MITS5004 IT Security Research Report: Data Security System and Method
VerifiedAdded on  2022/10/09
|7
|1835
|15
Report
AI Summary
This report critically reviews a patent on a data security system and method. The report begins with an analysis of the patent's intention, which is to enhance data security in the face of evolving technological and security threats. It examines the methods proposed, including data grouping, filtering, extraction, and encryption. The research methodology involves reviewing the patent and referencing related research papers. The findings focus on the system's features, such as multiple filters and encryption routines. The discussion highlights the complexity of implementing these features. The report does not include experimental results. The conclusion emphasizes the importance of the proposed model and its potential for effective data security.

Running head: REVIEW OF RESEARCH PAPER
REVIEW OF RESEARCH PAPER
Name of student
Name of university
Author’s note:
REVIEW OF RESEARCH PAPER
Name of student
Name of university
Author’s note:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1REVIEW OF RESEARCH PAPER
Table of Contents
Introduction:...............................................................................................................................2
Discussion:.................................................................................................................................2
Analysis of the intention and content provided in the article:...............................................2
The research method:.............................................................................................................3
Findings of the research:........................................................................................................4
Problems or issues highlighted by the authors:......................................................................4
Discussion on result:..............................................................................................................4
Conclusion of the research:....................................................................................................4
Conclusion:................................................................................................................................5
References:.................................................................................................................................6
Table of Contents
Introduction:...............................................................................................................................2
Discussion:.................................................................................................................................2
Analysis of the intention and content provided in the article:...............................................2
The research method:.............................................................................................................3
Findings of the research:........................................................................................................4
Problems or issues highlighted by the authors:......................................................................4
Discussion on result:..............................................................................................................4
Conclusion of the research:....................................................................................................4
Conclusion:................................................................................................................................5
References:.................................................................................................................................6

2REVIEW OF RESEARCH PAPER
Introduction:
The paper chosen for this report is a patent on data security system and method.
In order to provide critical review of the article, first the content is analysed to get a
comprehensive overview of the article which will help in analysing this article effectively.
Then the method that the authors have considered for designing this patent will be analysed.
In this context some external resources such as research papers on this topic will be referred
to present a critical overview, rather than just summarizing what the authors have presented.
Along with this, the results that the authors have presented will also be analysed in critical
review format. Review of research conclusion is also an important consideration of this
critical review and therefore it will be provided as well.
Discussion:
Analysis of the intention and content provided in the article:
The authors describes that although innovation in technology, especially telecommunication
networks has made it easier to create documents and share it widely with people. These
documents which include text or images or sometime combination of these two are known as
data objects. Although creation, distribution and publication of these documents are
important and often beneficial for the society as well. However, the main issue is security of
these documents [1]. This is an important aspect because securing documents online is a
significant challenge as these data are widely available and accessible too. According to the
authors, although security of every documents is also important some documents need
enhanced security protection and these documents include Social security number, credit
information, medical data, business trade information and finance related data. Therefore, the
intention of the patent document is to provide a comprehensive security system and method
for enhancing the data security through innovative approach. Although various data security
methods are previously published, there is still lot of scope for innovation [2]. The reason is
that not only innovation in data security methods, innovations are also being done for
exploiting security vulnerabilities. Therefore, innovation in security strategies for ensuring
data security is also important.
The paper provides methods for securing data which includes establishment and grouping of
item that are security sensitive. Along with this, the paper also provide methods for data
filtering, extraction, separation of security items from the remainder data as well.
Introduction:
The paper chosen for this report is a patent on data security system and method.
In order to provide critical review of the article, first the content is analysed to get a
comprehensive overview of the article which will help in analysing this article effectively.
Then the method that the authors have considered for designing this patent will be analysed.
In this context some external resources such as research papers on this topic will be referred
to present a critical overview, rather than just summarizing what the authors have presented.
Along with this, the results that the authors have presented will also be analysed in critical
review format. Review of research conclusion is also an important consideration of this
critical review and therefore it will be provided as well.
Discussion:
Analysis of the intention and content provided in the article:
The authors describes that although innovation in technology, especially telecommunication
networks has made it easier to create documents and share it widely with people. These
documents which include text or images or sometime combination of these two are known as
data objects. Although creation, distribution and publication of these documents are
important and often beneficial for the society as well. However, the main issue is security of
these documents [1]. This is an important aspect because securing documents online is a
significant challenge as these data are widely available and accessible too. According to the
authors, although security of every documents is also important some documents need
enhanced security protection and these documents include Social security number, credit
information, medical data, business trade information and finance related data. Therefore, the
intention of the patent document is to provide a comprehensive security system and method
for enhancing the data security through innovative approach. Although various data security
methods are previously published, there is still lot of scope for innovation [2]. The reason is
that not only innovation in data security methods, innovations are also being done for
exploiting security vulnerabilities. Therefore, innovation in security strategies for ensuring
data security is also important.
The paper provides methods for securing data which includes establishment and grouping of
item that are security sensitive. Along with this, the paper also provide methods for data
filtering, extraction, separation of security items from the remainder data as well.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3REVIEW OF RESEARCH PAPER
In order to secure data, the authors have established a group combining security sensitive
items. Then the data is filtered and extracted the data. The data is then declassified from the
remainder data to ensure effective analysis of the data which requires enhanced security
strategies. The data that is filtered is then needs to stored separately, either locally on a PC or
in another computer that is connected with a LAN or WAN or the internet. However, storing
the data locally on a PC is more secure as it ensure that the data is less accessible compared
to computers that are connected with internet [3]. If required, the data that is stored in the
originating computer might be deleted after it is extracted. Along with this the input data and
remainder data might also be deleted if required. In order to enhance data security, the
authors have also suggested for encryption along with distribution of data, filter and map.
However, the authors makes it clear that if data needs to be reconstructed, it needs to ensure
that required security clearance is obtained and this needs to be predetermined. This is an
effective strategy because if data is reconstructed without any restriction, then it will actually
compromise the data security [4]. The article also discusses about various security clearances
techniques to ensure that it is compatible with the partial and reconstructed overview of the
plaintext, while the words with higher security are not included. The benefit of this method is
that even though, the documents are reconstructed, this will not allow to access words which
require higher level of security.
The research method:
The authors have first identified relevant and existing patents which has provided methods
for data security. This patents have been analyzed in details and presented in this patent
document. The analysis of previous patent document is an effective technique that the authors
have considered in this context as it not only provides an overview of the security methods
but also analyze issues with those methods, therefore providing context for designing an
improved and efficient data security system and method.
The authors have provided a security model and described its features and procedure to apply
this model in data security. In order to secure data, the authors have suggested of designing a
group that combine items that require enhanced security. Then the data needs to be filtered
and extracted. The data is then separated from the remainder data. The data is filtered and
stored separately, either locally on a PC or in another computer that is connected with a LAN
or WAN or the internet. Then the encryption is done along with distribution of data, filter and
map. A map might be produced through a software module that indicates the location from
In order to secure data, the authors have established a group combining security sensitive
items. Then the data is filtered and extracted the data. The data is then declassified from the
remainder data to ensure effective analysis of the data which requires enhanced security
strategies. The data that is filtered is then needs to stored separately, either locally on a PC or
in another computer that is connected with a LAN or WAN or the internet. However, storing
the data locally on a PC is more secure as it ensure that the data is less accessible compared
to computers that are connected with internet [3]. If required, the data that is stored in the
originating computer might be deleted after it is extracted. Along with this the input data and
remainder data might also be deleted if required. In order to enhance data security, the
authors have also suggested for encryption along with distribution of data, filter and map.
However, the authors makes it clear that if data needs to be reconstructed, it needs to ensure
that required security clearance is obtained and this needs to be predetermined. This is an
effective strategy because if data is reconstructed without any restriction, then it will actually
compromise the data security [4]. The article also discusses about various security clearances
techniques to ensure that it is compatible with the partial and reconstructed overview of the
plaintext, while the words with higher security are not included. The benefit of this method is
that even though, the documents are reconstructed, this will not allow to access words which
require higher level of security.
The research method:
The authors have first identified relevant and existing patents which has provided methods
for data security. This patents have been analyzed in details and presented in this patent
document. The analysis of previous patent document is an effective technique that the authors
have considered in this context as it not only provides an overview of the security methods
but also analyze issues with those methods, therefore providing context for designing an
improved and efficient data security system and method.
The authors have provided a security model and described its features and procedure to apply
this model in data security. In order to secure data, the authors have suggested of designing a
group that combine items that require enhanced security. Then the data needs to be filtered
and extracted. The data is then separated from the remainder data. The data is filtered and
stored separately, either locally on a PC or in another computer that is connected with a LAN
or WAN or the internet. Then the encryption is done along with distribution of data, filter and
map. A map might be produced through a software module that indicates the location from
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4REVIEW OF RESEARCH PAPER
where the data is extracted along with the remainder data that is provided in the network. The
filter through a deletion routine might be deleted or retained if required for future use by the
user. The model also allows to store the map on the computer of the client. However, if
required, it may be kept on the server as well. Copies of the map is also allowed to be
removed from the user's PC or from the client computer. The extracted data along with the
remainder data is also allowed to be removed from the PC from where the data is originated.
Findings of the research:
The invention proposed in the patent is applicable for hardware or software or for system
where the hardware and software is combined. The system or the method for the data security
method is designed with reference to the innovative principles which are revealed along with
the chosen embodiment. This system or method is compatible with computer system which
includes separate elements or means to perform the functions or methods that are required for
implementing this system or method. Along with this it is also possible to implement this
system or method for computer systems that is distributed where the interconnection is done
by nay preferred means.
Problems or issues:
The authors in this proposed security model, has considered application of multiple filters for
data security. Although it enhances the process of data security, it requires multiple
encryption along with multiple decryption routine which makes the system or method
complex to implement [5]. Therefore, proper strategies are required for implementing this
encryption and decryption routine in this context.
Discussion on result:
The authors have only described the model in terms of features. Since, this is a patent
document, only the features of the system along with strategies for implementation is
provided. No experiment details and its result applying this security system or model is
provided in this context.
Conclusion of the research:
The authors have provided a new model for designing a security system and method for
ensuring data security. Along with features of this method, procedure to implement this
model is also provided. Therefore, this model might be incorporated for designing a security
system that is effective and efficient as well. This makes this research important in this
context.
where the data is extracted along with the remainder data that is provided in the network. The
filter through a deletion routine might be deleted or retained if required for future use by the
user. The model also allows to store the map on the computer of the client. However, if
required, it may be kept on the server as well. Copies of the map is also allowed to be
removed from the user's PC or from the client computer. The extracted data along with the
remainder data is also allowed to be removed from the PC from where the data is originated.
Findings of the research:
The invention proposed in the patent is applicable for hardware or software or for system
where the hardware and software is combined. The system or the method for the data security
method is designed with reference to the innovative principles which are revealed along with
the chosen embodiment. This system or method is compatible with computer system which
includes separate elements or means to perform the functions or methods that are required for
implementing this system or method. Along with this it is also possible to implement this
system or method for computer systems that is distributed where the interconnection is done
by nay preferred means.
Problems or issues:
The authors in this proposed security model, has considered application of multiple filters for
data security. Although it enhances the process of data security, it requires multiple
encryption along with multiple decryption routine which makes the system or method
complex to implement [5]. Therefore, proper strategies are required for implementing this
encryption and decryption routine in this context.
Discussion on result:
The authors have only described the model in terms of features. Since, this is a patent
document, only the features of the system along with strategies for implementation is
provided. No experiment details and its result applying this security system or model is
provided in this context.
Conclusion of the research:
The authors have provided a new model for designing a security system and method for
ensuring data security. Along with features of this method, procedure to implement this
model is also provided. Therefore, this model might be incorporated for designing a security
system that is effective and efficient as well. This makes this research important in this
context.

5REVIEW OF RESEARCH PAPER
Conclusion:
The authors have provided a security model along with its features and procedure that is
required for implementing this model in data security. In order to ensure security of data, the
authors have suggested for establishing a group of security sensitive items. Another important
feature of this model is that the data needs to be filtered and extracted. The data is then
required to be separated from the remainder data. The data is then filtered and stored
separately, and for this either a local PC or a computer that is connected with a LAN or WAN
or the internet is considered.
The present invention that is associated with a data security system provides a methodology
for securing data that is contained in a personal computer or on a computer network including
LAN or WAN and it also considers data that is stored over the Internet and computer
programs. It also considers data that is stored on computer modules along with an
information processing system for accomplishing this security system.
Conclusion:
The authors have provided a security model along with its features and procedure that is
required for implementing this model in data security. In order to ensure security of data, the
authors have suggested for establishing a group of security sensitive items. Another important
feature of this model is that the data needs to be filtered and extracted. The data is then
required to be separated from the remainder data. The data is then filtered and stored
separately, and for this either a local PC or a computer that is connected with a LAN or WAN
or the internet is considered.
The present invention that is associated with a data security system provides a methodology
for securing data that is contained in a personal computer or on a computer network including
LAN or WAN and it also considers data that is stored over the Internet and computer
programs. It also considers data that is stored on computer modules along with an
information processing system for accomplishing this security system.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

6REVIEW OF RESEARCH PAPER
References:
[1]A. Jha, "An Overview of Security and Privacy Issues in Big Data", SSRN Electronic
Journal, 2016. Available: 10.2139/ssrn.2956050.
[2]H. Hasan, S. Chuprat, H. Sarkan and O. Yusop, "Data Reconstruction Through Sequence
Based Mapping in Secured Data Partitioning", Advanced Science Letters, vol. 23, no. 6, pp.
5522-5526, 2017. Available: 10.1166/asl.2017.7413.
[3]M. Najafabadi, M. Mahrin, S. Chuprat and H. Sarkan, "Improving the accuracy of
collaborative filtering recommendations using clustering and association rules mining on
implicit data", Computers in Human Behavior, vol. 67, pp. 113-128, 2017. Available:
10.1016/j.chb.2016.11.010.
[4]"Security and privacy challenges in big data", INTERNATIONAL JOURNAL OF LATEST
TRENDS IN ENGINEERING AND TECHNOLOGY, vol. 7, no. 3, 2016. Available:
10.21172/1.73.543.
[5]N. Chandramouli, "A Study on Data Security and Privacy Protection Issues in Cloud
Computing", International Journal of Computer Sciences and Engineering, vol. 5, no. 9,
2017. Available: 10.26438/ijcse/v5i9.164170.
References:
[1]A. Jha, "An Overview of Security and Privacy Issues in Big Data", SSRN Electronic
Journal, 2016. Available: 10.2139/ssrn.2956050.
[2]H. Hasan, S. Chuprat, H. Sarkan and O. Yusop, "Data Reconstruction Through Sequence
Based Mapping in Secured Data Partitioning", Advanced Science Letters, vol. 23, no. 6, pp.
5522-5526, 2017. Available: 10.1166/asl.2017.7413.
[3]M. Najafabadi, M. Mahrin, S. Chuprat and H. Sarkan, "Improving the accuracy of
collaborative filtering recommendations using clustering and association rules mining on
implicit data", Computers in Human Behavior, vol. 67, pp. 113-128, 2017. Available:
10.1016/j.chb.2016.11.010.
[4]"Security and privacy challenges in big data", INTERNATIONAL JOURNAL OF LATEST
TRENDS IN ENGINEERING AND TECHNOLOGY, vol. 7, no. 3, 2016. Available:
10.21172/1.73.543.
[5]N. Chandramouli, "A Study on Data Security and Privacy Protection Issues in Cloud
Computing", International Journal of Computer Sciences and Engineering, vol. 5, no. 9,
2017. Available: 10.26438/ijcse/v5i9.164170.
1 out of 7
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2026 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.





