Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/457457
Title: | Information Security over Cloud Computing Using Holomorphic Scheme |
Researcher: | Dhananjaya V |
Guide(s): | Balasubramani R |
Keywords: | Computer Science Computer Science Information Systems Engineering and Technology |
University: | Visvesvaraya Technological University, Belagavi |
Completed Date: | 2020 |
Abstract: | Now a day, data security is playing a significant role in the communication system as the hackers between transmissions media are more. The level of security depends on the secrete key according to the work, the security level is more for the key size of higher bits and also larger data size becomes a major challenge task for further process. Therefore, the generation of a key with more size is a major challenging task. At present, the Advanced Encryption Standard (AES) is a better cryptography system where the encryption and decryption can perform with a secure key. The literature says the holomorphic function is well suitable for data size reduction. To address this issue, novel Holomorphic based encryption and decryption and AES are combined to increase the security level. The second novelty is the variable key generation using Elliptic Curve Cryptography (ECC) due to its enlarged proportion of consideration in industry and researchers. Point addition and Point doubling are employed for ECC to produce 256 values and multiplication operations can be avoided. After the generation of a matrix, each matrix value is encrypted and decrypted using a Holomorphic algorithm. The proposed framework has been simulated in MATLAB 2017a and validated with different datasets in real scenarios. newlineThe first part of the research work is of reducing the key size and data by using a Holomorphic algorithm which converts the key and data into integer values. These values can be used for encryption and decryption. To encrypt and decrypt the key, data or information the various security algorithms were designed and employed in many applications over a decade. This secured algorithm utilizes 8 bit, 16 bit, 32 bit, 128-bit key size for encryption and decryption purpose. However, the literature study states that a higher security level can be obtained with the help of a higher key size. newline |
Pagination: | XVIII, 161 |
URI: | http://hdl.handle.net/10603/457457 |
Appears in Departments: | Nitte Mahalinga Adyanthaya Memorial Institute of Technology |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 575.92 kB | Adobe PDF | View/Open |
02_preliminary.pdf | 886.96 kB | Adobe PDF | View/Open | |
03_content.pdf | 727.67 kB | Adobe PDF | View/Open | |
04_abstract.pdf | 357.3 kB | Adobe PDF | View/Open | |
05_chapter 1.pdf | 895.45 kB | Adobe PDF | View/Open | |
06_chapter 2.pdf | 559.68 kB | Adobe PDF | View/Open | |
07_chapter 3.pdf | 1.05 MB | Adobe PDF | View/Open | |
08_chapter 4.pdf | 977.66 kB | Adobe PDF | View/Open | |
09_chapter 5.pdf | 1.27 MB | Adobe PDF | View/Open | |
10_chapter 6.pdf | 515.91 kB | Adobe PDF | View/Open | |
11_annexure.pdf | 647.37 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 1.89 MB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: