Publication Type : Conference Paper
Publisher : IEEE
Source : 2024 2nd International Conference on Intelligent Data Communication Technologies and Internet of Things (IDCIoT)
Url : https://doi.org/10.1109/idciot59759.2024.10467248
Campus : Bengaluru
School : School of Computing
Department : Computer Science and Engineering
Year : 2024
Abstract : In the realm of interconnected networks, effective security measures are essential for an increase in digital and networked society. The dangers linked to cyberattacks intensify as long as people and businesses depend on online platforms for storing information, business transactions, and interaction. Protecting personal and corporate data requires maintaining confidentiality, which is the guarantee that sensitive information stays secret. Cyberattacks are an ongoing danger to this confidentiality; they can take many different forms, including phishing a advanced exploitation. In order to reduce these dangers and guard against unwanted access, it becomes essential to boost safety precautions including encryption, reliable communication standards, and information access controls.This paper addresses the need to improve verification and secrecy in the field of cybersecurity. The foundation of safe online verification is authentication, which is the process of confirming the authenticity of individuals and organizations. Conventional authentication techniques are vulnerable to hacking, which can result in illegal access and compromised data. In order to strengthen the defenses against unwanted access, this paper suggests implementation of sophisticated verification techniques, such as Message Authentication with SHA-1, Blowfish Algorithm, Digital Signature Algorithm, RSA. Besides personal privacy issues, bolstering security is vital because it directly affects the stability of finance networks and vital infrastructures. This paper highlights the different methodology to protect data by confidentiality and authentication beforehand that can be exploited.
Cite this Research Publication : Asmitha M, Shinu M Rajgopal, Exploring Unique Techniques to Preserve Confidentiality and Authentication, 2024 2nd International Conference on Intelligent Data Communication Technologies and Internet of Things (IDCIoT), IEEE, 2024, https://doi.org/10.1109/idciot59759.2024.10467248