Implementing Vault Fortify: Best Practices for Data Protection and Compliance

Year : 2024 | Volume :11 | Issue : 02 | Page : 18-24
By

Abdula Adil,

Adhnan Mahamood,

Ajmal M.,

Ashar Mohammed Cherichi,

Jalaluddeen B.M.,

  1. Student Department of Computer Science and Engineering, P A College of Engineering, Mangalore Karnataka India
  2. Student Department of Computer Science and Engineering, P A College of Engineering, Mangalore Karnataka India
  3. Student Department of Computer Science and Engineering, P A College of Engineering, Mangalore Karnataka India
  4. Student Department of Computer Science and Engineering, P A College of Engineering, Mangalore Karnataka India
  5. Assistant Professor Department of Computer Science and Engineering, P A College of Engineering, Mangalore Karnataka India

Abstract

In an era marked by heightened concerns over privacy and security, the need for innovative approaches to data sharing platforms has become increasingly imperative. This paper presents StealthChat, a novel solution that combines steganography techniques with peer-to-peer (P2P) architecture to establish a secure and decentralized communication environment. Leveraging TypeScript, StealthChat offers users a seamless and intuitive interface for real-time data sharing while prioritizing privacy and confidentiality. The core architecture of StealthChat is built upon a P2P network model, enabling direct communication between users without reliance on centralized servers. Through dynamic peer discovery mechanisms and efficient data routing protocols, users can establish secure connections and exchange messages in real-time. This decentralized method lowers the risks connected with centralized data storage, making it less vulnerable to possible hacks or breaches while also improving scalability and fault tolerance.

Keywords: StealthChat, steganography, peer-to-peer, data sharing, privacy, security

[This article belongs to Journal of Telecommunication, Switching Systems and Networks(jotssn)]

How to cite this article: Abdula Adil, Adhnan Mahamood, Ajmal M., Ashar Mohammed Cherichi, Jalaluddeen B.M.. Implementing Vault Fortify: Best Practices for Data Protection and Compliance. Journal of Telecommunication, Switching Systems and Networks. 2024; 11(02):18-24.
How to cite this URL: Abdula Adil, Adhnan Mahamood, Ajmal M., Ashar Mohammed Cherichi, Jalaluddeen B.M.. Implementing Vault Fortify: Best Practices for Data Protection and Compliance. Journal of Telecommunication, Switching Systems and Networks. 2024; 11(02):18-24. Available from: https://journals.stmjournals.com/jotssn/article=2024/view=166799



Browse Figures

References

  1. Kaur S, Bansal S, Bansal RK. Image steganography for securing secret data using hybrid hiding model. Multimedia Tools and Applications. 2021 Feb;80:7749-69.
  2. Sarwar MI, Iqbal MW, Alyas T, Namoun A, Alrehaili A, Tufail A, Tabassum N. Data vaults for blockchain-empowered accounting information systems. IEEE Access. 2021 Aug 24;9:117306-24.
  3. Seth B, Dalal S, Le DN, Jaglan V, Dahiya N, Agrawal A, Sharma MM, Prakash D, Verma KD. Secure Cloud Data Storage System Using Hybrid Paillier–Blowfish Algorithm. Computers, Materials & Continua. 2021 Apr 1;67(1).
  4. Gupta I, Singh AK, Lee CN, Buyya R. Secure data storage and sharing techniques for data protection in cloud environments: A systematic review, analysis, and future directions. IEEE Access. 2022 Jul 4;10:71247-77.
  5. Taha MS, Mohd Rahim MS, Lafta SA, Hashim MM, Alzuabidi HM. Combination of steganography and cryptography: A short survey. InIOP conference series: materials science and engineering 2019 May 1 (Vol. 518, No. 5, p. 052003). IOP Publishing.
  6. AA AEL-L, Abd-El-Atty B, Venegas-Andraca SE (2019) A novel image steganography technique based on quantum substitution boxes. Opt Laser Technol 116:92–102.https://doi.org/10.1016/j.2019.03.005
  7. Abd El-Latif AA, Abd-El-Atty B, Elseuofi S, Khalifa HS, Alghamdi AS, Polat K, Amin M. Secret images transfer in cloud system based on investigating quantum walks in steganography approaches. Physica A: Statistical Mechanics and its Applications. 2020 Mar 1;541:123687.https://doi.org/10.1016/j.physa.2019.123687
  8. Abdulla AA (2015) Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography. Diss. University of Buckingham. http://bear.buckingham.uk/id/eprint/149
  9. Kadhim IJ, Premaratne P, Vial PJ. Improved image steganography based on super-pixel and coefficient-plane-selection. Signal Processing. 2020 Jun 1;171:107481.
  10. Malathi P, Gireeshkumar T. Relating the embedding efficiency of LSB steganography techniques in spatial and transform domains. Procedia Computer Science. 2016 Jan 1;93:878-85.
  11. Makhdoom I, Abolhasan M, Lipman J, Piccardi M, Franklin D. PrivySeC: A secure and privacy-compliant distributed framework for personal data sharing in IoT ecosystems. Blockchain: Research and Applications. 2024 Jul 9:100220.
  12. Oliveira J, Santin A, Viegas E, Horchulhack P. A Non-interactive One-Time Password-Based Method to Enhance the Vault Security. InInternational Conference on Advanced Information Networking and Applications 2024 Apr 9 (pp. 201-213). Cham: Springer Nature Switzerland.
  13. Yeshwantrao SA, Satpute KC, Patil TH, Shinde SB. EVAULT IN BLOCKCHAIN TO STORE AND MANAGE LEGALRECORDS.

Regular Issue Subscription Original Research
Volume 11
Issue 02
Received June 6, 2024
Accepted July 7, 2024
Published July 18, 2024

Check Our other Platform for Workshops in the field of AI, Biotechnology & Nanotechnology.
Check Out Platform for Webinars in the field of AI, Biotech. & Nanotech.