Open Access   Article Go Back

Hybrid Parallel Multithreading Encryption

Deepali 1 , Namita Kakkar2

Section:Research Paper, Product Type: Journal Paper
Volume-3 , Issue-7 , Page no. 12-20, Jul-2015

Online published on Jul 30, 2015

Copyright © Deepali , Namita Kakkar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Deepali , Namita Kakkar , “Hybrid Parallel Multithreading Encryption,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.7, pp.12-20, 2015.

MLA Style Citation: Deepali , Namita Kakkar "Hybrid Parallel Multithreading Encryption." International Journal of Computer Sciences and Engineering 3.7 (2015): 12-20.

APA Style Citation: Deepali , Namita Kakkar , (2015). Hybrid Parallel Multithreading Encryption. International Journal of Computer Sciences and Engineering, 3(7), 12-20.

BibTex Style Citation:
@article{Kakkar_2015,
author = {Deepali , Namita Kakkar },
title = {Hybrid Parallel Multithreading Encryption},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {7 2015},
volume = {3},
Issue = {7},
month = {7},
year = {2015},
issn = {2347-2693},
pages = {12-20},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=567},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=567
TI - Hybrid Parallel Multithreading Encryption
T2 - International Journal of Computer Sciences and Engineering
AU - Deepali , Namita Kakkar
PY - 2015
DA - 2015/07/30
PB - IJCSE, Indore, INDIA
SP - 12-20
IS - 7
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2764 2497 downloads 2404 downloads
  
  
           

Abstract

Cloud computing is a new area for the field of research. In the current scenario the server and client architecture is advanced giving rise to speed and reliability and is been shifting from distributed or cluster to cloud architecture since cloud architecture maintains the server in various number of features. The main part of this research relies on a robust architecture which deals with Cloud Storage as a Service (SAAS) and comparative security measures of improvement and modifications. Various security measures have been studied during this research which is briefly described in various sections of this report. The main motive of shifting the platform to cloud is its “popularity” and “portability”. Smart phone devices are booming in market and it covers most of the works of people which was earlier used to done by the help of computer. We can read mails with push notifications facility, we can communicate and store large number of data in mobile devices thus the technology is shifting from distributed to cloud platform. Client Server Architecture- this method is a first part of study of this thesis which was needed to be developed before moving onto the next levels of Cloud Computing. The client section was a simple application for user which was made on Socket Programming in Java. Application connection was made with Server which is a LAN based server on which data is to be uploaded and downloaded. Analyzing RSA and NTRU in parallel computing environment is developed, then it needs to be secured with a particular algorithm or technique. The algorithm studied is known as RSA key oriented algorithm which offers dynamic security on client and server level during communication. The other technique for advancing the level of scalability and improvement alone the network layer we used is NTRU encryption.

Key-Words / Index Term

RSA, LOSSY, SAAS

References

[1] B. Padmavati and S. Ranjitha Kumari “Security and performance analysis of DES, RSA and RSA algorithm with LSB substitution technique” International Journal of Computer Science Vol-2, Issue-4, Page No.170-174, April-2013
[2] Dr. C. Sunil Kumar, J. Seetha, S.R Vinotha “Security implications of Distributed parallel cloud database management system models” International Journal of Software Computing and Software Engineering, Vol-2, Issue-11,Page no-20-28, 2012.
[3] Dr. Lokanatha C. Reddy “A Review on Data mining from Past to the Future”, International Journal of Computer Applications (0975 – 8887), Vol-15, Issue-7, Page No. 19-22, February - 2011.
[4] Gupta V.K., Sheetlani Jitendra, Gupta Dhiraj and Shukla Brahma “Data concurrency control and security issues of Distributed parallel cloud database transaction” NIMS University, Jaipur, Rajasthan, INDIA Vol-1, Issue-2, Page No. 70-73, August-2012.
[5] Gurkamal Bhullar and Navneet Kaur “Concurrency and security control with NTRU” International Journal of Innovative Research in Computer Science and Communication Engineering Vol-2, Issue 3, March 2014.
[6] He.Debiao, Chen Jianhua and Hu Jin “Random Number Generator based on the NTRU Cryptosystem” Maejo Int. J. Science Technology Vol-4, Issue-3, Page No. 428-434, 2010.
[7] Ilker Kose “Data and Network Security” Springer, 2002 GYTE, Computer Science, Page No. 1-9.
[8] Kalyam M Raval, “Data Mining Techniques”, Advanced Research in Computer Science and Engineering Vol-I, Issue IV, Page No. 1-7, Sep 2014.
[9] Manpreet “Concurrency control in Distributed parallel cloud database system” International Journal of advanced research Vol 3, July 2013.
[10] MD. Tabrez Quasim “Security issues in Distributed parallel cloud database system model” International Journal of Advanced Computer Science Department Vol-2, Issue 12, Page No. 396-399, December 2013.
[11] Navjot Kaur and Jaspreet Kaur Shaiwal “Efficient k mean algorithm, using ranking algorithm”, International Conference in Computer Engineering and Technology Vol- 1, Issue 3, May 2012.
[12] Obaidan A.Rawashdeh, “Optimistic approach in Distributed parallel cloud database concurrency control” Journal Conference on Computer Science in Amman University in year 2013.
[13] Parsi Kalpana and Sudha Singaraju, ”Data security in cloud computing using RSA algorithm, International Journal of Research in Computer and Communication Technology,Vol-1,Issue-4,Pageno-143-146,September 2012.
[14] Ranjit Ranjan, Dr.A.S Baghel, Sushil Kumar “improvement of NTRU cryptosystem” international journal of advanced research in computer science Vol-2, Issue-9, Page No. 79-84 September 2012.
[15] Ran Vijay Singh and M.P.S Bhatia , “Data Clustering with Modified K-means Algorithm”, IEEE International Conference on Recent Trends in Information Technology, ICRTIT, Vol-3, Issue-11, Page No. 1283-1286, Nov 2013.
[16] Shashi Mehrotra Seth and Rajan Mishra “Comparative Analysis of Encryption Algorithm for Data Communication”, International Journal of Computer Science and Technology, Vol-4, Issue-8, Page no-348-354, August 2014.
[17] Sheetlani Jitendra and Gupta V.K. "Concurrency Issues of Distributed Advance Transaction Process”, Res. J. Recent Sci., Issue-1(ISC-2011), Page No. 426-429 , 2012
[18] Subedari Mithila, P. Pradeep Kumar, Subedari Mithila et al “Data Security through Confidentiality in Cloud Computing Environment”,(IJCSIT) International Journal of Computer Science and Information Technologies, Vol-2 , Page No.1836-1840, 2011
[19] Swadeep Singh and Anupriya Grag “Comparison of cryptographic algorithm ECC and RSA”, International Journal of Computer Science and Communication Engineering, Vol-6, June 2013.
[20] Vishma Gupta and Gajendra Singh “Advanced cryptography algorithm for improving data security”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol-2 Issue-1, January 2012.
[21] YashPal Mote and Shekhar Gaikward, “Superioer Security Data Encryption Algorithm”, International Journal of Computer Scienece, Vol- 6, Page no-171-181 , July 2012.