To see the other types of publications on this topic, follow the link: Transparent Data Encryption (TDE).

Journal articles on the topic 'Transparent Data Encryption (TDE)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Transparent Data Encryption (TDE).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Vijay, Kumar Tiwari. "About Oracle TDE (Transparent Data Encryption)." International Journal of Trend in Scientific Research and Development 4, no. 1 (2019): 1085. https://doi.org/10.5281/zenodo.3609978.

Full text
Abstract:
The Transparent Data Encryption feature was announced in Oracle 10g Database Release 2 to simplify the encryption of data within datafiles, tables stopping access to it from the operating system. Tablespace encryption extends this technology, allowing encryption of the entire insides of a tablespace and tables. Vijay Kumar Tiwari "About Oracle TDE (Transparent Data Encryption)" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-1 , December 2019, URL: https://www.ijtsrd.com/papers/ijtsrd29814.pdf
APA, Harvard, Vancouver, ISO, and other styles
2

Researcher. "DATA PROTECTION STRATEGIES WITH ORACLE 19C TDE." International Journal of Information Security (IJIS) 3, no. 2 (2024): 1–22. https://doi.org/10.5281/zenodo.13169157.

Full text
Abstract:
In today’s age safeguarding data privacy and security has become a priority, for organizations in various industries. The rise in cyber threats and strict regulations highlight the need for measures to secure data. The findings indicate that Oracle 19c TDE offers a seamless and effective solution for data encryption, balancing security and performance. TDE offers functionality that streamlines encryption methods. Transparent Data Encryption (TDE) plays a role in addressing these security concerns by encrypting database files at the storage level ensuring data protection while avoiding th
APA, Harvard, Vancouver, ISO, and other styles
3

Beley, Olexander. "FEATURES OF THE MANAGEMENT OF DATA ENCRYPTION KEYS IN THE CLOUD STORAGE MS SQL AZURE." Informatyka Automatyka Pomiary w Gospodarce i Ochronie Środowiska 8, no. 4 (2018): 12–15. http://dx.doi.org/10.5604/01.3001.0012.8013.

Full text
Abstract:
The main principles of data security and access organization in the Microsoft Azure cloud storage are considered. A role of hierarchy and access keys are presented. We describe the setup and the use of their keys (BYOK) for transparent data encryption (TDE) using Azure Key Vault keyring.
APA, Harvard, Vancouver, ISO, and other styles
4

Sirisha, N., and K. V.D. Kiran. "Authorization of Data In Hadoop Using Apache Sentry." International Journal of Engineering & Technology 7, no. 3.6 (2018): 234. http://dx.doi.org/10.14419/ijet.v7i3.6.14978.

Full text
Abstract:
Big Data has become more popular, as it can provide on-demand, reliable and flexible services to users such as storage and its processing. The data security has become a major issue in the Big data. The open source HDFS software is used to store huge amount of data with high throughput and fault tolerance and Map Reduce is used for its computations and processing. However, it is a significant target in the Hadoop system, security model was not designed and became the major drawback of Hadoop software. In terms of storage, meta data security, sensitive data and also the data security will be an
APA, Harvard, Vancouver, ISO, and other styles
5

Researcher. "COMPREHENSIVE REVIEW OF INNOVATIONS IN CLOUD INFRASTRUCTURE, AI-DRIVEN CYBERSECURITY, AND ADVANCED IPTV TECHNOLOGIES." Journal of Software Engineering (JSE) 2, no. 2 (2024): 33–42. https://doi.org/10.5281/zenodo.14055967.

Full text
Abstract:
This paper provides a detailed review of recent advancements in cloud infrastructure automation, artificial intelligence (AI) applications in cybersecurity, and advanced IPTV technologies, highlighting their transformative roles in digital innovation. Key areas explored include Terraform’s capabilities in Infrastructure as Code (IaC), which significantly enhance automation in cloud environments, alongside AI-driven security protocols that fortify threat detection and response mechanisms. Furthermore, the paper examines Very Large Scale Integration (VLSI) implementations in IPTV for optim
APA, Harvard, Vancouver, ISO, and other styles
6

Sibaram, Prasad Panda. "Data Security Mechanisms in Database Management." International Journal of Computer Application 15, no. 3 (2025): 1–14. https://doi.org/10.5281/zenodo.15469196.

Full text
Abstract:
<strong>Abstract-</strong> Database security has gained wide notoriety among many individuals worldwide due to the increase in publicized incidents of the loss of or unauthorized exposure to sensitive or confidential data from major corporations, government agencies, and academic institutions. The amount of data collected, retained, and shared electronically by many institutions is steadily increasing. Consequently, the need for individuals to understand the issues, challenges, and available solutions of database security is being realized. At its core, database security strives to ensure that
APA, Harvard, Vancouver, ISO, and other styles
7

Kaliappan, Vishnu Kumar, Seungjin Yu, Rajasoundaran Soundararajan, Sangwoo Jeon, Dugki Min, and Enumi Choi. "High-Secured Data Communication for Cloud Enabled Secure Docker Image Sharing Technique Using Blockchain-Based Homomorphic Encryption." Energies 15, no. 15 (2022): 5544. http://dx.doi.org/10.3390/en15155544.

Full text
Abstract:
In recent years, container-based virtualization technology for edge and cloud computing has advanced dramatically. Virtualization solutions based on Docker Containers provide a more lightweight and efficient virtual environment for Edge and cloud-based applications. Because their use is growing on its own and is still in its early phases, these technologies will face a slew of security issues. Vulnerabilities and malware in Docker container images are two serious security concerns. The risk of privilege escalation is increased because Docker containers share the Linux kernel. This study presen
APA, Harvard, Vancouver, ISO, and other styles
8

Alohali, Manal Abdullah, Mohammed Aljebreen, Fuad Al-Mutiri, et al. "Blockchain-Driven Image Encryption Process with Arithmetic Optimization Algorithm for Security in Emerging Virtual Environments." Sustainability 15, no. 6 (2023): 5133. http://dx.doi.org/10.3390/su15065133.

Full text
Abstract:
The real world is bounded by people, hospitals, industries, buildings, businesses, vehicles, cognitive cities, and billions of devices that offer various services and interact with the world. Recent technologies, including AR, VR, XR, and the digital twin concept, provide advanced solutions to create a new virtual world. Due to the ongoing development of information communication technologies and broadcast channels, data security has become a major concern. Blockchain (BC) technology is an open, decentralized, and transparent distributed database that can be maintained by the group. BC’s major
APA, Harvard, Vancouver, ISO, and other styles
9

Ranga, Premsai. "Block Chain Based Identity and Access Management: A New Paradigm for Cybersecurity." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 2, no. 1 (2016): 1–14. https://doi.org/10.5281/zenodo.14282101.

Full text
Abstract:
The rapid growth of transaction operation data has introduced significant challenges related to balancing the need for data sharing and ensuring privacy protection. As transactions increasingly become more complex and data-driven, the sharing of this data across various stakeholders, while maintaining confidentiality and integrity, has become a critical concern. The contradiction between the transparent and immutable nature of transaction data in distributed systems and the need for stringent privacy measures presents a unique problem for industries dealing with sensitive transaction informati
APA, Harvard, Vancouver, ISO, and other styles
10

Ranga, Premsai. "Block Chain Based Identity and Access Management: A New Paradigm for Cybersecurity." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 8, no. 1 (2022): 1–14. https://doi.org/10.5281/zenodo.14513534.

Full text
Abstract:
The rapid growth of transaction operation data has introduced significant challenges related to balancing the need for data sharing and ensuring privacy protection. As transactions increasingly become more complex and data-driven, the sharing of this data across various stakeholders, while maintaining confidentiality and integrity, has become a critical concern. The contradiction between the transparent and immutable nature of transaction data in distributed systems and the need for stringent privacy measures presents a unique problem for industries dealing with sensitive transaction informati
APA, Harvard, Vancouver, ISO, and other styles
11

Maurya, Arvind Kumar, Avinash Singh, Unnati Dubey, and Shivansh Pandey and Upendra Nath Tripathi. "Protection of Data Stored in Transparent Database System using Encryption." Journal of Computer and Mathematical Sciences 10, no. 1 (2019): 190–96. http://dx.doi.org/10.29055/jcms/992.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Jackson, Jennifer, Minmin Jiang, and David Oswald. "CHERI-Crypt: Transparent Memory Encryption on Capability Architectures." IACR Transactions on Cryptographic Hardware and Embedded Systems 2025, no. 2 (2025): 268–92. https://doi.org/10.46586/tches.v2025.i2.268-292.

Full text
Abstract:
Capability architectures such as CHERI (Capability Hardware Enhanced RISC Instructions) are an emerging technology designed to provide memory safety protection at the hardware level and are equipped to eradicate approximately 70% of the current software vulnerability attack surface. CHERI is an instruction set architecture extension and has been applied to a small number of processors, including various versions of RISC-V. One of the benefits of CHERI is that it inherently provides segregation or compartmentalisation of software, making it suitable for supporting other types of applications su
APA, Harvard, Vancouver, ISO, and other styles
13

Naz, Muqaddas, Fahad A. Al-zahrani, Rabiya Khalid, et al. "A Secure Data Sharing Platform Using Blockchain and Interplanetary File System." Sustainability 11, no. 24 (2019): 7054. http://dx.doi.org/10.3390/su11247054.

Full text
Abstract:
In a research community, data sharing is an essential step to gain maximum knowledge from the prior work. Existing data sharing platforms depend on trusted third party (TTP). Due to the involvement of TTP, such systems lack trust, transparency, security, and immutability. To overcome these issues, this paper proposed a blockchain-based secure data sharing platform by leveraging the benefits of interplanetary file system (IPFS). A meta data is uploaded to IPFS server by owner and then divided into n secret shares. The proposed scheme achieves security and access control by executing the access
APA, Harvard, Vancouver, ISO, and other styles
14

Han, Jiujiang, Ziyuan Li, Jian Liu, et al. "Attribute-Based Access Control Meets Blockchain-Enabled Searchable Encryption: A Flexible and Privacy-Preserving Framework for Multi-User Search." Electronics 11, no. 16 (2022): 2536. http://dx.doi.org/10.3390/electronics11162536.

Full text
Abstract:
Searchable encryption enables users to enjoy search services while protecting the security and privacy of their outsourced data. Blockchain-enabled searchable encryption delivers the computing processes that are executed on the server to the decentralized and transparent blockchain system, which eliminates the potential threat of malicious servers invading data. Recently, although some of the blockchain-enabled searchable encryption schemes realized that users can search freely and verify search results, unfortunately, these schemes were inefficient and costly. Motivated by this, we proposed a
APA, Harvard, Vancouver, ISO, and other styles
15

Huang, Xing Li, and Huan Chun Yang. "Two-Way ID Authentication and Hardware Encryption-Based Security Design of Mobile Hard Disk." Applied Mechanics and Materials 58-60 (June 2011): 573–78. http://dx.doi.org/10.4028/www.scientific.net/amm.58-60.573.

Full text
Abstract:
The design of the "two-way ID authentication and hardware encryption-based secure mobile hard disk" adopts the smart card-based technology of two way ID authentication, thus enables higher authentication strength than ordinary password authentication and USB-KEY one way certification; adoption of dedicated hardware encryption chip on encrypting the hard disk data enhances the encryption speed; since this encryption is a hardware level encryption, it is completely transparent to users, and do not rely on the operating system or other applications, with almost no impact on system performance; th
APA, Harvard, Vancouver, ISO, and other styles
16

Maharani, Herliana Wahyu. "Application of Blockchain Technology for Digital Transaction Security on Business Incubator Websites." Conference Series 2, no. 11 (2020): 8–14. http://dx.doi.org/10.34306/conferenceseries.v2i11.328.

Full text
Abstract:
The application of Blockchain technology in the context of providing security for transactions in the digital era 4.0 to prevent manipulation of transaction recording reports by irresponsible parties. By using research methods 10 (ten) literature reviews and methods of formulating problems, designing research, collecting data, processing &amp; presenting data, analysis &amp; research reports are expected to solve security problems in transactions. At present security in transactions is still very minimal, therefore a blockchain technology is needed to secure transactions where data can still b
APA, Harvard, Vancouver, ISO, and other styles
17

Dliyanti, Aulia. "Creative Economy of College Student Gamification based on E-Commerce." Conference Series 2, no. 11 (2020): 22–30. http://dx.doi.org/10.34306/conferenceseries.v2i11.330.

Full text
Abstract:
The application of Blockchain technology in the context of providing security for transactions in the digital era 4.0 to prevent manipulation of transaction recording reports by irresponsible parties. By using research methods 10 (ten) literature reviews and methods of formulating problems, designing research, collecting data, processing &amp; presenting data, analysis &amp; research reports are expected to solve security problems in transactions. At present security in transactions is still very minimal, therefore a blockchain technology is needed to secure transactions where data can still b
APA, Harvard, Vancouver, ISO, and other styles
18

Xu, Yong Kang, Zheng Jing Wan, Ji Lan Zhang, and Jia Ju Wu. "Research and Implementation of Relational Database Encryption Technology Based on Main Memory Database." Applied Mechanics and Materials 571-572 (June 2014): 591–99. http://dx.doi.org/10.4028/www.scientific.net/amm.571-572.591.

Full text
Abstract:
As the relational database is applied widely, how to protect the sensitive data and state secrets has become a problem which needs to be solved urgently. The conventional relational database encryption technology not only reduces the system’s performance, but also results that we can not quickly inquire the encryption data through the original index mechanism due to the loss of the original partial order relation among data. This paper proposes a kind of relational database encryption technology based on the main memory database. It has not only realized the transparent encryption, decryption
APA, Harvard, Vancouver, ISO, and other styles
19

Munish Saran,. "A Secure Framework based on Sensor-Cloud architecture for Healthcare data using enhanced Elliptic Curve Encryption." Communications on Applied Nonlinear Analysis 32, no. 9s (2025): 37–49. https://doi.org/10.52783/cana.v32.3836.

Full text
Abstract:
Healthcare data security is of utmost importance in today's era due to the several reasons such as Privacy Protection, Legal and Regulatory Compliance, Protection against Data Breaches and Cyber Attacks, Patient’s Safety and Continuity of Care, Research and Innovation, Trust and Patient’s Confidence. There must be a security authority deployed that can provide efficient as well as transparent defence mechanism. Traditional technique makes use of access control lists which allows the provision for coarse-grained access to data. Whereas the proposed approach makes use of Attribute-Based Encrypti
APA, Harvard, Vancouver, ISO, and other styles
20

Bamigbade, Oluwatobi. "Balancing Encryption Laws and National Security: Challenges for Data and Energy Sector Collaboration across Borders." Journal of Engineering Research and Reports 27, no. 6 (2025): 193–213. https://doi.org/10.9734/jerr/2025/v27i61538.

Full text
Abstract:
This study examines the intersection of encryption governance and cross-border collaboration in the energy sector through a multidimensional quantitative approach. Publicly available datasets—including the ITU Global Cybersecurity Index, the World Economic Forum’s Global Risks Report, the Belfer National Cyber Power Index, and ENISA’s Threat Landscape Reports—were analyzed using Principal Component Analysis, Ordinal Logistic Regression, Multiple Linear Regression, and ARIMA time-series modeling. Results show that countries with harmonized encryption policies, such as Germany and the United Kin
APA, Harvard, Vancouver, ISO, and other styles
21

Didi, Rosiyadi, Indra Basuki Akbari, Iqbal Ramdhani Taufik, Susanto Heru, and Hasani Siregar Yusnan. "Approximation-based homomorphic encryption for secure and efficient blockchain-driven watermarking service." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 4 (2023): 4388–400. https://doi.org/10.11591/ijece.v13i4.pp4388-4400.

Full text
Abstract:
Homomorphic encryption has been widely used to preserve the privacy of watermarking process on blockchain-driven watermarking services. It offers transparent and traceable encrypted watermarking without revealing sensitive data such as original images or watermark data to the public. Nevertheless, the existing works suffer from enormous memory storage and extensive computing power. This study proposed an approximation-based homomorphic encryption for resource-efficient encrypted watermarking without sacrificing watermarking quality. We demonstrated the efficiency of the Cheon-KimKim-Son (CKKS)
APA, Harvard, Vancouver, ISO, and other styles
22

Rosiyadi, Didi, Akbari Indra Basuki, Taufik Iqbal Ramdhani, Heru Susanto, and Yusnan Hasani Siregar. "Approximation-based homomorphic encryption for secure and efficient blockchain-driven watermarking service." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 4 (2023): 4388. http://dx.doi.org/10.11591/ijece.v13i4.pp4388-4400.

Full text
Abstract:
&lt;p&gt;Homomorphic encryption has been widely used to preserve the privacy of watermarking process on blockchain-driven watermarking services. It offers transparent and traceable encrypted watermarking without revealing sensitive data such as original images or watermark data to the public. Nevertheless, the existing works suffer from enormous memory storage and extensive computing power. This study proposed an approximation-based homomorphic encryption for resource-efficient encrypted watermarking without sacrificing watermarking quality. We demonstrated the efficiency of the Cheon-Kim-Kim-
APA, Harvard, Vancouver, ISO, and other styles
23

Gao, Lixia. "Enterprise internal audit data encryption based on blockchain technology." PLOS ONE 20, no. 1 (2025): e0315759. https://doi.org/10.1371/journal.pone.0315759.

Full text
Abstract:
Internal auditing demands innovative and secure solutions in today’s business environment, with increasing competitive pressure and frequent occurrences of risky and illegal behaviours. Blockchain along with secure databases like encryption improves internal audit security through immutability and transparency. Hence integrating blockchain with homomorphic encryption and multi-factor authentication improves privacy and mitigates computational overhead. Recently, blockchain applications for internal audits in the enterprise sector are still emerging. Thus, blockchain technology in auditing prov
APA, Harvard, Vancouver, ISO, and other styles
24

Al Jaoufi, Mohammed Ahmed Ahmed, Yun Liu, and Zhen Jiang Zhang. "A Safe and Transparent Sensor Network Data Aggregation (STDA) Program." Advanced Materials Research 1079-1080 (December 2014): 591–94. http://dx.doi.org/10.4028/www.scientific.net/amr.1079-1080.591.

Full text
Abstract:
In recent years, with the rapid development of the era economy and ever-changing science and technology, today's era information gradually moving towards a diversified network communication. Sensor networks data aggregation mainly gradually reduce redundant transmission and reduce energy consumption to the maximum extent. Currently sensor network data aggregation scheme as an important form of information transmission, is widely used in all kinds of data transmission. This sink node comprehensively checks and compares data and also ensure its secure transmission of data. In the process of rese
APA, Harvard, Vancouver, ISO, and other styles
25

Ahmed, Musa Midila, and Aishatu Musa Ahmed. "Citizens’ Data Protection in E-government System." International Journal of Innovative Computing 13, no. 2 (2023): 1–9. http://dx.doi.org/10.11113/ijic.v13n2.389.

Full text
Abstract:
E-government is the use of information and communication technology for public service provision in governance. Nowadays, E-government facilitates transparent, accountable, efficient and all-inclusive governing process for improved service delivery to citizens. However, the emergence of this novel innovation opened up new security vulnerabilities to citizens’ data. Comprehensive security plan for secure linkage of people, process and technology is crucial to ensure that data and network channel is protected from potential security threats. The purpose of this study is to provide a security mod
APA, Harvard, Vancouver, ISO, and other styles
26

Keenan, Bernard. "State access to encrypted data in the United Kingdom: The ‘transparent’ approach." Common Law World Review 49, no. 3-4 (2019): 223–44. http://dx.doi.org/10.1177/1473779519892641.

Full text
Abstract:
This article foregrounds four key powers through which the UK intelligence and police agencies (broadly referred to hereafter as ‘law enforcement’) may access encrypted communications and data. It is structured as follows. First, a brief overview of the European Court of Human Rights’ jurisprudence on communications surveillance contextualises the overarching normative framework that must be translated into domestic law. The four powers are then discussed, both in legal and practical terms. The first two powers operate covertly, without the knowledge of the target. The latter two operate coerc
APA, Harvard, Vancouver, ISO, and other styles
27

Siva, Krishna Jampani. "AI and Blockchain Integration for Enhanced Cloud Storage Security and Encryption." European Journal of Advances in Engineering and Technology 8, no. 3 (2021): 92–98. https://doi.org/10.5281/zenodo.14637332.

Full text
Abstract:
The combination of Artificial Intelligence and Blockchain creates a new level of cloud storage security by creating advanced mechanisms for encryption, verification, and threat detection. Artificial intelligence serves as the first layer in proactively securing blockchain transactions through real-time monitoring of potentially vulnerable or malicious activities since blockchain keeps a record of how every encryption key used is being logged in an immutable fashion. Data integrity, privacy, and unauthorized access are some of the critical challenges in cloud storage that will be addressed by t
APA, Harvard, Vancouver, ISO, and other styles
28

Khashan, Osama A., Nour M. Khafajah, Waleed Alomoush, et al. "Dynamic Multimedia Encryption Using a Parallel File System Based on Multi-Core Processors." Cryptography 7, no. 1 (2023): 12. http://dx.doi.org/10.3390/cryptography7010012.

Full text
Abstract:
Securing multimedia data on disk drives is a major concern because of their rapidly increasing volumes over time, as well as the prevalence of security and privacy problems. Existing cryptographic schemes have high computational costs and slow response speeds. They also suffer from limited flexibility and usability from the user side, owing to continuous routine interactions. Dynamic encryption file systems can mitigate the negative effects of conventional encryption applications by automatically handling all encryption operations with minimal user input and a higher security level. However, m
APA, Harvard, Vancouver, ISO, and other styles
29

Ch. Jyothi, Gaddam Udaya Sri, Manya Madhuri, Beena Kumari, and P. Udhay Kiran. "SECUREFILECHAIN: A BIOMETRIC-DRIVEN AND CHACHA ENHANCED FRAMEWORK FOR PRIVACY-PRESERVING DATA SHARING IN CYBER-PHYSICAL-SOCIAL SYSTEMS." International Journal of Engineering Research and Science & Technology 21, no. 3 (1) (2025): 608–15. https://doi.org/10.62643/ijerst.v21.n3(1).pp608-615.

Full text
Abstract:
This research presents a secure, biometric‐enabled file‐sharing platform that combines Elliptic Curve Integrated Encryption Scheme (ECIES) with ChaCha20 symmetric encryption to balance confidentiality and performance. Users register by submitting a SHA‐256–hashed username, plaintext password, and a fingerprint image (also hashed). On login, biometric verification ensures that only legitimate users gain access. When a file is uploaded, ECIES encrypts the content under the registered user’s public key, producing ciphertext stored in a protected static directory. Simultaneously, ChaCha20 encrypti
APA, Harvard, Vancouver, ISO, and other styles
30

Iqbal, Ahmed, and Irfan Alam Fahim. "Integrity verification for an optimized cloud architecture." TELKOMNIKA Telecommunication, Computing, Electronics and Control 18, no. 1 (2020): 166–73. https://doi.org/10.12928/TELKOMNIKA.v18i1.14105.

Full text
Abstract:
Cloud computing has significantly benefited today&rsquo;s environment of IT industry through its mobility, sustainability, security, cost savings and several other important features. The risk of data loss on cloud in case of dealing with hardware and software is relatively small. However, the issue of data security becomes imminent when we are storing personal data on the cloud which is not transparent to users. In this paper, we introduce a new entity in terms of a virtual machine that provides services and assurance beyond service level agreement (SLA). In the proposed model, a role of data
APA, Harvard, Vancouver, ISO, and other styles
31

Amoruso, Edward L., Richard Leinecker, and Cliff C. Zou. "User Privacy Protection via Windows Registry Hooking and Runtime Encryption." Sensors 24, no. 16 (2024): 5106. http://dx.doi.org/10.3390/s24165106.

Full text
Abstract:
The Windows registry contains a plethora of information in a hierarchical database. It includes system-wide settings, user preferences, installed programs, and recently accessed files and maintains timestamps that can be used to construct a detailed timeline of user activities. However, these data are unencrypted and thus vulnerable to exploitation by malicious actors who gain access to this repository. To address this security and privacy concern, we propose a novel approach that efficiently encrypts and decrypts sensitive registry data in real time. Our developed proof-of-concept program int
APA, Harvard, Vancouver, ISO, and other styles
32

Puchala, Dariusz, Kamil Stokfiszewski, and Mykhaylo Yatsymirskyy. "Image Statistics Preserving Encrypt-then-Compress Scheme Dedicated for JPEG Compression Standard." Entropy 23, no. 4 (2021): 421. http://dx.doi.org/10.3390/e23040421.

Full text
Abstract:
In this paper, the authors analyze in more details an image encryption scheme, proposed by the authors in their earlier work, which preserves input image statistics and can be used in connection with the JPEG compression standard. The image encryption process takes advantage of fast linear transforms parametrized with private keys and is carried out prior to the compression stage in a way that does not alter those statistical characteristics of the input image that are crucial from the point of view of the subsequent compression. This feature makes the encryption process transparent to the com
APA, Harvard, Vancouver, ISO, and other styles
33

Benaich, Rihab, Saida El Mendili, and Youssef Gahi. "Advancing Healthcare Security: A Cutting-Edge Zero-Trust Blockchain Solution for Protecting Electronic Health Records." HighTech and Innovation Journal 4, no. 3 (2023): 630–52. http://dx.doi.org/10.28991/hij-2023-04-03-012.

Full text
Abstract:
The effective management of electronic health records (EHRs) is vital in healthcare. However, traditional systems often need help handling data inconsistently, providing limited access, and coordinating poorly across facilities. This study aims to tackle these issues using blockchain technology to improve EHR systems' data security, privacy, and interoperability. By thoroughly analyzing blockchain's applications in healthcare, we propose an innovative solution that leverages blockchain's decentralized and immutable nature, combined with advanced encryption techniques such as the Advanced Encry
APA, Harvard, Vancouver, ISO, and other styles
34

Elbarbary, Enas, Ghada Abdelhady, Hussam Elbehiery, and Abdelhalim Zekry. "Secured Transparent Computerized Voting System performance measurements." International Journal of Engineering & Technology 4, no. 2 (2015): 327. http://dx.doi.org/10.14419/ijet.v4i2.4441.

Full text
Abstract:
In this paper, a multipurpose Secured Transparent Computerized Voting System (STCVS) is proposed. STCVS introduces an improvement methodology to the regular election systems. It could handle electronic ballots with multiple scopes at the same time, e.g., presidential, parliamentary, local, amongst others. STCVS's design warrants well-secured identification and authentication processes for the voter via using voter's digital signatures, certificates. Also, it guarantees voting data protection via encryption. Tallying of the voting counts is achieved automatically; candidates recorded percentage
APA, Harvard, Vancouver, ISO, and other styles
35

Landge, Mr Sarang. "A Blockchain-Powered E-Voting System with SHA-256 Encryption." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem32060.

Full text
Abstract:
E-voting systems hold promise for revolutionizing the electoral process by offering efficiency, accessibility, and transparency. However, concerns about security and integrity have hindered their widespread adoption. In this research paper, we propose a blockchain-based e-voting system leveraging the SHA-256 algorithm to address these challenges. Our system utilizes blockchain technology to create a tamper-proof and immutable ledger of votes, ensuring transparency and accountability throughout the voting process. The SHA-256 algorithm is employed to secure data integrity, providing robust prot
APA, Harvard, Vancouver, ISO, and other styles
36

A, Mahesh Chandra. "Smart Contract-Based E-Commerce System for Transparent and Auto Bmated Transactions Using Blockchain." International Journal for Research in Applied Science and Engineering Technology 13, no. 4 (2025): 3123–31. https://doi.org/10.22214/ijraset.2025.68856.

Full text
Abstract:
The migration of E-commerce applications to Blockchain offers a resilient solution to the vulnerabilities inherent in centralized servers. By dispersing data across multiple nodes, Blockchain ensures continuous service availability, even in the event of server failure or cyber attacks. Moreover, its inherent encryption and immutability features guarantee the security and integrity of customer and product data. Blockchain revolutionizes the E-commerce landscape by providing decentralized platforms that address critical challenges such as security, transparency, efficiency, and trust. This techn
APA, Harvard, Vancouver, ISO, and other styles
37

Elsa Wulandari, Annastasya Nabila, and Purwono. "Smart Contracts for Data Sharing in Drug Development a Systematic Review of Security and Transparent Measurement." Journal of Advanced Health Informatics Research 2, no. 1 (2024): 24–37. https://doi.org/10.59247/jahir.v2i1.288.

Full text
Abstract:
This systematic literature review explores the role of smart contracts in improving data sharing for drug development, with an emphasis on security and transparency. Using blockchain technology, smart contracts offer a decentralized tracking mechanism for pharmaceutical supply chains, addressing challenges related to drug authentication and supply chain optimization. The review examined 52 studies using the PRISMA methodology, highlighting the automation of data exchange, reduced reliance on external parties, and acceleration of operational processes. Advanced encryption and strict access cont
APA, Harvard, Vancouver, ISO, and other styles
38

Demertzis, Konstantinos, Konstantinos Rantos, Lykourgos Magafas, Charalabos Skianis, and Lazaros Iliadis. "A Secure and Privacy-Preserving Blockchain-Based XAI-Justice System." Information 14, no. 9 (2023): 477. http://dx.doi.org/10.3390/info14090477.

Full text
Abstract:
Pursuing “intelligent justice” necessitates an impartial, productive, and technologically driven methodology for judicial determinations. This scholarly composition proposes a framework that harnesses Artificial Intelligence (AI) innovations such as Natural Language Processing (NLP), ChatGPT, ontological alignment, and the semantic web, in conjunction with blockchain and privacy techniques, to examine, deduce, and proffer recommendations for the administration of justice. Specifically, through the integration of blockchain technology, the system affords a secure and transparent infrastructure
APA, Harvard, Vancouver, ISO, and other styles
39

Mohanty, Dr Rajnikanth. "BlockShare – Blockchain Based Secure Data Sharing Platform." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem46157.

Full text
Abstract:
Abstract - In the rapidly advancing digital era, the requirement for secure, transparent, and reliable data-sharing mechanisms has become increasingly critical across various sectors. Traditional centralized data-sharing models suffer from inherent limitations, including vulnerability to data breaches, unauthorized access, single points of failure, and insufficient transparency in data access and audit trails. These challenges compromise not only the confidentiality and integrity of sensitive data but also erode stakeholder trust in digital systems. To overcome these issues, this paper present
APA, Harvard, Vancouver, ISO, and other styles
40

Ruth Ramya, K., D. N.V.Saikrishna, T. Sravya Nandini, and R. Tanmai Gayatri. "A Survey on Using Biometrics for Cloud Security." International Journal of Engineering & Technology 7, no. 2.32 (2018): 307. http://dx.doi.org/10.14419/ijet.v7i2.32.15701.

Full text
Abstract:
Cloud computing the most emerging data storage and processing technology. Today many organizations are using cloud-based data storage because of their complex data management. Even though cloud is attracting many users towards using it but there is a requirement of security concerns to be taken care of because cloud is untrusted, the data which individual stores on cloud will be transparent to cloud administrator also which may be confidential. So, while using cloud security is the primary concern. In this paper, we proposed a scheme to encrypt cloud data using user attribute-based encryption.
APA, Harvard, Vancouver, ISO, and other styles
41

Ali, Aitizaz, Bander Ali Saleh Al-rimy, Faisal S. Alsubaei, Abdulwahab Ali Almazroi, and Abdulaleem Ali Almazroi. "HealthLock: Blockchain-Based Privacy Preservation Using Homomorphic Encryption in Internet of Things Healthcare Applications." Sensors 23, no. 15 (2023): 6762. http://dx.doi.org/10.3390/s23156762.

Full text
Abstract:
The swift advancement of the Internet of Things (IoT), coupled with the growing application of healthcare software in this area, has given rise to significant worries about the protection and confidentiality of critical health data. To address these challenges, blockchain technology has emerged as a promising solution, providing decentralized and immutable data storage and transparent transaction records. However, traditional blockchain systems still face limitations in terms of preserving data privacy. This paper proposes a novel approach to enhancing privacy preservation in IoT-based healthc
APA, Harvard, Vancouver, ISO, and other styles
42

Litvinov, V. S., A. A. Vlasov, and D. V. Teytelbaum. "Development of Software for Transparent Remote Access to Technological Parameters of Drilling and Data from a Downhole Telemetry System in Unstable Communication Conditions." Vestnik NSU. Series: Information Technologies 17, no. 2 (2019): 101–13. http://dx.doi.org/10.25205/1818-7900-2019-17-2-101-113.

Full text
Abstract:
In some cases, the drilling of oil and gas wells requires support for the drilling process, which consists in monitoring the parameters and making urgent decisions. Accompanying drilling takes place using the existing communication channels between the office and drilling. Satellite and mobile communications are most common. They are characterized by a low speed of receiving and transmitting data, frequent disconnects, the use of NAT. As part of this work, a software tool has been developed for transparent access to drilling parameters and measurements while drilling from a telemetry system in
APA, Harvard, Vancouver, ISO, and other styles
43

Awasare, Om R. "Advanced Cryptographic Technologies in Blockchain." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem51038.

Full text
Abstract:
In the evolving landscape of digital technologies, blockchain has emerged as a cornerstone for building decentralized, transparent, and tamper-proof systems. Central to the security and reliability of blockchain is the use of advanced cryptographic techniques, which ensure data integrity, user privacy, and resistance to malicious attacks. This paper provides a comprehensive analysis of cutting-edge cryptographic technologies that are shaping the future of blockchain networks. Key mechanisms discussed include zero-knowledge proofs, homomorphic encryption, ring signatures, and post-quantum crypt
APA, Harvard, Vancouver, ISO, and other styles
44

Jamali, Mujeeb-ur-Rehman, Dr Najma Nawaz Channa, Aadil Jamali, Asad Ali Jamali, Mazher Ali, and Abdul Khalique Baloch. "Blockchain Technology Performance of Asymmetric Algorithms: An Empirical Study." VFAST Transactions on Software Engineering 11, no. 3 (2023): 10–24. http://dx.doi.org/10.21015/vtse.v11i3.1580.

Full text
Abstract:
Blockchain technology is a transparent, and unchangeable distributed ledger. It has the potential to transform the way to interact with the digital world by allowing to construct a decentralized database that is tamper-proof. Concerns regarding the security of confidential and sensitive data being outsourced are rising. It is possible that service providers may be dishonest since unscrupulous administrators have access to, may alter, and can misuse private and sensitive data. Security precautions are necessary because sensitive data stored on public clouds has to be safeguarded. There is no me
APA, Harvard, Vancouver, ISO, and other styles
45

Garcia Valencia, Oscar A., Supawadee Suppadungsuk, Charat Thongprayoon, et al. "Ethical Implications of Chatbot Utilization in Nephrology." Journal of Personalized Medicine 13, no. 9 (2023): 1363. http://dx.doi.org/10.3390/jpm13091363.

Full text
Abstract:
This comprehensive critical review critically examines the ethical implications associated with integrating chatbots into nephrology, aiming to identify concerns, propose policies, and offer potential solutions. Acknowledging the transformative potential of chatbots in healthcare, responsible implementation guided by ethical considerations is of the utmost importance. The review underscores the significance of establishing robust guidelines for data collection, storage, and sharing to safeguard privacy and ensure data security. Future research should prioritize defining appropriate levels of d
APA, Harvard, Vancouver, ISO, and other styles
46

Vittal Rao Baikadolla. "Balancing Innovation and Privacy: Addressing Surveillance Concerns in Healthcare AI Systems." Journal of Computer Science and Technology Studies 7, no. 7 (2025): 921–29. https://doi.org/10.32996/jcsts.2025.7.7.101.

Full text
Abstract:
Healthcare AI systems promise revolutionary advancements in opinion, treatment, and care delivery, yet produce unknown sequestration challenges as these technologies bear vast patient datasets to serve effectively. This pressure between invention and sequestration protection represents an abecedarian incongruity in healthcare's digital metamorphosis. Recent sequestration breaches, instigated by controversial data-participating hookups between healthcare systems and technology companies, have eroded public trust and stressed crunches in traditional concurrence models and nonsupervisory fabrics.
APA, Harvard, Vancouver, ISO, and other styles
47

Chananagari Prabhakar, Rohit Reddy. "Enhancing Data Security in Higher Education Administration: Strategies for Protecting Student Information and Institutional Integrity in Cloud-Based Systems." Journal of Artificial Intelligence & Cloud Computing 2, no. 3 (2023): 1–4. http://dx.doi.org/10.47363/jaicc/2023(2)e150.

Full text
Abstract:
The widespread adoption of cloud-based systems in higher education has brought significant benefits and heightened concerns over data security. This research paper explores practical strategies for enhancing data security in cloud-based systems used by higher education institutions. The study employed a literature review, case studies, and surveys to gather data on current practices, challenges, and technological solutions in data security. The findings reveal that while cloud computing offers convenience and cost savings, it also introduces new vulnerabilities that must be addressed through a
APA, Harvard, Vancouver, ISO, and other styles
48

Ramakrishnan, Mr R., B. Beula grace, and K. Shanmugapriya. "Civis ID with True Face: A Biometric Voting System for Secure and Transparent Elections." International Scientific Journal of Engineering and Management 03, no. 12 (2024): 1–6. https://doi.org/10.55041/isjem02169.

Full text
Abstract:
The "Civis ID with True Face" project presents an innovative approach to modernizing the electoral process by integrating biometric facial recognition technology for voter authentication. This system addresses critical challenges in traditional voting methods, such as voter fraud, impersonation, and inefficiencies caused by manual verification processes. By leveraging machine learning algorithms and advanced AI models, it ensures that only eligible voters can cast their votes, thus enhancing the security and integrity of elections. The project also prioritizes user accessibility, offering a se
APA, Harvard, Vancouver, ISO, and other styles
49

Sathyananda Kumar Pamarthy. "Implementing Robust Data Privacy and Security in Modern ERP Systems: A Technical Deep Dive." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 1 (2025): 2360–65. https://doi.org/10.32628/cseit251112258.

Full text
Abstract:
Enterprise Resource Planning (ERP) systems have become crucial components in modern business operations, demanding robust security measures to protect sensitive data and maintain operational integrity. This comprehensive article explores the multifaceted aspects of ERP security, focusing on advanced access control mechanisms, data protection strategies, and compliance requirements. The implementation of Role-Based Access Control (RBAC), multi-factor authentication, and biometric verification has significantly enhanced security protocols while improving operational efficiency. Data protection m
APA, Harvard, Vancouver, ISO, and other styles
50

Savchenko, Mykyta, Vitaliy Tsyganok, and Oleh Andriichuk. "Decision Support Systems' Security Model Based on Decentralized Data Platforms." Decision Support Systems' Security Model Based on Decentralized Data Platforms 2318 (June 7, 2018): 209–21. https://doi.org/10.5281/zenodo.13843777.

Full text
Abstract:
Modern information systems, especially high-risk systems which work with important data lack proper security models. Decision support sys- tems and recommendations they produce are extremely dependent on the data they produce recommendations on, hence they require the most secure data platform and transparent history of data input and changes. Many of such sys- tems are centralized and are stored in a single place, like a data center or even a single machine, where important data can be lost easily. Most importantly, it can be tampered without many complications, as for the typical setup there
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!