
A Review on Structured Scheme Representation on Data Security Application
Author(s) -
Siti Norussaadah Mohd Salleh,
Roshidi Din,
Nur Haryani Zakaria,
Aida Mustapha
Publication year - 2018
Publication title -
indonesian journal of electrical engineering and computer science
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.241
H-Index - 17
eISSN - 2502-4760
pISSN - 2502-4752
DOI - 10.11591/ijeecs.v11.i2.pp733-739
Subject(s) - scheme (mathematics) , computer science , computer security , data security , secure channel , representation (politics) , the internet , security analysis , computer network , encryption , world wide web , mathematics , political science , law , mathematical analysis , politics
With the rapid development in the era of Internet and networking technology, there is always a requirement to improve the security systems, which secure the transmitted data over an unsecured channel. The needs to increase the level of security in transferring the data always become the critical issue. Therefore, data security is a significant area in covering the issue of security, which refers to protect the data from unwanted forces and prevent unauthorized access to a communication. This paper presents a review of structured-scheme representation for data security application. There are five structured-scheme types, which can be represented as dual-scheme, triple-scheme, quad-scheme, octal-scheme and hexa-scheme. These structured-scheme types are designed to improve and strengthen the security of data on the application.