Adapting and accelerating the Stream Cipher Algorithm "RC4" using "Ultra Gridsec" and "HIMAN" and use it to secure "HIMAN" Data
نویسندگان
چکیده
Masquerade attacks pose a serious threat for cloud system due to the massive amount of resource of these systems. Lack of datasets for cloud computing hinders the building of efficient intrusion detection of these attacks. Current dataset cannot be used due to the heterogeneity of user requirements, the distinct operating systems installed in the VMs, and the data size of Cloud systems. This paper presents a Cloud Intrusion Detection Dataset (CIDD)that is the first one for cloud systems and that consists of both knowledge and behavior based audit data collected from both UNIX and Windows users. With respect to current datasets, CIDD has real instances of host and network based attacks and masquerades, and provides complete diverse audit parameters to build efficient detection techniques. The final statistic tables for each user are built by Log Analyzer and Correlator System (LACS) that parses and analyzes user’s binary log files, and correlates audits data according to user IP address(es) and audit time. We describe in details the components and the architecture of LACS and CIDD, and the attacks distribution in CIDD. Nowadays, a lot of researchers did their best to accelerate the cryptographic algorithms and develop high performance cryptographic schemes by using approaches such as the use of high end computing hardware. Grid computing is one of the most powerful techniques that can achieve a high acceleration for cryptographic algorithms, also it is known that security attributes are pretty difficult to meet but security becomes even a bigger challenge when talking about Grid Computing. So the main focus of this paper is the acceleration of stream cipher algorithm "RC4" using grid technology and also providing secure communication between elements of the Grid system by encrypting data passes between them using the new accelerated RC4 Scheme without affecting the performance of the grid middleware, comparable to the actual execution time. So we will cover two points. First, accelerating RC4 encryption algorithm using our developed Grid Security Scheme "ULTRA GRIDSEC" and our developed "HIMAN" middleware and show that RC4 will be accelerated by about 873.52% comparable to that accelerated by "GRIDCRYPT" Scheme that applied by "Alchemi" middleware developed by Melbourne University. Second, the use of the accelerated RC4 scheme to secure communication between elements of "HIMAN", taking into consideration that the stream ciphering algorithms like RC4 are the most suitable encryption algorithms for applying inside "HIMAN" as we will show.
منابع مشابه
Multiple Selective Regions Image Cryptography on Modified RC4 Stream Cipher
Cryptography is the technique which is utilized for secure communication over the network. By using Cryptography technique readable information is converted into an unreadable form. Cryptography is used to protect data from unauthorized access. Universality of security in modern internet based application is an explicit motivation to contribute in the area of Information Security. Multimedia da...
متن کاملState of the Art Realistic Cryptographic Approaches for RC4 Symmetric Stream Cipher
In many of today’s computer application needs, faster operation is essential to the efficient implementation of information security algorithm. RC4 has been used as the data encryption algorithm for many applications and protocols including the Wi-Fi, Skype, and Bit Torrent to name a few. Several efficient approaches to the implementation of RC4 have been proposed and we review some of those. M...
متن کاملA New Variant of RC4 Stream Cipher
RC4 was used as an encryption algorithm in WEP(Wired Equivalent Privacy) protocol that is a standardized for 802.11 wireless network. A few attacks followed, indicating certain weakness in the design. In this paper, we proposed a new variant of RC4 stream cipher. The new version of the cipher does not only appear to be more secure, but its keystream also has large period, large complexity and g...
متن کاملImplementation of Wlan Wep Protocol by Rc4 Algorithm in Vhdl
The WLAN is a network that utilizes radio frequency technology. The security of wireless data stream becomes particularly prominent. The WLAN uses RC4 stream encryption algorithm of the WEP protocol to enhance its Security.WEP itself also has fatal Security flaws, tampering with the data for a variety of active attacks. In essence, the problem is not in RC4 itself but in the way to generate the...
متن کاملBiometric Authentication of Fingerprint for Banking Users, Using Stream Cipher Algorithm
Providing banking services, especially online banking and electronic payment systems, has always been associated with high concerns about security risks. In this paper, customer authentication for their transactions in electronic banking has been discussed, and a more appropriate way of using biometric fingerprint data, as well as encrypting those data in a different way, has been suggest...
متن کامل