Neha Kaliya - Academia.edu (original) (raw)
Papers by Neha Kaliya
IGI Global eBooks, 2021
Data privacy is now-a-days a special issue in era of Internet of Things because of thebigdatastor... more Data privacy is now-a-days a special issue in era of Internet of Things because of thebigdatastoredandtransmittedbythepublic/privatedevices.Differenttypesand levelsofprivacycanbeprovidedatdifferentlayersofIoTarchitecture,alsodifferent mechanismsoperateatdifferentlayersofIoTarchitecture.Thisarticlepresentsthe workbeingdonetowardsthedesignofagenericframeworktointegratetheseprivacy preservingmechanismsatdifferentlayersofIoTarchitectureandcanensureprivacy preservationinaheterogeneousIoTenvironment.Thedataisclassifiedintodifferent levels of secrecy and appropriate rules and mechanisms are applied to ensure this privacy.Theproposedframeworkisimplementedandevaluatedforitsperformance withsecurityandexecutiontimeorprimaryparameters.Variousscenariosarealso evaluated,andacomparisonisdonewithanexistingmechanismABE(AttributeBased Encryption). It has been found that the proposed work takes less time and is more secureduetoshortkeylengthandrandomnessoftheparametersusedinencryption algorithm.
Lecture notes in networks and systems, 2023
Rising technologies as wireless technologies, Sensing technologies and Communication technologies... more Rising technologies as wireless technologies, Sensing technologies and Communication technologies transformed the Internet into an integrated network of things termed as Internet-of-Things (IoT). IoT is a network of things connected over by Internet, all the pros and cons of internet are also inherited to IoT applications. Hence, security and privacy of user data is a serious issue in IoT. In this paper, we proposed a mechanism that classifies data into a structural format based on its origin and user and access control lists are created. Using the classification of data and access control lists, data is secured to ensure privacy of data.
International Journal of Information Security and Privacy
Data privacy is now-a-days a special issue in era of Internet of Things because of the big data s... more Data privacy is now-a-days a special issue in era of Internet of Things because of the big data stored and transmitted by the public/private devices. Different types and levels of privacy can be provided at different layers of IoT architecture, also different mechanisms operate at different layers of IoT architecture. This article presents the work being done towards the design of a generic framework to integrate these privacy preserving mechanisms at different layers of IoT architecture and can ensure privacy preservation in a heterogeneous IoT environment. The data is classified into different levels of secrecy and appropriate rules and mechanisms are applied to ensure this privacy. The proposed framework is implemented and evaluated for its performance with security and execution time or primary parameters. Various scenarios are also evaluated, and a comparison is done with an existing mechanism ABE (Attribute Based Encryption). It has been found that the proposed work takes less...
In the past years, a large number of proposals have turned up to execute electronic payments over... more In the past years, a large number of proposals have turned up to execute electronic payments over internet securely. Electronic-commerce payments need to be more secure. Among all these proposals, SSL/TLS and SET are being installed world-widely for online credit card payments to be done securely. SSL protocol, due to its optional client authentication phase does not eliminate non-repudiation and thus merchant can also store delicate information of cardholder. SET ensures payment integrity, confidentiality and authentication of merchants and cardholders but at the same time, it is inefficient due to its complexity and overheads. Also, due to distribution of digital certificates and rules for client software installation, it is difficult to avoid and manage non-repudiation. Based on our study of SSL/TLS and SET, we proposed an upgraded version of SET protocol. It uses a highly secure session key sharing mechanism to ensure at most confidentiality, at the same time it ensures authenti...
NCCSIGMA-16, 2016
In the past years, a large number of proposals have turned up to execute electronic payments over... more In the past years, a large number of proposals have turned up to execute electronic payments over internet securely. Electronic-commerce payments need to be more secure. Among all these proposals, SSL/TLS and SET are being installed world-widely for online credit card payments to be done securely. SSL protocol, due to its optional client authentication phase does not eliminate non-repudiation and thus merchant can also store delicate information of cardholder. SET ensures payment integrity, confidentiality and authentication of merchants and cardholders but at the same time, it is inefficient due to its complexity and overheads. Also, due to distribution of digital certificates and rules for client software installation, it is difficult to avoid and manage non-repudiation. Based on our study of SSL/TLS and SET, we proposed an upgraded version of SET protocol. It uses a highly secure session key sharing mechanism to ensure at most confidentiality, at the same time it ensures authenticity of the entities, integrity and also avoids non-repudiation. The proposed protocol make sure of enhanced security at a lower computational and storage costs.
IGI Global eBooks, 2021
Data privacy is now-a-days a special issue in era of Internet of Things because of thebigdatastor... more Data privacy is now-a-days a special issue in era of Internet of Things because of thebigdatastoredandtransmittedbythepublic/privatedevices.Differenttypesand levelsofprivacycanbeprovidedatdifferentlayersofIoTarchitecture,alsodifferent mechanismsoperateatdifferentlayersofIoTarchitecture.Thisarticlepresentsthe workbeingdonetowardsthedesignofagenericframeworktointegratetheseprivacy preservingmechanismsatdifferentlayersofIoTarchitectureandcanensureprivacy preservationinaheterogeneousIoTenvironment.Thedataisclassifiedintodifferent levels of secrecy and appropriate rules and mechanisms are applied to ensure this privacy.Theproposedframeworkisimplementedandevaluatedforitsperformance withsecurityandexecutiontimeorprimaryparameters.Variousscenariosarealso evaluated,andacomparisonisdonewithanexistingmechanismABE(AttributeBased Encryption). It has been found that the proposed work takes less time and is more secureduetoshortkeylengthandrandomnessoftheparametersusedinencryption algorithm.
Lecture notes in networks and systems, 2023
Rising technologies as wireless technologies, Sensing technologies and Communication technologies... more Rising technologies as wireless technologies, Sensing technologies and Communication technologies transformed the Internet into an integrated network of things termed as Internet-of-Things (IoT). IoT is a network of things connected over by Internet, all the pros and cons of internet are also inherited to IoT applications. Hence, security and privacy of user data is a serious issue in IoT. In this paper, we proposed a mechanism that classifies data into a structural format based on its origin and user and access control lists are created. Using the classification of data and access control lists, data is secured to ensure privacy of data.
International Journal of Information Security and Privacy
Data privacy is now-a-days a special issue in era of Internet of Things because of the big data s... more Data privacy is now-a-days a special issue in era of Internet of Things because of the big data stored and transmitted by the public/private devices. Different types and levels of privacy can be provided at different layers of IoT architecture, also different mechanisms operate at different layers of IoT architecture. This article presents the work being done towards the design of a generic framework to integrate these privacy preserving mechanisms at different layers of IoT architecture and can ensure privacy preservation in a heterogeneous IoT environment. The data is classified into different levels of secrecy and appropriate rules and mechanisms are applied to ensure this privacy. The proposed framework is implemented and evaluated for its performance with security and execution time or primary parameters. Various scenarios are also evaluated, and a comparison is done with an existing mechanism ABE (Attribute Based Encryption). It has been found that the proposed work takes less...
In the past years, a large number of proposals have turned up to execute electronic payments over... more In the past years, a large number of proposals have turned up to execute electronic payments over internet securely. Electronic-commerce payments need to be more secure. Among all these proposals, SSL/TLS and SET are being installed world-widely for online credit card payments to be done securely. SSL protocol, due to its optional client authentication phase does not eliminate non-repudiation and thus merchant can also store delicate information of cardholder. SET ensures payment integrity, confidentiality and authentication of merchants and cardholders but at the same time, it is inefficient due to its complexity and overheads. Also, due to distribution of digital certificates and rules for client software installation, it is difficult to avoid and manage non-repudiation. Based on our study of SSL/TLS and SET, we proposed an upgraded version of SET protocol. It uses a highly secure session key sharing mechanism to ensure at most confidentiality, at the same time it ensures authenti...
NCCSIGMA-16, 2016
In the past years, a large number of proposals have turned up to execute electronic payments over... more In the past years, a large number of proposals have turned up to execute electronic payments over internet securely. Electronic-commerce payments need to be more secure. Among all these proposals, SSL/TLS and SET are being installed world-widely for online credit card payments to be done securely. SSL protocol, due to its optional client authentication phase does not eliminate non-repudiation and thus merchant can also store delicate information of cardholder. SET ensures payment integrity, confidentiality and authentication of merchants and cardholders but at the same time, it is inefficient due to its complexity and overheads. Also, due to distribution of digital certificates and rules for client software installation, it is difficult to avoid and manage non-repudiation. Based on our study of SSL/TLS and SET, we proposed an upgraded version of SET protocol. It uses a highly secure session key sharing mechanism to ensure at most confidentiality, at the same time it ensures authenticity of the entities, integrity and also avoids non-repudiation. The proposed protocol make sure of enhanced security at a lower computational and storage costs.