Design of a Cloud-Based Decryption Architecture for Malicious Information
DOI: 10.23977/jeis.2025.100113 | Downloads: 7 | Views: 458
Author(s)
Kunpeng Cao 1, Leyi Zhang 1, Guobing Jiang 2
Affiliation(s)
1 State Key Laboratory of Mobile Network and Mobile Multimedia Technology, Shenzhen, 518055, China
2 ZTE Corporation, Nanjing, 210012, China
Corresponding Author
Kunpeng CaoABSTRACT
Network security protection focuses on ensuring the confidentiality, integrity, and availability of protected assets. Encryption is always the core technology to protect asset confidentiality, and encryption files can be decrypted mostly by using decryption keys. With the advancement of encryption technologies, attackers also skillfully utilize the inherent characteristics of encryption algorithms, which are difficult to crack. They transmit illegal and malicious information in a concealed manner and spread it extensively across the Internet. Nowadays, the traditional protection means are often misused by attackers to disseminate harmful information. This raises significant concerns about how to mitigate the negative impact of storing and transmitting illegal information on both organizations and society as a whole, which is a pressing issue in the field of cybersecurity. In light of the growing use of cloud computing technology, this paper proposes an architectural solution to efficiently decrypt illegal and malicious information, and interprets the business flow, which provides a new direction for entities to share decryption tools and techniques to the maximum extent.
KEYWORDS
Encrypted Malicious Information, Cloud Architecture, Decryption As A ServiceCITE THIS PAPER
Kunpeng Cao, Leyi Zhang, Guobing Jiang, Design of a Cloud-Based Decryption Architecture for Malicious Information. Journal of Electronics and Information Science (2025) Vol. 10: 97-102. DOI: http://dx.doi.org/10.23977/10.23977/jeis.2025.100113.
REFERENCES
[1] J. Liu, M. D. Ryan and L. Chen, "Balancing Societal Security and Individual Privacy: Accountable Escrow System," 2014 IEEE 27th Computer Security Foundations Symposium, Vienna, Austria, 2014, pp. 427-440, doi: 10.1109/CSF.2014.37.
[2] https://www.databreachtoday.asia/strong-crypto-policing-eu-again-debates-encryption-a-15392
[3] S. Yoon, J. Jeong, H. Jeong and Y. Won, "Lawful Interception Scheme for Secure VoIP Communications Using TTP," International Symposium on Computer Science and its Applications, Hobart, TAS, Australia, 2008, pp. 149-152, doi: 10.1109/CSA.2008.31.
[4] P. Bharadwaj, H. Pal and B. Narwal, "Proposing a Key Escrow Mechanism for Real-Time access to End-to-End encryption systems in the Interest of Law Enforcement," 2018 3rd International Conference on Contemporary Computing and Informatics (IC3I), Gurgaon, India, 2018, pp. 233-237, doi: 10.1109/IC3I44769.2018.9007301.
[5] G. Ungaro, F. Ricchitelli, I. Huso, G. Piro and G. Boggia, "Design and Implementation of a Lawful Interception Architecture for B5G Systems Based on Key Escrow," 2022 IEEE Conference on Standards for Communications and Networking (CSCN), Thessaloniki, Greece, 2022, pp. 207-207, doi: 10.1109/CSCN57023.2022.10050895.
[6] Christian Lindenmeier, Andreas Hammer, Jan Gruber, Jonas Röckl, Felix Freiling,Key extraction-based lawful access to encrypted data: Taxonomy and survey, Forensic Science International:Digital Investigation,Volume 50,2024,301796,ISSN 2666-2817,https://doi.org/10.1016/j.fsidi.2024.301796.
[7] K. Hausknecht, D. Foit and J. Burić, "RAM data significance in digital forensics," 2015 38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), Opatija, Croatia, 2015, pp. 1372-1375, doi: 10.1109/MIPRO.2015.7160488.
[8] https://www.tandfonline.com/doi/full/10.1080/14782804.2021.1995707?scroll=top&needAccess=true#abstract
[9] https://www.europol.europa.eu/media-press/newsroom/news/no-more-ransom-law-enforcement-and-it-security-companies-join-forces-to-fight-ransomware
[10] https://www.nomoreransom.org/en/decryption-tools.html
Downloads: | 12710 |
---|---|
Visits: | 493279 |
Sponsors, Associates, and Links
-
Information Systems and Signal Processing Journal
-
Intelligent Robots and Systems
-
Journal of Image, Video and Signals
-
Transactions on Real-Time and Embedded Systems
-
Journal of Electromagnetic Interference and Compatibility
-
Acoustics, Speech and Signal Processing
-
Journal of Power Electronics, Machines and Drives
-
Journal of Electro Optics and Lasers
-
Journal of Integrated Circuits Design and Test
-
Journal of Ultrasonics
-
Antennas and Propagation
-
Optical Communications
-
Solid-State Circuits and Systems-on-a-Chip
-
Field-Programmable Gate Arrays
-
Vehicular Electronics and Safety
-
Optical Fiber Sensor and Communication
-
Journal of Low Power Electronics and Design
-
Infrared and Millimeter Wave
-
Detection Technology and Automation Equipment
-
Journal of Radio and Wireless
-
Journal of Microwave and Terahertz Engineering
-
Journal of Communication, Control and Computing
-
International Journal of Surveying and Mapping
-
Information Retrieval, Systems and Services
-
Journal of Biometrics, Identity and Security
-
Journal of Avionics, Radar and Sonar