Essay on Security Mechanism
Number of words: 6171
Article 1
Introduction
Technology in health is in diverse forms, hospitals use electronic communication and telecommunication systems during their operation to patients across several distances. The use of telecommunication technology has become very common currently in several countries, this requires the latest information and communication systems are used to provide health service. These technologies are used by different organizations aside from health care industries. There are issues like identity theft, data infringement, and other acts that account for fraud (Thakur et al., 2019, p. 3457-3460).
Summary
Thakur et al., (2019, p. 3459-3470) The hospital is said to protect the confidential information of various patients they admit into the hospital. The use of telecommunication and information technology in the hospital is designed to protect the information of patients and medical records. There have been several issues related to information attacks on medical data in some hospitals, the development of encrypted technology to protect the data of patients is very vital to avoid data or information attacks. The encryption security mechanism is used to protect patients’ test images, scans, and other records. Patients’ records are safely kept under encryption and require a key to decrypt these records. The hospital is the third party that is obliged to keep this key safe from other users. There are different techniques that can be developed to ensure a secured data or information transfer in the hospital. Hashing PHI is not done by healthcare organizations; however, encryption can be like hashing data since it works using principles related to a mathematical algorithm, unless there is an encryption key and a linked decrypting key to lock and unlock the data or information.
Analysis
There is a development of digital watermarking with cryptography in ensuring security in the latest telehealth technologies in hospitals. This can allow the transmission of information in a form of an image or text using encryption to secure and protect images or text information or data. This is a safe way to store data or information of the hospital, a decrypting key is the only way to unlock the data in this situation. The domain-specific technique can be used during watermarking technology but the encryption mechanism is recognized as very good as compared to the watermarking technique. The development of telehealth technologies requires a secured approach, the use of watermarking and domain methods can make these technologies serve the organization in a secured fashion, the use of proper security to protect patient’s identity, records, and information can be ensured by applying encryption. The various watermark images, data, records, and information of patients are encrypted using an encryption algorithm. The use of encryption algorithm to secure data is identified as very robust and good enough to protect records from any form of attacks. The various brain images, scan results, and other test results of patients can be taken in a form of a secured watermark image. The images can be screened through a proposed algorithm with the aid of hybrid machines, with 64-bit, higher processors, and memory. The image should have a high resolution by using the ‘Haar’ wavelet technology. During encryption of these records, the NPCR (Number of Changing Pixel Rate) and UACI (Unified Average Change Intensity) should be high in pixel value as required (Thakur et al., 2019, p. 3457-3470)
Highlighted Issues
The problem of encryption in keeping medical records safe is the structure of the encryption technology of the hospital, the poor implementation of encryption to various record systems can bring about data attacks. The kind of encryption technique used to encrypt data should be authentic and evaluated often to prevent any mistakes that could affect the records of patients.
The password and other key id used to encrypt data can be lost easily, the loss of the encryption key can cause identity theft and other data infringement problems. The file, record, or data of patients can get inaccessible if the key is lost, simple encryption keys can also make data to be unsecured. Data of the hospital can be easily accessed by the public when poor or less strong keys are used to encrypt data.
Information attacks on medical records of the hospital information system can be caused by an improper encryption technique or key structure, the images of patients’ records are easily accessed when the hospital security system is hacked, the encryption code and system can be assessed when the entire system is hacked by a special software utility.
Conclusion
The best and safest way to store data, files, or information of the hospital is by securing them under encryption, a decrypting key is the only way to unlock the data in this situation. The domain-specific technique can be used during watermarking technology but encryption mechanism is recognized as very good as compared to the watermarking technique. The development of telehealth technologies requires a secured approach, the use of watermarking and domain methods can make these technologies serve the organization in a secure fashion, the use of proper security to protect patient’s identity, records, and information can be ensured by applying encryption.
Article 2
Introduction
Cloud computing is a rising computing paradigm that involves the storage of data on an internet-based storage system. Businesses, individuals, internet service providers, among other entities store several kinds of data on cloud storage, software, resources, information, and valuable items that are also transferred via cloud computing. Most data and resources stored or transferred via cloud system are usually received without any subscription, this means, resources that require a subscription or payment can be accessed freely on the cloud, especially when it is not secured. The increasing number of cloud systems makes it difficult to identify the best cloud service among the rest. The encryption techniques accompanied by the Advanced Encryption Standard (AES) and the system of Message Digest 5 technique (MD5) can gradually enhance the security and protected data storage and transfer over various cloud computing systems (Thirunavukkarasu & Kaliyamurthie, 2018, p. 4758)
Summary
Thirunavukkarasu & Kaliyamurthie, (2018, p. 4757-4760) Technology relating to cloud technologies utilize encryption mechanism to protect data of a different kind. Users seek different kinds of information via cloud computing, also, enterprises use cloud technologies to serve users with their requests. The cloud computing technology handles several user requests always, the service of cloud technology does not require high data usage depending on the kind of cloud technology provided. The use of dual encryption technology to secure data that is transferred via cloud technology is able to secure data from attacks. The use of dual encryption along with AES and MD5 can serve a high-security purpose to various data transfers via the cloud. The encryption techniques along with AES and MD5 are able to provide the needed security to various of various users. This is done by encrypting various data using the AES and accessed by the third party through verification. The data is encrypted before transferring to the public cloud system. Encryption of data to a public cloud system is very important since the public cloud has very low security, the encrypted data will hardly be accessed by the public when it has been encrypted, and the Message Digest 5 (MD5) also provide higher security over the encrypted data.
Analysis
Encryption technique prevents access to data and access to the resources will be difficult unless the user has an encrypted key to access the data. The encryption of data will avoid unauthorize access to data, provide a secured location to data, and users must make a request to get these encrypted data before accessing or acquiring them directly. The data is decrypted by the third party before sending it to the user, the data is secured from external access after decryption of the second layer. The Advanced Encryption Standard technique is executed by authenticating the user to upload their data to the preferred third party to be encrypted for storage, encryption is done this same technique and verified before uploading or storing the data into the public cloud system. The data is encrypted and re-encrypted according to the AES and MD5 techniques with the confirmation of the encryption security key. The encryption is done in layers such that before uploading the data into the public cloud, the cloud server is re-encrypted along with the MD5 algorithm principle to store the data in the cloud. The two encryption techniques namely, Advance Encryption Standard (AES) and Message Digest 5 (MD5) are rendering the security to the data. The third party is a trusted party that has access to the decryption key for the data but a dual mechanism provides security over both third party and the public cloud respectively (Thirunavukkarasu & Kaliyamurthie, 2018, p. 4757-4766).
Highlighted Issues
The data stored on the cloud can easily be lost without any control over the data when enhancing the structure of the network privacy. The safety of the network cloud system is shared between the cloud service provider and the owner of the data.
The AES encryption technique can use a very simple structure that can be easily accessed by external experts. The structure encrypts data in a similar way, access to one block means access to other block data. The AES encrypting technique can be hard to implement using designed software, the implementation to secure software or data can be very complex.
MD5 is known as Message Digest 5 technique used to secure data, the technique can be weak in securing data, this weakness can make external users and attackers use input sources to access the encrypted files. The code can be hacked using methods to generate the code. The hashing algorithm can be developed to replace the actual MD5 code. This makes the security of data bad and access to data is opened to any form of attacks.
The encryption of data according to the AES and MD5 techniques can make data weak and accessed easily when the technique is weak and executed similarly. The poor handle of keys used to encrypt the data can make affect the security of the data. The use of a third party can also put the security of data in jeopardy. The third-party can access the data, this is when the third party is not genuine.
Conclusion
The best way to secure data is using the Advanced Encryption Standard technique, this can be executed by allowing data to be uploaded with the verification of a trusted third party to be encrypted for storage, encryption is done using the AES and MD5 standard. The data is verified before uploading or storing the data into the public cloud system. The data is encrypted and re-encrypted using the AES and MD5 techniques with the confirmation of the encryption security key. The key-id should be kept safe, the encryption can vary across the layers such that before uploading the data into the public cloud, the cloud server is re-encrypted along with the MD5 algorithm principle to store the data in the cloud. The use of a dual encryption mechanism can secure data over the access of the third party and other users.
Article 3
Introduction
Mahakalkar & Sahare, (2017, p. 547) Security of data over the public domain is necessary to protect data from external attacks. Access to data on the cloud is common among users, the growing security and privacy concerns of cloud service users are also common. The access of data using an on-demand method which requires authentication to have access to data. The data can be secured using re-encryption of data shared or stored on the cloud. These data are the priority of the owner, securing the data from attacks will help protect the business of the owner. Cloud network has advanced that it is easy to access data from any location. The Elliptic-curve Cryptography algorithm also known as the ECC algorithm is helpful in encrypting data against attacks. The encryption of data can be done using multiple key data with hybrid security over data.
Summary
Cloud computing gives facilitating the supply of resources, data, and information to users on request. The system includes a third party, a user, and the owner of the resource. The owner of the resource shares and permits access to data according to a requires protocol, the data is secured with security protocol in order to enable the owner to provide access to the information or resources (Mahakalkar & Sahare, 2017, p. 549). The security and privacy of data stored on public cloud systems work with the sharing of authority access to execute resources using a matching technique. Users often demand to use and share data but the owner of data can re-encrypt data to ensure high security for various private data. The data shared or stored on the cloud can be private and should be preserved with the full authority given to the owner of the data, the data is secured by using a privacy-preserving protocol to avoid public access to the data. There are encryption protocols and security relating to solving challenges to privacy of data security over cloud computing. The combination of the Elliptic-curve Cryptography algorithm and re-encryption using multiple encryption keys will serve the protection of data or resources for confidential business transaction (Mahakalkar & Sahare, 2017, p. 547-549)
Analysis
The analysis of security of confidential data gives the owner a high priority to render business services, and operation without losing confidential data. These data are the priority of the organization or the owner, successful attacks to data can damage the reliability of the owner of the data. The Elliptic-curve Cryptography algorithm also known as the ECC algorithm is helpful in encrypting data against attacks. The encryption of data can be done using multiple key data with a hybrid security over data. This will make user access to data difficult; the data will be protected from multiple user access. Technology development is enhancing the compression of data sharing speed, this will enable increase the speed of sharing several data on cloud computing. The advancement in encryption of data on cloud can also require user to register with their personal details on a registration form before accessing the data. The details of registered persons are included in the database of the resource owner. Access to data or resources in this case, the user will login with their email, password, and other pin code, the owner will upload the data into the database, this will be directly linked to the registered users who can then be able to download the data, file, or resources. The file or resource uploaded is in their encrypted format with the ECC algorithm. The downloading of the file can be done with the help of the file id provided or stored by the owner during the uploading of the file. The owner is the one who can permit access or deny access to data. The use of a re-encryption key will secure data that is going to so many users, there are several id keys along with the ECC algorithm. The re-encryption process features a third party that verifies data before transmitting it to users for download. This security mechanism ensures access to data without infringing on privacy information, provides safe multiple user access, and user authentication (Mahakalkar & Sahare, 2017, p. 545-550).
Highlighted Issues
Loss of control of data will make user access to data difficult; when is lost or mismanaged on the cloud system, the server can be in a way that owner of resource or data cannot have absolute control of data on the server cloud system. The speed of transferring several data can be difficult on a bad cloud system. The Infrasturacture-as-a-Service cloud network system (IaaS), will be a cloud system that can allow resource owners to have the most control over their resources and the Software-as-a-Service system does not give absolute control to resource owners. The security of their resources is determined by the cloud server. The details of users recorded in the database can be attacked when cloud server security is not strong. The security structure of the Software-as-a-Service has security gaps in the agreement of the Cloud Service Provider. When the owner of resources does not read Server License Agreements, the data can be locked and neglected into the cloud system. Data is accessed by anyone without permission from the owner. Data and resources can be lost when mistakes, errors, or damages occur to the security system of the resource owner. The partners of the resource owner who have access to data can also use data for wrong intentions. The Elliptic Curve Cryptography System can also post aside attacks on the encrypted key of the data. When data is breached, it can cause several problems like loss of customer interest, penalties, fine punishment, among other severe problems.
Conclusion
The security of data using the Elliptic-curve Cryptography algorithm also known as the ECC algorithm can help secure data by encrypting them against attacks. The use of multiple keys to secure data increases the security of the data. The data is protected against attacks from external users. The speed of sending so much data at a time can be secured using encryption technology to protect all important data. The development of encryption technology can also accompany a registration strategy to encrypt data. The data can be made available to users who have registered with their details. The registration can be done by using a personal password, email, or pin, the registered users are documented in a database. The owner of the data can locate the users and share file to the right users in the database. The file is still secured during sharing, the owner can add a special decrypting key that can be used by users after downloading the file. ECC algorithm can utilize several keys which will be activated by the owner in order to be used by specific users. This strategy is very effective and should be used during the transfer of data to larger uses.
Article 4
Introduction
The technology system that relates to information management and protection has advanced and designed to assist in coding strategies. Krishna, (2018) mode of data security can help compress data, correct mistakes, and enhance the privacy level using cryptography coding. The use of cryptography technology will help convert various data into a different format that will be unknown to public access. The modes of securing data access can vary from symmetric encryption to asymmetric encryption techniques. The use of either encryption mode will help ensure high security over data. There is a single encryption key to access data when using the symmetric mode of encryption, this associated with a separate authentication system. The encryption of data uses the Data Encryption Standard technique along with the Advanced Encryption Standard when using the symmetric mode of security. On the other hand, Asymmetric technology operates with double keys to access data along with a specific authentication method. The asymmetric encryption mode uses the RSA and ECC algorithm to facilitate data security. The encryption of data can also be done using homomorphic encryption, the technique operates in an arithmetic format to analyze data and very effective to protect data over public networks like the cloud system (Krishna, 2018, p. 1387-1390).
Summary
Krishna, A. V. (2018, p. 1387-1392) Security mechanism using the homomorphic encryption technique relates to an encryption algorithm that secures data by encrypting and securing the data in a computational format. The computation is done using symbols to represent data operation and mapping them to different groups. When encrypting data using the homomorphic encryption technique, the data to be encrypted can be replaced into other forms depending on the computation. The encryption can be done using advanced key cryptography in a cubic spline curve. The security of larger data requires a hybrid encryption technology and can be executed by the asymmetric mode encryption of the homomorphic encryption technique. The key to encrypt data in homomorphic encryption requires integration of variable control, computation is done among variables to identify the best key for encryption. Integration of data in homomorphic encryption can range in the arithmetic computation of ciphertexts and data. The data is usually stored in public network systems like the cloud, and the is secured after encrypted. The encryption of data is executed by using a public key, computational values, and using the cubic spline model. The use of a private key and conversion of ciphertext into actual text can help decrypt data.
Analysis
Encryption of data using security coding along with cryptography technology changes the resource data into an unknown form, the access to data is difficult in this format. The modes of securing data access can vary from symmetric encryption to asymmetric encryption techniques. Krishna, (2018, p. 1395-1399) Symmetric encryption has one encryption key to access data and indirect access to the data, this technique uses the Data Encryption Standard technique and Advance Encryption Standard to strategize the privacy of data. Asymmetric encryption method has two keys and a direct authentication to data, encryption is done by using the RSA and ECC algorithm. Security mechanisms using the homomorphic encryption method can be used to secure data on cloud networks. The format of data is changed when the algorithm technique is used and computing texts into a different form that is unknown to users. The homomorphic encryption will make data look different; users will not be able to identify the data. When the data is very large, the hybrid encryption using advanced key cryptography in cubic spline curve, and asymmetric mode encryption of the homomorphic encryption technique can help secure the data. The arithmetic algorithm for converting numerals or texts into an encrypted form, the encryption uses a key that is generated from the private key. The encryption is done using random values, and generating ciphertexts, the plain text is changed into unknown texts. Decrypting of the data or text is done by using the private key which will help convert the ciphertext into the actual text from the used algorithm.
Highlighted Issues
The encryption key is slow to open bulk data when the data is encrypted by the asymmetric encryption method. There are issues of slow performance when using homomorphic encryption technique to encrypt data, the Fully Homomorphic Encryption technique uses the large key to encrypt data, the execution requires higher memory to operate, this makes it less practicable to data relation. The problem of depending on a third party to secure data and have access to a symmetric key, the third party can access data without the knowledge of the owner. Data integrity and authentication can be affected when encryption is used to secure the data. The asymmetric technique does not authenticate the public key, users can have access to keys that do not belong to them, moreover, when users misplace their private key, there is no other way to open their encrypted data. The security of the data is also destroyed when a private key is identified by a user. The symmetric encryption technique can make access to encryption keys easy especially since they are moved easily.
Conclusion
The encryption of data from small to larger quantities can be secured using the numerical model and encryption technique relating to the homomorphic and cubic spline curve algorithm. The data encryption process ranges from Advance Encryption Standard when using the symmetric mode of security and Asymmetric technology when using double keys to access data along with a specific authentication method. The asymmetric encryption mode uses the RSA and ECC algorithm to facilitate data security. Also, encryption can be done using the advanced key cryptography in cubic spline curve, larger encryption can be done by using hybrid encryption technology along with homomorphic encryption technique. The best way to protect data is using the symmetric encryption technique which secures data and homomorphic encryption of larger data into a different format, data integration and computation will identify the best key for encryption.
Article 5
Introduction
Distributing technology systems consisting of a variety of different parts makes it easy to interact, communicate, and control actions using different kinds of data. There are diverse applications and development in distributed systems in executing tasks in different systems depending on the system architecture, location, and varied computer language of the system. Distributing systems enables the sharing of resources such as software and data between systems with the help of a network connection. Venkatesan et al., (2019, p. 43) security of data on cloud network system is a sensitive aspect of ensuring that confidential data and resources a stored to relieve the burden of owners of data and users. Data is sold to users or customers on cloud network systems, several units of data can be sold on a cloud network system. Encryption of data for safe business transfer using the Advanced Encryption Standard and Message Digest 5 technology will help encode data in a secured fashion and protected from external attacks.
Summary
Venkatesan et al., (2019, p. 43-46) multi-cloud system prevents the inclusion of open trading to users seeking resources uploaded. The business of selling resources that are requested and demanded by users online is popularly executed via public domain technology systems like the cloud. Data is purchased on cloud systems more often in a reliable duration. Engaging in data business via cloud system is growing rampantly, advancement in a multi-cloud transaction of data to users has realized some security criteria such as encryption strategic framework. The development of the Advanced Encryption Standard (AES) and Message Digest 5 (MD5) is used as a two-fold encryption structure to data sold via cloud system. The two-fold security frameworks are used to encrypt data in an updated structure, the data is encoded in the Advanced Encryption Standard framework technique which is then assessed at the privacy level, prevent public contact. The data is receiving a change in security during the implementation of the Message Digest 5 technique to enhance the level of security of the data as compared to mixed data. The execution of the security method of AES and MD5 encryption technique will enable data to be secured in the public domain systems. The users who want to access the data will have to make the required transaction in order to access the data. The data sold will be unscrambled to separate the layers of encoded information in the resource. The system can be upgraded to facilitate the space, security, and quality of data service to users.
Analysis
The use of AES encryption facilitates encryption of data by computing the data in varying bits, the encoding in bit can be computed in zeros or ones, the AES uses the same key to encrypt and secure data. The AES encryption can use the different structures of keys, the key is manipulated to identify the different lengths of encrypting keys. The encrypted key varies in length, increasing the key enhances the quality of computation of data. There are several computations conducted by experts when using the AES encryption technique. The AES technique secures the data independently, this ensures that access to the data is done by decrypting the encoded data using the key. MD5 encryption technique can be used to encrypt data that is to be sold or purchased over the cloud system. The encoding is done by using a 32-bit machine to compute data calculation during the coding of the data. MD5 is an advanced system of MD4 which runs very effective than the previous MD4 technology. The MD4 runs very fast but the MD5 can slow down, especially when securing data at an extreme security level. MD5 is able to check the security and integrity level of data, this security technique is easy to encrypt data.
Highlighted Issues
AES encryption of data is not absolutely reliable as the security of data can be weak when data is easily accessed by key, the data can be decrypted when a fold of the data is easily opened by a key. It is difficult to implement the AES encryption technology since it requires expertise to code and computes data into encrypted values. The MD5 is a very advanced security technique which can also slow down during encryption of complex data system. The system used for encryption can affect the performance of the coding process, the system should meet certain specifications and standards that can facilitate the coding of data. The MD5 uses a single function to accept data and delay in generating the actual key after several hashing of the encrypted data. The hacking of the security system can also affect the security of the data, cloud systems can have security gaps issues that risk all data transferred on such cloud system. When the key is handled carelessly, or when third parties get access to the key, there can be an attack on the data secured.
Conclusion
Advanced Encryption Standard (AES) and Message Digest 5 (MD5) are very good for secured data using the two-fold encryption structure to data sold via cloud system. The Advanced Encryption Standard can encrypt data and protect it from public attacks. Data that is sold over a cloud system can be secured when the MD5 encryption algorithm is used to secure the data. The MD5 is a recommended encryption technique for data that is transferred over public network systems. The execution of the security method of AES and MD5 encryption techniques will enable data to be secured in the public domain systems. The users who want to access the data can get data after conducting genuine business with the owner. The data can be secured even when it is sold to users, the permission of the owner will permit access to the key. MD5 should be improved to run fast when securing a high number of data quantities or providing extreme security to data.
Article 6
Introduction
The development of technology for information and communication is advancing, the use of sensor technologies like the Wireless Sensor Network is evolving in the growth of technology. The Wireless Sensor Network technology is a system that is able to record data using the sensor on the Sensor Device. The Wireless Body Sensor Device is wearable and has a sensor to record the health signs of patients. The data recorded by the Sensor technology can be encrypted and secured before transferring to any location especially via a public domain network. Wireless Body Sensor Network technology is used to get data that are related to the health condition of patients. The data is collected at the tiny sensor node of the device, the actuators that enable the sensor device to operate are linked to the body to generate data. The sensor nodes can either connected into or unto the body to record data (Anwar et al., 2018, p. 50-55).
Summary
Anwar et al., (2018) distributed system is commonly used in computing as a technological system consisting of a variety of different parts that make it easy to interact, communicate, and control actions using different kinds of machines. This enables the system to function as a whole unit for completing tasks to the end-user. There are diverse applications and development in distributed systems in executing tasks in different systems depending on the system architecture, location, and varied computer language of the system. Wireless Body Area Network technology is an advanced and developing technology that is used for diverse healthcare services. The system can easily examine the health condition of patients using a real-time system in any given location of the patient. The system is designed to generate patients’ health status and data over the internet, the device records the health data of patients and can be accessed by a physician when it’s transferred via the internet. The device has a sensor node that records health signs and analyzed by the doctor. The data collected is confidential and should be entitled under a security mechanism. The data can be secured by using the D-Sign technique to encrypt the data using a digital signature that can also be used to decrypt the data. The data is secured, encryption of the data before transferring or during transfer over the internet can help avoid public access to the data. The recording device can be encoded into an encrypted format using the D-Harsh method with a private key that can be able to encrypt the data to avoid external access.
Analysis
The use of Wireless Sensor Network is a developing technology to record data and transferred over public network domain like the internet or cloud network. Data recorded can be encrypted to avoid security attacks to data. Wireless Body Sensor Device is a wearable device that records the health signs of the person wearing it, this data is confidential to the patient and must be secured using encryption. Data is encoded and secured using the Data Signature Encryption technique to secure data, the encryption uses a private key along with an electronic digital signature to secure the data. The sensor of the device is connected to the sensor network system, the sensor system is connected to the BNC which inputs information that relates to the sensor. The various public and private keys for encrypting data are set and the digital signature is used to identify various private keys among the public keys. The data is secured using the secret key and digital signature to label the data packet of records that are transferred to the doctor. The digital signature authenticates the integrity of the data to show it is genuine. During encryption, the data sign uses a Hash Value to encrypt data, data is encrypted using the hashing technique to code into hash values. The data can be decrypted using the sender’s private key.
Highlighted Issues
The hashing of data is a single direct method that scrambles the available texts into a special form, the process of using hashing using a well-designed algorithm makes reversal of hashing and identification of the actual password difficult, reversing the output of the hashing to identify important previous input cannot be done.
Hashing can also limit the length of data generated with an infinite input location for text storage and manipulation. The use of symmetric encryption technique requires access to encryption key during the encryption process, this will serve as a password for verification during the security process. When the encrypted password is mishandled, it can get stolen by external users, this password can make easy access to the symmetric key of the application. This will make easy decryption of all other passwords when there is an attack on the weak keys. Hashing is different from actual encryption of data; an attacker can force the method to become insecure to data access.
Conclusion
Hashing passwords with a stronger security structure can enhance the security of data than simply using encryption of passwords. The security key should be protected and locked from external access; the sensor system network should be secured to function as a whole unit for completing tasks for the user. Data received can be using the D-Sign technique to encrypt the data using a digital signature that can also be used to decrypt the data. Encryption of data can include digital signature, and hashing techniques to strengthen the security of the data. The data is secured, encryption of the data before transferring or during transfer over the internet can help avoid public access to the data.
References
Anwar, M., Abdullah, A. H., Butt, R. A., Ashraf, M. W., Qureshi, K. N., & Ullah, F. (2018). Securing data communication in wireless body area networks using digital signatures. Technical Journal, 23(02), 50-55.
Krishna, A. V. (2018). A big–data security mechanism based on fully homomorphic encryption using cubic spline curve public key cryptography. Journal of Information and Optimization Sciences, 39(6), 1387-1399.
Mahakalkar, N., & Sahare, V. (2017, May). Implementation of re-encryption based security mechanism to authenticate shared access in cloud computing. In 2017 International Conference on Trends in Electronics and Informatics (ICEI), (pp. 547-550). IEEE
Thakur, S., Singh, A. K., Ghrera, S. P., & Elhoseny, M. (2019). Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications. Multimedia tools and Applications, 78(3), 3457-3470.
Thirunavukkarasu, S., & Kaliyamurthie, K. P. (2018). Double Encryption Security Mechanism in light of the Service of Trusted Third Party in Multiple Public Clouds. International Journal of Pure and Applied Mathematics, 119(12), 4757-4766.
Venkatesan, K. G., Rao, M. M., Gopal, M. V., & Sandhiya, V. (2019). A study on multi-cloud methodology of trusted third party in multiple double encryption security mechanism. International Journal of Innovative Research in Computer and Communication Engineering, 7(1), 41-48.