Implementation of a Data Protection Model dubbed Harricent_RSECC
dc.contributor.author | Twum, Frimpong | |
dc.contributor.author | Amankona, Vincent | |
dc.contributor.author | Missah, Yaw Marfo | |
dc.contributor.author | Najim, Ussiph | |
dc.contributor.author | Opoku, Michael | |
dc.contributor.orcid | 0000-0002-1869-7542 | |
dc.contributor.orcid | 0000-0001-8658-7575 | |
dc.contributor.orcid | 0000-0002-2926-681X | |
dc.contributor.orcid | 0000-0002-6973-7495 | |
dc.date.accessioned | 2023-12-06T14:48:08Z | |
dc.date.available | 2023-12-06T14:48:08Z | |
dc.date.issued | 2022 | |
dc.description | An article published in (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 13, No. 5, 2022 | |
dc.description.abstract | Every organization subsists on data, which is a quintessential resource. Quite a number of studies have been carried out relative to procedures that can be deployed to enhance data protection. However, available literature indicates most authors have focused on either encryption or encoding schemes to provide data security. The ability to integrate these techniques and leverage on their strengths to achieve a robust data protection is the pivot of this study. As a result, a data protection model, dubbed Harricent_RSECC has been designed and implemented to achieve the study’s objective through the utilization of Elliptic Curve Cryptography (ECC) and Reed Solomon (RS) codes. The model consists of five components, namely: message identification, generator module, data encoding, data encryption and data signature. The result is the generation of the Reed Solomon codewords; cipher texts; and generated hash values which are utilized to detect and correct corrupt data; obfuscates data; and sign data respectively, during transmission or storage. The contribution of this paper is the ability to combine encoding and encryption schemes to enhance data protection to ensure confidentiality, authenticity, integrity, and non-repudiation. | |
dc.description.sponsorship | KNUST | |
dc.identifier.citation | (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 13, No. 5, 2022 | |
dc.identifier.uri | https://ir.knust.edu.gh/handle/123456789/14676 | |
dc.language.iso | en | |
dc.publisher | (IJACSA) International Journal of Advanced Computer Science and Applications | |
dc.title | Implementation of a Data Protection Model dubbed Harricent_RSECC | |
dc.type | Article |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- Paper_17-Implementation_of_a_Data_Protection_Model.pdf
- Size:
- 1.67 MB
- Format:
- Adobe Portable Document Format
- Description:
License bundle
1 - 1 of 1
Loading...
- Name:
- license.txt
- Size:
- 1.71 KB
- Format:
- Item-specific license agreed to upon submission
- Description: