DATA SECURITY IN COMPUTERS: AN INTRODUCTION TO THE CONCEPT OF ENCRYPTION
Keywords:
Data Security, Computer, EncryptionAbstract
Encryption is a vital process in computer data security that converts open information into encrypted text to protect it from unauthorised access. The process relies on the use of complex algorithms and decryption keys that ensure that only authorised parties can access the information. Encryption security is crucial in this digital age to maintain privacy and protect the information assets of organisations and individuals during data storage and transmission. However, the implementation of this security faces challenges such as secure key management, selection of robust and efficient algorithms, and complying with regulations related to the use of encryption technology. With continuous development and multi-stakeholder engagement, encryption-based data security can be continuously strengthened to deal with dynamic cyber threats.
Downloads
References
Abdullah, N., Zakaria, N., Halim, A. A., & ... (2022). A theoretical comparative analysis of DNA techniques used in dna based cryptography. Journal of ..., Query date: 2024- 11-05 18:55:17. https://jssm.umt.edu.my/wp- content/uploads/sites/51/2022/06/Article-14-JSSM-Volume-17-Number-5-May-
2022.pdf
Abhishek, Tripathy, H., & Mishra, S. (2022). A succinct analytical study of the usability of encryption methods in healthcare data security. Next Generation Healthcare Informatics, Query date: 2024-11-05 18:55:17. https://doi.org/10.1007/978-981-19- 2416-3_7
Adee, R., & Mouratidis, H. (2022). A dynamic four-step data security model for data in cloud computing based on cryptography and steganography. Sensors, Query date: 2024-11-05 18:55:17. https://www.mdpi.com/1424-8220/22/3/1109
Adlini, M. N., Dinda, A. H., Yulinda, S., Chotimah, O., & Merliyana, S. J. (2022). Qualitative Research Methods of Literature Study. Edumaspul: Journal of Education, 6(1), 974-980. https://doi.org/10.33487/edumaspul.v6i1.3394
Agyekum, K., Xia, Q., Sifah, E., & ... (2021). A proxy re-encryption approach to secure data sharing in the internet of things based on blockchain. IEEE Systems ..., Query date: 2024-11-05 18:55:17. https://ieeexplore.ieee.org/abstract/document/9442931/
Alaslan, A. (2022). QUALITATIVE RESEARCH METHODS. Query date: 2024-05-25 20:59:55.
https://doi.org/10.31237/osf.io/2pr4s
Ali, S., Wadho, S., Yichiet, A., Gan, M., & Lee, C. (2024). Advancing cloud security: Unveiling the protective potential of homomorphic secret sharing in secure cloud computing. Egyptian Informatics Journal, Query date: 2024-11-05 18:55:17. https://www.sciencedirect.com/science/article/pii/S1110866524000823
Alruily, M., Shahin, O., Al-Mahdi, H., & Taloba, A. (2021). Asymmetric DNA encryption and decryption technique for Arabic plaintext and Humanised Computing, Query
date: 2024-11-05 18:55:17. https://doi.org/10.1007/s12652-021-03108-w
Aslan, Ö., Aktuğ, S., Ozkan-Okay, M., Yilmaz, A., & Akin, E. (2023). A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions. Electronics, Query date: 2024-11-05 18:55:17. https://www.mdpi.com/2079- 9292/12/6/1333
Awadallah, R., Samsudin, A., Teh, J., & ... (2021). An integrated architecture for maintaining security in cloud computing based on blockchain. IEEE Access, Query date: 2024-11-05 18:55:17.
https://ieeexplore.ieee.org/abstract/document/9420703/
Daniel, A., Shaba, S., Momoh, M., & ... (2021). A computer security system for cloud computing based on encryption technique. Computer Engineering , Query date:
2024-11-05 18:55:17. https://www.academia.edu/download/87355012/222.pdf
Das, M., Tao, X., & Cheng, J. (2021). BIM security: A critical review and recommendations using encryption strategy and blockchain. Automation in Construction, Query date: 2024-11-05 18:55:17.
https://www.sciencedirect.com/science/article/pii/S0926580521001333
Joshi, B., Joshi, B., Mishra, A., Arya, V., Gupta, A., & (2022). A comparative study of
privacy-preserving homomorphic encryption techniques in cloud computing. ... and Computing ..., Query date: 2024-11-05 18:55:17. https://www.igi- global.com/article/a-comparative-study-of-privacy-preserving-homomorphic- encryption-techniques-in-cloud-computing/309936
Kumar, S., Karnani, G., Gaur, M., & (2021). Cloud security using hybrid cryptography
algorithms. 2021 2nd International ..., Query date: 2024-11-05 18:55:17.
https://ieeexplore.ieee.org/abstract/document/9445377/
Li, Y., & Liu, Q. (2021). A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments. Energy Reports, Query date: 2024-11- 05 18:55:17.
https://www.sciencedirect.com/science/article/pii/S2352484721007289
Lv, Z., Qiao, L., Hossain, M., & Choi, B. (2021). Analysis of using blockchain to protect the privacy of drone big data. IEEE Network, Query date: 2024-11-05 18:55:17. https://ieeexplore.ieee.org/abstract/document/9354924/
Munjal, K., & Bhatia, R. (2023). A systematic review of homomorphic encryption and its contributions in healthcare industry. Complex &Intelligent Systems, Query date: 2024-11-05 18:55:17. https://doi.org/10.1007/s40747-022-00756-z
Prajapati, P., & Shah, P. (2022). A review on secure data deduplication: Cloud storage security issue. ... of King Saud University-Computer and Information , Query date:
2024-11-05 18:55:17.
https://www.sciencedirect.com/science/article/pii/S1319157820305140
Ramachandra, M., Rao, M. S., Lai, W., & ... (2022). An efficient and secure big data storage in cloud environment by using triple data encryption standard. ... Cognitive Computing, Query date: 2024-11-05 18:55:17. https://www.mdpi.com/2504-2289/6/4/101
Shen, J., Yang, H., Vijayakumar, P., & ... (2021). A privacy-preserving and untraceable group data sharing scheme in cloud computing and Secure Computing, Query
date: 2024-11-05 18:55:17. https://ieeexplore.ieee.org/abstract/document/9319526/ Singh, S., & Kumar, D. (2024). Enhancing cyber security using quantum computing and artificial intelligence: A review. Algorithms, Query date: 2024-11-05 18:55:17.
https://www.researchgate.net/profile/Shoumya-
Singh/publication/381519152_Enhancing_Cyber_Security_Using_Quantum_Com puting_and_Artificial_Intelligence_A_Review/links/66725da6b769e7691940fdc 5/Enhancing-Cyber-Security-Using-Quantum-Computing-and-Artificial-
Intelligence-A-
Review.pdf?utm_source=www.thedailyqubit.com&utm_medium=referral&utm
_campaign=the-daily-qubit
Sohal, M., & Sharma, S. (2022). BDNA-A DNA inspired symmetric key cryptographic technique for secure cloud computing of King Saud University-Computer and
Information ..., Query date: 2024-11-05 18:55:17.
https://www.sciencedirect.com/science/article/pii/S1319157818303999
Song, H., Li, J., & Li, H. (2021). A cloud secure storage mechanism based on data dispersion and encryption. IEEE Access, Query date: 2024-11-05 18:55:17. https://ieeexplore.ieee.org/abstract/document/9411835/
Suyitno. (2021). QUALITATIVE RESEARCH METHODS CONCEPTS, PRINCIPLES AND OPERATIONS. Query date: 2024-05-25 20:59:55.
https://doi.org/10.31219/osf.io/auqfr
Syafril, S., & Erlina, N. (2018). Preparing Interview Protocols, Selecting Informants and Probing in Qualitative Research. Query date: 2024-05-25 20:59:55. https://doi.org/10.31219/osf.io/pvsh3
Thabit, F., Alhomdy, S., Al-Ahdal, A., & Jagtap, S. (2021). A new lightweight cryptographic algorithm for enhancing data security in cloud computing. Global Transitions ,
Query date: 2024-11-05 18:55:17.
https://www.sciencedirect.com/science/article/pii/S2666285X21000133
Thummisetti, B., & Atluri, H. (2024). Advancing healthcare informatics for empowering privacy and security through federated learning paradigms. ... of Sustainable Development in Computing ..., Query date: 2024-11-05 18:55:17. https://ijsdcs.com/index.php/ijsdcs/article/view/434
Unal, D., Al-Ali, A., Catak, F., & Hammoudeh, M. (2021). A secure and efficient Internet of Things cloud encryption scheme with forensics investigation compatibility based on identity-based encryption. Future Generation Computer , Query date: 2024-11-
05 18:55:17.
https://www.sciencedirect.com/science/article/pii/S0167739X21002454
Vegesna, V. (2023). A Highly Efficient and Secure Procedure for Protecting Privacy in Cloud Data Storage Environments. International Journal of Management, Technology ..., Query date: 2024-11-05 18:55:17. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4612537
Wu, X., Zhang, Y., Wang, A., Shi, M., Wang, H., & (2022). MNSSp3: Medical big data
privacy protection platform based on Internet of things. Neural Computing and
..., Query date: 2024-11-05 18:55:17. https://doi.org/10.1007/s00521-020-04873-z
Yu, K., Tan, L., Yang, C., Choo, K., & ... (2021). A blockchain-based shamir's threshold cryptography scheme for data protection in industrial internet of things settings. IEEE Internet of ..., Query date: 2024-11-05 18:55:17. https://ieeexplore.ieee.org/abstract/document/9600469/
Zuo, Y., Kang, Z., Xu, J., & Chen, Z. (2021). BCAS: A blockchain-based ciphertext-policy attribute-based encryption scheme for cloud data security sharing. International Journal of ..., Query date: 2024-11-05 18:55:17. https://doi.org/10.1177/1550147721999616


