Conference Papers

Permanent URI for this collectionhttps://idr.nitk.ac.in/handle/123456789/28506

Browse

Search Results

Now showing 1 - 2 of 2
  • Item
    A modified secure version of the Telegram protocol (MTProto)
    (Institute of Electrical and Electronics Engineers Inc., 2016) Job, J.; Naresh, V.; Chandrasekaran, K.
    The advent of mobile phones and the spread of the internet have caused a substantial increase in the utilization of these technologies for personal communication. A wide range of mobile applications exist, most of which use their own proprietary protocol. Reports of snooping attacks have prompted the parent organizations and users to guarantee that the encrypted data sent over a public network is decrypted only by the intended recipient. Smart phone operating systems provide GPS data to these applications so that users can tag photos with this information. As these applications mostly run a daemon or service in the background to automatically receive messages, an unattended switched on location service coupled with a weak protocol leaves the user highly vulnerable of being tracked by eavesdroppers. These applications are known to, by observing their behaviour, upload the user's contact list to the server so as identify those contacts using the same application. These are but just two important data that need to be protected by tough security measures during transit. Any loop hole in security protocols will leave the user vulnerable to attacks, even outside the digital world. Online chat protocols such as the Telegram protocol ensure end-to-end security of data. Although the protocol itself has been explained in much detail by the designers, this protocol is disfavored because of its performance drawbacks and its susceptibility to man-in-the-middle attacks. In this paper, we modify the Telegram protocol in an attempt to make it more efficient and secure. © 2015 IEEE.
  • Item
    Multilayer Technique to Secure Data Transfer in Private Cloud for SaaS Applications
    (Institute of Electrical and Electronics Engineers Inc., 2020) Ghuge, S.; Kumar, N.; Savitha, S.; Suraj, V.
    In recent times Cloud Computing[CC] has emanated as a substitute paradigm for hosting and providing services over the Internet. Software as a Service (Saas) is one among such services that deliver services to the end-users on pay-as-you-go manner. In spite of all its advantages, security always seems to be major drawback. For securing the users' data on the cloud, this paper proposes an application model for any SaaS application hosted on a private cloud environment. The application is divided into two micro-services, where the first one is Application Layer Firewall and second one is a secured application to login and send sensitive data. The application layer firewall checks for any malicious activity and prevents the intruder to access the features present in the application. Subsequently, a Hidden Markov Model layer is implemented which is a probability-based intrusion detection technique. The second micro-service uses Advanced Encryption Standard (AES) encryption algorithm to encrypt documents having sensitive data, which have to be transferred within the private cloud. Further security is provided by proposing a novel Video Steganography approach using the Least Significant Bit (LSB) technique. This paper gives a detailed structure of hiding the data using multiple levels of security. Thus, this paper provides a holistic approach to implement a high level of security in SaaS applications. © 2020 IEEE.