scholarly journals A Dynamic and Highly Configurable Crypto-Processor for brief communication interval

2021 ◽  
Vol 23 (05) ◽  
pp. 551-561
Author(s):  
Riya Bagul ◽  
◽  
Atharva Karaguppi ◽  
Vishwas Karale ◽  
Mudit Singal ◽  
...  

In modern computing systems data security is of paramount importance. The data transfer must be made secure because it can be significantly sensitive for any organization involved. This paper expounds a SOC architecture to facilitate end to end secure data exchange for applications involving short communication intervals. This SOC has been designed to behave as a co-processor which along with a standard general-purpose processor would serve as a cryptosystem. The SOC employs two famous algorithms – RSA and AES for cryptography. In contrast to usual single key cryptographic systems, this paper tries to elaborate an innovative methodology involving dynamic security measures that makes the system distributed rather than making it central to a specific algorithm and hence a particular key. The methodology involves generating and using an AES key for data encryption and RSA key for secure transfer of the AES key between the point of transmission and reception.

Author(s):  
Shivankur Thapliyal

Abstract: Computer Networking Play’s a major role for data communication or data sharing and data transmissions from one location to another, which are geographically differ, but in today’s scenario where the main and primary major concerns are not to data transfer but also utilize all resources with greater efficiency and also preserves the confidentiality and integrity of the messages with respect to speed and time with lower Bandwidth and also consume a very low computational costs with low power supply and redirect to optimality. Cloud Computing also play’s a significant role to access data at geographically different locations. So In this paper we create a fusion of Computer Networking Architecture and Cloud Computing Architecture and released a very much superior fundamentally strong Cloud computing based Computer Networking model, which works on the concepts of ‘Virtualization’. Because when the number of hardware components (Servers) drastically increases all factors which are responsible to make possible networking among nodes are also consume each resources at extreme level, and networking becomes complex and slow, that’s why we used the concept of Virtual Machine. In this paper we proposed a Computer Networking model using the concepts of Cloud Computing. This model also suitable for data transmission but also take concern the most significant feature of Computer Networking, which is Data Security. This model also used some Proxy servers/ firewalls to take concern some security mechanisms. In this paper we also proposed Communication Oriented model among the Intercluster domains that how one node which belongs to another CLOUD cluster make possible communication among other InterCLOUD clusters with respect to data security measures. In this paper we proposed three models related to this networking model, which is CLOUD Networking Infrastructure, Connection Oriented model, Communication Oriented model. The detailed description of all three models are in the upcoming sections of this paper. Keywords: Cloud computing based computer networking model, A virtual model for computer networking, Computer Networking model based on virtualization, Virtualization based computer networking model.


Author(s):  
Zolidah Kasiran ◽  
Hikma Farah Ali ◽  
Noorhayati Mohamed Noor

The advancement of the data communication technologies has increased the traffic of data exchange over the internet and at the same time created the opportunity of data attack by various party.  This paper present  Time Performance Analysis Of Advanced Encryption Standard And Data Encryption Standard  in Data Security Transaction<strong>. </strong>In this study we proposed an AES algorithm with  different key size, and different file format. Our aim is to safely to transfer the file for using the AES algorithm. Proposed algorithm has done by analyzing the different time taken for both AES and DES, experiments were done by three different file  format which were text, image, and voice. Each file format type was tested with five different file sizes. The result of each experiments were analysed and it was confirmed that  the AES algorithm have better performance in term of time taken as compared to DES.


This Paper displays an adaptable and versatile movement estimation processor fit for supporting the handling prerequisites for top notch (HD) video utilizing the H.264 Advanced Video Codec, which is appropriate for FPGA execution. This paper dependent on General Purpose processor plan for movement estimation process. Quick movement estimation calculation with full pursuit calculation and precious stone hunt calculation. Where the two calculations have been executed in a solitary processor. So client can powerfully pick as per best execution. A client can choose the alternative of video quality at run time. In contrast to most past work, our center is enhanced to execute all current quick square coordinating calculations, to coordinate or surpass the between casing expectation execution of full-seek approaches at the HD goals generally being used today. Different tale movement estimation designs have been proposed all through the writing for dealing with the high data transfer capacity imperative nature of Video Broadcasting. A High precision full pursuit fixed square inquiry calculation is used to lessen the general transmission capacity and power prerequisite for transmitting live video arrangements. Despite the fact that full hunt guarantees high exactness, it tradeoffs its calculation time for precision. So the precision advantage is emphatically obscured by working velocity. To supplant the Full inquiry calculation another Modified Diamond seek calculation has been proposed with best precision and streamlined movement estimation length. Execution assessment of FBS Full hunt and Diamond look will be thought about for future investigation


2021 ◽  
pp. 1063293X2110085
Author(s):  
A Siva Kumar ◽  
S Godfrey Winster ◽  
R Ramesh

Data security in the cloud has become a dominant topic being discussed in recent times as the security of data in the cloud has been focused on by several researchers. However, the data security was enforced at the attribute level, the adversaries are capable of learning the method of data encryption even there are access restrictions are enforced at an attribute level. To challenge the adversaries with more sophisticated security measures, an efficient real-time service-centric feature sensitivity analysis (RSFSA) model is proposed in this paper. The RSFSA model analyses the sensitivity of different features being accessed by any service and at multiple levels. At each level, the method checks the set of features being accessed and the number of features the user has access grant to compute the FLAG value for the user according to the profile given. Based on the value of FLAG, the user has been granted or denied service access. On the other side, the method maintains different encryption schemes and keys for each level of features. As the features are organized in multiple levels, the method maintains a set of schemes and keys for each level dedicative. Based on the service level and data, the method selects an encryption scheme and key to perform data encryption. According to that, the service access data has been encrypted at the attribute level with a specific scheme and key. Data encrypted has been uploaded to the blockchain and the method modifies the reference part of the chain to connect only the blocks to which the user has access. The chain given to the user would do not contain any reference from a specific block to which the user has no access. The proposed method improves the performance of data security and access restriction greatly.


2019 ◽  
Vol 8 (2) ◽  
pp. 3476-3482

Technologies to design an embedded system can be of three types: processor technology, IC technology & design technology. Billions of computing systems are built every year for a variety of purpose. They are built within larger electronic devices. These systems perform a one particular function on regular basis. These systems do not recognized by the device’s user. These systems are known as embedded system. Broad categories for system implementation are: Application Specific Integrated Circuit, Field Programmable Gate Array, CoProcessor, Application Specific Instruction Processor and General Purpose Processor. From the network processor’s designing point of view, it is very important to understand the preliminary characteristics of network applications which are generally based on address lookup, pattern matching, and queuing management which is further classified as Control plane and Data Plane processing.


2018 ◽  
Vol 42 (6) ◽  
pp. 277-287 ◽  
Author(s):  
Roland Kammergruber ◽  
Jürgen Durner

AbstractSince the 1970s, computer supported data processing has been implemented in the laboratory and laboratory information systems (LIS) are being developed. In the following years, the programs were expanded and new laboratory requirements were inserted to the LIS. In the last few years, the requirements have grown more and more. The current tasks of the LIS are not only the management of laboratory requirements but also management of processes, data security and data transfer and they have become very important. Therefore, the current monolithic architecture of LIS has reached its limits. New methodologies like service oriented architecture, e.g. microservices, should be implemented. Thereby different specialized manufacturers provide software for one or a few tasks. These tasks can be more easily actualized like in the new field of agile software development. This new concept has been designed to provide updates and customer requirements according to its new organization structure in program development in a short time. For efficient data transfer, new interfaces and a standardization of master data like logical observation identifier names and codes (LOINC®) are advisable. With the growing data transfer, data security plays an increasingly important role. New concepts like blockchain programming (e.g. Medrec) are currently tested in (laboratory) medicine. To get an overview of the requirements of the own LIS, an Ishikawa diagram should be created. The main points of an Ishikawa diagram are shown and discussed. Based on the today-collected data, expert systems will be developed. For this kind of data mining, a structured data exchange is necessary.


Author(s):  
Hui Yang ◽  
Anand Nayyar

: In the fast development of information, the information data is increasing in geometric multiples, and the speed of information transmission and storage space are required to be higher. In order to reduce the use of storage space and further improve the transmission efficiency of data, data need to be compressed. processing. In the process of data compression, it is very important to ensure the lossless nature of data, and lossless data compression algorithms appear. The gradual optimization design of the algorithm can often achieve the energy-saving optimization of data compression. Similarly, The effect of energy saving can also be obtained by improving the hardware structure of node. In this paper, a new structure is designed for sensor node, which adopts hardware acceleration, and the data compression module is separated from the node microprocessor.On the basis of the ASIC design of the algorithm, by introducing hardware acceleration, the energy consumption of the compressed data was successfully reduced, and the proportion of energy consumption and compression time saved by the general-purpose processor was as high as 98.4 % and 95.8 %, respectively. It greatly reduces the compression time and energy consumption.


2003 ◽  
Vol 9 (1_suppl) ◽  
pp. 48-50 ◽  
Author(s):  
P Soegner ◽  
Th Rettenbacher ◽  
A Smekal ◽  
D Zur Nedden

summary The Tyrolean telemedicine pilot project linked the University Clinic of Innsbruck and the district hospital in Reutte. Five medical specialties were investigated: teleradiology, telepathology, teledermatology, tele-ophthalmology and tele-oncology. A Tyrolean ‘four-column model of quality management in telemedicine’ was introduced to ensure a global view of the project and to avoid mistakes. In teleradiology, a 12-step workflow was developed, which described the medical responsibilities at each stage. We found that the defined teleradiology workflow and the technical equipment for data security and data exchange worked without problems in over 79% of a total of 424 cases. To ensure continuous quality assurance, the whole teleradiology workflow was ISO 9001:2000 certified.


Author(s):  
Srinivasa P. Varanasi ◽  
Athamaram H. Soni

Abstract Data exchange between different CAD systems usually requires conversion between different representations of free-form curves and surfaces. Also, trimmed surfaces give rise to high degree boundary curves. Accurate conversion of these forms becomes necessary for reliable data transfer. Also important is the issue of shape control, specially in the aircraft industry. The objective of this paper is to investigate conversion methods and effect of shape control on the design and choice of such methods.


Sign in / Sign up

Export Citation Format

Share Document