Search results

1 – 10 of over 17000
Article
Publication date: 13 October 2022

Aruna Kumari Koppaka and Vadlamani Naga Lakshmi

In the cloud-computing environment, privacy preservation and enabling security to the cloud data is a crucial and demanding task. In both the commercial and academic world, the…

Abstract

Purpose

In the cloud-computing environment, privacy preservation and enabling security to the cloud data is a crucial and demanding task. In both the commercial and academic world, the privacy of important and sensitive data needs to be safeguarded from unauthorized users to improve its security. Therefore, several key generations, encryption and decryption algorithms are developed for data privacy preservation in the cloud environment. Still, the outsourced data remains with the problems like minimum data security, time consumption and increased computational complexity. The purpose of this research study is to develop an effective cryptosystem algorithm to secure the outsourced data with minimum computational complexity.

Design/methodology/approach

A new cryptosystem algorithm is proposed in this paper to address the above-mentioned concerns. The introduced cryptosystem algorithm has combined the ElGamal algorithm and hyperchaotic sequence, which effectively encrypts the outsourced data and diminishes the computational complexity of the system.

Findings

In the resulting section, the proposed improved ElGamal cryptosystem (IEC) algorithm performance is validated using the performance metrics like encryption time, execution time, decryption time and key generation comparison time. The IEC algorithm approximately reduced 0.08–1.786 ms of encryption and decryption time compared to the existing model: secure data deletion and verification.

Originality/value

The IEC algorithm significantly enhances the data security in cloud environments by increasing the power of key pairs. In this manuscript, the conventional ElGamal algorithm is integrated with the pseudorandom sequences for a pseudorandom key generation for improving the outsourced cloud data security.

Details

International Journal of Pervasive Computing and Communications, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 7 May 2020

Prabu P and Senthilnathan T

In wireless sensor network (WSN), user authentication plays as a vital role in which data sensing, as well as sharing, will be spoiled by hackers. To enhance user security, user…

Abstract

Purpose

In wireless sensor network (WSN), user authentication plays as a vital role in which data sensing, as well as sharing, will be spoiled by hackers. To enhance user security, user authentication must be focused.

Design/methodology/approach

In previous works, for secured authentication, Enhanced User Authentication Protocol (EUAP) is presented. On the other hand, the user free password generation is permitted in the previous technique.

Findings

Here, password leakage may cause a malevolent user's contribution to the WSN environment. By presenting the Flexible and Secured User Authentication Protocol (FSUAP), this is solved in the presented technique in which secured as well as reliable sharing of data contents via unsecured wireless sensor devices was accomplished.

Originality/value

The foremost objective of the present technique is to device the protocol that would verify the users beforehand letting them access the sensor devices situated in various sites. The use of a sensor device could be reduced in a significant way. Three-factor authentication protocols are presented in place of two-factor authentication protocol in the presented technique that could deal with and safeguard the environment from a brute force attack in an effective manner.

Details

International Journal of Intelligent Unmanned Systems, vol. 8 no. 4
Type: Research Article
ISSN: 2049-6427

Keywords

Article
Publication date: 20 April 2023

Vamsi Desam and Pradeep Reddy CH

Several chaotic system-based encryption techniques have been presented in recent years to protect digital images using cryptography. The challenges of key distribution and…

Abstract

Purpose

Several chaotic system-based encryption techniques have been presented in recent years to protect digital images using cryptography. The challenges of key distribution and administration make symmetric encryption difficult. The purpose of this paper is to address these concerns, the novel hybrid partial differential elliptical Rubik’s cube algorithm is developed in this study as an asymmetric image encryption approach. This novel algorithm generates a random weighted matrix, and uses the masking method on image pixels with Rubik’s cube principle. Security analysis has been conducted, it enhances and increases the reliability of the proposed algorithm against a variety of attacks including statistical and differential attacks.

Design/methodology/approach

In this light, a differential elliptical model is designed with two phases for image encryption and decryption. A modified image is achieved by rotating and mixing intensities of rows and columns with a masking matrix derived from the key generation technique using a unique approach based on the elliptic curve and Rubik’s cube principle.

Findings

To evaluate the security level, the proposed algorithm is tested with statistical and differential attacks on a different set of test images with peak signal-to-noise ratio, unified average changed intensity and number of pixel change rate performance metrics. These results proved that the proposed image encryption method is completely reliable and enhances image security during transmission.

Originality/value

The elliptic curve–based encryption is hard to break by hackers and adding a Rubik’s cube principle makes it even more complex and nearly impossible to decode. The proposed method provides reduced key size.

Details

Journal of Engineering, Design and Technology , vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1726-0531

Keywords

Article
Publication date: 13 July 2012

Weiguo Sheng, Gareth Howells, Michael Fairhurst, Farzin Deravi and Shengyong Chen

Biometric authentication, which requires storage of biometric templates and/or encryption keys, raises a matter of serious concern, since the compromise of templates or keys

Abstract

Purpose

Biometric authentication, which requires storage of biometric templates and/or encryption keys, raises a matter of serious concern, since the compromise of templates or keys necessarily compromises the information secured by those keys. To address such concerns, efforts based on dynamic key generation directly from the biometrics have recently emerged. However, previous methods often have quite unacceptable authentication performance and/or small key spaces and therefore are not viable in practice. The purpose of this paper is to propose a novel method which can reliably generate long keys while requires storage of neither biometric templates nor encryption keys.

Design/methodology/approach

This proposition is achieved by devising the use of fingerprint orientation fields for key generation. Additionally, the keys produced are not permanently linked to the orientation fields, hence, allowing them to be replaced in the event of key compromise.

Findings

The evaluation demonstrates that the proposed method for dynamic key generation can offer both good reliability and security in practice, and outperforms other related methods.

Originality/value

In this paper, the authors propose a novel method which can reliably generate long keys while requires storage of neither biometric templates nor encryption keys. This is achieved by devising the use of fingerprint orientation fields for key generation. Additionally, the keys produced are not permanently linked to the orientation fields, hence, allowing them to be replaced in the event of key compromise.

Details

Information Management & Computer Security, vol. 20 no. 3
Type: Research Article
ISSN: 0968-5227

Keywords

Book part
Publication date: 20 October 2015

Mohammad Shamsuddoha

Contemporary literature reveals that, to date, the poultry livestock sector has not received sufficient research attention. This particular industry suffers from unstructured…

Abstract

Contemporary literature reveals that, to date, the poultry livestock sector has not received sufficient research attention. This particular industry suffers from unstructured supply chain practices, lack of awareness of the implications of the sustainability concept and failure to recycle poultry wastes. The current research thus attempts to develop an integrated supply chain model in the context of poultry industry in Bangladesh. The study considers both sustainability and supply chain issues in order to incorporate them in the poultry supply chain. By placing the forward and reverse supply chains in a single framework, existing problems can be resolved to gain economic, social and environmental benefits, which will be more sustainable than the present practices.

The theoretical underpinning of this research is ‘sustainability’ and the ‘supply chain processes’ in order to examine possible improvements in the poultry production process along with waste management. The research adopts the positivist paradigm and ‘design science’ methods with the support of system dynamics (SD) and the case study methods. Initially, a mental model is developed followed by the causal loop diagram based on in-depth interviews, focus group discussions and observation techniques. The causal model helps to understand the linkages between the associated variables for each issue. Finally, the causal loop diagram is transformed into a stock and flow (quantitative) model, which is a prerequisite for SD-based simulation modelling. A decision support system (DSS) is then developed to analyse the complex decision-making process along the supply chains.

The findings reveal that integration of the supply chain can bring economic, social and environmental sustainability along with a structured production process. It is also observed that the poultry industry can apply the model outcomes in the real-life practices with minor adjustments. This present research has both theoretical and practical implications. The proposed model’s unique characteristics in mitigating the existing problems are supported by the sustainability and supply chain theories. As for practical implications, the poultry industry in Bangladesh can follow the proposed supply chain structure (as par the research model) and test various policies via simulation prior to its application. Positive outcomes of the simulation study may provide enough confidence to implement the desired changes within the industry and their supply chain networks.

Details

Sustaining Competitive Advantage Via Business Intelligence, Knowledge Management, and System Dynamics
Type: Book
ISBN: 978-1-78560-707-3

Keywords

Article
Publication date: 12 November 2021

Anita Philips, Jayakumar Jayaraj, Josh F.T. and Venkateshkumar P.

Digitizing of the electrical power grid promotes the advantages of efficient energy management alongside the possibilities of major vulnerabilities. A typical inadequacy that…

Abstract

Purpose

Digitizing of the electrical power grid promotes the advantages of efficient energy management alongside the possibilities of major vulnerabilities. A typical inadequacy that needs critical attention to ensure the seamless operation of the smart grid system remains in the data transmission between consumer premises smart devices and the utility centres. Many researches aim at establishing security protocols to ensure secure and efficient energy management resulting in perfect demand–supply balance.

Design/methodology/approach

In this paper, the authentication of the smart meter data has been proposed with enhanced Rivest–Shamir–Adleman (RSA) key encryption using an efficient way of generating large prime numbers. The trapdoor one-way function applied in the RSA algorithm makes it almost impossible for the reverse engineering attempts of cracking the key pair.

Findings

The algorithm for generating prime numbers has been tested both with the convention method and with the enhanced method of including a low-level primality test with a first few hundred primes. The combination of low-level and high-level primality tests shows an improvement in execution time of the algorithm.

Originality/value

There is a considerable improvement in the time complexities when using the combination method. This efficient generation of prime numbers can be successfully applied to the smart meter systems, thereby increasing the strength and speed of the key encryption.

Details

International Journal of Pervasive Computing and Communications, vol. 17 no. 5
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 21 August 2007

Ong Thian Song, Andrew Teoh Beng Jin and Tee Connie

This paper aims to address some of the practical and security problems when using fingerhash to secure biometric key for protecting digital contents.

2027

Abstract

Purpose

This paper aims to address some of the practical and security problems when using fingerhash to secure biometric key for protecting digital contents.

Design/methodology/approach

Study the two existing directions of biometric‐based key generation approach based on the usability, security and accuracy aspects. Discuss the requisite unresolved issues related to this approach.

Findings

The proposed Fingerhashing approach transforms fingerprint into a binary discretized representation called Fingerhash. The Reed Solomon error correction method is used to stabilize the fluctuation in Fingerhash. The stabilized Fingerhash is then XORed with a biometric key. The key can only be released upon the XOR process with another Fingerhash derived from an authentic fingerprint. The proposed method could regenerate an error‐free biometric key based on an authentic fingerprint with up to 99.83 percent success rate, leading to promising result of FAR = 0 percent and FRR = 0.17 percent. Besides, the proposed method can produce biometric keys (1,150 bit length) which are longer in size than the other prevailing biometric key generation schemes to offer higher security protection to safeguard digital contents.

Originality/value

Outlines a novel solution to address the issues of usability, security and accuracy of biometric based key generation scheme.

Details

Information Management & Computer Security, vol. 15 no. 4
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 31 July 2021

Yuvarani T. and Arunachalam A.R.

Generally, Internet-of-Things (IoT) is quite small sized with limited resource and low cost that may be vulnerable for physical and cloned attacking. All kind of authentication…

Abstract

Purpose

Generally, Internet-of-Things (IoT) is quite small sized with limited resource and low cost that may be vulnerable for physical and cloned attacking. All kind of authentication protocols designed to IoT devices are robust despite which it is prone to attack by hackers. In order to resolve this issue, there are various researches that have introduced the best method for obscuring the cryptographic key. However, the studies have majorly aimed to generate the key dynamically from noise data by Fuzzy Extractor (FE) or Fuzzy Commitment (FC). Hence, these methods have utilized this kind of data with noisy source namely Physical Unclonable Function (PUF) or biometric data. There are several IoT devices that get operated over undermined environment in which biometric data is not available but the technique utilized with biometric data can't be used to undermined IoT devices. Even though, the PUF technique is implemented for the undermined IoT devices this is quite vulnerable over physical attacks inclusive of accidental move and theft.

Design/methodology/approach

This paper has proposed an advanced scheme in fuzzy commitment over IoT devices which is said to be Improved Two Factor Fuzzy Commitment Scheme (ITFFCS) and this proposed ITFFCS has used two kind of noisy factors present inside and outside the IoT devices. Though, an intruder has accomplished the IoT devices with an access to the internal noisy source, the intruder can't select an exact key from the available data which have been compared using comparable module as an interest.

Findings

Moreover, the proposed ITFFC method results are compared with existing Static Random Accessible Memory (SRAM) PUF in enterprises application which illustrated the proposed ITFFC method with PUF has accomplished better results in parameters such as energy consumption, area utilization, False Acceptance Ratio (FAR) and Failure Rejection Ratio (FRR).

Originality/value

Thus, the proposed ITFFCS-PUF is comparatively better than existing method in both FAR and FRR with an average of 0.18% and 0.28%.

Details

International Journal of Pervasive Computing and Communications, vol. 19 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 14 February 2019

Olayiwola Oladiran, Anupam Nanda and Stanimira Milcheva

This study aims to examine the housing outcomes of natives and multiple generations of non-natives using a longitudinal survey data in Britain.

Abstract

Purpose

This study aims to examine the housing outcomes of natives and multiple generations of non-natives using a longitudinal survey data in Britain.

Design/methodology/approach

The authors use longitudinal data from Britain, in which they can observe multiple generations of immigrants and their demographic and economic information.

Findings

The probability models for housing tenure reveal significant variation in the outcomes which are robust to several econometric specifications.

Research limitations/implications

As migration and its impact on local economy is a highly debated topic across several major regions of the world, the findings bring out important insights with policy implications. The research is limited by the sample size of the longitudinal survey.

Originality/value

The empirical evidence on the topic is quite limited with mixed findings. Especially, the authors’ ability to look through multiple generations is unique in identifying the variation in housing outcomes for the native and non-native citizens.

Details

International Journal of Housing Markets and Analysis, vol. 12 no. 2
Type: Research Article
ISSN: 1753-8270

Keywords

Article
Publication date: 5 September 2016

Weiwei Li, Chong Wu, He Dong, Huan Wang and Mei Li

Coal and power generation are related upstream and downstream industries. Coal price marketization and electricity price regulation have caused the price of coal to be sensitive…

Abstract

Purpose

Coal and power generation are related upstream and downstream industries. Coal price marketization and electricity price regulation have caused the price of coal to be sensitive to the benefits of generators. The paper aims to discuss these issues.

Design/methodology/approach

As a financial tool, contracts for differences can both help balance interests and reduce risks caused by spot price fluctuation. This thesis regards coal demand as a triangular fuzzy stochastic variable while directing a levelling consideration towards risk returns for coal and power enterprises that are involved in coal generation contracts for differences. Risk and benefit measurement models were established between coal suppliers and power generators, and risk and benefit balance optimization models for contract negotiation were constructed.

Findings

A numerical example showed that the above models can be effectively used to avoid the risks of coal-electricity parties.

Originality/value

This thesis regards coal demand as a triangular fuzzy random variable while directing a levelling consideration towards the risk return to coal and power enterprises that are involved with coal generation contracts for differences. The features of this thesis are the following: demand information is regarded as a fuzzy random variable instead of a random variable. With historical data, sales experience and increasingly clear macro-economic conditions, coal and power enterprises are able to make a fuzzy decision – to a certain extent – when the transaction approaches. Accurate market information enables the supply chain system to satisfy the clients’ needs better, improve the profit level or avoid severe financial damages; by developing a feasible set of contracts for different parameters, it is possible to estimate whether the price difference enables supply chain coordination, requires changes or gives accounts to all involved parties of the supply chain; and without the assumption that the traditional M-V rule is unfavourable to decision makers, this thesis proposes the prospect M-V rule, which involves decision makers’ projections of future coal generation prices and enables wide applicability of the response method to contracts for differences.

1 – 10 of over 17000