Implementing Vault Fortify: Best Practices for Data Protection and Compliance

[{“box”:0,”content”:”[if 992 equals=”Open Access”]n

n

n

n

Open Access

nn

n

n[/if 992]n

n

Year : August 13, 2024 at 5:20 pm | [if 1553 equals=””] Volume :11 [else] Volume :11[/if 1553] | [if 424 equals=”Regular Issue”]Issue[/if 424][if 424 equals=”Special Issue”]Special Issue[/if 424] [if 424 equals=”Conference”][/if 424] : 02 | Page : 18-24

n

n

n

n

n

n

By

n

[foreach 286]n

n

n

Abdula Adil, Adhnan Mahamood, Ajmal M., Ashar Mohammed Cherichi, Jalaluddeen B.M.,

n

    n t

  • n

n

n[/foreach]

n

n[if 2099 not_equal=”Yes”]n

    [foreach 286] [if 1175 not_equal=””]n t

  1. Student, Student, Student, Student, Assistant Professor Department of Computer Science and Engineering, P A College of Engineering, Mangalore, Department of Computer Science and Engineering, P A College of Engineering, Mangalore, Department of Computer Science and Engineering, P A College of Engineering, Mangalore, Department of Computer Science and Engineering, P A College of Engineering, Mangalore, Department of Computer Science and Engineering, P A College of Engineering, Mangalore Karnataka, Karnataka, Karnataka, Karnataka, Karnataka India, India, India, India, India
  2. n[/if 1175][/foreach]

n[/if 2099][if 2099 equals=”Yes”][/if 2099]n

n

Abstract

nIn an era marked by heightened concerns over privacy and security, the need for innovative approaches to data sharing platforms has become increasingly imperative. This paper presents StealthChat, a novel solution that combines steganography techniques with peer-to-peer (P2P) architecture to establish a secure and decentralized communication environment. Leveraging TypeScript, StealthChat offers users a seamless and intuitive interface for real-time data sharing while prioritizing privacy and confidentiality. The core architecture of StealthChat is built upon a P2P network model, enabling direct communication between users without reliance on centralized servers. Through dynamic peer discovery mechanisms and efficient data routing protocols, users can establish secure connections and exchange messages in real-time. This decentralized method lowers the risks connected with centralized data storage, making it less vulnerable to possible hacks or breaches while also improving scalability and fault tolerance.

n

n

n

Keywords: StealthChat, steganography, peer-to-peer, data sharing, privacy, security

n[if 424 equals=”Regular Issue”][This article belongs to Journal of Telecommunication, Switching Systems and Networks(jotssn)]

n

[/if 424][if 424 equals=”Special Issue”][This article belongs to Special Issue under section in Journal of Telecommunication, Switching Systems and Networks(jotssn)][/if 424][if 424 equals=”Conference”]This article belongs to Conference [/if 424]

n

n

n

How to cite this article: Abdula Adil, Adhnan Mahamood, Ajmal M., Ashar Mohammed Cherichi, Jalaluddeen B.M.. Implementing Vault Fortify: Best Practices for Data Protection and Compliance. Journal of Telecommunication, Switching Systems and Networks. July 18, 2024; 11(02):18-24.

n

How to cite this URL: Abdula Adil, Adhnan Mahamood, Ajmal M., Ashar Mohammed Cherichi, Jalaluddeen B.M.. Implementing Vault Fortify: Best Practices for Data Protection and Compliance. Journal of Telecommunication, Switching Systems and Networks. July 18, 2024; 11(02):18-24. Available from: https://journals.stmjournals.com/jotssn/article=July 18, 2024/view=0

nn[if 992 equals=”Open Access”] Full Text PDF Download[/if 992] n

n[if 992 not_equal=’Open Access’] [/if 992]nn

n

nn[if 379 not_equal=””]n

Browse Figures

n

n

[foreach 379]n

n[/foreach]n

n

n

n[/if 379]n

n

References

n[if 1104 equals=””]n

  1. Kaur S, Bansal S, Bansal RK. Image steganography for securing secret data using hybrid hiding model. Multimedia Tools and Applications. 2021 Feb;80:7749-69.
  2. Sarwar MI, Iqbal MW, Alyas T, Namoun A, Alrehaili A, Tufail A, Tabassum N. Data vaults for blockchain-empowered accounting information systems. IEEE Access. 2021 Aug 24;9:117306-24.
  3. Seth B, Dalal S, Le DN, Jaglan V, Dahiya N, Agrawal A, Sharma MM, Prakash D, Verma KD. Secure Cloud Data Storage System Using Hybrid Paillier–Blowfish Algorithm. Computers, Materials & Continua. 2021 Apr 1;67(1).
  4. Gupta I, Singh AK, Lee CN, Buyya R. Secure data storage and sharing techniques for data protection in cloud environments: A systematic review, analysis, and future directions. IEEE Access. 2022 Jul 4;10:71247-77.
  5. Taha MS, Mohd Rahim MS, Lafta SA, Hashim MM, Alzuabidi HM. Combination of steganography and cryptography: A short survey. InIOP conference series: materials science and engineering 2019 May 1 (Vol. 518, No. 5, p. 052003). IOP Publishing.
  6. AA AEL-L, Abd-El-Atty B, Venegas-Andraca SE (2019) A novel image steganography technique based on quantum substitution boxes. Opt Laser Technol 116:92–102.https://doi.org/10.1016/j.2019.03.005
  7. Abd El-Latif AA, Abd-El-Atty B, Elseuofi S, Khalifa HS, Alghamdi AS, Polat K, Amin M. Secret images transfer in cloud system based on investigating quantum walks in steganography approaches. Physica A: Statistical Mechanics and its Applications. 2020 Mar 1;541:123687.https://doi.org/10.1016/j.physa.2019.123687
  8. Abdulla AA (2015) Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography. Diss. University of Buckingham. http://bear.buckingham.uk/id/eprint/149
  9. Kadhim IJ, Premaratne P, Vial PJ. Improved image steganography based on super-pixel and coefficient-plane-selection. Signal Processing. 2020 Jun 1;171:107481.
  10. Malathi P, Gireeshkumar T. Relating the embedding efficiency of LSB steganography techniques in spatial and transform domains. Procedia Computer Science. 2016 Jan 1;93:878-85.
  11. Makhdoom I, Abolhasan M, Lipman J, Piccardi M, Franklin D. PrivySeC: A secure and privacy-compliant distributed framework for personal data sharing in IoT ecosystems. Blockchain: Research and Applications. 2024 Jul 9:100220.
  12. Oliveira J, Santin A, Viegas E, Horchulhack P. A Non-interactive One-Time Password-Based Method to Enhance the Vault Security. InInternational Conference on Advanced Information Networking and Applications 2024 Apr 9 (pp. 201-213). Cham: Springer Nature Switzerland.
  13. Yeshwantrao SA, Satpute KC, Patil TH, Shinde SB. EVAULT IN BLOCKCHAIN TO STORE AND MANAGE LEGALRECORDS.

nn[/if 1104][if 1104 not_equal=””]n

    [foreach 1102]n t

  1. [if 1106 equals=””], [/if 1106][if 1106 not_equal=””],[/if 1106]
  2. n[/foreach]

n[/if 1104]

nn


nn[if 1114 equals=”Yes”]n

n[/if 1114]

n

n

[if 424 not_equal=””]Regular Issue[else]Published[/if 424] Subscription Original Research

n

n

[if 2146 equals=”Yes”][/if 2146][if 2146 not_equal=”Yes”][/if 2146]n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n[if 1748 not_equal=””]

[else]

[/if 1748]n

n

n

Volume 11
[if 424 equals=”Regular Issue”]Issue[/if 424][if 424 equals=”Special Issue”]Special Issue[/if 424] [if 424 equals=”Conference”][/if 424] 02
Received June 6, 2024
Accepted July 7, 2024
Published July 18, 2024

n

n

n

n

n

n nfunction myFunction2() {nvar x = document.getElementById(“browsefigure”);nif (x.style.display === “block”) {nx.style.display = “none”;n}nelse { x.style.display = “Block”; }n}ndocument.querySelector(“.prevBtn”).addEventListener(“click”, () => {nchangeSlides(-1);n});ndocument.querySelector(“.nextBtn”).addEventListener(“click”, () => {nchangeSlides(1);n});nvar slideIndex = 1;nshowSlides(slideIndex);nfunction changeSlides(n) {nshowSlides((slideIndex += n));n}nfunction currentSlide(n) {nshowSlides((slideIndex = n));n}nfunction showSlides(n) {nvar i;nvar slides = document.getElementsByClassName(“Slide”);nvar dots = document.getElementsByClassName(“Navdot”);nif (n > slides.length) { slideIndex = 1; }nif (n (item.style.display = “none”));nArray.from(dots).forEach(nitem => (item.className = item.className.replace(” selected”, “”))n);nslides[slideIndex – 1].style.display = “block”;ndots[slideIndex – 1].className += ” selected”;n}n”}]

Check Our other Platform for Workshops in the field of AI, Biotechnology & Nanotechnology.
Check Out Platform for Webinars in the field of AI, Biotech. & Nanotech.