Javascript must be enabled to continue!
Control the Sensitivity of the Encryption Key to Ensure the Security of Big Data
View through CrossRef
With the increasing technological development that has led to the complexity of big data systems, the importance lies in the challenge that ensures the security of sensitive information. Encryption is one of the basic methods used to protect data, hence the importance of the encryption key and its sensitivity, which play a vital role in the strength of encryption. Encryption sensitivity is the simple change in the encryption key that produces a very different encrypted text. This study is concerned with methods of controlling the sensitivity of the encryption key and its effect on the strength of encryption of big data. This context is in line with the nature of cloud data and the focus on the attacks that this data suffers from, such as brute-force attacks and statistical attacks. The research discusses the components that make up the encryption key, logistics maps, and chaos. The results reached by the study proved the merit of the research in terms of accuracy 1015 and appropriate key sensitivity 2128. This study discussed future challenges and the possibility of using artificial intelligence algorithms and adaptive security algorithms and solving quantum encryption problems.
STMIK Indonesia Padang
Title: Control the Sensitivity of the Encryption Key to Ensure the Security of Big Data
Description:
With the increasing technological development that has led to the complexity of big data systems, the importance lies in the challenge that ensures the security of sensitive information.
Encryption is one of the basic methods used to protect data, hence the importance of the encryption key and its sensitivity, which play a vital role in the strength of encryption.
Encryption sensitivity is the simple change in the encryption key that produces a very different encrypted text.
This study is concerned with methods of controlling the sensitivity of the encryption key and its effect on the strength of encryption of big data.
This context is in line with the nature of cloud data and the focus on the attacks that this data suffers from, such as brute-force attacks and statistical attacks.
The research discusses the components that make up the encryption key, logistics maps, and chaos.
The results reached by the study proved the merit of the research in terms of accuracy 1015 and appropriate key sensitivity 2128.
This study discussed future challenges and the possibility of using artificial intelligence algorithms and adaptive security algorithms and solving quantum encryption problems.
Related Results
An Authorized Scheme Service Privately Shared Data
An Authorized Scheme Service Privately Shared Data
In the modern digital landscape, the secure sharing of data across distributed systems remains a critical challenge. This paper proposes a blockchain-based architecture that levera...
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
The advent of distributed cloud systems has revolutionized data storage and access, providing flexibility and scalability across various industries. However, these benefits come wi...
Securing Medical Data: The Integration of Advanced Encryption Standard and Blockchain
Securing Medical Data: The Integration of Advanced Encryption Standard and Blockchain
Objective: The research is to ensure the security of medical data and prevent data breaches. To achieve this objective, An efficient solution was proposed - the integration of bloc...
Investigating data encryption technologies in securing business information systems
Investigating data encryption technologies in securing business information systems
In today’s increasingly interconnected digital landscape, businesses are confronted with the pressing need to secure sensitive information from a growing range of cyber threats. As...
Investigating data encryption technologies in securing business information systems
Investigating data encryption technologies in securing business information systems
In today’s increasingly interconnected digital landscape, businesses are confronted with the pressing need to secure sensitive information from a growing range of cyber threats. As...
Evaluation of cloud based computing in security accounting information system
Evaluation of cloud based computing in security accounting information system
The increasing reliance on cloud-based accounting information systems (AIS) has heightened concerns about data security, necessitating the adoption of effective protective measures...
Automatic Selective Encryption of DICOM Images
Automatic Selective Encryption of DICOM Images
Securing DICOM images is essential to protect the privacy of patients, especially in the era of telemedicine and eHealth/mHealth. This increases the demand for rapid security. Neve...
Secure Cloud Data with Attribute-based Honey Encryption
Secure Cloud Data with Attribute-based Honey Encryption
Abstract
Encryption is a Technique to convert plain text into Cipher text, which is unreadable without an appropriate decryption key. Hadoop is a platform to process and st...

