Open Access   Article Go Back

Implementing Electronic Dissemination of Documents Using Three Layers of Security

Banoth Thirumal1 , R. U. V. N. Satish2 , M. Vivekananda Swamy3

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-7 , Page no. 1064-1069, Jul-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i7.10641069

Online published on Jul 31, 2018

Copyright © Banoth Thirumal, R. U. V. N. Satish, M. Vivekananda Swamy . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Banoth Thirumal, R. U. V. N. Satish, M. Vivekananda Swamy, “Implementing Electronic Dissemination of Documents Using Three Layers of Security,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1064-1069, 2018.

MLA Style Citation: Banoth Thirumal, R. U. V. N. Satish, M. Vivekananda Swamy "Implementing Electronic Dissemination of Documents Using Three Layers of Security." International Journal of Computer Sciences and Engineering 6.7 (2018): 1064-1069.

APA Style Citation: Banoth Thirumal, R. U. V. N. Satish, M. Vivekananda Swamy, (2018). Implementing Electronic Dissemination of Documents Using Three Layers of Security. International Journal of Computer Sciences and Engineering, 6(7), 1064-1069.

BibTex Style Citation:
@article{Thirumal_2018,
author = {Banoth Thirumal, R. U. V. N. Satish, M. Vivekananda Swamy},
title = {Implementing Electronic Dissemination of Documents Using Three Layers of Security},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {7 2018},
volume = {6},
Issue = {7},
month = {7},
year = {2018},
issn = {2347-2693},
pages = {1064-1069},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2562},
doi = {https://doi.org/10.26438/ijcse/v6i7.10641069}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i7.10641069}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2562
TI - Implementing Electronic Dissemination of Documents Using Three Layers of Security
T2 - International Journal of Computer Sciences and Engineering
AU - Banoth Thirumal, R. U. V. N. Satish, M. Vivekananda Swamy
PY - 2018
DA - 2018/07/31
PB - IJCSE, Indore, INDIA
SP - 1064-1069
IS - 7
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
520 323 downloads 146 downloads
  
  
           

Abstract

Cyber-crime and data breach has been growing exponentially in present world. In this scenario, it is important for any organization to have a robust method for the transactions of confidential data through the internet. The primary purpose of this study is to develop a completely safe and secure application that enables an organisation to disseminate electronic documents over the internet to their subordinate bodies. The current study is implemented in a university for disseminating the examination question papers to its affiliated colleges and examination centres during the examination season using a safe, secure and robust application. In this application there are three layers of security techniques are proposed. Documents can be sent to multiple centers simultaneously and are secured with Advanced Encryption Standard technique. This application involves Automated Interface Module which is used to encrypt the documents at university end and then decrypt them at examination center. This system also provides a feature for scheduling the process of dissemination of documents. This system uses RSA and AES Encryption methods and SHA-512 hashing algorithm for ensuring security as well as privacy of documents to reduce threats of attackers and maintain the confidentiality of this system. In the existing traditional delivery system, delivering a question paper from a university in real time is a challenging task due to involvement of logistics and lack of traceability. Through the empirical review of the existing traditional delivery system, the proposed system eliminates the risk of data breach and even impacts on the financial level by using proactive and pragmatic methods that seeks both security and consistency.

Key-Words / Index Term

Hashing, Dissemination, Security, Examination, Document, Encryption, Scheduling, AES, RSA

References

[1] M. A. Sadikin, R. W. Wardhani, "Implementation of RSA 2048-bit and AES 256-bit with digital signature for secure electronic health record application" in ISITIA, Lombok:IEEE, pp. 387-392, 2016.
[2] R.L. Rivest, A. Shamir, and L. Adleman, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems”, Communications of the ACM. 21 (2): pp. 120–126, 1977. doi:10.1145/359340.359342.
[3] Eman Salim Ibrahim Harba, “Secure Data Encryption Through a Combination of AES, RSA and HMAC”, Engineering, Technology & Applied Science Research Vol. 7, No. 4, 2017, pp. 1781-1785.
[4] M. S. Abutaha, A. A. Amro, “Using AES, RSA, SHA1 for Securing Cloud”, International Conference on Communication, Internet and Information Technology, Madrid, Spain, 2014.
[5] Daemen, Joan, Rijmen, Vincent. (March 9,), “AES Proposal: Rijndael”. National Institute of Standards and Technology 2003; pp. 1. Retrieved 21 February 2013.
[6] Sourabh Chandraa, Bidisha Mandalb, Sk. Safikul Alamc, Siddhartha Bhattacharyya, “Content based double encryption algorithm using symmetric key cryptography”, in International Conference on Recent Trends in Computing (2015).
[7] Sachin sharma1, Jeevan Singh Bisht, “Performance Analysis of Data Encryption Algorithms”, in International Journal of Scientific Research in Network Security and Communication Volume-3, Issue-1, 2015, pp. 1-5.
[8] V. Kapoor, “Data Encryption and Decryption Using Modified RSA Cryptography Based on Multiple Public Keys and ‘n’prime Number”, in International Journal of Scientific Research in Network Security and Communication Volume-1, Issue-2, 2013, pp. 35-38.
[9] G. van Rossum, “Python tutorial”, Technical Report CS-R9526, Centrum voor Wiskunde en Informatica (CWI), Amsterdam, May 1995, pp 1-71.
[10] Behrouz A. Forouzan, “Cryptography and Network Security”, the Mc-Graw Hil Companies, USA, pp. 293-336, 2007.
[11] Stalling, W., “Cryptography and Network Security: Principles and Practice”, 6th ed.; Prentice Hall, Inc.: Upper Saddle River, NJ, USA, pp. 327-361, 2014.