Implementation of a Data Protection Model dubbed Harricent_RSECC

No Thumbnail Available
Date
2022
Journal Title
Journal ISSN
Volume Title
Publisher
(IJACSA) International Journal of Advanced Computer Science and Applications
Abstract
Every organization subsists on data, which is a quintessential resource. Quite a number of studies have been carried out relative to procedures that can be deployed to enhance data protection. However, available literature indicates most authors have focused on either encryption or encoding schemes to provide data security. The ability to integrate these techniques and leverage on their strengths to achieve a robust data protection is the pivot of this study. As a result, a data protection model, dubbed Harricent_RSECC has been designed and implemented to achieve the study’s objective through the utilization of Elliptic Curve Cryptography (ECC) and Reed Solomon (RS) codes. The model consists of five components, namely: message identification, generator module, data encoding, data encryption and data signature. The result is the generation of the Reed Solomon codewords; cipher texts; and generated hash values which are utilized to detect and correct corrupt data; obfuscates data; and sign data respectively, during transmission or storage. The contribution of this paper is the ability to combine encoding and encryption schemes to enhance data protection to ensure confidentiality, authenticity, integrity, and non-repudiation.
Description
An article published in (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 13, No. 5, 2022
Keywords
Citation
(IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 13, No. 5, 2022
Collections