Sensitive Data Transaction Using RDS in AWS

Article Preview

Abstract:

Today's and tomorrow's secret data exchange relies heavily on cryptography. Cryptographic applications offer a secure communication channel for safely transferring data. It provides individuals, groups, and organizations with greater privacy and access to communication and other information, as well as the opportunity to restore personal privacy. Nowadays, online users desire to create an account in order to get access to certain websites, such as online tutorials, online purchases, online resource access, hosting services, social networking sites, and so on. However, unless the service provider or authority person ensures that the registration and login processes are genuine, there is a potential that the account might be hacked by a third party using the ordinary user access method. With the growing usage of cloud emails and frequent reports of large-scale leakage occurrences, a security attribute known as forward secrecy becomes desired and necessary for both users and cloud service providers to improve the security of cloud email systems.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

782-788

Citation:

Online since:

February 2023

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2023 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] D. Liu and J. Lee, CNN based Malicious Website Detection by Invalidating Multiple Web Spams,, IEEE international conference, vol. 8, no. 1, pp.97258-97266, (2020).

DOI: 10.1109/access.2020.2995157

Google Scholar

[2] Gilchan Park; Julia Rayz, Ontological Detection of Phishing Emails,, IEEE international conference, vol. 7, 8616482, (2018).

DOI: 10.1109/smc.2018.00486

Google Scholar

[3] Jonathan White; Brajendra Panda, Implementing PII honeytokens to mitigate against the threat of malicious insiders, IEEE international conference,vol.7,5137315,(2009).

DOI: 10.1109/isi.2009.5137315

Google Scholar

[4] Nafize Ishtiaque Hossain, Ali Reza Galib, Raihan Bin Mofidul A Vision Based Three-Layer Access Management System with IoT Integration , May 2019.

DOI: 10.1109/icasert.2019.8934758

Google Scholar

[5] Jiawei Zhao, Rahat Masood, Suranga Seneviratne A Review of Computer Vision Methods in Network Security, arXiv:2005.0338,(2020).

Google Scholar

[6] A. Shamir, Identity-based cryptosystems and signature schemes,, in Advances in Cryptology– CRYPTO 1984. Springer, 1984, p.47– 53.

DOI: 10.1007/3-540-39568-7_5

Google Scholar

[7] N. Kakade and U. Patel, Secure Secret Sharing Using Homomorphic Encryption,, in Proc. 2020 11th International Conference on Computing, Communication and Networking Technologies, 2020, pp.1-7.

DOI: 10.1109/icccnt49239.2020.9225325

Google Scholar