Secure Transmission with Matrix Encryption and Data Compression Mechanism

被引:0
|
作者
Fazulullah, Abul Hasan [1 ]
Vansia, Purva [1 ]
Patel, Kartavi [1 ]
Patel, Dipesh [1 ]
Abuzneid, Abdel-Shakour A. [1 ]
机构
[1] Univ Bridgeport, Dept Comp Sci, Bridgeport, CT 06604 USA
关键词
Intranet; Bandwidth; Confidentiality; Availability; throughput; proactive; reactive; FUTURE INTERNET; HISTORY;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With emerging technology and support for 4G and 5G network, considering Internet and Intranet, the bandwidth is not a big of a problem as it was before. The main concern now is the implementation of security and how efficiently we can send the data to recipients. We have come up with an awesome concept that takes confidentiality and availability as mainstream. The idea in simple words is like our concept in addition to Dijkstra's algorithm running on SCTP will provide an excellent secure transmission of data over the network. The focus of our research is on how to handle the data in a different way so that we can reduce the amount of space needed for storage and helps to reduce the time and space complexity. This goal will again be helpful when there is a huge junk of data to be sent over the internet in a split of a second. The intent of using SCTP (Stream Control Transmission Protocol) is that it is more reliable and has high throughput both in proactive and reactive manner.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] Compressive Sensing Matrix Designed by Tent Map, for Secure Data Transmission
    Frunzete, Madalin
    Yu, Lei
    Barbot, Jean-Pierre
    Vlad, Adriana
    SPA 2011: SIGNAL PROCESSING ALGORITHMS, ARCHITECTURES, ARRANGEMENTS, AND APPLICATIONS CONFERENCE PROCEEDINGS, 2011, : 11 - +
  • [42] More secure encryption mechanism in database system
    Huazhong Ligong Daxue Xuebao/Journal Huazhong (Central China) University of Science and Technology, 2000, 28 (07): : 29 - 31
  • [43] A secure transaction of cloud data using conditional source trust attributes encryption mechanism
    Thomas Brindha
    Ramaswamy Swarnammal Shaji
    Soft Computing, 2018, 22 : 1013 - 1022
  • [44] A secure transaction of cloud data using conditional source trust attributes encryption mechanism
    Brindha, Thomas
    Shaji, Ramaswamy Swarnammal
    SOFT COMPUTING, 2018, 22 (03) : 1013 - 1022
  • [45] Secure signals transmission based on Quaternion Encryption Scheme
    Nagase, T
    Komata, M
    Araki, T
    18TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2 (REGULAR PAPERS), PROCEEDINGS, 2004, : 35 - 38
  • [46] Secure Audio Information Transmission with Encryption Algorithms in PKI
    Pleshkova, Snejana
    Kinanev, Dimitar
    Bekiarski, Alexander
    2018 INTERNATIONAL CONFERENCE ON HIGH TECHNOLOGY FOR SUSTAINABLE DEVELOPMENT (HITECH), 2018,
  • [47] VIDEO ENCRYPTION FOR SECURE MULTIMEDIA TRANSMISSION - A LAYERED APPROACH
    Pai, Pradeep T.
    Raghu, M. E.
    Ravishankar, K. C.
    2014 3RD INTERNATIONAL CONFERENCE ON ECO-FRIENDLY COMPUTING AND COMMUNICATION SYSTEMS (ICECCS 2014), 2014, : 127 - 132
  • [48] Secure matrix multiplication based on fully homomorphic encryption
    Huang, Hai
    Zong, Haoran
    JOURNAL OF SUPERCOMPUTING, 2023, 79 (05): : 5064 - 5085
  • [49] Secure Outsourced Matrix Multiplication with Fully Homomorphic Encryption
    Zhu, Lin
    Hua, Qiang-sheng
    Chen, Yi
    Jin, Hai
    COMPUTER SECURITY - ESORICS 2023, PT I, 2024, 14344 : 249 - 269
  • [50] A Hybrid Cryptographic Mechanism for Secure Data Transmission in Edge AI Networks
    Abdulmohsen Almalawi
    Shabbir Hassan
    Adil Fahad
    Asif Irshad Khan
    International Journal of Computational Intelligence Systems, 17