2021
DOI: 10.35940/ijsce.f3492.0510521
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Encryption RAAM Algorithm in Different Multimedia Applications

Abstract: In this era where everything is becoming digital the most challenging topic in front of us is Data Security in every aspect even in the secured communication channel. These issues can be tackled by using strong Data Encryption and the trusted third party who maintains the database. The fast development in Digital Technology also comes with the rapid crimes and the insecurity of data theft. From time to time engineers came up with many encryption techniques like Caser Ciphers, Vernam Ciphers, Vigenère Cipher wh… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 4 publications
0
1
0
Order By: Relevance
“…Big Data presents a significant problem in terms of privacy and security (Arya et al, 2013) Cloud computing is expected to access about 60% of global data by 2025, according to the International Data Corporation (IDC). As a result, there is a great need for research into information privacy and security issues in both cloud computing and Big Data (Shah Kruti and Gambhava, 2012) The cloud’s shared concept and the increased need for shared resources in cloud computing might entice attackers to target it. Before making the switch to cloud computing, consumers should consider the risks.…”
Section: Introductionmentioning
confidence: 99%
“…Big Data presents a significant problem in terms of privacy and security (Arya et al, 2013) Cloud computing is expected to access about 60% of global data by 2025, according to the International Data Corporation (IDC). As a result, there is a great need for research into information privacy and security issues in both cloud computing and Big Data (Shah Kruti and Gambhava, 2012) The cloud’s shared concept and the increased need for shared resources in cloud computing might entice attackers to target it. Before making the switch to cloud computing, consumers should consider the risks.…”
Section: Introductionmentioning
confidence: 99%