Performance Evalution of CSTA Based Effective Transpiration in Data Hiding


(*) Corresponding author


Authors' affiliations


DOI's assignment:
the author of the article can submit here a request for assignment of a DOI number to this resource!
Cost of the service: euros 10,00 (for a DOI)

Abstract


Cryptography is effectively synonymous with the technique of encryption and also legally prioritized for secure communication. The cyclic shift transposition algorithm (CSTA) is utilized to disguise the information and transmit message from one linear end to another in the environment of grid. Grid is a unique computational approach which mainly focuses on illuminating the précised problem in the heterogeneous environment by favoring the obligations of the users.
The security issue is a captious area in grid computing. In the proposed work, the cyclic shift transposition algorithm (CSTA) is formulated by java and it is integrated with grid-sim. In CSTA, proportionate statistic of rows and columns are considered. The two main techniques such as encryption and decryption are involved above.In the course time of encryption process, the encrypted message is transpired through the image and contributes massed security, and then it is decrypted using the same manner. Correlating to other security algorithms, the proposed CSTA algorithm is adequate, decisively enhances security and provides exceeding performance than other algorithms.


Copyright © 2013 Praise Worthy Prize - All rights reserved.

Keywords


Grid Security; Encryption; Decryption; CSTA Model; Data Hiding

Full Text:

PDF


References


Armin Bahramshahry, HesamGhasemi, AnishMitra, and VinayakMorada, (April 2007) “Design of a Data Hiding Application Using Steganography”,.

Rongxing Lu et all. (Sept. 2008), “A Simple User Authentication Scheme for Grid Computing” International Journal of Network Security, Vol.7, No.2, PP.202–206.

A. Naresh Reddy, M.Tech Scholar, Sri Vasavi Engineering College, (August 2012) “Analysis and Performance Characteristics of Cryptosystem using Image Files”.

Manish Mehta,”Authentication services in Open Grid Services”,( May 7, 2004), Manish Mehta, University of Missouri – Kansas City, USA.

Chong-Yen Lee et all. 2009, “Secure Site Authentication and Message Transmission Based on Grid Environment”, Fifth International Joint Conference on INC, IMS and IDC.

Sasirekha, N., Hemalatha, M., Novel secure code encryption techniques using crypto based indexed table for highly secured software, (2013) International Review on Computers and Software (IRECOS), 8 (8), pp. 1980-1990.

Jingshu Chen1 et all,” The Authentication Technologies in the Grid Computing Environment”, Computer Network Information Center, Chinese Academy of Sciences, Beijing 100080, China.

Manish Metha,, May 2004,“Authentication Services in Open Grid Services” Research Project Report.

Xing guowen et all.,”Research of Grid Security Authentication Model Subtitle as needed” International Conference on Computer Application and System Modeling (lCCASM 2010) Vol.1,Page No. 78 -80.

Jan Wiebelitz,”TCP-AuthN: TCP Inline Authentication to Enhance Network Security in Grid Environments”,Eighth International Symposium on Parallel and Distributed Computing.

Spillman, R.J.”Classical and Contemporary Cryptology. Upper Saddle River, NJ: Pearson Prentice-Hall.

Balaji.R, Roopak .V, “Dynamic Password Authentication and Security System using Grid Analysis”, IEEE Commun. Surveys & Tutorials, vol.PP, no.99, pp.1-24, 2010.

Jingshu Chen, Hong Wu, Qingyang Wang, Qingguan Wang, Xuebin Chi, “A Reflective Framework for Authentication in Grid Computing Environments”, IEEE Transactions on grid.,vol 20, no 5, pp 324-335, May 2008.

Dr. V.Kavitha et all. “ESAC Based Channel Aware Routing Using Route Handoff” International Journal on Computer Science and Engineering (IJCSE) in Vol.3. No.3 March 2011,Page No.1260-1269.


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize