• Login
    • University Home
    • Library Home
    • Lib Catalogue
    • Advance Search
    View Item 
    •   IR@KDU Home
    • INTERNATIONAL RESEARCH CONFERENCE ARTICLES (KDU IRC)
    • 2018 IRC Articles
    • Computing
    • View Item
    •   IR@KDU Home
    • INTERNATIONAL RESEARCH CONFERENCE ARTICLES (KDU IRC)
    • 2018 IRC Articles
    • Computing
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Impact of Adoption of Homomorphic Encryption: Security Enhance Guideline for Sri Lankan Military System

    Thumbnail
    View/Open
    Untitled(19).pdf (896.9Kb)
    Date
    2018
    Author
    Abeykoon, RMKDLB
    Udara, RT
    Ganepola, GAD
    Ferno, WAAM
    Kathriarachchi, RPS
    Vidanagama, DU
    Metadata
    Show full item record
    Abstract
    Abstract- At present, Information security increases the conversation with the occurrences of many data vulnerabilities in current systems. It is now mandatory for all system domains to consider and implement Information security plans. One current procedure which follows for securing information is Data Encryption, especially during end-to-end transmission across computer networks. Encryption is a method by which plaintext or any other type of data is converted from a readable form to an encoded version that can only be decoded by another entity if they have access to a decryption key. Data Encryption has been and still is an area that is continuously being developed. As of today, the latest technology in this area is Homomorphic Encryption - conversion of data into ciphertext that can be analysed and worked with as if it were still in its original form. Ciphertext is plain text exposed to “Cipher” algorithm which is applied to plain text to get ciphertext. The authors present here the applicability of this technology on Sri Lankan Military Domain. The methodology used to conduct this research is a qualitative and quantitative based survey. The online survey was circulated through e-mail and the survey was successfully completed. According to the survey it could be analysed that the security when transferring data/information in this domain is very low-grade, which in contrast, must be very high due to the presence of sensitive data related to national security of the country. The authors have designed in detail on a set of recommended guidelines for secure transmission of military data using this technology.
    URI
    http://ir.kdu.ac.lk/handle/345/2501
    Collections
    • Computing [46]

    Library copyright © 2017  General Sir John Kotelawala Defence University, Sri Lanka
    Contact Us | Send Feedback
     

     

    Browse

    All of IR@KDUCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsFacultyDocument TypeThis CollectionBy Issue DateAuthorsTitlesSubjectsFacultyDocument Type

    My Account

    LoginRegister

    Library copyright © 2017  General Sir John Kotelawala Defence University, Sri Lanka
    Contact Us | Send Feedback