Skip to main content

Adaptive Encryption Technique for Collaborative Cloud Environments

  • Chapter
  • First Online:
Internet of Things and Analytics for Agriculture, Volume 2

Part of the book series: Studies in Big Data ((SBD,volume 67))

  • 765 Accesses

Abstract

In recent times, the data storage in collaborative cloud environment has distorted a lot when compared with prior times. Security flattering is one of the major imperative challenges in database storage and classification. Data stored in databases are susceptible and thus focusing the safety only on the susceptible data that minimizes the delays or troubles in the classification. This paper describes an extremely innovative and novel methodology for securing numeric data in databases. It presents a realistic solution to the problem where numeric data are transformed into alphanumeric types and hence there is minimal probability of storing encrypted data in the existing numeric field. The proposed algorithm allows translucent verification intensity encryption that does not modify the data field category or the fixed time span.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Maurer, U.: The role of cryptography in database security. In: ACM SIGMOD (2004)

    Google Scholar 

  2. Agrawal, R., Kiernan, J., Srikanth, R., Xu, Y.: Order preserving encryption for numeric data. IBM Almandan Research Center

    Google Scholar 

  3. Harold Robinson, Y., Rajaram, M.: Trustworthy link failure recovery algorithm for highly dynamic mobile adhoc networks. World Acad. Sci. Eng. Technol. Int. J. Electr. Comput. Energ. Electron. Commun. Eng. 9(2), 233–236 (2015)

    Google Scholar 

  4. Arshad, N.H.: The design and implementation of database encryption (2007)

    Google Scholar 

  5. Yang, Z., Sesay, S., Chen, J., Xu, D.: A secure database encryption scheme (2004)

    Google Scholar 

  6. Robinson, Y.H., Rajaram, M.: A memory aided broadcast mechanism with fuzzy classification on a device-to-device mobile Ad Hoc network. Wirel. Pers. Commun. 1–23 (2016). https://doi.org/10.1007/s11277-016-3213-0

  7. Perkins, C.E., Royer, E.M.: Ad-Hoc On-Demand distance vector routing. In: Proceedings WMCSA’99 Second IEEE Workshop Mobile Computing Systems and Applications, pp. 90–100 (1999)

    Google Scholar 

  8. Setton, E., Yoo, T., Zhu, X., Goldsmith, A., Girod, B.: Crosslayer design of ad hoc networks for real-time video streaming. IEEE Wirel. Comm. 12(4), 59–65 (2005)

    Article  Google Scholar 

  9. Robinson, Y.H., Rajaram, M.: Energy-aware multipath routing scheme based on particle swarm optimization in mobile ad hoc networks. Sci. World J. 1–9 (2015). https://doi.org/10.1155/2015/284276

  10. Stallings, W.: Cryptography and network security: principles and practice, 2nd edn

    Google Scholar 

  11. Lin, C.R., Gerla, M.: Asynchronous multimedia multihop wireless networks. Proc. IEEE Infocom 1, 118–125 (1997)

    Article  Google Scholar 

  12. Biswas, S., Morris, R.: Opportunistic routing in multi-hop wireless networks. ACM SIGCOMM Comput. Commun. Rev. 34(1), 69–74 (2004)

    Article  Google Scholar 

  13. Rozner, E., Seshadri, J., Mehta, Y., Qiu, L.: Soar: simple opportunistic adaptive routing protocol for wireless mesh networks. MobileComput. IEEE Trans. on 8(12), 1622–1635 (2009)

    Google Scholar 

  14. Kaur, K., Dhindsa, K.S., Singh, G.: Numeric to numeric encryption of databases: using 3Kdec algorithm. In: IEEE International Conference IACC 2009, pp. 1501–1505 (2009)

    Google Scholar 

  15. Harold Robinson, Y., Rajaram, M.: Establishing pairwise keys using key predistribution schemes for sensor networks. World Acad. Sci. Eng. Technol. Int. J. Comput. Electr. Autom. Control Info. Eng. 9(2), 608–612 (2015)

    Google Scholar 

  16. Balaji, S., Robinson, Y.H., Rajaram, M.: SCSBE: secured cluster and sleep based energy-efficient sensory data collection with mobile sinks. Circ. Syst. 7, 1992–2001 (2016). https://doi.org/10.4236/cs.2016.78173

    Article  Google Scholar 

  17. Chang, C., Chan, C.W.: A database record encryption scheme using RSA public key cryptosystem and its master keys. In: The International Conference on Computer networks and Mobile Computing (ICCNMC), pp. 312–315 (2013)

    Google Scholar 

  18. Robinson, Y.H., Balaji, S., Rajaram, M.: ECBK: enhanced cluster based key management scheme for achieving quality of service. Circ. Syst. 7, 2014–2024 (2016). https://doi.org/10.4236/cs.2016.78175

    Article  Google Scholar 

  19. Li, Y., Chen, W., Zhang, Z.L.: Optimal forwarder list selection in opportunistic routing. In: 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems MASS’09, pp. 670–675. IEEE (2009)

    Google Scholar 

  20. Füßler, H., Widmer, J., Käsemann, M., Mauve, M., Hartenstein, H.: Contention-based forwarding for mobile ad hoc networks. Ad Hoc Netw. 1(4), 351–369 (2003)

    Article  Google Scholar 

  21. Yang, S., Zhong, F., Yeo, C.K., Lee, B.S., Boleng, J.: Position based opportunistic routing for robust data delivery in MANETs. In: GLOBECOM 2009-2009 IEEE Global Telecommunications Conference, pp 1–6. IEEE (2009)

    Google Scholar 

  22. Harold Robinson, Y., Rajaram, M., Golden Julie, E., Balaji, S.: Dominating set algorithm and trust evaluation scheme for secured cluster formation and data transferring. World Acad. Sci. Eng. Technol. Int. J. Comput. Electr. Autom. Control Info. Eng. 10, 388–393 (2016)

    Google Scholar 

  23. Darehshoorzadeh, A., Cerda-Alabern, L. Distance progress based opportunistic routing for wireless mesh networks. In: 2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC), pp. 179–184. IEEE (2012)

    Google Scholar 

  24. Gupta, S., Dhurandher, S.K., Woungang, I., Kumar, A., Obaidat, M.S.: Trust-based security protocol against blackhole attacks in opportunistic networks. In: 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp. 724–729. IEEE (2013)

    Google Scholar 

  25. Harold Robinson, Y., Rajaram, M., Golden Julie, E., Balaji, S.: Tree based data fusion clustering routing algorithm for illimitable network administration in wireless sensor network. World Acad. Sci. Eng. Technol. Int. J. Comput. Electr. Autom. Control Inf. Eng. 10(6), 1123–1130 (2016)

    Google Scholar 

  26. Mahmoud, M.M., Lin, X., Shen, X., et al.: Secure and reliable routing protocols for heterogeneous multihop wireless networks. IEEE Trans. Parallel Distrib. Syst. 26(4), 1140–1153 (2015)

    Article  Google Scholar 

  27. Robinson, Y.H., Rajaram, M., Julie, E.G., Balaji, S.: TBOR: tree based opportunistic routing for mobile Ad Hoc networks. world Acad. Sci. Eng. Technol. Int. J. Comput. Electr. Autom. Control Inf. Eng. 10(6), 1115–1122 (2016)

    Google Scholar 

  28. Cho, J.-H., Swami, A., Chen, R.: A survey on trust management for mobile ad hoc networks. Commun. Surv. Tutorials IEEE 13(4), 562–583 (2011)

    Article  Google Scholar 

  29. Yu, H., Shen, Z., Miao, C., Leung, C., Niyato, D.: A survey of trust and reputation management systems in wireless communications. Proc. IEEE 98(10), 1755–1772 (2010)

    Article  Google Scholar 

  30. Michiardi, P., Molva, R.: Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Advanced Communications and Multimedia Security, pp. 107–121. Springer (2002)

    Google Scholar 

  31. Ramalakshmi, S., Robinson, Y.H.: ATMPH: Attaining optimal throughput capacity of MANET with power control in heterogeneous network. Program. Device Circ. Syst. 6(4), 111–115 (2014)

    Google Scholar 

  32. Ayyasamy, A., Venkatachalapathy, K.: Context aware adaptive service based dynamic channel allocation approach for providing an optimal QoS over MANET. Int. J. Eng. Technol. (IJET). 6(3), 1465–1479 (2014). ISSN: 0975-4024

    Google Scholar 

  33. Harold Robinson, Y., Rajaram, M.: A novel approach to allocate channels dynamically in wireless mesh networks. World Acad. Sci. Eng. Technol. Int. J. Comput. Electr. Autom. Control Inf. Eng. 8(10), 1865–1868 (2014)

    Google Scholar 

  34. Han, G., Jiang, J., Shu, L., Niu, J., Chao, H.-C.: Management and applications of trust in wireless sensor networks: a survey. J. Comput. Syst. Sci. 80(3), 602–617 (2014)

    Article  Google Scholar 

  35. Robinson, Y.H., Rajeswari, S.R.: Energy-based dynamic encryption for wireless sensor networks. Wirel. Commun. 3(9), 661–663 (2011)

    Google Scholar 

  36. Buchegger, S., Le Boudec, J.Y.: Performance analysis of the confidant protocol. In: Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing, pp. 226–236. ACM (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Y. Harold Robinson .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Harold Robinson, Y., Golden Julie, E., Vegi Fernando, A. (2020). Adaptive Encryption Technique for Collaborative Cloud Environments. In: Pattnaik, P., Kumar, R., Pal, S. (eds) Internet of Things and Analytics for Agriculture, Volume 2. Studies in Big Data, vol 67. Springer, Singapore. https://doi.org/10.1007/978-981-15-0663-5_5

Download citation

Publish with us

Policies and ethics