2021
DOI: 10.11591/ijeecs.v23.i2.pp1018-1029
|View full text |Cite
|
Sign up to set email alerts
|

Data security using random dynamic salting and AES based on master-slave keys for Iraqi dam management system

Abstract: In the present time, dam management is considered one of the important challenges for e-government in Iraq, becuase it needs information technology infrastructure, data integrity and protection of user privacy against Internet threats that render such vital infrastructure ineffective. This struggle between the proposed dam management system (DMS) and a multi-tier secure model specifically for the Fallujah dam (and generally for all dams) which is addressed in this paper as a case study. To do this, a relationa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(8 citation statements)
references
References 27 publications
(31 reference statements)
0
5
0
Order By: Relevance
“…Fortunately, our protocol generates ElGamal random keys and converts them into small sizes of length 256, which are suitable for encryption in AES and e-commerce environments. Ali et al [15] utilized several built-in methods such as PBKDF2, RNG and slave key to generate shared keys. However, their protocol is complex and increases implementation running time costs.…”
Section: Results Comparison and Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…Fortunately, our protocol generates ElGamal random keys and converts them into small sizes of length 256, which are suitable for encryption in AES and e-commerce environments. Ali et al [15] utilized several built-in methods such as PBKDF2, RNG and slave key to generate shared keys. However, their protocol is complex and increases implementation running time costs.…”
Section: Results Comparison and Analysismentioning
confidence: 99%
“…Ali et al [15] presented a suggestion about the design of a relational database that covered the creation of a multi-tier secure architecture for integrating the dam management framework with its tasks. They employed the AES technique and generated keys to encrypt and decode the dam data via the password-based key derivation function 2 (PBKDF2), random numbers generator (RNG) sequences generator and the slave key for salting security.…”
Section: Related Work Of E-commerce Securitymentioning
confidence: 99%
“…If you need to achieve a higher level of security, you can use a CPU-consuming hash algorithm to combat brute force cracking, such as password-based key derivation function 2 (PBKDF2). Ali et al [ 121 ] discussed encryption and decryption of the dam data using the AES algorithm with derived keys via the PBKDF2 and RNG sequences generator and slave key for salting protection. They propose a derived key based on the AES algorithm plus 256 bits.…”
Section: Applicationsmentioning
confidence: 99%
“…Due to an oversized variety of released android applications alongside the daily emergence of malicious applications, the manual investigation, and analysis of the latest apps became a cumbersome task. An important task in exploring malware streams is clustering 7,8 . In addition to the limited memory and other constraints, the nature of the malware stream includes the following points for clustering: 9,10 There is no hypothesis regarding the total cluster's numbers. No commitment exist to discover demanded shape clusters. There is no assumption about outliers data. …”
Section: Introductionmentioning
confidence: 99%
“…An important task in exploring malware streams is clustering. 7,8 In addition to the limited memory and other constraints, the nature of the malware stream includes the following points for clustering: 9,10 1. There is no hypothesis regarding the total cluster's numbers.…”
Section: Introductionmentioning
confidence: 99%