Journal of Intelligent Systems and Internet of Things

Journal DOI

https://doi.org/10.54216/JISIoT

Submit Your Paper

2690-6791ISSN (Online) 2769-786XISSN (Print)

Volume 11 , Issue 1 , PP: 21-28, 2024 | Cite this article as | XML | Html | PDF | Full Length Article

Security and Privacy Protection for Online Electronic Documents Based on Novel Encryption Techniques

Amer Ibrahim 1 , Ravi Sekhar 2 * , Jamal Fadhil Tawfeq 3 , Sinan Q. Salih 4 , Pritesh Shah 5 , Ahmed Dheyaa Radhi 6

  • 1 College of Computer and Information Technology, American University in the Emirates, Dubai, United Arab Emirates, - (amer.ibrahim@aue.ae)
  • 2 Symbiosis Institute of Technology (SIT) Pune Campus, Symbiosis International (Deemed University) (SIU), Pune, 412115, Maharashtra, India - (ravi.sekhar@sitpune.edu.in)
  • 3 Department of Medical Instrumentation Technical Engineering, Medical Technical College, Al-Farahidi University, Baghdad, Iraq - (jamaltawfeq55@gmail. com)
  • 4 Department of Medical Instrumentation, Technical College of Engineering, Al-Bayan University, Baghdad, Iraq - ( Sinan.salih@albayan.edu.iq)
  • 5 Symbiosis Institute of Technology (SIT) Pune Campus, Symbiosis International (Deemed University) (SIU), Pune, 412115, Maharashtra, India - (pritesh.shah@sitpune.edu.in)
  • 6 College of Pharmacy, University of Al-Ameed, Karbala PO Box 198, Iraq - (ahmosawi@alameed.edu.iq)
  • Doi: https://doi.org/10.54216/JISIoT.110103

    Received: July 20, 2023 Revised: November 20, 2023 Accepted: December 02, 2023
    Abstract

    Corporate strategies have employed techniques that enter the domain of shadow and espionage in this rapidly developing, technologically competitive business environment. Supporting a security strategy is a way to counter these possible dangers. To preserve corporate success in the marketplace, network security needs to be crucial to the protection of electronic documents. Encryption technology has become more important in recent years for protecting online digital documents. This research was motivated by the fact that document verification has become quite time-consuming and difficult due to a variety of challenging and laborious processes. Existing technologies often malfunction when a single kind of encryption, such as AES, Data Encryption Standard (DES), or Rivest, Shamir, Adleman (RSA), is utilized at the request of the customer. Therefore, this study proposes hybrid cryptography, which integrates two novel algorithms into existing encryption protocols. A digital signature is generated for the data when a user uploads a data. The data are encrypted in parallel using the suggested Secured Hash Function-256 (SHA-256) method with improved DES and RSA (SHA-256+Enhanced DES+RSA). The proposed encryption method was shown to be more accurate than previous studies in experimental evaluations of  data encryption.

    Keywords :

    Online Electronic Document , Digital Signatures , Encryption, and SHA-256 with Enhanced DES and RSA algorithm (SHA-256+Enhanced DES+RSA)

    References

    [1] N. A, Azeez, and C. Van der Vyver, “Security and Privacy Issues in E-Health Cloud-Based System: A Comprehensive Content Analysis,” Egyptian Informatics Journal, vol. 20, no. 2, p. 97-108, 2019, doi: 10.1016/j.eij.2018.12.001

    [2] M. Sharma, and R. Sehrawat, “A Hybrid Multi-Criteria Decision-Making Method for Cloud Adoption: Evidence from the Healthcare Sector,” Technology in Society, vol. 61, p. 101258, 2020, doi: 10.1016/j. techsoc.2020.101258

    [3] S. Shi, D. He, L. Li, N. Kumar, M. K. Khan, and K. K. R. Choo, “Applications of Blockchain in Ensuring the Security and Privacy of Electronic Health Record Systems: A Survey,” Computers and security, vol. 97, p. 101966, 2020, doi: 10.1016/j.cose.2020.101966

    [4] I. Yaqoob, I. A. T. Hashem, A. Ahmed, S. M. A. Kazmi, and C. S. Hong, “Internet of Things Forensics: Recent Advances, Taxonomy, Requirements, and Open Challenges,” Future Generation Computer Systems, vol. 92, pp. 265-275, 2019, doi: 10.1016/j.future.2018.09.058

    [5] X. Hu, and L. Ma, “A Study on the Hybrid Encryption Technology in the Security Transmission of Electronic Documents,” in: 2010 International Conference of Information Science and Management Engineering. vol. 1, IEEE, Shaanxi, China, pp. 60-63, Aug. 2010, doi: 10.1109/isme.2010.100

    [6] S. Tanwar, K. Parekh, and R. Evans, “Blockchain-based Electronic Healthcare Record System for Healthcare 4.0 Applications,” Journal of Information Security and Applications, vol. 50, p. 102407, 2020, doi: 10.1016/j.jisa.2019.102407

    [7] C. Cao, Y. Tang, D. Huang, W. Gan, and C. Zhang, “IIBE: An Improved Identity-based Encryption Algorithm for WSN Security,” Security and Communication Networks, vol. 2021, p. 8527068, 2021, doi: 10.1155/2021/8527068

    [8] E. M. Zhao, and Y. Geng, “Homomorphic Encryption Technology for Cloud Computing,” Procedia Computer Science, vol. 154, pp.73-83, 2019, doi: 10.1016/j.procs.2019.06.012

    [9] A. Anand, S. Rani, D. Anand, H. M. Aljahdali, and D. Kerr, “An Efficient CNN-based Deep Learning no. 19, p. 6346, 2021, doi: 10.3390/s21196346

    [10] K. Kordov, “A Novel Audio Encryption Algorithm with Permutation-Substitution Architecture”, Electronics, vol. 8, no. 5, p. 530, 2019, doi: 10.3390/electronics8050530

    [11] M. Zhang, Y. Chen, and J. Huang, “SE-PPFM: A Searchable Encryption Scheme Supporting Privacy- Preserving Fuzzy Multikeyword in Cloud Systems”, IEEE Systems Journal, vol, 15, no. 2, pp. 2980-2988, 2020, doi: 10.1109/jsyst.2020.2997932

    [12] A. M. Ali, M. A. Ngadi, I. I. Al Barazanchi, and P. S. JosephNg, “Intelligent Traffic Model for Unmanned Ground Vehicles Based on DSDV-AODV Protocol,” Sensors (Basel), vol. 23, no. 14, p. 6426, 2023, doi: 10.3390/s23146426

    [13] I. Al-Barazanchi, W. Hashim, A. Ahmed Alkahtani, H. Rasheed Abdulshaheed, H. Muwafaq Gheni, A. Murthy, E. Daghighi, SA. Shawkat, and ZA. Jaaz, “Remote Monitoring of COVID-19 Patients Using Multisensor Body Area Network Innovative System,” Computational Intelligence and Neuroscience, vol. 2022, p. 9879259, 2022, doi: 10.1155/2022/9879259

    [14] Y. Niu, S. I. Kadhem, I. A. M. Al Sayed, Z. A. Jaaz, H. M. Gheni, and I. Al Barazanchi, “Energy-Saving Analysis of Wireless Body Area Network Based on Structural Analysis,” in: 2022 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA). IEEE, Ankara, Turkey, pp. 1-6, 2022, doi: 10.1109/hora55278.2022.9799972. Available from: https://ieeexplore.ieee.org/ document/9799972 [Last accessed on 2023 Nov 15].

    [15] R. Al-Amri, R. K. Murugesan, E. M. Alshari, and H. S. Alhadawi, “Toward a Full Exploitation of IoT in Smart Cities: A Review of IoT Anomaly Detection Techniques,” pp. 193-214, 2022. Available from: https:// link.springer.com/10.1007/978-3-030-85990-9_17 [Last accessed on 2023 Nov 15].

    [16] Z. M. Yaseen, T. T. Zigale, Tiyasha, D. Ravi Kumar, S. Q. Salih, S. Awasthi, T. M. Tung, N. Al-Ansari, and S. K. Bhagat, “Laundry Wastewater Treatment Using a Combination of Sand Filter, Bio-Char and Teff Straw Media,” Scientific Reports, vol. 9, no. 1, p. 18709, 2019, doi: 10.1038/s41598-019-54888-3

    [17] S. Q. Salih, A. Sharafati, I. Ebtehaj, H. Sanikhani, R. Siddique, R. C. Deo, H. Bonakdari, S. Shahid, and Z. M. Yaseen, “Integrative Stochastic Model Standardization with Genetic Algorithm for Rainfall Pattern Forecasting in Tropical and Semi-Arid Environments,” Hydrological Sciences Journal, vol. 65, no. 7, pp. 1145-57, 2020, doi: 10.1080/02626667.2020.1734813

    [18] H. Tao, S. Q. Salih, M. K. Saggi, E. Dodangeh, C. Voyant, N. Al-Ansari, Z. M. Yaseen, and S. Shahid, “A Newly Developed Integrative Bio-Inspired Artificial Intelligence Model for Wind Speed Prediction,” IEEE Access, vol. 8, pp. 83347-8358, 2020, doi: 10.1109/access.2020.2990439

    [19] U. Beyaztas, S. Q Salih, K. W. Chau, N. Al-Ansari, and Z. M. Yaseen, “Construction of Functional Data Analysis Modeling Strategy for Global Solar Radiation Prediction: Application of Cross-Station Paradigm,” Engineering Applications of Computational Fluid Mechanic, vol. 13, no. 1, pp. 1165-1181, 2019, doi: 10.1080/19942060.2019.1676314

    [20] S. Abdullah, J. Arshad, M. M. Khan, M. Alazab, and K. Salah, “PRISED Tangle: A Privacy-Aware Framework for Smart Healthcare Data Sharing Using IOTA Tangle,” Complex and Intelligent Systems, vol, 9, no. 3, pp. 3023-3041, 2023, doi: 10.1007/s40747-021-00610-8

    [21] I. Al Barazanchi et al., “WBAN System Organization, Network Performance and Access Control: A Review,” 7th Int. Conf. Eng. Emerg. Technol. ICEET 2021, no. October, pp. 27–28, 2021, doi: 10.1109/ ICEET53442.2021.9659564.

    [22] H. H. Abbas, Z. A. Jaaz, I. Al_Barazanchi, and H. R. Abdulshaheed, “Survey on Enhanced Security Control measures in Cloud Computing systems,” J. Phys. Conf. Ser., vol. 1878, no. 1, p. 012004, 2021, doi: 10.1088/1742-6596/1878/1/012004.

    [23] H. H. A. and H. R. A. I. Al-Barazanchi, Z. A. Jaaz, “Practical application of IOT and its implications on the existing software,” 2020 7th Int. Conf. Electr. Eng. Comput. Sci. Informatics (EECSI), Yogyakarta, Indones., no. October, pp. 10–14, 2020, doi: 10.23919/EECSI50503.2020.9251302.

     

    Cite This Article As :
    Ibrahim, Amer. , Sekhar, Ravi. , Fadhil, Jamal. , Q., Sinan. , Shah, Pritesh. , Dheyaa, Ahmed. Security and Privacy Protection for Online Electronic Documents Based on Novel Encryption Techniques. Journal of Intelligent Systems and Internet of Things, vol. , no. , 2024, pp. 21-28. DOI: https://doi.org/10.54216/JISIoT.110103
    Ibrahim, A. Sekhar, R. Fadhil, J. Q., S. Shah, P. Dheyaa, A. (2024). Security and Privacy Protection for Online Electronic Documents Based on Novel Encryption Techniques. Journal of Intelligent Systems and Internet of Things, (), 21-28. DOI: https://doi.org/10.54216/JISIoT.110103
    Ibrahim, Amer. Sekhar, Ravi. Fadhil, Jamal. Q., Sinan. Shah, Pritesh. Dheyaa, Ahmed. Security and Privacy Protection for Online Electronic Documents Based on Novel Encryption Techniques. Journal of Intelligent Systems and Internet of Things , no. (2024): 21-28. DOI: https://doi.org/10.54216/JISIoT.110103
    Ibrahim, A. , Sekhar, R. , Fadhil, J. , Q., S. , Shah, P. , Dheyaa, A. (2024) . Security and Privacy Protection for Online Electronic Documents Based on Novel Encryption Techniques. Journal of Intelligent Systems and Internet of Things , () , 21-28 . DOI: https://doi.org/10.54216/JISIoT.110103
    Ibrahim A. , Sekhar R. , Fadhil J. , Q. S. , Shah P. , Dheyaa A. [2024]. Security and Privacy Protection for Online Electronic Documents Based on Novel Encryption Techniques. Journal of Intelligent Systems and Internet of Things. (): 21-28. DOI: https://doi.org/10.54216/JISIoT.110103
    Ibrahim, A. Sekhar, R. Fadhil, J. Q., S. Shah, P. Dheyaa, A. "Security and Privacy Protection for Online Electronic Documents Based on Novel Encryption Techniques," Journal of Intelligent Systems and Internet of Things, vol. , no. , pp. 21-28, 2024. DOI: https://doi.org/10.54216/JISIoT.110103