GraphCrypto: Next generation data security approach towards sustainable smart city building

Abstract Data confidentiality and integrity are essential security goals in the data communication in the smart city or similar applications. Despite significant changes in modern data communication systems and devices, the cryptosystems are still the primary option to achieve data security. Several cryptosystems have been developed, implemented and standardized to date. However, there is always a continuous demand for a new cryptosystem for providing security during data communication. In this paper, a novel symmetric cryptosystem is presented for achieving data confidentiality. The proposed cryptosystem is a graph-based system, where an algebraic structure of directed graphs along with a novel operation is defined to provide the base of the cryptosystem. Here, a directed graph represents a plaintext, a ciphertext, and a secret key as well. The defined operation is used for encrypting and decrypting plaintext and ciphertext graphs. The proposed cryptosystem provides a simplified transformation process and representation of plaintext to plaintext graph. The correctness of the proposed cryptosystem is validated, and also shown that the conventional brute-force approach to obtain the key from either plaintext or ciphertext is exponential and this computational time is significantly higher than AES. This implies that the proposed cryptosystem is highly secured against this attack. The proposed cryptosystem is implemented and compared with AES and the results infer that it incurs a marginally higher execution time than the AES for larger plaintext due to the involvement of matrix operations.

[1]  Simon Heron,et al.  Encryption: Advanced Encryption Standard (AES) , 2009 .

[2]  Vasiliy A. Ustimenko,et al.  Graphs with Special Arcs and Cryptography , 2002 .

[3]  Alireza Sharifi,et al.  Improved Related-Key Boomerang Cryptanalysis of AES-256 , 2010, 2010 International Conference on Information Science and Applications.

[4]  Eric Totel,et al.  STARLORD: Linked security data exploration in a 3D graph , 2017, 2017 IEEE Symposium on Visualization for Cyber Security (VizSec).

[5]  Graham Morgan,et al.  Fog Computing Security Challenges and Future Directions [Energy and Security] , 2019, IEEE Consumer Electronics Magazine.

[6]  Yaser Jararweh,et al.  Trustworthy and sustainable smart city services at the edge , 2020 .

[7]  Albert Y. Zomaya,et al.  Ubiquitous Localization (UbiLoc): A Survey and Taxonomy on Device Free Localization for Smart World , 2019, IEEE Communications Surveys & Tutorials.

[8]  Ho Yean Li,et al.  Heuristic cryptanalysis of classical and modern ciphers , 2015, 2005 13th IEEE International Conference on Networks Jointly held with the 2005 IEEE 7th Malaysia International Conf on Communic.

[9]  C. Prissette Weak keys of graph cryptography , 2004, Proceedings. 2004 International Conference on Information and Communication Technologies: From Theory to Applications, 2004..

[10]  Shahid Mumtaz,et al.  IoT Enabled Quality of Experience Measurement for Next Generation Networks in Smart Cities , 2020 .

[11]  Bhagya Nathali Silva,et al.  Towards sustainable smart cities: A review of trends, architectures, components, and open challenges in smart cities , 2018 .

[12]  Mohd Aizaini Maarof,et al.  A survey on the cryptanalysis of the advanced encryption standard , 2006 .

[13]  Sagar Sharma,et al.  PrivateGraph: A Cloud-Centric System for Spectral Analysis of Large Encrypted Graphs , 2017, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).

[14]  P. L. K. Priyadarsini,et al.  Ciphers based on special graphs , 2013, 2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[15]  Deepak Puthal,et al.  Personal Internet of Things (PIoT): What Is It Exactly? , 2021, IEEE Consumer Electronics Magazine.

[16]  Vasyl Ustimenko,et al.  On the implementation of public keys algorithms based on algebraic graphs over finite commutative rings , 2010, Proceedings of the International Multiconference on Computer Science and Information Technology.

[17]  Saurabh Singh,et al.  Convergence of blockchain and artificial intelligence in IoT network for the sustainable smart city , 2020, Sustainable Cities and Society.

[18]  T YangLaurence,et al.  A User-centric Security Solution for Internet of Things and Edge Convergence , 2020 .

[19]  Paulo S. L. M. Barreto,et al.  Faster Key Compression for Isogeny-Based Cryptosystems , 2019, IEEE Transactions on Computers.

[20]  Simon Josefsson,et al.  Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS) Versions 1.2 and Earlier , 2018, RFC.

[21]  Kristin E. Lauter,et al.  Postquantum Opportunities: Lattices, Homomorphic Encryption, and Supersingular Isogeny Graphs , 2017, IEEE Security & Privacy.

[22]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[23]  Deepak Puthal,et al.  Collaborative Edge Computing for Smart Villages [Energy and Security] , 2021, IEEE Consumer Electronics Magazine.

[24]  P. L. K. Priyadarsini A Survey on some Applications of Graph Theory in Cryptography , 2015 .

[25]  Ben Bradford,et al.  Security and the smart city: A systematic review , 2020 .

[26]  Xi Chen,et al.  Quantum computing cryptography: Finding cryptographic Boolean functions with quantum annealing by a 2000 qubit D-wave quantum computer. , 2020 .

[27]  Jörn Müller-Quade,et al.  Symmetric searchable encryption for exact pattern matching using directed Acyclic Word Graphs , 2013, 2013 International Conference on Security and Cryptography (SECRYPT).

[28]  Sean Turner,et al.  Use of Elliptic Curve Cryptography (ECC) Algorithms in Cryptographic Message Syntax (CMS) , 2010, RFC.

[29]  Albert Y. Zomaya,et al.  Secure and Sustainable Load Balancing of Edge Data Centers in Fog Computing , 2018, IEEE Communications Magazine.

[30]  Chin-Teng Lin,et al.  Edge of Things: The Big Picture on the Integration of Edge, IoT and the Cloud in a Distributed Computing Environment , 2018, IEEE Access.

[31]  Mohammad S. Obaidat,et al.  Graph-Based Symmetric Crypto-System for Data Confidentiality , 2018, 2018 IEEE Global Communications Conference (GLOBECOM).