Abstract
In this paper, a dynamic re-encryption system is proposed that prevents data from being decrypted and minimizes damage even if the encryption key is exposed by changing the encryption key according to the schedule and re-encrypting the stored data. We show that the proposed dynamic re-encryption system can reduce the probability from 100 to 0% that the RSA-512 ciphertext and the RSA-768 ciphertext are decrypted by the mathematical attack method over a given period. The proposed system can reduce the re-encryption time by 70% by implementing parallel processing with dynamic multithreading that checks the CPU usage of the server and adjust the number of threads actively. And the system ensures system reliability by preventing overflow and system interruption from occurring while maintaining server utilization at an average of 78%.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Roberts, J.J.: How Biometrics are Worse than Passwords. Fortune, 12 May 2016. http://fortune.com/2016/05/12/biometrics-passwords/
Shastri, A., Sharma, P.: Data vault: a security model for preventing data theft in corporate. In: ICTCS 2016, vol. 142. ACM (2016)
Botta, A., et al.: Integration of cloud computing and internet of things: a survey. Future Gener. Comput. Syst. 56, 684–700 (2016)
Smith, A.D.: Maintaining secrecy when information leakage is unavoidable. Thesis of Ph.D. in Computer Science, MIT (2004)
Kohler, J., et al.: An approach for a security and privacy-aware cloud-based storage of data in the semantic web. In: ICCCI, pp. 241–247. IEEE (2016)
Shaikh, R., SasiKumar, M.: Data classification for achieving Security in cloud computing. Proc. Comput. Sci. 45(1), 493–498 (2015). Elesevier B.V.
NIST, FIPS PUB. 197: Advanced Encryption Standard (AES), November 2001
Stallings, W.: Cryptography and Network Security, 6th edn. Pearson Education India, New Delhi (2013)
Galvin, P.B., Gagne, G., Silberschatz, A.: Operating System Concepts. Wiley, Westminster (2013)
Cavallar, S., et al.: Factorization of a 512-bit RSA modulus. In: Advances in Cryptology — EUROCRYPT 2000, pp. 1–18. Springer, Heidelberg (2000)
Kleinjung, T., et al.: Factorization of a 768-bit RSA modulus. In: Advances in Cryptology – CRYPTO 2010, pp. 333–350. Springer, Heidelberg (2010)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Yoon, D.G., Sohn, KS., Joe, I. (2018). Design and Implementation of a Dynamic Re-encryption System Based on the Priority Scheduling. In: Kim, K., Kim, H., Baek, N. (eds) IT Convergence and Security 2017. Lecture Notes in Electrical Engineering, vol 450. Springer, Singapore. https://doi.org/10.1007/978-981-10-6454-8_28
Download citation
DOI: https://doi.org/10.1007/978-981-10-6454-8_28
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-6453-1
Online ISBN: 978-981-10-6454-8
eBook Packages: EngineeringEngineering (R0)