Applying the BBRP01 Technique Used To Secure The Data

In this digital era, the current state of the data is critical to the lives of citizens, as data is remaining as the primary factor determine the survival of a person in the world. In particular, data is more readily available on social media platforms. Despite the hype, the data lacks adequate secu...

Full description

Saved in:
Bibliographic Details
Published in:2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC) pp. 1455 - 1458
Main Authors: Shobana, R., Rajaprakash, S., Habib, Hani. R., Samil, M.S., Vijaysankar, V.
Format: Conference Proceeding
Language:English
Published: IEEE 11-11-2021
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract In this digital era, the current state of the data is critical to the lives of citizens, as data is remaining as the primary factor determine the survival of a person in the world. In particular, data is more readily available on social media platforms. Despite the hype, the data lacks adequate securing by allowing the hackers to readily access it. To overcome this challenge, this research work propose a novel technique called BBRP01 to solve this problem. Generally, there are four stages to this approach. In this 1st stage applies the T-test method; 2nd stage applies the odd equation; 3rd stage represent even equation; and final stage applies the perfect number operations. Further, the BBRP01 technique provides advanced security when compared to ChaCha method.
AbstractList In this digital era, the current state of the data is critical to the lives of citizens, as data is remaining as the primary factor determine the survival of a person in the world. In particular, data is more readily available on social media platforms. Despite the hype, the data lacks adequate securing by allowing the hackers to readily access it. To overcome this challenge, this research work propose a novel technique called BBRP01 to solve this problem. Generally, there are four stages to this approach. In this 1st stage applies the T-test method; 2nd stage applies the odd equation; 3rd stage represent even equation; and final stage applies the perfect number operations. Further, the BBRP01 technique provides advanced security when compared to ChaCha method.
Author Vijaysankar, V.
Habib, Hani. R.
Shobana, R.
Rajaprakash, S.
Samil, M.S.
Author_xml – sequence: 1
  givenname: R.
  surname: Shobana
  fullname: Shobana, R.
  email: shobanasenthil29@gmail.com
  organization: Aarupadai Veedu Institute of Technology, Vinayaka Mission's Research Foundation,Chennai,Tamil Nadu,India
– sequence: 2
  givenname: S.
  surname: Rajaprakash
  fullname: Rajaprakash, S.
  email: srajaprakash_04@yahoo.com
  organization: Aarupadai Veedu Institute of Technology, Vinayaka Mission's Research Foundation,Chennai,Tamil Nadu,India
– sequence: 3
  givenname: Hani. R.
  surname: Habib
  fullname: Habib, Hani. R.
  email: hanirhabib3@gmail.com
  organization: Aarupadai Veedu Institute of Technology, Vinayaka Mission's Research Foundation,Chennai,Tamil Nadu,India
– sequence: 4
  givenname: M.S.
  surname: Samil
  fullname: Samil, M.S.
  email: hhzcrew22@gmail.com
  organization: Aarupadai Veedu Institute of Technology, Vinayaka Mission's Research Foundation,Chennai,Tamil Nadu,India
– sequence: 5
  givenname: V.
  surname: Vijaysankar
  fullname: Vijaysankar, V.
  email: vijaysankar837@gmail.com
  organization: Aarupadai Veedu Institute of Technology, Vinayaka Mission's Research Foundation,Chennai,Tamil Nadu,India
BookMark eNotj8tOwzAQRQ0CiVLyBWz8Awljj-3YyzS8KhWBaLqu3GRMjUoaknTRv6cSXd3FOTrSvWVX7b4lxriATAhwD_N0-VaUWiJCJkGKzBkFuZMXLHG5FcZoJY2S9pJNZG5sCibHG5YMwzcAoAR0Tk2YLrpud4ztFx-3xGezzw8QvKJ628bfA_HVQA2v9nxJ9aEnXp2cRz_6O3Yd_G6g5LxTtnp-qsrXdPH-Mi-LRRoF4pgK06AJVAcvpPIboQGspUDGanLGK6WwERs0kkjXFoIHBMRwYq7RebA4Zff_3UhE666PP74_rs9H8Q8MW0dX
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/I-SMAC52330.2021.9640792
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library Online
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library Online
  url: http://ieeexplore.ieee.org/Xplore/DynWel.jsp
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9781665426428
166542642X
EISSN 2768-0673
EndPage 1458
ExternalDocumentID 9640792
Genre orig-research
GroupedDBID 6IE
6IF
6IL
6IN
ABLEC
ADZIZ
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
CHZPO
IEGSK
OCL
RIE
RIL
ID FETCH-LOGICAL-i133t-16d36fecfa124ab150088efe685e96a4443d1b362ee5c80fa03033fe969d57f83
IEDL.DBID RIE
IngestDate Wed Jun 26 19:25:47 EDT 2024
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i133t-16d36fecfa124ab150088efe685e96a4443d1b362ee5c80fa03033fe969d57f83
PageCount 4
ParticipantIDs ieee_primary_9640792
PublicationCentury 2000
PublicationDate 2021-Nov.-11
PublicationDateYYYYMMDD 2021-11-11
PublicationDate_xml – month: 11
  year: 2021
  text: 2021-Nov.-11
  day: 11
PublicationDecade 2020
PublicationTitle 2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)
PublicationTitleAbbrev I-SMAC
PublicationYear 2021
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0003203994
Score 1.8258537
Snippet In this digital era, the current state of the data is critical to the lives of citizens, as data is remaining as the primary factor determine the survival of a...
SourceID ieee
SourceType Publisher
StartPage 1455
SubjectTerms BBRP01
ChaCha
Computer hacking
encryption
perfect number
prime
Security
Social networking (online)
Title Applying the BBRP01 Technique Used To Secure The Data
URI https://ieeexplore.ieee.org/document/9640792
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1JT0IxEG6Ekyc1YNzTg0cL7Wtfl6MgBA8aIpB4I33tNPECRuD_O30sxsSLt6ZNk-7fLP1mCLmXQnNXVIqV1lZMmRSZlxBYrAwvi-SUCpk7PJqY13f7NMhhch4OXBgAqD-fQScXa19-XIZNNpV1XfY6OXxwG8bZLVfrYE-RBUesVfvPOtx1n9nk5bGPipbkqAcWorPr_iuPSg0jw5P_DeCUtH_4eHR8QJozcgSLFimzAJlJShRlONrrvY25oNN9SFY6W0Gk0yWtDepA8TjQJ7_2bTIbDqb9EdslQWAfqD6umdBR6gQheURiX6H8hu8CJNC2BKe9UkpGUSEMAZTB8uTx1kqZsM3F0iQrz0lzsVzABaE65ehe3poKu4E2DlLlQQYfVADP9SVp5SnPP7dxLua72V79XX1NjvOqZl6eEDekuf7awC1prOLmrt6Zb3oajLY
link.rule.ids 310,311,782,786,791,792,798,27936,54770
linkProvider IEEE
linkToHtml http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1JTwIxFG4UD3pSA8bdHjxa6Ew7XY6yBSIQIkPijXTa18QLEIH_bzssxsSLt6ZNm-7fW_q9IvTMEkF1WnCSKVUQLr0jhoElrpA0S73m3EbucG8iRx-q3Ylhcl4OXBgAKB-fQT0mS1--W9hNNJU1dPQ66XDhnmRcSrplax0sKiylAW35_rkO1Y0-mQxfW0HVYjRogmlS3zXw6yeVEki65__rwgWq_TDy8PiANZfoCOZVlEURMtKUcJDicLP5PqYJzvdBWfF0BQ7nC1ya1AGHDYHbZm1qaNrt5K0e2X2DQD6DArkmiXBMeLDeBCw2RZDgws0AHoTKQAvDOWcuKQIQAWRWUW_CuWXMhzLtMukVu0KV-WIO1wgLH-N7GSWLUA2E1OALA8wayy0YKm5QNQ55ttxGupjtRnv7d_YTOu3lw8Fs0B-93aGzOMORpZck96iy_trAAzpeuc1juUrfD_eQAQ
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2021+Fifth+International+Conference+on+I-SMAC+%28IoT+in+Social%2C+Mobile%2C+Analytics+and+Cloud%29+%28I-SMAC%29&rft.atitle=Applying+the+BBRP01+Technique+Used+To+Secure+The+Data&rft.au=Shobana%2C+R.&rft.au=Rajaprakash%2C+S.&rft.au=Habib%2C+Hani.+R.&rft.au=Samil%2C+M.S.&rft.date=2021-11-11&rft.pub=IEEE&rft.eissn=2768-0673&rft.spage=1455&rft.epage=1458&rft_id=info:doi/10.1109%2FI-SMAC52330.2021.9640792&rft.externalDocID=9640792