In this paper, the discussion is focused on the augmented reality glass. Augmented reality glasses are a glass that can encrypt the data. This method helps in decrypting the urgent and encrypted messages without the need of encryption key. The method is described in the paper, that how this glasses works. The method searches for a tag and once the tag is found on any encrypted document or data , they transmit this tag to an application sever requesting for the decryption of this document . A temporary key is being provided for decrypting a certain part of the encrypted data. This is a concern for the people who encrypts the method , but also to some extent it is advantageous when they looses the decrypting key . The article describes the features of augmented reality glasses and the uses of this glasses in brief.
This paper aims at discussing the virtual reality and discusses all the facts related to this. Data encryption method tells about encrypting the data through different methods. The Virtual Reality (VR) situation is a position that defines a project in the VR technology , the factors that are described includes about the project , role in different fields and many more. The article further describes the mechanism that is involved with VR device. The survey that is done for analyzing the literature is based on the articles, examination are done on various companies for projects and the interested areas for this companies are being sorted. The literature survey observed and discussed in the paper, tells about the virtual reality that enables technologies that had facilitate the humans with different virtual devices in order to improve the interaction with digital world. IN fast researches are implemented in order to create a relationship between virtual and real applications. This has benefited humans in many ways , there are huge areas where the VR application is being used , for example : healthcare, tourism , military, entertainment and defense and many more.
The article examines the various ways of data encryption algorithms. Data encryption is a process of encrypting data by using mathematical procedure. With the help of this algorithms , data can be transferred to text that can’t be read by common people and this data can be decrypted with the use of a certain key. The article describes the encryption method. Cipher is used for encrypting data. According to the author, data encryption contains a block of cipher. This contains a cryptographic key that helps in encrypting the data. With this algorithms are being used on a block of data concurrently and not one bit at a particular instance of time. The algorithms that are best for data encryption methods are , RSA , AES, Twofish and 3DES. AES stands for Advanced Encryption Standard is the most secure algorithm to perform encryption 3DES is a Triple data Encryption Standard , is used in recent days and contains a block of cipher. RSA is an algorithm that is being encrypted with the help of public key , this is also known as public key encryption and through internet , the standard for encrypting a data is being sent
The paper discusses about the ethical issues that may arises with the use of AR glasses. The technology has developed rapidly , with the developing AR application , the concern towards the safety , security and privacy of the users. AR glasses helps in decrypting data but to some extent this is not ethically correct . Because the messages that are encrypted has some reason , that’s why they are encrypted . The encryptions will not like someone else decrypting their messages without the concern of this. Several laws and regulation help to restrict the use of augmented reality glasses. This situation becomes sometimes little weird , as with the help of augmented reality glass one can have for a particular video or audio without the concern of the users. This becomes sometimes unethical, as peeking into someone’s privacy is not an ethical behavior. The privacy needs to be maintained while using augmented reality glasses and should be used only for useful purposes. The paper discusses in detail the issues faced by the use of augmented reality glasses and the laws associated with this.
Data encryption standard was established by a team of IBM around 1974 and being implemented and applied internationally by the end of 1977. This contains a symmetric key or a public key that used for encrypting the necessary data. This is an implementation of Feistel cipher. This uses around 16 structure of Feistel. The block size of this is 64 bit. Though this size there is an effective length of 56 , bits as the 8 bits of the 64 bits mentioned are not used in the encryption algorithm. There are basically two properties of block cipher and both are being satisfied by data encryption standard. The two properties are : avalanche effect , this means that even smallest change in the normal text can cause a huge change in cipher text. Second one is completeness , every text of the cipher depends completely on the bits of plain text.
The paper aims at discussing the data encryption using RSA algorithm. The major problem and the issue faced while sharing resources on data communication network is to maintain the confidentiality and security. This is being determined that with establishing connectivity between the computers that are going to share data, the security purpose arises and the system and data gets more vulnerable towards the threat. This paper describes a process of encrypting and decrypting data on a network suing RSA algorithm with a certain size of the block. The RSA algorithm , generates a public key to encrypt the data on the sender end , for decrypting this encrypted data the receiver should have a private key. Thus this ensures the security and privacy of the data m, as this privacy key is only being assigned to the receiver an no one else can get access to this private key. If anyone tries to decrypt the encrypted message with a wrong private key , then it will decrypt the message but different it will be different from original message. Thus from this article , it can be said that cryptography plays a major role in protecting the data. This allows to continue business and sending messages and information without any tension of getting breached.
This paper describes about the Mixed reality (MR) technology. The development-involved n the mixed reality technology is gaining a huge popularity with the advancement of computer, realistic display technologies and sensor fusion. There are several researches that focuses on delivering Mixed reality technology with full privacy and security , but few are focused and concerned about the security provided. This is basically a survey paper that tells about the risk assessed while using MR technology and the privacy offered by MR technology. The main aim is to , list and review special security approaches that can help to maintain the data security and the privacy within the MR technology. The scope is being extended , so that it can include technologies that are related to data encryption such as augmented reality (AR), virtual reality (VR), and human-computer interaction (HCI) . This are the major components . Th paper investigates and highlights the implementation and the way data in being protected in MR technology. In addition to this , the expected challenges and guidelines on MR security and confidentiality are discussed
In this article author discuses about the reversible data hiding used in encrypted images. Reversible data hiding helps in recovering the data that gets lost after being embedded. This provided recovering data in a excellent manner and protects the data and the images in the content while maintaining the confidentiality. Earlier the method used for reversing the embedded data contained many errors and also had problems regarding image restoration. This paper proposes a unique way of reversing data before getting encrypted by a traditional method. and this makes easy to reverse the data hidden in the encrypted images. The method proposed helps in achieving real way of reversing the data, the data encryption and image recovery is free from errors.
This paper describes the use of digital signature in encrypting data. Cloud computing is very much useful for people nowadays and gets a large importance in today’s world. The facility provided by cloud computing is it allows and gives a huge place for data storing and gives the access to use whenever needed. AS the cloud computing involves working on internet , the security issues becomes major concern for people , this includes data safety , maintaining the confidentiality , authentication of data and privacy. In order to maintain the security of data encryption several algorithms are being used. In this paper, the proposed method is to use the digital signature and Diffie Hellman key exchange blended with (AES) Advanced Encryption Standard for protecting the confidentiality of data stored within the cloud server. Even the key during transmission gets hacked, as the private key is being only assigned to the official user no one can get access to it. This paper also proposes a three-way architecture, this enables high security and no one can hack the database and the data are being stored safely in the data cloud.
The article aims at discussing about data encryption and the method of encrypting a data with the use of algorithm. Encryption is a method of making a message encrypted , so that it can be read by the only one ,for whom the message is meant to. Encryption helps in providing complete safety for the information transferred over the internet, and keeps the information secret. This becomes very much necessary to maintain the security of the information stored in the database of the computers , as this becomes very much necessary to maintain the safety. On a daily basis there are thousands of data that are crucial for people and some organization have the threat of getting snooped or tampered by someone else. For this encryption is very much necessary, as this helps to maintain the confidentiality of the text.
With the growing technology and fast development, exchange of digital data is done mostly through electronic way that is with the help of the internet or over internet, thus this makes the data more vulnerable to such threats. Thus making the information security major concern. Information Confidentiality plays a major role in maintaining the ethics and laws for every organization. With the growth of human intelligence, cryptography became necessary and also became more complex in order to make data secure. This paper had surveyed various methods for encrypting data and the algorithms used for encryption.
In this article, the author discusses about the principles related to cryptography and network security. The seventh edition analyzes the important and evolving features of cryptography and network security. The fields that are needed to be kept in mind while dealing with this two. As with the rowing technology, the threat is also increasing day by day and the chances of information being hacked is also increasing. Thus, the need of protecting the data becomes very much necessary. The aim of this article is to provide a realistic study of both the values and to apply for network security and cryptography. The first part of the article, discusses about the vital issues that are required to be encountered by a network security and cryptography. The second part of the article discusses about the practical implications of network security that have been implemented.
In this article , the author discusses about the cryptographic primitive is known as proofs of ownership (PoW) , in order to improve the safety of the data stored in the cloud storage from client- side. When a data gets duplicated in the cloud storage, it creates difficulty for the user to search a data , while searching for the encrypted data in the cloud storage. This article describes the problems that are likely to arise by the cloud with deduplication from client side. This are, marinating privacy for data against outside adversaries , data privacy against inside adversaries, divide and conquer attack and poison attack. This attacks are being briefly discussed in the article and the possible ways of overcoming the problem.
The report is an annotated bibliography on the data encryption method in emerging technology. The report contains 12 annotated bibliography, and each one is described below. The file from the turnitin report is being uploaded with addition to this file. The solution provided is authenticated and the plagiarism is detected 21%, the detected plagiarism is in the reference list. The references made in the annotated bibliography part have plagiarism. The report contains some technical terms that are detected in plagiarism report, and these terms cannot be changed as the change in these terms will completely change the meaning of the lines. This report is prepared uniquely without any type of errors.
References
Andy greenbug (2015), “Augmented reality glasses could visually encrypt secrets”, [online] Available at: https://www.wired.com/2015/08/augmented-reality-glasses-visuallyencrypt-secrets/
Ayush Sharma, Piyush Bajpai, Sukhdev Singh and Kiran Khatter, “Virtual Reality: Blessings and Risk Assessment”, [online] Available at: https://arxiv.org/ftp/arxiv/papers/1708/1708.09540.pdf
Bhanot, R., & Hans, R. (2015). A review and comparative analysis of various encryption algorithms. International Journal of Security and Its Applications, 9(4), 289-306.
Brian D Wassom (2016),”Augmented Reality Law, Privacy and Ethics”, [online] Available at: https://searchsecurity.techtarget.com/feature/Augmented-Reality-Law-Privacy-and-Ethics
Coppersmith, D. (2014). The Data Encryption Standard (DES) and its strength against attacks. IBM journal of research and development, 38(3), 243-250.
Goshwe, N. Y. (2013). Data encryption and decryption using RSA Algorithm in a Network Environment. International Journal of Computer Science and Network Security (IJCSNS), 13(7), 9.
Jaybie A. De Guzman, Csiro Kanchana Thilakarathna, Csiro Aruna Seneviratne (2018), “Security and Privacy Approaches in Mixed Reality: A Literature Survey”, [online]. Available at: https://arxiv.org/pdf/1802.05797.pdf [Accessed August 11, 2018]
Ma, K., Zhang, W., Zhao, X., Yu, N., & Li, F. (2013). Reversible data hiding in encrypted images by reserving room before encryption. IEEE Transactions on information forensics and security, 8(3), 553-562.
Rewagad, P., & Pawar, Y. (2013, April). Use of digital signature with diffie hellman key exchange and AES encryption algorithm to enhance data security in cloud computing. In Communication Systems and Network Technologies (CSNT), 2013 International Conference on (pp. 437-439). IEEE.
Singh, G. (2013). A study of encryption algorithms (RSA, DES, 3DES and AES) for information security. International Journal of Computer Applications, 67(19).
Stallings, W. (2017). Cryptography and network security: principles and practice (p. 743). Upper Saddle River, NJ: Pearson.
Xu, J., Chang, E. C., & Zhou, J. (2013, May). Weak leakage-resilient client-side deduplication of encrypted data in cloud storage. In Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security (pp. 195-206). ACM.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download