Improved Data Sharing Security with Dual-MAC Address Verification and SHCS
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 5
Abstract
Abstract: For the easy and secure sharing of an unknown private data, an algorithm is developed. The proposed algorithm has improved the data sharing security with MAC address and SHCS verifications. This technique enables the sender to effectively assign a value for the commit phase.MAC address verification improved the security of authorized users at both the sender and receiver side. At the receiver side, the commit value verification is done. These features have provided an increased privacy preservation of the shared data. The usage of SHCS and MAC address in this new technique prevents hackers during the passage of private data. It is only possible in this new algorithm that more complex data can be shared with maximum security. My thesis examines the latest scheme in the literature, AIDA algorithm and proposes a new algorithm for improving the data sharing security. The new algorithm is created on top of SHCS algorithm with the help of MAC address verification. XOR encryption and decryption technique is used in my work. A Base64 encoder and decoder mechanism is added along with the encryption and decryption technique.
Authors and Affiliations
Arsha S Vasanthan
Prediction levels of heavy metals (Zn, Cu and Mn) in current Holocene deposits of the eastern part of the Mediterranean Moroccan margin (Alboran Sea)
The Alboran basin is part of the bético Rif chain and represents a point of exchange through the Strait of Gibraltar between the Atlantic Ocean to the west and the Algerian-Balearic Basin to the east.The purpose of...
A Secure Cryptographic Puzzle based Approach Ensuring TotalSecurity for transmitted Information with IP Tracing
Abstract: Today internet is extremely affected by several attacks such as Denial-of-Service attacks. The source IP address in a packet can be falsified. Thus IP Protocol fails to determine the originator. The attac...
Survey on Routing Protocols for Under Water Sensor Networks
There are certain routing protocols in underwater sensor network. Providing efficient protocols for underwater sensor networks is a challenging factor. UNSW often uses acoustic channels instead of Radio channel...
A Name Entity Detection and Relation Extraction fromUnstructured Data by N-gram Features
Abstract : In recent years Name entity extraction and linking have received much attention. However, correctclassification of entities and proper linking among these entities is a major challenge for researcher. Wepropos...
Optimal Planning of the Production of Corpus Details on Metal Cutting Machines with the Help of Computer Numeric Control
Abstract: The optimal planning of details mechanical processing is a key problem, directly affecting the productivity and efficiency of the activity of a machine building company. The combinatorial character of the prob...