Skip to main content
Top

2024 | OriginalPaper | Chapter

Secure Text Transfer Using Diffie–Hellman Key Exchange Algorithm in Cloud Environment

Authors : Vijay Prakash, Tanishka Goyanka, Shivi Sharma, Lalit Garg, Varun Shukla

Published in: Cryptology and Network Security with Machine Learning

Publisher: Springer Nature Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Secure text transfer is a process of securely transferring text-based data over a shared network, ensuring that the data remains confidential and private and that no third party can access or intercept it. One standard method of secure text transfer is through the use of encryption. Several encryption algorithms, such as advanced encryption standard (AES) and Rivest–Shamir–Adleman (RSA), provide varying levels of security. Another way of secure text transfer is through protocols such as hypertext transfer protocol secure (HTTPS), encrypting data transmitted between a web browser and a server, ensuring that attackers cannot intercept it. Similarly, secure file transfer protocol (SFTP) is a secure version of FTP that encrypts data in transit. Overall, secure text transfer is essential when sensitive information is transmitted over a network. Organizations can help ensure their data remains safe and secure by implementing appropriate security measures. There are many places/applications where people use this technique to transfer data securely.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
6.
go back to reference Shafiq M, Gu Z, Cheikhrouhou O, Alhakami W, Hamam H (2022) The rise of ‘Internet of Things’: review and open research issues related to detection and prevention of IoT-based security attacks. Wirel Commun Mob Comput 2022. https://doi.org/10.1155/2022/8669348 Shafiq M, Gu Z, Cheikhrouhou O, Alhakami W, Hamam H (2022) The rise of ‘Internet of Things’: review and open research issues related to detection and prevention of IoT-based security attacks. Wirel Commun Mob Comput 2022. https://​doi.​org/​10.​1155/​2022/​8669348
10.
go back to reference Tajammul M, Reddy Vijeeth L (2022) Secure text transfer using Diffie-Hellman key exchange based on cloud Int J Eng Res Technol 11(2):245–247 Tajammul M, Reddy Vijeeth L (2022) Secure text transfer using Diffie-Hellman key exchange based on cloud Int J Eng Res Technol 11(2):245–247
15.
go back to reference Agrahari V (2020) Data security in cloud computing using cryptography algorithms. IJSDR2009043 Int J Sci Dev Res [Online]. Available from: www.ijsdr.org Agrahari V (2020) Data security in cloud computing using cryptography algorithms. IJSDR2009043 Int J Sci Dev Res [Online]. Available from: www.​ijsdr.​org
18.
19.
go back to reference Haase B, Labrique B (2017) Making password authenticated key exchange suitable for resource-constrained industrial control devices. Lecture notes in computer science (including its subseries Lecture notes in artificial intelligence and Lecture notes in bioinformatics), vol 10529. LNCS, pp 346–364. https://doi.org/10.1007/978-3-319-66787-4_17 Haase B, Labrique B (2017) Making password authenticated key exchange suitable for resource-constrained industrial control devices. Lecture notes in computer science (including its subseries Lecture notes in artificial intelligence and Lecture notes in bioinformatics), vol 10529. LNCS, pp 346–364. https://​doi.​org/​10.​1007/​978-3-319-66787-4_​17
20.
go back to reference Borkar GM, Mahajan AR (2017) A secure and trust based on-demand multipath routing scheme for self-organized mobile ad-hoc networks. Wirel Netw 23(8):2455–2472CrossRef Borkar GM, Mahajan AR (2017) A secure and trust based on-demand multipath routing scheme for self-organized mobile ad-hoc networks. Wirel Netw 23(8):2455–2472CrossRef
Metadata
Title
Secure Text Transfer Using Diffie–Hellman Key Exchange Algorithm in Cloud Environment
Authors
Vijay Prakash
Tanishka Goyanka
Shivi Sharma
Lalit Garg
Varun Shukla
Copyright Year
2024
Publisher
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-97-0641-9_43