A review on structured scheme representation on data security application
With the rapid development in the era of Internet and networking technology, there is always a requirement to improve the security systems, which secure the transmitted data over an unsecured channel. The needs to increase the level of security in transferring the data always become the critical iss...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Institute of Advanced Engineering and Science
2018
|
Subjects: | |
Online Access: | https://repo.uum.edu.my/id/eprint/24359/1/IJEECS%2011%202%202018%20%20733~739.pdf |
_version_ | 1803628706567028736 |
---|---|
author | Mohd Salleh, Siti Norussaadah Din, Roshidi Zakaria, Nur Haryani Mustapha, Aida |
author_facet | Mohd Salleh, Siti Norussaadah Din, Roshidi Zakaria, Nur Haryani Mustapha, Aida |
author_sort | Mohd Salleh, Siti Norussaadah |
collection | UUM |
description | With the rapid development in the era of Internet and networking technology, there is always a requirement to improve the security systems, which secure the transmitted data over an unsecured channel. The needs to increase the level of security in transferring the data always become the critical issue. Therefore, data security is a significant area in covering the issue of security, which refers to protect the data from unwanted forces and prevent unauthorized access to a communication. This paper presents a review of structured-scheme representation for data security application. There are five structured-scheme types, which can be represented as dual-scheme, triple-scheme, quad-scheme, octal-scheme and hexa-scheme. These structured-scheme types are designed to improve and strengthen the security of data on the application. |
first_indexed | 2024-07-04T06:26:13Z |
format | Article |
id | uum-24359 |
institution | Universiti Utara Malaysia |
language | English |
last_indexed | 2024-07-04T06:26:13Z |
publishDate | 2018 |
publisher | Institute of Advanced Engineering and Science |
record_format | dspace |
spelling | uum-243592018-07-04T01:59:30Z https://repo.uum.edu.my/id/eprint/24359/ A review on structured scheme representation on data security application Mohd Salleh, Siti Norussaadah Din, Roshidi Zakaria, Nur Haryani Mustapha, Aida QA75 Electronic computers. Computer science With the rapid development in the era of Internet and networking technology, there is always a requirement to improve the security systems, which secure the transmitted data over an unsecured channel. The needs to increase the level of security in transferring the data always become the critical issue. Therefore, data security is a significant area in covering the issue of security, which refers to protect the data from unwanted forces and prevent unauthorized access to a communication. This paper presents a review of structured-scheme representation for data security application. There are five structured-scheme types, which can be represented as dual-scheme, triple-scheme, quad-scheme, octal-scheme and hexa-scheme. These structured-scheme types are designed to improve and strengthen the security of data on the application. Institute of Advanced Engineering and Science 2018-08 Article PeerReviewed application/pdf en cc4_by https://repo.uum.edu.my/id/eprint/24359/1/IJEECS%2011%202%202018%20%20733~739.pdf Mohd Salleh, Siti Norussaadah and Din, Roshidi and Zakaria, Nur Haryani and Mustapha, Aida (2018) A review on structured scheme representation on data security application. Indonesian Journal of Electrical Engineering and Computer Science, 11 (2). pp. 733-739. ISSN 2502-4752 http://iaescore.com/journals/index.php/IJEECS/article/view/12836 |
spellingShingle | QA75 Electronic computers. Computer science Mohd Salleh, Siti Norussaadah Din, Roshidi Zakaria, Nur Haryani Mustapha, Aida A review on structured scheme representation on data security application |
title | A review on structured scheme representation on data security application |
title_full | A review on structured scheme representation on data security application |
title_fullStr | A review on structured scheme representation on data security application |
title_full_unstemmed | A review on structured scheme representation on data security application |
title_short | A review on structured scheme representation on data security application |
title_sort | review on structured scheme representation on data security application |
topic | QA75 Electronic computers. Computer science |
url | https://repo.uum.edu.my/id/eprint/24359/1/IJEECS%2011%202%202018%20%20733~739.pdf |
work_keys_str_mv | AT mohdsallehsitinorussaadah areviewonstructuredschemerepresentationondatasecurityapplication AT dinroshidi areviewonstructuredschemerepresentationondatasecurityapplication AT zakarianurharyani areviewonstructuredschemerepresentationondatasecurityapplication AT mustaphaaida areviewonstructuredschemerepresentationondatasecurityapplication AT mohdsallehsitinorussaadah reviewonstructuredschemerepresentationondatasecurityapplication AT dinroshidi reviewonstructuredschemerepresentationondatasecurityapplication AT zakarianurharyani reviewonstructuredschemerepresentationondatasecurityapplication AT mustaphaaida reviewonstructuredschemerepresentationondatasecurityapplication |