Journal of Cybersecurity and Information Management

Journal DOI

https://doi.org/10.54216/JCIM

Submit Your Paper

2690-6775ISSN (Online) 2769-7851ISSN (Print)

Volume 8 , Issue 2 , PP: 51-59, 2021 | Cite this article as | XML | Html | PDF | Short review

Advancements in Encryption Techniques for Enhanced Data Security Over Cloud

Rishu 1 * , Vijay Kumar Sinha 2 , Shruti Aggarwal 3

  • 1 Department of CSE, Chandigarh University, Punjab, India - (rishu.e10989@cumail.in )
  • 2 Department of CSE, Chandigarh University, Punjab, India - (prof.vksinha@gmail.com)
  • 3 Department of CSE, Chandigarh University, Punjab, India - (drshruti.cse@gmail.com)
  • Doi: https://doi.org/10.54216/JCIM.080202

    Received: May 05, 2021 Accepted: October 13, 2021
    Abstract

    With the advancements in internet technologies and increased transactions over the internet the threats for data security increased many folds than ever. Nowadays message application services are in great demand, as they offered end-to-end encryption (E2EE) that is essential to provide security to the users while communication takes place between parties. Today  messaging application service is in great use for communication. For making communication over the network.  This paper presents that security is essential while communication takes place between users and how E2EE offers security to the users. Consumers' concerns related to the security and privacy of their data are growing day by day with increased inter-connectivity. We examine the existing mobile message service encryption protocols that provide security and the features which preserve privacy for messenger applications and also evaluate the technical challenges involved for its  implementations.

    Keywords :

    Quantum Key Distribution , Elliptic curve Diffie-Hellman key exchange , End-to-End Encryption , Advanced encryption standard , Data Encryption Standard

    References

       [1]             Gopal Ghosh, et al. ‘A Systematic Review on Image Encryption Techniques’ Turkish Journal of Computer and Mathematics Education, Vol.12 No.10 (2021), 3055-3059 M. Balazinska et al., “Data management in the worldwide sensor web,” IEEE Pervasive Comput., vol. 6, no. 2, pp. 30–40, 2007, DOI: 10.1109/MPRV.2007.27.

    [2]             Ghosh, Gopal; et al. ‘Internet of Things based video surveillance systems for security applications’ Journal of Computational and Theoretical Nanoscience, Volume 17, Number 6, June 2020, pp. 2582-2588(7) https://doi.org/10.1166/jctn.2020.8933

    [3]             Kaur Manjit; et al. “Flying Ad-Hoc Network (FANET): Challenges and Routing Protocols” Journal of Computational and Theoretical Nanoscience, Volume 17, Number 6, June 2020, pp. 2575-2581(7), https://doi.org/10.1166/jctn.2020.8932

    [4]             Greenberg, A. (2014). Hacker Lexicon: What Is End-to-End Encryption?. Ηλεκτρονικό]. Available: https://www. wired. com/2014/11/hacker-lexicon-end-to-end-encryption/.[Πρόσβαση Οκτώβριος 2017].

    [5]             Renner, R. (2008). Security of quantum key distribution. International Journal of Quantum Information, 6(01), 1-127.

    [6]             Durlanik, A., &Sogukpinar, I. (2005). SIP authentication scheme using ECDH. World EnformatikaSoc Trans EngComputTechnol, 8, 350-353.

    [7]             M. Kumar, P. Mukherjee, K. Verma, S. Verma, and D. B. Rawat, "Improved Deep Convolutional Neural Network-based Malicious Node Detection and Energy-Efficient Data Transmission in Wireless Sensor Networks," in IEEE Transactions on Network Science and Engineering, DOI: 10.1109/TNSE.2021.3098011.

    [8]             Decryption and how it works https://www.educba.com/what-is-decryption accessed on 20/11/2019  5:00 PM

    [9]             Kodali, R. K., &Sarma, N. N. (2014). Energy-efficient ECC encryption using ECDH. In Emerging Research in Electronics, Computer Science and Technology (pp. 471-478). Springer, New Delhi.

    [10]          ECDHhttps://www.google.com/search?q=ecdh&source=lnms&tbm=isch&sa=X&ved= 2ahUKEwjWiesxqjnAhWOHMBHR5lBEUQ _AUoAXoECBIQAw&biw=1366&bih=625#imgrc=CBGMJTG6tFUA2M

    [11]          Mousa, A., &Hamad, A. (2006). Evaluation of the RC4 algorithm for data encryption. IJCSA, 3(2), 44-56.

       [12]          Hussain et al., "A Resource Efficient hybrid Proxy Mobile IPv6 extension for Next-Generation IoT Networks," in IEEE Internet of Things Journal, DOI:   10.1109/JIOT.2021.3058982.

       [13]          Rayarikar, R., Upadhyay, S., &Pimpale, P. (2012). SMS encryption using AES algorithm on android. International Journal of Computer Applications, 50(19), 12-17

      [14]          Working of AES  https://www.google.com/search?q=working+of+aes&source= lnms&tbm =isch&sa=X&ved= 2ahUKEwir9 CEy6jnAhVJ6XMBHUy7CWcQ_AUoAnoECA4QB A&biw=1366&bih= 625#imgrc= sm8AcLAns 8 mw8M: accessed on 3/12/2019 2:00 PM

      [15]          Endeley, R. E. (2018). End-to-End Encryption in Messaging Services and National Security—Case of WhatsApp Messenger. Journal of Information Security, 9(01), 95.

    [16]          Sagheer, A. M., Abdulhameed, A. A., &AbdulJabbar, M. A. (2013, December). SMS Security for Smartphone. In 2013 Sixth International Conference on Developments in systems engineering (pp. 281-285). IEEE.

    [17]          Gao, J., Liu, J., Rajan, B., Nori, R., Fu, B., Xiao, Y., ...& Philip Chen, C. L. (2014). SCADA communication and security issues. Security and Communication Networks, 7(1), 175-194.

    [18]          Mock, M., &Swedor, O. (2014). U.S. Patent No. 8,726,026. Washington, DC: U.S. Patent and Trademark Office.

    [19]          Shmueli, E., Vaisenberg, R., Elovici, Y., &Glezer, C. (2010). Database encryption: an overview of contemporary challenges and design considerations. ACM SIGMOD Record, 38(3), 29-34.

    [20]          Galushka, V. V., Aydinyan, A. R., Tsvetkova, O. L., Fathi, V. A., &Fathi, D. V. (2018, May). System of end-to-end symmetric database encryption. In Journal of Physics: Conference Series (Vol. 1015, No. 4, p. 042003). IOP Publishing.

    [21]          N.Abirami (2018) E2EE ENCRYPTION using QKD Algorithm, International Journal Of Trend in Scientific Research and Development , Vol-2.

    [22]          Lim, Y. Y., Messina, M., Kargl, F., Ganguli, L., Fischer, M., & Tsang, T. (2008, April). SNMP proxy for wireless sensor network. In Fifth International Conference on Information Technology: New Generations (it 2008) (pp. 738-743). IEEE.

    [23]          Lewis, J. A., Zheng, D. E., & Carter, W. A. (2017). The effect of encryption on lawful access to communications and data. Rowman& Littlefield.

    [24]          Whittaker, Z. (2017) US Says It Doesn’t Need Secret Court’s Approval to Ask for ENCRYPTION Backdoors. 

    [25]          Mavroeidakos, T., Michalas, A., &Vergados, D. D. (2016, April). Security architecture based on defense in depth for Cloud Computing environment. In 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) (pp. 334-339). IEEE.

    [26]          K. Berlin (2017) Adoption of Crypto ENCRYPTION Techniques in Different Scenario. International Journal of Advanced Research in Computer Science and Management Studies, Volume 5.

    [27]          Krombholz, K., Hobel, H., Huber, M., &Weippl, E. (2015). Advanced social engineering attacks. Journal of Information Security and applications, 22, 113-122.

    Cite This Article As :
    , Rishu. , Kumar, Vijay. , Aggarwal, Shruti. Advancements in Encryption Techniques for Enhanced Data Security Over Cloud. Journal of Cybersecurity and Information Management, vol. , no. , 2021, pp. 51-59. DOI: https://doi.org/10.54216/JCIM.080202
    , R. Kumar, V. Aggarwal, S. (2021). Advancements in Encryption Techniques for Enhanced Data Security Over Cloud. Journal of Cybersecurity and Information Management, (), 51-59. DOI: https://doi.org/10.54216/JCIM.080202
    , Rishu. Kumar, Vijay. Aggarwal, Shruti. Advancements in Encryption Techniques for Enhanced Data Security Over Cloud. Journal of Cybersecurity and Information Management , no. (2021): 51-59. DOI: https://doi.org/10.54216/JCIM.080202
    , R. , Kumar, V. , Aggarwal, S. (2021) . Advancements in Encryption Techniques for Enhanced Data Security Over Cloud. Journal of Cybersecurity and Information Management , () , 51-59 . DOI: https://doi.org/10.54216/JCIM.080202
    R. , Kumar V. , Aggarwal S. [2021]. Advancements in Encryption Techniques for Enhanced Data Security Over Cloud. Journal of Cybersecurity and Information Management. (): 51-59. DOI: https://doi.org/10.54216/JCIM.080202
    , R. Kumar, V. Aggarwal, S. "Advancements in Encryption Techniques for Enhanced Data Security Over Cloud," Journal of Cybersecurity and Information Management, vol. , no. , pp. 51-59, 2021. DOI: https://doi.org/10.54216/JCIM.080202