Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/457457
Title: Information Security over Cloud Computing Using Holomorphic Scheme
Researcher: Dhananjaya V
Guide(s): Balasubramani R
Keywords: Computer Science
Computer Science Information Systems
Engineering and Technology
University: Visvesvaraya Technological University, Belagavi
Completed Date: 2020
Abstract: Now a day, data security is playing a significant role in the communication system as the hackers between transmissions media are more. The level of security depends on the secrete key according to the work, the security level is more for the key size of higher bits and also larger data size becomes a major challenge task for further process. Therefore, the generation of a key with more size is a major challenging task. At present, the Advanced Encryption Standard (AES) is a better cryptography system where the encryption and decryption can perform with a secure key. The literature says the holomorphic function is well suitable for data size reduction. To address this issue, novel Holomorphic based encryption and decryption and AES are combined to increase the security level. The second novelty is the variable key generation using Elliptic Curve Cryptography (ECC) due to its enlarged proportion of consideration in industry and researchers. Point addition and Point doubling are employed for ECC to produce 256 values and multiplication operations can be avoided. After the generation of a matrix, each matrix value is encrypted and decrypted using a Holomorphic algorithm. The proposed framework has been simulated in MATLAB 2017a and validated with different datasets in real scenarios. newlineThe first part of the research work is of reducing the key size and data by using a Holomorphic algorithm which converts the key and data into integer values. These values can be used for encryption and decryption. To encrypt and decrypt the key, data or information the various security algorithms were designed and employed in many applications over a decade. This secured algorithm utilizes 8 bit, 16 bit, 32 bit, 128-bit key size for encryption and decryption purpose. However, the literature study states that a higher security level can be obtained with the help of a higher key size. newline
Pagination: XVIII, 161
URI: http://hdl.handle.net/10603/457457
Appears in Departments:Nitte Mahalinga Adyanthaya Memorial Institute of Technology

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File575.92 kBAdobe PDFView/Open
02_preliminary.pdf886.96 kBAdobe PDFView/Open
03_content.pdf727.67 kBAdobe PDFView/Open
04_abstract.pdf357.3 kBAdobe PDFView/Open
05_chapter 1.pdf895.45 kBAdobe PDFView/Open
06_chapter 2.pdf559.68 kBAdobe PDFView/Open
07_chapter 3.pdf1.05 MBAdobe PDFView/Open
08_chapter 4.pdf977.66 kBAdobe PDFView/Open
09_chapter 5.pdf1.27 MBAdobe PDFView/Open
10_chapter 6.pdf515.91 kBAdobe PDFView/Open
11_annexure.pdf647.37 kBAdobe PDFView/Open
80_recommendation.pdf1.89 MBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: