Improved Data Sharing Security with Dual-MAC Address Verification and SHCS
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 5
Abstract
Abstract: For the easy and secure sharing of an unknown private data, an algorithm is developed. The proposed algorithm has improved the data sharing security with MAC address and SHCS verifications. This technique enables the sender to effectively assign a value for the commit phase.MAC address verification improved the security of authorized users at both the sender and receiver side. At the receiver side, the commit value verification is done. These features have provided an increased privacy preservation of the shared data. The usage of SHCS and MAC address in this new technique prevents hackers during the passage of private data. It is only possible in this new algorithm that more complex data can be shared with maximum security. My thesis examines the latest scheme in the literature, AIDA algorithm and proposes a new algorithm for improving the data sharing security. The new algorithm is created on top of SHCS algorithm with the help of MAC address verification. XOR encryption and decryption technique is used in my work. A Base64 encoder and decoder mechanism is added along with the encryption and decryption technique.
Authors and Affiliations
Arsha S Vasanthan
Mapping Procedural Modules To Storage
Majors in computer science accept structured programming as a subset of procedural programming paradigm and it is intended for complex system design and development. But as everyone is moving towards object orien...
Classifying Evaluation Secure Patterns under Attacks
Abstract: Pattern Classification is one division for machine discovering that spotlights on acknowledgment of examples and regularities in information. In antagonistic applications such as biometric verification, spam si...
A Study on Relational Semantic Video Content Extraction Using Bayesian Network Classifier
Abstract: Multimedia data mining is an emergent field, which consists of image mining, video data mining etc. The content based extraction in videos is an important application due to the rapid growth in the video...
Design and Architecture for Web Graph Mining Base Recommender System for Query, Image and Social Network using Query Suggestion Algorithm and Heat Diffusion Method
Recommendation techniques is now a day’s very important. various kinds of recommendations are done on the Web, example movies, music, images, books recommendations, query suggestions and tags recommendations, etc....
Scalable parallel clustering using modified Firefly algorithm
Abstract: Clustering is the process of assigning data objects into a set of disjoint groups called clusters so that objects in each cluster are more similar to each other than objects from different clusters. We tr...