A Hybrid Technique for Enhancing Data Security

Manikandan, G, Harini, P and Harinirajalakshmi, K A Hybrid Technique for Enhancing Data Security. International Journal of Pure and Applied Mathematics, 2018, vol. 119, n. 12, pp. 13309-13315. [Journal article (Paginated)]

[thumbnail of 1213.pdf]
Preview
Text
1213.pdf

Download (580kB) | Preview

English abstract

The worldwide information and technology has an astounding dependency o n data s e c u r i t y . The r i s k fabricated by the interloper has been a maelstrom for forthcoming specialists. Security pl ay s an essential role in governing the data transfer. The primary objective of this paper is to propose a black box approach which generates a modified plain text from the original message. For this purpose, we have used techniques like Perturbation, Swapping and Shifting which will modify the original plain text. Before giving the plain text directly into encryption process, the m o d i f i e d plain text obtained f r o m above techniques will be given as an input. The complexity of breaking the plain text is increased by applying the above techniques. For experimental purpose, w e use AES algorithm for encryption and d e c r y p t i o n and Java is used for implementing t h e proposed a p p r o a c h . © 2018 Academic Press. All Rights Reserved.

Item type: Journal article (Paginated)
Keywords: AES, Decryption, Encryption, Plaintext, Security
Subjects: B. Information use and sociology of information
B. Information use and sociology of information > BC. Information in society.
Depositing user: Raster Daster
Date deposited: 02 Aug 2018 07:30
Last modified: 02 Aug 2018 07:30
URI: http://hdl.handle.net/10760/33253

References

[1] William Stallings. Cryptography and Network Security. Wiley; 1995.

[2] Bruce Schiner. Applied Cryptography. John Wiley; 1996.

[3] Sachin Sharma , Jeevan Singh Bisht , "Performance Analysis of Data Encryption Algorithms" International Journal of Scientific Research in Network Security and Communication , 3(1) , 2015 , 1-5.

[4] G.Manikandan, R.Manikandan, G.Sundarganesh. A New Approach for Generating Strong Key in RC4 Algorithm. Journal of Theoretical and applied information Technology. 2011. 24; pp.113-119.

[5] Yu-Jung Huang, Yang-Shih Lin, Kuang-Yu Hung,Kuo-Chen Lin 2006 "Efficient Implementation of AES IP", IEEE Asia Pacific Conference on Circuits and Systems, 2006

[6] Subashri T, Aruna chalam R, Gokul Vinoth Kumar B ,Vaidehi V, "Pipelining Architecture of AES Encryption and Key Generation with Search Based Memory" , International Conference on Network Security and Applications. CNSA 2010. Communications in Computer and Information Science, vol 89. 224-231

[7]Natasha Saini ,Nitin Pandey, Ajeet Pal Singh ENHANCEMENT OF SECURITY USING CRYPTOGRAPHIC TECHNIQUES , 4th International Conference on Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions), 2015

[8] G.Manikandan, R. DalhousePrabu, P. SravanKumar, M. SudhakarRaj, S. Venkatakrishnan. Rendering A Fortify Key to Enhance the Security of Cryptographic Algorithms. International Journal of Applied Engineering Research. 2014. 9; pp.1987-1955.

[9] Himanshu Tripathi, Bramah Hazela Data Security Enhancement Through Number System 2016 Second International Conference on Computational Intelligence & Communication Technology,632-637

[10] Shaikh Ammarah P, Vikas Kaul and S K Narayankhedkar Security Enhancement Algorithm for Data Transmission using Elliptic Curve Diffie - Hellman Key Exchange, International Conference & workshop on Advanced Computing 2014 (ICWAC 2014) – 10-16

[11] Jigar Chauhan , Neekhil Dedhia , Bhagyashri Kulkarni Enhancing Data Security by using Hybrid Cryptographic Algorithm International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 3, May 2013 221-228.

[12] S.Karthikeyan, N.Sairam, G.Manikandan, J.Sivaguru. A Parallel Approach for Improving Data Security. Journal of Theoretical and Applied Information Technology. 2012. 39; pp. 119-125.

[13] S.Karthikeyan, N.Sairam, G.Manikandan. A New Approach for Enhancing Data Security Using Parallel Processing. Advances in Natural and Applied Sciences. 2012. 6; pp.696-703.

[14] T. M. Sadikot, Dr. D. G. Kamdar Data Security Enhancement with Crystography – A Combination of Cryptography and Steganography International Journal Of Darshan Institute On Engineering Research & Emerging Technologies Vol. 4, No. 1, 2015 , 1-6.

[15] G.Manikandan, P.Rajendiran, K.Chakarapani, G.Krishnan, G.SundarGanesh. A Modified Crypto Scheme for Enhancing Data Security. Journal of Theoretical and applied information Technology. 2012. 35; pp.149-154.

[16] G.Manikandan, N.Sairam, M.Kamarasan. A Hybrid Approach for Security Enhancement by Compressed Crypto-Stegno Scheme. Journal of Applied Sciences, Engineering and Technology. 2012. 4; pp.608-614.

[17] Sombir Singh, Sunil K. Maakar Dr.Sudesh Kumar, Enhancing the Security of DES Algorithm Using Transposition Cryptography Techniques, International Journal of Advanced Research in Computer Science and Software Engineering, vol 3(6), 2013 , pp. 464-471.

[18] Logesh, R., Subramaniyaswamy, V., Vijayakumar, V., Gao, X. Z., & Indragandhi, V. (2017). A hybrid quantum-induced swarm intelligence clustering for the urban trip recommendation in smart city. Future Generation Computer Systems, 83, 653-673.

[19] Subramaniyaswamy, V., & Logesh, R. (2017). Adaptive KNN based Recommender System through Mining of User Preferences. Wireless Personal Communications, 97(2), 2229-2247.

[20] Logesh, R., & Subramaniyaswamy, V. (2017). A Reliable Point of Interest Recommendation based on Trust Relevancy between Users. Wireless Personal Communications, 97(2), 2751-2780.

[21] Logesh, R., & Subramaniyaswamy, V. (2017). Learning Recency and Inferring Associations in Location Based Social Network for Emotion Induced Point-of-Interest Recommendation. Journal of Information Science & Engineering, 33(6), 1629–1647.

[22] Subramaniyaswamy, V., Logesh, R., Abejith, M., Umasankar, S., & Umamakeswari, A. (2017). Sentiment Analysis of Tweets for Estimating Criticality and Security of Events. Journal of Organizational and End User Computing (JOEUC), 29(4), 51-71.

[23] Indragandhi, V., Logesh, R., Subramaniyaswamy, V., Vijayakumar, V., Siarry, P., & Uden, L. (2018). Multi-objective optimization and energy management in renewable based AC/DC microgrid. Computers & Electrical Engineering.

[24] Subramaniyaswamy, V., Manogaran, G., Logesh, R., Vijayakumar, V., Chilamkurti, N., Malathi, D., & Senthilselvan, N. (2018). An ontology-driven personalized food recommendation in IoT-based healthcare system. The Journal of Supercomputing, 1-33.

[25] Arunkumar, S., Subramaniyaswamy, V., & Logesh, R. (2018). Hybrid Transform based Adaptive Steganography Scheme using Support Vector Machine for Cloud Storage. Cluster Computing.

[26] Indragandhi, V., Subramaniyaswamy, V., & Logesh, R. (2017). Resources, configurations, and soft computing techniques for power management and control of PV/wind hybrid system. Renewable and Sustainable Energy Reviews, 69, 129-143.

[27] Ravi, L., & Vairavasundaram, S. (2016). A collaborative location based travel recommendation system through enhanced rating prediction for the group of users. Computational intelligence and neuroscience, 2016, Article ID: 1291358.

[28] Logesh, R., Subramaniyaswamy, V., Malathi, D., Senthilselvan, N., Sasikumar, A., & Saravanan, P. (2017). Dynamic particle swarm optimization for personalized recommender system based on electroencephalography feedback. Biomedical Research, 28(13), 5646-5650.

[29] Arunkumar, S., Subramaniyaswamy, V., Karthikeyan, B., Saravanan, P., & Logesh, R. (2018). Meta-data based secret image sharing application for different sized biomedical images. Biomedical Research,29.

[30] Vairavasundaram, S., Varadharajan, V., Vairavasundaram, I., & Ravi, L. (2015). Data mining‐based tag recommendation system: an overview. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 5(3), 87-112.

[31] Logesh, R., Subramaniyaswamy, V., & Vijayakumar, V. (2018). A personalised travel recommender system utilising social network profile and accurate GPS data. Electronic Government, an International Journal, 14(1), 90-113.

[32] Vijayakumar, V., Subramaniyaswamy, V., Logesh, R., & Sivapathi, A. (2018). Effective Knowledge Based Recommeder System for Tailored Multiple Point of Interest Recommendation. International Journal of Web Portals.

[33] Subramaniyaswamy, V., Logesh, R., & Indragandhi, V. (2018). Intelligent sports commentary recommendation system for individual cricket players. International Journal of Advanced Intelligence Paradigms, 10(1-2), 103-117.

[34] Indragandhi, V., Subramaniyaswamy, V., & Logesh, R. (2017). Topological review and analysis of DC-DC boost converters. Journal of Engineering Science and Technology, 12 (6), 1541–1567.

[35] Saravanan, P., Arunkumar, S., Subramaniyaswamy, V., & Logesh, R. (2017). Enhanced web caching using bloom filter for local area networks. International Journal of Mechanical Engineering and Technology, 8(8), 211-217.

[36] Arunkumar, S., Subramaniyaswamy, V., Devika, R., & Logesh, R. (2017). Generating visually meaningful encrypted image using image splitting technique. International Journal of Mechanical Engineering and Technology, 8(8), 361–368.

[37] Subramaniyaswamy, V., Logesh, R., Chandrashekhar, M., Challa, A., & Vijayakumar, V. (2017). A personalised movie recommendation system based on collaborative filtering. International Journal of High Performance Computing and Networking, 10(1-2), 54-63.

[38] Senthilselvan, N., Udaya Sree, N., Medini, T., Subhakari Mounika, G., Subramaniyaswamy, V., Sivaramakrishnan, N., & Logesh, R. (2017). Keyword-aware recommender system based on user demographic attributes. International Journal of Mechanical Engineering and Technology, 8(8), 1466-1476.

[39] Subramaniyaswamy, V., Logesh, R., Vijayakumar, V., & Indragandhi, V. (2015). Automated Message Filtering System in Online Social Network. Procedia Computer Science, 50, 466-475.

[40] Subramaniyaswamy, V., Vijayakumar, V., Logesh, R., & Indragandhi, V. (2015). Unstructured data analysis on big data using map reduce. Procedia Computer Science, 50, 456-465.

[41] Subramaniyaswamy, V., Vijayakumar, V., Logesh, R., & Indragandhi, V. (2015). Intelligent travel recommendation system by mining attributes from community contributed photos. Procedia Computer Science, 50, 447-455.

[42] Vairavasundaram, S., & Logesh, R. (2017). Applying Semantic Relations for Automatic Topic Ontology Construction. Developments and Trends in Intelligent Technologies and Smart Systems, 48.


Downloads

Downloads per month over past year

Actions (login required)

View Item View Item