Open Access   Article Go Back

GCM-AES-VR : A Scheme for Cloud Data Confidentiality and Authenticity

Rajani S. Sajjan1 , Vijay R. Ghorpade2

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-12 , Page no. 86-94, Dec-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i12.8694

Online published on Dec 31, 2018

Copyright © Rajani S. Sajjan, Vijay R. Ghorpade . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Rajani S. Sajjan, Vijay R. Ghorpade, “GCM-AES-VR : A Scheme for Cloud Data Confidentiality and Authenticity,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.86-94, 2018.

MLA Style Citation: Rajani S. Sajjan, Vijay R. Ghorpade "GCM-AES-VR : A Scheme for Cloud Data Confidentiality and Authenticity." International Journal of Computer Sciences and Engineering 6.12 (2018): 86-94.

APA Style Citation: Rajani S. Sajjan, Vijay R. Ghorpade, (2018). GCM-AES-VR : A Scheme for Cloud Data Confidentiality and Authenticity. International Journal of Computer Sciences and Engineering, 6(12), 86-94.

BibTex Style Citation:
@article{Sajjan_2018,
author = {Rajani S. Sajjan, Vijay R. Ghorpade},
title = {GCM-AES-VR : A Scheme for Cloud Data Confidentiality and Authenticity},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {12 2018},
volume = {6},
Issue = {12},
month = {12},
year = {2018},
issn = {2347-2693},
pages = {86-94},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3298},
doi = {https://doi.org/10.26438/ijcse/v6i12.8694}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i12.8694}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3298
TI - GCM-AES-VR : A Scheme for Cloud Data Confidentiality and Authenticity
T2 - International Journal of Computer Sciences and Engineering
AU - Rajani S. Sajjan, Vijay R. Ghorpade
PY - 2018
DA - 2018/12/31
PB - IJCSE, Indore, INDIA
SP - 86-94
IS - 12
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
483 324 downloads 228 downloads
  
  
           

Abstract

Cloud data security is recognized as making the data confidential along with proper authentication. The Galois/Counter Mode (GCM) is used to provide data confidentiality with associated data as authentication. It aims to provide birthday bound security i.e. it is secure up to 2^(n/2) adversarial queries where n is a block size. But in some cases this much security is not sufficient. In this paper, we have proposed a new approach to authenticated encryption with associated data (AEAD), an improved AEAD scheme which can be secure up to approximately 2^n / p adversarial queries where, p = (n/m) , where n is a block size and m is a bit variance. This bit variance is introduced in the encryption process. In the proposed nonce-respecting AEAD scheme a new pseudorandom function is defined and used for implementation. To generate authentication tag universal hash function is used. In this paper security proofs of proposed scheme are given by presenting its construction and its security model.

Key-Words / Index Term

Authenticated encryption with associated data, beyond birthday bound security, cloud data confidentiality, data authentication

References

[1] Chanathip Namprempre Mihir Bellare, "Authenticated Encryption: Relations among notions and analysis of the generic composition paradigm," Lecture Notes in Computer Science,Springer-Verlag, vol. 1976, pp. 531–545, July 2007.
[2] C. Jutla, "Encryption modes with almost free message integrity".
[3] V. Gligor and P. Donescu, "Fast encryption and authentication: XCBC encryption and XECB authentication modes.".
[4] M. Bellare, J. Black, andT. Krovetz P. Rogaway, "OCB: A block-cipher mode of operation for efficient authenticated encryption," 2001.
[5] Rogaway P., "Authenticated-Encryption with Associated-Data," in 9th ACM Conference on Computer and Communications Security, Washington,USA, 2002, pp. 98-107.
[6] A. Bogdanov, A. Luykx, B. Mennink, E. Tischhauser, and K. Yasuda E. Andreeva, "Parallelizable and authenticated online ciphers".
[7] S. Fluhrer, C. Forler F. Abed, "Pipelineable on-line encryption".
[8] C. Forler, and S. Lucks E. Fleischmann, "McOE: a family of almost foolproof on-line authenticated encryption schemes".
[9] M. Bellare and C. Namprempre, "Authenticated encryption: relations among notions and analysis of the generic composition paradigm".
[10] P.Jovanovic,B.Mennink,and S.Neves R.Granger, "Improved masking for tweakable blockciphers with applications to authenticated encryption".
[11] J.Viega D.A.McGrewand, "The security and performance of the Galois/counter mode (GCM) of operation".
[12] Dr. Vijay R. Ghorpade Rajani S. Sajjan, "AES-VR:A New Approach for Cloud Data Confidentiality," International Journal of Computer Technology and Applications, Accepted 2018.
[13] Hong-Gang Hu, Qian Yuan Ping Zhang, "Close to optimally secure variants of GCM," Hindawi, vol. 2018, March 2018.