A Secure and Privacy Preserving Technique in Distributed Information Sharing using AES Encryption and Genetic Algorithm
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2014, Vol 5, Issue 5
Abstract
In many organizations distributed information sharing is used to share data in a large network. In distributed Information sharing there are many chances to hack the technical and personal information of client and server in a network. Earlier Information Brokering methods are used where brokers are used to share the information among the clients and servers. This approach has a drawback where the brokers cannot be trusted to share information. In this paper we propose a technique to preserve the security and privacy of the distributed network where information is shared. We also use a shared medium as an interface between the server and client. AES encryption is used to encrypt the information in server which is to be sent to the client. In shared medium we use Digital Signature Algorithm to perform client authentication to send the information to the requested client. Genetic Algorithm is another technique which is used to detect the attackers who tries to hack the information in shared medium. Since we use two cryptographic techniques the security maintained will be high. Use of Genetic Algorithm also enhances the security measures of the system and it will be difficult for attackers to hack the information easily. We use the above three techniques to improve the performance measure.
Authors and Affiliations
Dharani. M , R. Vidhya
Dynamic Time Quantum in Shortest Job First Scheduling Algorithm (DTQSJF) for Unpredictable Burst Time of Processes
In multitasking and time sharing operating system the performance of the CPU depends on waiting time, response time, turnaround time, context switches from the process mainly depends on the scheduling algorithm. Shortest...
An Improved Algorithm for Text Document Clustering
Due to the advancement of internet, the volume of the electronic documents available on the web is increasing day by day. Document clustering plays important role in organization and summarization of these documents. Thu...
Improvement of performance of web crawlers for efficient web searching and crawling
The effectiveness of a crawler directly affects the efficiency of the searching quality of the web search engines. As the crawler interacts with billions of hosts or servers over a period of weeks or months, the issues o...
Development of a Speech Recognition System for Speaker Independent Isolated Malayalam Words
In this paper, a speech recognition system is developed for recognizing speaker-independent, isolated words. Speech recognition is a fascinating application of Digital Signal Processing and is a pattern classification ta...
A SURVEY ON SECURING MANETS FROM MALICIOUS BEHAVIOR BY DETECTION MECHANISM
There is a migration from wired network to wireless network in last few years due to the property of mobility and scalability. Mobile Ad hoc network is an infrastructure less network. Each node in Mobile Ad hoc Network a...