Education, Science, Technology, Innovation and Life
Open Access
Sign In

Design of a Cloud-Based Decryption Architecture for Malicious Information

Download as PDF

DOI: 10.23977/jeis.2025.100113 | Downloads: 7 | Views: 458

Author(s)

Kunpeng Cao 1, Leyi Zhang 1, Guobing Jiang 2

Affiliation(s)

1 State Key Laboratory of Mobile Network and Mobile Multimedia Technology, Shenzhen, 518055, China
2 ZTE Corporation, Nanjing, 210012, China

Corresponding Author

Kunpeng Cao

ABSTRACT

Network security protection focuses on ensuring the confidentiality, integrity, and availability of protected assets. Encryption is always the core technology to protect asset confidentiality, and encryption files can be decrypted mostly by using decryption keys. With the advancement of encryption technologies, attackers also skillfully utilize the inherent characteristics of encryption algorithms, which are difficult to crack. They transmit illegal and malicious information in a concealed manner and spread it extensively across the Internet. Nowadays, the traditional protection means are often misused by attackers to disseminate harmful information. This raises significant concerns about how to mitigate the negative impact of storing and transmitting illegal information on both organizations and society as a whole, which is a pressing issue in the field of cybersecurity. In light of the growing use of cloud computing technology, this paper proposes an architectural solution to efficiently decrypt illegal and malicious information, and interprets the business flow, which provides a new direction for entities to share decryption tools and techniques to the maximum extent.

KEYWORDS

Encrypted Malicious Information, Cloud Architecture, Decryption As A Service

CITE THIS PAPER

Kunpeng Cao, Leyi Zhang, Guobing Jiang, Design of a Cloud-Based Decryption Architecture for Malicious Information. Journal of Electronics and Information Science (2025) Vol. 10: 97-102. DOI: http://dx.doi.org/10.23977/10.23977/jeis.2025.100113.

REFERENCES

[1] J. Liu, M. D. Ryan and L. Chen, "Balancing Societal Security and Individual Privacy: Accountable Escrow System," 2014 IEEE 27th Computer Security Foundations Symposium, Vienna, Austria, 2014, pp. 427-440, doi: 10.1109/CSF.2014.37.
[2] https://www.databreachtoday.asia/strong-crypto-policing-eu-again-debates-encryption-a-15392
[3] S. Yoon, J. Jeong, H. Jeong and Y. Won, "Lawful Interception Scheme for Secure VoIP Communications Using TTP," International Symposium on Computer Science and its Applications, Hobart, TAS, Australia, 2008, pp. 149-152, doi: 10.1109/CSA.2008.31. 
[4] P. Bharadwaj, H. Pal and B. Narwal, "Proposing a Key Escrow Mechanism for Real-Time access to End-to-End encryption systems in the Interest of Law Enforcement," 2018 3rd International Conference on Contemporary Computing and Informatics (IC3I), Gurgaon, India, 2018, pp. 233-237, doi: 10.1109/IC3I44769.2018.9007301. 
[5] G. Ungaro, F. Ricchitelli, I. Huso, G. Piro and G. Boggia, "Design and Implementation of a Lawful Interception Architecture for B5G Systems Based on Key Escrow," 2022 IEEE Conference on Standards for Communications and Networking (CSCN), Thessaloniki, Greece, 2022, pp. 207-207, doi: 10.1109/CSCN57023.2022.10050895. 
[6] Christian Lindenmeier, Andreas Hammer, Jan Gruber, Jonas Röckl, Felix Freiling,Key extraction-based lawful access to encrypted data: Taxonomy and survey, Forensic Science International:Digital Investigation,Volume 50,2024,301796,ISSN 2666-2817,https://doi.org/10.1016/j.fsidi.2024.301796.
[7] K. Hausknecht, D. Foit and J. Burić, "RAM data significance in digital forensics," 2015 38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), Opatija, Croatia, 2015, pp. 1372-1375, doi: 10.1109/MIPRO.2015.7160488. 
[8] https://www.tandfonline.com/doi/full/10.1080/14782804.2021.1995707?scroll=top&needAccess=true#abstract
[9] https://www.europol.europa.eu/media-press/newsroom/news/no-more-ransom-law-enforcement-and-it-security-companies-join-forces-to-fight-ransomware
[10] https://www.nomoreransom.org/en/decryption-tools.html

Downloads: 12710
Visits: 493279

Sponsors, Associates, and Links


All published work is licensed under a Creative Commons Attribution 4.0 International License.

Copyright © 2016 - 2031 Clausius Scientific Press Inc. All Rights Reserved.