Skip to main content

LBCLCT: Location Based Cross Language Cipher Technique

  • Chapter
  • First Online:
Smart Cities Performability, Cognition, & Security

Part of the book series: EAI/Springer Innovations in Communication and Computing ((EAISICC))

Abstract

Encryption is a cryptographic technique to secure information that is being transmitted over the network. In the present era, most of the applications hosted on cloud are affected by enumerable number of threats. Any web application hosted on cloud has several challenges for data privacy and security. In this work, a mobile bill payment application has been designed and developed in Java programming language for the purpose of secure bill payment over the cloud. Google Cloud Platform, Google App Engine, is used for the deployment of mobile bill payment application. The proposed system encapsulates two phases: In the first phase, affine cipher encryption technique is used to encrypt the original information. Affine cipher technique is improved using dynamic key, which encapsulates geographic coordinates of the user and its results are compared with rail fence cipher technique. In the second phase, generated cipher text has been further translated into two Indian languages: character by character. The result of two-phase encryption makes the original data stronger and secure.

(SWINGER (swinger@ipu.ac.in): Security, Wireless, IoT Network Group of Engineering and Research) Lab Members

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 129.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Abbreviations

IaaS:

Infrastructure as a Service

PaaS:

Platform as a Service

SaaS:

Software as a Service

IT:

Information Technology

AES:

Advanced Encryption Standard

HMAC:

Hash Message Authentication Code

SDK:

Software Development Kit

IDE:

Integrated Development Environment

References

  1. Brown, E. (2011). Final version of NIST cloud computing definition published. Diambil dari. Retrieved October 10, 2014. http://www.nist.gov/itl/csd/cloud-102511

  2. Zia, A., & Khan, M. N. A. (2012). Identifying key challenges in performance issues in cloud computing. International Journal of Modern Education and Computer Science, 4(10), 59.

    Article  Google Scholar 

  3. Ahamed, F., Shahrestani, S., & Ginige, A. (2013). Cloud computing: Security and reliability issues. Communications of the IBIMA, 2013, 1–12.

    Article  Google Scholar 

  4. Kaur, G., & Chawla, S. (2014). Cloud computing for business: Models and platforms. International Journal of Computer Science and Engineering, 1(7).

    Google Scholar 

  5. Sriram, I., & Khajeh-Hosseini, A. (2010). Research agenda in cloud technologies. arXiv:1001.3259.

    Google Scholar 

  6. Rajput, Y., Naik, D., & Mane, C. (2014). An improved cryptographic technique to encrypt text using double encryption. International Journal of Computer Applications, 86(6), 24–28.

    Article  Google Scholar 

  7. Makki, S., Haque, R., Taher, Y., Assaghir, Z., Ditzler, G., Hacid, M.S., et al. (2017). Fraud data analytics tools and techniques in big data era. In 2017 International Conference on Cloud and Autonomic Computing (ICCAC) (pp. 186–187). Piscataway: IEEE.

    Chapter  Google Scholar 

  8. Deshpande, V. M., Nair, D. M. K., & Shah, D. (under review, 2017). Major web application threats for data privacy & security–detection, analysis and mitigation strategies. International Journal of Scientific Research in Science and Technology. PRINT ISSN: 2395–6011.

    Google Scholar 

  9. Joshi, C., & Singh, U. K. (2016). Security testing and assessment of vulnerability scanners in quest of current information security landscape. International Journal of Computer Applications, 145(2), 1–7.

    Article  Google Scholar 

  10. Firdaus, I. L., Marwati, R., & Sispiyati, R. (2018). Aplikasi kriptografi komposisi one time pad cipher dan affine cipher. Journal EurekaMatika, 5(2), 42–51.

    Google Scholar 

  11. Wu, Y. (2015). Improvement research based on affine encryption algorithm. In 2015 14th International Symposium on Distributed Computing and Applications for Business Engineering and Science (DCABES) (pp. 167–170). Piscataway: IEEE.

    Chapter  Google Scholar 

  12. Mahajan, M., Wagh, M., Biswas, P., Alai, S., & More, S. (2017). M-vote (online voting system). International Journal, 2(10), 10–14.

    Google Scholar 

  13. Hasan, S., & Ukkusuri, S. V. (2014). Urban activity pattern classification using topic models from online geo-location data. Transportation Research Part C: Emerging Technologies, 44, 363–381.

    Article  Google Scholar 

  14. Vishal, K., & Johari, R. (2017). CBFT: Cloud based financial transaction application. In 2017 6th International Conference on System Modeling & Advancement in Research Trends-SMART. Piscataway: IEEE.

    Google Scholar 

  15. Vishal, K., & Johari, R. (2018). SOAiCE: Simulation of attacks on cloud computing environment. In 2018 8th International Conference on Cloud Computing, Data Science & Engineering-Confluence. Piscataway: IEEE.

    Google Scholar 

  16. Singh, A. (2018). Security concerns and countermeasures in cloud computing: a qualitative analysis. International Journal of Information Technology, 3, 1–8.

    Google Scholar 

  17. Tariq, H., & Agarwal, P. (2018). Secure keyword search using dual encryption in cloud computing. International Journal of Information Technology, 3, 1–10.

    Google Scholar 

  18. Kumar, M., Yadav, A. K., Khatri, P., & Raw, R. S. (2018). Global host allocation policy for virtual machine in cloud computing. International Journal of Information Technology, 10(3), 279–287.

    Article  Google Scholar 

  19. Gupta, S., Johari, R., Garg, P., & Gupta, K. (2018). C 3 T: Cloud based cyclic cryptographic technique and it’s comparative analysis with classical cipher techniques. In 2018 5th International Conference on Signal Processing and Integrated Networks (SPIN) (pp. 332–337). Piscataway: IEEE.

    Chapter  Google Scholar 

  20. Johari, R., Bhatia, H., Singh, S., & Chauhan, M. (2016). Triplicative cipher technique. Procedia Computer Science, 78, 217–223.

    Article  Google Scholar 

  21. Kumar, S., Johari, R., Singh, L., & Gupta, K. (2017). SCLCT: Secured cross language cipher technique. In 2017 International Conference on Computing, Communication and Automation (ICCCA) (pp. 545–550). Piscataway: IEEE.

    Chapter  Google Scholar 

  22. Al-Turjman, F., & Alturjman, S. (2018). Confidential smart-sensing framework in the IoT era. The Journal of Supercomputing, 74(10), 5187–5198.

    Article  Google Scholar 

  23. Al-Turjman, F., Hasan, M. Z., & Al-Rizzo, H. (2018). Task scheduling in cloud-based survivability applications using swarm optimization in IoT. Transactions on Emerging Telecommunications. https://doi.org/10.1002/ett.3539

  24. Al-Turjman, F., & Alturjman, S. (2018). 5G/IoT-enabled UAVs for multimedia delivery in industry-oriented applications. Multimedia Tools and Applications, 78, 1–22.

    Google Scholar 

  25. Pino, T., Choudhury, S., & Al-Turjman, F. (2018). Dominating set algorithms for wireless sensor networks survivability. IEEE Access, 6, 17527–17532.

    Article  Google Scholar 

  26. Al-Turjman, F., & Alturjman, S. (2018). Context-sensitive access in industrial internet of things (IIoT) healthcare applications. IEEE Transactions on Industrial Informatics, 14(6), 2736–2744.

    Article  Google Scholar 

  27. Alabady, S.A., Al-Turjman, F., & Din, S. (2018). A novel security model for cooperative virtual networks in the IoT Era. International Journal of Parallel Programming, 47, 1–16.

    Google Scholar 

  28. Luhn, H. P. (1960). Computer for verifying numbers. US Patent 2,950,048 (August 23, 1960).

    Google Scholar 

  29. Singh, L., & Johari, R. (2015). CLCT: Cross language cipher technique. In International Symposium on Security in Computing and Communication (pp. 217–227). Cham: Springer.

    Chapter  Google Scholar 

Download references

Submission and Acknowledgement

This chapter is an expanded and extended version of CLCT [29]. The authors wish to acknowledge the research oriented environment provided by GGSIP University.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rahul Johari .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Gupta, V., Johari, R., Gupta, K., Bhatia, R., Seth, S. (2020). LBCLCT: Location Based Cross Language Cipher Technique. In: Al-Turjman, F. (eds) Smart Cities Performability, Cognition, & Security. EAI/Springer Innovations in Communication and Computing. Springer, Cham. https://doi.org/10.1007/978-3-030-14718-1_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-14718-1_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-14717-4

  • Online ISBN: 978-3-030-14718-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics