Abstract
In recent times, the data storage in collaborative cloud environment has distorted a lot when compared with prior times. Security flattering is one of the major imperative challenges in database storage and classification. Data stored in databases are susceptible and thus focusing the safety only on the susceptible data that minimizes the delays or troubles in the classification. This paper describes an extremely innovative and novel methodology for securing numeric data in databases. It presents a realistic solution to the problem where numeric data are transformed into alphanumeric types and hence there is minimal probability of storing encrypted data in the existing numeric field. The proposed algorithm allows translucent verification intensity encryption that does not modify the data field category or the fixed time span.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Maurer, U.: The role of cryptography in database security. In: ACM SIGMOD (2004)
Agrawal, R., Kiernan, J., Srikanth, R., Xu, Y.: Order preserving encryption for numeric data. IBM Almandan Research Center
Harold Robinson, Y., Rajaram, M.: Trustworthy link failure recovery algorithm for highly dynamic mobile adhoc networks. World Acad. Sci. Eng. Technol. Int. J. Electr. Comput. Energ. Electron. Commun. Eng. 9(2), 233–236 (2015)
Arshad, N.H.: The design and implementation of database encryption (2007)
Yang, Z., Sesay, S., Chen, J., Xu, D.: A secure database encryption scheme (2004)
Robinson, Y.H., Rajaram, M.: A memory aided broadcast mechanism with fuzzy classification on a device-to-device mobile Ad Hoc network. Wirel. Pers. Commun. 1–23 (2016). https://doi.org/10.1007/s11277-016-3213-0
Perkins, C.E., Royer, E.M.: Ad-Hoc On-Demand distance vector routing. In: Proceedings WMCSA’99 Second IEEE Workshop Mobile Computing Systems and Applications, pp. 90–100 (1999)
Setton, E., Yoo, T., Zhu, X., Goldsmith, A., Girod, B.: Crosslayer design of ad hoc networks for real-time video streaming. IEEE Wirel. Comm. 12(4), 59–65 (2005)
Robinson, Y.H., Rajaram, M.: Energy-aware multipath routing scheme based on particle swarm optimization in mobile ad hoc networks. Sci. World J. 1–9 (2015). https://doi.org/10.1155/2015/284276
Stallings, W.: Cryptography and network security: principles and practice, 2nd edn
Lin, C.R., Gerla, M.: Asynchronous multimedia multihop wireless networks. Proc. IEEE Infocom 1, 118–125 (1997)
Biswas, S., Morris, R.: Opportunistic routing in multi-hop wireless networks. ACM SIGCOMM Comput. Commun. Rev. 34(1), 69–74 (2004)
Rozner, E., Seshadri, J., Mehta, Y., Qiu, L.: Soar: simple opportunistic adaptive routing protocol for wireless mesh networks. MobileComput. IEEE Trans. on 8(12), 1622–1635 (2009)
Kaur, K., Dhindsa, K.S., Singh, G.: Numeric to numeric encryption of databases: using 3Kdec algorithm. In: IEEE International Conference IACC 2009, pp. 1501–1505 (2009)
Harold Robinson, Y., Rajaram, M.: Establishing pairwise keys using key predistribution schemes for sensor networks. World Acad. Sci. Eng. Technol. Int. J. Comput. Electr. Autom. Control Info. Eng. 9(2), 608–612 (2015)
Balaji, S., Robinson, Y.H., Rajaram, M.: SCSBE: secured cluster and sleep based energy-efficient sensory data collection with mobile sinks. Circ. Syst. 7, 1992–2001 (2016). https://doi.org/10.4236/cs.2016.78173
Chang, C., Chan, C.W.: A database record encryption scheme using RSA public key cryptosystem and its master keys. In: The International Conference on Computer networks and Mobile Computing (ICCNMC), pp. 312–315 (2013)
Robinson, Y.H., Balaji, S., Rajaram, M.: ECBK: enhanced cluster based key management scheme for achieving quality of service. Circ. Syst. 7, 2014–2024 (2016). https://doi.org/10.4236/cs.2016.78175
Li, Y., Chen, W., Zhang, Z.L.: Optimal forwarder list selection in opportunistic routing. In: 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems MASS’09, pp. 670–675. IEEE (2009)
Füßler, H., Widmer, J., Käsemann, M., Mauve, M., Hartenstein, H.: Contention-based forwarding for mobile ad hoc networks. Ad Hoc Netw. 1(4), 351–369 (2003)
Yang, S., Zhong, F., Yeo, C.K., Lee, B.S., Boleng, J.: Position based opportunistic routing for robust data delivery in MANETs. In: GLOBECOM 2009-2009 IEEE Global Telecommunications Conference, pp 1–6. IEEE (2009)
Harold Robinson, Y., Rajaram, M., Golden Julie, E., Balaji, S.: Dominating set algorithm and trust evaluation scheme for secured cluster formation and data transferring. World Acad. Sci. Eng. Technol. Int. J. Comput. Electr. Autom. Control Info. Eng. 10, 388–393 (2016)
Darehshoorzadeh, A., Cerda-Alabern, L. Distance progress based opportunistic routing for wireless mesh networks. In: 2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC), pp. 179–184. IEEE (2012)
Gupta, S., Dhurandher, S.K., Woungang, I., Kumar, A., Obaidat, M.S.: Trust-based security protocol against blackhole attacks in opportunistic networks. In: 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp. 724–729. IEEE (2013)
Harold Robinson, Y., Rajaram, M., Golden Julie, E., Balaji, S.: Tree based data fusion clustering routing algorithm for illimitable network administration in wireless sensor network. World Acad. Sci. Eng. Technol. Int. J. Comput. Electr. Autom. Control Inf. Eng. 10(6), 1123–1130 (2016)
Mahmoud, M.M., Lin, X., Shen, X., et al.: Secure and reliable routing protocols for heterogeneous multihop wireless networks. IEEE Trans. Parallel Distrib. Syst. 26(4), 1140–1153 (2015)
Robinson, Y.H., Rajaram, M., Julie, E.G., Balaji, S.: TBOR: tree based opportunistic routing for mobile Ad Hoc networks. world Acad. Sci. Eng. Technol. Int. J. Comput. Electr. Autom. Control Inf. Eng. 10(6), 1115–1122 (2016)
Cho, J.-H., Swami, A., Chen, R.: A survey on trust management for mobile ad hoc networks. Commun. Surv. Tutorials IEEE 13(4), 562–583 (2011)
Yu, H., Shen, Z., Miao, C., Leung, C., Niyato, D.: A survey of trust and reputation management systems in wireless communications. Proc. IEEE 98(10), 1755–1772 (2010)
Michiardi, P., Molva, R.: Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Advanced Communications and Multimedia Security, pp. 107–121. Springer (2002)
Ramalakshmi, S., Robinson, Y.H.: ATMPH: Attaining optimal throughput capacity of MANET with power control in heterogeneous network. Program. Device Circ. Syst. 6(4), 111–115 (2014)
Ayyasamy, A., Venkatachalapathy, K.: Context aware adaptive service based dynamic channel allocation approach for providing an optimal QoS over MANET. Int. J. Eng. Technol. (IJET). 6(3), 1465–1479 (2014). ISSN: 0975-4024
Harold Robinson, Y., Rajaram, M.: A novel approach to allocate channels dynamically in wireless mesh networks. World Acad. Sci. Eng. Technol. Int. J. Comput. Electr. Autom. Control Inf. Eng. 8(10), 1865–1868 (2014)
Han, G., Jiang, J., Shu, L., Niu, J., Chao, H.-C.: Management and applications of trust in wireless sensor networks: a survey. J. Comput. Syst. Sci. 80(3), 602–617 (2014)
Robinson, Y.H., Rajeswari, S.R.: Energy-based dynamic encryption for wireless sensor networks. Wirel. Commun. 3(9), 661–663 (2011)
Buchegger, S., Le Boudec, J.Y.: Performance analysis of the confidant protocol. In: Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing, pp. 226–236. ACM (2002)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Harold Robinson, Y., Golden Julie, E., Vegi Fernando, A. (2020). Adaptive Encryption Technique for Collaborative Cloud Environments. In: Pattnaik, P., Kumar, R., Pal, S. (eds) Internet of Things and Analytics for Agriculture, Volume 2. Studies in Big Data, vol 67. Springer, Singapore. https://doi.org/10.1007/978-981-15-0663-5_5
Download citation
DOI: https://doi.org/10.1007/978-981-15-0663-5_5
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-0662-8
Online ISBN: 978-981-15-0663-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)