ENHANCING DATA PRIVACY IN GOVERNMENT ORGANIZATIONS: A COMPARATIVE ANALYSIS AND IMPLEMENTATION OF OPTIMAL CERTIFICATELESS SCHEMES

Privacy, non-repudiation, authenticity, encryption, comparative implementation, confidentiality.

Authors

  • Gabriel Kofi Armah Business Computing Department, School of Computing and Information Sciences, C. K. Tedam University of Technology and Applied Sciences, Navrongo, Ghana
  • Hayford Ntiamoah Ofosu Computer Science Department, College of Science, Kwame Nkrumah University of Science and Technology, Kumasi, Ghana
  • Valentine Aveyom Department of Computer Science, School of Computing and Information Sciences, C. K. Tedam University of Technology and Applied Sciences, Navrongo, Ghana
August 30, 2023
August 31, 2023

Downloads

The rapid expansion in Technology has transformed our everyday objects into interconnected entities, globally changing connectivity through the Internet and reshaping human interactions with their surroundings. This paradigm shift has occasioned the need for various networked infrastructures to facilitate and improve innovative services as well as enhance the flexibility and efficiency in this human- environment interactivity. However, this digitalization drive has also brought forth a range of security concerns that cannot be neglected.

This paper emphasizes on the role of certificateless systems in addressing security challenges posed by the digital realm on government organizations based on four fundamental security measures. These measures include confidentiality, integrity, authentication, and non-repudiation. The paper aimed at safeguarding data from unauthorized access, ensuring data integrity during transit, validating user identity and providing data integrity.

To enhance these security aspects, the study advocates the adoption of certificateless encryption techniques to uphold data confidentiality and employs digital signature techniques to guarantee integrity, accuracy, and non-repudiation. And the assurance that the sender of information is provided with proof of delivery and the recipient is provided with proof of the sender's identity. The study’s main achievement a comparative analysis of four certificateless schemes to ensure data privacy from malicious attacks, Implementation of the best scheme using an elliptic curve digital signature and data-at-rest encryption. This ensured secure data privacy in transit and at retention to enhance confidentiality, integrity, and authenticity.