Analytical Framework of Cloud Homomorphic Encryption / Cryptographic Logic Obfuscation for Cyber Health Hygiene

Akhigbe-mudu Thursday Ehis
{"title":"Analytical Framework of Cloud Homomorphic Encryption / Cryptographic Logic Obfuscation for Cyber Health Hygiene","authors":"Akhigbe-mudu Thursday Ehis","doi":"10.56556/jtie.v1i2.134","DOIUrl":null,"url":null,"abstract":"Hacking and the resulting disaster have become so dangerous that developers and organizations are taking extra precautions to reduce their incidence and impact. A drift is any gap between the code and the cloud. Ad hoc adjustments can, of course, result in environment instability, deployment challenges, unpredictably high costs, and security or compliance gaps. The risk of configuration drift becoming a permanent fixture is one of the most important considerations on this study. One such strategic strategy to mitigate these behaviors and render it unavailable to tracking, interpretation, and use by hackers is logic obfuscation. This study presents two strategies for combating piracy and overbuilding attacks. First, the proposed algorithms, then the logic obfuscation develop to hide the functionality and implementation of a design by inserting gates onto the original design. The attackers can use circuit extraction from the gate-level netlist but they won’t be able to deduce the obfuscated logic functions. As a result, the proposed obfuscation technique in this brief not only resists image processing but also incurs low area and power overhead.","PeriodicalId":29809,"journal":{"name":"Journal of Technology Innovations and Energy","volume":"9 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2022-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Technology Innovations and Energy","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.56556/jtie.v1i2.134","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Hacking and the resulting disaster have become so dangerous that developers and organizations are taking extra precautions to reduce their incidence and impact. A drift is any gap between the code and the cloud. Ad hoc adjustments can, of course, result in environment instability, deployment challenges, unpredictably high costs, and security or compliance gaps. The risk of configuration drift becoming a permanent fixture is one of the most important considerations on this study. One such strategic strategy to mitigate these behaviors and render it unavailable to tracking, interpretation, and use by hackers is logic obfuscation. This study presents two strategies for combating piracy and overbuilding attacks. First, the proposed algorithms, then the logic obfuscation develop to hide the functionality and implementation of a design by inserting gates onto the original design. The attackers can use circuit extraction from the gate-level netlist but they won’t be able to deduce the obfuscated logic functions. As a result, the proposed obfuscation technique in this brief not only resists image processing but also incurs low area and power overhead.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
网络健康卫生云同态加密/密码逻辑混淆分析框架
黑客攻击和由此产生的灾难已经变得非常危险,开发人员和组织正在采取额外的预防措施来减少其发生率和影响。漂移是代码和云之间的任何间隙。当然,特别的调整可能会导致环境不稳定、部署挑战、不可预测的高成本以及安全性或遵从性差距。结构漂移成为永久固定装置的风险是本研究中最重要的考虑因素之一。减轻这些行为并使其无法被黑客跟踪、解释和使用的一种策略是逻辑混淆。本研究提出了打击海盗和过度建造攻击的两种策略。首先,提出算法,然后开发逻辑混淆,通过在原始设计上插入门来隐藏设计的功能和实现。攻击者可以从门级网表中提取电路,但无法推断出被混淆的逻辑函数。因此,本文提出的混淆技术不仅可以抵抗图像处理,而且面积和功耗都很低。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Journal of Technology Innovations and Energy
Journal of Technology Innovations and Energy Social Sciences and Management Studies-
自引率
0.00%
发文量
0
期刊介绍: Journal of Technology Innovations and Energy aims to report the latest developments and share knowledge on the various topics related to innovative technologies in energy and environment.
期刊最新文献
Cyber Security and Digital Economy: Opportunities, Growth and Challenges Performance Assessment of Affordable Solar Dehydrator for Sustainable Energy Teacher Education for National Development Using Google Meet: Issues and Prospects Digital Competence as Predictor for the Motivation to Use Artificial Intelligence Technologies among Librarians in Edo and Delta States, Nigeria Sustainable Financial Technology through Regulation Technology: The Asian Experience
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1