LBCLCT: Location Based Cross Language Cipher Technique

Encryption is a cryptographic technique to secure information that is being transmitted over the network. In the present era, most of the applications hosted on cloud are affected by enumerable number of threats. Any web application hosted on cloud has several challenges for data privacy and security. In this work, a mobile bill payment application has been designed and developed in Java programming language for the purpose of secure bill payment over the cloud. Google Cloud Platform, Google App Engine, is used for the deployment of mobile bill payment application. The proposed system encapsulates two phases: In the first phase, affine cipher encryption technique is used to encrypt the original information. Affine cipher technique is improved using dynamic key, which encapsulates geographic coordinates of the user and its results are compared with rail fence cipher technique. In the second phase, generated cipher text has been further translated into two Indian languages: character by character. The result of two-phase encryption makes the original data stronger and secure.

[1]  Rini Marwati,et al.  APLIKASI KRIPTOGRAFI KOMPOSISI ONE TIME PAD CIPHER DAN AFFINE CIPHER , 2017 .

[2]  Parul Agarwal,et al.  Secure keyword search using dual encryption in cloud computing , 2020 .

[3]  Yashpalsingh Rajput,et al.  An Improved Cryptographic Technique to Encrypt Text using Double Encryption , 2014 .

[4]  Rahul Johari,et al.  Triplicative Cipher Technique , 2016 .

[5]  Christopher Brown Guest Editorial Special Issue: High-Level Programming for Heterogeneous Parallel Systems , 2018, International Journal of Parallel Programming.

[6]  Song Han,et al.  New proxy signatures with message recovery using pairing , 2006 .

[7]  Salimur Choudhury,et al.  Dominating Set Algorithms for Wireless Sensor Networks Survivability , 2018, IEEE Access.

[8]  Satish V. Ukkusuri,et al.  Urban activity pattern classification using topic models from online geo-location data , 2014 .

[9]  Sara Makki,et al.  Fraud Data Analytics Tools and Techniques in Big Data Era , 2017, 2017 International Conference on Cloud and Autonomic Computing (ICCAC).

[10]  Rahul Johari,et al.  CLCT: Cross Language Cipher Technique , 2015, SSCC.

[11]  Yonghuai Liu,et al.  Human consistency evaluation of static video summaries , 2018, Multimedia Tools and Applications.

[12]  Fadi Al-Turjman,et al.  Confidential smart-sensing framework in the IoT era , 2018, The Journal of Supercomputing.

[13]  Ali Khajeh-Hosseini,et al.  Research Agenda in Cloud Technologies , 2010, ArXiv.

[14]  Fadi Al-Turjman,et al.  5G/IoT-enabled UAVs for multimedia delivery in industry-oriented applications , 2018, Multimedia Tools and Applications.

[15]  Yong Wu Improvement Research Based on Affine Encryption Algorithm , 2015, 2015 14th International Symposium on Distributed Computing and Applications for Business Engineering and Science (DCABES).

[16]  Rahul Johari,et al.  SOAiCE: Simulation of Attacks in Cloud Computing Environment , 2018, 2018 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence).

[17]  Arun Kumar Yadav,et al.  Global host allocation policy for virtual machine in cloud computing , 2018 .

[18]  Rahul Johari,et al.  C3T: Cloud based Cyclic Cryptographic Technique and it’s comparative analysis with classical cipher techniques , 2018, 2018 5th International Conference on Signal Processing and Integrated Networks (SPIN).

[19]  Rahul Johari,et al.  SCLCT: Secured cross language cipher technique , 2017, 2017 International Conference on Computing, Communication and Automation (ICCCA).

[20]  Ashraf Zia,et al.  Identifying Key Challenges in Performance Issues in Cloud Computing , 2012 .

[21]  Umesh Singh,et al.  Security Testing and Assessment of Vulnerability Scanners in Quest of Current Information Security Landscape , 2016 .

[22]  Ajit Singh,et al.  Security concerns and countermeasures in cloud computing: a qualitative analysis , 2019 .

[23]  Sinem Alturjman,et al.  Context-Sensitive Access in Industrial Internet of Things (IIoT) Healthcare Applications , 2018, IEEE Transactions on Industrial Informatics.

[24]  Fadi Al-Turjman,et al.  Task scheduling in cloud‐based survivability applications using swarm optimization in IoT , 2018, Trans. Emerg. Telecommun. Technol..

[25]  Fadi Al-Turjman,et al.  A Novel Security Model for Cooperative Virtual Networks in the IoT Era , 2018, International Journal of Parallel Programming.

[26]  Seyed A Shahrestani,et al.  Cloud Computing: Security and Reliability Issues , 2013 .