Hybrid Parallel Multithreading Encryption
Deepali 1 , Namita Kakkar2
Section:Review Paper, Product Type: Journal Paper
Volume-3 ,
Issue-6 , Page no. 50-52, Jun-2015
Online published on Jun 29, 2015
Copyright © Deepali , Namita Kakkar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Citation
IEEE Style Citation: Deepali , Namita Kakkar, “Hybrid Parallel Multithreading Encryption,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.6, pp.50-52, 2015.
MLA Citation
MLA Style Citation: Deepali , Namita Kakkar "Hybrid Parallel Multithreading Encryption." International Journal of Computer Sciences and Engineering 3.6 (2015): 50-52.
APA Citation
APA Style Citation: Deepali , Namita Kakkar, (2015). Hybrid Parallel Multithreading Encryption. International Journal of Computer Sciences and Engineering, 3(6), 50-52.
BibTex Citation
BibTex Style Citation:
@article{Kakkar_2015,
author = {Deepali , Namita Kakkar},
title = {Hybrid Parallel Multithreading Encryption},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {6 2015},
volume = {3},
Issue = {6},
month = {6},
year = {2015},
issn = {2347-2693},
pages = {50-52},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=549},
publisher = {IJCSE, Indore, INDIA},
}
RIS Citation
RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=549
TI - Hybrid Parallel Multithreading Encryption
T2 - International Journal of Computer Sciences and Engineering
AU - Deepali , Namita Kakkar
PY - 2015
DA - 2015/06/29
PB - IJCSE, Indore, INDIA
SP - 50-52
IS - 6
VL - 3
SN - 2347-2693
ER -
![]() |
![]() |
![]() |
2519 | 2412 downloads | 2502 downloads |




Abstract
First part of this thesis which was needed to be developed before moving onto the next levels is Cloud Computing. The client section was a simple application for user which was made on Socket Programming in Java. Application connection is to be made with Server which is a LAN based server on which data is to be uploaded and downloaded. Since backbone network (client and server) is developed, then it needs to be secured with a particular algorithm or technique. The algorithm studied is known as RSA key oriented algorithm which offers dynamic security on client and server level during communication. The other technique for advancing the level of scalability and improvement along the network layer we used is NTRU encryption. Since this algorithm encrypt data of every type ensures the originality of particular data and adds the advancement in throughput level. These two algorithms are implemented to run on single server on a different core thread thus making the idle cores of sever in use for both the algorithms. It is reflecting that the parallelism encryption done on single content during the data storage on network marginally increase the speed of execution and decryption and encryption timings have been increased. Other part of this thesis also deals with the approaches followed previously which are the part this thesis.
Key-Words / Index Term
RSA, LOSSY, SAAS
References
[1] Ranjit Ranjan, Dr. A.S Baghel, Sushil Kumar “Improvement of NTRU cryptosystem” International Journal of Advanced Research in Computer Science Vol-2, Issue-9, Page no-79-84, September 2012.
[2] Subedari Mithila, P. Pradeep Kumar, “Data Security through Confidentiality in Cloud Computing Environment”, Subedari Mithila et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol-2, Issue-5, Page no-1836-1840, 2011.
[3] Gurkamal Bhullar and Navneet Kaur “Concurrency and security control with NTRU” International Journal of Innovative Research in Computer Science and Communication Engineering Vol-2, Issue 3, March 2014.
[4] Dr. C. Sunil Kumar, J. Seetha, S.R Vinotha “Security implications of Distributed parallel cloud database management system models” International Journal of Software Computing and Software Engineering, Vol-2, Issue-11,Page no-20-28, 2012.
[5] Shashi Mehrotra Seth and Rajan Mishra, “Comparative Analysis of Encryption Algorithm for Data Communication”, International Journal of Computer Science and Technology Vol-4, Issue-8, Page no-348-354, August 2014.
[6] YashPal Mote and Shekhar Gaikward, “Superioer Security Data Encryption Algorithm”, International Journal of Computer Scienece, Vol- 6,Page no-171-181 , July 2012.
[7] Parsi Kalpana and Sudha Singaraju, ”Data security in cloud computing using RSA algorithm, International Journal of Research in Computer and Communication Technology, Vol-1, Issue-4, Page no-143-146, September 2012.