Software design is an essential activity, which deals
with producing models of both preliminary and high level design. This aspect
acts an effective input for next phase of the software development which is
actual construction of the software where coding is an important activity under
the same. After the problem is well understood as a part of analysis activity,
software design comes into scenario of software development life cycle. Associated
with the aspects of effective communications in the untrusted network the
internet, a model is proposed to mitigate issues in high risky channels. In
this information security domain, two aspects are chosen. One being visual
cryptography for securing the channel, and data provenance for understanding
the lineage of operations. These traits aids in providing an indigenous
solution for securing the communication channels. Data Provenance is the
concept of capturing historical data for a given entity. The proposed model
specifies securing untrusted communication channels with a peculiar encryption
mechanism called as visual encryption. In this paper, design concepts for the
mentioned approach are incorporated. It also contains the technical literature
aspects of both data provenance and visual encryption with appropriate
illustrations.
Subscribe to:
Post Comments (Atom)
The lineage of Data Objects with transformations on CIA: C- confidentiality I- Integrity A- Availability.
The above figure elucidates the basic transformations among the data objects taken from their origin to the current state. Perha...

-
Abstract — The developments in the information technology has led the modern world to rely on the internet for digital information. Peo...
-
It is with the advancement of overwhelming wireless internet access in mobile environments, users and usage data has become huge and volumi...
-
Estimating and attempting to overcome congestion in high radix topologies that use global adaptive routing decisions will have a great impa...
No comments:
Post a Comment