Secured Data Storage Using OAuth and Encryption of Data Using AES with Patterns and Hidden Layer

Vilasini, V and Hariharan, K and Nethra, Chezhian and Kaviyarasu, D (2024) Secured Data Storage Using OAuth and Encryption of Data Using AES with Patterns and Hidden Layer. In: 2024 International Conference on Smart Systems for Electrical, Electronics, Communication and Computer Engineering (ICSSEECC), Coimbatore, India.

Full text not available from this repository.

Abstract

In today's digital era, the use of data is becoming more day by day. Data is serving as a main source for all the applications we rely on. As the volume of data rapidly increases, the need for security also increases in the same phase. This brings the need for securing the data in a more effective manner. The need to protect sensitive data is underscored by the increasing intricacy of cyberattacks and the expansion of virtual commerce. It is imperative to rely on several legal and regulatory requirements for the need for data security. The failure to do so may result in severe penalties. In order to maintain trust in digital interactions, data security during transmission and storage is becoming more important as the world gets smaller. If the data is not secured in an effective manner, the growth of the companies and several other technologies may collapse and result in higher threats to the world. Both firms and governments are required to preserve intellectual property and information related to national security. The availability, confidentiality, and integrity of data are critical for sustaining innovation, trust, and business continuity. This project focusses on the two-level authentication of the system where the users are allowed to store the sensitive data. The first level authentication is provided using OAuth where it is a single sign on mechanism which is advantageous to the users to access it easily. The second level authentication is provided using the encryption technique where the Advanced Encryption Standard is used along with the creative usage of user-generated patterns as a hidden layer in the encryption process. Here a symmetric key is used for the encryption to make it more secure. The two-level authentication brings high level security for the stored data.

Item Type: Conference or Workshop Item (Paper)
Uncontrolled Keywords: AES; Cyber-attacks; Data storage; Digital era; Digital interactions; Government IS; Hidden layers; Legal requirements; Oauth; Regulatory requirements
Subjects: C Computer Science and Engineering > Information Security
C Computer Science and Engineering > Database Management System
Divisions: Computer Science and Engineering
Depositing User: Dr Krishnamurthy V
Date Deposited: 27 Sep 2024 09:42
Last Modified: 27 Sep 2024 09:42
URI: https://ir.psgitech.ac.in/id/eprint/1201

Actions (login required)

View Item
View Item