Secure data encryption key scenario for protecting private data security and privacy

被引:0
|
作者
Mandal, Sanjeev Kumar [1 ]
Sharma, Amit [2 ]
Henge, Santosh Kumar [3 ]
Bashir, Sumaira [2 ]
Shukla, Madhuresh [2 ]
Pathak, Asim Tara [4 ]
机构
[1] Jain, Dept Comp Sci & Engn & Informat Technol, Bangalore, Karnataka, India
[2] Lovely Profess Univ, Dept Comp Applicat, Phagwara, Punjab, India
[3] KL Univ, Koneru Lakshmaiah Educ Fdn, Dept Comp Sci & Engn, Vaddeswaram, Andhra Pradesh, India
[4] MDR, Dept MDR Threat Anal, Bangalore, India
关键词
Cyber threats (CA); Advanced encryption standard (AES); Personal information (PI); Proactive measures (PAM); Sensitive information (SI); Internet of Things (IoT);
D O I
10.47974/JDMSC-1881
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Cryptography, specifically encryption, plays a pivotal role in protecting data from unauthorized access. However, not all encryption methods are equally effective, as some exhibit vulnerabilities. This research proposing a novel encryption method that builds upon established techniques to enhance data security. The proposed method combines the strengths of the Festial encryption method and the Advanced Encryption Standard (AES) to create an algorithm that exhibits superior resistance against attacks. The proposed encryption method successfully mitigates vulnerabilities, demonstrating enhanced resilience against unauthorized access attempts and minimizing the potential for data leakage. By prioritizing security and advancing encryption technologies, it can effectively protect personal information, maintain data confidentiality and integrity, and establish a safer digital environment for individuals and organizations.
引用
收藏
页码:269 / 281
页数:13
相关论文
共 50 条
  • [1] Protecting Private Data by Honey Encryption
    Yin, Wei
    Indulska, Jadwiga
    Zhou, Hongjian
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [2] Protecting Patient Privacy and Data Security
    Taitsman, Julie K.
    Grimm, Christi Macrina
    Agrawal, Shantanu
    [J]. NEW ENGLAND JOURNAL OF MEDICINE, 2013, 368 (11): : 977 - 979
  • [3] Data protection - Security: Data security - The key to privacy
    Carey, Peter
    Berry, David
    [J]. Computer Law and Security Report, 2002, 18 (02): : 112 - 113
  • [4] Protecting Privacy and Security of Genomic Data in i2b2 with Homomorphic Encryption and Differential Privacy
    Raisaro, Jean Louis
    Choi, Gwangbae
    Pradervand, Sylvain
    Colsenet, Raphael
    Jacquemont, Nathalie
    Rosat, Nicolas
    Mooser, Vincent
    Hubaux, Jean-Pierre
    [J]. IEEE-ACM TRANSACTIONS ON COMPUTATIONAL BIOLOGY AND BIOINFORMATICS, 2018, 15 (05) : 1413 - 1426
  • [5] Efficient private key generation from iris data for privacy and security applications
    Dash, Priyabrata
    Pandey, Fagul
    Sarma, Monalisa
    Samanta, Debasis
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 75
  • [6] Differential Privacy for Protecting Private Patterns in Data Streams
    Gu, He
    Plagemann, Thomas
    Benndorf, Maik
    Goebel, Vera
    Koldehofe, Boris
    [J]. 2023 IEEE 39TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING WORKSHOPS, ICDEW, 2023, : 118 - 124
  • [7] Protecting data privacy in private information retrieval schemes
    Gertner, Y
    Ishai, Y
    Kushilevitz, E
    Malkin, T
    [J]. JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2000, 60 (03) : 592 - 629
  • [8] A Design of Privacy Data Encryption and Decryption System for Data Security in Clouds
    Cheng Wenjuan
    Tong Bing
    Zhou Miaomiao
    [J]. PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON MECHATRONICS, MATERIALS, CHEMISTRY AND COMPUTER ENGINEERING 2015 (ICMMCCE 2015), 2015, 39 : 714 - 718
  • [9] Protecting Data Privacy in Federated Learning Combining Differential Privacy and Weak Encryption
    Wang, Chuanyin
    Ma, Cunqing
    Li, Min
    Gao, Neng
    Zhang, Yifei
    Shen, Zhuoxiang
    [J]. SCIENCE OF CYBER SECURITY, SCISEC 2021, 2021, 13005 : 95 - 109
  • [10] Protecting the privacy and security of sensitive customer data in the cloud
    King, Nancy J.
    Raja, V. T.
    [J]. COMPUTER LAW & SECURITY REVIEW, 2012, 28 (03) : 308 - 319