIRJET Journal
This document proposes a method for anonymous and authentic data sharing with enhanced key security using identity-based ring signatures. It discusses how identity-based cryptography eliminates the need for public key certificates and the associated validation process. The proposed method uses identity-based ring signatures to allow a third party auditor to privately validate shared data in the cloud while maintaining signer anonymity. It also enhances security by providing forward security, meaning previously generated signatures remain valid even if a signer's private key is compromised in the future. This property is important for large-scale data sharing systems.
Reconsidering PKI and its Place in Your Enterprise Encryption StrategyNirmal Misra
This document discusses the challenges of PKI (Public Key Infrastructure) in today's fragmented digital landscape. It argues that PKI has become too complex, costly and inconsistent across different platforms to effectively provide security. The rise of smartphones, IoT devices and cloud computing has exposed vulnerabilities in PKI. The document introduces Omlis as an alternative encryption solution that is lightweight, adaptable across platforms and delivers security in a simpler and more cost-effective manner than traditional PKI systems.
IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKI...Nexgen Technology
TO GET THIS PROJECT COMPLETE SOURCE ON SUPPORT WITH EXECUTION PLEASE CALL BELOW CONTACT DETAILS
MOBILE: 9791938249, 0413-2211159, WEB: WWW.NEXGENPROJECT.COM,WWW.FINALYEAR-IEEEPROJECTS.COM, EMAIL:[email protected]
NEXGEN TECHNOLOGY provides total software solutions to its customers. Apsys works closely with the customers to identify their business processes for computerization and help them implement state-of-the-art solutions. By identifying and enhancing their processes through information technology solutions. NEXGEN TECHNOLOGY help it customers optimally use their resources.
The emerging pci dss and nist standardsUlf Mattsson
PCI DSS and NIST standards are evolving to address modern payment environments and security risks. A draft of PCI DSS v4.0 proposes new requirements around scope validation, encryption of cardholder data transmissions, security awareness training, and risk assessments. It also offers a customized validation approach with more flexibility in how organizations meet requirements. Major changes in v4.0 focus on strengthening security, adding flexibility, and supporting new payment technologies and cloud environments.
Iaetsd secure emails an integrity assured emailIaetsd Iaetsd
This document summarizes a research paper on developing a secure email system using public key infrastructure (PKI). It begins with an introduction describing the need for additional security mechanisms for email beyond what standard email protocols provide. It then provides an overview of how PKI works using public/private key encryption and digital signatures to provide security properties like authentication, integrity, confidentiality and non-repudiation. The document reviews PKI technologies and applications, how infrastructure is provided, and discusses information security and 'PAIN' properties that PKI enables. It concludes with a literature review of cryptography basics like symmetric and asymmetric key algorithms that PKI is built upon.
IRJET- Data Security with Multifactor AuthenticationIRJET Journal
This document discusses a multi-factor authentication system for improving data security. It proposes using passwords, one-time passwords via QR codes, and encryption/decryption of stored data. The system uses three stages of verification: login with username and password, verification with a randomly generated OTP QR code, and encrypting uploaded data and decrypting downloaded data with keys. By adding multiple layers of authentication and encrypting data, the system aims to minimize unauthorized access to secure systems and stored information.
This document discusses PKI (Public Key Infrastructure) and OpenSSL. It defines PKI as a structure that authenticates users and services to ensure secure information exchange. PKI uses digital certificates issued by Certificate Authorities to associate public keys with certificate owners. OpenSSL is an open source implementation of SSL/TLS that is used to set up and manage PKI environments through commands like generating certificate requests and certificates, revoking certificates, and creating CRLs (Certificate Revocation Lists). The document provides examples of OpenSSL commands for performing common PKI tasks.
Why Governments Depend on Open Source for Secure, Private EmailAll Things Open
All Things Open 2014 - Day 1
Wednesday, October 22nd, 2014
Olivier Thierry
Chief Marketing Officer of Zimbra
Open Government/Open Data
Why Governments Depend on Open Source for Secure, Private Email
documentation for identity based secure distrbuted data storage schemesSahithi Naraparaju
This document proposes two identity-based secure distributed data storage schemes. The first scheme provides confidentiality against chosen plaintext attacks, while the second achieves confidentiality against chosen ciphertext attacks. The schemes allow a file owner to independently set access permissions for individual files without help from a private key generator. They also protect against collusion attacks between receivers and proxy servers. To the best of the author's knowledge, these are the first identity-based distributed storage schemes that allow file-level access control and protect against collusion in the standard model.
IMPLEMENTATION TWOFISH ALGORITHM FOR DATA SECURITY IN A COMMUNICATION NETWOR...Budi Prasetiyo
ABSTRACT. Cryptography is required to secure the data networks communication. This study implements Twofish cryptographic algorithm using library Chilkat Encryption ActiveX Ms. Visual Basic. Twofish operate on a block of plaintext consisting of 128 bits. There are 3 steps in Twofish algorithm, the first step is divide input bit into 4 parts, the second step was performed XOR operation between bit input with a key, and the third step processing the input bits in 16 times Feistel network. To facilitate the implementation of the coding in Ms. Visual Basic we use Chilkat Encryption ActiveX. This research using agile methods with phases: plan, design, code, test, and release. Twofish algorithm implementation using Ms. Visual Basic and library Chilkat Encryption ActiveX can be used to secure the data. The data succeed to be encrypted or decrypted and irreversible. The program can be implemented to maintain the confidentiality of the data when transmitted over the Internet. The speed encryption process need 3 times longer than the decryption. Average of time in encryption process need 0,365 second, while decryption process need 0,0936 second.
Keywords: Data security, Twofish, Chilkat Encryption ActiveX
To the networks rfwkidea32 16, 32-8, 32-4, 32-2 and rfwkidea32-1, based on th...ijcisjournal
In this article, based on a network IDEA32-16, we have developed 5 new networks:RFWKIDEA32-16,RFWKIDEA32-8,
RFWKIDEA32-4, RFWKIDEA32-2, RFWKIDEA32, that do
not use round keys in round functions. It shows that in offered networks such Feistel network,
encryption and decryption using the same algorithm as a round function can be used any
transformation.
Agile development methods are commonly used to iteratively develop the information systems and they can
easily handle ever-changing business requirements. Scrum is one of the most popular agile software
development frameworks. The popularity is caused by the simplified process framework and its focus on
teamwork. The objective of Scrum is to deliver working software and demonstrate it to the customer faster
and more frequent during the software development project. However the security requirements for the
developing information systems have often a low priority. This requirements prioritization issue results in
the situations where the solution meets all the business requirements but it is vulnerable to potential
security threats.
The major benefit of the Scrum framework is the iterative development approach and the opportunity to
automate penetration tests. Therefore the security vulnerabilities can be discovered and solved more often
which will positively contribute to the overall information system protection against potential hackers.
In this research paper the authors propose how the agile software development framework Scrum can be
enriched by considering the penetration tests and related security requirements during the software
development lifecycle. Authors apply in this paper the knowledge and expertise from their previous work
focused on development of the new information system penetration tests methodology PETA with focus on
using COBIT 4.1 as the framework for management of these tests, and on previous work focused on
tailoring the project management framework PRINCE2 with Scrum.
The outcomes of this paper can be used primarily by the security managers, users, developers and auditors.
The security managers may benefit from the iterative software development approach and penetration tests
automation. The developers and users will better understand the importance of the penetration tests and
they will learn how to effectively embed the tests into the agile development lifecycle. Last but not least the
auditors may use the outcomes of this paper as recommendations for companies struggling with
penetrations testing embedded in the agile software development process.
High Capacity Image Steganography Using Adjunctive Numerical Representations ...ijcisjournal
LSB steganography is a one of the most widely used methods for implementing covert data channels in
image file exchanges [1][2]. The low computational complexity and implementation simplicity of the algorithm are significant factors for its popularity with the primary reason being low image distortion. Many attempts have been made to increase the embedding capacity of LSB algorithms by expanding into the second or third binary layers of the image while maintaining a low probability of detection with minimal distortive effects [2][3][4]. In this paper,we introduce an advanced technique for covertly embedding data within images using redundant number system decomposition over non -standard digital bit planes. Both grayscale and bit-mapped images are equally effective as cover files. It will be shown that this unique steganography method has minimal visual distortive affects while also preserving the cover file statistics, making it less susceptible to most general steganography detection algorithms.
Gait Based Person Recognition Using Partial Least Squares Selection Scheme ijcisjournal
The document summarizes a research paper on gait-based person recognition using partial least squares selection. It presents an Arbitrary View Transformation Model (AVTM) that uses gait energy images and partial least squares (PLS) feature selection to improve gait recognition accuracy under varying viewing angles, clothing, and other conditions. The proposed AVTM PLS method is evaluated on the CASIA gait database and shown to achieve higher recognition rates compared to other existing methods, especially when there are changes in viewing angle, clothing, or whether the person is carrying something. Tables of results demonstrate the proposed method outperforms alternatives across different test conditions and ranges of gallery and probe viewing angles.
Wavelet Based on the Finding of Hard and Soft Faults in Analog and Digital Si...ijcisjournal
In this paper methods for testing both software and hardware faults are implemented in analog and digital
signal circuits are presented. They are based on the wavelet transform (WT). The limit which affected by
faults detect ability, for the reference circuits is set by statistical processing data obtained from a set of
faults free circuits .In wavelet analysis it has two algorithm one is based on a discrimination factor using
Euclidean distances and the other mahalanobis distances, are introduced both methods on wavelet energy
calculation. Simulation result from proposed test methods in the testing known analog and digital signal
circuit benchmark are given. The results shows that effectiveness of existing methods two test metrics
against three other test methods, namely a test method based on rms value of the measured signal, a test
method utilizing the harmonic magnitude component of the measured signal waveform
A 130-NM CMOS 400 MHZ 8-Bit Low Power Binary Weighted Current Steering DAC ijcisjournal
A low power low voltage 8-bit Digital to Analog Converter consisting of different current sources in binary
weighted array architecture is designed. The weights of current sources are depending on the binary
weights of the bits. This current steering DAC is suitable for high speed applications. The proposed DAC in
this paper has DNL, INL of ±0.04, ±0.05 respectively and the power consumption of 16.67mw.
This binary array architecture is implemented in CMOS 0.13µm 1P2M technology has good performances
in DNL, INL and area compared with other researches.
Blind Image Quality Assessment with Local Contrast Features ijcisjournal
The aim of this research is to create a tool to evaluate distortion in images without the information about
original image. Work is to extract the statistical information of the edges and boundaries in the image and
to study the correlation between the extracted features. Change in the structural information like shape and
amount of edges of the image derives quality prediction of the image. Local contrast features are effectively
detected from the responses of Gradient Magnitude (G) and Laplacian of Gaussian (L) operations. Using
the joint adaptive normalisation, G and L are normalised. Normalised values are quantized into M and N
levels respectively. For these quantised M levels of G and N levels of L, Probability (P) and conditional
probability(C) are calculated. Four sets of values namely marginal distributions of gradient magnitude Pg,
marginal distributions of Laplacian of Gaussian Pl, conditional probability of gradient magnitude Cg and
probability of Laplacian of Gaussian Cl are formed. These four segments or models are Pg, Pl, Cg and Cl.
The assumption is that the dependencies between features of gradient magnitude and Laplacian of
Gaussian can formulate the level of distortion in the image. To find out them, Spearman and Pearson
correlations between Pg, Pl and Cg, Cl are calculated. Four different correlation values of each image are
the area of interest. Results are also compared with classical tool Structural Similarity Index Measure
General Kalman Filter & Speech Enhancement for Speaker Identificationijcisjournal
Presence of noise increases the dimension of the information. A noise suppression algorithm is developed
with an idea of combining the General Kalman Filter and Estimate Maximization (EM) frame work.This
combination is helpful and effective in identifying noise characteristics of an acoustic environment.
Recursion between Estimate step and Maximization step enabled the algorithm to deal any model of noise.
The same Speech enhancement procedure in applied in the pre-processing stage of a conventional Speaker
identification method. Due to the non-stationary nature of noise and speech adaptive algorithms are
required. Algorithm is first applied for Speech enhancement problem and then extended to using it in the
pre-processing step of the Speaker identification. The present work is compared in terms of significant
metrics with existing and popular algorithms and results show that the developed algorithm is dominant
over them.
The document proposes an efficient generalized signcryption scheme based on elliptic curve cryptography (ECC) that avoids computationally heavy bilinear pairing operations. It first identifies security issues in a previous tripartite signcryption scheme and proposes corrections. The corrected scheme is extended to support multiple receivers. It then further extends this signcryption scheme to a generalized signcryption scheme that provides either confidentiality, authentication, or a combination of both for messages with multiple receivers. The proposed schemes use only ECC operations and satisfy security properties like forward secrecy and public verification more efficiently than other existing schemes. An application of the generalized signcryption scheme for key management in wireless sensor networks is also discussed.
SECURITY ANALYSIS OF THE MULTI-PHOTON THREE-STAGE QUANTUM KEY DISTRIBUTIONijcisjournal
The document presents a security analysis of a multi-photon three-stage quantum key distribution protocol that exploits asymmetry in detection strategies between legitimate users and eavesdroppers. It is found that under intercept-resend and photon number splitting attacks, the mean photon number can be greater than 1 while still achieving security, allowing for less efficient detectors. Error probabilities for the eavesdropper are calculated under these attacks as a function of mean photon number.
An efficient algorithm for sequence generation in data miningijcisjournal
Data mining is the method or the activity of analyzing data from different perspectives and summarizing it
into useful information. There are several major data mining techniques that have been developed and are
used in the data mining projects which include association, classification, clustering, sequential patterns,
prediction and decision tree. Among different tasks in data mining, sequential pattern mining is one of the
most important tasks. Sequential pattern mining involves the mining of the subsequences that appear
frequently in a set of sequences. It has a variety of applications in several domains such as the analysis of
customer purchase patterns, protein sequence analysis, DNA analysis, gene sequence analysis, web access
patterns, seismologic data and weather observations. Various models and algorithms have been developed
for the efficient mining of sequential patterns in large amount of data. This research paper analyzes the
efficiency of three sequence generation algorithms namely GSP, SPADE and PrefixSpan on a retail dataset
by applying various performance factors. From the experimental results, it is observed that the PrefixSpan
algorithm is more efficient than other two algorithms.
Fault Detection in Mobile Communication Networks Using Data Mining Techniques...ijcisjournal
This document discusses using data mining techniques and big data analytics to detect faults in mobile communication networks. It first provides background on data mining, mobile communication networks, and fault detection techniques. It then discusses using self-organizing maps, discrete wavelet transforms, and cluster analysis as data mining techniques to analyze network data and detect faults between source and destination nodes. The goal is to identify outlier nodes experiencing faults by analyzing patterns in large datasets from mobile networks.
Copy Move Forgery Detection Using GLCM Based Statistical Features ijcisjournal
The features Gray Level Co-occurrence Matrix (GLCM) are mostly explored in Face Recognition and
CBIR. GLCM technique is explored here for Copy-Move Forgery Detection. GLCMs are extracted from all
the images in the database and statistics such as contrast, correlation, homogeneity and energy are
derived. These statistics form the feature vector. Support Vector Machine (SVM) is trained on all these
features and the authenticity of the image is decided by SVM classifier. The proposed work is evaluated on
CoMoFoD database, on a whole 1200 forged and processed images are tested. The performance analysis
of the present work is evaluated with the recent methods.
DWT Based Audio Watermarking Schemes : A Comparative Study ijcisjournal
The main problem encountered during multimedia transmission is its protection against illegal distribution
and copying. One of the possible solutions for this is digital watermarking. Digital audio watermarking is
the technique of embedding watermark content to the audio signal to protect the owner copyrights. In this
paper, we used three wavelet transforms i.e. Discrete Wavelet Transform (DWT), Double Density DWT
(DDDWT) and Dual Tree DWT (DTDWT) for audio watermarking and the performance analysis of each
transform is presented. The key idea of the basic algorithm is to segment the audio signal into two parts,
one is for synchronization code insertion and other one is for watermark embedding. Initially, binary
watermark image is scrambled using chaotic technique to provide secrecy. By using QuantizationIndex
Modulation (QIM), this method works as a blind technique. The comparative analysis of the three methods
is made by conducting robustness and imperceptibility tests are conducted on five benchmark audio
signals.
Performance Analsis of Clipping Technique for Papr Reduction of MB-OFDM UWB S...ijcisjournal
Multiband Orthogonal Frequency Division Multiplexing (MB-OFDM) is used as efficacious procedure for
ultra-wideband (UWB) wireless communication applications, which divides the spectrum into various subbands,
whose bandwidth is approximately 500MHz. Major arduousness in multiband-OFDM is ,it have
very large peak to average power ratio value which causes the signal to enter into dynamic region that
consequence in the loss of orthogonal properties and results in the interference of the carrier signals which
crops the amplifier saturation and finally limits the capacity of the system. Many PAPR amortize
algorithms have reported in the survey and pre-coding is PAPR reduction which is inserted after
modulation in the OFDM system. The Existing work presents the reduction of that value by different
clipping techniques namely Classical-Clipping (CC), Heavy side-Clipping (HC), Deep-Clipping (DC) and
Smooth-Clipping (SC) and their comparison analysis is done. Every clipping method is best at its own
level .The proficiency of these strategies are evaluated in locutions of average power disparity, complete
system decadence and PAPR reduction. Finally results show the MB OFDM yields better performance to
reduce PAPR in effective way.
Hardware Implementation of Algorithm for Cryptanalysisijcisjournal
Cryptanalysis of block ciphers involves massive computations which are independent of each other and can
be instantiated simultaneously so that the solution space is explored at a faster rate. With the advent of low
cost Field Programmable Gate Arrays (FPGA’s), building special purpose hardware for computationally
intensive applications has now become possible. For this the Data Encryption Standard (DES) is used as a
proof of concept. This paper presents the design for Hardware implementation of DES cryptanalysis on
FPGA using exhaustive key search. Two architectures viz. Rolled and Unrolled DES architecture are compared
and based on experimental result the Rolled architecture is implemented on FPGA. The aim of this
work is to make cryptanalysis faster and better.
An Optimized Approach for Fake Currency Detection Using Discrete Wavelet Tran...ijcisjournal
This document describes a proposed method for detecting fake currency using discrete wavelet transform (DWT). It begins with background on image forgery detection techniques, including active approaches using watermarking and passive approaches that do not require prior information. The document then focuses on copy-move forgery detection and compares different techniques like DCT and DWT. It proposes a two-phase algorithm using DWT to identify matched and reference blocks, then verify the resemblance between blocks. The algorithm segments the image, applies DWT, lexicographically sorts blocks, calculates normalized shift vectors, and detects matched blocks. Simulation outputs show the original and tampered images with tampered regions highlighted.
A New Method for Preserving Privacy in Data Publishing Against Attribute and ...ijcisjournal
The document proposes a new method for preserving privacy in data publishing against attribute and identity disclosure. It summarizes existing anonymization techniques like k-anonymity, l-diversity, and t-closeness that aim to prevent these privacy risks but have limitations. The proposed method applies suppression to select quasi-identifiers before generalizing the data into ranges within groups to anonymize the table, aiming to prevent both attribute and identity disclosure. It arranges the records into groups, finds minimum and maximum integer values within each group, and rewrites the quasi-identifiers as ranges to anonymize the table while preserving more utility than existing techniques.
Cryptography is an art and science of secure communication. Here the sender and receiver are guaranteed
the security through encryption of their data, with the help of a common key. Both the parties should agree
on this key prior to communication. The cryptographic systems which perform these tasks are designed to
keep the key secret while assuming that the algorithm used for encryption and decryption is public. Thus
key exchange is a very sensitive issue. In modern cryptographic algorithms this security is based on the
mathematical complexity of the algorithm. But quantum computation is expected to revolutionize computing
paradigm in near future. This presents a challenge amongst the researchers to develop new cryptographic
techniques that can survive the quantum computing era. This paper reviews the radical use of quantum
mechanics for cryptography
Secure cloud transmission protocol (SCTP) was proposed to achieve strong authentication and secure
channel in cloud computing paradigm at preceding work. SCTP proposed with its own techniques to attain
a cloud security. SCTP was proposed to design multilevel authentication technique with multidimensional
password generations System to achieve strong authentication. SCTP was projected to develop multilevel
cryptography technique to attain secure channel. SCTP was proposed to blueprint usage profile based
intruder detection and prevention system to resist against intruder attacks. SCTP designed, developed and
analyzed using protocol engineering phases. Proposed SCTP and its techniques complete design has
presented using Petrinet production model. We present the designed SCTP petrinet models and its
analysis. We discussed the SCTP design and its performance to achieve strong authentication, secure
channel and intruder prevention. SCTP designed to use in any cloud applications. It can authorize,
authenticates, secure channel and prevent intruder during the cloud transaction. SCTP designed to protect
against different attack mentioned in literature. This paper depicts the SCTP performance analysis report
which compares with existing techniques that are proposed to achieve authentication, authorization,
security and intruder prevention.
Secure cloud transmission protocol (SCTP) was proposed to achieve strong authentication and secure channel in cloud computing paradigm at preceding work. SCTP proposed with its own techniques to attain a cloud security. SCTP was proposed to design multilevel authentication technique with multidimensional
password generations System to achieve strong authentication. SCTP was projected to develop multilevel cryptography technique to attain secure channel. SCTP was proposed to blueprint usage profile based
intruder detection and prevention system to resist against intruder attacks. SCTP designed, developed and analyzed using protocol engineering phases. Proposed SCTP and its techniques complete design has presented using Petrinet production model. We present the designed SCTP petrinet models and its analysis. We discussed the SCTP design and its performance to achieve strong authentication, secure
channel and intruder prevention. SCTP designed to use in any cloud applications. It can authorize,
authenticates, secure channel and prevent intruder during the cloud transaction. SCTP designed to protect against different attack mentioned in literature. This paper depicts the SCTP performance analysis report
which compares with existing techniques that are proposed to achieve authentication, authorization, security and intruder prevention.
Secure cloud transmission protocol (SCTP) was proposed to achieve strong authentication and secure
channel in cloud computing paradigm at preceding work. SCTP proposed with its own techniques to attain
a cloud security. SCTP was proposed to design multilevel authentication technique with multidimensional
password generations System to achieve strong authentication. SCTP was projected to develop multilevel
cryptography technique to attain secure channel. SCTP was proposed to blueprint usage profile based
intruder detection and prevention system to resist against intruder attacks. SCTP designed, developed and
analyzed using protocol engineering phases. Proposed SCTP and its techniques complete design has
presented using Petrinet production model. We present the designed SCTP petrinet models and its
analysis. We discussed the SCTP design and its performance to achieve strong authentication, secure
channel and intruder prevention. SCTP designed to use in any cloud applications. It can authorize,
authenticates, secure channel and prevent intruder during the cloud transaction. SCTP designed to protect
against different attack mentioned in literature. This paper depicts the SCTP performance analysis report
which compares with existing techniques that are proposed to achieve authentication, authorization,
security and intruder prevention.
This document presents an improved secure cloud transmission protocol (SCTP) that was designed to achieve strong authentication, secure channels, and intruder detection in cloud computing. SCTP uses multi-level authentication with multidimensional password generation, multi-level cryptography, and usage profile-based intruder detection. SCTP was modeled using Petri net production models to analyze its design and performance. The analysis shows that SCTP outperforms existing techniques in authentication, authorization, security, and intruder prevention for cloud applications requiring high security. However, SCTP may introduce unnecessary complexity for simpler cloud applications.
SECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTUREcscpconf
The document proposes an architecture for implementing security in cloud computing systems, particularly for Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS) models. The key aspects of the proposed architecture are:
1. It incorporates different security techniques like homomorphic encryption, access control policies, and trusted hardware to address issues of confidentiality, authentication, and integrity in cloud systems.
2. It presents security as a service that allows on-demand use of security components like encryption and access control based on application or user requirements.
3. It provides an example of how the security-as-a-service model could be applied to an e-health
Security policy enforcement in cloud infrastructurecsandit
This document proposes an architecture for implementing security in cloud computing systems, particularly for Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS) models. It discusses key security issues like confidentiality, integrity, and authentication in cloud systems. It then proposes a framework that incorporates solutions like homomorphic encryption to ensure confidentiality while still allowing data processing, as well as using standards like XACML for flexible policy-based access control and authentication. The goal is to provide an integrated security solution as a service for cloud platforms.
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREIJNSA Journal
In a typical cloud computing diverse facilitating components like hardware, software, firmware,
networking, and services integrate to offer different computational facilities, while Internet or a private
network (or VPN) provides the required backbone to deliver the services. The security risks to the cloud
system delimit the benefits of cloud computing like “on-demand, customized resource availability and
performance management”. It is understood that current IT and enterprise security solutions are not
adequate to address the cloud security issues. This paper explores the challenges and issues of security
concerns of cloud computing through different standard and novel solutions. We propose analysis and
architecture for incorporating different security schemes, techniques and protocols for cloud computing,
particularly in Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS) systems. The proposed
architecture is generic in nature, not dependent on the type of cloud deployment, application agnostic and
is not coupled with the underlying backbone. This would facilitate to manage the cloud system more
effectively and provide the administrator to include the specific solution to counter the threat. We have also
shown using experimental data how a cloud service provider can estimate the charging based on the
security service it provides and security-related cost-benefit analysis can be estimated.
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREIJNSA Journal
In a typical cloud computing diverse facilitating components like hardware, software, firmware, networking, and services integrate to offer different computational facilities, while Internet or a private network (or VPN) provides the required backbone to deliver the services. The security risks to the cloud system delimit the benefits of cloud computing like “on-demand, customized resource availability and performance management”. It is understood that current IT and enterprise security solutions are not adequate to address the cloud security issues. This paper explores the challenges and issues of security concerns of cloud computing through different standard and novel solutions. We propose analysis and architecture for incorporating different security schemes, techniques and protocols for cloud computing, particularly in Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS) systems. The proposed architecture is generic in nature, not dependent on the type of cloud deployment, application agnostic and is not coupled with the underlying backbone. This would facilitate to manage the cloud system more effectively and provide the administrator to include the specific solution to counter the threat. We have also shown using experimental data how a cloud service provider can estimate the charging based on the security service it provides and security-related cost-benefit analysis can be estimated.
A Survey on the Security Issues of Software Defined Networking Tool in Cloud ...ijcnes
The Advent of the digital age has led to a rise in different types of data with every passing day. In fact, it is expected that half of the total data used around the world will be on the cloud nowadays. This complex data needs to be stored, processed and analyzed for information gaining that can be used for several organizations. Cloud computing provides an appropriate platform for Software Defined Networking (SDN) in communicating and computing requirements of the latter. It makes cloud-based networking a viable research field in the current scenario. However, several issues addressed and risk needs to be mitigated in the L2 cloud server. Virtual networks and cloud federation being considered in the network virtualization over L3 cloud router. This research work explores the existing research challenges and discusses open issues for the security in cloud computing and its uses in the relevant field by means of a comparative analysis of L2 server L3 router based on SDN tools. Also, an analysis of such issues are discussed and summarized. Finally, the best tool identified for the use cloud security.
Remote data integrity checking with a third party auditor in public cloud usi...IJSRED
This document proposes a method for remote data integrity checking with a third party auditor using an identity-based proxy server protocol (IDPP) in public clouds. The IDPP protocol uses identity-based cryptography and computational Diffie-Hellman problems to authorize a proxy to process and upload data to the cloud on behalf of an owner who may be restricted. It allows the owner to remotely check the integrity of their data stored in the public cloud. The proposed system uses key generation, encryption, labeling files with tags, and an interactive proof between the cloud and owner to verify integrity.
Turn InSecure And High Speed Intra-Cloud and Inter-Cloud CommunicationRichard Jung
The document discusses secure and high-speed communication within and between cloud infrastructures. It aims to analyze different data migration techniques for optimizing security and performance of intra-cloud and inter-cloud communication. A private cloud network was created using OpenStack's Nova Architecture to communicate with Amazon's Elastic Cloud public cloud platform. Results show that the Virtual Private Networking technique OpenVPN provides strong security while HTTPS and Secure Copy provide minimal security without sacrificing performance for data migration within and between clouds.
ENHANCING EFFICIENCY OF EAP-TTLS PROTOCOL THROUGH THE SIMULTANEOUS USE OF ENC...IJNSA Journal
Security and its subcategory authentication are among the important subjects of cloud computing. In this system, user authentication mechanisms are carried out before providing access to resources. It is noteworthy that this input gate is actually the pathway of many attacks. Therefore, designing a secure user authentication mechanism significantly contributes to the overall security of the system. This process blocks attacks where the objective is to authenticate a user and when the user requests for cloud computing services. As a result, this article aimed to introduce a new security solution for cloud computing environments through employing the EAP-TTLS protocol, replacing the common Data Encryption Algorithm (DEA) with a new one, and adding a digital signature to the authentication process. After implementation of the proposed method in matlab, its performance was evaluated with RSA and ECDSA algorithms. The results of simulation showed the improvement of performance in terms of memory usage, authentication time, and verification delay. The proposed method [digital signature], along with username and password, is used to improve security in user authentication process.
An approach for secured data transmission at client end in cloud computingIAEME Publication
This document summarizes a research paper that proposes an algorithm for securing data transmission between a client and cloud server in cloud computing environments. The algorithm uses an authentication function and key that are updated during transmission to verify authorization and detect any modifications by potential attackers. When a client connects to a server, they both initialize the key to the same value. Then, the key is incremented by one for each packet sent or received. If a client wants to verify security, it can send a packet with the current key value to the server for matching. This helps prevent man-in-the-middle attacks by making it difficult for attackers to modify packets without knowing the updated key values. The approach aims to securely transmit sensitive data from cloud servers
Cloud computing technology security and trust challengesijsptm
A let of exclusive features such as high functionality and low cost have made cloud computing a valuable
technology. These remarkable features give users and companies, countless opportunities to reach their
goals spending minimum cost and time. Looking at the literature of this technology, it can be claimed that
the main concerns of the users of cloud are security issues especially trust. Unfortunately these concerns
have not been tackled yet. Therefore we decided to introduce a useful and functioned way to create more
trust among consumers to use this technology .In this paper we suggest the foundation of an international
certification institute for the service providing companies in order to increase trust and enhance likeliness
of using this new and valuable technology among people. Practicality of the technology will improve it and
will make its security better by providers.
Single Sign-on Authentication Model for Cloud Computing using KerberosDeepak Bagga
ABSTRACT
In today’s organizations need for several new resources and storage requirements for terabytes of data is generated every day. Cloud computing provides solution for this in a cost effective and efficient manner. Cloud computing provides on demand resources as services to clients. Cloud is highly scalable and flexible. Although it is benefiting the clients in several ways but as data is stored remotely it has many security loopholes like attacks, data lose, other security and authentication issues. In this paper we are proposing an authentication model for cloud computing based on the Kerberos protocol to provide single sign-on and to prevent against DDOS attacks. This model can benefit by filtering against unauthorized access and to reduce the burden, computation and memory usage of cloud against authentication checks for each client. It acts as a third party between cloud servers and clients to allow secure access to cloud services. In this paper we will see some of the related work for cloud security issues and attacks. Then in next section we will discuss the proposed architecture, its working and sequential process of message transmission. Next we will see how it can prevent against DDOS attacks, some benefits and how it provides single sign-on.
This document proposes designing a secure third party environment for accessing cloud computing services. It discusses cloud computing models and security challenges. The objective is to develop a system architecture and security protocols/algorithms to enable secure cloud services using homomorphic encryption. Experiments will validate the security algorithms. This is expected to deliver a secure architecture and protocols for trust in cloud computing.
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...IRJET Journal
This document proposes a new cloud-manager-based encryption scheme (CMReS) to address key management and sharing issues in fully homomorphic encryption. CMReS distributes encryption, decryption, and re-encryption tasks between a trusted Encryption/Decryption Service Provider (EDSP) module and a Re-encryption Service Provider (RSP) module hosted on the cloud. The scheme uses Diffie-Hellman key exchange to generate session keys and one-time passwords for authentication between users and cloud services. Experimental results show the proposed technique reduces delay compared to previous approaches by distributing computational tasks between user devices, the EDSP, and RSP modules.
Network as a Service Model in Cloud Authentication by HMAC AlgorithmEswar Publications
Resource pooling on internet-based accessing on use as pay environmental technology and ruled in IT field is the
cloud. Present, in every organization has trusted the web, however, the information must flow but not hold the
data. Therefore, all customers have to use the cloud. While the cloud progressing info by securing-protocols. Third
party observing and certain circumstances directly stale in flow and kept of packets in the virtual private cloud.
Global security statistics in the year 2017, hacking sensitive information in cloud approximately maybe 75.35%,
and the world security analyzer said this calculation maybe reached to 100%. For this cause, this proposed
research work concentrates on Authentication-Message-Digest-Key with authentication in routing the Network as
a Service of packets in OSPF (Open Shortest Path First) implementing Cloud with GNS3 has tested them to
securing from attackers.
This document discusses cloud computing protocols. It begins by defining cloud computing as using remote servers over the internet to store and access data and applications. The cloud is broken into three categories: applications, storage, and connectivity. Protocols are then defined as sets of rules that allow electronic devices to connect and exchange information. Ten specific protocols are described: Gossip protocol for failure detection and messaging; Connectionless network protocol for fragmentation; State routing protocol for path selection; Internet group management protocol for multicasting; Secure shell protocol for secure remote login; Coverage enhanced ethernet protocol for network traffic handling; Extensible messaging and presence protocol for publish/subscribe systems; Advanced message queuing protocol for point-to-point messaging; Enhanced interior
Main Menu The metals-black-book-ferrous-metalsRicardo Akerman
Guia técnico e de referência amplamente utilizado nas indústrias metalúrgica, de manufatura, engenharia, petróleo e gás, construção naval, e diversas áreas de manutenção industrial.
This presentation provides a comprehensive overview of a specialized test rig designed in accordance with ISO 4548-7, the international standard for evaluating the vibration fatigue resistance of full-flow lubricating oil filters used in internal combustion engines.
Key features include:
UNIT-1-PPT-Introduction about Power System Operation and ControlSridhar191373
Power scenario in Indian grid – National and Regional load dispatching centers –requirements of good power system - necessity of voltage and frequency regulation – real power vs frequency and reactive power vs voltage control loops - system load variation, load curves and basic concepts of load dispatching - load forecasting - Basics of speed governing mechanisms and modeling - speed load characteristics - regulation of two generators in parallel.
UNIT-4-PPT UNIT COMMITMENT AND ECONOMIC DISPATCHSridhar191373
Statement of unit commitment problem-constraints: spinning reserve, thermal unit constraints, hydro constraints, fuel constraints and other constraints. Solution methods: priority list methods, forward dynamic programming approach. Numerical problems only in priority list method using full load average production cost. Statement of economic dispatch problem-cost of generation-incremental cost curve –co-ordination equations without loss and with loss- solution by direct method and lamda iteration method (No derivation of loss coefficients)
Filters for Electromagnetic Compatibility ApplicationsMathias Magdowski
In this lecture, I explain the fundamentals of electromagnetic compatibility (EMC), the basic coupling model and coupling paths via cables, electric fields, magnetic fields and wave fields. We also look at electric vehicles as an example of systems with many conducted EMC problems due to power electronic devices such as rectifiers and inverters with non-linear components such as diodes and fast switching components such as MOSFETs or IGBTs. After a brief review of circuit analysis fundamentals and an experimental investigation of the frequency-dependent impedance of resistors, capacitors and inductors, we look at a simple low-pass filter. The input impedance from both sides as well as the transfer function are measured.
ISO 4020-6.1 – Filter Cleanliness Test Rig: Precision Testing for Fuel Filter Integrity
Explore the design, functionality, and standards compliance of our advanced Filter Cleanliness Test Rig developed according to ISO 4020-6.1. This rig is engineered to evaluate fuel filter cleanliness levels with high accuracy and repeatability—critical for ensuring the performance and durability of fuel systems.
🔬 Inside This Presentation:
Overview of ISO 4020-6.1 testing protocols
Rig components and schematic layout
Test methodology and data acquisition
Applications in automotive and industrial filtration
Key benefits: accuracy, reliability, compliance
Perfect for R&D engineers, quality assurance teams, and lab technicians focused on filtration performance and standard compliance.
🛠️ Ensure Filter Cleanliness — Validate with Confidence.
Expansive soils (ES) have a long history of being difficult to work with in geotechnical engineering. Numerous studies have examined how bagasse ash (BA) and lime affect the unconfined compressive strength (UCS) of ES. Due to the complexities of this composite material, determining the UCS of stabilized ES using traditional methods such as empirical approaches and experimental methods is challenging. The use of artificial neural networks (ANN) for forecasting the UCS of stabilized soil has, however, been the subject of a few studies. This paper presents the results of using rigorous modelling techniques like ANN and multi-variable regression model (MVR) to examine the UCS of BA and a blend of BA-lime (BA + lime) stabilized ES. Laboratory tests were conducted for all dosages of BA and BA-lime admixed ES. 79 samples of data were gathered with various combinations of the experimental variables prepared and used in the construction of ANN and MVR models. The input variables for two models are seven parameters: BA percentage, lime percentage, liquid limit (LL), plastic limit (PL), shrinkage limit (SL), maximum dry density (MDD), and optimum moisture content (OMC), with the output variable being 28-day UCS. The ANN model prediction performance was compared to that of the MVR model. The models were evaluated and contrasted on the training dataset (70% data) and the testing dataset (30% residual data) using the coefficient of determination (R2), Mean Absolute Error (MAE), and Root Mean Square Error (RMSE) criteria. The findings indicate that the ANN model can predict the UCS of stabilized ES with high accuracy. The relevance of various input factors was estimated via sensitivity analysis utilizing various methodologies. For both the training and testing data sets, the proposed model has an elevated R2 of 0.9999. It has a minimal MAE and RMSE value of 0.0042 and 0.0217 for training data and 0.0038 and 0.0104 for testing data. As a result, the generated model excels the MVR model in terms of UCS prediction.
Software Engineering Unit 2 Power Point Presentation AKTU Universityutkarshpandey8299
DEVELOPMENT OF SECURE CLOUD TRANSMISSION PROTOCOL (SCTP) ENGINEERING PHASES : MULTILEVEL SECURITY & CRYPTOGRAPHY
1. International Journal on Cryptography and Information Security (IJCIS), Vol. 5, No. 3/4, December 2015
DOI:10.5121/ijcis.2015.5404 33
DEVELOPMENT OF SECURE CLOUD
TRANSMISSION PROTOCOL (SCTP)
ENGINEERING PHASES : MULTILEVEL
SECURITY & CRYPTOGRAPHY
Dinesha H A1
and Dr.Vinod K Agrawal2
1
PhD Student , Dept of ISE, PESIT. Bangalore , India
2
Professor , Dept of iSE, PESIT Bangalore, India
ABSTRACT
Cloud computing technology provides various internet-based services. Many cloud computing vendors are
offering cloud services through their own service mechanism. These mechanisms consist of various service
parameters such as authentication, security, performance, availability, etc. Customer can access these
cloud services through web browsers using http protocols. Each protocol has its own way of achieving the
request-response services, authentication, confidentiality and etc. Cloud computing is an internet-based
technology, which provides Infrastructure, Storage, Platform services on demand through a browser using
HTTP protocols. These protocol features can be enhanced using cloud specific protocol, which provides
strong authentication, confidentiality, security, integrity, availability and accessibility. We are proposing
and presenting the secure cloud transmission protocol (SCTP) engineering phases which sits on top of
existing http protocols to provide strong authentication security and confidentiality using multi-models.
SCTP has multi-level and multi-dimensional approach to achieve strong authentication and multi-level
security technique to achieve secure channel. This protocol can add on to existing http protocols. It can be
used in any cloud services. This paper presents proposed Protocol engineering phases such as Service
Specification, Synthesis, Analysis, Modelling, and Implementation model with test suites. This paper is
represents complete integration of our earlier proposed and published multilevel techniques.
KEYWORDS:
Authentication, Confidentiality, Multi-dimensional, Multi-level, Security, SCTP;
1. INTRODUCTION
A protocol is a set of rules which governs in between two communication ports. Protocol
engineering describes as an application of formal methods and software engineering in the
development of communication protocol. TCP/IP, UDP and HTTP are the major existing
communication protocols used in between communication parties. Many internet communication
and web services are possible with the internet protocol. Cloud computing is an internet service
which provides on demand platforms, storage, infrastructure and related services. It has been
facing many security issues as reported in literature [1-10]. Poor identity and access management
procedures, implementation of poor access control, procedures create many threat opportunities.
Cloud authorization and Authentication issues are reported by TCS Innovation Labs and many
2. International Journal on Cryptography and Information Security (IJCIS), Vol. 5, No. 3/4, December 2015
34
more organizations [1]. HP Labs in 2011 reported demerits on the lack of user control,
unauthorized secondary usage, access, audit and lack of customer trust [2]. Accenture lab in 2011,
reported concerns around cloud access authentication, authorization and access control,
encrypted data communication, multi-device access, multi-level authentications and user identity
management [3]. CA technologies in 2013 raised issues pertaining to identification and
authentication of users’ survey calculation before granting access to cloud information or
infrastructure [4]. Nelson Gonzalez1*, Charles Miers1,4, Fernando Red´ıgolo1, Marcos
Simpl´ıcio1, Tereza Carvalho1, Mats N¨aslund2 and Makan Pourzandi3[5], mentioned regarding
identity and access management, enabling authentication for cloud solutions while maintaining
security levels and availability for customers and organizations. They mentioned the user access,
authentication and privacy as novel concerns [5].
Cloud computing can be improved by specialized security design and security protocol, which
works with existing protocol and activates during cloud transaction to ensure strong
authentication, security and confidentiality. Many cloud authentication protocols were proposed
and used to avoid authentication issues. Kerberos protocol is fruitless with one flaw of replay
attack. The Open ID authentication protocol is luckless in phishing vulnerabilities [6]. O Auth
Protocol reports Kerberos on several aspects and thus has comparable advantages and drawbacks
[6][7]. All these protocols rely on user’s memorable passwords [6]. A zero knowledge
authentication protocol and Sedici 2.0 protocol is used in third party authentication, but it
depends on passwords and authentication [6]. Many cloud protocols have been introduced such as
Gossip protocol [7], Dynamic auditing protocol [8], Access protocol [9], Cloud Fault Tolerance
Protocol [10], Cloud Gossip Protocol for Dynamic Resource Management Agent-Based User
Authentication [11] and Access Control-2013 [12-14]. Many cloud authentication schemes are
proposed in literature such as Graphic Password Authentication [15], Biometric Authentication
[16], Secured Biometric Authentication [16,17], RFID- based authentication [18] and Eid
Authentication [19,20] with their own limitations. Literature study about cloud authentication
issues, security importance, proposed solution demerits motivate us to take an objective of cloud
strong authentication and secure channel to achieve customer trust, privacy, confidentiality and
satisfaction. In this paper, we propose to secure cloud transmission protocol, which works with
existing internet protocols to ensure strong authentication, privacy, customer trust,security and
confidentiality.
Proposed secure cloud transmission protocol (SCTP) has its own communication technique,
technology, algorithms to achieve strong authentication, security and confidentiality [21]. SCTP
may be a solution to the issues reported in literature, such as i) Authenticated Access based on
user types (privileged access rights) ii) Data protection and Integrity iii) Poor identity and access
management procedures,and Implementation of poor access control and procedures. Proposed
SCTP has multi-dimensional password generation and authentication system [22], Multilevel
Authentication technique [23] and Multi-level Cryptography system with Metadata and Lock
Approach for Storing Data in Cloud [24]. This protocol can be further improved with cloud
usage profile- based intruder detection system [25].
Figure 1 presents SCTP phases from requirements specification to Implementation. Different
Phases are: i) SCTP requirements specifications to ensure strong authentication and secure
channel ii) SCTP Service synthesis to make the error- free protocol specification and to
combine multiple protocol specifications into an error- free protocol specification. iii) SCTP
Modelling and specifications to present the exchange sequences, multi-level authentication,
3. International Journal on Cryptography and Information Security (IJCIS), Vol. 5, No. 3/4, December 2015
35
multi-dimensional password, multi-level Cryptography and Finite state machine modelling. iv)
SCTP implementation to take the SCTP specification and develop SCTP software modules. v)
SCTP verification to verify if the SCTP specification actually realizes the SCTP service
specification or not vi) SCTP Validation to check that SCTP specification does not get into
deadlock, unspecified reception, and live lock errors. vii) Conformance testing to test the given
a SCTP specification, generate test-suite for proving complete testing the SCTP functionalities.
Figure 1: SCTP phases
This paper is an integration of earlier proposed and published multilevel authentication,
multidimensional password generation and multilevel cryptography techniques. It is organized in
the following manner: Chapter 2, presents the SCT protocol requirement specification, Chapter 3,
presents SCT protocol synthesis and modelling, Chapter 4 , presents SCT protocol analysis,
Chapter 5, presents SCT protocol implementation modules, Chapter 6, presents SCT protocol
conformance testing. Chapter 7 concludes the paper along with future enhancement.
2. SCT PROTOCOL REQUIREMENT SPECIFICATION AND
SYNTHESIS
This section describes the SCTP requirements specification in cloud computing. Given below are
the two major specifications:
4. International Journal on Cryptography and Information Security (IJCIS), Vol. 5, No. 3/4, December 2015
36
Requirement Specification 1: Strong Authentication
Cloud computing provides on demand storage, infrastructure (Virtual Machines), platforms
(development space) services to customers. The customer may use these services in storing their
confidential data, developing important product codes, designing important software, creating
software environment, testing their products/software, writing research reports and others manual,
etc. Hence, each operation of customers can be considered as confidential. The vendor must make
necessary arrangement in restricting the user operation based on their privileges. It shall not be
accessed and breached by unauthenticated user within and outside the organization. Hence,
authentication and authorization are important service specifications in cloud computing. These
services and operations are only accessible to authenticated organization for its authorized users.
Two important security aspects here are: i) Organization/customer must be authenticated. ii)
Particular user must be authorized to perform the particular operation.
Requirement Specification 2: Secure Channel
The secure channel is an important requirement. Customer data must send or upload in secured
channel. It is possible with cryptographic technique. Customer data must release from the
customer place in a cipher text form. Cloud storage service acts as a container for cipher texts.
The vendor provides only storages to the customer. The vendor may use much better
cryptographic algorithms to store customer data in encrypted form. Though vendor has many
techniques/Service Level Agreements, it is difficult to make customer understand and earn
customer trust and satisfaction. Hence, we recommend customer side encryption to achieve the
secure channel and trust.
We can conclude secure cloud transmission protocol with two important service specifications,
they are: i) Strong Authentication ii) Secure Channel
Figure 2 shows the SCTP service specification in cloud computing services wherein it shows the
major specification described above, along with the different attack scenarios. The requirements
specification is presented in such a way that i) Inside attacker or Unauthorized accesses are to be
restricted, ii) Outside attacker must not be able to break the confidentiality and security iii) Cloud
services must be accessed by authorized customer and specific operation must permit only
authenticate privileged user iv) Data uploading must take place with the only authenticated user
in secure cipher form over secure channel.
5. International Journal on Cryptography and Information Security (IJCIS), Vol. 5, No. 3/4, December 2015
37
Figure 2 SCTP service specification
SCTP string authentication executes while accessing the cloud service. SCTP secure channel
executes while uploading the data to the cloud. Both are independent and can happen parallel.
Hence,the error free protocol specification can be combined in SCTP service specification 1 & 2.
3. SCT PROTOCOL SYNTHESIS AND MODELING
This section describes the SCT protocol synthesis and FSM modelling.
SCT Protocol Synthesis
As described in section 2, Strong authentication and secure channel are the two main requirement
specifications of SCTP. These objectives can be achieved using multi- model structure. Strong
authentication can be achieved using the multi-dimensional password system and multi-level
authentication (MLA) technique which are described in [22] and [23]. Secure channel can be
achieved using multi-level cryptography with Metadata and Lock approach for storing data in the
cloud which is described in [24]. Hence, protocol specification can be derived as i) Multi-level-
Multi-dimensional password (MDP) Authentication and ii) Multi-level cryptography (MLC).
While customer is accessing cloud services like PaaS, IaaS, SaaS and related [26], SCTP must
execute multi-level and multi-dimensional approach. When customer initiates SaaS and related
operations, SCTP must execute multi-level cryptography approach to create secure channel.
6. International Journal on Cryptography and Information Security (IJCIS), Vol. 5, No. 3/4, December 2015
38
SCT Protocol Modelling
Figure 3 shows the finite state machine (FSM) modelling of SCTP.
Figure 4: FSM-SCTP
Figure 3(a)(b) shows the finite state machine for SCTP, finite states derived for both objectives.
Fig 3 (a) shows the authorization and authentication finite state model using multi- level and
multi- dimensional password system. It clearly mentions service usage as final/finite stage and the
attacker is trap state, and remaining as a transition stage. Fig 3(b) shows the secure channel finite
state model using multi-level cryptography.Send/Upload is marked as a final/finite state, stop is
marked as a trap state. Remaining states refer to transition state which indicates the MLC process.
Table 1 represents the state transition table for FSM-SCTP (a) where it shows cloud usage final
state feasible with only valid transition. Table 2, represents the state transition table for FSM-
SCTP (b) which presents secure channel state transition. Algorithm 1
SCTP_STRONG_AUTHENTICATION presents the steps to create strong authentication.
Algorithm 2 SCTP_SECURE _CHANNEL represents steps to achieve the secure channel.
7. International Journal on Cryptography and Information Security (IJCIS), Vol. 5, No. 3/4, December 2015
39
Table 1 state transition table for FSM-SCTP (a)
Current State Input Next State
Generate MDP S Check MDP For
authentication
Authenticate MDP S Enter into MLA
1st
Level Authenticate S Enter Second Level
2nd
Level Authenticate S Enter Nth Level
Nth Level
Authenticate
s Allow for cloud
usage
Any above state Fail Consider as
attacker/misbehave
Table 2 state transition table for FSM-SCTP (b)
Current State Input Next State
Metadata Yes Cryptography
Cryptography Yes Lock
Lock Yes Send/Upload
Any above state No Stop Sending/SaaS
Algorithm 1: SCTP_STRONG_AUTHENTICATION
Input: Image1..n, Text1..n, MDPi
Output : D, SaaS, PaaS, IaaS
Step 1: Cloud connection establishment between vendor and customer over internet
CV
Step 2: Generate Multi-dimensional password system using multi- format inputs for
multiple levels
K1 MDP_Generation (Image1, Text1, Image n, Text n) /*To detect outside
attacker*/
K2 MDP_Generation (Image1, Text1, Image n, Text n) /*To detect inside
attacker*/
KnMDP_Generation (Image1, Text1, Image n, Text n) /*To ensure access
privileges and grant access*/
MDP_Generation (Image1, Text1, Imagen, Textn)
{
//Arithmetic/Logic Operation for input Images
If (Imges number > 1) then
Img_Opn= Airthmatic_Logic(Image1,Image2..Imagen)
//Extract Features of final image after arithmetic or logic operation i.e Img_Opn
ImageFeature= Extract Features (Img_Opn)
8. International Journal on Cryptography and Information Security (IJCIS), Vol. 5, No. 3/4, December 2015
40
// Combine all text inputs in random way
If(texts_number>1) then
PasswordText= RandomMix(Text1,Tex2,..Textn)
// Combine final text and final features of image
MDP=Combined _File (ImageFeature, PasswordText)
Return MDP
}
Step 3: Allow to enter MDP input, Check entered MDP input against Generated MDP
data base i.e K1, K2,K3..Kn
Initialize j1
Repeat the below steps until j=n
MDPi Entered MDP Input
IF MDPi=Kj THEN
Then jj+1
ELSE
FlagJ
Go to Step 4
END IF
Go to Step 5
Step 4: Analyze the flag value
Switch (Flag)
case 1:
DTrigger True positive and display outside attack;
break;
case 2:
D Trigger true positive and display inside attacker;
break;
case n:
D Trigger true positive and display misused privileges;
End Switch
Try again! Go to step 3
Step 5: Allow accessing cloud services and performing intending operations.
Confirm Concatenated MDPi (1,2….n) = Concatenated (K1,K2…Kn)
Then CSaaS, PaaS, IaaS
Algorithm 2: SCTP_SECURE _CHANNEL
Input: plain data Pd
output: cipher data Cd
Step 1: Start Multilevel cryptography executes metadata, encryption and end with lock
Md Metadata (Pd)
9. International Journal on Cryptography and Information Security (IJCIS), Vol. 5, No. 3/4, December 2015
41
Repeat below step till all encryption level completes
EdEncrypt (Md, Key)
CdLock(Ed)
Step 2: Send, upload to cloud SaaS
IF (Cd)) THEN
SaaSCd
ELSE
Goto Step 1
End
Step 3: While retrieving Cd, MLC executes Unlock, Decrypt, Reverse Metadata
EdUnlock (Cd)
Repeat below step till all decryption level completes
MdDecrypt(Ed,Key)
Pd~Metadata (Md)
Step 4: End of Multi-level cryptography
SCTP Verification & Validation
The above FSM, transition and algorithms verify and confirm the requirements specification of
strong authentication and secure channel discussed in section 2. MDP-MLA and MLC techniques
are applied, modelled in wireless sensor-cloud integration using an ant colony routing algorithm
using Petri-nets theory [27][28].
SCTP Validation against deadlock: Deadlock occurs, when processes chain waits for some
action to occur, when resources are occupied and not released and when complex and parallel
action takes place. SCTP MLA, MDP and MLC functionalities are designed to happen one after
another,no resources and inputs are shared, no parallel action takes place as it travels from level
to level, hence there will be no deadlock. This issue has been taken care of. The unspecified
reception isn’t happening due to protocol design consideration for internal fixed levels and inputs
from a specific limited user. The unspecified reception issue is incorporated.
SCTP Validation against live lock: Livelock is a special case of resource starvation. In SCTP,
we can correlate livelock resource starvation for MDP input/process, MLA movement and
MLC data/process. MDP-MLA occurs in sequence from level to level. No parallel level executes
at a time. MLC designed in an independent way in sequence, hence livelock issue may not occur.
4. SCT PROTOCOL ANALYSIS
This section analyzes the SCTP protocol MDP password strength for MLA authentication. It
analyses secure channel and its performance by creating attacker, unauthorized user scenarios.
10. International Journal on Cryptography and Information Security (IJCIS), Vol. 5, No. 3/4, December 2015
42
Applying set theory for analyzing MDP in MLA, let us assume 3 inputs for MDP generation and
3 levels like L1, L2 and L3 for authentication. MDP generation takes both images (img1, img2,..
Imgn) and texts (text1, text2 ..textn) passwords. The universal sets U = ( img1, img2, img3,
img4, img5, text1,text2,text3,text4} can be declared to handle 3 MDP in 3 MLA. The
corresponding sub sets for eack level are derived below:
L1= {img1, img2, text1}
L2= {img3, text2, text3}
L3= {img4, img5, text4}
Then, the venn diagram is as in figure 4
Figure 4: MDP_MLA Venn diagram
MLA=Concatenate (MDP (L1), MDP (L2),MDP (L3)) //Final authentication for accessing the
service.
Refer to MDP MLA venn diagram 4 figure, MDP confidential inputs for different levels are
different in nature, L1,L2 and L3 are considered as disjoint sets. ……..1
Refer to universal sets the U can be
U = L1 U L2 U L3 & Null = L1 ∩ L2 ∩ L3
Then
Number of sample space (total confidential data) can be defined as number of onfidential inputs
at each individual levels L1, L2 and L3 as defined below:
n(s) = n(L1 U L2 U L3)=n (L1) + n(L2) +n(L3)
Number of confidential data required to break the system is n(s).
We used probability theory to analyze SCTP features and estimates the probability of breaking.
Probability models can greatly help system in optimizing multi- mode levels and making safe
decisions to have proved MLD MDP and MLC.
Since it is disjoint and algorithm, designed to not to occur simultaneously, L1, L2, L3…..Ln is
considered as a mutually exclusive event.
AI, A2, • • • , An is a finite sequence of mutually exclusive events in S (A; n Aj = 0 for i'#: j),
then probability to break the system ‘p’ can be derived as below:
L1 L2 L3
11. International Journal on Cryptography and Information Security (IJCIS), Vol. 5, No. 3/4, December 2015
43
,
Probability to break each level is P(Ai), levels may go up to ‘∞’. ‘p’ can be probability of
breaking the complete system.
Now, to analyze the probability to get successful three inputs to break each level using brute force
or dictionary attack which contain ‘n’ guessed inputs. Analyze the probability to get successful
n(L1UL1UL3) in a guessed ‘m’ dictionary or brute force lists. The derivation after applying the
law of probability formula for MLA_MDP. Probability of breaking event E can be defined as
probability of levels P(L1), P(L2)… P(Ln) breaking .
P(E)=P(L1)P(E/L1) + P(L2)P(E/L2)+ P(L3)P(E/L3)….. P(Ln)P(E/Ln)
Probability of breaking each level with ‘n’ confidentiality input breaks is referred as p(Ak/E). It
can be defined using Bayes theorem as below:
for n=1,2,3..n levels,
P(An|E)= P(An)P(E|An)
----------------------
P(E)
P(An)P(E|An)
----------------------------------------------
P(L1)P(E/L1) + P(L2)P(E/L2)+ P(L3)P(E/L3)…P(Ln)P(E/Ln)
Above Bayes theorem expression proves that probability of breaking proposed MLA system i.e
P(An/E) depends on the attacker success on each levels, i.e L1, L2, .. Ln i.e on P(L1)P(E/L1) ,
P(L2)P(E/L2), P(L3)P(E/L3)…P(Ln)P(E/Ln) events. Hence, it proves the criticality of breaking
confidential inputs.
Analyzing the Strength of Multi-dimensional Password
The National Institute of Standards and Technology (NIST) password meter tries to estimate the
entropy of a password mainly based on their length. A password strength meter is a function i.e
f= R, that takes as input a string (or password) x over an alphabets ∑ and outputs a number
s, a score, which is a measure of the strength of string x as a password. The output is, in general, a
real number indicating the password strength.
Consider currently using normal textual password length L, from a set of N possible symbols.
The number of possible passwords can be found by increasing the number of symbols to the
power L, i.e. NL
. Increasing either L or N will strengthen password. The strength of a random
password can be measured by the information entropy is just the base-2 logarithm or log2 of the
number of possible passwords. Assuming each symbol in the password is produced
independently, a random password's information entropy, H, is given by the formula as below:
Where, N is the number of possible symbols, L is the number of symbols in the password. H is
measured in bits. In MDP inputs such as images, texts and operations gives increased N and L
which results in increased strength compared to textual passwords.
12. International Journal on Cryptography and Information Security (IJCIS), Vol. 5, No. 3/4, December 2015
44
The strength of a password is the amount of work an adversary needs to break the password.
Consequently, the optimal strategy for an attacker is to guess passwords in increasing order of
strength and decreasing order of probability, i.e., more likely passwords are tried before less
likely ones. This also motivates the definition of guessing entropy, which gives the average
number of passwords an attacker has to guess before finding the correct one. Let X be a random
variable with finite domain D and P(X = di) = pi, ordered with decreasing probabilities pi < pj for
i < j. The guessing entropy G(X) is defined as Equation 1 = G(X)
An Ideal Password Strength Meter Definition 1
Let us fix probabilities P:∑* [0 1] on the space of passwords (i.e., strings over a certain
alphabet). An ideal password checker f(x) is given by the function f(x) = -log(P(x)). We denote
this password strength meter as “ideal”, as the order which is given by this function is the same as
the order with which passwords are guessed in an optimal guessing attack. Consequently, the
following two functions f’(x) = 1=P(x) and f’’(x) = RP (x) also constitute ideal password
checkers, where RP (x) is the rank of x according to the distribution P, i.e., if the probabilities pi
= P(xi) are ordered with pi < pj for i < j, then RP (xi) = i.
An adaptive password strength meter (APSM) proposed in [29] f (x, L) is a function f:∑*(x∑*)k
R, that takes a string (or password) x over an alphabet ∑ and a password file L containing a
number of passwords as input and outputs a score S. Password database L contains a number of
Passwords sampled from the same distribution, and the task of the password strength meter is to
estimate the strength of the password x based on his estimation of P [29].
Over the last years, Markov models have proved to be very useful for computer security in
general and for password security in particular. For example, Narayanan et al. [29] showed the
effectiveness of Markov models to password cracking [29].
For breaking the password:
f(c) = -log2(πmi=1 P(ci|ci-n+1,…ci-1))
MLA-MDP password generated in multi-level with combinations of special and alphanumerical
characters in more than 30 characters. The generated password in the above equation, proves
MDP strength.
Strong Authentication
The multi-dimensional password generation system uses multiple inputs to generate password
and generated password is used in authenticating the user in multiple levels. Hence, to analyze the
proposed protocol authentication and security, we used probability theory. Below section presents
the (a) probability of breaking the MDP-MLA authentication and getting strong authentication
and (b) probability of breaking MLC security and getting secure channel. We compare our work
to three different password checkers that are widely used today- the NIST, Google and Microsoft
13. International Journal on Cryptography and Information Security (IJCIS), Vol. 5, No. 3/4, December 2015
45
password checkers. They were chosen because of their popularity and because they are
representative for the techniques employed currently for password strength meters.
(a). Probability of breaking the authentication
To break the MDP-MLA system one should know, all the ‘N’ confidential inputs to create MDP’s
for the all the ‘M’ levels. MDP=1,2…N MLA = 1,2,… M. Hence, the probability of breaking by
identifying N inputs in M levels is found. Probability of breaking MDP-MLA can be P (B)/P(S)
= i.e 1/2N
/M = for N=4 and M=4 the result will be => 0.015625.
Below table 3 executes the proposed authentication with different M inputs and N values.
Table 3: Authentication with different inputs and levels
Values Meaning
Formula
Result
Conclusion
N=0 M=0 No security 1 Certain to break
N=1 M=1 Single input password for only 1 level 0.5 Chance to break
N=2 M=2 Two input password for 2 levels 0.125 Difficult to break
N=3 M=3 Three input password (MDP) for 3 levels 0.0416 Unlikely to break
N=4 M=4 Four input password (MDP) for 4 levels 0.015625 Strong Authentication
Figure 4: MDP-MLA Strong authentication
Figure 4, represents the strong authentication with increased inputs and levels. MDP MLA
achieves strong authentication as the number of inputs and levels increases. Initial M=N=0 value
creates zero authentication, M=N=1 generates weak system, M=N=2 produces an average system,
M=N=3 and 4 creates a strong authentication system. MDP_MLA system is stronger than single
level authentication or 2 levels with single/double input password. It cannot be broken with
dictionary and other brute force and similar attacks.
14. International Journal on Cryptography and Information Security (IJCIS), Vol. 5, No. 3/4, December 2015
46
EXPERIMENTATION & DISCUSSION
Case Study Example: Consider a university ‘X’ as a customer for keeping all its affiliated
college’s student’s admission, examinations, marks card and other related data. The huge
student’s information cannot be maintained in single PC or server. Cloud Storage service can be
used for best repository. It may be private or public cloud storage service. Let us take marks card
data as a sensitive data which should not modify or update by unauthenticated user. A single
password authentication, biometric, smart card, single level authentication cannot be used to
access the marks card storage as it may breach confidentiality. Confidentiality cannot be depend
on single person and privileges. So let us, introduce multi-level and multi-dimensional password
authentication system which authenticates users in multiple levels and authorizes access
privileges for university marks card storage.
MDP authentication for accessing cloud services such as Storage as a service could be the best
solution to authenticate and authorize the user. Using multiple authentication, in a first level/Top
level, Vice chancellor/University Head authenticates the cloud services, In second level
Examination, head authenticates second level for accessing the data inside the department, third
level (may be bottom level) is used to authenticate and authorize privileges to perform a
particular operation. At each Level, MDP techniques take place. Generated MDP has to be tested
in multiple levels. MDP generator uses images and texts combination. Images may be university
unique logo, Individual signature in image form, Seal etc. Text may be confidential textual inputs
like password, university name and etc.
Experiment: Assuming the number of levels is 3, multi-level and multi-dimensional
inputs are 3 in each level, image arithmetic and logic operation as add, random mix
function for texts, Consider the table below and let us do the operation.
Discussion:
Since images are defined by company individuals, Image size, RGB, Pixel and other image
factors are difficult to guess. Even if a hacker breaks for single image, they will have multiple
image challenges along with textual passwords to break. Assuming the successful hacking of all
MDP inputs, the hacker will face the challenge of breaking multiple levels. Hence, single hackers
and system cannot do this. Brute force attack and dictionary attack can identify the textual
passwords, not images, even with further improvements of attack breaking the images multilevel
break cannot be done.
Experimentation
Assuming a number of levels and number of inputs to MLA MDP is 3, Image operation is
multiplication and table below is assumed confidential data, then the concatenated password
obtained in all three levels is described below:
15. International Journal on Cryptography and Information Security (IJCIS), Vol. 5, No. 3/4, December 2015
47
Sl No Level Assumed confidential Inputs Algorithm output
1 First X logo, VC Sign, “x@qwerty” Kjhbdd987e68e6ghjbsdkjhgj
2 Second Exam section seal, Registrar sign, “X@123” J90823020sdgj@#%^&(*&^%
d
3 Third Sign , secrete code ig, “ex@m123” #$^&(hgjhkhjkdsk80i908
Kjhbdd987e68e6ghjbsdkjhgj_J90823020sdgj@#%^& (*&^%d_#$^&(hgjhkhjkdsk80i908 will
be final password(concatenation of above three levels)
(b). Probability of breaking the security
MLC is described in [24]. Table 4 below shows the experimental of MLC with N=1,2,3,4 values
and its corresponding meaning, result with suitable conclusion. Figure 5 presents fully secure
channel as increased level with differing techniques.
Table 4: Secure channel with MLC
Values Meaning P(B)/P(S)=1/2N= Formula
Result
Conclusion
N=0 No security 1 certain unsecure channel
N=1 Single level encryption 0.5 Chance to make it unsecure
N=2 cryptography with lock 0.25 Difficult to unsecure
N=3 cryptography, lock and metadata 0.125 Unlikely to unsecure
N=4 2level cryptography , lock and metadata
0.0625 Fully secure channel
Figure 5: MLC Secure Chanel
Comparison of multi-level authentication with single level authentication when brute force
attacks and dictionary attacks happen for 10 to 10000 times. Shown below is the derived formula
to compare single level attacks and multilevel attacks for 10 - 10000. N times [24], where,
n=number of times attacks, j = number of success, p = probability of success in each
try .The comparison graph is shown in figure 6.
16. International Journal on Cryptography and Information Security (IJCIS), Vol. 5, No. 3/4, December 2015
48
Figure 6: comparison graph between single and multilevel
5. SCT PROTOCOL IMPLEMENTATION MODULES
This section describes SCTP implementation modules. In software engineering, UML class
diagram is very well used to represent the system before actual software development. Hence, we
use a class diagram to represent the SCTP implementation modules. Class diagram describes a
SCTP object that shares the same attributes, operations, relationships, and semantics.
Figure 7: SCTP class diagram
10to10000attcks
Probability of breaking single and multi level(3)
0
1
17. International Journal on Cryptography and Information Security (IJCIS), Vol. 5, No. 3/4, December 2015
49
Figure 7 shows the SCTP class diagram where major modules of the protocol are presented as
classes. SCTP is the main class which has MDP, MLA and MLC as subclasses. SCTP attributes
are derived from sub classes called constructors. Each constructor initiates the class objects to
perform the MDP, MLA and MLC operations.
6. SCT PROTOCOL CONFORMANCE TESTING
This section describes the SCTP testing suites, which confirm the requirement of SCTP. It also
presents verification and validation test cases for SCTP. It describes the major positive, negative
and security test cases required to test protocol. Basic functionality verifications, testing with
negative values and security test have been done. Test cases are derived from major
functionalities of SCTP i.e MLC, MDP and MLC. Hence, completeness of test cases can be
confirmed by Table 5,containing 20 major test cases. It tests the SCTP MDP, MLA and MLC
functionalities. Test cases prefixed with MDP refer to MDP basic functionalities. Test cases
prefixes with MLA refer to MLA basic functionalities. Test cases prefixed with MLC refer to
MLC basic functionalities. Hence, it confirms the complete SCTP Testing.
Table 5: SCTP functionality test cases
Sl.No# Test Case And Type Description Expected Result
1. MDP_GENERATE , ‘+’ve MDP operation to
generate MDP
The function should
create MDP password
by taking confidential
inputs.
2. MDP_AUTHENTICATE, ‘+’ve MDP operation to
authenticate MDP
The function must
authenticate the given
password with MDP
password
3. MLA_LEVEL_MOVE, ‘+’ve MLA operation to
move the levels
Levels should move to
its inner level as MDP
authenticates
4. MLA_PASSWORD_FLOW, ‘+’ve PF operation to carry
passwords from one
level to the next level
The password should
carry to its lower level
when successfully
authenticates happens
at a higher level.
5. MLA_ALLOW_ACCESS_ATEND,
‘+’ve
Allow operation to get
successful access
After clearing all levels
with a valid password,
user must be able to
access the service
6. MLC_CREATE, ‘+’ve MLC operation to
create secure channel
Must create a secure
channel by generating
cipher texts
7. MDP_NO_INPUT, ‘-‘ ve Test with no inputs
and random texts
It should be able to
generate an error
message to get
confidential inputs
8. MLA_NULL_AUTHENTICATE, ‘-‘
ve
Test with null It should not
authenticate the null
18. International Journal on Cryptography and Information Security (IJCIS), Vol. 5, No. 3/4, December 2015
50
password and must
trigger an error
message
9. MLA_NULL_PASSWORD_LEVEL
MOVEMENT, ‘-‘ ve
Test to move levels
with null value
No level should move
when null MDP enters
10. MLA_INVALID_INPUTS, ‘-‘ ve Test with random
invalid inputs
Must notify the vendor
and customer about
invalid input try ( true
positive)
11. MLA_DIRECT_LEVEL_JUMP,
security
Test to jump to lower
level directly
Must not allow to jump
lower levels and trigger
true positive
12. MLC_DIRECR_LEVEL_JUMP
security
Test to jump higher
levels directly
Must not allow for
higher level operation
and trigger true
positive
13. MLA_ZERO_LEVEL
‘-‘ ve
Test with 0 value for
in MLA
Should generate error
message to initiate
MLA levels when it is
zero
14. MLC_ZERO_LEVEL, ‘-‘ ve Test with 0 value in
MLC
Should generate error
message to initiate
MLC levels when it is
zero
15. MLC_NO_METADATA, ‘-‘ ve Test with 0
METADATA value
Should generate error
message to initiate
MLC Metadata when
it has no value
16. MLC_NO_LOCK_KEY, ‘-‘ ve Test with no lock key
and unlock key
Should generate error
message to initiate
MLC lock/unlock key
when it has no value
17. MLC_ NO_CRYPTO_KEY, ‘-‘ ve Test with no
encryption/decryption
key
Should generate error
message to initiate
MLC crypto key when
it has no key value
18. MLC_LOCK_UNLOCK, ‘+’ ve LOCK/UNLOCK
operation for locking
and unlocking files
MLC LOCK and
Unlock operation must
execute properly
19. MLC_METADATA, ‘+’ ve Operation to
arrange/rearrange data
The MLC Metadata
operation must arrange
/ rearrange properly.
20. MLC_RM_CRYPTOGRAPHY
Cancel, security
Test to remove MLC
operation for ML
cryptography
MLC cryptography
must create an error
message and trigger
true positive
19. International Journal on Cryptography and Information Security (IJCIS), Vol. 5, No. 3/4, December 2015
51
7.CONCLUSION AND FUTURE ENHANCEMENT
Secure cloud transmission protocol can be used in a cloud computing, transaction where the
strong authentication and secure channel are the mandatory requirements from the customer. It
can be used as add on to the existing HTTP protocol. SCTP achieves strong authentication by
means of MDP_MLA system. SCTP achieves secure channel by means of MLC. This protocol
solves access rights, authentication, privilege, access, authorization, privacy , confidential issues
and achieves customer trust and satisfaction. SCTP is also a solution to brute force attacks,
dictionary attack, phishing attack and it provides strong security. This protocol can be enhanced
by adding usage profile- based intruder detection and prevention system. This paper can be
further enhanced with detailed investigation, comparisons, usefulness and advantages of proposed
techniques.
ACKNOWLEDGMENT
Our sincere thanks to Prof. K N B Murthy, Principal and Prof. Shylaja S S, HOD, Department of
Information Science and Engineering, PES Institute of Technology, Bangalore, for their constant
encouragement.
REFERENCES
[1] Security and Privacy Issues in Cloud Computing, Innovation Labs, Jaydip Sen, Tata Consultancy
Services Ltd., Kolkata, INDIA,2011-13.
[2] Cloud and Security Research Lab HP Labs Privacy, Security and Trust Issues Arising from Cloud
Computing, Siani Pearson and Azzedine Benameur, 2nd IEEE International Conference on Cloud
Computing Technology and Science, 978-0-7695-4302-4/10,693-792.
[3] Accenture Technology Labs, Accenture Bangalore, India, Cloud Computing Security - Trends and
Research Directions, Shubhashis Sengupta, Vikrant Kaulgud, Vibhu Saujanya Sharma, 2011 IEEE
World Congress on Services, IEEE computer Society,978-0-7695-4461-8/11,524-531.
[4] Ponemon Institute, Security of Cloud Computing Users Study, CA Technologies Independently
conducted by Ponemon Institute, LLC Publication Date: March 2013
[5] A quantitative analysis of current security concerns and solutions for cloud computing, Nelson
Gonzalez1*, Charles Miers1,4, Fernando Red´ıgolo1, Marcos Simpl´ıcio1, Tereza Carvalho1, Mats
N¨aslund2 and Makan Pourzandi3, springer , Gonzalez et al. Journal of Cloud Computing: Advances,
Systems and Applications 2012, 1:11
[6] Security Analysis of Authentication Protocols for Next-Generation Mobile and CE Cloud Services,
Slawomir Grzonkowski and Peter M. Corcoran, Thomas Coughlin, 2011 IEEE International
Conference on Consumer Electronics - Berlin (ICCE-Berlin), 978-1-4577-0234-1/11, 83-87.
[7] A Gossip Protocol for Dynamic Resource Management in Large Cloud Environments, Fetahi Wuhib,
Rolf Stadler, and Mike Spreitzer, IEEE TRANSACTIONS ON NETWORK AND SERVICE
MANAGEMENT, VOL. 9, NO. 2, 1932-4537, 213-225,June-2012.
[8] An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing, Kan
Yang, Xiaohua Jia, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS,
VOL. 24, NO. 9, SEPTEMBER 2013, 1717-1726.
[9] Access Protocols in Data Partitioning Based Cloud Storage, Yunqi Ye, Liangliang Xiao, Yinzi Chen,
I-Ling Yen, Farokh Bastani , Ing-Ray Chen, 2013 IEEE Sixth International Conference on Cloud
Computing, 978-0-7695-5028-2/13, 398-397, 2013.
[10] A Collaborative Fault-Tolerant Transfer Protocol for Replicated Data in the Cloud,IEEE transaction,
Nader Mohamed and Jameela Al-Jaroodi, 978-1-4673-1382-7/12, 203-210, 2012.
20. International Journal on Cryptography and Information Security (IJCIS), Vol. 5, No. 3/4, December 2015
52
[11] Applying an Agent-Based User Authentication and Access Control Model for Cloud Servers, Mostafa
Hajivali , Faraz Fatemi Moghaddam , Maen T. Alrashdan , Abdualeem Z. M. Alothmani , ICTC
2013, 978-1-4799-0698-7/13, 807-902,2013.
[12] “Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing,” Q.
Wang, C. Wang, K. Ren, W. Lou, and J. Li, IEEE Trans. Parallel Distributed Systems, vol. 22, no.
5,pp. 847-859, May 2011.
[13] “Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing,”, C. Wang, Q.
Wang, K. Ren, and W. Lou, Proc. IEEE INFOCOM, pp. 525-533, 2010
[14] Authentication and secured execution for the Infrastructure-as-a-Service layer of the Cloud
Computing model, Laurent Hubert, Renaud Sirdey, 2013 Eighth International Conference on P2P,
Parallel, Grid, Cloud and Internet Computing, 978-0-7695-5094-7, 291-296, 2013.
[15] Authentication Using Graphical Password in Cloud, Ming-Huang Guo, Horng-Twu Liaw, Li-Lin
Hsiao, Chih-Ta Yen, 177-181, 2013.
[16] A secure biometric-based authentication scheme using smart card,IEEE, H. B. Tang*, Z. J. Zhu, Z.
W. Gao, Y. Li, 39-43,2013.
[17] “Analysis and improvement on an efficient biometric-based remote user authentication scheme using
smart cards”, A. K. Das. IET Information Security, 5 (3), pp. 145-151, 2011.
[18] Cloud-based RFID Authentication, Wei Xie1, Lei Xie2, Chen Zhang1, Quan Zhang1, Chaojing
Tang1, 2013 IEEE International Conference on RFID, 978-1-4673-5750-0/13,168-175, 2013.
[19] secure cloud authentication using eids, bernd zwattendorfer, arne tauber, proceedings of ieee
ccis2012, 978-1-4673-1857-0/12/, 397-401, 2012.
[20] A User Identity Management Protocol for Cloud Computing Paradigm Safiriyu Eludiora1, Olatunde
Abiona2, Ayodeji Oluwatope1, Adeniran Oluwaranti1, Clement Onime3,Lawrence Kehinde
apered in Int. J. Communications, Network and System Sciences, 2011, 4, 152-163
[21] “Framework Design of Secure Cloud Transmission Protocol”, Dinesha H A, Dr. V. K Agrawal, IJCSI
International Journal of Computer Science Issues, Vol. 10, Issue 1, No 1, January 2013, ISSN (Print):
1694- 0784 | ISSN (Online): 1694-0814,74-81.
[22] “Multi-dimensional Password Generation Technique for accessing cloud services”, Dinesha H A, Dr.
V. K Agrawal, Special Issue on: "Cloud Computing and Web Services", International Journal on
Cloud Computing: Services and Architecture (IJCCSA), Vol.2, No.3, June 2012, 31-39.
[23] “Multi-level Authentication Technique for Accessing Cloud Services”, Dinesha H A,
Dr.V.K.Agrawal, IEEE International Conference on Computing, Communication and Applications
(ICCCA-2012), Dindigul, Tamilnadu, India, 22-24 February 2012, 978-1-4673-0270-8, 1 – 4.
[24] “Multilevel Cryptography with Metadata and Lock Approach for Storing Data in Cloud”, Dinesha H
A, Dr.V.K Agrawal, Springer Journal of Cryptographic Engineering (JCEN) (submitted).
[25] “Usage Profile Based Intruder Detection System for accessing cloud service”, Dinesha H A, Dr.V.K
Agrawal, Transactions on Networks and Communications, Volume 2, Issue 6, 10.14738/tnc.26.590.
Dec 2014.
[26] “Cloud Computing – Phone Call as a Service: A Concept”, Ms. R Monica, Mr.Dinesha H.A,
Prof.V.K Agrawal, to IEEE Internl.. Conference on Advances in Computing, Communications and
Informatics (ICACCI-2013), 978-1-4799-2432-5, 13861185, 22-25 Aug. 2013, 236 – 242.
[27] “Wireless Sensor-Cloud Integration Using Ant Colony Routing Algorithm”, R. Monica, Dinesha H A,
Dr.V.K Agrawal, International Conference on cloud computing and service engineering
(CLUSE2012), held at Raja Rajeshwari College of Engineering & KINGSTON, UK, 11-13 April
2012, 294-298, Received Best Paper Award, Referred to ISEEC Journal.
[28] “Formal Modeling for Multi-Level Authentication in Sensor-Cloud Integration System”. Dinesha H
A, R Monica and V.K. Agrawal. International Journal of Applied Information Systems 2(3) (IJAIS)
Published by Foundation of Computer Science, New York, USA, May 2012, 16-21.
[29] Adaptive Password-Strength Meters from Markov Models, Claude Castelluccia, Markus D¨urmuth,
Daniele Perito.