METHODS OF ENSURING EFFECTIVE AND SAFE DATA EXCHANGE IN INFORMATION SYSTEMS USED IN THE EDUCATIONAL SYSTEM

Authors

  • Rizayev Sardor Graduate student of the digital economy faculty, Tashkent State University of Economics, Uzbekistan
  • Qulmatova Sayyora Associate Professor of the Department of Digital Economy, Tashkent State University of Economics, Uzbekistan

Keywords:

data exchange, data protection, Information systems.

Abstract

In the development of modern information technologies, fast and secure exchange of information is gaining importance. Optimizing the process of data exchange and ensuring security through various technological solutions serves to increase the efficiency of information systems. This article explores effective and safe data-sharing methods and data protection.

References

A Mathematical Theory of Communication written by Claude Shannon https://www.quantamagazine.org

Tim Berners-Leening World Wide Web https://webfoundation.org/about/vision/history-of-the-web

Diffie, W., & Hellman, M. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22(6), 644-654.4. Akeel W, Hashim A. Using steganography for secure data storage in cloud computing. International Research Journal of Engineering and Technology (IRJET) 2017;4(4):3668–3672.

Poduval V, Koul A, Rebello D, Bhat K, Wahul RM. Cloud based secure storage of files using hybrid cryptography and image steganography. International Journal of Recent Technology and Engineering (IJRTE) 2020;8(6):665–667. doi: 10.35940/ijrte.F7227.038620. [CrossRef] [Google Scholar]

Amarendra K, Mandhala VN, Chetan Gupta B, Sudheshna GG, Anusha VV. Image steganography using LSB. International Journal of Scientific & Technology Research. 2019;8(12):906–909. [Google Scholar]

Vurukonda, N., Thirumala Rao, B. (2016) A study on data storage security issues in cloud computing. In Proceedings of the 2nd international conference on intelligent computing, communication & convergence (ICCC-2016). Procedia Computer Science, ScienceDirect. (Vol. 92, pp.128–135). Elsevier.

Satoshi Nakamoto. Bitcoin: A Peer-to-Peer Electronic Cash System" https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3440802

Goodfellow, I., Bengio, Y., & Courville, A. (2016). Deep Learning. MIT Press.

Ibrahim DS. Enhancing cloud computing security using cryptography & steganography. Iraqi Journal of Information Technology. 2019;9(3):191–224. [Google Scholar]

Fateh M, Rezvani M, Irani Y. A new method of coding for steganography based on lsb matching revisited. Hindawi Security and Communication Networks. 2021;2021(6610678):1–15. [Google Scholar]

Downloads

Published

2024-05-21