Applying the BBRP01 Technique Used To Secure The Data
In this digital era, the current state of the data is critical to the lives of citizens, as data is remaining as the primary factor determine the survival of a person in the world. In particular, data is more readily available on social media platforms. Despite the hype, the data lacks adequate secu...
Saved in:
Published in: | 2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC) pp. 1455 - 1458 |
---|---|
Main Authors: | , , , , |
Format: | Conference Proceeding |
Language: | English |
Published: |
IEEE
11-11-2021
|
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Abstract | In this digital era, the current state of the data is critical to the lives of citizens, as data is remaining as the primary factor determine the survival of a person in the world. In particular, data is more readily available on social media platforms. Despite the hype, the data lacks adequate securing by allowing the hackers to readily access it. To overcome this challenge, this research work propose a novel technique called BBRP01 to solve this problem. Generally, there are four stages to this approach. In this 1st stage applies the T-test method; 2nd stage applies the odd equation; 3rd stage represent even equation; and final stage applies the perfect number operations. Further, the BBRP01 technique provides advanced security when compared to ChaCha method. |
---|---|
AbstractList | In this digital era, the current state of the data is critical to the lives of citizens, as data is remaining as the primary factor determine the survival of a person in the world. In particular, data is more readily available on social media platforms. Despite the hype, the data lacks adequate securing by allowing the hackers to readily access it. To overcome this challenge, this research work propose a novel technique called BBRP01 to solve this problem. Generally, there are four stages to this approach. In this 1st stage applies the T-test method; 2nd stage applies the odd equation; 3rd stage represent even equation; and final stage applies the perfect number operations. Further, the BBRP01 technique provides advanced security when compared to ChaCha method. |
Author | Vijaysankar, V. Habib, Hani. R. Shobana, R. Rajaprakash, S. Samil, M.S. |
Author_xml | – sequence: 1 givenname: R. surname: Shobana fullname: Shobana, R. email: shobanasenthil29@gmail.com organization: Aarupadai Veedu Institute of Technology, Vinayaka Mission's Research Foundation,Chennai,Tamil Nadu,India – sequence: 2 givenname: S. surname: Rajaprakash fullname: Rajaprakash, S. email: srajaprakash_04@yahoo.com organization: Aarupadai Veedu Institute of Technology, Vinayaka Mission's Research Foundation,Chennai,Tamil Nadu,India – sequence: 3 givenname: Hani. R. surname: Habib fullname: Habib, Hani. R. email: hanirhabib3@gmail.com organization: Aarupadai Veedu Institute of Technology, Vinayaka Mission's Research Foundation,Chennai,Tamil Nadu,India – sequence: 4 givenname: M.S. surname: Samil fullname: Samil, M.S. email: hhzcrew22@gmail.com organization: Aarupadai Veedu Institute of Technology, Vinayaka Mission's Research Foundation,Chennai,Tamil Nadu,India – sequence: 5 givenname: V. surname: Vijaysankar fullname: Vijaysankar, V. email: vijaysankar837@gmail.com organization: Aarupadai Veedu Institute of Technology, Vinayaka Mission's Research Foundation,Chennai,Tamil Nadu,India |
BookMark | eNotj8tOwzAQRQ0CiVLyBWz8Awljj-3YyzS8KhWBaLqu3GRMjUoaknTRv6cSXd3FOTrSvWVX7b4lxriATAhwD_N0-VaUWiJCJkGKzBkFuZMXLHG5FcZoJY2S9pJNZG5sCibHG5YMwzcAoAR0Tk2YLrpud4ztFx-3xGezzw8QvKJ628bfA_HVQA2v9nxJ9aEnXp2cRz_6O3Yd_G6g5LxTtnp-qsrXdPH-Mi-LRRoF4pgK06AJVAcvpPIboQGspUDGanLGK6WwERs0kkjXFoIHBMRwYq7RebA4Zff_3UhE666PP74_rs9H8Q8MW0dX |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/I-SMAC52330.2021.9640792 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library Online IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library Online url: http://ieeexplore.ieee.org/Xplore/DynWel.jsp sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
EISBN | 9781665426428 166542642X |
EISSN | 2768-0673 |
EndPage | 1458 |
ExternalDocumentID | 9640792 |
Genre | orig-research |
GroupedDBID | 6IE 6IF 6IL 6IN ABLEC ADZIZ ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO IEGSK OCL RIE RIL |
ID | FETCH-LOGICAL-i133t-16d36fecfa124ab150088efe685e96a4443d1b362ee5c80fa03033fe969d57f83 |
IEDL.DBID | RIE |
IngestDate | Wed Jun 26 19:25:47 EDT 2024 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i133t-16d36fecfa124ab150088efe685e96a4443d1b362ee5c80fa03033fe969d57f83 |
PageCount | 4 |
ParticipantIDs | ieee_primary_9640792 |
PublicationCentury | 2000 |
PublicationDate | 2021-Nov.-11 |
PublicationDateYYYYMMDD | 2021-11-11 |
PublicationDate_xml | – month: 11 year: 2021 text: 2021-Nov.-11 day: 11 |
PublicationDecade | 2020 |
PublicationTitle | 2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC) |
PublicationTitleAbbrev | I-SMAC |
PublicationYear | 2021 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
SSID | ssj0003203994 |
Score | 1.8258537 |
Snippet | In this digital era, the current state of the data is critical to the lives of citizens, as data is remaining as the primary factor determine the survival of a... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 1455 |
SubjectTerms | BBRP01 ChaCha Computer hacking encryption perfect number prime Security Social networking (online) |
Title | Applying the BBRP01 Technique Used To Secure The Data |
URI | https://ieeexplore.ieee.org/document/9640792 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1JT0IxEG6Ekyc1YNzTg0cL7Wtfl6MgBA8aIpB4I33tNPECRuD_O30sxsSLt6ZNk-7fLP1mCLmXQnNXVIqV1lZMmRSZlxBYrAwvi-SUCpk7PJqY13f7NMhhch4OXBgAqD-fQScXa19-XIZNNpV1XfY6OXxwG8bZLVfrYE-RBUesVfvPOtx1n9nk5bGPipbkqAcWorPr_iuPSg0jw5P_DeCUtH_4eHR8QJozcgSLFimzAJlJShRlONrrvY25oNN9SFY6W0Gk0yWtDepA8TjQJ7_2bTIbDqb9EdslQWAfqD6umdBR6gQheURiX6H8hu8CJNC2BKe9UkpGUSEMAZTB8uTx1kqZsM3F0iQrz0lzsVzABaE65ehe3poKu4E2DlLlQQYfVADP9SVp5SnPP7dxLua72V79XX1NjvOqZl6eEDekuf7awC1prOLmrt6Zb3oajLY |
link.rule.ids | 310,311,782,786,791,792,798,27936,54770 |
linkProvider | IEEE |
linkToHtml | http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1JTwIxFG4UD3pSA8bdHjxa6Ew7XY6yBSIQIkPijXTa18QLEIH_bzssxsSLt6ZNm-7fW_q9IvTMEkF1WnCSKVUQLr0jhoElrpA0S73m3EbucG8iRx-q3Ylhcl4OXBgAKB-fQT0mS1--W9hNNJU1dPQ66XDhnmRcSrplax0sKiylAW35_rkO1Y0-mQxfW0HVYjRogmlS3zXw6yeVEki65__rwgWq_TDy8PiANZfoCOZVlEURMtKUcJDicLP5PqYJzvdBWfF0BQ7nC1ya1AGHDYHbZm1qaNrt5K0e2X2DQD6DArkmiXBMeLDeBCw2RZDgws0AHoTKQAvDOWcuKQIQAWRWUW_CuWXMhzLtMukVu0KV-WIO1wgLH-N7GSWLUA2E1OALA8wayy0YKm5QNQ55ttxGupjtRnv7d_YTOu3lw8Fs0B-93aGzOMORpZck96iy_trAAzpeuc1juUrfD_eQAQ |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2021+Fifth+International+Conference+on+I-SMAC+%28IoT+in+Social%2C+Mobile%2C+Analytics+and+Cloud%29+%28I-SMAC%29&rft.atitle=Applying+the+BBRP01+Technique+Used+To+Secure+The+Data&rft.au=Shobana%2C+R.&rft.au=Rajaprakash%2C+S.&rft.au=Habib%2C+Hani.+R.&rft.au=Samil%2C+M.S.&rft.date=2021-11-11&rft.pub=IEEE&rft.eissn=2768-0673&rft.spage=1455&rft.epage=1458&rft_id=info:doi/10.1109%2FI-SMAC52330.2021.9640792&rft.externalDocID=9640792 |