Skip to main content

2024 | OriginalPaper | Buchkapitel

Secure Text Transfer Using Diffie–Hellman Key Exchange Algorithm in Cloud Environment

verfasst von : Vijay Prakash, Tanishka Goyanka, Shivi Sharma, Lalit Garg, Varun Shukla

Erschienen in: Cryptology and Network Security with Machine Learning

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Secure text transfer is a process of securely transferring text-based data over a shared network, ensuring that the data remains confidential and private and that no third party can access or intercept it. One standard method of secure text transfer is through the use of encryption. Several encryption algorithms, such as advanced encryption standard (AES) and Rivest–Shamir–Adleman (RSA), provide varying levels of security. Another way of secure text transfer is through protocols such as hypertext transfer protocol secure (HTTPS), encrypting data transmitted between a web browser and a server, ensuring that attackers cannot intercept it. Similarly, secure file transfer protocol (SFTP) is a secure version of FTP that encrypts data in transit. Overall, secure text transfer is essential when sensitive information is transmitted over a network. Organizations can help ensure their data remains safe and secure by implementing appropriate security measures. There are many places/applications where people use this technique to transfer data securely.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
6.
Zurück zum Zitat Shafiq M, Gu Z, Cheikhrouhou O, Alhakami W, Hamam H (2022) The rise of ‘Internet of Things’: review and open research issues related to detection and prevention of IoT-based security attacks. Wirel Commun Mob Comput 2022. https://doi.org/10.1155/2022/8669348 Shafiq M, Gu Z, Cheikhrouhou O, Alhakami W, Hamam H (2022) The rise of ‘Internet of Things’: review and open research issues related to detection and prevention of IoT-based security attacks. Wirel Commun Mob Comput 2022. https://​doi.​org/​10.​1155/​2022/​8669348
10.
Zurück zum Zitat Tajammul M, Reddy Vijeeth L (2022) Secure text transfer using Diffie-Hellman key exchange based on cloud Int J Eng Res Technol 11(2):245–247 Tajammul M, Reddy Vijeeth L (2022) Secure text transfer using Diffie-Hellman key exchange based on cloud Int J Eng Res Technol 11(2):245–247
15.
Zurück zum Zitat Agrahari V (2020) Data security in cloud computing using cryptography algorithms. IJSDR2009043 Int J Sci Dev Res [Online]. Available from: www.ijsdr.org Agrahari V (2020) Data security in cloud computing using cryptography algorithms. IJSDR2009043 Int J Sci Dev Res [Online]. Available from: www.​ijsdr.​org
18.
Zurück zum Zitat Moharana SR, Jha VK, Satpathy A, Addya SK, Turuk AK, Majhi B (2017) Secure key-distribution in IoT cloud networks. In: Proceedings of the 2017 3rd IEEE international conference on sensing, signal processing and security (ICSSS 2017), pp 197–202. https://doi.org/10.1109/SSPS.2017.8071591 Moharana SR, Jha VK, Satpathy A, Addya SK, Turuk AK, Majhi B (2017) Secure key-distribution in IoT cloud networks. In: Proceedings of the 2017 3rd IEEE international conference on sensing, signal processing and security (ICSSS 2017), pp 197–202. https://​doi.​org/​10.​1109/​SSPS.​2017.​8071591
19.
Zurück zum Zitat Haase B, Labrique B (2017) Making password authenticated key exchange suitable for resource-constrained industrial control devices. Lecture notes in computer science (including its subseries Lecture notes in artificial intelligence and Lecture notes in bioinformatics), vol 10529. LNCS, pp 346–364. https://doi.org/10.1007/978-3-319-66787-4_17 Haase B, Labrique B (2017) Making password authenticated key exchange suitable for resource-constrained industrial control devices. Lecture notes in computer science (including its subseries Lecture notes in artificial intelligence and Lecture notes in bioinformatics), vol 10529. LNCS, pp 346–364. https://​doi.​org/​10.​1007/​978-3-319-66787-4_​17
20.
Zurück zum Zitat Borkar GM, Mahajan AR (2017) A secure and trust based on-demand multipath routing scheme for self-organized mobile ad-hoc networks. Wirel Netw 23(8):2455–2472CrossRef Borkar GM, Mahajan AR (2017) A secure and trust based on-demand multipath routing scheme for self-organized mobile ad-hoc networks. Wirel Netw 23(8):2455–2472CrossRef
Metadaten
Titel
Secure Text Transfer Using Diffie–Hellman Key Exchange Algorithm in Cloud Environment
verfasst von
Vijay Prakash
Tanishka Goyanka
Shivi Sharma
Lalit Garg
Varun Shukla
Copyright-Jahr
2024
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-97-0641-9_43

Neuer Inhalt