SlideShare a Scribd company logo
1 of 7
Flow of presentation
Abstract
Introduction
Methodologies
Results
Conclusion
References
Abstract
In today's world, having data safeguarded is the most important
thing that any company or organization should accomplish. In
this research, we will discuss what goes into an ' Encryption
based access control system is superior to non-encrypted AC
systems,' providing data security or authorized access within the
control system using encryption techniques. Data storage and
sharing applications may cause data information owners to fail
to control the data access. In this paper, we will be presenting
how the Encryption approach is designed to limit the user
permissions to a system that could make access system models
more flexible. In this paper, we will be researching mainly on
how to involve encryption in access control systems. The
research will be based on the different encryption techniques
used like symmetrical and asymmetrical models, different types
of access control systems, different types of security systems,
types of threats that can happen, different terminology involved
with the encryption and access controls. The results show that
encryption-based access control systems can effectively
improve data security and reduce unauthorized user access in
any business application.
Keywords: Encryption, Access control, Public Key
Infrastructure
introduction
When it comes to protect sensitive data is to be discussed, the
concern of integrators was to simply stop unauthorized user
access.
Any unauthorized user access or attacks to control systems
leads to major risk / damage for any organization data, such as
unauthorized employee being access to control server rooms,
hackers able to logging to cloud databases.
Common method is to providing extra secured authorization
layer to the user. And to protect user data using encryption and
authorization.
introduction
Encryption is the art of secret writing. It is the process of
encoding or converting the plaintext to ciphertext. It uses an
algorithm or key.
The building blocks: Authentication, Integrity and Non-
repudiation.
Encryption techniques must be applied into AC systems to
protect the data confidentiality by limiting the user access and
user permissions.
Juan M. Marın Perez, Gregorio Martınez Perez, Antonio F.
Skarmeta Gomez [2] operates on motion data This research will
show literature survey on various encryption algorithms
methods used in protecting sensitive data and avoiding
unauthorized user access.
findings
The most key finding of research:
We described how encryption-based AC systems are more
beneficial over non-encrypted systems.
Encryption algorithm incorporated into the backend systems to
limit the user permissions, so that avoid any data modifications
and data security
Various Encryption models is designed to limit the user
permissions to a system that could make access system models
more flexible
Few drawbacks of using non-encryption and possible risks and
possible attacks.
Methodology
Qualitative Methodology approach has employed, principally
focusing on researching and information gathering.
Referred to scholarly and academic resources
Incorporating real world application enforced in data security at
work
Brainstorming session done within the group.
Study on encryption implemented access control systems in
building management and cloud-based databases
The research and data gathered by focusing encryption vs non-
encrypted AC systems and distributed the work equally among
the group members.
Methodology
How does Access control encryption work?
Adding encryption to an access control systems
Risk/ attacks:
Man in the middle attacks
Social Engineering
WI-FI Hacking
Web Application Hacking
SQL Injection
Cross Site Scripting
Encryption Methods
Attributed based encryption
Ciphertext policy based encryption
Ciphertext Policy Attribute Set Based Encryption
Identity Based Encryption
Hierarchical Identity Based Encryption
Hierarchical Attribute Based Encryption
results
Ensure the data integrity, data confidentiality.
Prevent or avoid the unauthorized access to the application or
cloud database
Increase client confidence.
User Access: Authorization of the user can be carried by using a
flag key encryption at backend systems. As shown in figure 1
below, create a table for user permissions
Reduce the time for approval holds – Encryption algorithm
model supports in automation build process in IT department.
Risk Management: help prevent any damage to the control
systems and protect from any cyber attacks. By follow the
hierarchical structure as shown in figure 2.
results
Figure 2: Hierarchy structure
Figure 1: Database Table structure for users
Discussion
By maintaining an encrypted AC systems will increase data
security by using an encrypted algorithm key to manage risks or
data tampering will build client confidence.
It will support trusted platform and secure communication
between two parties.
Asymmetrical encryption and symmetrical encryption models
will support and designed to be adaptable to various types of
access control systems, security systems.
Encryption algorithm principally aims at maintain a standard
suitable authorization and authentication standards that assists
the users to read/write the system if they only have authorized
key.
It provides regular updates to the access control system by
implementing automation encryption model suitable to the
modern types of threats that can damage.
conclusion
From the research it is safe to say that the security systems of
access control makes sure that secured information of
organization is always safe and is protected from any kinds of
vulnerabilities.
Acknowledgement
This paper is made possible with guidance and support of Dr.
Prof. Douglas Dune, ISOL-531-50 – Summer 2020 – Access
Control, University of the Cumberland’s at Williamsburg, KY
References:
Mohammed ENNAHBAOUI Said ELHAJJI “Study of Access
Control Models”, Proceedings of the World Congress on
Engineering 2013 Vol II, WCE 2013, July 3 - 5, 2013, London,
U.K.
Juan M. Marın Perez, Gregorio Martınez Perez, Antonio F.
Skarmeta Gomez “SecRBAC: Secure data in the Clouds” IEEE
Transactions on Services Computing (Volume: 10, Issue: 5,
Sept.-Oct. 1 2017).
Feedback from the professor
1. The topic should explain more about encryption, use the real-
world application as an example instead of cloud computing.
2. Use PPT content and format to complete the research paper.
Please find the attached PPT.
3. Place figures and tables in the research paper.
4. Add topic - Attacks, and risks of non-encrypted access
control system.
5. Show satisfying results in the research paper.
6. Use Encryption models and algorithms in the discussion
7. Excluding the introduction names page and references, words
should count 3000.
8. Strictly Should be in APA format and No plagiarism.
Project
Topic: Encryption based access control system is superior to
non-encrypted Access Control systems
Task: Write a research paper appropriate for journal
publication. That is, you must endeavor to meet all the
requirements of such a project. Also, make sure to justify your
title in your paper. Hence, your paper should include all of the
following (follow appropriate order)
1. Appropriate figures and tables
2. The research method(s)
3. The results
4. The discussion
5. Clear conclusion
6. A compelling introduction
7. An abstract
8. A well concise and descriptive title
9. Acknowledgements
10. References
Submission Requirements:
Format: APA
Font: Times New Roman, size 12
Length: At least 12 pages
References: At least 10 references
Power point Presentation: Prepare a power point presentation
with at least 12 slides for your presentation
No plagiarism

More Related Content

Similar to Flow of presentationAbstractIntroductionMethodologiesRes.docx

Multi-part Dynamic Key Generation For Secure Data Encryption
Multi-part Dynamic Key Generation For Secure Data EncryptionMulti-part Dynamic Key Generation For Secure Data Encryption
Multi-part Dynamic Key Generation For Secure Data EncryptionCSCJournals
 
Paper id 27201448
Paper id 27201448Paper id 27201448
Paper id 27201448IJRAT
 
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...
A PPLICATION OF  C LASSICAL  E NCRYPTION  T ECHNIQUES FOR  S ECURING  D ATA -...A PPLICATION OF  C LASSICAL  E NCRYPTION  T ECHNIQUES FOR  S ECURING  D ATA -...
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...IJCI JOURNAL
 
Single sign on mechanism for distributed computing
Single sign on mechanism for distributed computingSingle sign on mechanism for distributed computing
Single sign on mechanism for distributed computingeSAT Publishing House
 
Secure Brokerless System for Publisher/Subscriber Relationship in Distributed...
Secure Brokerless System for Publisher/Subscriber Relationship in Distributed...Secure Brokerless System for Publisher/Subscriber Relationship in Distributed...
Secure Brokerless System for Publisher/Subscriber Relationship in Distributed...IJERA Editor
 
IRJET - A Secure Approach for Intruder Detection using Backtracking
IRJET -  	  A Secure Approach for Intruder Detection using BacktrackingIRJET -  	  A Secure Approach for Intruder Detection using Backtracking
IRJET - A Secure Approach for Intruder Detection using BacktrackingIRJET Journal
 
IRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud DataIRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud DataIRJET Journal
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...IJNSA Journal
 
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...IJERA Editor
 
SQl Injection Protector for Authentication in Distributed Applications
SQl Injection Protector for Authentication in Distributed ApplicationsSQl Injection Protector for Authentication in Distributed Applications
SQl Injection Protector for Authentication in Distributed ApplicationsIOSR Journals
 
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...Editor IJCATR
 
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...IRJET Journal
 
Improving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudIJTET Journal
 
Applicability of Network Logs for Securing Computer Systems
Applicability of Network Logs for Securing Computer SystemsApplicability of Network Logs for Securing Computer Systems
Applicability of Network Logs for Securing Computer SystemsIDES Editor
 
Iaetsd enhancement of performance and security in bigdata processing
Iaetsd enhancement of performance and security in bigdata processingIaetsd enhancement of performance and security in bigdata processing
Iaetsd enhancement of performance and security in bigdata processingIaetsd Iaetsd
 
A REPORT ON THE ANALYSIS ON WEB AUTHENTICATION BASED ON SINGLE BLOCK HASH FUN...
A REPORT ON THE ANALYSIS ON WEB AUTHENTICATION BASED ON SINGLE BLOCK HASH FUN...A REPORT ON THE ANALYSIS ON WEB AUTHENTICATION BASED ON SINGLE BLOCK HASH FUN...
A REPORT ON THE ANALYSIS ON WEB AUTHENTICATION BASED ON SINGLE BLOCK HASH FUN...SIR SUCCESS PRINCE DUAH DUAH
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesIRJET Journal
 
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET Journal
 

Similar to Flow of presentationAbstractIntroductionMethodologiesRes.docx (20)

Multi-part Dynamic Key Generation For Secure Data Encryption
Multi-part Dynamic Key Generation For Secure Data EncryptionMulti-part Dynamic Key Generation For Secure Data Encryption
Multi-part Dynamic Key Generation For Secure Data Encryption
 
Paper id 27201448
Paper id 27201448Paper id 27201448
Paper id 27201448
 
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...
A PPLICATION OF  C LASSICAL  E NCRYPTION  T ECHNIQUES FOR  S ECURING  D ATA -...A PPLICATION OF  C LASSICAL  E NCRYPTION  T ECHNIQUES FOR  S ECURING  D ATA -...
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...
 
Single sign on mechanism for distributed computing
Single sign on mechanism for distributed computingSingle sign on mechanism for distributed computing
Single sign on mechanism for distributed computing
 
Secure Brokerless System for Publisher/Subscriber Relationship in Distributed...
Secure Brokerless System for Publisher/Subscriber Relationship in Distributed...Secure Brokerless System for Publisher/Subscriber Relationship in Distributed...
Secure Brokerless System for Publisher/Subscriber Relationship in Distributed...
 
IRJET - A Secure Approach for Intruder Detection using Backtracking
IRJET -  	  A Secure Approach for Intruder Detection using BacktrackingIRJET -  	  A Secure Approach for Intruder Detection using Backtracking
IRJET - A Secure Approach for Intruder Detection using Backtracking
 
IRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud DataIRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud Data
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
 
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
 
SQl Injection Protector for Authentication in Distributed Applications
SQl Injection Protector for Authentication in Distributed ApplicationsSQl Injection Protector for Authentication in Distributed Applications
SQl Injection Protector for Authentication in Distributed Applications
 
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
 
Only Abstract
Only AbstractOnly Abstract
Only Abstract
 
finl.docx
finl.docxfinl.docx
finl.docx
 
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
 
Improving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-Cloud
 
Applicability of Network Logs for Securing Computer Systems
Applicability of Network Logs for Securing Computer SystemsApplicability of Network Logs for Securing Computer Systems
Applicability of Network Logs for Securing Computer Systems
 
Iaetsd enhancement of performance and security in bigdata processing
Iaetsd enhancement of performance and security in bigdata processingIaetsd enhancement of performance and security in bigdata processing
Iaetsd enhancement of performance and security in bigdata processing
 
A REPORT ON THE ANALYSIS ON WEB AUTHENTICATION BASED ON SINGLE BLOCK HASH FUN...
A REPORT ON THE ANALYSIS ON WEB AUTHENTICATION BASED ON SINGLE BLOCK HASH FUN...A REPORT ON THE ANALYSIS ON WEB AUTHENTICATION BASED ON SINGLE BLOCK HASH FUN...
A REPORT ON THE ANALYSIS ON WEB AUTHENTICATION BASED ON SINGLE BLOCK HASH FUN...
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
 
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
 

More from keugene1

Following all Discussion guidelines, in your own words and in de.docx
Following all Discussion guidelines, in your own words and in de.docxFollowing all Discussion guidelines, in your own words and in de.docx
Following all Discussion guidelines, in your own words and in de.docxkeugene1
 
Follow-Up Post Peer ResponsePlease write a minimum of five c.docx
Follow-Up Post Peer ResponsePlease write a minimum of five c.docxFollow-Up Post Peer ResponsePlease write a minimum of five c.docx
Follow-Up Post Peer ResponsePlease write a minimum of five c.docxkeugene1
 
Followership and LeadershipThis week, you are focusing on the im.docx
Followership and LeadershipThis week, you are focusing on the im.docxFollowership and LeadershipThis week, you are focusing on the im.docx
Followership and LeadershipThis week, you are focusing on the im.docxkeugene1
 
Follow-Up Post InstructionsRespond to at least one peer and th.docx
Follow-Up Post InstructionsRespond to at least one peer and th.docxFollow-Up Post InstructionsRespond to at least one peer and th.docx
Follow-Up Post InstructionsRespond to at least one peer and th.docxkeugene1
 
Follow-Up Post InstructionsRespond to at least one person. Furth.docx
Follow-Up Post InstructionsRespond to at least one person. Furth.docxFollow-Up Post InstructionsRespond to at least one person. Furth.docx
Follow-Up Post InstructionsRespond to at least one person. Furth.docxkeugene1
 
Follow-Up Post (Response) InstructionsRespond to at least one pe.docx
Follow-Up Post (Response) InstructionsRespond to at least one pe.docxFollow-Up Post (Response) InstructionsRespond to at least one pe.docx
Follow-Up Post (Response) InstructionsRespond to at least one pe.docxkeugene1
 
Follow up discussion post  Please read and give your comment or addi.docx
Follow up discussion post  Please read and give your comment or addi.docxFollow up discussion post  Please read and give your comment or addi.docx
Follow up discussion post  Please read and give your comment or addi.docxkeugene1
 
Follow this link to access this weeks reading Social Justice Stan.docx
Follow this link to access this weeks reading Social Justice Stan.docxFollow this link to access this weeks reading Social Justice Stan.docx
Follow this link to access this weeks reading Social Justice Stan.docxkeugene1
 
follow these instructionsDescribe the vocal and instrumental pe.docx
follow these instructionsDescribe the vocal and instrumental pe.docxfollow these instructionsDescribe the vocal and instrumental pe.docx
follow these instructionsDescribe the vocal and instrumental pe.docxkeugene1
 
For almost 30 centuries—from its unification around 3100 B.C. to.docx
For almost 30 centuries—from its unification around 3100 B.C. to.docxFor almost 30 centuries—from its unification around 3100 B.C. to.docx
For almost 30 centuries—from its unification around 3100 B.C. to.docxkeugene1
 
For all their benign appearance, are sites like Facebook and Twitter.docx
For all their benign appearance, are sites like Facebook and Twitter.docxFor all their benign appearance, are sites like Facebook and Twitter.docx
For all their benign appearance, are sites like Facebook and Twitter.docxkeugene1
 
FOr Acadamic onlinetutorAssign 1 or 2 individuals of the group t.docx
FOr Acadamic onlinetutorAssign 1 or 2 individuals of the group t.docxFOr Acadamic onlinetutorAssign 1 or 2 individuals of the group t.docx
FOr Acadamic onlinetutorAssign 1 or 2 individuals of the group t.docxkeugene1
 
For all Assessments, the following general requirements hold.docx
For all Assessments, the following general requirements hold.docxFor all Assessments, the following general requirements hold.docx
For all Assessments, the following general requirements hold.docxkeugene1
 
for A-Z answers onlyoffshoring and its impact of labor and growt.docx
for A-Z answers onlyoffshoring and its impact of labor and growt.docxfor A-Z answers onlyoffshoring and its impact of labor and growt.docx
for A-Z answers onlyoffshoring and its impact of labor and growt.docxkeugene1
 
Footloose projectMost of the differences between the two versi.docx
Footloose projectMost of the differences between the two versi.docxFootloose projectMost of the differences between the two versi.docx
Footloose projectMost of the differences between the two versi.docxkeugene1
 
For 1-Hour Writer ONLY This author cited, Allport (1937) refers.docx
For 1-Hour Writer ONLY This author cited, Allport (1937) refers.docxFor 1-Hour Writer ONLY This author cited, Allport (1937) refers.docx
For 1-Hour Writer ONLY This author cited, Allport (1937) refers.docxkeugene1
 
Foodborne illness can have severe consequences.  In a minimum of 300.docx
Foodborne illness can have severe consequences.  In a minimum of 300.docxFoodborne illness can have severe consequences.  In a minimum of 300.docx
Foodborne illness can have severe consequences.  In a minimum of 300.docxkeugene1
 
Football- A starting point could be headlines Premier League susp.docx
Football- A starting point could be headlines Premier League susp.docxFootball- A starting point could be headlines Premier League susp.docx
Football- A starting point could be headlines Premier League susp.docxkeugene1
 
Foods deteriorate in quality due to a wide range of reactions .docx
Foods deteriorate in quality due to a wide range of reactions .docxFoods deteriorate in quality due to a wide range of reactions .docx
Foods deteriorate in quality due to a wide range of reactions .docxkeugene1
 
Food Truck to Ethiopia· Define what kind of food· Coffee is a .docx
Food Truck to Ethiopia· Define what kind of food· Coffee is a .docxFood Truck to Ethiopia· Define what kind of food· Coffee is a .docx
Food Truck to Ethiopia· Define what kind of food· Coffee is a .docxkeugene1
 

More from keugene1 (20)

Following all Discussion guidelines, in your own words and in de.docx
Following all Discussion guidelines, in your own words and in de.docxFollowing all Discussion guidelines, in your own words and in de.docx
Following all Discussion guidelines, in your own words and in de.docx
 
Follow-Up Post Peer ResponsePlease write a minimum of five c.docx
Follow-Up Post Peer ResponsePlease write a minimum of five c.docxFollow-Up Post Peer ResponsePlease write a minimum of five c.docx
Follow-Up Post Peer ResponsePlease write a minimum of five c.docx
 
Followership and LeadershipThis week, you are focusing on the im.docx
Followership and LeadershipThis week, you are focusing on the im.docxFollowership and LeadershipThis week, you are focusing on the im.docx
Followership and LeadershipThis week, you are focusing on the im.docx
 
Follow-Up Post InstructionsRespond to at least one peer and th.docx
Follow-Up Post InstructionsRespond to at least one peer and th.docxFollow-Up Post InstructionsRespond to at least one peer and th.docx
Follow-Up Post InstructionsRespond to at least one peer and th.docx
 
Follow-Up Post InstructionsRespond to at least one person. Furth.docx
Follow-Up Post InstructionsRespond to at least one person. Furth.docxFollow-Up Post InstructionsRespond to at least one person. Furth.docx
Follow-Up Post InstructionsRespond to at least one person. Furth.docx
 
Follow-Up Post (Response) InstructionsRespond to at least one pe.docx
Follow-Up Post (Response) InstructionsRespond to at least one pe.docxFollow-Up Post (Response) InstructionsRespond to at least one pe.docx
Follow-Up Post (Response) InstructionsRespond to at least one pe.docx
 
Follow up discussion post  Please read and give your comment or addi.docx
Follow up discussion post  Please read and give your comment or addi.docxFollow up discussion post  Please read and give your comment or addi.docx
Follow up discussion post  Please read and give your comment or addi.docx
 
Follow this link to access this weeks reading Social Justice Stan.docx
Follow this link to access this weeks reading Social Justice Stan.docxFollow this link to access this weeks reading Social Justice Stan.docx
Follow this link to access this weeks reading Social Justice Stan.docx
 
follow these instructionsDescribe the vocal and instrumental pe.docx
follow these instructionsDescribe the vocal and instrumental pe.docxfollow these instructionsDescribe the vocal and instrumental pe.docx
follow these instructionsDescribe the vocal and instrumental pe.docx
 
For almost 30 centuries—from its unification around 3100 B.C. to.docx
For almost 30 centuries—from its unification around 3100 B.C. to.docxFor almost 30 centuries—from its unification around 3100 B.C. to.docx
For almost 30 centuries—from its unification around 3100 B.C. to.docx
 
For all their benign appearance, are sites like Facebook and Twitter.docx
For all their benign appearance, are sites like Facebook and Twitter.docxFor all their benign appearance, are sites like Facebook and Twitter.docx
For all their benign appearance, are sites like Facebook and Twitter.docx
 
FOr Acadamic onlinetutorAssign 1 or 2 individuals of the group t.docx
FOr Acadamic onlinetutorAssign 1 or 2 individuals of the group t.docxFOr Acadamic onlinetutorAssign 1 or 2 individuals of the group t.docx
FOr Acadamic onlinetutorAssign 1 or 2 individuals of the group t.docx
 
For all Assessments, the following general requirements hold.docx
For all Assessments, the following general requirements hold.docxFor all Assessments, the following general requirements hold.docx
For all Assessments, the following general requirements hold.docx
 
for A-Z answers onlyoffshoring and its impact of labor and growt.docx
for A-Z answers onlyoffshoring and its impact of labor and growt.docxfor A-Z answers onlyoffshoring and its impact of labor and growt.docx
for A-Z answers onlyoffshoring and its impact of labor and growt.docx
 
Footloose projectMost of the differences between the two versi.docx
Footloose projectMost of the differences between the two versi.docxFootloose projectMost of the differences between the two versi.docx
Footloose projectMost of the differences between the two versi.docx
 
For 1-Hour Writer ONLY This author cited, Allport (1937) refers.docx
For 1-Hour Writer ONLY This author cited, Allport (1937) refers.docxFor 1-Hour Writer ONLY This author cited, Allport (1937) refers.docx
For 1-Hour Writer ONLY This author cited, Allport (1937) refers.docx
 
Foodborne illness can have severe consequences.  In a minimum of 300.docx
Foodborne illness can have severe consequences.  In a minimum of 300.docxFoodborne illness can have severe consequences.  In a minimum of 300.docx
Foodborne illness can have severe consequences.  In a minimum of 300.docx
 
Football- A starting point could be headlines Premier League susp.docx
Football- A starting point could be headlines Premier League susp.docxFootball- A starting point could be headlines Premier League susp.docx
Football- A starting point could be headlines Premier League susp.docx
 
Foods deteriorate in quality due to a wide range of reactions .docx
Foods deteriorate in quality due to a wide range of reactions .docxFoods deteriorate in quality due to a wide range of reactions .docx
Foods deteriorate in quality due to a wide range of reactions .docx
 
Food Truck to Ethiopia· Define what kind of food· Coffee is a .docx
Food Truck to Ethiopia· Define what kind of food· Coffee is a .docxFood Truck to Ethiopia· Define what kind of food· Coffee is a .docx
Food Truck to Ethiopia· Define what kind of food· Coffee is a .docx
 

Recently uploaded

Major project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesMajor project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesAmanpreetKaur157993
 
Improved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppImproved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppCeline George
 
Book Review of Run For Your Life Powerpoint
Book Review of Run For Your Life PowerpointBook Review of Run For Your Life Powerpoint
Book Review of Run For Your Life Powerpoint23600690
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxLimon Prince
 
An Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge AppAn Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge AppCeline George
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...Nguyen Thanh Tu Collection
 
ANTI PARKISON DRUGS.pptx
ANTI         PARKISON          DRUGS.pptxANTI         PARKISON          DRUGS.pptx
ANTI PARKISON DRUGS.pptxPoojaSen20
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsSandeep D Chaudhary
 
Trauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesTrauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesPooky Knightsmith
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxAdelaideRefugio
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...Nguyen Thanh Tu Collection
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024Borja Sotomayor
 
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...Gary Wood
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...EADTU
 

Recently uploaded (20)

Including Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdfIncluding Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdf
 
Major project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesMajor project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategies
 
Improved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppImproved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio App
 
Book Review of Run For Your Life Powerpoint
Book Review of Run For Your Life PowerpointBook Review of Run For Your Life Powerpoint
Book Review of Run For Your Life Powerpoint
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
 
Supporting Newcomer Multilingual Learners
Supporting Newcomer  Multilingual LearnersSupporting Newcomer  Multilingual Learners
Supporting Newcomer Multilingual Learners
 
An Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge AppAn Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge App
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
ANTI PARKISON DRUGS.pptx
ANTI         PARKISON          DRUGS.pptxANTI         PARKISON          DRUGS.pptx
ANTI PARKISON DRUGS.pptx
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
Trauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesTrauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical Principles
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptx
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"
 
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
 
Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 

Flow of presentationAbstractIntroductionMethodologiesRes.docx

  • 1. Flow of presentation Abstract Introduction Methodologies Results Conclusion References Abstract In today's world, having data safeguarded is the most important thing that any company or organization should accomplish. In this research, we will discuss what goes into an ' Encryption based access control system is superior to non-encrypted AC systems,' providing data security or authorized access within the control system using encryption techniques. Data storage and sharing applications may cause data information owners to fail to control the data access. In this paper, we will be presenting how the Encryption approach is designed to limit the user permissions to a system that could make access system models more flexible. In this paper, we will be researching mainly on how to involve encryption in access control systems. The research will be based on the different encryption techniques used like symmetrical and asymmetrical models, different types of access control systems, different types of security systems, types of threats that can happen, different terminology involved with the encryption and access controls. The results show that encryption-based access control systems can effectively improve data security and reduce unauthorized user access in any business application. Keywords: Encryption, Access control, Public Key Infrastructure
  • 2. introduction When it comes to protect sensitive data is to be discussed, the concern of integrators was to simply stop unauthorized user access. Any unauthorized user access or attacks to control systems leads to major risk / damage for any organization data, such as unauthorized employee being access to control server rooms, hackers able to logging to cloud databases. Common method is to providing extra secured authorization layer to the user. And to protect user data using encryption and authorization. introduction Encryption is the art of secret writing. It is the process of encoding or converting the plaintext to ciphertext. It uses an algorithm or key. The building blocks: Authentication, Integrity and Non- repudiation. Encryption techniques must be applied into AC systems to protect the data confidentiality by limiting the user access and user permissions. Juan M. Marın Perez, Gregorio Martınez Perez, Antonio F. Skarmeta Gomez [2] operates on motion data This research will show literature survey on various encryption algorithms methods used in protecting sensitive data and avoiding unauthorized user access. findings The most key finding of research: We described how encryption-based AC systems are more beneficial over non-encrypted systems.
  • 3. Encryption algorithm incorporated into the backend systems to limit the user permissions, so that avoid any data modifications and data security Various Encryption models is designed to limit the user permissions to a system that could make access system models more flexible Few drawbacks of using non-encryption and possible risks and possible attacks. Methodology Qualitative Methodology approach has employed, principally focusing on researching and information gathering. Referred to scholarly and academic resources Incorporating real world application enforced in data security at work Brainstorming session done within the group. Study on encryption implemented access control systems in building management and cloud-based databases The research and data gathered by focusing encryption vs non- encrypted AC systems and distributed the work equally among the group members. Methodology How does Access control encryption work? Adding encryption to an access control systems Risk/ attacks: Man in the middle attacks Social Engineering WI-FI Hacking Web Application Hacking SQL Injection Cross Site Scripting
  • 4. Encryption Methods Attributed based encryption Ciphertext policy based encryption Ciphertext Policy Attribute Set Based Encryption Identity Based Encryption Hierarchical Identity Based Encryption Hierarchical Attribute Based Encryption results Ensure the data integrity, data confidentiality. Prevent or avoid the unauthorized access to the application or cloud database Increase client confidence. User Access: Authorization of the user can be carried by using a flag key encryption at backend systems. As shown in figure 1 below, create a table for user permissions Reduce the time for approval holds – Encryption algorithm model supports in automation build process in IT department. Risk Management: help prevent any damage to the control systems and protect from any cyber attacks. By follow the hierarchical structure as shown in figure 2. results Figure 2: Hierarchy structure Figure 1: Database Table structure for users
  • 5. Discussion By maintaining an encrypted AC systems will increase data security by using an encrypted algorithm key to manage risks or data tampering will build client confidence. It will support trusted platform and secure communication between two parties. Asymmetrical encryption and symmetrical encryption models will support and designed to be adaptable to various types of access control systems, security systems. Encryption algorithm principally aims at maintain a standard suitable authorization and authentication standards that assists the users to read/write the system if they only have authorized key. It provides regular updates to the access control system by implementing automation encryption model suitable to the modern types of threats that can damage. conclusion From the research it is safe to say that the security systems of access control makes sure that secured information of organization is always safe and is protected from any kinds of vulnerabilities. Acknowledgement This paper is made possible with guidance and support of Dr. Prof. Douglas Dune, ISOL-531-50 – Summer 2020 – Access Control, University of the Cumberland’s at Williamsburg, KY References: Mohammed ENNAHBAOUI Said ELHAJJI “Study of Access
  • 6. Control Models”, Proceedings of the World Congress on Engineering 2013 Vol II, WCE 2013, July 3 - 5, 2013, London, U.K. Juan M. Marın Perez, Gregorio Martınez Perez, Antonio F. Skarmeta Gomez “SecRBAC: Secure data in the Clouds” IEEE Transactions on Services Computing (Volume: 10, Issue: 5, Sept.-Oct. 1 2017). Feedback from the professor 1. The topic should explain more about encryption, use the real- world application as an example instead of cloud computing. 2. Use PPT content and format to complete the research paper. Please find the attached PPT. 3. Place figures and tables in the research paper. 4. Add topic - Attacks, and risks of non-encrypted access control system. 5. Show satisfying results in the research paper. 6. Use Encryption models and algorithms in the discussion 7. Excluding the introduction names page and references, words should count 3000. 8. Strictly Should be in APA format and No plagiarism. Project Topic: Encryption based access control system is superior to non-encrypted Access Control systems Task: Write a research paper appropriate for journal publication. That is, you must endeavor to meet all the requirements of such a project. Also, make sure to justify your title in your paper. Hence, your paper should include all of the following (follow appropriate order) 1. Appropriate figures and tables 2. The research method(s) 3. The results 4. The discussion 5. Clear conclusion
  • 7. 6. A compelling introduction 7. An abstract 8. A well concise and descriptive title 9. Acknowledgements 10. References Submission Requirements: Format: APA Font: Times New Roman, size 12 Length: At least 12 pages References: At least 10 references Power point Presentation: Prepare a power point presentation with at least 12 slides for your presentation No plagiarism