Work place: Department of Computer Science and Applications, NSHM College of Management and Technology, Kolkata, 700053, India
E-mail: nupurc1995@gmail.com
Website:
Research Interests: Computer Architecture and Organization, Information Security, Network Security, Data Structures and Algorithms
Biography
Nupur Chakraborty is a final year student of Bachelor’s in Computer Applications from NSHM College of Management & Technology, Kolkata appearing for her final semester examinations. She has secured first position in the Ethical Hacking of TechnoGyanam (A National Level Championship) Workshop in association with RENDEZVOUS, BRCA IIT – DELHI organized by Technospecies Global Solution. Being a research enthusiast, her basic interests include Communication and Networking, Network and Information Security and Cloud Computing.
By Sanjay Kr. Pal Nupur Chakraborty
DOI: https://doi.org/10.5815/ijcnis.2017.05.02, Pub. Date: 8 May 2017
Sharing of data is always a crucial job in the world of data technology, where data are perceived as useful resources for generating significant information for taking notable decisions or for doing interpretation. On the basis of impact factor associated with the information, sharing and storage of data demands security. Sharing of large extent of textual sensitive data contained in a file needs a way of hidings their direct decipherment. Due to the size related restriction associated with steganography we always promote cryptography for sharing large amount of sensitive data. In this paper we have proposed an encryption technique with time complexity of O(1) that exploits the dynamic node fusion property of graph theory. We are applying the rule of cosmos which reveals that the entire cosmos relies on the conception of data hiding. Each time billions of particles merges to form a new structure and again splits, gets distributed and again follows the same process of hiding and disclosing the hidden truth in a cyclic manner. Following this logic we have proposed a dynamic layered encryption technique that will be completely able to resist the illicit actions of intruders with low computational efforts as well as it reduces the network load on packet transmission. In future with the successive increase in the processing power and requirements we can easily intensify the capacity of the proposed technique.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals