Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

Grid based Approach for Data Confidentiality

International Journal of Computer Applications
© 2011 by IJCA Journal
Number 9 - Article 8
Year of Publication: 2011
Sreelatha Malempati
Shashi Mogalla

Sreelatha Malempati and Shashi Mogalla. Article: Grid based Approach for Data Confidentiality. International Journal of Computer Applications 25(9):1-5, July 2011. Full text available. BibTeX

	author = {Sreelatha Malempati and Shashi Mogalla},
	title = {Article: Grid based Approach for Data Confidentiality},
	journal = {International Journal of Computer Applications},
	year = {2011},
	volume = {25},
	number = {9},
	pages = {1-5},
	month = {July},
	note = {Full text available}


Network security measures are required to protect data during their transmission. Sensitive information transmitted across a network requires confidentiality. Data confidentiality is the protection of transmitted data from passive attacks. Passive attacks are eaves dropping or monitoring the traffic. The goal of the intruder is to obtain information being transmitted. These attacks can be prevented by encryption. This paper proposes a simple grid based method for providing confidentiality to the data or the session key being transmitted. The sender and the receiver share a global secret key which is used for extracting the data from a grid.


  • A.S. Tanenbaum, 1999. Computer Networks, 3rd Edn., Pearson and Education.
  • S. William, 2003. Cryptography and Network Security, principles and Practice, 3rd edn., Pearson and Education.
  • G. E. Blonder, "Graphical passwords," in Lucent Technologies, Inc., Murray Hill, NJ, U. S. Patent, Ed. United States, 1996.
  • R. Dhamija, and A. Perrig. “Déjà Vu: A User Study Using Images for Authentication”. In 9th USENIX Security Symposium, 2000.
  • W. Jansen, "Authenticating Mobile Device User through Image Selection," in Data Security, 2004.
  • W. Jansen, "Authenticating Users on Handheld Devices” in Proceedings of Canadian Information Technology Security Symposium, 2003.
  • Jermyn, I., Mayer A., Monrose, F., Reiter, M., and Rubin, “The design and analysis of graphical passwords” in Proceedings of USENIX Security Symposium, August 1999.
  • D. Weinshall and S. Kirkpatrick, "Passwords You’ll Never Forget, but Can’t Recall," in Proceedings of Conference on Human Factors in Computing Systems (CHI). Vienna, Austria: ACM, 2004, pp. 1399-1402.
  • Z. Zheng, X. Liu, L. Yin, Z. Liu “A Hybrid password authentication scheme based on shape and text” Journal of Computers, vol.5, no.5 May 2010.
  • Tao H. and Adams C. 2008. Pass-Go: A proposal to improve the usability of graphical passwords. International Journal of Network Security, 7(2): 273-292.
  • Sreelatha Malempati and Shashi Mogalla, “Intrusion Prevention by Native Language Password Authentication Scheme” ,4th International conference on network security and its applications CNSA 2011, Springer LNCS-CCIS 196, pp. 239–248.