Key Management for Enterprise Data Encryption

2007 ◽  
Author(s):  
Ulf T. Mattsson
2019 ◽  
Vol 2019 ◽  
pp. 1-13 ◽  
Author(s):  
Xuncai Zhang ◽  
Lingfei Wang ◽  
Guangzhao Cui ◽  
Ying Niu

Traditional encryption algorithms are inefficient when applied to image encryption because image data have the characteristics of large data sizes and strong correlations between adjacent pixels. The shortcomings of the traditional Data encryption standard (DES) encryption algorithm when applied to image encryption are analyzed, and a new image encryption algorithm based on the traditional DES encryption algorithm model, chaotic systems, DNA computing, and select cipher-text output is proposed. Select cipher-text output selects cipher image with the biggest entropy, and it can increase the randomness of cipher image and reduce the risk of encryption system being broken down. This algorithm overcomes the shortcomings of high computational complexity and inconvenient key management that the traditional text encryption algorithm has when applied to image encryption. The experimental results show that the security of this algorithm is verified by analyzing the information entropy, image correlation of adjacent pixels and other indexes. At the same time, this algorithm passes the noise attack test and the occlusion attack test, so it can resist common attacks.


2020 ◽  
Vol 10 (1) ◽  
pp. 5108-5112
Author(s):  
M. B. Apsara ◽  
P. Dayananda ◽  
C. N. Sowmyarani

Wireless Sensor Networks (WSNs) is a fast-emerging technology which has become an integral part of the research. WSNs have various applications covering military, environment monitoring, health care, surveillance, national security, etc. Due to the inherent nature of wireless communication, such types of networks are more vulnerable to security attacks, and the authentication and confidentiality of wireless networks are much more critical. WSNs needs include efficient clustering methods, data aggregation methods, data compression methods, data encryption and authentication methods, and data gathering methods. WSNs are more vulnerable to attacks due to their ad hoc nature, so the design of a good key management scheme to provide security is necessary. In this paper, different methods of clustering, data aggregation, data compression, data encryption and authentication, and data gathering are analyzed. A survey is conducted on the key management schemes of WSNs.


Author(s):  
Abbas Mehdizadeh ◽  
Fazirulhisyam Hashim ◽  
Raja S. Azmir Raja Abdullah

Key management is one of the challenging issues in group communications. It is generally used to secure multicast data transmission as well as preventing potential eavesdropping by malicious attackers. Group security key should be maintained for data encryption, while group key update and dissemination processes are required when a new user joins or leaves the group, which eventually lead to high communication and computation cost. Since eavesdrop activities can be initiated by capturing the disseminated keys, higher communication and computation cost due to frequent updates also increase the possibility of attack of multicast transmission. In this paper, a key management scheme for IPv6 networks is proposed to reduce communication and computation cost and therefore, fewer security risks. The obtained results from test-bed implementation show the efficiency of proposed scheme in terms of communication and computation cost, number of updated paths and security index due to key updating, while at the same time achieving both forward and backward secrecy.


1978 ◽  
Vol 17 (2) ◽  
pp. 106-125 ◽  
Author(s):  
W. F. Ehrsam ◽  
S. M. Matyas ◽  
C. H. Meyer ◽  
W. L. Tuchman

2014 ◽  
Vol 989-994 ◽  
pp. 2543-2546
Author(s):  
Peng Wang ◽  
Fu Zheng Zhang ◽  
Chun Lei Han

With the continuous expansion of the scale data storage, cloud storage technology for its high performance and low cost to get a lot of attention and support. However, the security issues of cloud storage data hinder its further promotion. For the current cloud storage applications of data stored encrypted, a cloud storage encryption scheme based on the separated key and encryption policy is proposed. By strengthening the data encryption key management and data encryption algorithm, the system achieves a more secure storage of data assurance in the technical level.


2020 ◽  
Vol 39 (3) ◽  
pp. 3297-3314
Author(s):  
Keshav Sinha ◽  
Annu Priya ◽  
Partha Paul

Cloud has become one of the most demanding services for data storage. On another hand, the security of data is one of the challenging tasks for Cloud Service Provider (CSP). Cryptography is one of the ways for securing the storage data. Cryptography is not a new approach instead of the efficient utilization of cryptographical algorithms is greatly needed. In this work, we proposed a Secure Hidden Layer (SHL) and Application Programming Interface (API) for data encryption. The SHL is consisting of two major modules (i) Key Management Server (KMS) and (ii) Share Holder Server (SHS) which is used for storing and sharing of cryptographic key. For this purpose, we proposed a server-side encryption algorithm, which is based on the asymmetric algorithm (RSA and CRT) for providing end-to-end security of multimedia data. The experimental results of text and video are evidence that the size of file is not much affected after the encryption and effectively stored at Cloud Storage Server (CSS). The parameters like ciphertext size, encryption time and throughput are considered for performance evaluation of the proposed encryption technique.


In recent years, with the widespread application of cloud computing, more and more enterprises, institutions, and individuals have started to use cloud services to place their data in the cloud. With the rise of cloud services, the accompanying data security issues have received increasing attention. Because data stores are in the cloud, there are many outstanding security issues. This paper proposes a public cloud data security solution based on a trusted third-party platform. The solution is based on an independent and trusted third-party platform, and has certain advantages in data encryption, key management, data awareness, data sharing, and accident responsibility.


Energies ◽  
2020 ◽  
Vol 13 (11) ◽  
pp. 2910
Author(s):  
Carlos Cruz ◽  
Esther Palomar ◽  
Ignacio Bravo ◽  
Alfredo Gardel

Demand response (DR) is emerging as the workhorse of achieving energy efficiency and reducing our carbon footprint, which persists as a major challenge amongst all the different energy-chain players, i.e., the utility providers, policy makers, consumers, and the technology sector. For instance, the Internet-of-Things (IoT) paradigm and network-enabled appliances/devices have escalated the expectations of what technology could do for the acceptance of DR programs. In this work, we design, deploy on a scalable pilot testbed, and evaluate a collaboration-based approach to the demand-side management of a community of electricity consumers that jointly targets green consumption. The design of the framework architecture is centralized via the so-called aggregator, which optimizes the demand scheduled by consumers along with their time frame preferences towards the maximization of the consumption of renewables. On the pilot, we opt for lightweight, yet efficient platforms such as Raspberry Pi boards, and evaluate them over a series of network protocols, i.e., MQTT-TLS and CoAP-DTLS, paying special attention to the security and privacy of the communications over Z-Wave, ZigBee, and WiFi. The experiments conducted are configured using two active Living Labs datasets from which we extract three community scenarios that vary according to the flexibility or rigidity of the appliances’ operation time frame demand. During the performance evaluation, processing and communication overheads lie within feasible ranges, i.e., the aggregator requires less than 2 s to schedule a small consumer community with four appliances, whereas the latency of its link to households’ controllers adds less than 100 ms. In addition, we demonstrate that our implementations running over WiFi links and UDP sockets on Raspberry Pi 4 boards are fast, though insecure. By contrast, secure CoAP (with DTLS) offers data encryption, automatic key management, and integrity protection, as well as authentication with acceptable overheads.


Sign in / Sign up

Export Citation Format

Share Document