scholarly journals Combination of Hiding and Encryption for Data Security

Author(s):  
Ibtisam A. Aljazaery ◽  
Haider Th. Salim Alrikabi ◽  
Mustafa Rabea Aziz

<pre>One of the techniques used in information security is the concealment technique, where the information to be hidden within another information medium to be saved in the process of messaging between two sides without detection. In this paper, an algorithm was proposed to conceal and encrypt data using several means.in order to ensure its preservation from detection and hackers. Wavelet transformer was used to change the shape of a wave of information (one and two-dimensional data) and its different mathematical formulas. Two sets of data were used, the first group used in a hidden process. The second group was considered as a means of both embedding and encryption.  The data in the second group is reduced to the extent of sufficient for the modulation process, by extracting its high-value properties and then removing them from the mother's information wave. The process of encrypting of the two sets of data comes together using an exponential function. The result is undetectable information signals. Algorithms were built to hide and encrypt one and two-dimensional data. High-security signals and images were obtained. Decryption algorithms were built to return encrypted data to their original forms, and getting the replica data.</pre><p> </p>

TEKNOKOM ◽  
2021 ◽  
Vol 4 (1) ◽  
pp. 1-6
Author(s):  
Indra Surya Permana ◽  
Taufik Hidayat ◽  
Rahutomo Mahardiko

The development of information technology has grown exponentially and various of data collections and its method has been obtained. In the era of big data, data has now become an asset that held important values, while in the implementation of data delivery, it clearly is not always safe. One of the method to secure data delivery is data encryption using Cryptography. Cryptography provides an encryption service to secure data delivery by transforming it to random values so that it can no longer be read. The goal in this study was to produce an application that could be used to encrypt data, using ElGamal's cryptography method and hash checking using the SHA256 algorithm. After encryption, to ensure the encrypted data is still the original data without any changes or manipulation by unauthorized 3rd party then done by checking the hash generated using SHA256 algorithm. The data used in this study was a sample of raw data from the ATPWTP survey (ability to pay and willing to pay) conducted by the BPS Cirebon (Central Statistics) in 2019 and the data was in the form of Excel and txt files. The encryption process resulted in a cipher larger than the plaintext and takes longer for the data encryption process than during the data cipher decryption process.


2019 ◽  
Vol 13 (4) ◽  
pp. 356-363
Author(s):  
Yuezhong Wu ◽  
Wei Chen ◽  
Shuhong Chen ◽  
Guojun Wang ◽  
Changyun Li

Background: Cloud storage is generally used to provide on-demand services with sufficient scalability in an efficient network environment, and various encryption algorithms are typically applied to protect the data in the cloud. However, it is non-trivial to obtain the original data after encryption and efficient methods are needed to access the original data. Methods: In this paper, we propose a new user-controlled and efficient encrypted data sharing model in cloud storage. It preprocesses user data to ensure the confidentiality and integrity based on triple encryption scheme of CP-ABE ciphertext access control mechanism and integrity verification. Moreover, it adopts secondary screening program to achieve efficient ciphertext retrieval by using distributed Lucene technology and fine-grained decision tree. In this way, when a trustworthy third party is introduced, the security and reliability of data sharing can be guaranteed. To provide data security and efficient retrieval, we also combine active user with active system. Results: Experimental results show that the proposed model can ensure data security in cloud storage services platform as well as enhance the operational performance of data sharing. Conclusion: The proposed security sharing mechanism works well in an actual cloud storage environment.


2021 ◽  
Vol 5 (1) ◽  
Author(s):  
Ning Zhao ◽  
Udo Schwingenschlögl

AbstractUtilizing a two-dimensional material in an electronic device as channel layer inevitably involves the formation of contacts with metallic electrodes. As these contacts can dramatically affect the behavior of the device, we study the electronic properties of monolayer Janus MoSSe in contact with different metallic electrodes by first-principles calculations, focusing on the differences in the characteristics of contacts with the two sides of MoSSe. In particular, we demonstrate that the Fermi level pinning is different for the two sides of MoSSe, with the magnitude resembling that of MoS2 or MoSe2, while both sides can form Ohmic contacts with common electrode materials without any further adaptation, which is an outstanding advantage over MoS2 and MoSe2.


Nanoscale ◽  
2021 ◽  
Author(s):  
Yinqiao Liu ◽  
Qinxi Liu ◽  
Ying Liu ◽  
Xue Jiang ◽  
Xiaoliang Zhang ◽  
...  

The contributions of spin-phonon coupling (SPC) to spin and thermal transport properties are important in the emerging two-dimensional (2D) magnetic semiconductors and are relevant for the data security and working...


Geophysics ◽  
1966 ◽  
Vol 31 (2) ◽  
pp. 372-397 ◽  
Author(s):  
L. P. Geldart ◽  
Denis E. Gill ◽  
Bijon Sharma

A simplified formula is given for the gravity effect of a horizontal semi‐infinite block truncated by a dipping plane. This formula is used to obtain curves illustrating the gravity anomalies for blocks having different thicknesses and depths truncated by planes dipping at various angles. By combining two blocks, results are obtained for faulted horizontal beds for a wide range of bed thicknesses and depths, fault displacements and dips. These should be useful as guides in interpreting fault anomalies, and in planning gravity programs intended to map faults. The most striking feature of the curves is the marked effect of the dip of the fault plane on the curves for faulted beds. The asymmetry of the fault curves is related mainly to the dip and can be used to determine dips between 30 and 90 degrees. If the dip of the fault, density contrast, and bed thickness are known, the depths to the bed on the two sides of the fault are given by the sizes and positions of the gravity maximum and minimum.


2021 ◽  
Vol 5 (4) ◽  
pp. 53-60
Author(s):  
Daniel Gurgul ◽  
Andriy Burbelko ◽  
Tomasz Wiktor

This paper presents a new proposition on how to derive mathematical formulas that describe an unknown Probability Density Function (PDF3) of the spherical radii (r3) of particles randomly placed in non-transparent materials. We have presented two attempts here, both of which are based on data collected from a random planar cross-section passed through space containing three-dimensional nodules. The first attempt uses a Probability Density Function (PDF2) the form of which is experimentally obtained on the basis of a set containing two-dimensional radii (r2). These radii are produced by an intersection of the space by a random plane. In turn, the second solution also uses an experimentally obtained Probability Density Function (PDF1). But the form of PDF1 has been created on the basis of a set containing chord lengths collected from a cross-section.The most important finding presented in this paper is the conclusion that if the PDF1 has proportional scopes, the PDF3 must have a constant value in these scopes. This fact allows stating that there are no nodules in the sample space that have particular radii belonging to the proportional ranges the PDF1.


2021 ◽  
Vol 6 (2) ◽  
Author(s):  
Iyos Rosidin Pajar

The issue of data security seems to be one of the most intriguing topics to observe in the development of information technology in recent time/. The information technology related to the management processes, one of which is the SIMAK application at   the University of Siliwangi needs a higher security concern. This study aims to determine the level of security of the SIMAK application in which the researchers can provide recommendations to SIMAK managers. This could be the basis for the future improvements. Researchers used 4 domains from ISO / IEC 27002: 2013, namely domain 5, it contains information security policies. Domain 6, it contains organizational information security. Domain 9, it contains access control. Lastly, Domain 11, it contains physical and environmental security.  When they are specified from the four domains, 38 controls are obtained. Security, from the results of the questionnaire and weighting, the result of the 5 domains maturity value is= 1.49, the result of the domain 6 maturity value is= 1.52, while domain 9 maturity value is= 1.32 and domain 11 maturity value constitute to 1.97.  If it is averaged,  the Siliwangi University SIMAK application is at level 2 or repeatable.


Author(s):  
Hicham Amellal ◽  
Abdelmajid Meslouhi ◽  
Abderahim El Allati ◽  
Annas El Haddadi

With the advancement of communication and information technology, the internet has become used as a platform for computing and not only a way of communications networks. Accordingly, the large spread of cloud computing led to the emergence of different privacy implications and data security complexities. In order to enhance data security in the cloud, the authors propose in this chapter the use of an encryption box, which includes different cryptosystems. In fact, this step gives the user the opportunities to encrypt data with an unknown algorithm and makes a private key before the storage of data in the host company servers. Moreover, to manage the encryption database, the authors propose a quantum approach in search based on Grover's algorithm.


Author(s):  
Navin Jambhekar ◽  
Chitra Anil Dhawale

Information security is a prime goal for every individual and organization. The travelling from client to cloud server can be prone to security issues. The big data storages are available through cloud computing system to facilitate mobile client. The information security can be provided to mobile client and cloud technology with the help of integrated parallel and distributed encryption and decryption mechanism. The traditional technologies include the plaintext stored across cloud and can be prone to security issues. The solution provided by applying the encrypted data upload and encrypted search. The clouds can work in collaboration; therefore, the encryption can also be done in collaboration. Some part of encryption handle by client and other part handled by cloud system. This chapter presents the security scenario of different security algorithms and the concept of mobile and cloud computing. This chapter precisely defines the security features of existing cloud and big data system and provides the new framework that helps to improve the data security over cloud computing and big data security system.


Author(s):  
Nasim Talebi ◽  
Emmanuel Ayaburi ◽  
Suhail Chakravarty

Driven by the difficulty in achieving complete security with technical tools, business investigators are looking into organizational and behavioral issues that could help make systems more secure. This chapter looks at the security of systems from the organizational perspective. Specifically, this study attempts to identify if different organizations have different predisposition to particular type(s) of security threat sources. Using publicly available security breach data from a privacy rights clearinghouse to investigate which organizational characteristics predisposes an institution to an external or internal threat source, it was concluded that as size of organization and the number of its valuable documents increase by one unit, the organization's probability of suffering an internal attacks decrease. Furthermore, when executive members have a business degree rather than information-security-related degrees, the likelihood of suffering an internal attack increases. Also, the probability of an organization suffering an internal or external attack is not based on its industry type.


Sign in / Sign up

Export Citation Format

Share Document