Browse > Article
http://dx.doi.org/10.22937/IJCSNS.2022.22.6.40

Personal Data Security in Recruitment Platforms  

Bajoudah, Alya'a (Department of Computer Science, College of Computer and Information Systems, Umm Al-Qura University)
AlSuwat, Hatim (Department of Computer Science, College of Computer and Information Systems, Umm Al-Qura University)
Publication Information
International Journal of Computer Science & Network Security / v.22, no.6, 2022 , pp. 310-318 More about this Journal
Abstract
Job offers have become more widespread and it has become easier and faster to apply for jobs through electronic recruitment platforms. In order to increase the protection of the data that is attached to the recruitment platforms. In this research, a proposed model was created through the use of hybrid encryption, which is used through the following algorithms: AES,Twofish,. This proposed model proved the effectiveness of using hybrid encryption in protecting personal data.
Keywords
Personal data; Hybrid cryptography; AES; Twofish; RSA;
Citations & Related Records
Times Cited By KSCI : 5  (Citation Analysis)
연도 인용수 순위
1 Pritilata, Mahmood M.A. (2022) Strengthening Data Security Using Multi-level Cryptography Algorithm. In: Gandhi T.K., Konar D., Sen B., Sharma K. (eds) Advanced Computational Paradigms and Hybrid Intelligent Computing. Advances in Intelligent Systems and Computing, vol 1373. Springer, Singapore. https://doi.org/10.1007/978-981-16-4369-9_31   DOI
2 Maqsood, F., Ahmed, M., Mumtaz, M., & Ali, M. (2017). Cryptography: A Comparative Analysis for Modern Techniques. International Journal Of Advanced Computer Science And Applications, 8(6). https://doi.org/10.14569/ijacsa.2017.080659   DOI
3 Deshmukh, S., & Patil, P. (2014). Hybrid cryptography technique using modified Diffie-Hellman and RSA. (IJCSIT) International Journal Of Computer Science And Information Technologies, 5(0975-9646). Retrieved 11 March 2022, from http://www.ijcsit.com.
4 Mandeep Kaur, N. (2016). Enhanced Security using Hybrid Encryption Algorithm. International Journal Of Innovative Research In Computer And Communication Engineering, 4(7), 13001-13007. https://doi.org/10.15680/ijircce.2016.0407001   DOI
5 Kaur, M., & Kaur, J. (2017). Data Encryption Using Different Techniques: A Review. International Journal Of Advanced Research In Computer Science, 8(0976-5697). Retrieved 1 April 2022, from http://Available Online at http://www.ijarcs.info/
6 Santoso, K., Muin, M., & Mahmudi, M. (2020). Implementation of AES cryptography and twofish hybrid algorithms for cloud. Journal Of Physics: Conference Series, 1517(1), 012099. https://doi.org/10.1088/1742-6596/1517/1/012099   DOI
7 G. Chaloop, S., & Z. Abdullah, M. (2021). ENHANCING HYBRID SECURITY APPROACH USING AES AND RSA ALGORITHMS. Journal Of Engineering And Sustainable Development, 25(4), 58-66. https://doi.org/10.31272/jeasd.25.4.6   DOI
8 Et. al., P. (2021). Performance Analysis of Cascaded Hybrid Symmetric Encryption Models. Turkish Journal Of Computer And Mathematics Education (TURCOMAT), 12(2), 1699-1708. https://doi.org/10.17762/turcomat.v12i2.1506   DOI
9 Sankaran P., S., & V B, K. (2019). Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm. International Journal Of Electrical And Computer Engineering (IJECE), 9(4), 2578. https://doi.org/10.11591/ijece.v9i4.pp2578-2584   DOI
10 Radhika, N. (2018). The Secure Data Transmission in Cloud Computing By Using Encryption Techniques AES and RSA. International Research Journal Of Innovations In Engineering And Technology (IRJIET), 2(2581-3048). Retrieved 5 April 2022, from http://www.irjiet.com.
11 Arora, H., & Jain, J. (2019). Comparison among RSA, AES and DES. International Research Journal Of Engineering And Technology (IRJET), 06(4). Retrieved 25 April 2022, from http://www.irjet.net.
12 Ristiana, M. G. (2018). Hybrid algorithm of RSA and one time pad cryptography. ICCGANT.
13 Singh, G., & Supriya, S. (2013). A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security. International Journal Of Computer Applications, 67(19), 33-38. https://doi.org/10.5120/11507-7224   DOI
14 Patila, P., Narayankarb, P., D G, N., & S M, M. (2015). A Comprehensive Evaluation of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish. In International Conference on Information Security & Privacy (ICISP2015), 11-12 December 2015, Nagpur, INDIA. http://www.sciencedirect.com Retrieved 1 April 2022, from.
15 Jain, M., & Agrawa, A. (2014). Implementation-Of-Hybrid-Cryptography-Algorithm. International Journal Of Core Engineering & Management(IJCEM), 01(3). Retrieved 25 April 2022, from.
16 Joseph, D., & Krishna, M. (2015). Cognitive Analytics and Comparison of Symmetric and Asymmetric Cryptography Algorithms. International Journal Of Advanced Research In Computer Science, 6(0976-5697). Retrieved 1 April 2022, from http://www.ijarcs.info
17 Harahsheh, H., & Qatawneh, M. (2018). Performance Evaluation of Twofish Algorithm on IMAN1 Supercomputer. International Journal Of Computer Applications, 179(50), 1-7. https://doi.org/10.5120/ijca2018916654   DOI
18 Comparative Analysis of AES, Blowfish, Twofish and Threefish Encryption Algorithms. (2017), 10. Retrieved 1 April 2022, from.
19 Karuppiah, S., & Gurunathan, G. (2020). Secured storage and disease prediction of E-health data in cloud. Journal Of Ambient Intelligence And Humanized Computing, 12(6), 6295-6306. https://doi.org/10.1007/s12652-020-02205-6   DOI
20 Gehlot, P., R. Biradar, S., & P. Singh, B. (2013). Implementation of Modified Twofish Algorithm using 128 and 192-bit keys on VHDL. International Journal Of Computer Applications, 70(13), 36-42. https://doi.org/10.5120/12024-8087   DOI
21 Verma, R., & Sharma, A. (2020). Cryptography: A Comparative Analysis of AES and RSA Algorithms. Mukt Shabd Journal, IX(2347-3150). Retrieved 24 April 2022, from.
22 Sajay, K., Babu, S., & Vijayalakshmi, Y. (2019). Enhancing the security of cloud data using hybrid encryption algorithm. Journal Of Ambient Intelligence And Humanized Computing. https://doi.org/10.1007/s12652-019-01403-1   DOI
23 R. Pancholi, V., & P. Patel, D. (2016). Enhancement of Cloud Computing Security with Secure Data Storage using AES. IJIRST -International Journal For Innovative Research In Science & Technology, 2(09). Retrieved 8 April 2022, from http://www.ijirst.org.
24 Agrawal, A., & Patankar, G. (2016). Design of Hybrid Cryptography Algorithm for Secure Communication. International Research Journal Of Engineering And Technology (IRJET), 03(01). Retrieved 2 April 2022, from http://www.irjet.net.
25 Harba, E. (2017). Secure Data Encryption Through a Combination of AES, RSA and HMAC. Engineering, Technology &Amp; Applied Science Research, 7(4), 1781-1785. https://doi.org/10.48084/etasr.1272   DOI
26 Ghosh, A. (2020). Comparison of Encryption Algorithms: AES, Blowfish and Twofish for Security of Wireless Networks, 07(06). Retrieved 25 April 2022, from http://www.irjet.net.
27 Pin, J., Laroden, M., & Saenz-Diez, I. (2001). Internet recruiting power: opportunities and effectiveness. Paper, Barcelona-Spain.
28 Dayalan, M. (2019). Cryptography in Computer Security. Journal Of Emerging Technologies And Innovative Research, 6(5). Retrieved 11 March 2022, from http://www.jetir.org.
29 Abood, O., & Guirguis, S. (2018). A Survey on Cryptography Algorithms. International Journal Of Scientific And Research Publications (IJSRP), 8(7). https://doi.org/10.29322/ijsrp.8.7.2018.p7978   DOI
30 Verma, R., & Sharma, A. (2020). Cryptography: Avalanche effect of AES and RSA. International Journal Of Scientific And Research Publications (IJSRP), 10(4), p10013. https://doi.org/10.29322/ijsrp.10.04.2020.p10013   DOI