Autosoft Journal

Online Manuscript Access


Data Encryption Method Using Environmental Secret Key with Server Assistance


Authors



Abstract

Data encryption is an effective method for enterprises and government offices to protect their important information from being lost or leaked, especially when data is transmitted on the Internet. In this paper, we propose a novel data encryption/decryption method, named the Data Encryption Method using Environmental Secret Key with Server Assistance (DESK for short), which provides users with an environmental key of a trusted computer and a group key created for an authorized group to encrypt their data. In the DESK, the important parameters are separately stored and hidden in server and the trusted computer to avoid them from being cracked easily. The proposed method not only protects the important data from being loss, but is also able to resist replay attack and eavesdropping attack. The DESK has a very high security level, which is practically useful in homeland security.


Keywords


Pages

Total Pages: 8
Pages: 423-430

DOI
10.1080/10798587.2015.1121615


Manuscript ViewPdf Subscription required to access this document

Obtain access this manuscript in one of the following ways


Already subscribed?

Need information on obtaining a subscription? Personal and institutional subscriptions are available.

Already an author? Have access via email address?


Published

Volume: 22
Issue: 3
Year: 2016

Cite this document


References

Chen L. Int’l Conf. on Computer Science and Electronics Engineering

Damgard I. B. Two-key triple encryption

Fedorchenko A. J. of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications

Geer D. IEEE Computer

Jianan Hong, Kaiping Xue, and Wei Li. "Comments on ‘DAC-MACS: Effective Data Access Control for Multiauthority Cloud Storage Systems”/Security Analysis of Attribute Revocation in Multiauthority Data Access Control for Cloud Storage Systems." IEEE Transactions on Information Forensics and Security 10.6 (2015): 1315-1317. Crossref. Web. https://doi.org/10.1109/TIFS.2015.2407327

Huang, Yi-Li et al. "A Secure Wireless Communication System Integrating RSA, Diffie-Hellman PKDS, Intelligent Protection-Key Chains and a Data Connection Core in a 4G Environment." The Journal of Supercomputing 67.3 (2013): 635-652. Crossref. Web. https://doi.org/10.1007/s11227-013-0958-z

Lewko A. B. Int’l Conf. on Advances in Cryptology

Li J. Y. Symposium on Operating Systems Design and Implementation

Lindauer B. J. of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications

Liu, Simon, and Rick Kuhn. "Data Loss Prevention." IT Professional 12.2 (2010): 10-13. Crossref. Web. https://doi.org/10.1109/MITP.2010.52

Murthy, Sowmiya. "CRYPTOGRAPHIC SECURE CLOUD STORAGE MODEL WITH ANONYMOUS AUTHENTICATION AND AUTOMATIC FILE RECOVERY." ICTACT Journal on Soft Computing 05.01 (2014): 844-849. Crossref. Web. https://doi.org/10.21917/ijsc.2014.0120

Popa R. A. USENIX An. Technical Conf

Schneider, David. "The State of Network Security." Network Security 2012.2 (2012): 14-20. Crossref. Web. https://doi.org/10.1016/S1353-4858(12)70016-8

Tsai K. L. J. of Internet Services and Information Security

Lv, Xin, Feng Xu, and Serge G. Petiton. "Cryptographic Cloud Storage with Public Verifiability: Ensuring Data Security of the YML Framework." Intelligent Automation & Soft Computing 19.2 (2013): 111-121. Crossref. Web. https://doi.org/10.1080/10798587.2013.786958

Yang, Kan et al. "DAC-MACS: Effective Data Access Control for Multiauthority Cloud Storage Systems." IEEE Transactions on Information Forensics and Security 8.11 (2013): 1790-1801. Crossref. Web. https://doi.org/10.1109/TIFS.2013.2279531

Chih-Hsu Yen, and Bing-Fei Wu. "Simple Error Detection Methods for Hardware Implementation of Advanced Encryption Standard." IEEE Transactions on Computers 55.6 (2006): 720-731. Crossref. Web. https://doi.org/10.1109/TC.2006.90

Zaffar F. IEEE An. Computer Security Applications Conf.

Zhang, Zhuo, and Xiaofeng Wang. "Calculation and Control of Flow Path Length in Superelevation Sections." Intelligent Automation & Soft Computing 19.3 (2013): 327-333. Crossref. Web. https://doi.org/10.1080/10798587.2013.824241

JOURNAL INFORMATION


ISSN PRINT: 1079-8587
ISSN ONLINE: 2326-005X
DOI PREFIX: 10.31209
10.1080/10798587 with T&F
IMPACT FACTOR: 0.652 (2017/2018)
Journal: 1995-Present




CONTACT INFORMATION


TSI Press
18015 Bullis Hill
San Antonio, TX 78258 USA
PH: 210 479 1022
FAX: 210 479 1048
EMAIL: tsiepress@gmail.com
WEB: http://www.wacong.org/tsi/