Publication Date: 2022/06/27
Abstract: Lately, progressions in Internet and cloud innovations have prompted a critical expansion in Security issues and urge to learn implementation of better security methodologies. Thus, there is a demand for a platform to learn about intelligent techniques that can protect users from the cyber-attacks. Also, advancements of new technologies led to use of trending authentication techniques. Due to inefficient security techniques and due to less knowledge, there is an gradual increase in the number of victims. Generally, when it comes to learning or demonstration of how a security is provided to a content, it is disclosed or nonunderstandable. Thus, to overcome most of such problems we develop a software or an interface where an individual can systemize divergent type of data and endow different security techniques.
Keywords: Encryption, Decryption, Public Key, Private Key, Key Generation and Exchange ,Hadoop.
DOI: https://doi.org/10.5281/zenodo.6757872
PDF: https://ijirst.demo4.arinfotech.co/assets/upload/files/IJISRT22JUN1068_(1).pdf
REFERENCES