Skip to main content
Erschienen in: Service Oriented Computing and Applications 3-4/2018

13.08.2018 | Special Issue Paper

Hybrid IT architecture by gene-based cryptomata (HITAGC) for lightweight security services

verfasst von: Chandrasegar Thirumalai, P. Viswanathan

Erschienen in: Service Oriented Computing and Applications | Ausgabe 3-4/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In the computing world, the digital transformation of data grows exponentially with every year. However, these situations are predominantly tackled by leading enterprises through by adopting a hybrid IT model. This model effectively supports the organization through strategic design to provide standard delivery to customers from independent multi-sourced entities. An experimental design method is applied using hybrid IT architecture with gene-based cryptomata (HITAGC) which is well suited to real-time cloud environments to store and retrieve the cloud space data efficiently. The CSC primarily relies on the service of CSP to keep their confidential data, and this system ultimately uses the PKC crypts. To address this security demand, we propose two different schemes such as HITAGC-PKC and hybrid HITAGC. The first model is designed to generate robust asymmetric keys for the Internet of Things, and the other hybrid HITAGC is for efficient sharing of big data over the cloud in a secure manner. The performance of these crypts is compared with the traditional systems like standard RSA, ESRKGS, SED2, EDCon, and AES.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
23.
Zurück zum Zitat Thirumalai C, Kar H (2017) Memory efficient multi key (MEMK) generation scheme for secure transportation of sensitive data over cloud and IoT devices. In: 2017 innovations in power and advanced computing technologies (i-PACT). IEEE, Vellore, p 16. https://doi.org/10.1109/IPACT.2017.8244948 Thirumalai C, Kar H (2017) Memory efficient multi key (MEMK) generation scheme for secure transportation of sensitive data over cloud and IoT devices. In: 2017 innovations in power and advanced computing technologies (i-PACT). IEEE, Vellore, p 16. https://​doi.​org/​10.​1109/​IPACT.​2017.​8244948
24.
Zurück zum Zitat Padhye S (2006) A public key cryptosystem based on Pell equation. IACR Cryptol ePrint Arch 191 Padhye S (2006) A public key cryptosystem based on Pell equation. IACR Cryptol ePrint Arch 191
32.
Zurück zum Zitat Herrmann M, May A (2010) Maximizing small root bounds by linearization and applications to small secret exponent RSA. Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics), vol 6056. LNCS, Berlin, pp 53–69 Herrmann M, May A (2010) Maximizing small root bounds by linearization and applications to small secret exponent RSA. Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics), vol 6056. LNCS, Berlin, pp 53–69
Metadaten
Titel
Hybrid IT architecture by gene-based cryptomata (HITAGC) for lightweight security services
verfasst von
Chandrasegar Thirumalai
P. Viswanathan
Publikationsdatum
13.08.2018
Verlag
Springer London
Erschienen in
Service Oriented Computing and Applications / Ausgabe 3-4/2018
Print ISSN: 1863-2386
Elektronische ISSN: 1863-2394
DOI
https://doi.org/10.1007/s11761-018-0237-1

Weitere Artikel der Ausgabe 3-4/2018

Service Oriented Computing and Applications 3-4/2018 Zur Ausgabe

Premium Partner