Volume 11 , Issue 1 , PP: 21-28, 2024 | Cite this article as | XML | Html | PDF | Full Length Article
Amer Ibrahim 1 , Ravi Sekhar 2 * , Jamal Fadhil Tawfeq 3 , Sinan Q. Salih 4 , Pritesh Shah 5 , Ahmed Dheyaa Radhi 6
Doi: https://doi.org/10.54216/JISIoT.110103
Corporate strategies have employed techniques that enter the domain of shadow and espionage in this rapidly developing, technologically competitive business environment. Supporting a security strategy is a way to counter these possible dangers. To preserve corporate success in the marketplace, network security needs to be crucial to the protection of electronic documents. Encryption technology has become more important in recent years for protecting online digital documents. This research was motivated by the fact that document verification has become quite time-consuming and difficult due to a variety of challenging and laborious processes. Existing technologies often malfunction when a single kind of encryption, such as AES, Data Encryption Standard (DES), or Rivest, Shamir, Adleman (RSA), is utilized at the request of the customer. Therefore, this study proposes hybrid cryptography, which integrates two novel algorithms into existing encryption protocols. A digital signature is generated for the data when a user uploads a data. The data are encrypted in parallel using the suggested Secured Hash Function-256 (SHA-256) method with improved DES and RSA (SHA-256+Enhanced DES+RSA). The proposed encryption method was shown to be more accurate than previous studies in experimental evaluations of data encryption.
Online Electronic Document , Digital Signatures , Encryption, and SHA-256 with Enhanced DES and RSA algorithm (SHA-256+Enhanced DES+RSA)
[1] N. A, Azeez, and C. Van der Vyver, “Security and Privacy Issues in E-Health Cloud-Based System: A Comprehensive Content Analysis,” Egyptian Informatics Journal, vol. 20, no. 2, p. 97-108, 2019, doi: 10.1016/j.eij.2018.12.001
[2] M. Sharma, and R. Sehrawat, “A Hybrid Multi-Criteria Decision-Making Method for Cloud Adoption: Evidence from the Healthcare Sector,” Technology in Society, vol. 61, p. 101258, 2020, doi: 10.1016/j. techsoc.2020.101258
[3] S. Shi, D. He, L. Li, N. Kumar, M. K. Khan, and K. K. R. Choo, “Applications of Blockchain in Ensuring the Security and Privacy of Electronic Health Record Systems: A Survey,” Computers and security, vol. 97, p. 101966, 2020, doi: 10.1016/j.cose.2020.101966
[4] I. Yaqoob, I. A. T. Hashem, A. Ahmed, S. M. A. Kazmi, and C. S. Hong, “Internet of Things Forensics: Recent Advances, Taxonomy, Requirements, and Open Challenges,” Future Generation Computer Systems, vol. 92, pp. 265-275, 2019, doi: 10.1016/j.future.2018.09.058
[5] X. Hu, and L. Ma, “A Study on the Hybrid Encryption Technology in the Security Transmission of Electronic Documents,” in: 2010 International Conference of Information Science and Management Engineering. vol. 1, IEEE, Shaanxi, China, pp. 60-63, Aug. 2010, doi: 10.1109/isme.2010.100
[6] S. Tanwar, K. Parekh, and R. Evans, “Blockchain-based Electronic Healthcare Record System for Healthcare 4.0 Applications,” Journal of Information Security and Applications, vol. 50, p. 102407, 2020, doi: 10.1016/j.jisa.2019.102407
[7] C. Cao, Y. Tang, D. Huang, W. Gan, and C. Zhang, “IIBE: An Improved Identity-based Encryption Algorithm for WSN Security,” Security and Communication Networks, vol. 2021, p. 8527068, 2021, doi: 10.1155/2021/8527068
[8] E. M. Zhao, and Y. Geng, “Homomorphic Encryption Technology for Cloud Computing,” Procedia Computer Science, vol. 154, pp.73-83, 2019, doi: 10.1016/j.procs.2019.06.012
[9] A. Anand, S. Rani, D. Anand, H. M. Aljahdali, and D. Kerr, “An Efficient CNN-based Deep Learning no. 19, p. 6346, 2021, doi: 10.3390/s21196346
[10] K. Kordov, “A Novel Audio Encryption Algorithm with Permutation-Substitution Architecture”, Electronics, vol. 8, no. 5, p. 530, 2019, doi: 10.3390/electronics8050530
[11] M. Zhang, Y. Chen, and J. Huang, “SE-PPFM: A Searchable Encryption Scheme Supporting Privacy- Preserving Fuzzy Multikeyword in Cloud Systems”, IEEE Systems Journal, vol, 15, no. 2, pp. 2980-2988, 2020, doi: 10.1109/jsyst.2020.2997932
[12] A. M. Ali, M. A. Ngadi, I. I. Al Barazanchi, and P. S. JosephNg, “Intelligent Traffic Model for Unmanned Ground Vehicles Based on DSDV-AODV Protocol,” Sensors (Basel), vol. 23, no. 14, p. 6426, 2023, doi: 10.3390/s23146426
[13] I. Al-Barazanchi, W. Hashim, A. Ahmed Alkahtani, H. Rasheed Abdulshaheed, H. Muwafaq Gheni, A. Murthy, E. Daghighi, SA. Shawkat, and ZA. Jaaz, “Remote Monitoring of COVID-19 Patients Using Multisensor Body Area Network Innovative System,” Computational Intelligence and Neuroscience, vol. 2022, p. 9879259, 2022, doi: 10.1155/2022/9879259
[14] Y. Niu, S. I. Kadhem, I. A. M. Al Sayed, Z. A. Jaaz, H. M. Gheni, and I. Al Barazanchi, “Energy-Saving Analysis of Wireless Body Area Network Based on Structural Analysis,” in: 2022 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA). IEEE, Ankara, Turkey, pp. 1-6, 2022, doi: 10.1109/hora55278.2022.9799972. Available from: https://ieeexplore.ieee.org/ document/9799972 [Last accessed on 2023 Nov 15].
[15] R. Al-Amri, R. K. Murugesan, E. M. Alshari, and H. S. Alhadawi, “Toward a Full Exploitation of IoT in Smart Cities: A Review of IoT Anomaly Detection Techniques,” pp. 193-214, 2022. Available from: https:// link.springer.com/10.1007/978-3-030-85990-9_17 [Last accessed on 2023 Nov 15].
[16] Z. M. Yaseen, T. T. Zigale, Tiyasha, D. Ravi Kumar, S. Q. Salih, S. Awasthi, T. M. Tung, N. Al-Ansari, and S. K. Bhagat, “Laundry Wastewater Treatment Using a Combination of Sand Filter, Bio-Char and Teff Straw Media,” Scientific Reports, vol. 9, no. 1, p. 18709, 2019, doi: 10.1038/s41598-019-54888-3
[17] S. Q. Salih, A. Sharafati, I. Ebtehaj, H. Sanikhani, R. Siddique, R. C. Deo, H. Bonakdari, S. Shahid, and Z. M. Yaseen, “Integrative Stochastic Model Standardization with Genetic Algorithm for Rainfall Pattern Forecasting in Tropical and Semi-Arid Environments,” Hydrological Sciences Journal, vol. 65, no. 7, pp. 1145-57, 2020, doi: 10.1080/02626667.2020.1734813
[18] H. Tao, S. Q. Salih, M. K. Saggi, E. Dodangeh, C. Voyant, N. Al-Ansari, Z. M. Yaseen, and S. Shahid, “A Newly Developed Integrative Bio-Inspired Artificial Intelligence Model for Wind Speed Prediction,” IEEE Access, vol. 8, pp. 83347-8358, 2020, doi: 10.1109/access.2020.2990439
[19] U. Beyaztas, S. Q Salih, K. W. Chau, N. Al-Ansari, and Z. M. Yaseen, “Construction of Functional Data Analysis Modeling Strategy for Global Solar Radiation Prediction: Application of Cross-Station Paradigm,” Engineering Applications of Computational Fluid Mechanic, vol. 13, no. 1, pp. 1165-1181, 2019, doi: 10.1080/19942060.2019.1676314
[20] S. Abdullah, J. Arshad, M. M. Khan, M. Alazab, and K. Salah, “PRISED Tangle: A Privacy-Aware Framework for Smart Healthcare Data Sharing Using IOTA Tangle,” Complex and Intelligent Systems, vol, 9, no. 3, pp. 3023-3041, 2023, doi: 10.1007/s40747-021-00610-8
[21] I. Al Barazanchi et al., “WBAN System Organization, Network Performance and Access Control: A Review,” 7th Int. Conf. Eng. Emerg. Technol. ICEET 2021, no. October, pp. 27–28, 2021, doi: 10.1109/ ICEET53442.2021.9659564.
[22] H. H. Abbas, Z. A. Jaaz, I. Al_Barazanchi, and H. R. Abdulshaheed, “Survey on Enhanced Security Control measures in Cloud Computing systems,” J. Phys. Conf. Ser., vol. 1878, no. 1, p. 012004, 2021, doi: 10.1088/1742-6596/1878/1/012004.
[23] H. H. A. and H. R. A. I. Al-Barazanchi, Z. A. Jaaz, “Practical application of IOT and its implications on the existing software,” 2020 7th Int. Conf. Electr. Eng. Comput. Sci. Informatics (EECSI), Yogyakarta, Indones., no. October, pp. 10–14, 2020, doi: 10.23919/EECSI50503.2020.9251302.