Comparison of Stock Price Prediction Models using Pre-trained Neural Networks
Volume-3 | Issue-2
Efficient Two Stage Identification for Face mask detection using Multiclass Deep Learning Approach
Volume-3 | Issue-2
Design an Adaptive Hybrid Approach for Genetic Algorithm to Detect Effective Malware Detection in Android Division
Volume-3 | Issue-2
Blockchain Framework for Communication between Vehicle through IoT Devices and Sensors
Volume-3 | Issue-2
Gas Leakage Detection in Pipeline by SVM classifier with Automatic Eddy Current based Defect Recognition Method
Volume-3 | Issue-3
A Review on Data Securing Techniques using Internet of Medical Things
Volume-3 | Issue-3
Machine Learning Algorithms Performance Analysis for VLSI IC Design
Volume-3 | Issue-2
Maximizing the Prediction Accuracy in Tweet Sentiment Extraction using Tensor Flow based Deep Neural Networks
Volume-3 | Issue-2
Assimilation of IoT sensors for Data Visualization in a Smart Campus Environment
Volume-3 | Issue-4
DDOS ATTACK DETECTION IN TELECOMMUNICATION NETWORK USING MACHINE LEARNING
Volume-1 | Issue-1
Gas Leakage Detection in Pipeline by SVM classifier with Automatic Eddy Current based Defect Recognition Method
Volume-3 | Issue-3
Design an Adaptive Hybrid Approach for Genetic Algorithm to Detect Effective Malware Detection in Android Division
Volume-3 | Issue-2
Comparison of Stock Price Prediction Models using Pre-trained Neural Networks
Volume-3 | Issue-2
Construction of a Framework for Selecting an Effective Learning Procedure in the School-Level Sector of Online Teaching Informatics
Volume-3 | Issue-4
Machine Learning Algorithms Performance Analysis for VLSI IC Design
Volume-3 | Issue-2
Efficient Two Stage Identification for Face mask detection using Multiclass Deep Learning Approach
Volume-3 | Issue-2
Characterizing WDT subsystem of a Wi-Fi controller in an Automobile based on MIPS32 CPU platform across PVT
Volume-2 | Issue-4
Assimilation of IoT sensors for Data Visualization in a Smart Campus Environment
Volume-3 | Issue-4
Design of Data Mining Techniques for Online Blood Bank Management by CNN Model
Volume-3 | Issue-3
Ethereum and IOTA based Battery Management System with Internet of Vehicles
Volume-3 | Issue-3
Volume - 5 | Issue - 4 | december 2023
Published
29 November, 2023
The system focuses on proposing a robust authentication framework based on these Secure Remote Password (SRP) protocol to enhance the security of data exchange in Peer-to- Peer (P2P) cloud environments. The Advanced Encryption Standard (AES) algorithm provides encryption and the SRP protocol leverages cryptographic primitives to establish mutual authentication between cloud servers and users, ensures that data, remains protected against any vulnerabilities. The system encompasses various stages, including user registration, key establishment, and secure data transmission. After user registration, the SRP protocol employs a zero-knowledge proof mechanism to maintain the security of data available on cloud servers, mitigating the risks associated with password leaks and unauthorized access. Furthermore, the protocol facilitates secure key exchange to establish a confidential communication channel between peers, enabling encrypted data transmission. The system integrates SRP protocol and AES encryption, fortifying data security in P2P cloud environments through robust authentication, ensuring a comprehensive defence against potential vulnerabilities.
KeywordsSRP P2P AES Zero Knowledge Encryption
Full Article PDF