Provide Privacy of Data and user Authentication using Efficient Encryption Technique

International Journal of Computer Science and Engineering
© 2016 by SSRG - IJCSE Journal
Volume 3 Issue 12
Year of Publication : 2016
Authors : Sattaru Sailaja, Chintada Sunil Kumar
: 10.14445/23488387/IJCSE-V3I12P101

pdf
Citation:
MLA Style:

Sattaru Sailaja, Chintada Sunil Kumar, "Provide Privacy of Data and user Authentication using Efficient Encryption Technique" SSRG International Journal of Computer Science and Engineering 3.12 (2016): 1-5.

APA Style:

Sattaru Sailaja, Chintada Sunil Kumar,(2016). Provide Privacy of Data and user Authentication using Efficient Encryption Technique. SSRG International Journal of Computer Science and Engineering 3(12), 1-5.

Abstract:

 Security is one of most important issue over the networks and also the smart phones. As a net technology implemented and alternate security threats also appear in the network. By overcome those type of security threats attacks we can implement cryptography techniques. Now days so many cryptography techniques are available in the market for performing encryption and decryption process. Most of the mobile operating system has been added this type of encryption process for protect their customer and mobile data. But implementing these algorithm face the problem of performance issues that discourage users from using them. Most of the time by implementing these encryption and decryption process will take more time. Though these encryption policies quite capable of securing mobile data, due to lack of proper management time, they are not used by users. By overcome these problems we can implement an efficient encryption and decryption process. In this paper we are propose matrix sub parts shifting transpose technique for encryption and decryption of mobile data. By implementing this technique we can overcome time complexity and also consumes less CPU power for encrypt, decrypt the system.

References:

[1]Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein, and Charles E. Youman, “Role based Access Control Models,” IEEE Computer, volume 2, February 1996, pp. 38-47.
[2] Elisa Bertino, Piero Andrea Bonatti and Elena Ferrari, “TRBAC: A Temporal Role-Based Access Control Model,” ACM Transactions on Information and System Security, Volume 4, No. 3, August 2001, pp. 191-223.
[3] Michael J. Covington, Wende Long and Srividhya Srinivasan, “Secure Context-Aware Applications Using Environment Roles,” Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies, May 2001, Chantilly, Virginia, USA.
[4] M. J. Moyer and M. Abamad, “Generalized RoleBased Access Control,” 21st International Conference on Distributed Computing Systems, April 16-19, 2001, Atlanta, GA, USA.
[5] Christos K. Georgiadis, Ioannis Mavridis, George Pangalos and Roshnan K. Thomas, “Flexible Team-Based Access Control Using Contexts,” Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies, May 2001, Chantilly, Virginia, USA.
[6] Weigang Wang, “Team-and-Role-Based Organizational Context and Access Control for Cooperative Hypermedia Environments,” Proceedings of the Tenth ACM Conference on Hypertext and Hypermedia, February 1999, Darmstadt, Germany.
[7] Arun Kumar, Neeran Karnik, and Girish Chafle, “Context Sensitivity in Role-based Access Control,” ACM SIGOPS Operating Systems Review, Volume 36, Issue 3, July 2002.
[8] Patrick McDaniel, “On Context in Authorization Policy,” Proceedings of the Eighth ACM Symposium on Access Control Models and Technologies, June 2003, Como, Italy.
[9] Gustaf Neumann and Mark Strembeck, “An Approach to Engineer and Enforce Context Constraints in an RBAC Environment,” Proceedings of the Eighth ACM Symposium on Access Control Models and Technologies, June 2003, Como, Italy.
[10] Hui Lei, Daby M. Sow, John S. Davis II, Guruduth Banavar and Maria R. Ebling, “The Design and Applications of a Context Service,” ACM SIGMOBILE Mobile Computing and Communications Review, Volume 6, Issue 4, October 2002.
[11] Alfred C. Weaver, Samuel J. Dwyer III, Andrew M. Snyder, et al., “Federated, Secure Trust Networks for Distributed Healthcare IT Services,” IEEE International Conference on Industrial Informatics, August 2003, Banff, Alberta, Canada.
[12] Andrew M. Snyder and Alfred C. Weaver, "The elogistics of Securing Distributed Medical Data," IEEE International Conference on Industrial Informatics, Banff, Alberta, Canada, August 20-25, 2003.
[13] Longhua Zhang, Gail-Joon Ahn and Bei-Tseng Chu, “A Role-Based Delegation Framework for Healthcare Information Systems,” Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies, June 2002, Monterey, California, USA.
[14]. Marc Wilikens, Simone Feriti, Alberto Sanna and Marcelo Masera, “A Context-Related Authorization and Access Control Method Based on RBAC: A case study from the health care domain,” Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies, June 2002, Monterey, California, USA.

Key Words:

Cryptography, One time password, privacy, mobile platform, Encryption and Decryption.