Wednesday, September 25, 2019

APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE ACCESS CONTROL IN THE CLOUD


Abu Salim1, Sachin Tripathi2 and Rajesh Kumar Tiwari3



 1Department of Computer Science, College of CS & IT, Jazan University, Jazan,
Kingdom of Saudi Arabia (KSA)
2Department of Computer Science Engineering, Indian Institute of Technology, 
Dhanbad, Jharkhand, India
3Department of Computer Science and Engineering, RVS College of Eng. & Tech.,Jamshedpur, Jharkhand, India 

Abstract 

Cloud computing is utility-based computing provides many benefits to its clients but security is one aspect which is delaying its adoptions. Security challenges include data security, network security and infrastructure security. Data security can be achieved using Cryptography. If we include location

information in the encryption and decryption process then we can bind access to data with the location so that data can be accessed only from the specified locations. In this paper, we propose a method based on the symmetric cryptography, location-based cryptography and ciphertext policy – Attribute-based encryption (CP-ABE) to implements secure access control to the outsourced data. The Symmetric key is used to encrypt that data whereas CP-ABE is used to encrypt the secret key and the location lock value before uploading on the server. User will download encrypted data and the symmetric secret key XORed with the Location Lock value, using his attributes based secret key he can obtain first XORed value of Symmetric secret key and location lock value. Using anti-spoof GPS Location lock value can be obtained which can be used to retrieve the symmetric secret key. We have adopted Massage Authentication Code (MAC) to ensure Integrity and Availability of the data. This protocol can be used in the Bank, government organization, military services or any other industry those are having their offices/work location at a fixed place, so data access can be bounded to that location.

Keywords 

Cloud Computing, Secure Access Control, Security issues, Cryptography, Geo Encryption, Attribute-Based Encryption, CP- ABE.
                                                                  

                                                  Full Text

Wednesday, September 11, 2019

LATTICE STRUCTURAL ANALYSIS ON SNIFFING TO DENIAL OF SERVICE ATTACKS


B.Prabadevi1 , N.Jeyanthi1 , Nur Izura Udzir2 and Dhinaharan Nagamalai3
 1 School of Information Technology and Engineering, Vellore Institute of Technology, Vellore, India
2Department of Computer Science, Universiti Putra Malaysia, Malaysia

3Wireilla Net Solutions, Australia

Abstract 

Sniffing is one of the most prominent causes for most of the attacks in the digitized computing environment.Through various packet analyzers or sniffers available free of cost, the network packets can be captured and analyzed. The sensitive information of the victim like user credentials, passwords, a PIN which is of more considerable interest to the assailants’ can be stolen through sniffers. This is the primary reason for most of the variations of DDoS attacks in the network from a variety of its catalog of attacks. An effective and trusted framework for detecting and preventing these sniffing has greater significance in today’s computing. A counter hack method to avoid data theft is to encrypt sensitive information. This paper provides an analysis of the most prominent sniffing attacks. Moreover, this is one of the most important strides to guarantee system security. Also, a Lattice structure has been derived to prove that sniffing is the prominent activity for DoS or DDoS attacks. 

Keywords 

Sniffing, Sensitive Data, Intrusion Detection, DDoS, Lattice Structure;

                                                                  

                                                  Full Text

Tuesday, September 3, 2019

A FRACTAL BASED IMAGE CIPHER USING KNUTH SHUFFLE METHOD AND DYNAMIC DIFFUSION


Shafali Agarwal
  
Plano, Texas 75025, USA  

Abstract 

This paper proposes a fractal-based image encryption algorithm which follows permutation-substitution structure to maintain confusion and diffusion properties. The scheme consists of three phases: key generation process; pixel permutation using the Knuth shuffle method; and the dynamic diffusion of scrambled image. A burning ship fractal function is employed to generate a secret key sequence which is further scanned using the Hilbert transformation method to increase the randomness. The chaotic behavior of the fractal strengthens the key sensitivity towards its initial condition. In the permutation phase, the Knuth shuffle method is applied to a noisy plain image to change the index value of each pixel. To substitute the pixel values, a dynamic diffusion is suggested in which each scrambled pixel change its value by using the current key pixel and the previously ciphered image pixel. To enhance the security of the cryptosystem, the secret key is also modified at each encryption step by performing algebraic transformations. The visual and numerical analysis demonstrates that the proposed scheme is reliable to secure transmission of gray as well as color images.

Keywords 

Burning ship fractal, Knuth shuffle method, Image encryption, Hilbert transformation, dynamic diffusion
                                                                  

                                                  Full Text