METHODS OF ENSURING EFFECTIVE AND SAFE DATA EXCHANGE IN INFORMATION SYSTEMS USED IN THE EDUCATIONAL SYSTEM
Parole chiave:
data exchange, data protection, Information systems.Abstract
In the development of modern information technologies, fast and secure exchange of information is gaining importance. Optimizing the process of data exchange and ensuring security through various technological solutions serves to increase the efficiency of information systems. This article explores effective and safe data-sharing methods and data protection.
Riferimenti bibliografici
A Mathematical Theory of Communication written by Claude Shannon https://www.quantamagazine.org
Tim Berners-Leening World Wide Web https://webfoundation.org/about/vision/history-of-the-web
Diffie, W., & Hellman, M. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22(6), 644-654.4. Akeel W, Hashim A. Using steganography for secure data storage in cloud computing. International Research Journal of Engineering and Technology (IRJET) 2017;4(4):3668–3672.
Poduval V, Koul A, Rebello D, Bhat K, Wahul RM. Cloud based secure storage of files using hybrid cryptography and image steganography. International Journal of Recent Technology and Engineering (IJRTE) 2020;8(6):665–667. doi: 10.35940/ijrte.F7227.038620. [CrossRef] [Google Scholar]
Amarendra K, Mandhala VN, Chetan Gupta B, Sudheshna GG, Anusha VV. Image steganography using LSB. International Journal of Scientific & Technology Research. 2019;8(12):906–909. [Google Scholar]
Vurukonda, N., Thirumala Rao, B. (2016) A study on data storage security issues in cloud computing. In Proceedings of the 2nd international conference on intelligent computing, communication & convergence (ICCC-2016). Procedia Computer Science, ScienceDirect. (Vol. 92, pp.128–135). Elsevier.
Satoshi Nakamoto. Bitcoin: A Peer-to-Peer Electronic Cash System" https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3440802
Goodfellow, I., Bengio, Y., & Courville, A. (2016). Deep Learning. MIT Press.
Ibrahim DS. Enhancing cloud computing security using cryptography & steganography. Iraqi Journal of Information Technology. 2019;9(3):191–224. [Google Scholar]
Fateh M, Rezvani M, Irani Y. A new method of coding for steganography based on lsb matching revisited. Hindawi Security and Communication Networks. 2021;2021(6610678):1–15. [Google Scholar]
##submission.downloads##
Pubblicato
Fascicolo
Sezione
Licenza
Copyright (c) 2024 GEJournals
Questo lavoro è fornito con la licenza Creative Commons Attribuzione - Non commerciale - Non opere derivate 4.0 Internazionale.