0% found this document useful (0 votes)
10 views

Enhanced_Data_Security_Framework_Using_Lightweight_Cryptography_and_Multi-Level_Encryption (1)

Uploaded by

Keerthi Rao
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views

Enhanced_Data_Security_Framework_Using_Lightweight_Cryptography_and_Multi-Level_Encryption (1)

Uploaded by

Keerthi Rao
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

2024 International Conference on Communication, Computer Sciences and Engineering (IC3SE)

Enhanced Data Security Framework Using


Lightweight Cryptography and Multi-Level
Encryption
Projjal Chakrabarty Tiyas Sarkar Manik Rakhra
School Of Computer Science & School Of Computer Science & School of Computer Science &
Engineering Engineering Engineering
Lovely Professional University Lovely Professional University Lovely Professional University
Phagwara - Punjab, India Phagwara - Punjab, India Phagwara - Punjab, India
2024 International Conference on Communication, Computer Sciences and Engineering (IC3SE) | 979-8-3503-6684-6/24/$31.00 ©2024 IEEE | DOI: 10.1109/IC3SE62002.2024.10593191

[email protected] [email protected] [email protected]

Kapil Jairath Vikrant Sharma,


Department of Sciences SMIEEE Computer Science and
Trinity College Engineering
Jalandhar Graphic Era Hill University
Punjab, India Adjunct Professor
[email protected] Graphic Era Deemed to be University
Dehradun, Uttarakhand, India.
[email protected]

Abstract—Network security is essential for individuals as well environments, such as embedded systems [2], smart cards,
as organizations in the modern day, since the majority of & Internet of Things devices, is known as lightweight
enterprises and organizations store their data on clouds. cryptography. These systems have limited memory, energy,
Therefore, a way to guarantee data security during network and processing capacity; therefore, they require
transmission needs to be discovered. Data security also heavily
cryptography particularly built for them. PRESENT is a
depends on device level security. These days, it's necessary to
protect data at the device, network, and application levels very thin block cipher that was introduced as a privacy-
simultaneously. The developers of the suggested concept use enhanced reduced-sized block cipher. The cipher was
multi-level encryption techniques and lightweight designed [3] with high security, minimal energy use, &
cryptography algorithms to attempt to safeguard data on all compact code size in mind. Since its release, the present has
three levels. grown in popularity within the cryptography, which is used
in a wide range of applications today, including wireless
This paper proposes multi-level cryptography as a fix for the sensor networks, RFID tags, and smart cards.
previously noted issue that compared to normal encryption,
which uses different keys for each round of encryption,
II. BACKGROUND
resulting in a complex or powerful algorithm, multi-level
encryption protects data more thoroughly.
A. Security outline of lightweight Cryptographic
Keywords—Healthcare, Multilevel Encryption, Lightweight Algorithm
PRESENT, Lightweight RSA, Cryptography
Cryptographic algorithms are used to secure data.
I. INTRODUCTION Cryptography is the process of encrypting data into code
for secure transmission. Cryptographic ciphers fall into two
This Data security is essential since a lot of stuff is categories: symmetric & asymmetric ciphers. Symmetric
transferred via networks these days. Employing a suitable key encryption encrypts and decrypt data using the same
privacy transformation methodology is the most effective key. This encryption method is quite safe and reasonably
way to secure data transferred across networks. Various rapid. The exchange of the private key between
tactics are employed to protect the private information. communication parties is the main disadvantage of
Most data these days is secured via encryption and symmetric key encryption. An attacker can compromise the
certificate technologies [1]. Most methods are based on data's encryption if they manage to gain the key. Symmetric
cryptography. A new concept known as multi-level key algorithms ensure data integrity and confidentiality but
encryption is used to make the system more secure than not authentication. Examples of conventional symmetric
earlier cryptosystems. Leveraging the same as well as [4] key ciphers are (AES, DES, 3DES & BLOWFISH)
different keys, plain text is encrypted once or more times in among others. Asymmetric encryption offers
the multi-level encryption approach. It makes the process confidentiality, integrity, and authentication. The
more powerful and intricate than it was previously. transmitter encrypts data with its public key, & the recipient
decrypts it with his private key, guaranteeing secrecy and
With an increasing number of IoT devices connecting to the integrity. To ensure authentication, the sender encrypts data
internet and exchanging data, lightweight cryptography has using his private key. The recipient uses the sender's public
become more and more important. To be secure, sensitive key to decrypt the data and confirm its authenticity [5]. The
data needs to be encrypted. The use of cryptographic fact that asymmetric cryptography permits key sharing and
techniques and protocols in resource-constrained all other security techniques is one of its advantages. The

720
979--83503-6684-6/24/$31.00 ©2024 IEEE
Authorized licensed use limited to: Sri Jayachamarajendra College of Engineering. Downloaded on November 12,2024 at 14:17:54 UTC from IEEE Xplore. Restrictions apply.
2024 International Conference on Communication, Computer Sciences and Engineering (IC3SE)

magnitude of the keys is the only negative, as it increases


complexity and slows down encryption. The three most III. PRESENT RSA ALGORITHM
often utilized methods are elliptic curve cryptography
(ECC), Deffie-Hellmen key exchange (DHKE) & RSA by With a symmetric key, the PRESENT scheme is a block
Rivest, Shamir, and Adleman. cipher. It began to grow in the orange laboratory in 2007.
The globally recognized organization created it in 2012 as
B. Lightweight Algorithm Approaches an (ultra-lightweight block cipher) appropriate for
lightweight encryption in resource-constrained
Our daily lives are filled with low-power devices, from environments. Devices with limited storage or low power
medical equipment to digital companions to household consumption, such as network of things devices, use this
appliances. Requiring an acceptable level of security is method. Data and keys are used in the implementation of
necessary because these gadgets often function on low this algorithm [10].
power and hold valuable private information about us.
Conventional encryption methods don't always work well 64 bits make up a single chunk of data that is fed into the
on these kinds of devices because of possible restrictions in decryption as well as encryption procedure. Either 80 or
the software (i.e. processing speed) and hardware (i.e. 128 bits can make up the executable key. According to other
memory) [6]. Because devices lack the computing power of studies, the security degree of the application determines
laptops and smartphones, for example, low power with the key size of the existing techniques. The 80-bit key was
little power will suffer if a huge stream of data needs to be prioritized over the 128-bit key because some researchers
safeguarded quickly, such as a video stream. When trade- had already implemented it or anticipated that the 128-bit
offs are chosen in a low-power system, security suffers key wouldn't be useful in real-world applications. A
since there is more restricted power available. for instance, significant advancement in lightweight cryptography was
are preferred in such a situation, as doing so could lower brought about by the PRESNT algorithm [11] in 2007 with
the security level of the system [7]. Therefore, the objective the introduction of numerous lightweight models, leading
of lightweight cryptography aims to provide a certain level to the creation of a lightweight block cipher as shown as
of security while utilizing the least amount of memory, Fig. 2.
computing power, or extra assets possible.

There might be software restrictions on memory capacity,


processor speed, and latency for lightweight devices.
Hardware that is lightweight may have restrictions on its
performance, size, and power usage. When used in these
situations, a lightweight cryptographic method that can
offer a respectable degree of safety in a range of
applications is necessary [8].

C. Lightweight RSA Algorithm

The RSA asymmetrical key encryption mechanism is based


on the hard-to-find factor of big integers assumption. While
a private key under RSA is kept confidential, the public key
is shared with every framework participant. Three steps Figure 2. Presenting Process of RSA algorithm
make up the RSA algorithm [9]: message encryption,
message decryption, and key creation. The steps that follow The PRESENT algorithm is described by the following
are shown as shown as Fig. 1. pseudocode:

ProduceRoughKeys()
End for addRoundKey (STATE, K32), AddRoundKey
(STATE, Ki) for i=1 to 31 & State-specific s-BoxLayer and
pLayer. Here is how the encryption process works:

a. AddRoundKey: XOR the 64-bit input and the round


key.

b. S box: Every state 4-bit word is subject to an


independent, non-linear substitution process called
the S-box transformation.

c. Player: a permutation modification that operates on


a 64-bit environment.

Figure 1. Framework Lightweight RSA algorithm step-wise approaches

721

Authorized licensed use limited to: Sri Jayachamarajendra College of Engineering. Downloaded on November 12,2024 at 14:17:54 UTC from IEEE Xplore. Restrictions apply.
2024 International Conference on Communication, Computer Sciences and Engineering (IC3SE)

Fig. 3 which is included below and is suggested in this TABLE I. PRESENT’S S-BOX
paper—flowcharts the suggested RSA algorithm.

TABLE II. AUGMENTATION OF SBOX - S1

TABLE III. AUGMENTATION OF SBOX - S2

The improved techniques applied on research make use of


the concepts of crossover as well as mutation in the genetic
algorithm. In pairs, these crossover regulators are utilized
to transfer genetic information among members of bigger
groupings.

V. RELATED WORK AND PROPOSED METHODOLOGY

Three layers make up the most common and well-known


architectural design. The IoT study was initially conducted
in its infancy. It indicates three levels: application, network,
and perception layer [12].

A. Application Layer

The user interface layer is in charge of making it easier for


consumers to interact with software resources. One
example of this is a smart home app that allows users to
click a button to control appliances like coffee makers. This
layer gives users access to resources that are relevant to
their application, enabling a range of features designed for
Figure 3. Stepwise approaches of process LW RSA Algorithm particular uses such as intelligent houses, intelligent cities,
including smart healthcare.
IV. IMPROVEMENT OF THE PRESENT S BOX
B. Network Layer
A 4-bit S-box is used by the PRESENT cipher and is an
essential part of its non-linear substitute level. This S-box The data which these gadgets gather must be shared and
is usually less in size since it is implemented more stored. This is the responsibility of the network layer. It
effectively than an 8-bit S-box. A table of hexadecimal links these intelligent and smart objects to other intelligent
symbols represents the capabilities of the S-box. Taking out and clever objects. It also includes data transfer in its
plagiarism, let me explain briefly: A small 4-bit S-box is jurisdiction. The network layer connects servers,
used in the non-linear substitution layer of the PRESENT networked gadgets, and smart objects. It is also used for
cipher. This solution is significantly less in size while distribution and analysis of sensor data.
maintaining all of the capabilities of an 8-bit S-box. A
hexadecimal sign table is usually used to indicate how the C. Perception Layer
S-box operates. Desirable s-box successes include
nonlinear behaviour, differential consistency, immune The perception layer is the term used to describe the
correlation, avalanche affecting, and avoidance of fixed or physical layer underlying IoT architecture. It is mostly
anti-fixed locations. This work generates optimized s-boxes made up of embedded systems and sensors that gather a lot
(s-box S1 & S-box S2) with rate of diffusion by designing of data based on requirements. Additionally, this layer
S-boxes using a genetic algorithm. This eliminates an anti- makes it possible for edge devices, detectors, and actuators
fixed-point challenge in the PRESENT s-box. Better s- to communicate with the outside world. It also has the
boxes can be shown in Tables 2 and 3. ability to recognize particular spatial factors and recognize

722

Authorized licensed use limited to: Sri Jayachamarajendra College of Engineering. Downloaded on November 12,2024 at 14:17:54 UTC from IEEE Xplore. Restrictions apply.
2024 International Conference on Communication, Computer Sciences and Engineering (IC3SE)

other intelligent items in the surrounding environment and


Multi-level Architecture as shown as Fig 4.

Both the current technique and lightweight RSA have been


used to perform multi-level encryption on the healthcare
dataset that was gathered from Kaggle. In contrast to the
current approach, which used a 44-bit key, compact RSA
encryption was created using a 64-bit key over three
rounds. The smallest and largest dataset sizes utilized to
determine the complexity of space and time are 3.51 MB
and 27 MB, respectively.
Figure 5. Graph plotting based on LW-RSA Algorithm Vs Present
For key generation, the lightweight RSA technique uses a Algorithm Computational time using Multi level Encryption.
GCD computing unit and a pseudo-random number B. Descriptive Analysis
generator unit. This guarantees the encryption process's
effectiveness and security. The goal of the encryption We used the current approach to determine time complexity
procedure is to protect medical records while keeping time and Lightweight RSA to apply multilevel encryption to a
and space complexity under control. collection of healthcare data.

C. Time complexity comparison between the current


technique and the LWRSA algorithm for large-scale
health care records (27 MB)

TABLE V. TIME COMPLEXITY

Figure 4. Framework of Multi level Architecture

VI. COMPARATIVE RESULTS AND IMPLEMENTATION

Algorithms are used to two distinct sizes of health care


information in accordance with the suggested technique.
The LW RSA comparing results and presented algorithms
in the form of tables and graphs are shown below [13].

A. Comparison of the LWRSA algorithm's and the current


algorithm's time complexity on 3.51 MB of small-scale
healthcare data

TABLE IV. TIME COMPLEXITY

Figure 6. Graph plotting based on LW-RSA Algorithm Vs Present


Algorithm Computational time using Multi level Encryption.

D. Descriptive Analysis

We used the current approach to determine time complexity


and Lightweight RSA to apply multilevel encryption to a
collection of healthcare data [14].

E. Evaluation of LW RSA Algorithms in Comparison

723

Authorized licensed use limited to: Sri Jayachamarajendra College of Engineering. Downloaded on November 12,2024 at 14:17:54 UTC from IEEE Xplore. Restrictions apply.
2024 International Conference on Communication, Computer Sciences and Engineering (IC3SE)

d. GCD Computing and Pseudo-Random Number


Generation (PRNG) - The inclusion of a PRNG unit
enhances the randomness of cryptographic keys,
making them more resistant to brute-force attacks.
The GCD computing unit facilitates the generation
of secure key pairs for asymmetric encryption
algorithms like RSA.These components contribute
to the overall strength of the encryption scheme by
ensuring that cryptographic keys are generated
securely and efficiently [18].

All things considered [19], the Integrated Data Security


Framework, which makes use of multi-level encryption and
lightweight cryptography, offers a thorough method of
protecting sensitive data from misuse and illegal access. By
carefully choosing encryption methods, key lengths, and
F. Evaluation of PRESENT Algorithms in Comparison cryptographic algorithms, it provides a strong defence
mechanism appropriate for safeguarding data in a variety of
settings and applications.

VIII. CONCLUSIONS

According to the results, Lightweight RSA fared quite well


when compared to the current algorithm. Thus, lightweight
RSA can be applied to Internet of Things applications such
as smart cities. Better performance with multi-level
encryption is provided by lightweight RSA. Therefore, for
improved device level security, we can either utilize a
hybrid method or lightweight RSA in a multi-level setup.
In conclusion [20], the Improved Data Security Strategy is
a major step forward in data security, providing businesses
with a flexible and strong way to reduce risks and secure
Three critical sizes of data—570, 2048, and 4096—have sensitive data in the increasingly digital and networked
been gathered. We have worked with moderately sized data world of today. EDSF offers a strong basis for guaranteeing
sets. Applying time complexity to a 2048-bit key results in the privacy, integrity, and accessibility of data across a
a decrease in time [16], whereas applying memory range of applications and contexts by combining
complexity results in an increase in memory size. IoT lightweight cryptography with multi-level encryption [21].
devices, as of now, have little memory.
REFERENCES
VII. SECURITY ANALYSIS
[1] Sharma, Isha, and Monika Saxena. "A Review of Lightweight
To improve data security, the Enhanced Data Security Cryptography Algorithm for Healthcare Using Multi-Level
Framework (EDSF) uses multi-level encryption and Encryption." Available at SSRN 4700912.
[2] Lin, Junyu, et al. "FGDB‐MLPP: A fine‐grained data‐sharing
lightweight cryptography. The purpose of this framework scheme with blockchain based on multi‐level privacy
[17] is to handle the changing risks to data confidentiality protection." IET Communications (2024).
and integrity. This framework's security is examined as [3] Sneha Chaturya, A. "Enhancing Data Security through Innovations
follows: in AES-FBC Encryption and DWT Steganography." International
Journal of Engineering Science and Advanced Technology 24.1
(2024): 43-53.
a. The EDSF is subjected to a thorough security [4] Asaad, Renas Rajab, and Subhi RM Zeebaree. "Enhancing Security
analysis process in order to detect any potential and Privacy in Distributed Cloud Environments: A Review of
weaknesses or vulnerabilities in its design and Protocols and Mechanisms." Academic Journal of Nawroz
University 13.1 (2024): 476-488.
implementation. [5] Padmapriya, Valluri, and Muktevi Srivenkatesh. "IoT Network
based Cyber Attack Mitigation in Digital Twin with Multi Level
b. Threat modelling, evaluations of vulnerabilities, Key Management Using Enhanced KNN Model." International
penetration testing, and adherence to accepted Journal of Intelligent Systems and Applications in
Engineering 12.14s (2024): 49-62.
security norms and best practices are all included in [6] Sami, Teba Mohammed Ghazi, Subhi RM Zeebaree, and Sarkar
this research. Hasan Ahmed. "A Novel Multi-Level Hashing Algorithm to
Enhance Internet of Things Devices’ and Networks’
c. In order to adjust the framework to new dangers and Security." International Journal of Intelligent Systems and
Applications in Engineering 12.1s (2024): 676-696.
weaknesses in the quickly changing cybersecurity [7] Kanani, Pratik, et al. "Lightweight multi-level authentication
world, ongoing monitoring & updates are necessary. scheme for secured data transmission in IoT-Fog context." Journal
of Combinatorial Optimization 45.2 (2023): 59.

724

Authorized licensed use limited to: Sri Jayachamarajendra College of Engineering. Downloaded on November 12,2024 at 14:17:54 UTC from IEEE Xplore. Restrictions apply.
2024 International Conference on Communication, Computer Sciences and Engineering (IC3SE)

[8] Budati, Anil Kumar, et al. "Secure multi-level privacy-protection


scheme for securing private data over 5G-enabled hybrid cloud IoT
networks." Electronics 12.7 (2023): 1638.
[9] K Santhi, Sri. "A COMPARATIVE ANALYSIS ON THE
COMBINED MULTI LEVEL FUNCTIONALITY
FRAMEWORK IN CLOUD ENVIRONMENT WITH
ENHANCED DATA SECURITY LEVELS FOR PRIVACY
PRESERVATION." Journal of Theoretical and Applied Information
Technology 101.9 (2023).
[10] Wu, Wei, et al. "A Secure and Efficient Data Transmission Method
with Multi-level Concealment Function Based on Chaotic
Compressive Sensing." IEEE Sensors Journal (2023).
[11] Lin, Junyu, et al. "FGDB‐MLPP: A fine‐grained data‐sharing
scheme with blockchain based on multi‐level privacy
protection." IET Communications (2024).
[12] Sneha Chaturya, A. "Enhancing Data Security through Innovations
in AES-FBC Encryption and DWT Steganography." International
Journal of Engineering Science and Advanced Technology 24.1
(2024): 43-53.
[13] Aghili, Seyed Farhad, et al. "MLS-ABAC: Efficient multi-level
security attribute-based access control scheme." Future Generation
Computer Systems 131 (2022): 75-90.
[14] Shifa, Amna, et al. "MuLViS: Multi-level encryption based security
system for surveillance videos." IEEE Access 8 (2020): 177131-
177155.
[15] Kanani, Pratik, et al. "PIRAP: Lightweight Multi-Level
Authentication Scheme for Secured Data Transmission in IoT-Fog
Context." International Journal of Cooperative Information
Systems (2022).
[16] Dhall, Sakshi, Saibal K. Pal, and Kapil Sharma. "A chaos-based
multi-level dynamic framework for image encryption." Internet of
Things (IoT) Concepts and Applications (2020): 189-217.
[17] Hasan, Mohammad Kamrul, et al. "Lightweight encryption
technique to enhance medical image security on internet of medical
things applications." IEEE Access 9 (2021): 47731-47742.
[18] K Santhi, Sri. "A COMPARATIVE ANALYSIS ON THE
COMBINED MULTI LEVEL FUNCTIONALITY
FRAMEWORK IN CLOUD ENVIRONMENT WITH
ENHANCED DATA SECURITY LEVELS FOR PRIVACY
PRESERVATION." Journal of Theoretical and Applied Information
Technology 101.9 (2023).
[19] Shifa, Amna, et al. "Fuzzy-logic threat classification for multi-level
selective encryption over real-time video streams." Journal of
Ambient Intelligence and Humanized Computing 11 (2020): 5369-
5397.
[20] Christhu Raja, S., N. Jafer Gani, And Mohammed Uveise. "Three
Level Authentication And Lightweight Encryption For Hybrid
Cloud–Iot Environment." (2021).
[21] A. Durgapal and V. Vimal, “Prediction of Stock Price Using
Statistical and Ensemble learning Models: A Comparative Study,”
2021 IEEE 8th Uttar Pradesh Section International Conference on
Electrical, Electronics and Computer Engineering, UPCON 2021,
2021, doi: 10.1109/UPCON52273.2021.9667644.
[22] V. Vimal, T. Singh, S. Qamar, B. Nautiyal, K. Udham Singh, and A.
Kumar, “Artificial intelligence-based novel scheme for location
area planning in cellular networks,” Comput Intell, vol. 37, no. 3,
pp. 1338–1354, Aug. 2021, doi: 10.1111/COIN.12371.

725

Authorized licensed use limited to: Sri Jayachamarajendra College of Engineering. Downloaded on November 12,2024 at 14:17:54 UTC from IEEE Xplore. Restrictions apply.

You might also like