2,022,778 research outputs found

    Privacy and Security of Data

    Get PDF

    Distributed Storage for Data Security

    Full text link
    We study the secrecy of a distributed storage system for passwords. The encoder, Alice, observes a length-n password and describes it using two hints, which she then stores in different locations. The legitimate receiver, Bob, observes both hints. The eavesdropper, Eve, sees only one of the hints; Alice cannot control which. We characterize the largest normalized (by n) exponent that we can guarantee for the number of guesses it takes Eve to guess the password subject to the constraint that either the number of guesses it takes Bob to guess the password or the size of the list that Bob must form to guarantee that it contain the password approach 1 as n tends to infinity.Comment: 5 pages, submitted to ITW 201

    Digital Signature Security in Data Communication

    Full text link
    Authenticity of access in very information are very important in the current era of Internet-based technology, there are many ways to secure information from irresponsible parties with various security attacks, some of technique can use for defend attack from irresponsible parties are using steganography, cryptography or also use digital signatures. Digital signatures could be one of solution where the authenticity of the message will be verified to prove that the received message is the original message without any change, Ong-Schnorr-Shamir is the algorithm are used in this research and the experiment are perform on the digital signature scheme and the hidden channel scheme.Comment: 6 pages, Paper presented at the International Conference on Education and Technology (ICEduTech2017), Novotel Hotel, Balikpapan, Indonesi

    IoT data encryption algorithm for security

    Get PDF
    This research project is about encryption simulation for IoT data. It is important to enhance the security system when sending and receiving the IoT data. Some of these data, especially the health information for a particular person is very sensitive. Therefore, there is a need to encrypt and protect the data from malicious attack. The technique proposed in this research is using Hash function and encryption method to protect the data. To show the working of the encryption, a simulation is performed. The simulation used is a MATLAB coding. By inserting the number of bit and size of the data with random plain text, the system is able to encrypt the data. The simulation results showing that the encrypted data is completely different from the original data or the data haven't encrypted. Upon encrypted, the data being protected and will be unknown to the malicious. At the end of this research project, the result concluded that the waveforms will show the encryption process

    Strengthening Data Security: an Holistic Approach

    Get PDF
    In the light of heightened concern around data security, this paper highlights some of the measures that can be used to develop and strengthen security in data archiving. The paper includes discussion of the different approaches that can be taken towards the construction of firm and resilient data and information security policies within the social science data archiving communities. While international standards can provide theoretical guidelines for the construction of such a policy, procedures need to be informed by more practical considerations. Attention is drawn to the necessity of following a holistic approach to data security, which includes the education of data creators in the reduction of disclosure risk, the integration of robust and appropriate data processing, handling and management procedures, the value of emerging technological solutions, the training of data users in data security, and the importance of management control, as well as the need to be informed by emerging government security and digital preservation standards
    • …
    corecore