DOI QR코드

DOI QR Code

Personal Data Security in Recruitment Platforms

  • Bajoudah, Alya'a (Department of Computer Science, College of Computer and Information Systems, Umm Al-Qura University) ;
  • AlSuwat, Hatim (Department of Computer Science, College of Computer and Information Systems, Umm Al-Qura University)
  • Received : 2022.06.05
  • Published : 2022.06.30

Abstract

Job offers have become more widespread and it has become easier and faster to apply for jobs through electronic recruitment platforms. In order to increase the protection of the data that is attached to the recruitment platforms. In this research, a proposed model was created through the use of hybrid encryption, which is used through the following algorithms: AES,Twofish,. This proposed model proved the effectiveness of using hybrid encryption in protecting personal data.

Keywords

References

  1. Pin, J., Laroden, M., & Saenz-Diez, I. (2001). Internet recruiting power: opportunities and effectiveness. Paper, Barcelona-Spain.
  2. Pritilata, Mahmood M.A. (2022) Strengthening Data Security Using Multi-level Cryptography Algorithm. In: Gandhi T.K., Konar D., Sen B., Sharma K. (eds) Advanced Computational Paradigms and Hybrid Intelligent Computing. Advances in Intelligent Systems and Computing, vol 1373. Springer, Singapore. https://doi.org/10.1007/978-981-16-4369-9_31
  3. Dayalan, M. (2019). Cryptography in Computer Security. Journal Of Emerging Technologies And Innovative Research, 6(5). Retrieved 11 March 2022, from http://www.jetir.org.
  4. Abood, O., & Guirguis, S. (2018). A Survey on Cryptography Algorithms. International Journal Of Scientific And Research Publications (IJSRP), 8(7). https://doi.org/10.29322/ijsrp.8.7.2018.p7978
  5. Sankaran P., S., & V B, K. (2019). Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm. International Journal Of Electrical And Computer Engineering (IJECE), 9(4), 2578. https://doi.org/10.11591/ijece.v9i4.pp2578-2584
  6. Maqsood, F., Ahmed, M., Mumtaz, M., & Ali, M. (2017). Cryptography: A Comparative Analysis for Modern Techniques. International Journal Of Advanced Computer Science And Applications, 8(6). https://doi.org/10.14569/ijacsa.2017.080659
  7. Deshmukh, S., & Patil, P. (2014). Hybrid cryptography technique using modified Diffie-Hellman and RSA. (IJCSIT) International Journal Of Computer Science And Information Technologies, 5(0975-9646). Retrieved 11 March 2022, from http://www.ijcsit.com.
  8. Mandeep Kaur, N. (2016). Enhanced Security using Hybrid Encryption Algorithm. International Journal Of Innovative Research In Computer And Communication Engineering, 4(7), 13001-13007. https://doi.org/10.15680/ijircce.2016.0407001
  9. Santoso, K., Muin, M., & Mahmudi, M. (2020). Implementation of AES cryptography and twofish hybrid algorithms for cloud. Journal Of Physics: Conference Series, 1517(1), 012099. https://doi.org/10.1088/1742-6596/1517/1/012099
  10. Sajay, K., Babu, S., & Vijayalakshmi, Y. (2019). Enhancing the security of cloud data using hybrid encryption algorithm. Journal Of Ambient Intelligence And Humanized Computing. https://doi.org/10.1007/s12652-019-01403-1
  11. G. Chaloop, S., & Z. Abdullah, M. (2021). ENHANCING HYBRID SECURITY APPROACH USING AES AND RSA ALGORITHMS. Journal Of Engineering And Sustainable Development, 25(4), 58-66. https://doi.org/10.31272/jeasd.25.4.6
  12. Et. al., P. (2021). Performance Analysis of Cascaded Hybrid Symmetric Encryption Models. Turkish Journal Of Computer And Mathematics Education (TURCOMAT), 12(2), 1699-1708. https://doi.org/10.17762/turcomat.v12i2.1506
  13. Kaur, M., & Kaur, J. (2017). Data Encryption Using Different Techniques: A Review. International Journal Of Advanced Research In Computer Science, 8(0976-5697). Retrieved 1 April 2022, from http://Available Online at http://www.ijarcs.info/
  14. Patila, P., Narayankarb, P., D G, N., & S M, M. (2015). A Comprehensive Evaluation of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish. In International Conference on Information Security & Privacy (ICISP2015), 11-12 December 2015, Nagpur, INDIA. http://www.sciencedirect.com Retrieved 1 April 2022, from.
  15. Joseph, D., & Krishna, M. (2015). Cognitive Analytics and Comparison of Symmetric and Asymmetric Cryptography Algorithms. International Journal Of Advanced Research In Computer Science, 6(0976-5697). Retrieved 1 April 2022, from http://www.ijarcs.info
  16. Harahsheh, H., & Qatawneh, M. (2018). Performance Evaluation of Twofish Algorithm on IMAN1 Supercomputer. International Journal Of Computer Applications, 179(50), 1-7. https://doi.org/10.5120/ijca2018916654
  17. Comparative Analysis of AES, Blowfish, Twofish and Threefish Encryption Algorithms. (2017), 10. Retrieved 1 April 2022, from.
  18. Karuppiah, S., & Gurunathan, G. (2020). Secured storage and disease prediction of E-health data in cloud. Journal Of Ambient Intelligence And Humanized Computing, 12(6), 6295-6306. https://doi.org/10.1007/s12652-020-02205-6
  19. Gehlot, P., R. Biradar, S., & P. Singh, B. (2013). Implementation of Modified Twofish Algorithm using 128 and 192-bit keys on VHDL. International Journal Of Computer Applications, 70(13), 36-42. https://doi.org/10.5120/12024-8087
  20. Singh, G., & Supriya, S. (2013). A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security. International Journal Of Computer Applications, 67(19), 33-38. https://doi.org/10.5120/11507-7224
  21. Radhika, N. (2018). The Secure Data Transmission in Cloud Computing By Using Encryption Techniques AES and RSA. International Research Journal Of Innovations In Engineering And Technology (IRJIET), 2(2581-3048). Retrieved 5 April 2022, from http://www.irjiet.com.
  22. R. Pancholi, V., & P. Patel, D. (2016). Enhancement of Cloud Computing Security with Secure Data Storage using AES. IJIRST -International Journal For Innovative Research In Science & Technology, 2(09). Retrieved 8 April 2022, from http://www.ijirst.org.
  23. Agrawal, A., & Patankar, G. (2016). Design of Hybrid Cryptography Algorithm for Secure Communication. International Research Journal Of Engineering And Technology (IRJET), 03(01). Retrieved 2 April 2022, from http://www.irjet.net.
  24. Harba, E. (2017). Secure Data Encryption Through a Combination of AES, RSA and HMAC. Engineering, Technology &Amp; Applied Science Research, 7(4), 1781-1785. https://doi.org/10.48084/etasr.1272
  25. Arora, H., & Jain, J. (2019). Comparison among RSA, AES and DES. International Research Journal Of Engineering And Technology (IRJET), 06(4). Retrieved 25 April 2022, from http://www.irjet.net.
  26. Verma, R., & Sharma, A. (2020). Cryptography: Avalanche effect of AES and RSA. International Journal Of Scientific And Research Publications (IJSRP), 10(4), p10013. https://doi.org/10.29322/ijsrp.10.04.2020.p10013
  27. Ghosh, A. (2020). Comparison of Encryption Algorithms: AES, Blowfish and Twofish for Security of Wireless Networks, 07(06). Retrieved 25 April 2022, from http://www.irjet.net.
  28. Ristiana, M. G. (2018). Hybrid algorithm of RSA and one time pad cryptography. ICCGANT.
  29. Jain, M., & Agrawa, A. (2014). Implementation-Of-Hybrid-Cryptography-Algorithm. International Journal Of Core Engineering & Management(IJCEM), 01(3). Retrieved 25 April 2022, from.
  30. Verma, R., & Sharma, A. (2020). Cryptography: A Comparative Analysis of AES and RSA Algorithms. Mukt Shabd Journal, IX(2347-3150). Retrieved 24 April 2022, from.