Local Data Security through Encryption
Bhanupriya Vyas, Amit Vajpayee "Local Data Security through Encryption". International Journal of Computer Trends and Technology (IJCTT) V47(2):137-141, May 2017. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.
Abstract -
In recent years there is drastic progress in the
Internet world. Sensitive information can be shared
through internet but this information sharing is
susceptible to certain attacks. Cryptography was
introduced to solve this problem. Cryptography is
art for achieving security by encoding the plain text
message to cipher text. Substitution and
transposition are techniques for encoding. When
Caesar cipher substitution and Rail fence
transposition techniques are used individually,
cipher text obtained is easy to crack. This talk will
present a perspective on the combination of
techniques substitution and transposition.
Combining Caesar cipher with Rail fence technique
can eliminate their fundamental weakness and
produce a cipher text that is hard to crack.
References
[1] Qi-Tao Lin?, Chang-Dong Wang?‡, Jing Pan?, Lu Ling?
and Jian-Huang Lai Local Data Security and Privacy
Protection in Cloud Service Applications paper present at
© 2015 IEEE
[2] B. Padmavathi1, S. Ranjitha Kumari2 A Survey on
Performance Analysis of DES, AES and RSA Algorithm along with LSB Substitution Technique paper present at
International Journal of Science and Research IJSR
[3] MILIND MATHUR AYUSH KESARWANI
COMPARISON BETWEEN DES , 3DES , RC2 , RC6 ,
BLOWFISH AND AES paper present at National
Conference on New Horizons in IT - NCNHIT 2013
[4] Evaluation of DES, TDES, AES, Blowfish and Two fish
Encryption Algorithm: Based on Space Complexity paper
present at International Journal of Engineering Research &
Technology (IJERT)
[5] Bhanupriya Vyas, Amit Vajpayee Local Data Security
Through Encryption IJSART - Volume 2 Issue 8 –
AUGUST 2016
[6] I. Foster, Z. Yong, I. Raicu and L. Shiyong, (2008, 12-16
Nov. 2008), Cloud Computing and Grid Computing 360-
Degree Compared, Paper presented at the Grid Computing
Environments Workshop, 2008, GCE `08.
[7] NIST SP 800-145, “A NIST definition of cloud
computing”, [online] 2012,
http://csrc.nist.gov/publications/drafts/800-145/Draft-SP-
800-145_cloud-definition.pdf (Accessed: 23 December
(2013).
[8] Gartner, “What you need to know about cloud computing
security and compliance”, (HeiserJ), [online] 2009,
https://www.gartner.com/doc/1071415/need-know-cloudcomputing-
Security (Accessed 23 December 2013).
[9] Z. Yandong and Z. Yongsheng, “Cloud computing and cloud
security challenges in Information Technology in
Medicine and Education (ITME)”, 2012 International
Symposium on, (2012), pp. 1084-1088.
[10] IBM, “what is cloud computing” [online]
http://www.ibm.com/cloud-computing/in/en/what-iscloud-
computing.html (Accessed: 14 December 2013).
IDG Cloud Computing Survey: “Security, Integration
Challenge Growth”, [online],
http://www.forbes.com/sites/louiscolumbus/2013/08/13/id
g-cloud-computing-survey-security-integration-challenge
growth.html/(Accessed: 28 December 2013).
[11] D. Catteddu and G. Hogben, “Cloud computing: Benefits,
risks and recommendations for information security”,
European Network and Information Security Agency
(ENISA), pp. 1–125.
[12] S. Subashini and V. Kavitha, “A survey on security issues
in service delivery models of cloud computing”, Journal of
Network and Computer Applications, vol. 34, no. 1,
(2011), pp. 1-11.
[13] A. A. Soofi and M. I. K Fazal-e-Amin, “A Review on Data
Security in Cloud Computing”, International Journal of
Computer Applications, vol. 94, no. 5, (2014), pp. 12-20.
[14] T. Dillon, C. Wu and E. Chang, “Cloud computing: issues
and challenges”, Paper presented at the Advanced
Information Networking and Applications (AINA), 2010
24th IEEE International Conference on. (2010).
[15] P. Brereton, B. A. Kitchenham, D. Budgen, M. Turner and
M. Khalil, “Lessons from applying the systematic
literature review process within the software engineering
domain”, Journal of Systems and Software, vol. 80, no. 4,
(2007), pp. 571-583.
[16] A. K. M. Fazal-e-Amin and A. Oxley, “A review on aspect
oriented implementation of software product lines
components”, Information Technology Journal, vol. 9, no.
6, (2010), pp. 1262-1269.
[17] A. K. M. Fazal-e-Amin and A. Oxley, “A Review of
Software Component Reusability Assessment
Approaches”, Research Journal of Information
Technology, vol. 3, no. 1, (2011), pp. 1-11.
[18] K. Hashizume, D. Rosado, E. Fernández-Medina and E.
Fernandez, “An analysis of security issues for cloud
computing”, Journal of Internet Services and Applications,
vol. 4, no. 1, (2013), pp.1-13.
[19] R. Anane, S. Dhillon and B. Bordbar, “Stateless data
concealment for distributed systems”, Journal of Computer
and System Sciences, vol. 74, no. 2, (2008), pp. 243-254.
[20] U. Somani, K. Lakhani and M. Mundra, “Implementing
digital signature with RSA encryption algorithm to
enhance the Data Security of cloud in Cloud Computing”,
Paper presented at the Parallel Distributed and Grid
Computing (PDGC), 2010 1st International Conference on.
(2010, 28-30 Oct. 2010).
[21] W. Cong, C. Ning, L. Jin, R. Kui and L. Wenjing, “Secure
Ranked Keyword Search over Encrypted Cloud Data”,
Paper presented at the Distributed Computing Systems
(ICDCS), 2010 IEEE 30th International Conference on.
(2010, 21-25 June 2010).
[22] H. Shuai and X. Jianchuan, “Ensuring data storage security
through a novel third party auditor scheme in cloud
computing”, Paper presented at the Cloud Computing and
Intelligence Systems (CCIS), 2011 IEEE International
Conference on. (2011, 15-17 Sept. 2011).
[23] Vamsee and Sriram, “Data Security in Cloud Computing,”
in Journal of Mathematics and computer sciences, vol. 2,
no. 1, (2011), pp. 15- 23.
[24] S. K. Sood, “A combined approach to ensure data security
in cloud computing”, Journal of Network and Computer
Applications, vol. 35, no. 6, (2012), pp. 1831-1838.
[25] E. M. Mohamed, H. S. Abdelkader and S. El-Etriby,
“Enhanced data security model for cloud computing”,
Paper presented at the Informatics and Systems (INFOS),
2012 8th International Conference on. (2012, 14-16 May
2012).
[26] J. Singh, B. Kumar and A. Khatri, “Improving stored data
security in Cloud using Rc5 algorithm”, Paper presented at
the Engineering (NUiCONE), 2012 Nirma University
International Conference on. (2012, 6-8 Dec. 2012).
[27] Z. Lan, V. Varadharajan and M. Hitchens, “Achieving
Secure Role-Based Access Control on Encrypted Data in
Cloud Storage”, Information Forensics and Security, IEEE
Transactions on, vol. 8, no. 12, (2013), pp. 1947-1960.
[28] J. Taeho, L. Xiang-Yang, W. Zhiguo and W. Meng,
“Privacy preserving cloud data access with multiauthorities”,
Paper presented at the INFOCOM, 2013
Proceedings IEEE, (2013, 14-19 April 2013).
[29] Y. Ching-Nung and L. Jia-Bin, “Protecting Data Privacy
and Security for Cloud Computing Based on Secret
Sharing”, Paper presented at the Biometrics and Security
Technologies (ISBAST), 2013 Internationa Symposium
on. (2013, 2-5 July 2013).
[30] P. Rewagad and Y. Pawar, “Use of Digital Signature with
Diffie Hellman Key Exchange and AES Encryption
Algorithm to Enhance Data Security in Cloud Computing.
Paper presented at the Communication Systems and
Network Technologies (CSNT), 2013 International
Conference on. (2013, 6-8 April 2013).
[31] M. S. Abolghasemi, M. M. Sefidab and R. E. Atani,
“Using location based encryption to improve the security
of data access in cloud computing”, Paper presented at the
Advances in Computing, Communications and Informatics
(ICACCI), 2013 International Conference on. (2013, 22-25
Aug. 2013).
Keywords
Cryptography, Cipher text,
Substitution, Transposition, Caesar Cipher, Rain
Fence.