Skip to main content

An Encrypted Data-Transportation Method for Distributed System

  • Conference paper
  • 1129 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 6987))

Abstract

To improve the data security level of the distributed simulation system, propose an encrypted transportation method based on Chaos Theory. The method separates the data in simulation system into two categories, the simulating data and the file data. The simulating data are encrypted real time by the direct Logistic-based encryption algorithm, while the file data are encrypted by the mixed logistic encryption algorithm. The method can provide the high security level for the distributed simulation system. The Chaos Key in these algorithms is generated by Logistic mapping. The Key is updated automatically via Chaos iteration during simulation advanced. The synchronization of the encrypted key is achieved via the system time synchronization and the same initial Chaos conditions. This encrypted method has its utility value and been proved feasible and efficient.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Fujimoto, R.M.: Parallel simulation: parallel and distributed simulation systems. In: Proceedings of the 33nd Conference on Winter Simulation, Arlington, Virginia, pp. 147–157 (2001)

    Google Scholar 

  2. Goldwasser, S., Micali, S.: Probabilistic encryption. Journal of Computer and System Sciences 28, 270–299 (1989)

    Article  MathSciNet  MATH  Google Scholar 

  3. Bellare, M., Boldyreva, A., Micali, S.: Public-key encryption in a multi-user setting: Security proofs and improvements. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 259–274. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  4. Aspinall, D.: Symmetric Ciphers, School of Informatics, University of Edinburgh (2003), http://www.informatics.ed.ac.uk/teaching/modules/cs

  5. Gutmann, P.: Encryption and Security Tutorial, University of Auckland, http://www.cs.auckland.ac.nz/~pgut001

  6. Gleick, J.: Chaos. Making a new science. Viking Penguin Inc., New York (1987) ISBN: 9781400925018

    MATH  Google Scholar 

  7. Strogatz, S.H.: Nonlinear Dynamics and Chaos. Addison-Wesley, Reading (1994)

    Google Scholar 

  8. Song, W., Meng, J.: Research on Logistic Mapping and Synchronization. In: Preceeding of Sixth World Congress on Intelligent Control and Automation (WCICA 2006), vol. 3, pp. 987–991 (2006)

    Google Scholar 

  9. Li, H.-D., Feng, D.-G.: Composite Nonlinare Discrete Chaotic Dynamical Systems and Keyed Hash Functions. Chinese Journal of Computers, 460–464 (2003)

    Google Scholar 

  10. Jakimoski, G., Kocarev, L.: Chaos and cryptography: Block encryption ciphers based on chaotic maps. IEEE Transactions on Circuits and Systems-I:Fundamental Theory and Applications (February 2001)

    Google Scholar 

  11. Dahmann, J.S., Morse, K.L.: Sci. Applications Int. Corp., High Level Architecture for simulation. In: Proceedings 2nd International Workshop on Montreal, Distributed Interactive Simulation and Real-Time Applications, Que, Canada, pp. 32–40 (1998)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chen, H., Chen, Y., Cao, J., Sun, Y. (2011). An Encrypted Data-Transportation Method for Distributed System. In: Gong, Z., Luo, X., Chen, J., Lei, J., Wang, F.L. (eds) Web Information Systems and Mining. WISM 2011. Lecture Notes in Computer Science, vol 6987. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23971-7_49

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-23971-7_49

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-23970-0

  • Online ISBN: 978-3-642-23971-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics