ENHANCING DATA PRIVACY IN GOVERNMENT ORGANIZATIONS: A COMPARATIVE ANALYSIS AND IMPLEMENTATION OF OPTIMAL CERTIFICATELESS SCHEMES
Downloads
This paper emphasizes on the role of certificateless systems in addressing security challenges posed by the digital realm on government organizations based on four fundamental security measures. These measures include confidentiality, integrity, authentication, and non-repudiation. The paper aimed at safeguarding data from unauthorized access, ensuring data integrity during transit, validating user identity and providing data integrity.
To enhance these security aspects, the study advocates the adoption of certificateless encryption techniques to uphold data confidentiality and employs digital signature techniques to guarantee integrity, accuracy, and non-repudiation. And the assurance that the sender of information is provided with proof of delivery and the recipient is provided with proof of the sender's identity. The study’s main achievement a comparative analysis of four certificateless schemes to ensure data privacy from malicious attacks, Implementation of the best scheme using an elliptic curve digital signature and data-at-rest encryption. This ensured secure data privacy in transit and at retention to enhance confidentiality, integrity, and authenticity.
Ahmad, N. M. et al. (2011) ‘Comparative analysis and implementation of certificateless based authentication scheme’, Communications in Computer and Information Science, 251 CCIS(PART 1), pp. 151–162. doi: 10.1007/978-3-642-25327-0_14.
B, Z. C. and Chen, L. (2018) Certificateless Public Key Signature. Springer International Publishing. doi: 10.1007/978-3-319-99807-7.
Chang, J. et al. (2020) ‘Certificateless Homomorphic Signature Scheme for Network Coding’, IEEE/ACM Transactions on Networking, 28(6), pp. 2615–2628. doi: 10.1109/TNET.2020.3013902.
Cui, B. bei, Wei, L. and He, W. (2022) ‘A New Certificateless Signcryption Scheme for Securing Internet of Vehicles’, SSRN Electronic Journal, pp. 0–19. doi: 10.2139/ssrn.4019225.
Fidelis, C. and Borjas, H. (2020) ‘Certificateless Identification of Wireless Sensor Nodes’, (December 2019).
Gautam, S., Gaur, S. S. and Masood, S. (2019) ‘A comparative study of certificate and certificate-less cryptographic algorithm and its energy consumption analysis in WSN’, TARU Journal of Computer Dynamics & Technological Advances, 1(2, 3, 4), pp. 85–100. doi: 10.47974/2019.tjcdta.004.
Genc, Y. and Afacan, E. (2021) ‘Design and implementation of an efficient elliptic curve digital signature algorithm (ECDSA)’, 2021 IEEE International IOT, Electronics and Mechatronics Conference, IEMTRONICS 2021 - Proceedings. doi: 10.1109/IEMTRONICS52119.2021.9422589.
Ghani, R. F. et al. (2022) ‘Blockchain-based student certificate management and system sharing using hyperledger fabric platform’, Periodicals of Engineering and Natural Sciences, 10(2), pp. 207–218. doi: 10.21533/pen.v10i2.2839.
Ibraheem, I. N., Hassan, S. M. and Abead, S. A. (2020) ‘Comparative analysis & implementation of image encryption & decryption for mobile cloud security’, International Journal of Advanced Science and Technology, 29(3 Special Issue), pp. 109–121.
Li, J. (2022) ‘Comparative Analysis of Some Typical Encryption Algorithms and Hash Algorithms’, Proceedings - 2022 International Conference on Big Data, Information and Computer Network, BDICN 2022, pp. 27–30. doi: 10.1109/BDICN55575.2022.00013.
Makarenko, I. et al. (2020) ‘A Comparative Analysis of Cryptographic Algorithms in the Internet of Things’, 3rd International Science and Technology Conference ‘Modern Network Technologies 2020’, MoNeTeC 2020 - Proceedings. doi: 10.1109/MoNeTeC49726.2020.9258156.
Mandal, S. et al. (2020) ‘Certificateless-Signcryption-Based Three-Factor User Access Control Scheme for IoT Environment’, IEEE Internet of Things Journal, 7(4), pp. 3184–3197. doi: 10.1109/JIOT.2020.2966242.
Mwitende, G. et al. (2020) ‘Certificateless authenticated key agreement for blockchain-based WBANs’, Journal of Systems Architecture, 110, p. 101777. doi: 10.1016/j.sysarc.2020.101777.
Peng, C. et al. (2021) ‘Efficient Certificateless Online/Offline Signature Scheme for Wireless Body Area Networks’, IEEE Internet of Things Journal, 8(18), pp. 14287–14298. doi: 10.1109/JIOT.2021.3068364.
People, D. (no date) ‘Constructing a pairing-free certificateless proxy signature scheme from ECDSA’, pp. 1–33.
Semal, B., Markantonakis, K. and Akram, R. N. (2018) ‘A certificateless group authenticated key agreement protocol for secure communication in untrusted UAV networks’, AIAA/IEEE Digital Avionics Systems Conference - Proceedings, 2018-September, pp. 1–8. doi: 10.1109/DASC.2018.8569730.
Tajammul, M., Parveen, R. and Tayubi, I. A. (2021) ‘Comparative analysis of security algorithms used in cloud computing’, Proceedings of the 2021 8th International Conference on Computing for Sustainable Global Development, INDIACom 2021, pp. 875–880. doi: 10.1109/INDIACom51348.2021.00157.
Take, S. N. and Rokade, P. M. D. (2021) ‘Customized E-Certification Generation using Blockchain Technology for Distributed Framework’, (4), pp. 442–446.
Tan, H., Gui, Z. and Chung, I. (2018) ‘A Secure and Efficient Certificateless Authentication Scheme With Unsupervised Anomaly Detection in VANETs’, IEEE Access, 6(c), pp. 74260–74276. doi: 10.1109/ACCESS.2018.2883426.
Tedeschi, P. et al. (2020) ‘LiKe: Lightweight Certificateless Key Agreement for Secure IoT Communications’, IEEE Internet of Things Journal, 7(1), pp. 621–638. doi: 10.1109/JIOT.2019.2953549.
Thumbur, G. et al. (2021) ‘Efficient and Secure Certificateless Aggregate Signature-Based Authentication Scheme for Vehicular Ad Hoc Networks’, IEEE Internet of Things Journal, 8(3), pp. 1908–1920. doi: 10.1109/JIOT.2020.3019304.
Toradmalle, D., Muthukuru, J. and Sathyanarayana, B. (2019) ‘Certificateless and provably-secure digital signature scheme based on elliptic curve’, International Journal of Electrical and Computer Engineering, 9(4), pp. 3228–3231. doi: 10.11591/ijece.v9i4.ppxx-xx.
Xu, Z. et al. (2020) ‘Efficient Certificateless Aggregate Signature Scheme for Performing Secure Routing in VANETs’, Security and Communication Networks, 2020. doi: 10.1155/2020/5276813.
Yu, H. et al. (2021) ‘Certificateless Signcryption Scheme from Lattice’, IEEE Systems Journal, 15(2), pp. 2687–2695. doi: 10.1109/JSYST.2020.3007519.
Yu, H. and Li, W. (2020) ‘A certificateless signature for multi-source network coding’, Journal of Information Security and Applications, 55(October), p. 102655. doi: 10.1016/j.jisa.2020.102655.
Zhang, P. et al. (2022) ‘An ECC-Based Digital Signature Scheme for Privacy Protection in Wireless Communication Network’, Wireless Communications and Mobile Computing, 2022. doi: 10.1155/2022/1977798.
(People, no date; Ahmad et al., 2011; B and Chen, 2018; Semal, Markantonakis and Akram, 2018; Tan, Gui and Chung, 2018; Toradmalle, Muthukuru and Sathyanarayana, 2019; Gautam, Gaur and Masood, 2019, 2019; Makarenko et al., 2020; Mandal et al., 2020; Mwitende et al., 2020; Chang et al., 2020; Tedeschi et al., 2020; Xu et al., 2020; Yu and Li, 2020; Fidelis and Borjas, 2020; Ibraheem, Hassan and Abead, 2020; Peng et al., 2021; Tajammul, Parveen and Tayubi, 2021; Take and Rokade, 2021; Thumbur et al., 2021; Yu et al., 2021, 2021; Genc and Afacan, 2021; Li, 2022; Zhang et al., 2022; Cui, Wei and He, 2022; Ghani et al., 2022).