Protecting integrity and confidentiality for data communication

被引:0
|
作者
Hou, FY [1 ]
Wang, ZY [1 ]
Tang, YH [1 ]
Liu, Z [1 ]
机构
[1] Natl Univ Def Technol, Sch Comp, Changsha 410073, Peoples R China
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a scheme to build data communication system that can effectively protect data integrity and confidentiality. Firstly, this paper briefly introduces the situation of integrity and confidentiality protection. Then, this paper brings forward a new cipher, which uses a keystream generator to produce infinite number of frame secret keys basing on an infinite root key space, and use a unique one-off frame secret key for each data encryption/deciyption. Basing on this cipher, we construct a data communication system. This paper illustrates how to build such a system and analyze its protections of data integrity and confidentiality. With the character of cipher, it offers high resistance against cryptanalysis to prevent data disclosure, and it gives little opportunities to those intractable attacks that can compromise data integrity.
引用
收藏
页码:357 / 362
页数:6
相关论文
共 50 条
  • [1] Integrity and Confidentiality in Cloud Outsourced Data
    Rady, Mai
    Abdelkader, Tamer
    Ismail, Rasha
    [J]. AIN SHAMS ENGINEERING JOURNAL, 2019, 10 (02) : 275 - 285
  • [2] DataShield: Configurable Data Confidentiality and Integrity
    Carr, Scott A.
    Payer, Mathias
    [J]. PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17), 2017, : 193 - 204
  • [3] Protecting access confidentiality with data distribution and swapping
    di Vimercati, Sabrina De Capitani
    Foresti, Sara
    Paraboschi, Stefano
    Pelosi, Gerardo
    Samarati, Pierangela
    [J]. 2014 IEEE FOURTH INTERNATIONAL CONFERENCE ON BIG DATA AND CLOUD COMPUTING (BDCLOUD), 2014, : 167 - 174
  • [4] PROTECTING CONFIDENTIALITY
    HAVARD, JDJ
    [J]. BRITISH MEDICAL JOURNAL, 1984, 288 (6424): : 1102 - 1103
  • [5] Data Outsourcing: A Threat to Confidentiality, Integrity, and Availability
    Kumar, Malay
    Meena, Jasraj
    Singh, Rahul
    Vardhan, Manu
    [J]. 2015 INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND INTERNET OF THINGS (ICGCIOT), 2015, : 1496 - 1501
  • [6] Protecting Confidentiality in Cancer Registry Data With Geographic Identifiers
    Yu, Mandi
    Reiter, Jerome Phillip
    Zhu, Li
    Liu, Benmei
    Cronin, Kathleen A.
    Feuer, Eric J.
    [J]. AMERICAN JOURNAL OF EPIDEMIOLOGY, 2017, 186 (01) : 83 - 91
  • [7] Protecting farmers' data privacy and confidentiality: Recommendations and considerations
    Kaur, Jasmin
    Fard, Seyed Mehdi Hazrati
    Amiri-Zarandi, Mohammad
    Dara, Rozita
    [J]. FRONTIERS IN SUSTAINABLE FOOD SYSTEMS, 2022, 6
  • [8] Protecting the confidentiality of interim data: Addressing current challenges
    Fleming, Thomas R.
    [J]. CLINICAL TRIALS, 2015, 12 (01) : 5 - 11
  • [9] CERTIFICATES OF CONFIDENTIALITY - A VALUABLE TOOL FOR PROTECTING GENETIC DATA
    EARLEY, CL
    STRONG, LC
    [J]. AMERICAN JOURNAL OF HUMAN GENETICS, 1995, 57 (03) : 727 - 731
  • [10] CryptSQLite: Protecting Data Confidentiality of SQLite with Intel SGX
    Wang, Yongzhi
    Liu, Lingtong
    Su, Cuicui
    Ma, Jiawen
    Wang, Lei
    Yang, Yibo
    Shen, Yulong
    Li, Guangxia
    Zhang, Tao
    Dong, Xuewen
    [J]. 2017 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS (NANA), 2017, : 303 - 308