Implementation of a Data Protection Model dubbed Harricent_RSECC

dc.contributor.authorTwum, Frimpong
dc.contributor.authorAmankona, Vincent
dc.contributor.authorMissah, Yaw Marfo
dc.contributor.authorNajim, Ussiph
dc.contributor.authorOpoku, Michael
dc.contributor.orcid0000-0002-1869-7542
dc.contributor.orcid0000-0001-8658-7575
dc.contributor.orcid0000-0002-2926-681X
dc.contributor.orcid0000-0002-6973-7495
dc.date.accessioned2023-12-06T14:48:08Z
dc.date.available2023-12-06T14:48:08Z
dc.date.issued2022
dc.descriptionAn article published in (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 13, No. 5, 2022
dc.description.abstractEvery organization subsists on data, which is a quintessential resource. Quite a number of studies have been carried out relative to procedures that can be deployed to enhance data protection. However, available literature indicates most authors have focused on either encryption or encoding schemes to provide data security. The ability to integrate these techniques and leverage on their strengths to achieve a robust data protection is the pivot of this study. As a result, a data protection model, dubbed Harricent_RSECC has been designed and implemented to achieve the study’s objective through the utilization of Elliptic Curve Cryptography (ECC) and Reed Solomon (RS) codes. The model consists of five components, namely: message identification, generator module, data encoding, data encryption and data signature. The result is the generation of the Reed Solomon codewords; cipher texts; and generated hash values which are utilized to detect and correct corrupt data; obfuscates data; and sign data respectively, during transmission or storage. The contribution of this paper is the ability to combine encoding and encryption schemes to enhance data protection to ensure confidentiality, authenticity, integrity, and non-repudiation.
dc.description.sponsorshipKNUST
dc.identifier.citation(IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 13, No. 5, 2022
dc.identifier.urihttps://ir.knust.edu.gh/handle/123456789/14676
dc.language.isoen
dc.publisher(IJACSA) International Journal of Advanced Computer Science and Applications
dc.titleImplementation of a Data Protection Model dubbed Harricent_RSECC
dc.typeArticle
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Paper_17-Implementation_of_a_Data_Protection_Model.pdf
Size:
1.67 MB
Format:
Adobe Portable Document Format
Description:
License bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed to upon submission
Description:
Collections