European Journal of Computer Science and Information Technology (EJCSIT)

EA Journals

Encryption

Big Data Security on Hadoop Open Source Frame for Healthcare Data Management using One-Time-Pad Encryption Algorithm (Published)

The study elicited knowledge about the factors associated with one-time pad encryption/decryption with big data in healthcare; formulate an assembled algorithms model for one-time pad encryption; design and implement the system and evaluating the system performance with the view implementing big data security on Hadoop open-source framework for healthcare data. Literature was sourced to investigate the factors associated with healthcare security attacks and various consequences of breach of data. An assembled algorithm model was formulated using mathematical theory of one-time pad encryption and a model was designed using Universal Modelling Language (UML) and implemented using python programming language, Distributed File System of Hadoop, Yet Another Resource Negotiator called YARN; encryption time and decryption time was adopted for the performance metrics deployed for the evaluation of the developed system. The result showed that as the size of the files increased, the encryption/decryption time keeps increasing as well. While carryout the algorithm evaluation, two different values (file sizes) were used for testing on the Hadoop framework.Securing the healthcare (Ebola) big-data, it was observed that OTP encryption/decryption performed better compared to AES encryption/decryption in term of computational processing time of the healthcare big-data considered. Considering before/after downloading, it was observed that there was need for authentication for another level of security towards securing healthcare records on HDFS. The study concluded that, big data analytics on Hadoop is ideal for today’s big healthcare data and also that One Time Pad encryption algorithm is sufficient to provide needed big healthcare data security.

Keywords: Algorithm, Big Data, Encryption, Hadoop, data security, data vulnerabilities

Utilization of Security Techniques for Cyber Warfare: KSA (Published)

Cyber warfare is considered mysterious targets of unknown sources that move through information and communication networks worldwide and use electronic weapons targeting information technology. They are directed against vital installations or invaded by agents of the intelligence services.  Cybersecurity is one of the most significant digital technological breakthroughs that the world is now witnessing. It is considered the first weapon specialized in defending computers, electronic systems, and data from malicious attacks, servers, mobile devices, and networks.  As a result, the goal of this research is to determine how Saudi Arabia uses security approaches for cyber warfare. The study adopted the descriptive method which addressed several aspects related to the strategies and security techniques for cyber warfare. The results indicate that the focus on cyber that pays importance to the possible countermeasures and preventive techniques that could be used to counter the risks of attackers, and discusses the encryption and watermark measures organizations can protect data against the illegal leak and hacking.

Citation: Ohoud S. Al-Harthi, Osama S. Faragallah, and Jehad F.  Al-Amri (2021) Utilization of Security Techniques for Cyber Warfare: KSA, European Journal of Computer Science and Information Technology, Vol.9, No.4, pp.54-72,

 

 

Keywords: Cybersecurity, Encryption, cyber warfare, watermark

ADOPTION OF RFID TECHNOLOGY IN KENYA (Published)

The objective of this research was to evaluate knowledge of RFID systems in the Kenyan ICT sector. This was in tandem with my Master’s thesis titled “Enhancing RFID Application Data Security Using RSA Algorithm”. To enhance the current security measures and controls in current RFID applications I propose RSA algorithm as the best suited public cryptosystems in the currently available encryption standards. As I collected my data from the different respondents I issued my questionnaires I found varying responses across the board, some knew of RFID and RSA algorithm while others have never heard of RFID and RSA algorithm. After collection of this data i used SPSS to analyze it and the deductions I attained formed the basis of this publication. This research was focused wholly in the Kenyan ICT sector and evaluated the knowledge of RFID in sector.

Keywords: Encryption, RFID, RSA algorithm

Scroll to Top

Don't miss any Call For Paper update from EA Journals

Fill up the form below and get notified everytime we call for new submissions for our journals.