A Secure and Privacy Preserving Technique in Distributed Information Sharing using AES Encryption and Genetic Algorithm
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2014, Vol 5, Issue 5
Abstract
In many organizations distributed information sharing is used to share data in a large network. In distributed Information sharing there are many chances to hack the technical and personal information of client and server in a network. Earlier Information Brokering methods are used where brokers are used to share the information among the clients and servers. This approach has a drawback where the brokers cannot be trusted to share information. In this paper we propose a technique to preserve the security and privacy of the distributed network where information is shared. We also use a shared medium as an interface between the server and client. AES encryption is used to encrypt the information in server which is to be sent to the client. In shared medium we use Digital Signature Algorithm to perform client authentication to send the information to the requested client. Genetic Algorithm is another technique which is used to detect the attackers who tries to hack the information in shared medium. Since we use two cryptographic techniques the security maintained will be high. Use of Genetic Algorithm also enhances the security measures of the system and it will be difficult for attackers to hack the information easily. We use the above three techniques to improve the performance measure.
Authors and Affiliations
Dharani. M , R. Vidhya
Handwritten Character Recognition for major Indian Scripts:A Survey
Character Recognition is an active field of research today. It comprises of Pattern Recognition and Image Processing. Character Recognition has gained enormous attention due to its application in various fields. Characte...
Performance Investigation on Lossy Still Image wavelet Compression using different wavelet filter functions
The aim of this paper is to observe a set of wavelet for achievement in a still image compression system and to accentuate the advantage of this transform involving to today’s methods. This paper discusses significant fe...
ACCESSING DISTRIBUTED SERVICES WITH ONE TIME TOKEN GENERATION
Many services which we use today require us to login to ensure security and confidentiality. As the number of services increase, it has become quite difficult to remember the username and password for each of them. In th...
Performance Analysis of Optical Wireless Communication Channel Link at Various Bit Rates
Optical wireless communication systems have got more popularity in last few years due to its advantage over conventional radio frequency communication systems. This paper reports the effect of using NRZ and RZ modulation...
A Novel Method to Extract Comparison of Products Using Comparative Questions
Comparing one thing with another is a typical part of human decision making process, especially during an online purchase scheme. To assist decision making it is useful to compare entities that share common utility but h...