A Framework to Ensure Data Integrity and Safety
Journal Title: Data Science: Journal of Computing and Applied Informatics - Year 2018, Vol 2, Issue 1
Abstract
The technology development allows people to more easily communicate and convey information. The current communication media can facilitate its users to send and receive digital data, such as text, sound or digital image. But in terms of security, communications media not always ensure the confidentiality and authentication of data traffic. Most people rely solely on the security provided by the communications media providers in securing their data, which is essentially still inadequate. This paper presents the development of a data security framework by applying the principles of cryptography and digital signatures, such as authenticity, integrity, and data confidentiality. The application is designed using the SHA-256 algorithm as digital signature, AES algorithm as file encryption, and RSA algorithm as asymmetric key in digital file distribution and signature. Then, several simulation testing was performed to ensure the robustness of the framework. Furthermore, we also evaluated the speed of framework based on CPU and memory capacity. Based on the experiment, our proposed framework can be a reliable solution for securing data in data transaction
Authors and Affiliations
Erick Paulus, Mochamad Fauzan
Improving Data Collection on Article Clustering by Using Distributed Focused Crawler
Collecting or harvesting data from the Internet is often done by using web crawler. General web crawler is developed to be more focus on certain topic. The type of this web crawler called focused crawler. To improve the...
Using random search and brute force algorithm in factoring the RSA modulus
Abstract. The security of the RSA cryptosystem is directly proportional to the size of its modulus, n. The modulus n is a multiplication of two very large prime numbers, notated as p and q. Since modulus n is public, a c...
On Factoring The RSA Modulus Using Tabu Search
It is intuitively clear that the security of RSA cryptosystem depends on the hardness of factoring a very large integer into its two prime factors. Numerous studies about integer factorization in the field of number theo...
Efficiency of Local Government Units in North Western Philippines as to the Attainment of the Millennium Development Goals
This study entitled “Efficiency of Local Government Units in Northwestern Philippines as to the Attainment of the Millennium Development Goals” determined the performance of the four provinces and eight cities in Region...
Time Series And Data Envelopment Analysis On The Performance Efficiency Of Dmmmsu-South La Union Campus
This study entitled “Time Series and Data Envelopment Analysis (DEA) on the Performance Efficiency of DMMMSU-South La Union Campus” determined the performance of the Don Mariano Marcos Memorial State University -South La...