scispace - formally typeset
Search or ask a question
Topic

On-the-fly encryption

About: On-the-fly encryption is a research topic. Over the lifetime, 6607 publications have been published within this topic receiving 154932 citations.


Papers
More filters
13 Jul 2017
TL;DR: This project provides a concrete scheme of key aggregate searchable encryption for group data sharing scenario where data owner needs to distribute a single key for sharing large number of documents and user required to submit a single trapdoor to the cloud for downloading multiple documents over the cloud.
Abstract: Cloud is being used by different type of users to fulfil their storage needs and sharing requirements. Public cloud storage provides virtually unlimited capacity to its users for sharing encrypted data. The main challenge is to design the encryption scheme which is efficient in management of encryption keys. Numbers of keys are required in the group data sharing scenario as well as it needs to distribute those keys in secure manner to the user and user has to store them securely again. Also user needs to create equally large number of trapdoors with keywords to access data. This project gives solution on this problem by providing a concrete scheme of key aggregate searchable encryption. In this, data owner needs to distribute a single key for sharing large number of documents and user required to submit a single trapdoor to the cloud for downloading multiple documents over the cloud. It also provides a solution for a situation where user searches for the documents shared by multiple owners and user needs to generate multiple trapdoors. In the proposed system, user needs to generate a single trapdoor for searching the files shared by multiple data owners. Index Terms —Cloud storage, Data privacy, Data sharing, Key aggregation, Searchable Encryption.
Journal Article
TL;DR: This work presents an improvement on the existing Advanced Encryption Standard (AES) Algorithm by implementing it on VB.NET framework to reduce encryption time and shows that the improvement has been successful.
Abstract: Due to the increasing use of images in industrial process, financial institutions, medical and military application, there is every need to achieve secure transmission and storage of digital images. Various methods have been investigated and developed to protect image data for personal privacy and encryption is probably the most obvious solution. This work presents an improvement on the existing Advanced Encryption Standard (AES) Algorithm by implementing it on VB.NET framework. Encryption time of AES was considered to be very long, especially when processing images using encryption key. Therefore, eliminating the use of encryption key will lead to reduced encryption time. Finally, comparisons made of the Improved AES Algorithm with the latest successful Algorithms in image encryption indicates that the Algorithms of Gamil and Pareek encrypts a Kilobyte of image at an average encryption time of 0.7 milliseconds and the average encryption time of the Improved AES is 0.3 milliseconds. This shows that the improvement has been successful.
Patent
22 May 2014
TL;DR: In this article, a method for keyword searchable encryption based on bilinear pairs in cloud storage is proposed, where authorized users can look for the encrypted files through a trap door connected with the keywords.
Abstract: The invention discloses a method for keyword searchable encryption based on bilinear pairs in cloud storage. The method includes the steps that firstly, system parameters are initialized; users are added; thirdly, encryption and security indexes for files are generated; fourthly, search tokens, relative to keywords, of the users are generated; fifthly, a cloud storage server is searched for keywords relative to ciphertexts; sixthly, the ciphertexts are decrypted by the users; seventhly, the users are logged out. According to the method, the authorized users can look for the encrypted files through a trap door connected with the keywords. The keywords used by the users for search cannot be known even by the cloud storage server, so that security of user information can be guaranteed; Compared with an existing scheme, the comprehensive efficiency of the aspects of communication and calculation cost, namely the aspects of the search speed of the size of the trap door, the encryption and search speed of the keywords, of the provided scheme is improved, and the method is suitable for multi-user environments.
Journal Article
TL;DR: This project proposes a novel method of reserving room before encryption with a traditional RDH algorithm, and thus it is easy for the data hider to reversibly embed data in the encrypted image.
Abstract: For several years, the protection of multimedia data is becoming very important. The protection of this multimedia data can be done with encryption or data hiding algorithms. To decrease the transmission time, the data compression is necessary. Recently, more and more attention is paid to reversible data hiding (RDH) in encrypted images, since it maintains the excellent property that the original cover can be Loss lessly recovered after embedded data is extracted while protecting the image contents confidentiality. All previous methods embed data by reversibly vacating room from the encrypted images, which may be subject to some errors on data extraction and/or image restoration. In this project, we propose a novel method of reserving room before encryption with a traditional RDH algorithm, and thus it is easy for the data hider to reversibly embed data in the encrypted image. The proposed method can achieve real reversibility, that is, data extraction and image recovery are free of any error.
Proceedings ArticleDOI
27 May 2011
TL;DR: In order to ensure the security of Web Geographic Information System in network transmission, the vector map data can be encrypted in the way of byte by byte using the chaos system to design encryption arithmetic.
Abstract: In order to ensure the security of Web Geographic Information System in network transmission, the vector map data can be encrypted in the way of byte by byte using the chaos system to design encryption arithmetic. In this way of encryption, it should firstly make sure the parameter of Logistic mapping, secondly the logistic mapping should be the key stream generator, which would be design to convert block cipher Data Encryption Standard into sequential cipher, finally the result of encryption should be real-time and key stream longness of plaintext and cipher text would be the same. In this way the impression of encryption would be more secure and efficient. The experiment showed that this arithmetic had less error code diffusibility and efficiency was well.

Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
86% related
Wireless sensor network
142K papers, 2.4M citations
79% related
Server
79.5K papers, 1.4M citations
79% related
Network packet
159.7K papers, 2.2M citations
78% related
Wireless ad hoc network
49K papers, 1.1M citations
78% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202359
2022116
20215
202012
201930
201843