A Secure and Privacy Preserving Technique in Distributed Information Sharing using AES Encryption and Genetic Algorithm
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2014, Vol 5, Issue 5
Abstract
In many organizations distributed information sharing is used to share data in a large network. In distributed Information sharing there are many chances to hack the technical and personal information of client and server in a network. Earlier Information Brokering methods are used where brokers are used to share the information among the clients and servers. This approach has a drawback where the brokers cannot be trusted to share information. In this paper we propose a technique to preserve the security and privacy of the distributed network where information is shared. We also use a shared medium as an interface between the server and client. AES encryption is used to encrypt the information in server which is to be sent to the client. In shared medium we use Digital Signature Algorithm to perform client authentication to send the information to the requested client. Genetic Algorithm is another technique which is used to detect the attackers who tries to hack the information in shared medium. Since we use two cryptographic techniques the security maintained will be high. Use of Genetic Algorithm also enhances the security measures of the system and it will be difficult for attackers to hack the information easily. We use the above three techniques to improve the performance measure.
Authors and Affiliations
Dharani. M , R. Vidhya
Optimistic Rough Sets Attribute Reduction using Dynamic Programming
Nowadays, and with the current progress in technologies and business sales, databases with large amount of data exist especially in Retail Companies. The main objective of this study is to reduce the complexity of the cl...
A NON-LINEAR SCHEME FOR PMEPR REDUCTION IN MC-CDMA SYSTEM
The main feature of the next-generation wireless systems will be the convergence of multimedia services such as speech, audio, video, image, and data. This implies that a future wireless terminal, by guaranteeing high sp...
Designing A Decision Support System For Weaning Using Ann – A Preliminary Study
Patients require mechanical ventilator support when the ventilatory and/or gas exchange capabilities of their own respiratory system fail. Mechanical ventilation can have life threatening complications, it should be disc...
A COMPARATIVE ANALYSIS OF OBJECT POINT METHOD WITH USE CASE METHOD IN SOFTWARE EFFORT ESTIMATION
The important work in software development process is to develop projects within estimated time and cost. As accuracy and effort plays a vital role for software development system. Several techniques are available for ef...
Power-Time Efficient Algorithm for Computing Reconfigurable FFT in Wireless Sensor Network
Wireless sensor network have several constraints, such as a short transmission range, poor processing capabilities, limited available power and slow execution time. The design of algorithms for fast processing of informa...