Skip to main content

Design and Implementation of a Dynamic Re-encryption System Based on the Priority Scheduling

  • Conference paper
  • First Online:
  • 1265 Accesses

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 450))

Abstract

In this paper, a dynamic re-encryption system is proposed that prevents data from being decrypted and minimizes damage even if the encryption key is exposed by changing the encryption key according to the schedule and re-encrypting the stored data. We show that the proposed dynamic re-encryption system can reduce the probability from 100 to 0% that the RSA-512 ciphertext and the RSA-768 ciphertext are decrypted by the mathematical attack method over a given period. The proposed system can reduce the re-encryption time by 70% by implementing parallel processing with dynamic multithreading that checks the CPU usage of the server and adjust the number of threads actively. And the system ensures system reliability by preventing overflow and system interruption from occurring while maintaining server utilization at an average of 78%.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Roberts, J.J.: How Biometrics are Worse than Passwords. Fortune, 12 May 2016. http://fortune.com/2016/05/12/biometrics-passwords/

  2. Shastri, A., Sharma, P.: Data vault: a security model for preventing data theft in corporate. In: ICTCS 2016, vol. 142. ACM (2016)

    Google Scholar 

  3. Botta, A., et al.: Integration of cloud computing and internet of things: a survey. Future Gener. Comput. Syst. 56, 684–700 (2016)

    Article  Google Scholar 

  4. Smith, A.D.: Maintaining secrecy when information leakage is unavoidable. Thesis of Ph.D. in Computer Science, MIT (2004)

    Google Scholar 

  5. Kohler, J., et al.: An approach for a security and privacy-aware cloud-based storage of data in the semantic web. In: ICCCI, pp. 241–247. IEEE (2016)

    Google Scholar 

  6. Shaikh, R., SasiKumar, M.: Data classification for achieving Security in cloud computing. Proc. Comput. Sci. 45(1), 493–498 (2015). Elesevier B.V.

    Article  Google Scholar 

  7. NIST, FIPS PUB. 197: Advanced Encryption Standard (AES), November 2001

    Google Scholar 

  8. Stallings, W.: Cryptography and Network Security, 6th edn. Pearson Education India, New Delhi (2013)

    Google Scholar 

  9. Galvin, P.B., Gagne, G., Silberschatz, A.: Operating System Concepts. Wiley, Westminster (2013)

    MATH  Google Scholar 

  10. Cavallar, S., et al.: Factorization of a 512-bit RSA modulus. In: Advances in Cryptology — EUROCRYPT 2000, pp. 1–18. Springer, Heidelberg (2000)

    Google Scholar 

  11. Kleinjung, T., et al.: Factorization of a 768-bit RSA modulus. In: Advances in Cryptology – CRYPTO 2010, pp. 333–350. Springer, Heidelberg (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kyu-Seek Sohn .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Yoon, D.G., Sohn, KS., Joe, I. (2018). Design and Implementation of a Dynamic Re-encryption System Based on the Priority Scheduling. In: Kim, K., Kim, H., Baek, N. (eds) IT Convergence and Security 2017. Lecture Notes in Electrical Engineering, vol 450. Springer, Singapore. https://doi.org/10.1007/978-981-10-6454-8_28

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-6454-8_28

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-6453-1

  • Online ISBN: 978-981-10-6454-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics