Secured Data Encryption Evaluation on Transmission Network using Fuzzy Logic

Sk Baji, S Ravi Kumar

Abstract


Security of data is imperative factor in data transmission through network. In this paper, we propose another strategy utilizing fuzzy set hypothesis to upgrade the security. The data as content to be transmitted is encrypted by utilizing the AES Rijndael algorithm. The encryption algorithm is the numerical method for performing encryption of data. A key is utilized to figure a message and to interpret it back to the first message. At that point the mixed encrypted content is changed over into the type of numerics by applying the fuzzy set hypothesis. The fuzzy logic will give the content in the zero to one esteem. These numerical before decryption the numerical are again changed over into mixed content. After this, if the key given by the client is a similar key that is utilized for the encryption then unique data will be recovered. The paper, coordinates the encryption of content and transformation of the unscrambled content from numerical to unique by utilizing fuzzy logic. In this paper, we include matrix transformation of content after encryption. Henceforth, the gatecrashers are ignorant of the content that is encrypted. For this matrix change fuzzy enrollment capacities are included. Before decryption the matrix transformation is occurred to discover content. From that point forward, the decryption occurred by giving key.


References


. Al-bahar ,J.F and K.C. Crandall,1990. Systematic risk management approach for construction projects. J. Const.Eng manage. 116: 533-546.

. AmiruddIsmail , Abbas M.Abd and Zamri Bin Chik Approach to analyze Risk Factors for Construction Projects Utilizing Fuzzy logic [Journal of Applied Science 8(20):3738-3742,2008 ISSN 1812-5654 Asian Network for Scientific Information]

. Andi, Santi and darmawan,2006. Identifying and managing important risks in building and infrastructure projects: Contractor perspective. International Civil engg. Practise .August 25-26,2006.

. Ayyub, B. M., McGill, W. L., and Kaminskiy, M. P. (2007). “Critical Asset and Portfolio Risk Analysis: An All Hazards Framework.” Risk Analysis, 27(4): 789-801.

. Bezdek, J. C., A physical interpretation of fuzzy ISODATA, IEEE Transaction on Systems Man and Cyberentics, 1976, SME-6: 484_492.

. Carr, V and J.H.M. Tah, 2001. A fuzzy approach to construction Project management system. J. Adv. Eng. Software, 32: 847-857

. Chapman, C.B. and Cooper, D.F. (1983), “Risk analysis: testing some prejudices”, European Journal of Operational Research, Vol.14, pp.238- 47

. Chen Shouyu, Fuzzy recognition theoretical model, Journal of Fuzzy Mathematics, 1993, (2): 261_269

. D.M. Zhao, Y.Q. Zhang, J.F. Ma, “Comprehensive risk assessment of the network security,” Computer Science, vol. 31, pp. 66-69, 2004.

.Dong-mei Zhao 1, 2, Jing-Hong Wang1, Jian-Feng Ma2 Fuzzy Risk Assessment of the Network Security [Proceedings of the Fifth International Conference on Machine Learning and Cybernetics, Dalian, 13-16 August 2006]


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.