Browse Items (11855 total)
Sort by:
-
Secure key exchange scheme: A DNA computing-based approach to resist MITM in DHKE
Diffie-Hellman key exchange (DHKE) protocol was a pioneering work and considered as a new direction in the field of cryptography though it is not an encryption protocol. DHKE is a method to exchange the keys securely, based on the discrete logarithm problem. It has applications in internet security protocols including SSL, IP Sec and SSH. The major issue with DHKE is its vulnerability to man in the middle attack (MITM). Various techniques have been proposed to resist the MITM including digital signatures. This paper proposes DNA computing-based encryption techniques to resist MITM in DHKE. DNA cryptography builds on the concepts of biomolecular computations which are considered as one of the emerging directions in the cryptography. The proposed methodology also includes an encryption technique based on DNA-based codebook, secret sharing and DNA cryptography to exchange parameters securely. The security analysis of the proposed scheme is evaluated by theoretical analysis. Formal analysis of the proposed protocol is done using Scyther and all the modelled claims are validated and positive results are obtained. Copyright 2021 Inderscience Enterprises Ltd. -
Secure Image Transmission Scheme based on DNA Sequences
Cryptography and steganography are the most widely utilized and adopted fields of secure data communication. Data transfer can be secured using a combination of these methods. The data is transmitted from sender to receiver using cryptography, the most secure method. At the same time, steganography performs the information hiding in the form of video, image, or text within a cover image. The sensitive data is hidden, so it is not visible to the human eye. The data is stored and transferred more securely by adding DNA technology to the cryptography. It provides additional data security level and is most commonly employed to implement computation. This research developed a new method for combining cryptography with steganography. There are two phases to the proposed method: image encryption and hide phases and image extraction phases. Encryption is done by using the Signcryption algorithm. Four standard images were utilized as test material for the evaluation. Four factors are used to determine the performance of the proposed method as Peak signal-to-noise ratio (PSNR), Mean Square Error, Entropy, and Structural Similarity Index Measure (SSIM) for hiding and extracting the messages. The implementation is done in python. The proposed method achieves better performance when compared to the previously published works. 2022 Seventh Sense Research Group -
Secure image retrieval and classification framework for IOT based healthcares systems using deep neural networks /
Patent Number: 202241035066, Applicant: Dr.S.Balamurugan.
Deep Learning has shown promising results in the domain of Medical Image Analysis and Image Processing. Proposed is a secure image retrieval and classification framework for IoT based healthcare systems using Deep Neural Networks. The problem of solving the error introduced by adversarial noise is considered. Back Propagation Algorithm is employed for Segmentation (localization) as well as error prediction and detection. -
Secure image retrieval and classification framework for IOT based healthcares systems using deep neural networks /
Patent Number: 202241035066, Applicant: Dr.S.Balamurugan.
Deep Learning has shown promising results in the domain of Medical Image Analysis and Image Processing. Proposed is a secure image retrieval and classification framework for IoT based healthcare systems using Deep Neural Networks. The problem of solving the error introduced by adversarial noise is considered. Back Propagation Algorithm is employed for Segmentation (localization) as well as error prediction and detection. -
Secure Identity Based Authentication for Emergency Communications
The Vehicular Ad Hoc Network (VANET) offers secure data transmission between vehicles with the support of reliable authorities and RSUs. RSUs are fully damaged in emergency scenarios like natural catastrophes and are unable to provide the needed services. Vehicles in this scenario must communicate safely without RSUs. Hence, this study suggests a secure and reliable identity-based authentication technique for emergency scenarios. To provide secure vehicle-to-vehicle communication without RSUs, ECC-based IBS is utilized. Additionally, it offers security features like message integrity, privacy protection, and authentication. It is also resistant to attacks depending on authentication and privacy. The proposed technique performs efficiently with less communication and computing cost when its performance is compared with recent schemes. The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2024. -
Secure IBS Scheme for Vehicular Ad Hoc Networks
Vehicular Ad hoc Networks (VANET) havedrastically grown in recent years since they provide a better and more secure driving experience. Due to its characteristics, it is vulnerable to many security attacks. Even though many authentication schemes are proposed, their overheads are high. Hence, this study proposes a new Identity-Based Signature (IBS) for authentication with privacy-preservation. It supports secure communications with additional security features. It requires less overhead since it uses XOR operations and one-way hash functions for the signing and verification process. When the proposed schemes performance is compared to the recent schemes, it is observed that the proposed approach is more efficient in computation and communication. 2023, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. -
Secure framework of authentication mechanism over cloud environment
Cloud computing offers a cost effective virtual infrastructure management along with storage and application-oriented services to its customers. This innovation quickly turns into a generally very widely accepted worldview for conveying administrations through web. In this way, this administration expert provider must be offer the trust and information security, on the grounds that there is a most vital and profitable and most delicate information in extremely secure using cryptographic techniques to secure the data in cloud. So for ensure the privacy of essential information, it must be secured utilizing encryptions algorithms and afterward transferring to cloud. This paper presents a novel technique for electronic distributed computing administrations utilizing two-variable validation (2FA) access control framework. The prime target of the projected framework is to guarantee a optimal security for all the actors involved in the component design of proposed authentication system. Furthermore, property based control in the framework likewise authorize cloud servers to maximum the access to those clients with the same arrangement of properties while saving client privacy. At long last, we additionally do a reproduction to show the practicability of our proposed framework. The assessment work is done by utilizing expense of communication, data transfer capacity and proficiency of the framework as an execution metric. Springer International Publishing AG 2017. -
SECURE EQUITABLE SUBDIVISION NUMBER OF GRAPHS
In this paper, we initiate the study of a new domination parameter: the secure equitable subdivision number of graphs. Moreover, we define the secure equitable subdivision critical graphs and the secure equitable subdivision stable graphs. Furthermore, we investigate how to construct a secure equitable subdivision critical graph. 2024, Canadian University of Dubai. All rights reserved. -
SECURE DOMINATION IN TRANSFORMATION GRAPH Gxy+
In this paper, we characterize graphs for which the secure domination number of the transformation graph Gxy+ is 1 or 2. Also we prove that for any connected graph G with at least 4 pendant vertices, the secure domination number is greater than or equal to the secure domination number of the transformation graph G-++. We also find a bound for the secure domination number of G-+ when G is a tree. 2024 Jangjeon Research Institute for Mathematical Sciences and Physics. All rights reserved. -
Secure Decentralization: Examining the Role of Blockchain in Network Security
Blockchain generation has emerged as a novel answer for securing decentralized networks. This technology, which was first created for use in crypto currencies, has received enormous interest in recent years because of its capability for boosting protection in various industries and community protection. The essential precept at the back of block chain technology is the decentralization of statistics garage and control. In a decentralized network, no central authority may control the statistics. Rather, the facts are shipped amongst multiple nodes, making it immune to tampering and single factors of failure. One of the most important advantages of blockchain in community protection is its capacity to offer cozy and transparent communication amongst community customers. Through cryptographic techniques, block chain can affirm the identities of network participants and ensure the authenticity of records trade. This feature is extraordinarily valuable in preventing unauthorized access and facts manipulation. 2024 IEEE. -
Secure Data Processing System Using Decision Tree Architecture
[No abstract available] -
Secure Bitcoin Transaction and IoT Device usage in Decentralized Application
In the recent years, there has been a boom in the number of connected devices due to developments in the field of Internet of things. This has also increased the requirements of security specification. The proposed method is introducing a secure information transmission system by using Blockchain technology. Blockchain is a relatively new technology which was introduced by stoshi nakamoto, which was also the basis for developing crypto currency [bitcoin]. Crypto currencies are made transparent and secure using their network architecture, which is a combo of a decentralized and distributed network. In this paper is try to exploit the same methodology used in crypto currencies to develope an IOT network, where the devices can talk to their peers in a secure manner. They explored all the different networks and features of developing a Decentralized application that is named as Dapp. 2018 IEEE. -
Secure biometric authentication with de-duplication on distributed cloud storage
Cloud computing is one of the evolving fields of technology, which allows storage, access of data, programs, and their execution over the internet with offering a variety of information related services. With cloud information services, it is essential for information to be saved securely and to be distributed safely across numerous users. Cloud information storage has suffered from issues related to information integrity, data security, and information access by unauthenticated users. The distribution and storage of data among several users are highly scalable and cost-efficient but results in data redundancy and security issues. In this article, a biometric authentication scheme is proposed for the requested users to give access permission in a cloud-distributed environment and, at the same time, alleviate data redundancy. To achieve this, a cryptographic technique is used by service providers to generate the bio-key for authentication, which will be accessible only to authenticated users. A Gabor filter with distributed security and encryption using XOR operations is used to generate the proposed bio-key (biometric generated key) and avoid data deduplication in the cloud, ensuring avoidance of data redundancy and security. The proposed method is compared with existing algorithms, such as convergent encryption (CE), leakage resilient (LR), randomized convergent encryption (RCE), secure de-duplication scheme (SDS), to evaluate the de-duplication performance. Our comparative analysis shows that our proposed scheme results in smaller computation and communication costs than existing schemes. 2021 M et al. All Rights Reserved. -
Secure Authentication Schemes for Vehicular Adhoc Networks: A Survey
Vehicular Adhoc Network (VANET) is based on theprinciples of Mobile Adhoc NETwork (MANET) where vehicles are considered as nodes and secure communication is established to provide asafe driving experience. Due to its unique characteristics, it has various issues and challenges. These issues can be resolved by ensuring security requirements like authentication, privacy preservation, message integrity, non-repudiation, linkability, availability etc. Authentication plays a vital role since it is the first step to establish secure communication in the vehicular network. It also distinguishes malicious vehicles from legitimate vehicles. Different authentication schemes have been proposed to establish secure vehicular communications. A survey of the existing authentication schemes is given in this paper. At first, the existing authentication schemes are broadly classified based on message signing and verification methods. Then, each category is clearly explained with its sub-categories. At last, the existing schemes in each category are compared based on security requirements, security attacks and performance parameters. 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature. -
Secure authentication framework for cloud
The growing popularity of cloud based services is prompting organizations to consider shifting applications and data onto cloud. However, organizations dealing with highly sensitive information are apprehensive of moving its applications & data to public cloud owing to concern about security of its information. It is hence incumbent on service providers that only legitimate Users will access its services and resources in cloud. Verifying authenticity of remote users is a necessary pre-requisite in a cloud environment before allowing access to secure resources/services/ applications. The simplest & most commonly used user authentication mechanism is password based authentication. However, Users tend to choose easy to remember password, and many a times use same password for multiple accounts, which makes it often the weakest link in security. Furthermore, service providers authenticating Users on the basis of password, stores password verification information in their databases and such authentication schemes with verification table are known to be vulnerable to various attacks. From the perspective of authentication requirements, service providers in a cloud environment can be broadly categorized into two. Those service providers dealing with highly sensitive information and working in a regulated environment can be grouped into category one ?? as in those offering services for sectors like health care, finance. These providers require a strong and secure authentication mechanism to authenticate its users, without any additional functionality. Similarly, there is a second category of service providers dealing with secure information but operate in a collaborative environment ?? as providers providing their applications bundled through a web portal. To provide the Users with a seamless authentication experience, while accessing multiple services during a session, the second category of service providers prefer to have Single Signon functionality. Two-factor authentication technology overcomes the limitations of password authentication and decreases the probability that the claimant is presenting false evidence of its identity to verifier. If different service providers set up their own two-factor authentication services, Users have to do registration and login process repeatedly. Also, Users accessing multiple cloud services may be required to hold multiple authentication tokens associated with various service providers. Authentication factors such as crypto-tokens and smart cards with cryptographic capabilities have been vastly used as a second authentication factor. However, Users are required to always carry these authentication tokens which make it cumbersome from practical usability perspective. Also its usage involves cost thus restricting its adoption to corporate environments. The authentication process can be made more user-convenient if the authentication factor chosen is such that it is commonly used by all types of Users. Leveraging the use of mobile phone as an authentication factor can help address issue of user convenience at no extra cost while improving the security of authentication schemes. Though, there has been an increasing focus on strengthening the authentication methods of cloud service users, there is no significant work that discusses an authentication scheme that can be adopted by the two categories of cloud Service Providers. Taking cognizance of aforesaid issues related to secured authentication in cloud environment, this research focused on designing secure Two-Factor authentication schemes that can be adopted by the two categories of service providers. This research carried out in different levels, proposes authentication architecture and protocols for the two categories of service providers. At the first level, research proposes Direct Authentication architecture for cloud Service Providers who prefer to authenticate its users by using a strong authentication mechanism and does not require Single Sign-On (SSO) functionality. For those Providers who prefer to provide its user with a SSO functionality the research proposes Brokered Authentication architecture. The next level of research focuses on proposing User Authentication Protocols for both Direct Authentication Service Providers (DASPs) and Brokered Authentication Service Providers (BASPs). The research proposes use of strong, Two-Factor Authentication Protocols without Verifier Table. The suggested protocols, provides Users with flexibility of using a Password and either a Crypto-token or a Mobile-token to authenticate with Service Providers. The proposed approach eliminates the requirement of the User to remember multiple identities to access multiple services and provides the benefit of a higher level of security on account of second authentication factor and non-maintenance of verifier table at server. Access to different services offered by multiple service providers using a single authentication token requires interoperability between providers. Also, the Service Providers will have to address the task of issuing the second authentication factor to Users. As a result, the research intends to propose the utilization of proposed two-factor authentication scheme within a specific environment which includes a trusted entity called an Identity Provider (IdP), with whom Users and Service Providers will be registered. The IdP is responsible for issuing and managing the second authentication factor. In brokered authentication, the IdP playing the role of an authentication broker also provides Single Sign-on functionality. The Security Assertion Markup Language (SAML) is used by BASPs and the IdP to exchange authentication information about Users. A major objective of this research is to propose an authentication model that can be adopted by both categories of service providers. Hence, this research proposes an authentication framework for cloud which supports an integrated authentication architecture that provides the service providers with the flexibility to choose between direct and brokered authentication. The integrated two-factor authentication protocol, which does not require the server to maintain a verifier table, supported by the frame work allows users to do a single registration and access services of both direct & brokered authentication service providers using the same crypto-token/mobile-token. To verify claims about security strengths of the proposed authentication protocols, security analysis is done using theoretical intuition. The proposed protocols are found to offer desirable security features such as resistance to replay attack, stolen verifier attack, guessing attack, user impersonation attack etc. To verify the efficiency of the proposed protocols, the communication and computation costs are compared with similar schemes and it is seen that the costs are comparable. To validate the resistance of protocols to authentication attacks, they are analyzed using automated verification tool called ????Scyther??? and the protocol strength is verified by ???no attacks??? results. -
Secure authentication frame work for cloud
The growing popularity of cloud based services is prompting organizations to consider shifting applications and data onto cloud. However, organizations dealing with highly sensitive information are apprehensive of moving its applications and data to public cloud owing to concern about security of its information. It is hence incumbent on service providers that only legitimate Users will access its services and resources in cloud. newlineVerifying authenticity of remote users is a necessary pre-requisite in a cloud environment before allowing access to secure resources/services/ applications. The simplest and most commonly used user authentication mechanism is password based authentication. However, Users tend to choose easy to remember password, and many a times use same password for multiple accounts, which makes it often the weakest link in security. Furthermore, service providers authenticating Users on the basis of password, stores password verification information in their databases and such authentication schemes with verification table are known to be vulnerable to various attacks. newlineFrom the perspective of authentication requirements, service providers in a cloud environment can be broadly categorized into two. Those service providers dealing with highly sensitive information and working in a regulated environment can be grouped into category one as in those offering services for sectors like health care, finance. These providers require a strong and secure authentication mechanism to authenticate its users, without any additional functionality. Similarly, there is a second category of service providers dealing with secure information but operate in a collaborative environment as providers providing their applications bundled through a web portal. To provide the Users with a seamless authentication experience, while accessing multiple services during a session, the second category of service providers prefer to have Single Sign-on functionality. -
Secure Authenticated Communication Via Digital Signature And Clear List In VANETs
Vehicular ad hoc network (VANET) plays a vital role in the intelligent transportation system(ITS), When a vehicle receives a message through network, the CRL (certificate revocation list) checking process will operate before certificate and signature verification. After successful authentication,a CRL list is created based on authentication. This CRL is used to verify whether a vehicle node can be permitted for communication in the VANET network. But when using CRL, a huge amount of storage space and checking time is needed. So we proposed a method without CRL list, but mentions a key management list to overcome large storage space and checking time even it reduce the access delay too. For the access permission we can do an authentication system based digital novel signature authentication(DNSA) for each vehicles in the vanet with the RSU unit or with other participant node vehicles in the communication as per the Topology.So we can perform an efficient and secured communication in VANET. The Electrochemical Society -
Secure approach to sharing digitized medical data in a cloud environment
Without proper security mechanisms, medical records stored electronically can be accessed more easily than physical files. Patient health information is scattered throughout the hospital environment, including laboratories, pharmacies, and daily medical status reports. The electronic format of medical reports ensures that all information is available in a single place. However, it is difficult to store and manage large amounts of data. Dedicated servers and a data center are needed to store and manage patient data. However, self-managed data centers are expensive for hospitals. Storing data in a cloud is a cheaper alternative. The advantage of storing data in a cloud is that it can be retrieved anywhere and anytime using any device connected to the Internet. Therefore, doctors can easily access the medical history of a patient and diagnose diseases according to the context. It also helps prescribe the correct medicine to a patient in an appropriate way. The systematic storage of medical records could help reduce medical errors in hospitals. The challenge is to store medical records on a third-party cloud server while addressing privacy and security concerns. These servers are often semi-trusted. Thus, sensitive medical information must be protected. Open access to records and modifications performed on the information in those records may even cause patient fatalities. Patient-centric health-record security is a major concern. End-to-end file encryption before outsourcing data to a third-party cloud server ensures security. This paper presents a method that is a combination of the advanced encryption standard and the elliptical curve Diffie-Hellman method designed to increase the efficiency of medical record security for users. Comparisons of existing and proposed techniques are presented at the end of the article, with a focus on the analyzing the security approaches between the elliptic curve and secret-sharing methods. This study aims to provide a high level of security for patient health records. 2023 Xi'an Jiaotong University -
Secure and Private Federated Learning through Encrypted Parameter Aggregation
This chapter is dedicated to cross-silo private parameter aggregation. ML/DL has demonstrated promising results in a variety of application domains, especially when vast volumes of data are collected in one location, such as a data center or a cloud service. The goal of FL is to improve the quality of ML/DL models while minimizing their drawbacks. Participating devices in an FL task could range in size from a single smartphone or watch to a global corporation housing multiple data centers. It was originally believed that just a little amount of information about the original training data would be carried over into subsequent model updates as FL interactions occurred. The differential privacy framework is concerned with restricting the release of private information while sharing the outcomes of computations or queries performed on a dataset. Recently, many researchers have begun to employ differential privacy while training models in a federated setting. 2024 Saravanan Krishnan, A. Jose Anand, R. Srinivasan, R. Kavitha and S. Suresh.