DATA PROTECTION TECHNIQUES: A CRYPTOGRAPHY APPROACH
DOI:
https://doi.org/10.47941/jts.533Keywords:
Data Protection, CryptographyAbstract
Purpose: Digital world is a complex and a constantly evolving world alongside the modernization. This has been through the improvement of the technology from physical nature information to digitized data that is the information technology. Data is, therefore, becoming a basic element in today's world than they were anticipated some three decades ago, now being shared and stored electronically. This study, therefore, sought to establish the ways in protecting information privacy using cryptography.
Methodology: The study adopted a desktop literature review method (desk study). This involved an in-depth review of studies related to data protection and cryptography. Three sorting stages were implemented on the subject under study that is data protection and cryptography in order to determine the viability of the subject for research. The first stage that comprised the initial identification of all articles that were based on data protection and cryptography from various data bases. A second search involved fully available publications on the subject of data protection and cryptography. the third step involved the selection of fully accessible publications. Reduction of the literature to only fully accessible publications yielded specificity and allowed the researcher to focus on the articles that related to data protection and cryptography which was split into top key words. After an in-depth search into the top key words (data protection and cryptography), the researcher arrived at 12 articles that were suitable for analysis. Analysis was done using Excel where the study presented the findings in form of themes.
Findings: The research findings point towards several methods that can be used in cryptography which were concluded to include symmetric encryption, asymmetric encryption and hashing.
Unique contribution to theory, policy, and practice: Previous studies were reviewed and some of them presented several knowledge gaps. The review of the literature presented knowledge gaps in the contextual, conceptual and methodological fronts. For instance, one of the gap that was presented was the contextual gap (geographical gap). This is because some of the studies were done in different geographical contexts such as the United States, China and Japan. The application of the findings will be challenged by the technological advancements in Kenya since Kenya is still a developing country in the process of up taking new technologies. Other studies in their research applied different methodologies such as the use of the FTK Imager and the use of Hashing. The studies did not entirely focus on the use of cryptography as a method of data security and thus they presented a methodological gap.
Downloads
References
Ablon, L. (2018). Data Thieves: The Motivations of Cyber Threat Actors and Their Use and Monetization of Stolen Data. RAND.
Austin, T. (2016). Towards a digital infrastructure for engineering materials data. Materials Discovery, 3, 1-12.
Capgemini. (2017). A History of Bitcoin. Retrieved from https://www.capgemini.com/beyondthe-buzz/cryptocurrency-blockchain
Douglas, M., Bailey, K., Leeney, M., & Curran, K. (2018). An overview of steganography techniques applied to the protection of biometric data. Multimedia Tools and Applications, 77(13), 17333-17373.
Goel, A., & Dey, S. (2016). A fingerprint based crypto-biometric system for secure communication. Discipline of Computer Science and Engineering, IIT Indore.
Izhar, S., Kaushal, A., Fatima, R., & Qadeer, M. A. (2017, November). Enhancement in data security using cryptography and compression. In 2017 7th International Conference on Communication Systems and Network Technologies (CSNT)(pp. 212-215). IEEE.
Khan, M. T. (2017). Network Security Mechanisms and Cryptography. International Journal of Computer Science and Mobile Computing, (6)7, 138-146.
Lee, I. (Ed.). (2017). The Internet of Things in the Modern Business Environment. IGI Global.
Lord, S. (2016). Bankchain & Itbit: Settling On The Blockchain. Modern Trader, pp 16-21.
Madan, S. (Ed.). (2016). Securing Transactions and Payment Systems for M-commerce. IGI Global.
Oetzel, J., & Miklian, J. (2017). Multinational enterprises, risk management, and the business and economics of peace. Multinational Business Review, 25(4), 270-286.
Poonguzhali, P. K., & Moorthy, N. A. (2017). Design of a Dynamic Clustering With Secured Hashing Technique in Wireless Sensor Network. Asian Journal of Applied Science and Technology (AJAST), 1(4), 28-33.
PwC. (2016). Making sense of bitcoin, cryptocurrency, and blockchain. Retrieved from https://www.pwc.com/us/en/financial-services/fintech/bitcoinblockchaincryptocurrency.html
Saleh, M. E., Aly, A. A., & Omara, F. A. (2016). Data Security Using Cryptography and Steganography Techniques. IJACSA) International Journal of Advanced Computer Science and Applications, 7(6), 390-397.
Shah, M. S. M. B., Saleem, S., & Zulqarnain, R. (2017). Protecting digital evidence integrity and preserving chain of custody. Journal of Digital Forensics, Security and Law, 12(2), 12.
Spindler, G., & Schmechel, P. (2016). Personal data and encryption in the European general data protection regulation. J. Intell. Prop. Info. Tech. & Elec. Com. L., 7, 163.
Stallings, W. (2017). Cryptography and network security: principles and practice (pp. 92-95). Upper Saddle River: Pearson.
Wesley, M. (2018). An investigation into the diffusion of the cryptocurrency innovation.
Woodside, J. M., Augustine Jr, F. K., & Giberson, W. (2017). Blockchain technology adoption status and strategies. Journal of International Technology and Information Management, 26(2), 65-93.
Yamauchi, L. A., Ponte, E., Ratliffe, K. T., & Traynor, K. (2017). Theoretical and Conceptual Frameworks Used in Research on Family-School Partnerships. School Community Journal, 27(2), 9-34.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2021 Journal of Technology and Systems
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution (CC-BY) 4.0 License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.