scispace - formally typeset
Search or ask a question
Proceedings ArticleDOI

Graph-Based Symmetric Crypto-System for Data Confidentiality

TL;DR: A novel graph-based crypto-system is proposed to provide data confidentiality during communication between users and devices that uses a set of graphs of order n along with an operation defined over it to form a group algebraic structure.
Abstract: The use of cryptography systems in cyber security domain has become a primary focus to maintain data confidentiality. Several cryptography solutions exist for protecting data against confidentiality attack. Due to the advancement of computing infrastructure, there is always a need for novel security solution to protect data and introduce more complexity to the intruder. In this paper, a novel graph-based crypto-system is proposed to provide data confidentiality during communication between users and devices. The proposed crypto- system uses a set of graphs of order n along with an operation defined over it to form a group algebraic structure. Using this group, plaintext, ciphertext, and secret key are represented as a graph. The encryption and decryption processes are performed over the graphs using the operation defined in the group. It is then demonstrated that the proposed crypto-system is valid, and for a large n value, brute-forcing attempts to derive the key from plaintext or ciphertext is computationally infeasible.
Citations
More filters
Journal ArticleDOI
TL;DR: A novel symmetric cryptosystem is presented for achieving data confidentiality by providing a simplified transformation process and representation of plaintext to plaintext graph and compared with AES to infer that it incurs a marginally higher execution time than the AES for larger plaintext due to the involvement of matrix operations.

7 citations

References
More filters
Journal ArticleDOI
TL;DR: This survey analyzes existing protocols and mechanisms to secure communications in the IoT, as well as open research issues and analyzes the open challenges and strategies for future research work in the area.
Abstract: The Internet of Things (IoT) introduces a vision of a future Internet where users, computing systems, and everyday objects possessing sensing and actuating capabilities cooperate with unprecedented convenience and economical benefits. As with the current Internet architecture, IP-based communication protocols will play a key role in enabling the ubiquitous connectivity of devices in the context of IoT applications. Such communication technologies are being developed in line with the constraints of the sensing platforms likely to be employed by IoT applications, forming a communications stack able to provide the required power—efficiency, reliability, and Internet connectivity. As security will be a fundamental enabling factor of most IoT applications, mechanisms must also be designed to protect communications enabled by such technologies. This survey analyzes existing protocols and mechanisms to secure communications in the IoT, as well as open research issues. We analyze how existing approaches ensure fundamental security requirements and protect communications on the IoT, together with the open challenges and strategies for future research work in the area. This is, as far as our knowledge goes, the first survey with such goals.

968 citations


"Graph-Based Symmetric Crypto-System..." refers background in this paper

  • ...Crypto-systems are typically used to provide data confidentiality over an insecurer communication medium, such as those based on elliptic-curve cryptography (ECC), RSA, and Diffie– Hellman [1], [2]....

    [...]

  • ...Individual layer wise, security threats have been classified in [2] [12], where authors also find the weakness of current security solution by highlighting the need of novel cryptography solution for several applications....

    [...]

Journal ArticleDOI
TL;DR: The blockchain is a public ledger that works like a log by keeping a record of all transactions in chronological order, secured by an appropriate consensus mechanism and providing an immutable record.
Abstract: In 2008, the emergence of the blockchain as the foundation of the first-ever decentralized cryptocurrency not only revolutionized the financial industry but proved a boon for peer-to-peer (P2P) information exchange in the most secure, efficient, and transparent manner. The blockchain is a public ledger that works like a log by keeping a record of all transactions in chronological order, secured by an appropriate consensus mechanism and providing an immutable record. Its exceptional characteristics include immutability, irreversibility, decentralization, persistence, and anonymity.

270 citations


"Graph-Based Symmetric Crypto-System..." refers background in this paper

  • ...Blockchain provides decentralized security framework, whereas it’s still under research to apply into real-time resource constrain networks [13] [14]....

    [...]

Journal ArticleDOI
TL;DR: A novel load balancing technique is proposed to authenticate the EDCs and find less loaded EDCs for task allocation and strengthens the security by authenticating the destination EDCs.
Abstract: Fog computing is a recent research trend to bring cloud computing services to network edges. EDCs are deployed to decrease the latency and network congestion by processing data streams and user requests in near real time. EDC deployment is distributed in nature and positioned between cloud data centers and data sources. Load balancing is the process of redistributing the work load among EDCs to improve both resource utilization and job response time. Load balancing also avoids a situation where some EDCs are heavily loaded while others are in idle state or doing little data processing. In such scenarios, load balancing between the EDCs plays a vital role for user response and real-time event detection. As the EDCs are deployed in an unattended environment, secure authentication of EDCs is an important issue to address before performing load balancing. This article proposes a novel load balancing technique to authenticate the EDCs and find less loaded EDCs for task allocation. The proposed load balancing technique is more efficient than other existing approaches in finding less loaded EDCs for task allocation. The proposed approach not only improves efficiency of load balancing; it also strengthens the security by authenticating the destination EDCs.

188 citations


"Graph-Based Symmetric Crypto-System..." refers background in this paper

  • ...Graphical representation of data has always been an important role because of its application in several areas such as, coding theory, communication networks and network security [3] [4]....

    [...]

Journal ArticleDOI
TL;DR: This article discusses the security threats in EDCs and CDCs by dividing the complete network structure into three layers: perception layer, network layer, and application layer.
Abstract: Several application domains are collecting data using Internet of Things sensing devices and shipping it to remote cloud datacenters for analysis (fusion, storage, and processing). Data analytics activities raise a new set of technical challenges from the perspective of ensuring end-to-end security and privacy of data as it travels from an edge datacenter (EDC) to a cloud datacenter (CDC) (or vice versa). This article discusses the security threats in EDCs and CDCs by dividing the complete network structure into three layers: perception layer, network layer, and application layer.

153 citations


"Graph-Based Symmetric Crypto-System..." refers background in this paper

  • ...Individual layer wise, security threats have been classified in [2] [12], where authors also find the weakness of current security solution by highlighting the need of novel cryptography solution for several applications....

    [...]

Book
25 Jun 2007
TL;DR: This presentation explains how public key cryptosystems, biometric-based security systems, and trust management systems in communication networks help to protect against malware and other threats.
Abstract: E-based systems are ubiquitous in the modern world with applications spanning e-commerce, WLANs, health care and government organisations. The secure transfer of information has therefore become a critical area of research, development, and investment. This book presents the fundamental concepts and tools of e-based security and its range of applications. The core areas of e-based security - authentication of users; system integrity; confidentiality of communication; availability of business service; and non-repudiation of transactions - are covered in detail. Throughout the book the major trends, challenges and applications of e-security are presented, with emphasis on public key infrastructure (PKI) systems, biometric-based security systems, trust management systems, and the e-service paradigm. Intrusion detection technologies, virtual private networks (VPNs), malware, and risk management are also discussed. Technically oriented with many practical examples, this book is suitable for practitioners in network security, as well as graduate students and researchers in telecommunications and computer science.

89 citations


"Graph-Based Symmetric Crypto-System..." refers background in this paper

  • ...Index Terms—Data confidentiality, cyber security, graph-based encryption I. INTRODUCTION Crypto-systems are typically used to provide data confidentiality over an insecurer communication medium, such as those based on elliptic-curve cryptography (ECC), RSA, and Diffie– Hellman [1], [2]....

    [...]

  • ...Crypto-systems are typically used to provide data confidentiality over an insecurer communication medium, such as those based on elliptic-curve cryptography (ECC), RSA, and Diffie– Hellman [1], [2]....

    [...]