Journal of Cybersecurity and Information Management

Journal DOI

https://doi.org/10.54216/JCIM

Submit Your Paper

2690-6775ISSN (Online) 2769-7851ISSN (Print)

Volume 14 , Issue 1 , PP: , 2024 | Cite this article as | XML | Html | PDF | Full Length Article

Design of Novel Cryptographic Model Using Zero-Knowledge Proof Structure for Cyber Security Applications

S. Anthoniraj 1 * , Rahul Mishra 2 , Shweta Loonkar 3 , Trapty Agarwal 4 , Gunveen Ahluwalia 5 , Amandeep Gill 6

  • 1 Professor, Department of Computer Science & Engineering (Specialization), School of Engineering & Technology, JAIN (Deemed-to-be University), Bangalore, India - (anthoniraj@jainuniversity.ac.in)
  • 2 Centre of Research Impact and Outcome, Chitkara University, Rajpura, Punjab, India - (rahul.mishra.orp@chitkara.edu.in)
  • 3 Assistant Professor, Department of ISME, ATLAS SkillTech University, Mumbai, Maharashtra, India - (shweta.loonkar@atlasuniversity.edu.in)
  • 4 Associate Professor, Maharishi School of Engineering & Technology, Maharishi University of Information Technology, Uttar Pradesh, India - (trapty@muit.in)
  • 5 Chitkara Centre for Research and Development, Chitkara University, Himachal Pradesh, India - (gunveen.ahluwalia.orp@chitkara.edu.in)
  • 6 Dean R&D, Department of R&D, Vivekananda Global University, Jaipur, India - (amandeep.gill@vgu.ac.in)
  • Doi: https://doi.org/10.54216/JCIM.140110

    Received: January 09, 2024 Revised: March 12, 2024 Accepted: June 09, 2024
    Abstract

    Privacy and security in the current modern, digital communication and data transfer-oriented world has become imperative. Most commonly used encryption methods often involve exposing sensitive information, which might be an open gate for potential vulnerabilities. This paper aims to explore the topic of applying ZKPs in cybersecurity in a comprehensive manner. For this purpose, Proposed work will provide an exhaustive description of the basic concepts of Zero-Knowledge Proofs , which refer to both the interactive and non-interactive forms of the product. Additionally, the study will focus on presenting various cryptographic protocols and algorithms utilizing Zero-Knowledge Proofs , such as zk-SNARKs and zk-STARKs . In addition to theoretical studies, Proposed work analyze the practical implementation details of Zero-Knowledge Proofs implementations , cryptographic libraries, programming languages, and frameworks commonly used to create ZKP-based applications . Zero-knowledge proofs enable groundbreaking approaches to address cybersecurity problems with an emphasis on user privacy and data confidentiality. On average, cryptographic operations experienced delays of approximately 10 milliseconds which was not intrusive for real-time systems. The system’s throughout remained at a steady average of 100 Mbps all times, so it performed well at processing data despite cryptographic overhead. The packet delivery ratio was constantly high at 98%, implying that most data packets were delivered consistently even over encrypted communication paths.

    Keywords :

    Digital Communication , Privacy , Security , Cryptography , Zero-Knowledge Proofs (ZKPs) , Cybersecurity

    References

         [1]      Soewito, B., & Marcellinus, Y. (2021). IoT security system with modified Zero Knowledge Proof algorithm for authentication. Egyptian Informatics Journal, 22(3), 269-276.

         [2]      Major, W., Buchanan, W. J., & Ahmad, J. (2020). An authentication protocol based on chaos and zero knowledge proof. Nonlinear Dynamics, 99, 3065-3087.

         [3]      Boubakri, W., Abdallah, W., & Boudriga, N. (2021). ZAO-AKA: a zero knowledge proof chaotic authentication and key agreement scheme for securing smart city cyber physical system. Wireless Networks, 27(6), 4199-4215.

         [4]      Yang, R., Gao, H., Si, F., & Wang, J. (2024). Advancing User Privacy in Virtual Power Plants: A Novel Zero-Knowledge Proof-Based Distributed Attribute Encryption Approach. Electronics, 13(7), 1283.

         [5]      Vandana Roy. "An Effective FOG Computing Based Distributed Forecasting of Cyber-Attacks in Internet of Things" Journal of Cybersecurity and Information Management, Vol. 12, No. 2, 2023 ,PP. 8-17.

         [6]      Al-Aswad, H., El-Medany, W. M., Balakrishna, C., Ababneh, N., & Curran, K. (2021). BZKP: Blockchain-based zero-knowledge proof model for enhancing healthcare security in Bahrain IoT smart cities and COVID-19 risk mitigation. Arab Journal of Basic and Applied Sciences, 28(1), 154-171.

         [7]      Zhou, L., Diro, A., Saini, A., Kaisar, S., & Hiep, P. C. (2024). Leveraging zero knowledge proofs for blockchain-based identity sharing: A survey of advancements, challenges and opportunities. Journal of Information Security and Applications, 80, 103678.

         [8]      Moya, C. V., Bermejo Higuera, J. R., Bermejo Higuera, J., & Sicilia Montalvo, J. A. (2023). Implementation and Security Test of Zero-Knowledge Protocols on SSI Blockchain. Applied Sciences, 13(9), 5552.

         [9]      Moya, C. V., Bermejo Higuera, J. R., Bermejo Higuera, J., & Sicilia Montalvo, J. A. (2023). Implementation and Security Test of Zero-Knowledge Protocols on SSI Blockchain. Applied Sciences, 13(9), 5552.

       [10]     Ren, Z., Yan, E., Chen, T., & Yu, Y. (2024). Blockchain-based CP-ABE data sharing and privacy-preserving scheme using distributed KMS and zero-knowledge proof. Journal of King Saud University-Computer and Information Sciences, 101969.

       [11]     V. Roy. "Breast cancer Classification with Multi-Fusion Technique and Correlation Analysis" Fusion: Practice & Applications, Vol. 9, No. 2, 2023 ,PP. 48-61.

       [12]     P. Kumar, A. Baliyan, K. R. Prasad, N. Sreekanth, P. Jawarkar, V. Roy, E. T. Amoatey, "Machine Learning Enabled Techniques for Protecting Wireless Sensor Networks by Estimating Attack Prevalence and Device Deployment Strategy for 5G Networks", Wireless Communications and Mobile Computing, vol. 2022, Article ID 5713092, 15 pages, 2022. https://doi.org/10.1155/2022/5713092

       [13]     Chaeikar, S. S., Alizadeh, M., Tadayon, M. H., & Jolfaei, A. (2022). An intelligent cryptographic key management model for secure communications in distributed industrial intelligent systems. International Journal of Intelligent Systems, 37(12), 10158-10171.

       [14]     Surinder Kaur , Shivani Mankotia , Pooja Bharadwaj, Study of Multi-Prime RSA, Fusion: Practice and Applications, Vol. 1 , No. 1 , (2020) : 40-48 (Doi   :  https://doi.org/10.54216/FPA.010105)

       [15]     Harsh Jain , Parv Bharti , Arun Kumar Dubey , Preetika Soni, Identification of Facial Expressions using Deep Neural Networks, Fusion: Practice and Applications, Vol. 2 , No. 1 , (2020) : 22-30 (Doi   :  https://doi.org/10.54216/FPA.020101)

       [16]     Mousavi, S. K., Ghaffari, A., Besharat, S., & Afshari, H. (2021). Security of internet of things based on cryptographic algorithms: a survey. Wireless Networks, 27(2), 1515-1555.

       [17]     Gadde, S., Amutharaj, J., & Usha, S. (2023). A security model to protect the isolation of medical data in the cloud using hybrid cryptography. Journal of Information Security and Applications, 73, 103412.

       [18]     Bhagat, V., Kumar, S., Gupta, S. K., & Chaube, M. K. (2023). Lightweight cryptographic algorithms based on different model architectures: A systematic review and futuristic applications. Concurrency and Computation: Practice and Experience, 35(1), e7425.

       [19]     Chen, Z., Jiang, Y., Song, X., & Chen, L. (2023). A survey on zero-knowledge authentication for internet of things. Electronics, 12(5), 1145.

       [20]     Mohamed, N. N., Yussoff, Y. M., Saleh, M. A., & Hashim, H. (2020). Hybrid cryptographic approach for internet ofhybrid cryptographic approach for internet ofthings applications: A review. Journal of Information and Communication Technology, 19(3), 279-319.

       [21]     R.Pandi Selvam, Performance of MAODV and ODMRP Routing Protocol for Group Communication in Mobile Ad Hoc Network, International Journal of Wireless and Ad Hoc Communication, Vol. 1 , No. 1 , (2020) : 26-32 (Doi   :  https://doi.org/10.54216/IJWAC.010104)

       [22]     M. Ilayaraja, Particle Swarm Optimization based Multihop Routing Techniques in Mobile ADHOC Networks, International Journal of Wireless and Ad Hoc Communication, Vol. 1 , No. 1 , (2020) : 47-56 (Doi   :  https://doi.org/10.54216/IJWAC.010105)

       [23]     Sharma, N. (2017). A Review of Information Security using Cryptography Technique. International Journal of Advanced Research in Computer Science, 8(4).

       [24]     Subramani, S., & Svn, S. K. (2023). Review of security methods based on classical cryptography and quantum cryptography. Cybernetics and Systems, 1-19.

       [25]     Logunleko, K. B., Adeniji, O. D., & Logunleko, A. M. (2020). A comparative study of symmetric cryptography mechanism on DES AES and EB64 for information security. Int. J. Sci. Res. in Computer Science and Engineering, 8(1).

       [26]     Andino Maseleno, Design of Optimal Machine Learning based Cybersecurity Intrusion Detection Systems, Journal of Cybersecurity and Information Management, Vol. 0 , No. 1 , (2019) : 32-43 (Doi   :  https://doi.org/10.54216/JCIM.000103)

       [27]     Ahmed A. Elngar , Salah-ddine KRIT, Performance Analysis of Machine Learning based Botnet Detection and Classification Models for Information Security, Journal of Cybersecurity and Information Management, Vol. 0 , No. 1 , (2019) : 44-53 (Doi   :  https://doi.org/10.54216/JCIM.000104)

       [28]     Kapoor, V., & Yadav, R. (2016). A hybrid cryptography technique for improving network security. International Journal of Computer Applications, 141(11), 25-30.

       [29]     Miriam, H., Doreen, D., Dahiya, D., & Rene Robin, C. R. (2023). Secured Cyber Security Algorithm for Healthcare System Using Blockchain Technology. Intelligent Automation & Soft Computing, 35(2).

       [30]     Abualkishik, A. Z., & Alwan, A. A. (2022). Trust aware aquila optimizer based secure data transmission for information management in wireless sensor networks. Journal of Cybersecurity and Information Management, 9(1), 40-51.

       [31]     Vandana Roy. "An Improved Image Encryption Consuming Fusion Transmutation and Edge Operator." Journal of Cybersecurity and Information Management, Vol. 8, No. 1, 2021 ,PP. 42-52.

       [32]     Zaki, A. M., Abdelhamid, A. A., Ibrahim, A., Eid, M. M., & El-Kenawy, E. S. M. (2024). Metaheuristic Optimization for Enhancing Cyber Security Index Prediction: A DTO+ FGW Approach with MLP Integration. International Journal of Advances in Applied Computational Intelligence, 4(2), 15-5.

       [33]     Reem N. Yousef, Marwa M. Eid, Mohamed A. Mohamed,  Classifsication of Diabetic Foot Thermal Images Using Deep Convolutional Neural Network,  Journal of Intelligent Systems and Internet of Things,  Vol. 8 ,  No. 1 ,  (2023) : 17-32 (Doi   :  https://doi.org/10.54216/JISIoT.080102)

       [34]     Ahmed Abdelhafeez, Hoda K. Mohamed,  Skin Cancer Detection using Neutrosophic c-means and Fuzzy c-means Clustering Algorithms,  Journal of Intelligent Systems and Internet of Things,  Vol. 8 ,  No. 1 ,  (2023) : 33-42 (Doi   :  https://doi.org/10.54216/JISIoT.080103)

    Cite This Article As :
    Anthoniraj, S.. , Mishra, Rahul. , Loonkar, Shweta. , Agarwal, Trapty. , Ahluwalia, Gunveen. , Gill, Amandeep. Design of Novel Cryptographic Model Using Zero-Knowledge Proof Structure for Cyber Security Applications. Journal of Cybersecurity and Information Management, vol. , no. , 2024, pp. . DOI: https://doi.org/10.54216/JCIM.140110
    Anthoniraj, S. Mishra, R. Loonkar, S. Agarwal, T. Ahluwalia, G. Gill, A. (2024). Design of Novel Cryptographic Model Using Zero-Knowledge Proof Structure for Cyber Security Applications. Journal of Cybersecurity and Information Management, (), . DOI: https://doi.org/10.54216/JCIM.140110
    Anthoniraj, S.. Mishra, Rahul. Loonkar, Shweta. Agarwal, Trapty. Ahluwalia, Gunveen. Gill, Amandeep. Design of Novel Cryptographic Model Using Zero-Knowledge Proof Structure for Cyber Security Applications. Journal of Cybersecurity and Information Management , no. (2024): . DOI: https://doi.org/10.54216/JCIM.140110
    Anthoniraj, S. , Mishra, R. , Loonkar, S. , Agarwal, T. , Ahluwalia, G. , Gill, A. (2024) . Design of Novel Cryptographic Model Using Zero-Knowledge Proof Structure for Cyber Security Applications. Journal of Cybersecurity and Information Management , () , . DOI: https://doi.org/10.54216/JCIM.140110
    Anthoniraj S. , Mishra R. , Loonkar S. , Agarwal T. , Ahluwalia G. , Gill A. [2024]. Design of Novel Cryptographic Model Using Zero-Knowledge Proof Structure for Cyber Security Applications. Journal of Cybersecurity and Information Management. (): . DOI: https://doi.org/10.54216/JCIM.140110
    Anthoniraj, S. Mishra, R. Loonkar, S. Agarwal, T. Ahluwalia, G. Gill, A. "Design of Novel Cryptographic Model Using Zero-Knowledge Proof Structure for Cyber Security Applications," Journal of Cybersecurity and Information Management, vol. , no. , pp. , 2024. DOI: https://doi.org/10.54216/JCIM.140110