Local Data Security through Encryption

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2017 by IJCTT Journal
Volume-47 Number-2
Year of Publication : 2017
Authors : Bhanupriya Vyas, Amit Vajpayee
DOI :  10.14445/22312803/IJCTT-V47P119

MLA

Bhanupriya Vyas, Amit Vajpayee "Local Data Security through Encryption". International Journal of Computer Trends and Technology (IJCTT) V47(2):137-141, May 2017. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
In recent years there is drastic progress in the Internet world. Sensitive information can be shared through internet but this information sharing is susceptible to certain attacks. Cryptography was introduced to solve this problem. Cryptography is art for achieving security by encoding the plain text message to cipher text. Substitution and transposition are techniques for encoding. When Caesar cipher substitution and Rail fence transposition techniques are used individually, cipher text obtained is easy to crack. This talk will present a perspective on the combination of techniques substitution and transposition. Combining Caesar cipher with Rail fence technique can eliminate their fundamental weakness and produce a cipher text that is hard to crack.

References
[1] Qi-Tao Lin?, Chang-Dong Wang?‡, Jing Pan?, Lu Ling? and Jian-Huang Lai Local Data Security and Privacy Protection in Cloud Service Applications paper present at © 2015 IEEE
[2] B. Padmavathi1, S. Ranjitha Kumari2 A Survey on Performance Analysis of DES, AES and RSA Algorithm along with LSB Substitution Technique paper present at International Journal of Science and Research IJSR
[3] MILIND MATHUR AYUSH KESARWANI COMPARISON BETWEEN DES , 3DES , RC2 , RC6 , BLOWFISH AND AES paper present at National Conference on New Horizons in IT - NCNHIT 2013
[4] Evaluation of DES, TDES, AES, Blowfish and Two fish Encryption Algorithm: Based on Space Complexity paper present at International Journal of Engineering Research & Technology (IJERT)
[5] Bhanupriya Vyas, Amit Vajpayee Local Data Security Through Encryption IJSART - Volume 2 Issue 8 – AUGUST 2016
[6] I. Foster, Z. Yong, I. Raicu and L. Shiyong, (2008, 12-16 Nov. 2008), Cloud Computing and Grid Computing 360- Degree Compared, Paper presented at the Grid Computing Environments Workshop, 2008, GCE `08.
[7] NIST SP 800-145, “A NIST definition of cloud computing”, [online] 2012, http://csrc.nist.gov/publications/drafts/800-145/Draft-SP- 800-145_cloud-definition.pdf (Accessed: 23 December (2013).
[8] Gartner, “What you need to know about cloud computing security and compliance”, (HeiserJ), [online] 2009, https://www.gartner.com/doc/1071415/need-know-cloudcomputing- Security (Accessed 23 December 2013).
[9] Z. Yandong and Z. Yongsheng, “Cloud computing and cloud security challenges in Information Technology in Medicine and Education (ITME)”, 2012 International Symposium on, (2012), pp. 1084-1088.
[10] IBM, “what is cloud computing” [online] http://www.ibm.com/cloud-computing/in/en/what-iscloud- computing.html (Accessed: 14 December 2013). IDG Cloud Computing Survey: “Security, Integration Challenge Growth”, [online], http://www.forbes.com/sites/louiscolumbus/2013/08/13/id g-cloud-computing-survey-security-integration-challenge growth.html/(Accessed: 28 December 2013).
[11] D. Catteddu and G. Hogben, “Cloud computing: Benefits, risks and recommendations for information security”, European Network and Information Security Agency (ENISA), pp. 1–125.
[12] S. Subashini and V. Kavitha, “A survey on security issues in service delivery models of cloud computing”, Journal of Network and Computer Applications, vol. 34, no. 1, (2011), pp. 1-11.
[13] A. A. Soofi and M. I. K Fazal-e-Amin, “A Review on Data Security in Cloud Computing”, International Journal of Computer Applications, vol. 94, no. 5, (2014), pp. 12-20.
[14] T. Dillon, C. Wu and E. Chang, “Cloud computing: issues and challenges”, Paper presented at the Advanced Information Networking and Applications (AINA), 2010 24th IEEE International Conference on. (2010).
[15] P. Brereton, B. A. Kitchenham, D. Budgen, M. Turner and M. Khalil, “Lessons from applying the systematic literature review process within the software engineering domain”, Journal of Systems and Software, vol. 80, no. 4, (2007), pp. 571-583.
[16] A. K. M. Fazal-e-Amin and A. Oxley, “A review on aspect oriented implementation of software product lines components”, Information Technology Journal, vol. 9, no. 6, (2010), pp. 1262-1269.
[17] A. K. M. Fazal-e-Amin and A. Oxley, “A Review of Software Component Reusability Assessment Approaches”, Research Journal of Information Technology, vol. 3, no. 1, (2011), pp. 1-11.
[18] K. Hashizume, D. Rosado, E. Fernández-Medina and E. Fernandez, “An analysis of security issues for cloud computing”, Journal of Internet Services and Applications, vol. 4, no. 1, (2013), pp.1-13.
[19] R. Anane, S. Dhillon and B. Bordbar, “Stateless data concealment for distributed systems”, Journal of Computer and System Sciences, vol. 74, no. 2, (2008), pp. 243-254.
[20] U. Somani, K. Lakhani and M. Mundra, “Implementing digital signature with RSA encryption algorithm to enhance the Data Security of cloud in Cloud Computing”, Paper presented at the Parallel Distributed and Grid Computing (PDGC), 2010 1st International Conference on. (2010, 28-30 Oct. 2010).
[21] W. Cong, C. Ning, L. Jin, R. Kui and L. Wenjing, “Secure Ranked Keyword Search over Encrypted Cloud Data”, Paper presented at the Distributed Computing Systems (ICDCS), 2010 IEEE 30th International Conference on. (2010, 21-25 June 2010).
[22] H. Shuai and X. Jianchuan, “Ensuring data storage security through a novel third party auditor scheme in cloud computing”, Paper presented at the Cloud Computing and Intelligence Systems (CCIS), 2011 IEEE International Conference on. (2011, 15-17 Sept. 2011).
[23] Vamsee and Sriram, “Data Security in Cloud Computing,” in Journal of Mathematics and computer sciences, vol. 2, no. 1, (2011), pp. 15- 23.
[24] S. K. Sood, “A combined approach to ensure data security in cloud computing”, Journal of Network and Computer Applications, vol. 35, no. 6, (2012), pp. 1831-1838.
[25] E. M. Mohamed, H. S. Abdelkader and S. El-Etriby, “Enhanced data security model for cloud computing”, Paper presented at the Informatics and Systems (INFOS), 2012 8th International Conference on. (2012, 14-16 May 2012).
[26] J. Singh, B. Kumar and A. Khatri, “Improving stored data security in Cloud using Rc5 algorithm”, Paper presented at the Engineering (NUiCONE), 2012 Nirma University International Conference on. (2012, 6-8 Dec. 2012).
[27] Z. Lan, V. Varadharajan and M. Hitchens, “Achieving Secure Role-Based Access Control on Encrypted Data in Cloud Storage”, Information Forensics and Security, IEEE Transactions on, vol. 8, no. 12, (2013), pp. 1947-1960.
[28] J. Taeho, L. Xiang-Yang, W. Zhiguo and W. Meng, “Privacy preserving cloud data access with multiauthorities”, Paper presented at the INFOCOM, 2013 Proceedings IEEE, (2013, 14-19 April 2013).
[29] Y. Ching-Nung and L. Jia-Bin, “Protecting Data Privacy and Security for Cloud Computing Based on Secret Sharing”, Paper presented at the Biometrics and Security Technologies (ISBAST), 2013 Internationa Symposium on. (2013, 2-5 July 2013).
[30] P. Rewagad and Y. Pawar, “Use of Digital Signature with Diffie Hellman Key Exchange and AES Encryption Algorithm to Enhance Data Security in Cloud Computing. Paper presented at the Communication Systems and Network Technologies (CSNT), 2013 International Conference on. (2013, 6-8 April 2013).
[31] M. S. Abolghasemi, M. M. Sefidab and R. E. Atani, “Using location based encryption to improve the security of data access in cloud computing”, Paper presented at the Advances in Computing, Communications and Informatics (ICACCI), 2013 International Conference on. (2013, 22-25 Aug. 2013).

Keywords
Cryptography, Cipher text, Substitution, Transposition, Caesar Cipher, Rain Fence.