Open Access   Article Go Back

Hybrid Parallel Multithreading Encryption

Deepali 1 , Namita Kakkar2

Section:Review Paper, Product Type: Journal Paper
Volume-3 , Issue-6 , Page no. 50-52, Jun-2015

Online published on Jun 29, 2015

Copyright © Deepali , Namita Kakkar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Deepali , Namita Kakkar, “Hybrid Parallel Multithreading Encryption,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.6, pp.50-52, 2015.

MLA Style Citation: Deepali , Namita Kakkar "Hybrid Parallel Multithreading Encryption." International Journal of Computer Sciences and Engineering 3.6 (2015): 50-52.

APA Style Citation: Deepali , Namita Kakkar, (2015). Hybrid Parallel Multithreading Encryption. International Journal of Computer Sciences and Engineering, 3(6), 50-52.

BibTex Style Citation:
@article{Kakkar_2015,
author = {Deepali , Namita Kakkar},
title = {Hybrid Parallel Multithreading Encryption},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {6 2015},
volume = {3},
Issue = {6},
month = {6},
year = {2015},
issn = {2347-2693},
pages = {50-52},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=549},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=549
TI - Hybrid Parallel Multithreading Encryption
T2 - International Journal of Computer Sciences and Engineering
AU - Deepali , Namita Kakkar
PY - 2015
DA - 2015/06/29
PB - IJCSE, Indore, INDIA
SP - 50-52
IS - 6
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2431 2317 downloads 2397 downloads
  
  
           

Abstract

First part of this thesis which was needed to be developed before moving onto the next levels is Cloud Computing. The client section was a simple application for user which was made on Socket Programming in Java. Application connection is to be made with Server which is a LAN based server on which data is to be uploaded and downloaded. Since backbone network (client and server) is developed, then it needs to be secured with a particular algorithm or technique. The algorithm studied is known as RSA key oriented algorithm which offers dynamic security on client and server level during communication. The other technique for advancing the level of scalability and improvement along the network layer we used is NTRU encryption. Since this algorithm encrypt data of every type ensures the originality of particular data and adds the advancement in throughput level. These two algorithms are implemented to run on single server on a different core thread thus making the idle cores of sever in use for both the algorithms. It is reflecting that the parallelism encryption done on single content during the data storage on network marginally increase the speed of execution and decryption and encryption timings have been increased. Other part of this thesis also deals with the approaches followed previously which are the part this thesis.

Key-Words / Index Term

RSA, LOSSY, SAAS

References

[1] Ranjit Ranjan, Dr. A.S Baghel, Sushil Kumar “Improvement of NTRU cryptosystem” International Journal of Advanced Research in Computer Science Vol-2, Issue-9, Page no-79-84, September 2012.
[2] Subedari Mithila, P. Pradeep Kumar, “Data Security through Confidentiality in Cloud Computing Environment”, Subedari Mithila et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol-2, Issue-5, Page no-1836-1840, 2011.
[3] Gurkamal Bhullar and Navneet Kaur “Concurrency and security control with NTRU” International Journal of Innovative Research in Computer Science and Communication Engineering Vol-2, Issue 3, March 2014.
[4] Dr. C. Sunil Kumar, J. Seetha, S.R Vinotha “Security implications of Distributed parallel cloud database management system models” International Journal of Software Computing and Software Engineering, Vol-2, Issue-11,Page no-20-28, 2012.
[5] Shashi Mehrotra Seth and Rajan Mishra, “Comparative Analysis of Encryption Algorithm for Data Communication”, International Journal of Computer Science and Technology Vol-4, Issue-8, Page no-348-354, August 2014.
[6] YashPal Mote and Shekhar Gaikward, “Superioer Security Data Encryption Algorithm”, International Journal of Computer Scienece, Vol- 6,Page no-171-181 , July 2012.
[7] Parsi Kalpana and Sudha Singaraju, ”Data security in cloud computing using RSA algorithm, International Journal of Research in Computer and Communication Technology, Vol-1, Issue-4, Page no-143-146, September 2012.