Abstract
Encryption is a cryptographic technique to secure information that is being transmitted over the network. In the present era, most of the applications hosted on cloud are affected by enumerable number of threats. Any web application hosted on cloud has several challenges for data privacy and security. In this work, a mobile bill payment application has been designed and developed in Java programming language for the purpose of secure bill payment over the cloud. Google Cloud Platform, Google App Engine, is used for the deployment of mobile bill payment application. The proposed system encapsulates two phases: In the first phase, affine cipher encryption technique is used to encrypt the original information. Affine cipher technique is improved using dynamic key, which encapsulates geographic coordinates of the user and its results are compared with rail fence cipher technique. In the second phase, generated cipher text has been further translated into two Indian languages: character by character. The result of two-phase encryption makes the original data stronger and secure.
(SWINGER (swinger@ipu.ac.in): Security, Wireless, IoT Network Group of Engineering and Research) Lab Members
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Abbreviations
- IaaS:
-
Infrastructure as a Service
- PaaS:
-
Platform as a Service
- SaaS:
-
Software as a Service
- IT:
-
Information Technology
- AES:
-
Advanced Encryption Standard
- HMAC:
-
Hash Message Authentication Code
- SDK:
-
Software Development Kit
- IDE:
-
Integrated Development Environment
References
Brown, E. (2011). Final version of NIST cloud computing definition published. Diambil dari. Retrieved October 10, 2014. http://www.nist.gov/itl/csd/cloud-102511
Zia, A., & Khan, M. N. A. (2012). Identifying key challenges in performance issues in cloud computing. International Journal of Modern Education and Computer Science, 4(10), 59.
Ahamed, F., Shahrestani, S., & Ginige, A. (2013). Cloud computing: Security and reliability issues. Communications of the IBIMA, 2013, 1–12.
Kaur, G., & Chawla, S. (2014). Cloud computing for business: Models and platforms. International Journal of Computer Science and Engineering, 1(7).
Sriram, I., & Khajeh-Hosseini, A. (2010). Research agenda in cloud technologies. arXiv:1001.3259.
Rajput, Y., Naik, D., & Mane, C. (2014). An improved cryptographic technique to encrypt text using double encryption. International Journal of Computer Applications, 86(6), 24–28.
Makki, S., Haque, R., Taher, Y., Assaghir, Z., Ditzler, G., Hacid, M.S., et al. (2017). Fraud data analytics tools and techniques in big data era. In 2017 International Conference on Cloud and Autonomic Computing (ICCAC) (pp. 186–187). Piscataway: IEEE.
Deshpande, V. M., Nair, D. M. K., & Shah, D. (under review, 2017). Major web application threats for data privacy & security–detection, analysis and mitigation strategies. International Journal of Scientific Research in Science and Technology. PRINT ISSN: 2395–6011.
Joshi, C., & Singh, U. K. (2016). Security testing and assessment of vulnerability scanners in quest of current information security landscape. International Journal of Computer Applications, 145(2), 1–7.
Firdaus, I. L., Marwati, R., & Sispiyati, R. (2018). Aplikasi kriptografi komposisi one time pad cipher dan affine cipher. Journal EurekaMatika, 5(2), 42–51.
Wu, Y. (2015). Improvement research based on affine encryption algorithm. In 2015 14th International Symposium on Distributed Computing and Applications for Business Engineering and Science (DCABES) (pp. 167–170). Piscataway: IEEE.
Mahajan, M., Wagh, M., Biswas, P., Alai, S., & More, S. (2017). M-vote (online voting system). International Journal, 2(10), 10–14.
Hasan, S., & Ukkusuri, S. V. (2014). Urban activity pattern classification using topic models from online geo-location data. Transportation Research Part C: Emerging Technologies, 44, 363–381.
Vishal, K., & Johari, R. (2017). CBFT: Cloud based financial transaction application. In 2017 6th International Conference on System Modeling & Advancement in Research Trends-SMART. Piscataway: IEEE.
Vishal, K., & Johari, R. (2018). SOAiCE: Simulation of attacks on cloud computing environment. In 2018 8th International Conference on Cloud Computing, Data Science & Engineering-Confluence. Piscataway: IEEE.
Singh, A. (2018). Security concerns and countermeasures in cloud computing: a qualitative analysis. International Journal of Information Technology, 3, 1–8.
Tariq, H., & Agarwal, P. (2018). Secure keyword search using dual encryption in cloud computing. International Journal of Information Technology, 3, 1–10.
Kumar, M., Yadav, A. K., Khatri, P., & Raw, R. S. (2018). Global host allocation policy for virtual machine in cloud computing. International Journal of Information Technology, 10(3), 279–287.
Gupta, S., Johari, R., Garg, P., & Gupta, K. (2018). C 3 T: Cloud based cyclic cryptographic technique and it’s comparative analysis with classical cipher techniques. In 2018 5th International Conference on Signal Processing and Integrated Networks (SPIN) (pp. 332–337). Piscataway: IEEE.
Johari, R., Bhatia, H., Singh, S., & Chauhan, M. (2016). Triplicative cipher technique. Procedia Computer Science, 78, 217–223.
Kumar, S., Johari, R., Singh, L., & Gupta, K. (2017). SCLCT: Secured cross language cipher technique. In 2017 International Conference on Computing, Communication and Automation (ICCCA) (pp. 545–550). Piscataway: IEEE.
Al-Turjman, F., & Alturjman, S. (2018). Confidential smart-sensing framework in the IoT era. The Journal of Supercomputing, 74(10), 5187–5198.
Al-Turjman, F., Hasan, M. Z., & Al-Rizzo, H. (2018). Task scheduling in cloud-based survivability applications using swarm optimization in IoT. Transactions on Emerging Telecommunications. https://doi.org/10.1002/ett.3539
Al-Turjman, F., & Alturjman, S. (2018). 5G/IoT-enabled UAVs for multimedia delivery in industry-oriented applications. Multimedia Tools and Applications, 78, 1–22.
Pino, T., Choudhury, S., & Al-Turjman, F. (2018). Dominating set algorithms for wireless sensor networks survivability. IEEE Access, 6, 17527–17532.
Al-Turjman, F., & Alturjman, S. (2018). Context-sensitive access in industrial internet of things (IIoT) healthcare applications. IEEE Transactions on Industrial Informatics, 14(6), 2736–2744.
Alabady, S.A., Al-Turjman, F., & Din, S. (2018). A novel security model for cooperative virtual networks in the IoT Era. International Journal of Parallel Programming, 47, 1–16.
Luhn, H. P. (1960). Computer for verifying numbers. US Patent 2,950,048 (August 23, 1960).
Singh, L., & Johari, R. (2015). CLCT: Cross language cipher technique. In International Symposium on Security in Computing and Communication (pp. 217–227). Cham: Springer.
Submission and Acknowledgement
This chapter is an expanded and extended version of CLCT [29]. The authors wish to acknowledge the research oriented environment provided by GGSIP University.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Gupta, V., Johari, R., Gupta, K., Bhatia, R., Seth, S. (2020). LBCLCT: Location Based Cross Language Cipher Technique. In: Al-Turjman, F. (eds) Smart Cities Performability, Cognition, & Security. EAI/Springer Innovations in Communication and Computing. Springer, Cham. https://doi.org/10.1007/978-3-030-14718-1_11
Download citation
DOI: https://doi.org/10.1007/978-3-030-14718-1_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-14717-4
Online ISBN: 978-3-030-14718-1
eBook Packages: EngineeringEngineering (R0)