Network Security Approaches in Distributed Environment

Distributed computing is one of the thrust areas in the field of computer science, but when we are concerned about security a question arises, “Can it be secure?” From this note, the authors start this chapter. In the distributed environment, when the system is connected to a network, and the operating system firewall is active, it will take care of all the authentication and access control requests. There are several traditional cryptographic approaches which implement authentication and access control. The encryption algorithms such as Rijndael, RSA, A3, and A5 is used for providing data secrecy. Some of the key distribution techniques have been discussed such as Diffie Hellman key exchange for symmetric key, and random key generation (LCG) technique is used in red-black tree traversal which provides the security of the digital contents. The chapter deals with the advanced versions of the network security techniques and cryptographic algorithms for the security of multimedia contents over the internet. Network Security Approaches in Distributed Environment

[1]  G. A. Spanos,et al.  Security for real-time MPEG compressed video in distributed multimedia applications , 1996, Conference Proceedings of the 1996 IEEE Fifteenth Annual International Phoenix Conference on Computers and Communications.

[2]  Zhiyong Zhang,et al.  Digital Rights Management Ecosystem and its Usage Controls: A Survey , 2011 .

[3]  Asaduzzaman,et al.  Short paper: enhancing Wi-Fi security using a hybrid algorithm of blowfish and RC6 , 2016, 2016 International Conference on Networking Systems and Security (NSysS).

[4]  Arpita Gupta,et al.  Security Enhancement in GSM using A3 algorithm , 2014 .

[5]  Andrés Marín López,et al.  Media cloud: an open cloud computing middleware for content management , 2011, IEEE Transactions on Consumer Electronics.

[6]  Iskender Agi,et al.  An empirical study of secure MPEG video transmissions , 1996, Proceedings of Internet Society Symposium on Network and Distributed Systems Security.

[7]  Xinsheng Ji,et al.  A Transmission Scheme for Encrypted Speech over GSM Network , 2008, 2008 International Symposium on Computer Science and Computational Technology.

[8]  Zhiyong Zhang Security, trust and risk in Digital Rights Management ecosystem , 2010, 2010 International Conference on High Performance Computing & Simulation.

[9]  Ming Li,et al.  Cryptanalysis and Improvement of a Chaotic Image Encryption by First-Order Time-Delay System , 2018, IEEE MultiMedia.

[10]  Chong Luo,et al.  Multimedia Cloud Computing , 2011, IEEE Signal Processing Magazine.

[11]  L. Kocarev,et al.  Chaos and cryptography: block encryption ciphers based on chaotic maps , 2001 .

[12]  P. Chumchu,et al.  A simple and cheap end-to-end voice encryption framework over GSM-based networks , 2012, 2012 Computing, Communications and Applications Conference.

[13]  K.M.S. Soyjaudah,et al.  Design and implementation of Rijndael algorithm for GSM encryption , 2004, SympoTIC '04. Joint 1st Workshop on Mobile Future & Symposium on Trends In Communications (IEEE Cat. No.04EX877).

[14]  Zahir Zainuddin,et al.  E-lerning concept design of rijndael encryption process , 2013, Proceedings of 2013 IEEE International Conference on Teaching, Assessment and Learning for Engineering (TALE).

[15]  Sudip Kumar Sahana,et al.  A Novel Multimedia Encryption and Decryption Technique Using Binary Tree Traversal , 2018, Lecture Notes in Electrical Engineering.

[16]  Dan Ionescu,et al.  A Collaborative Cloud-Based Multimedia Sharing Platform for Social Networking Environments , 2011, 2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN).

[17]  Harsh K. Verma,et al.  Performance Analysis of RC6, Twofish and Rijndael Block Cipher Algorithms , 2012 .

[18]  S. Goswami,et al.  Enhancement of GSM Security Using Elliptic Curve Cryptography Algorithm , 2012, 2012 Third International Conference on Intelligent Systems Modelling and Simulation.

[19]  Aruna Chouhan,et al.  Real time secure end to end communication over GSM network , 2015, 2015 International Conference on Energy Systems and Applications.