Analysis And Design Of Authentication And Encryption Algorithms For Secure Cloud Systems
DOWNLOAD
Download Analysis And Design Of Authentication And Encryption Algorithms For Secure Cloud Systems PDF/ePub or read online books in Mobi eBooks. Click Download or Read Online button to get Analysis And Design Of Authentication And Encryption Algorithms For Secure Cloud Systems book now. This website allows unlimited access to, at the time of writing, more than 1.5 million titles, including hundreds of thousands of titles in various foreign languages. If the content not found or just blank you must refresh this page
Analysis And Design Of Authentication And Encryption Algorithms For Secure Cloud Systems
DOWNLOAD
Author : Bo Zhu
language : en
Publisher:
Release Date : 2015
Analysis And Design Of Authentication And Encryption Algorithms For Secure Cloud Systems written by Bo Zhu and has been published by this book supported file pdf, txt, epub, kindle and other format this book has been release on 2015 with categories.
Along with the fast growth of networks and mobile devices, cloud computing has become one of the most attractive and effective technologies and business solutions nowadays. Increasing numbers of organizations and customers are migrating their businesses and data to the cloud due to the flexibility and cost-efficiency of cloud systems. Preventing unauthorized access of sensitive data in the cloud has been one of the biggest challenges when designing a secure cloud system, and it strongly relies on the chosen authentication and encryption algorithms for providing authenticity and confidentiality, respectively. This thesis investigates various aspects of authentication and encryption algorithms for securing cloud systems, including authenticated encryption modes of operation, block ciphers, password hashing algorithms, and password-less/two-factor authentication mechanisms. Improving Authenticated Encryption Modes. The Galois/Counter Mode (GCM) is an authenticated encryption mode of operation for block ciphers. It has been widely adopted by many network standards and protocols that protect the security of cloud communications, such as TLS v1.2, IEEE 802.1AE and IPsec. Iwata et al. recently found a flaw in GCM's original proofs for non-96-bit nonce cases, and then presented new security bounds for GCM. The new bounds imply that the success probabilities of adversaries for attacking GCM are much larger than the originally expected ones. We propose a simple change to repair GCM. When applied, it will improve the security bounds by a factor of about $2^{20}$ while maintaining most of the original proofs. Analyzing Polynomial-Based Message Authentication Codes. We investigate attacks on polynomial-based message authentication code (MAC) schemes including the one adopted in GCM. We demonstrate that constructing successful forgeries of these MAC schemes does not necessarily require hash collisions. This discovery removes certain restrictions in the attacks previously proposed by Procter and Cid. Moreover, utilizing a special design of GCM for processing non-96-bit nonces, we turn these forgery attacks into birthday attacks, which will significantly increase their success probabilities. Therefore, by considering the birthday attacks and the security proof flaw found by Iwata et al., cloud system designers should avoid using GCM with non-96-bit nonces if they do not revise the design of GCM. Analyzing Block Ciphers. We propose a new framework for analyzing symmetric-key ciphers by guessing intermediate states to divide ciphers into small components. This framework is suitable for lightweight ciphers with simple key schedules and block sizes smaller than key lengths. Using this framework, we design new attacks on the block cipher family KATAN. These attacks can recover the master keys of 175-round KATAN32, 130-round KATAN48 and 112-round KATAN64 faster than exhaustive search, and thus reach many more rounds than the existing attacks. We also provide new attacks on 115-round KATAN32 and 100-round KATAN48 in order to demonstrate that this new kind of attack can be more time-efficient and memory-efficient than the existing ones. Designing Password Hashing Algorithms. Securely storing passwords and deriving cryptographic keys from passwords are also crucial for most secure cloud system designs. However, choices of well-studied password hashing algorithms are extremely limited, as their security requirements and design principles are different from common cryptographic primitives. We propose two practical password hashing algorithms, Pleco and Plectron. They are built upon well-understood cryptographic algorithms, and combine the advantages of symmetric-key and asymmetric-key primitives. By employing the Rabin cryptosystem, we prove that the one-wayness of Pleco is at least as strong as the hard problem of integer factorization. In addition, both password hashing algorithms are designed to be sequential memory-hard, in order to thwart large-scale password searching using parallel hardware, such as GPUs, FPGAs, and ASICs. Designing Password-less/Two-Factor Authentication Mechanisms. Motivated by a number of recent industry initiatives, we propose Loxin, an innovative solution for password-less authentication for cloud systems and web applications. Loxin aims to improve on passwords with respect to both usability and security. It utilizes push message services for mobile devices to initiate authentication transactions based on asymmetric-key cryptography, and enables users to access multiple services by using pre-owned identities, such as email addresses. In particular, the Loxin server cannot generate users' authentication credentials, thereby eliminating the potential risk of credential leakage if the Loxin server gets compromised. Furthermore, Loxin is fully compatible with existing password-based authentication systems, and thus can serve as a two-factor authentication mechanism.
The 10th International Conference On Computer Engineering And Networks
DOWNLOAD
Author : Qi Liu
language : en
Publisher: Springer Nature
Release Date : 2020-10-05
The 10th International Conference On Computer Engineering And Networks written by Qi Liu and has been published by Springer Nature this book supported file pdf, txt, epub, kindle and other format this book has been release on 2020-10-05 with Technology & Engineering categories.
This book contains a collection of the papers accepted by the CENet2020 – the 10th International Conference on Computer Engineering and Networks held on October 16-18, 2020 in Xi’an, China. The topics focus but are not limited to Internet of Things and Smart Systems, Artificial Intelligence and Applications, Communication System Detection, Analysis and Application, and Medical Engineering and Information Systems. Each part can be used as an excellent reference by industry practitioners, university faculties, research fellows and undergraduates as well as graduate students who need to build a knowledge base of the most current advances and state-of-practice in the topics covered by this conference proceedings. This will enable them to produce, maintain, and manage systems with high levels of trustworthiness and complexity.
Next Generation Mechanisms For Data Encryption
DOWNLOAD
Author : Keshav Kumar
language : en
Publisher: CRC Press
Release Date : 2025-01-24
Next Generation Mechanisms For Data Encryption written by Keshav Kumar and has been published by CRC Press this book supported file pdf, txt, epub, kindle and other format this book has been release on 2025-01-24 with Technology & Engineering categories.
This book gives readers a deep insight into cryptography and discusses the various types of cryptography algorithms used for the encryption and decryption of data. It also covers the mathematics behind the use of algorithms for encryption and decryption. Features Presents clear insight to the readers about the various security algorithms and the different mechanisms used for data encryption. Discusses algorithms such as symmetric encryption, asymmetric encryption, digital signatures, and hash functions used for encryption. Covers techniques and methods to optimize the mathematical steps of security algorithms to make those algorithms lightweight, which can be suitable for voice encryption. Illustrates software methods to implement cryptography algorithms. Highlights a comparative analysis of models that are used in implementing cryptography algorithms. The text is primarily written for senior undergraduates, graduate students, and academic researchers in the fields of electrical engineering, electronics and communications engineering, computer science and engineering, and information technology.
Distributed Computing And Internet Technology
DOWNLOAD
Author : Raja Natarajan
language : en
Publisher: Springer
Release Date : 2015-01-28
Distributed Computing And Internet Technology written by Raja Natarajan and has been published by Springer this book supported file pdf, txt, epub, kindle and other format this book has been release on 2015-01-28 with Computers categories.
This book constitutes the refereed proceedings of the 11th International Conference on Distributed Computing and Internet Technology, ICDCIT 2015, held in Bhubaneswar, India, in February 2015. The 12 revised full papers presented together with 30 short papers and 9 invited talks in this volume were carefully reviewed and selected from 221 submissions. The papers cover topics such as distributed computing and algorithms; internet technologies and Web services; secure computing and communication; cloud computing; information retrieval and recommender systems and societal applications.
5g Enabled Internet Of Things
DOWNLOAD
Author : Yulei Wu
language : en
Publisher: CRC Press
Release Date : 2019-05-29
5g Enabled Internet Of Things written by Yulei Wu and has been published by CRC Press this book supported file pdf, txt, epub, kindle and other format this book has been release on 2019-05-29 with Computers categories.
How the enabling technologies in 5G as an integral or as a part can seamlessly fuel the IoT revolution is still very challenging. This book presents the state-of-the-art solutions to the theoretical and practical challenges stemming from the integration of 5G enabling technologies into IoTs in support of a smart 5G-enabled IoT paradigm, in terms of network design, operation, management, optimization, privacy and security, and applications. In particular, the technical focus covers a comprehensive understanding of 5G-enabled IoT architectures, converged access networks, privacy and security, and emerging applications of 5G-eabled IoT.
International Conference On Innovative Computing And Communications
DOWNLOAD
Author : Ashish Khanna
language : en
Publisher: Springer Nature
Release Date : 2021-08-31
International Conference On Innovative Computing And Communications written by Ashish Khanna and has been published by Springer Nature this book supported file pdf, txt, epub, kindle and other format this book has been release on 2021-08-31 with Technology & Engineering categories.
This book includes high-quality research papers presented at the Fourth International Conference on Innovative Computing and Communication (ICICC 2021), which is held at the Shaheed Sukhdev College of Business Studies, University of Delhi, Delhi, India, on February 20–21, 2021. Introducing the innovative works of scientists, professors, research scholars, students and industrial experts in the field of computing and communication, the book promotes the transformation of fundamental research into institutional and industrialized research and the conversion of applied exploration into real-time applications.
Advances In Parallel Computing Algorithms Tools And Paradigms
DOWNLOAD
Author : D. Jude Hemanth
language : en
Publisher: SAGE Publications Limited
Release Date : 2022-11-15
Advances In Parallel Computing Algorithms Tools And Paradigms written by D. Jude Hemanth and has been published by SAGE Publications Limited this book supported file pdf, txt, epub, kindle and other format this book has been release on 2022-11-15 with Computers categories.
Recent developments in parallel computing for various fields of application are providing improved solutions for handling data. These newer, innovative ideas offer the technical support necessary to enhance intellectual decisions, while also dealing more efficiently with the huge volumes of data currently involved. This book presents the proceedings of ICAPTA 2022, the International Conference on Advances in Parallel Computing Technologies and Applications, hosted as a virtual conference from Bangalore, India, on 27 and 28 January 2022. The aim of the conference was to provide a forum for the sharing of knowledge about various aspects of parallel computing in communications systems and networking, including cloud and virtualization solutions, management technologies and vertical application areas. The conference also provided a premier platform for scientists, researchers, practitioners and academicians to present and discuss their most recent innovations, trends and concerns, as well as the practical challenges encountered in this field. More than 300 submissions were received for the conference, from which the 91 full-length papers presented here were accepted after review by a panel of subject experts. Topics covered include parallel computing in communication, machine learning intelligence for parallel computing and parallel computing for software services in theoretical and practical aspects. Providing an overview of recent developments in the field, the book will be of interest to all those whose work involves the use of parallel computing technologies.
Challenges In Information Communication And Computing Technology
DOWNLOAD
Author : V. Sharmila
language : en
Publisher: CRC Press
Release Date : 2024-12-10
Challenges In Information Communication And Computing Technology written by V. Sharmila and has been published by CRC Press this book supported file pdf, txt, epub, kindle and other format this book has been release on 2024-12-10 with Computers categories.
This book explores the critical challenges and emerging trends in Information, Communication, and Computing Technology (ICCT). It provides a comprehensive overview of the key issues facing these rapidly evolving fields, from data security and privacy to advancements in artificial intelligence, communication networks, and quantum computing. Through in-depth analysis and expert perspectives, this volume aims to shed light on the complexities of ICCT and offer innovative solutions for researchers, practitioners, and students. Building on its exploration of challenges in ICCT, this book delves into several core areas. These include the development and deployment of secure and efficient communication networks, the ethical implications and technical hurdles of artificial intelligence and machine learning, and the promise and complexity of quantum computing. The book also addresses the management of big data, highlighting both its potential and the challenges of ensuring data privacy and security. Additionally, it examines the role of sustainability in computing, advocating for greener technologies and practices. The findings presented in this volume emphasize the need for interdisciplinary approaches and innovative thinking to address these challenges, offering insights that are both practical and forward-looking. This book is intended for a diverse audience that includes researchers, practitioners, and students in the fields of Information, Communication, and Computing Technology (ICCT). It is particularly valuable for academics and professionals seeking to deepen their understanding of current challenges and emerging trends in these areas. Additionally, policymakers, industry leaders, and technologists will find the book's insights useful for informing decisions and strategies in the development and implementation of advanced technologies. Whether you are a seasoned expert or a newcomer to the field, this book provides valuable perspectives that can enhance your knowledge and contribute to your work in ICCT. The Open Access version of this book, available at http://www.taylorfrancis.com, has been made available under a Creative Commons [Attribution-Non Commercial-No Derivatives (CC-BY-NC-ND)] 4.0 license.
Iot
DOWNLOAD
Author : Souvik Pal
language : en
Publisher: CRC Press
Release Date : 2020-06-03
Iot written by Souvik Pal and has been published by CRC Press this book supported file pdf, txt, epub, kindle and other format this book has been release on 2020-06-03 with Computers categories.
IOT: Security and Privacy Paradigm covers the evolution of security and privacy issues in the Internet of Things (IoT). It focuses on bringing all security and privacy related technologies into one source, so that students, researchers, and practitioners can refer to this book for easy understanding of IoT security and privacy issues. This edited book uses Security Engineering and Privacy-by-Design principles to design a secure IoT ecosystem and to implement cyber-security solutions. This book takes the readers on a journey that begins with understanding the security issues in IoT-enabled technologies and how it can be applied in various aspects. It walks readers through engaging with security challenges and builds a safe infrastructure for IoT devices. The book helps readers gain an understand of security architecture through IoT and describes the state of the art of IoT countermeasures. It also differentiates security threats in IoT-enabled infrastructure from traditional ad hoc or infrastructural networks, and provides a comprehensive discussion on the security challenges and solutions in RFID, WSNs, in IoT. This book aims to provide the concepts of related technologies and novel findings of the researchers through its chapter organization. The primary audience includes specialists, researchers, graduate students, designers, experts and engineers who are focused on research and security related issues. Souvik Pal, PhD, has worked as Assistant Professor in Nalanda Institute of Technology, Bhubaneswar, and JIS College of Engineering, Kolkata (NAAC "A" Accredited College). He is the organizing Chair and Plenary Speaker of RICE Conference in Vietnam; and organizing co-convener of ICICIT, Tunisia. He has served in many conferences as chair, keynote speaker, and he also chaired international conference sessions and presented session talks internationally. His research area includes Cloud Computing, Big Data, Wireless Sensor Network (WSN), Internet of Things, and Data Analytics. Vicente García-Díaz, PhD, is an Associate Professor in the Department of Computer Science at the University of Oviedo (Languages and Computer Systems area). He is also the editor of several special issues in prestigious journals such as Scientific Programming and International Journal of Interactive Multimedia and Artificial Intelligence. His research interests include eLearning, machine learning and the use of domain specific languages in different areas. Dac-Nhuong Le, PhD, is Deputy-Head of Faculty of Information Technology, and Vice-Director of Information Technology Apply and Foreign Language Training Center, Haiphong University, Vietnam. His area of research includes: evaluation computing and approximate algorithms, network communication, security and vulnerability, network performance analysis and simulation, cloud computing, IoT and image processing in biomedical. Presently, he is serving on the editorial board of several international journals and has authored nine computer science books published by Springer, Wiley, CRC Press, Lambert Publication, and Scholar Press.
Soft Computing For Security Applications
DOWNLOAD
Author : G. Ranganathan
language : en
Publisher: Springer Nature
Release Date : 2022-09-29
Soft Computing For Security Applications written by G. Ranganathan and has been published by Springer Nature this book supported file pdf, txt, epub, kindle and other format this book has been release on 2022-09-29 with Technology & Engineering categories.
This book features selected papers from the International Conference on Soft Computing for Security Applications (ICSCS 2022), held at Dhirajlal Gandhi College of Technology, Tamil Nadu, India, during April 21–22, 2022. It covers recent advances in the field of soft computing techniques such as fuzzy logic, neural network, support vector machines, evolutionary computation, machine learning and probabilistic reasoning to solve various real-time challenges. This book presents innovative work by leading academics, researchers, and experts from industry.