Data Encryption in Emerging Technology

Verified

Added on  2023/06/08

|14
|3382
|442
AI Summary
This collection of articles explores the latest research on data encryption in emerging technology. Topics include augmented reality glasses, virtual reality, encryption algorithms, mixed reality, and more. The articles discuss the benefits and risks of these technologies, as well as the ethical and legal issues surrounding them. The use of digital signatures, Diffie Hellman key exchange, and AES encryption algorithms to enhance data security in cloud computing is also explored.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: DATA ENCRYPTION IN EMERGING TECHNOLOGY
DATA ENCRYPTION IN EMERGING TECHNOLOGY
Name of the student
Name of the University
Author Note

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1DATA ENCRYPTION IN EMERGING TECHNOLOGY
Task 1
Andy greenbug (2015), “Augmented reality glasses could visually encrypt secrets”, [online]
Available at: https://www.wired.com/2015/08/augmented-reality-glasses-visuallyencrypt-
secrets/
In this paper, the discussion is focused on the augmented reality glass. Augmented reality
glasses are a glass that can encrypt the data. This method helps in decrypting the urgent and
encrypted messages without the need of encryption key. The method is described in the paper,
that how this glasses works. The method searches for a tag and once the tag is found on any
encrypted document or data , they transmit this tag to an application sever requesting for the
decryption of this document . A temporary key is being provided for decrypting a certain part of
the encrypted data. This is a concern for the people who encrypts the method , but also to some
extent it is advantageous when they looses the decrypting key . The article describes the features
of augmented reality glasses and the uses of this glasses in brief.
Ayush Sharma, Piyush Bajpai, Sukhdev Singh and Kiran Khatter, “Virtual Reality:
Blessings and Risk Assessment”, [online] Available at:
https://arxiv.org/ftp/arxiv/papers/1708/1708.09540.pdf
This paper aims at discussing the virtual reality and discusses all the facts related to this.
Data encryption method tells about encrypting the data through different methods. The Virtual
Reality (VR) situation is a position that defines a project in the VR technology , the factors that
are described includes about the project , role in different fields and many more. The article
further describes the mechanism that is involved with VR device. The survey that is done for
analyzing the literature is based on the articles, examination are done on various companies for
Document Page
2DATA ENCRYPTION IN EMERGING TECHNOLOGY
projects and the interested areas for this companies are being sorted. The literature survey
observed and discussed in the paper, tells about the virtual reality that enables technologies that
had facilitate the humans with different virtual devices in order to improve the interaction with
digital world. IN fast researches are implemented in order to create a relationship between virtual
and real applications. This has benefited humans in many ways , there are huge areas where the
VR application is being used , for example : healthcare, tourism , military, entertainment and
defense and many more.
Bhanot, R., & Hans, R. (2015). A review and comparative analysis of various encryption
algorithms. International Journal of Security and Its Applications, 9(4), 289-306.
The article examines the various ways of data encryption algorithms. Data encryption is a
process of encrypting data by using mathematical procedure. With the help of this algorithms ,
data can be transferred to text that can’t be read by common people and this data can be
decrypted with the use of a certain key. The article describes the encryption method. Cipher is
used for encrypting data. According to the author, data encryption contains a block of cipher.
This contains a cryptographic key that helps in encrypting the data. With this algorithms are
being used on a block of data concurrently and not one bit at a particular instance of time. The
algorithms that are best for data encryption methods are , RSA , AES, Twofish and 3DES. AES
stands for Advanced Encryption Standard is the most secure algorithm to perform encryption
3DES is a Triple data Encryption Standard , is used in recent days and contains a block of cipher.
RSA is an algorithm that is being encrypted with the help of public key , this is also known as
public key encryption and through internet , the standard for encrypting a data is being sent.
Document Page
3DATA ENCRYPTION IN EMERGING TECHNOLOGY

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4DATA ENCRYPTION IN EMERGING TECHNOLOGY
Brian D Wassom (2016),”Augmented Reality Law, Privacy and Ethics”, [online] Available
at: https://searchsecurity.techtarget.com/feature/Augmented-Reality-Law-Privacy-and-
Ethics
The paper discusses about the ethical issues that may arises with the use of AR glasses.
The technology has developed rapidly , with the developing AR application , the concern
towards the safety , security and privacy of the users. AR glasses helps in decrypting data but to
some extent this is not ethically correct . Because the messages that are encrypted has some
reason , that’s why they are encrypted . The encryptions will not like someone else decrypting
their messages without the concern of this. Several laws and regulation help to restrict the use of
augmented reality glasses. This situation becomes sometimes little weird , as with the help of
augmented reality glass one can have for a particular video or audio without the concern of the
users. This becomes sometimes unethical, as peeking into someone’s privacy is not an ethical
behavior. The privacy needs to be maintained while using augmented reality glasses and should
be used only for useful purposes. The paper discusses in detail the issues faced by the use of
augmented reality glasses and the laws associated with this.
Coppersmith, D. (2014). The Data Encryption Standard (DES) and its strength against
attacks. IBM journal of research and development, 38(3), 243-250.
Data encryption standard was established by a team of IBM around 1974 and being
implemented and applied internationally by the end of 1977. This contains a symmetric key or a
public key that used for encrypting the necessary data. This is an implementation of Feistel
cipher. This uses around 16 structure of Feistel. The block size of this is 64 bit. Though this size
there is an effective length of 56 , bits as the 8 bits of the 64 bits mentioned are not used in the
Document Page
5DATA ENCRYPTION IN EMERGING TECHNOLOGY
encryption algorithm. There are basically two properties of block cipher and both are being
satisfied by data encryption standard. The two properties are : avalanche effect , this means that
even smallest change in the normal text can cause a huge change in cipher text. Second one is
completeness , every text of the cipher depends completely on the bits of plain text.
Goshwe, N. Y. (2013). Data encryption and decryption using RSA Algorithm in a Network
Environment. International Journal of Computer Science and Network Security
(IJCSNS), 13(7), 9.
The paper aims at discussing the data encryption using RSA algorithm. The major
problem and the issue faced while sharing resources on data communication network is to
maintain the confidentiality and security. This is being determined that with establishing
connectivity between the computers that are going to share data, the security purpose arises and
the system and data gets more vulnerable towards the threat. This paper describes a process of
encrypting and decrypting data on a network suing RSA algorithm with a certain size of the
block. The RSA algorithm , generates a public key to encrypt the data on the sender end , for
decrypting this encrypted data the receiver should have a private key. Thus this ensures the
security and privacy of the data m, as this privacy key is only being assigned to the receiver an
no one else can get access to this private key. If anyone tries to decrypt the encrypted message
with a wrong private key , then it will decrypt the message but different it will be different from
original message. Thus from this article , it can be said that cryptography plays a major role in
protecting the data. This allows to continue business and sending messages and information
without any tension of getting breached.
Document Page
6DATA ENCRYPTION IN EMERGING TECHNOLOGY
Jaybie A. De Guzman, Csiro Kanchana Thilakarathna, Csiro Aruna Seneviratne (2018),
“Security and Privacy Approaches in Mixed Reality: A Literature Survey”, [online].
Available at: https://arxiv.org/pdf/1802.05797.pdf
This paper describes about the Mixed reality (MR) technology. The development-
involved n the mixed reality technology is gaining a huge popularity with the advancement of
computer, realistic display technologies and sensor fusion. There are several researches that
focuses on delivering Mixed reality technology with full privacy and security , but few are
focused and concerned about the security provided. This is basically a survey paper that tells
about the risk assessed while using MR technology and the privacy offered by MR technology.
The main aim is to , list and review special security approaches that can help to maintain the data
security and the privacy within the MR technology. The scope is being extended , so that it can
include technologies that are related to data encryption such as augmented reality (AR), virtual
reality (VR), and human-computer interaction (HCI) . This are the major components . Th paper
investigates and highlights the implementation and the way data in being protected in MR
technology. In addition to this , the expected challenges and guidelines on MR security and
confidentiality are discussed.

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7DATA ENCRYPTION IN EMERGING TECHNOLOGY
Ma, K., Zhang, W., Zhao, X., Yu, N., & Li, F. (2013). Reversible data hiding in encrypted
images by reserving room before encryption. IEEE Transactions on information forensics
and security, 8(3), 553-562.
In this article author discuses about the reversible data hiding used in encrypted images.
Reversible data hiding helps in recovering the data that gets lost after being embedded. This
provided recovering data in a excellent manner and protects the data and the images in the
content while maintaining the confidentiality. Earlier the method used for reversing the
embedded data contained many errors and also had problems regarding image restoration. This
paper proposes a unique way of reversing data before getting encrypted by a traditional method.
and this makes easy to reverse the data hidden in the encrypted images. The method proposed
helps in achieving real way of reversing the data, the data encryption and image recovery is free
from errors.
Document Page
8DATA ENCRYPTION IN EMERGING TECHNOLOGY
Rewagad, P., & Pawar, Y. (2013, April). Use of digital signature with diffie hellman key
exchange and AES encryption algorithm to enhance data security in cloud computing.
In Communication Systems and Network Technologies (CSNT), 2013 International
Conference on (pp. 437-439). IEEE.
This paper describes the use of digital signature in encrypting data. Cloud computing is
very much useful for people nowadays and gets a large importance in today’s world. The facility
provided by cloud computing is it allows and gives a huge place for data storing and gives the
access to use whenever needed. AS the cloud computing involves working on internet , the
security issues becomes major concern for people , this includes data safety , maintaining the
confidentiality , authentication of data and privacy. In order to maintain the security of data
encryption several algorithms are being used. In this paper, the proposed method is to use the
digital signature and Diffie Hellman key exchange blended with (AES) Advanced Encryption
Standard for protecting the confidentiality of data stored within the cloud server. Even the key
during transmission gets hacked, as the private key is being only assigned to the official user no
one can get access to it. This paper also proposes a three-way architecture, this enables high
security and no one can hack the database and the data are being stored safely in the data cloud.
Singh, G. (2013). A study of encryption algorithms (RSA, DES, 3DES and AES) for
information security. International Journal of Computer Applications, 67(19).
The article aims at discussing about data encryption and the method of encrypting a data
with the use of algorithm. Encryption is a method of making a message encrypted , so that it can
be read by the only one ,for whom the message is meant to. Encryption helps in providing
Document Page
9DATA ENCRYPTION IN EMERGING TECHNOLOGY
complete safety for the information transferred over the internet, and keeps the information
secret. This becomes very much necessary to maintain the security of the information stored in
the database of the computers , as this becomes very much necessary to maintain the safety. On a
daily basis there are thousands of data that are crucial for people and some organization have the
threat of getting snooped or tampered by someone else. For this encryption is very much
necessary, as this helps to maintain the confidentiality of the text.
With the growing technology and fast development, exchange of digital data is done
mostly through electronic way that is with the help of the internet or over internet, thus this
makes the data more vulnerable to such threats. Thus making the information security major
concern. Information Confidentiality plays a major role in maintaining the ethics and laws for
every organization. With the growth of human intelligence, cryptography became necessary and
also became more complex in order to make data secure. This paper had surveyed various
methods for encrypting data and the algorithms used for encryption.
Stallings, W. (2017). Cryptography and network security: principles and practice (p. 743).
Upper Saddle River, NJ: Pearson.
In this article, the author discusses about the principles related to cryptography and
network security. The seventh edition analyzes the important and evolving features of
cryptography and network security. The fields that are needed to be kept in mind while dealing
with this two. As with the rowing technology, the threat is also increasing day by day and the
chances of information being hacked is also increasing. Thus, the need of protecting the data
becomes very much necessary. The aim of this article is to provide a realistic study of both the
values and to apply for network security and cryptography. The first part of the article, discusses

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
10DATA ENCRYPTION IN EMERGING TECHNOLOGY
about the vital issues that are required to be encountered by a network security and cryptography.
The second part of the article discusses about the practical implications of network security that
have been implemented.
Xu, J., Chang, E. C., & Zhou, J. (2013, May). Weak leakage-resilient client-side
deduplication of encrypted data in cloud storage. In Proceedings of the 8th ACM SIGSAC
symposium on Information, computer and communications security (pp. 195-206). ACM.
In this article , the author discusses about the cryptographic primitive is known as proofs
of ownership (PoW) , in order to improve the safety of the data stored in the cloud storage from
client- side. When a data gets duplicated in the cloud storage, it creates difficulty for the user to
search a data , while searching for the encrypted data in the cloud storage. This article describes
the problems that are likely to arise by the cloud with deduplication from client side. This are,
marinating privacy for data against outside adversaries , data privacy against inside adversaries,
divide and conquer attack and poison attack. This attacks are being briefly discussed in the
article and the possible ways of overcoming the problem.
Task 2
Self Evaluation on the Turnitin report:
The report is an annotated bibliography on the data encryption method in emerging
technology. The report contains 12 annotated bibliography, and each one is described below. The
file from the turnitin report is being uploaded with addition to this file. The solution provided is
authenticated and the plagiarism is detected 21%, the detected plagiarism is in the reference list.
The references made in the annotated bibliography part have plagiarism. The report contains
Document Page
11DATA ENCRYPTION IN EMERGING TECHNOLOGY
some technical terms that are detected in plagiarism report, and these terms cannot be changed as
the change in these terms will completely change the meaning of the lines. This report is
prepared uniquely without any type of errors.
Document Page
12DATA ENCRYPTION IN EMERGING TECHNOLOGY
Bibliography
Andy greenbug (2015), “Augmented reality glasses could visually encrypt secrets”, [online]
Available at: https://www.wired.com/2015/08/augmented-reality-glasses-visuallyencrypt-
secrets/
Ayush Sharma, Piyush Bajpai, Sukhdev Singh and Kiran Khatter, “Virtual Reality: Blessings
and Risk Assessment”, [online] Available at:
https://arxiv.org/ftp/arxiv/papers/1708/1708.09540.pdf
Bhanot, R., & Hans, R. (2015). A review and comparative analysis of various encryption
algorithms. International Journal of Security and Its Applications, 9(4), 289-306.
Brian D Wassom (2016),”Augmented Reality Law, Privacy and Ethics”, [online] Available at:
https://searchsecurity.techtarget.com/feature/Augmented-Reality-Law-Privacy-and-Ethics
Coppersmith, D. (2014). The Data Encryption Standard (DES) and its strength against
attacks. IBM journal of research and development, 38(3), 243-250.
Goshwe, N. Y. (2013). Data encryption and decryption using RSA Algorithm in a Network
Environment. International Journal of Computer Science and Network Security
(IJCSNS), 13(7), 9.
Jaybie A. De Guzman, Csiro Kanchana Thilakarathna, Csiro Aruna Seneviratne (2018),
“Security and Privacy Approaches in Mixed Reality: A Literature Survey”, [online].
Available at: https://arxiv.org/pdf/1802.05797.pdf [Accessed August 11, 2018]

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
13DATA ENCRYPTION IN EMERGING TECHNOLOGY
Ma, K., Zhang, W., Zhao, X., Yu, N., & Li, F. (2013). Reversible data hiding in encrypted
images by reserving room before encryption. IEEE Transactions on information forensics
and security, 8(3), 553-562.
Rewagad, P., & Pawar, Y. (2013, April). Use of digital signature with diffie hellman key
exchange and AES encryption algorithm to enhance data security in cloud computing.
In Communication Systems and Network Technologies (CSNT), 2013 International
Conference on (pp. 437-439). IEEE.
Singh, G. (2013). A study of encryption algorithms (RSA, DES, 3DES and AES) for information
security. International Journal of Computer Applications, 67(19).
Stallings, W. (2017). Cryptography and network security: principles and practice (p. 743).
Upper Saddle River, NJ: Pearson.
Xu, J., Chang, E. C., & Zhou, J. (2013, May). Weak leakage-resilient client-side deduplication of
encrypted data in cloud storage. In Proceedings of the 8th ACM SIGSAC symposium on
Information, computer and communications security (pp. 195-206). ACM.
1 out of 14
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]