The SWT provides joint multimedia encryption and compression by two modifications To as the secure wavelet transform (SWT). We propose a light-weight multimedia encryption strategy based on a modified discrete wavelet transform (DWT) which we refer PartialĪnd selective encryption schemes have been proposed in the research literature, but these schemes significantly increase theĬomputation cost leading to tradeoffs in system latency, throughput, hardware requirements and power usage. There has been an increasing concern for the security of multimedia transactions over real-time embedded systems. In particular, we show that the parallelization of the two-dimensional fast wavelet transform for the NVIDIA Tesla C870 achieves a speedup of 20.8 for an image size of 8192times8192, when compared with the fastest host-only version implementation using OpenMP and including the data transfers between main memory and device memory. In this paper we try to provide some insight into the peculiarities of CUDA in order to target scientific computing by means of a specific example. The bottom line is a multicore platform which provides an enormous potential performance benefit driven by a non-traditional programming model. They are based on the Computed Unified Device Architecture (CUDA) which is common to the latest NVIDIA GPUs. These cards intended for general-purpose computing on graphic processing units (GPGPUs) are used as data-parallel computing devices. There is a multicore platform that is currently concentrating an enormous attention due to its tremendous potential in terms of sustained performance: the NVIDIA Tesla boards. Our softwares cover the necessary security service from edge devices to servers in edge computing services and they can be easily used for various types of edge computing devices because they are all web-based applications. In addition, since it may be vulnerable to cache-timing attack, it is safely operated by applying the previously existing studied T-table shuffling method. In addition, the input value 16-byte is processed in parallel and calculated. TweAES-128 and TweAES-128-6, which have the same structure as AES algorithm, can apply the previously existing studied T-table method. In addition, OpenCL operates by moving the data to be encrypted to the local memory because the local memory has a high operation speed. We eliminated the conditional statement using the loop unrolling method to eliminate the performance degradation. In addition, when implementing with OpenCL, using conditional statements causes performance degradation. For efficiency on server side, we make use of OpenCL which is parallel computing framework in order to process a number of data simultaneously. ESTATE implemented as Web Assembly is measured in web browsers Chrome, FireFox, and Microsoft Edge. The measured results of the ESTATE algorithm implemented with Web Assembly and the reference C/C++ ESTATE algorithm are compared. To eliminate this unnecessary process, we use a method of expanding and storing the tweak value through pre-computation. We use conditional statements to XOR the extended tweak values during the operation of the ESTATE algorithm. Several methods are applied to efficiently operate the ESTATE algorithm. It also implements the ESTATE algorithm using Web Assembly for efficient use on edge devices, and optimizes the performance of the algorithm using the properties of the underlying block cipher. Our softwares make use of ESTATE (Energy efficient and Single-state Tweakable block cipher based MAC-Then-Encrypt)algorithm, which is a promising candidate of NIST LWC (National Institute of Standards and Technology LightWeight Cryptography) competition and it provides not only data confidentiality but also data authentication. Our softwares are basically web-based application because of its universality where the softwares can be executed on any web browsers. In this paper, we present two versions of security software which can be used on edge device side and server side for secure communication between them in edge computing environment. Actually, the confidentiality and integrity of data are essential for secure communication. terminal devices), the cryptographic operation needs to be optimized on both server side and edge device side. edge devices) are responsible for encrypting or decrypting a large amount of data from edge devices (resp. Furthermore, the application servers (resp. Since a large portion of communication in edge computing services are conducted in wireless, the transmitted data needs to be properly encrypted. In edge computing service, edge devices collect data from a number of embedded devices, like sensors, CCTVs (Closed-circuit Television), and so on, and communicate with application servers.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |