Skip to main content

Enhancing Cloud Security Using VIJANA Cloud Data Jacket Protocol

  • Conference paper
  • First Online:
Emerging Research in Computing, Information, Communication and Applications
  • 739 Accesses

Abstract

In the cloud, the risks to sensitive data are greater than ever before. Cloud attacks have long been an important problem that requires a lot of research to be done to design security solutions that truly protect the user’s data. It is essential to transmit private data securely by encapsulating from unauthorized users. The better way to protect the data transmitted through the cloud from a malicious third party is to scramble the data before transmission. This paper sets out to contribute to the area of cryptography by developing a novel encipherment technique that will conceal the confidential data sent through the cloud by obtaining a polyalphanumeric substitution cipher. The encryption/decryption of cloud data is performed based on the VIJANA tableau by using the substitution method. The mathematical background of the cryptographic method and key generation is given. This technique becomes more secure when it works along with the key agreement method which is based on a discrete logarithm. Four new algorithms for key contract, key generation, encryption, and decryption are created and implemented. Encrypt/decrypt results achieved by applying the technique are shown with sample data. The VIJANA encipherment technique is justified to be a true security solution to ensure privacy of cloud data communication with cryptanalysis done.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Dalkilic, M.E., Gungor, C.: An interactive cryptanalysis algorithm for the Vigenere Cipher. In: Advances in Information Systems Lecture Notes in Computer Science, vol. 1909, pp. 341–351 (2000)

    Google Scholar 

  2. Blair, A.: Learning the Caesar and Vigenere Cipher by hierarchical evolutionary re-combination. In: Evolutionary Computation (CEC), IEEE Congress (2013)

    Google Scholar 

  3. Nacira, G., Abdelaziz, A.: The θ-vigenere cipher extended to numerical data. In: Proceedings of International Conference on Information and Communication Technologies: From Theory to Applications (2004)

    Google Scholar 

  4. Kumar, A., Mehra, P.S., Gupta, G., Sharma, M.: Enhanced Block Playfair Cipher. In: Quality, Reliability, Security and Robustness in Heterogeneous Networks, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol. 115, pp. 689–695 (2013)

    Google Scholar 

  5. Murali, P., Senthilkumar, G.: Modified version of playfair Cipher using linear feedback shift register. In: Information Management and Engineering. ICIME ‘09 (2009)

    Google Scholar 

  6. Kartha, R.S., Paul, V.: Survey: recent modifications in Vigenere Cipher. IOSR J. Comput. Eng. 16(2) (2014)

    Google Scholar 

  7. Spezeski, W.J.: A Keyless Polyalphabetic Cipher, pp. 529–532. Education and Automation, Technological Developments in Networking (2010)

    Google Scholar 

  8. Kester, Q.A.: A cryptosystem based on vigenere cipher with varying key. Int. J. Adv. Res. Comput. Eng. Technol. 1(10) (2012)

    Google Scholar 

  9. Omran, S.S., Al-Khalid, A.S., Al-Saady, D.M.: A cryptanalytic attack on Vigenère cipher using genetic algorithm. In: Open Systems (ICOS), IEEE (2011)

    Google Scholar 

  10. Babu, K.R., Dr. ValayaKumar, S., Dr. Babu, A.V., Dr. Reddy, M.T.: An enhanced cryptographic substitution method for information security. Int. J. Math. Arch. 2(10) (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. Janaki .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer Science+Business Media Singapore

About this paper

Cite this paper

Janaki, M., Ganaga Durga, M. (2016). Enhancing Cloud Security Using VIJANA Cloud Data Jacket Protocol. In: Shetty, N., Prasad, N., Nalini, N. (eds) Emerging Research in Computing, Information, Communication and Applications . Springer, Singapore. https://doi.org/10.1007/978-981-10-0287-8_35

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-0287-8_35

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-0286-1

  • Online ISBN: 978-981-10-0287-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics