CFP last date
22 April 2024
Reseach Article

Grid based Approach for Data Confidentiality

by Sreelatha Malempati, Shashi Mogalla
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 25 - Number 9
Year of Publication: 2011
Authors: Sreelatha Malempati, Shashi Mogalla
10.5120/3063-4186

Sreelatha Malempati, Shashi Mogalla . Grid based Approach for Data Confidentiality. International Journal of Computer Applications. 25, 9 ( July 2011), 1-5. DOI=10.5120/3063-4186

@article{ 10.5120/3063-4186,
author = { Sreelatha Malempati, Shashi Mogalla },
title = { Grid based Approach for Data Confidentiality },
journal = { International Journal of Computer Applications },
issue_date = { July 2011 },
volume = { 25 },
number = { 9 },
month = { July },
year = { 2011 },
issn = { 0975-8887 },
pages = { 1-5 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume25/number9/3063-4186/ },
doi = { 10.5120/3063-4186 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:11:16.817965+05:30
%A Sreelatha Malempati
%A Shashi Mogalla
%T Grid based Approach for Data Confidentiality
%J International Journal of Computer Applications
%@ 0975-8887
%V 25
%N 9
%P 1-5
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Network security measures are required to protect data during their transmission. Sensitive information transmitted across a network requires confidentiality. Data confidentiality is the protection of transmitted data from passive attacks. Passive attacks are eaves dropping or monitoring the traffic. The goal of the intruder is to obtain information being transmitted. These attacks can be prevented by encryption. This paper proposes a simple grid based method for providing confidentiality to the data or the session key being transmitted. The sender and the receiver share a global secret key which is used for extracting the data from a grid.

References
  1. A.S. Tanenbaum, 1999. Computer Networks, 3rd Edn., Pearson and Education.
  2. S. William, 2003. Cryptography and Network Security, principles and Practice, 3rd edn., Pearson and Education.
  3. G. E. Blonder, "Graphical passwords," in Lucent Technologies, Inc., Murray Hill, NJ, U. S. Patent, Ed. United States, 1996.
  4. R. Dhamija, and A. Perrig. “Déjà Vu: A User Study Using Images for Authentication”. In 9th USENIX Security Symposium, 2000.
  5. W. Jansen, "Authenticating Mobile Device User through Image Selection," in Data Security, 2004.
  6. W. Jansen, "Authenticating Users on Handheld Devices” in Proceedings of Canadian Information Technology Security Symposium, 2003.
  7. Jermyn, I., Mayer A., Monrose, F., Reiter, M., and Rubin, “The design and analysis of graphical passwords” in Proceedings of USENIX Security Symposium, August 1999.
  8. D. Weinshall and S. Kirkpatrick, "Passwords You’ll Never Forget, but Can’t Recall," in Proceedings of Conference on Human Factors in Computing Systems (CHI). Vienna, Austria: ACM, 2004, pp. 1399-1402.
  9. Z. Zheng, X. Liu, L. Yin, Z. Liu “A Hybrid password authentication scheme based on shape and text” Journal of Computers, vol.5, no.5 May 2010.
  10. Tao H. and Adams C. 2008. Pass-Go: A proposal to improve the usability of graphical passwords. International Journal of Network Security, 7(2): 273-292.
  11. Sreelatha Malempati and Shashi Mogalla, “Intrusion Prevention by Native Language Password Authentication Scheme” ,4th International conference on network security and its applications CNSA 2011, Springer LNCS-CCIS 196, pp. 239–248.
Index Terms

Computer Science
Information Sciences

Keywords

encryption confidentiality grid based graphical passwords passive attacks