Abstract

<p>In order to keep the cost of installing advanced encryption scheme (AES) hardware to a minimum and to hide the protected key from hackers, existing networks’ tactics are employed in this study. This is the biggest drawback of the present methods since there is no security while keeping the concealed key of the AES encryption method. The user is unable to remember all the AES keys since it is necessary to connect with several people using various AES keys. The suggested approach successfully counters both facet and brute force assaults. The advanced encryption method is the safest algorithm to utilize for trustworthy encryption, according to the findings. But the issue is that the advanced encryption scheme makes brute force attack less effective. Honey encryption is thus used. The recommended method encrypts the dataset after dataset anonymization to ensure privacy. An enhanced zealous technique is used to do anonymization when a middle dataset is created using the supplied key. After the dataset has been sorted, the dataset with the higher rank is the one that gets encrypted first. The user receives these datasets together with a decryption key for the encrypted records, enabling them to swiftly obtain the data they need.</p>

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.