A review on structured scheme representation on data security application

With the rapid development in the era of Internet and networking technology, there is always a requirement to improve the security systems, which secure the transmitted data over an unsecured channel. The needs to increase the level of security in transferring the data always become the critical iss...

Full description

Bibliographic Details
Main Authors: Mohd Salleh, Siti Norussaadah, Din, Roshidi, Zakaria, Nur Haryani, Mustapha, Aida
Format: Article
Language:English
Published: Institute of Advanced Engineering and Science 2018
Subjects:
Online Access:https://repo.uum.edu.my/id/eprint/24359/1/IJEECS%2011%202%202018%20%20733~739.pdf
_version_ 1803628706567028736
author Mohd Salleh, Siti Norussaadah
Din, Roshidi
Zakaria, Nur Haryani
Mustapha, Aida
author_facet Mohd Salleh, Siti Norussaadah
Din, Roshidi
Zakaria, Nur Haryani
Mustapha, Aida
author_sort Mohd Salleh, Siti Norussaadah
collection UUM
description With the rapid development in the era of Internet and networking technology, there is always a requirement to improve the security systems, which secure the transmitted data over an unsecured channel. The needs to increase the level of security in transferring the data always become the critical issue. Therefore, data security is a significant area in covering the issue of security, which refers to protect the data from unwanted forces and prevent unauthorized access to a communication. This paper presents a review of structured-scheme representation for data security application. There are five structured-scheme types, which can be represented as dual-scheme, triple-scheme, quad-scheme, octal-scheme and hexa-scheme. These structured-scheme types are designed to improve and strengthen the security of data on the application.
first_indexed 2024-07-04T06:26:13Z
format Article
id uum-24359
institution Universiti Utara Malaysia
language English
last_indexed 2024-07-04T06:26:13Z
publishDate 2018
publisher Institute of Advanced Engineering and Science
record_format dspace
spelling uum-243592018-07-04T01:59:30Z https://repo.uum.edu.my/id/eprint/24359/ A review on structured scheme representation on data security application Mohd Salleh, Siti Norussaadah Din, Roshidi Zakaria, Nur Haryani Mustapha, Aida QA75 Electronic computers. Computer science With the rapid development in the era of Internet and networking technology, there is always a requirement to improve the security systems, which secure the transmitted data over an unsecured channel. The needs to increase the level of security in transferring the data always become the critical issue. Therefore, data security is a significant area in covering the issue of security, which refers to protect the data from unwanted forces and prevent unauthorized access to a communication. This paper presents a review of structured-scheme representation for data security application. There are five structured-scheme types, which can be represented as dual-scheme, triple-scheme, quad-scheme, octal-scheme and hexa-scheme. These structured-scheme types are designed to improve and strengthen the security of data on the application. Institute of Advanced Engineering and Science 2018-08 Article PeerReviewed application/pdf en cc4_by https://repo.uum.edu.my/id/eprint/24359/1/IJEECS%2011%202%202018%20%20733~739.pdf Mohd Salleh, Siti Norussaadah and Din, Roshidi and Zakaria, Nur Haryani and Mustapha, Aida (2018) A review on structured scheme representation on data security application. Indonesian Journal of Electrical Engineering and Computer Science, 11 (2). pp. 733-739. ISSN 2502-4752 http://iaescore.com/journals/index.php/IJEECS/article/view/12836
spellingShingle QA75 Electronic computers. Computer science
Mohd Salleh, Siti Norussaadah
Din, Roshidi
Zakaria, Nur Haryani
Mustapha, Aida
A review on structured scheme representation on data security application
title A review on structured scheme representation on data security application
title_full A review on structured scheme representation on data security application
title_fullStr A review on structured scheme representation on data security application
title_full_unstemmed A review on structured scheme representation on data security application
title_short A review on structured scheme representation on data security application
title_sort review on structured scheme representation on data security application
topic QA75 Electronic computers. Computer science
url https://repo.uum.edu.my/id/eprint/24359/1/IJEECS%2011%202%202018%20%20733~739.pdf
work_keys_str_mv AT mohdsallehsitinorussaadah areviewonstructuredschemerepresentationondatasecurityapplication
AT dinroshidi areviewonstructuredschemerepresentationondatasecurityapplication
AT zakarianurharyani areviewonstructuredschemerepresentationondatasecurityapplication
AT mustaphaaida areviewonstructuredschemerepresentationondatasecurityapplication
AT mohdsallehsitinorussaadah reviewonstructuredschemerepresentationondatasecurityapplication
AT dinroshidi reviewonstructuredschemerepresentationondatasecurityapplication
AT zakarianurharyani reviewonstructuredschemerepresentationondatasecurityapplication
AT mustaphaaida reviewonstructuredschemerepresentationondatasecurityapplication