Conference Papers
Permanent URI for this collectionhttps://idr.nitk.ac.in/handle/123456789/28506
Browse
4 results
Search Results
Item New Data Hiding Technique in Encrypted Image: DKL Algorithm (Differing Key Length)(Elsevier, 2015) Udhayavene, S.; Dev, A.T.; Chandrasekaran, K.This paper introduces a new technique to increase the information security over the network using steganography in such a way that the secret message being sent is unidentifiable. There is a comparison made to give a clear view of how the algorithm proposed is better than LSB algorithm which is used since a long time for sending concealed messages. To avoid the chances of an attacker using steganalysis to retrieve the data, the data encryption is done. S-tool is used to show the reliability of this algorithm. We will be comparing both LSB and DKL algorithms on the basis of Mean Square Error, Peak Signal Noise Ratio, Relative Payload and Rate of Embedding. Here by its shown that DKL algorithm is more efficient than LSB algorithm. © 2015 The Authors.Item A modified secure version of the Telegram protocol (MTProto)(Institute of Electrical and Electronics Engineers Inc., 2016) Job, J.; Naresh, V.; Chandrasekaran, K.The advent of mobile phones and the spread of the internet have caused a substantial increase in the utilization of these technologies for personal communication. A wide range of mobile applications exist, most of which use their own proprietary protocol. Reports of snooping attacks have prompted the parent organizations and users to guarantee that the encrypted data sent over a public network is decrypted only by the intended recipient. Smart phone operating systems provide GPS data to these applications so that users can tag photos with this information. As these applications mostly run a daemon or service in the background to automatically receive messages, an unattended switched on location service coupled with a weak protocol leaves the user highly vulnerable of being tracked by eavesdroppers. These applications are known to, by observing their behaviour, upload the user's contact list to the server so as identify those contacts using the same application. These are but just two important data that need to be protected by tough security measures during transit. Any loop hole in security protocols will leave the user vulnerable to attacks, even outside the digital world. Online chat protocols such as the Telegram protocol ensure end-to-end security of data. Although the protocol itself has been explained in much detail by the designers, this protocol is disfavored because of its performance drawbacks and its susceptibility to man-in-the-middle attacks. In this paper, we modify the Telegram protocol in an attempt to make it more efficient and secure. © 2015 IEEE.Item Location Privacy Using Data Obfuscation in Fog Computing(Institute of Electrical and Electronics Engineers Inc., 2019) Naik, C.; Sri Siddhartha, M.; Martin, J.P.; Chandrasekaran, K.In the past few decades, smartphones and Global Positioning System(GPS) devices have led to the popularity of Location Based Services. It is crucial for large MNCs to get a lot of data from people and provide their services accordingly. However, on the other side, the concern of privacy has also increased among the users, and they would like to hide their whereabouts. The rise of data consumption and the hunger for faster network speed has also led to the emergence of new concepts such as the Fog Computing. Fog computing paradigm extends the storage, networking, and computing facilities of the cloud computing towards the edge of the networks while removing the load on the server centers and decreasing the latency at the edge device. The fog computing will help in unlimited growth of location services and this adoption of fog computing calls for the need for more secure and robust algorithms for location privacy. One of the ways we can alter the information regarding the location of the user is Location Obfuscation. This can be done reversibly or irreversibly. In this paper, we address the problem of location privacy and present a solution based on the type of data that has to be preserved (in our case, it is distance). A mobile application has been designed and developed to test and validate the feasibility of the proposed obfuscation techniques for the Fog computing environments. © 2019 IEEE.Item Towards a Secure Electronic Health Record System using Blockchain Technology(Institute of Electrical and Electronics Engineers Inc., 2021) Bhattacharyya, S.; Chandrasekaran, K.Blockchain has emerged as a key technology for ensuring reliability and security in several application areas primarily including the healthcare sector. Blockchain is a distributed ledger where blocks of transactions are connected in a chain using the cryptographic hash function of the previous block, making it an append-only structure. Any modification on any of the blocks will generate different hash values in other blocks in a cascading manner and different link relations. In this way the blockchain achieves immutability and security. Blockchain also involves consensus mechanisms in order to ensure synchronization among blocks and agreement between existing nodes to add a new transaction in the chain. Healthcare data is highly sensitive in nature, which consists of private information related to the diagnosis and treatment of patients. In traditional approach these data are stored by each hospital separately where sharing data is very time consuming. Also, health data is very limited to access due to the risk of disclosure of sensitive information. In order to address these issues, the objective of this paper is to integrate blockchain technology with healthcare records/data in order to provide better sharing of data without the fear of data tampering or security breach. © 2021 IEEE.
