Text encryption through distributed systems

Keywords: Cryptography, Distributed System, SOAP

Abstract

In recent years, the exponential growth of interconnections between digital devices has led to a significant increase in cyberattack incidents, often leading to severe and disastrous consequences for an organization by exploiting existing vulne rabilities in emerging technologies. One of the most innovative and effective defense mechanisms is cryptography, considered an essential requirement in the cybersecurity community for data protection. In this paper, we implement encryption methods executed on each machine in a distributed manner through the Simple Object Access Protocol (SOAP) web service for the data that want to be protected. To achieve it, a distributed system was created with virtual machines that host encryption methods such as AES-256, Caesar, and Blowfish, to send encrypted data from a source machine to a destination machine and, in turn, decrypt the encrypted data. The results obtained were excellent because our proposal adds more security to the data, performing it difficult for attackers to obtain the data quickly. In addition, the consumption of computational resources for executing the algorithms in the distributed system is minimal, which is adequate to guarantee its use in any computer with limited resources.

DOI

Downloads

Download data is not yet available.

References

P. Dixit, A. K. Gupta, M. C. Trivedi, and V. K. Yadav, “Traditional and Hybrid Encryption Techniques: A Survey,” in Networking communica- tion and data knowledge engineering. Springer, 2018, pp. 239–248.

A. Tanenbaum and M. van Steen, Distributed Systems. CreateSpace Independent Publishing Platform, 2017.

P. Matta, M. Arora, and D. Sharma, “A Comparative Survey on Data Encryption Techniques: Big Data Perspective,” Materials Today: Proceedings, vol. 46, pp. 11 035–11 039, 2021.

S. Mitra and D. Das, “A Critical Study on the Applications of Run Length Encoding Techniques in Combined Encoding Schemes.” Inter- national Journal of Advanced Research in Computer Science, vol. 8, no. 5, 2017.

O. García Sepúlveda, “Encriptado de Datos con Osciladores Caóticos de Orden Fraccionario,” Ph.D. dissertation, Universidad Autónoma de Nuevo León, 2015.

J. R. Tirado Salas. (2017) Encriptado de Datos para Proteger Información de las Empresas. [Accedido 06 diciembre 2022]. [Online]. Available: https://bit.ly/3utyTls

D. Montenegro Torres. (2020) Algoritmos de Encriptación de Archivos para la Transferencia en Mensajería Instantánea. [Accedido 06 diciembre 2022]. [Online]. Available: https://bit.ly/3FwW1WD

B. Seth, S. Dalal, V. Jaglan, D.-N. Le, S. Mohan, and G. Srivastava, “Integrating Encryption Techniques for Secure Data Storage in the Cloud,” Transactions on Emerging Telecommunications Technologies, vol. 33, no. 4, p. e4108, 2022.

D. Chakroborti and S. S. Nath, “Web Service Performance Enhancement for Portable Devices Modifying SOAP Security Principle,” in 2017 20th International Conference of Computer and Information Technology (ICCIT). IEEE, 2017, pp. 1–7.

R. Bendraou, B. Combemale, X. Cre´gut, and M.-P. Gervais, “Definition of an Executable SPEM 2.0,” in 14th Asia-Pacific Software Engineering Conference (APSEC’07). IEEE, 2007, pp. 390–397.

K. Srinivasa and A. Singh, “Hands-On Guide to Virtual Box,” in Design and Use of Virtualization Technology in Cloud Computing. IGI Global, 2018, pp. 194–207.

J. W. R´ıos Taipe. (2017) Sistema de Encriptacio´n para Optimizar el Proceso de Desarrollo de Software de una Empresa de Lima. [Accedido 06 diciembre 2022]. [Online]. Available: https://bit.ly/3h6noO2

A. Visconti and F. Gorla, “Exploiting an HMAC-SHA-1 Optimization to Speed up PBKDF2,” IEEE Transactions on Dependable and Secure Computing, vol. 17, no. 4, pp. 775–781, 2018.

M. Hazhirpasand, M. Ghafari, and O. Nierstrasz, “Cryptoexplorer: An Interactive Web Platform supporting Secure Use of Cryptography APIs,” in 2020 IEEE 27th International Conference on Software Analysis, Evolution and Reengineering (SANER). IEEE, 2020, pp. 632–636.

Published
2023-01-06
How to Cite
[1]
L. Pineda, B. Gutiérrez, M. Orellana, and J. L. Zambrano-Martínez, “Text encryption through distributed systems”, LAJC, vol. 10, no. 1, pp. 56-67, Jan. 2023.
Section
Research Articles for the Regular Issue

Most read articles by the same author(s)