DATA SECURITY IN COMPUTERS: AN INTRODUCTION TO THE CONCEPT OF ENCRYPTION

Authors

  • Loso Judijanto IPOSS Jakarta, Indonesia Author
  • Al-Amin Universitas Airlangga, Surabaya, Indonesia Author

Keywords:

Data Security, Computer, Encryption

Abstract

Encryption is a vital process in computer data security that converts open information into encrypted text to protect it from unauthorised access. The process relies on the use of complex algorithms and decryption keys that ensure that only authorised parties can access the information. Encryption security is crucial in this digital age to maintain privacy and protect the information assets of organisations and individuals during data storage and transmission. However, the implementation of this security faces challenges such as secure key management, selection of robust and efficient algorithms, and complying with regulations related to the use of encryption technology. With continuous development and multi-stakeholder engagement, encryption-based data security can be continuously strengthened to deal with dynamic cyber threats.

Downloads

Download data is not yet available.

References

Abdullah, N., Zakaria, N., Halim, A. A., & ... (2022). A theoretical comparative analysis of DNA techniques used in dna based cryptography. Journal of ..., Query date: 2024- 11-05 18:55:17. https://jssm.umt.edu.my/wp- content/uploads/sites/51/2022/06/Article-14-JSSM-Volume-17-Number-5-May-

2022.pdf

Abhishek, Tripathy, H., & Mishra, S. (2022). A succinct analytical study of the usability of encryption methods in healthcare data security. Next Generation Healthcare Informatics, Query date: 2024-11-05 18:55:17. https://doi.org/10.1007/978-981-19- 2416-3_7

Adee, R., & Mouratidis, H. (2022). A dynamic four-step data security model for data in cloud computing based on cryptography and steganography. Sensors, Query date: 2024-11-05 18:55:17. https://www.mdpi.com/1424-8220/22/3/1109

Adlini, M. N., Dinda, A. H., Yulinda, S., Chotimah, O., & Merliyana, S. J. (2022). Qualitative Research Methods of Literature Study. Edumaspul: Journal of Education, 6(1), 974-980. https://doi.org/10.33487/edumaspul.v6i1.3394

Agyekum, K., Xia, Q., Sifah, E., & ... (2021). A proxy re-encryption approach to secure data sharing in the internet of things based on blockchain. IEEE Systems ..., Query date: 2024-11-05 18:55:17. https://ieeexplore.ieee.org/abstract/document/9442931/

Alaslan, A. (2022). QUALITATIVE RESEARCH METHODS. Query date: 2024-05-25 20:59:55.

https://doi.org/10.31237/osf.io/2pr4s

Ali, S., Wadho, S., Yichiet, A., Gan, M., & Lee, C. (2024). Advancing cloud security: Unveiling the protective potential of homomorphic secret sharing in secure cloud computing. Egyptian Informatics Journal, Query date: 2024-11-05 18:55:17. https://www.sciencedirect.com/science/article/pii/S1110866524000823

Alruily, M., Shahin, O., Al-Mahdi, H., & Taloba, A. (2021). Asymmetric DNA encryption and decryption technique for Arabic plaintext and Humanised Computing, Query

date: 2024-11-05 18:55:17. https://doi.org/10.1007/s12652-021-03108-w

Aslan, Ö., Aktuğ, S., Ozkan-Okay, M., Yilmaz, A., & Akin, E. (2023). A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions. Electronics, Query date: 2024-11-05 18:55:17. https://www.mdpi.com/2079- 9292/12/6/1333

Awadallah, R., Samsudin, A., Teh, J., & ... (2021). An integrated architecture for maintaining security in cloud computing based on blockchain. IEEE Access, Query date: 2024-11-05 18:55:17.

https://ieeexplore.ieee.org/abstract/document/9420703/

Daniel, A., Shaba, S., Momoh, M., & ... (2021). A computer security system for cloud computing based on encryption technique. Computer Engineering , Query date:

2024-11-05 18:55:17. https://www.academia.edu/download/87355012/222.pdf

Das, M., Tao, X., & Cheng, J. (2021). BIM security: A critical review and recommendations using encryption strategy and blockchain. Automation in Construction, Query date: 2024-11-05 18:55:17.

https://www.sciencedirect.com/science/article/pii/S0926580521001333

Joshi, B., Joshi, B., Mishra, A., Arya, V., Gupta, A., & (2022). A comparative study of

privacy-preserving homomorphic encryption techniques in cloud computing. ... and Computing ..., Query date: 2024-11-05 18:55:17. https://www.igi- global.com/article/a-comparative-study-of-privacy-preserving-homomorphic- encryption-techniques-in-cloud-computing/309936

Kumar, S., Karnani, G., Gaur, M., & (2021). Cloud security using hybrid cryptography

algorithms. 2021 2nd International ..., Query date: 2024-11-05 18:55:17.

https://ieeexplore.ieee.org/abstract/document/9445377/

Li, Y., & Liu, Q. (2021). A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments. Energy Reports, Query date: 2024-11- 05 18:55:17.

https://www.sciencedirect.com/science/article/pii/S2352484721007289

Lv, Z., Qiao, L., Hossain, M., & Choi, B. (2021). Analysis of using blockchain to protect the privacy of drone big data. IEEE Network, Query date: 2024-11-05 18:55:17. https://ieeexplore.ieee.org/abstract/document/9354924/

Munjal, K., & Bhatia, R. (2023). A systematic review of homomorphic encryption and its contributions in healthcare industry. Complex &Intelligent Systems, Query date: 2024-11-05 18:55:17. https://doi.org/10.1007/s40747-022-00756-z

Prajapati, P., & Shah, P. (2022). A review on secure data deduplication: Cloud storage security issue. ... of King Saud University-Computer and Information , Query date:

2024-11-05 18:55:17.

https://www.sciencedirect.com/science/article/pii/S1319157820305140

Ramachandra, M., Rao, M. S., Lai, W., & ... (2022). An efficient and secure big data storage in cloud environment by using triple data encryption standard. ... Cognitive Computing, Query date: 2024-11-05 18:55:17. https://www.mdpi.com/2504-2289/6/4/101

Shen, J., Yang, H., Vijayakumar, P., & ... (2021). A privacy-preserving and untraceable group data sharing scheme in cloud computing and Secure Computing, Query

date: 2024-11-05 18:55:17. https://ieeexplore.ieee.org/abstract/document/9319526/ Singh, S., & Kumar, D. (2024). Enhancing cyber security using quantum computing and artificial intelligence: A review. Algorithms, Query date: 2024-11-05 18:55:17.

https://www.researchgate.net/profile/Shoumya-

Singh/publication/381519152_Enhancing_Cyber_Security_Using_Quantum_Com puting_and_Artificial_Intelligence_A_Review/links/66725da6b769e7691940fdc 5/Enhancing-Cyber-Security-Using-Quantum-Computing-and-Artificial-

Intelligence-A-

Review.pdf?utm_source=www.thedailyqubit.com&utm_medium=referral&utm

_campaign=the-daily-qubit

Sohal, M., & Sharma, S. (2022). BDNA-A DNA inspired symmetric key cryptographic technique for secure cloud computing of King Saud University-Computer and

Information ..., Query date: 2024-11-05 18:55:17.

https://www.sciencedirect.com/science/article/pii/S1319157818303999

Song, H., Li, J., & Li, H. (2021). A cloud secure storage mechanism based on data dispersion and encryption. IEEE Access, Query date: 2024-11-05 18:55:17. https://ieeexplore.ieee.org/abstract/document/9411835/

Suyitno. (2021). QUALITATIVE RESEARCH METHODS CONCEPTS, PRINCIPLES AND OPERATIONS. Query date: 2024-05-25 20:59:55.

https://doi.org/10.31219/osf.io/auqfr

Syafril, S., & Erlina, N. (2018). Preparing Interview Protocols, Selecting Informants and Probing in Qualitative Research. Query date: 2024-05-25 20:59:55. https://doi.org/10.31219/osf.io/pvsh3

Thabit, F., Alhomdy, S., Al-Ahdal, A., & Jagtap, S. (2021). A new lightweight cryptographic algorithm for enhancing data security in cloud computing. Global Transitions ,

Query date: 2024-11-05 18:55:17.

https://www.sciencedirect.com/science/article/pii/S2666285X21000133

Thummisetti, B., & Atluri, H. (2024). Advancing healthcare informatics for empowering privacy and security through federated learning paradigms. ... of Sustainable Development in Computing ..., Query date: 2024-11-05 18:55:17. https://ijsdcs.com/index.php/ijsdcs/article/view/434

Unal, D., Al-Ali, A., Catak, F., & Hammoudeh, M. (2021). A secure and efficient Internet of Things cloud encryption scheme with forensics investigation compatibility based on identity-based encryption. Future Generation Computer , Query date: 2024-11-

05 18:55:17.

https://www.sciencedirect.com/science/article/pii/S0167739X21002454

Vegesna, V. (2023). A Highly Efficient and Secure Procedure for Protecting Privacy in Cloud Data Storage Environments. International Journal of Management, Technology ..., Query date: 2024-11-05 18:55:17. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4612537

Wu, X., Zhang, Y., Wang, A., Shi, M., Wang, H., & (2022). MNSSp3: Medical big data

privacy protection platform based on Internet of things. Neural Computing and

..., Query date: 2024-11-05 18:55:17. https://doi.org/10.1007/s00521-020-04873-z

Yu, K., Tan, L., Yang, C., Choo, K., & ... (2021). A blockchain-based shamir's threshold cryptography scheme for data protection in industrial internet of things settings. IEEE Internet of ..., Query date: 2024-11-05 18:55:17. https://ieeexplore.ieee.org/abstract/document/9600469/

Zuo, Y., Kang, Z., Xu, J., & Chen, Z. (2021). BCAS: A blockchain-based ciphertext-policy attribute-based encryption scheme for cloud data security sharing. International Journal of ..., Query date: 2024-11-05 18:55:17. https://doi.org/10.1177/1550147721999616

Downloads

Published

03-12-2025