TY - JOUR
T1 - Unintended Data Behaviour Analysis Using Cryptography Stealth Approach Against Security and Communication Network
AU - Alauthman, Mohammad
AU - Aljuaid, Hanan
AU - Sathyaprakash, P.
AU - Aldweesh, Amjad
AU - Anand, M.
AU - Rasheed, Tariq
AU - Jumani, Awais Khan
N1 - Publisher Copyright:
© 2023, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.
PY - 2023
Y1 - 2023
N2 - Data security is based on the collection of data and storage without hacking from a third person has been proposed. While transmitting the data, the attack of the data from the mobile transaction has happened, which must be managed using the data transaction. The management process and the system's formation to produce data safety are presented. The data attack must be found, and then the data hacking should be avoided using some techniques. The data receiving and storing have to be calculated using the data's formation for the data's encryption. Smartphone-based payment system, root cause method, cryptographic and stealth method. By using the intelligent phone-based payment system method, the process of managing the security related to the money transfer has been enabled. Then the process of managing the data to the elaboration of the system and then the process of maintaining the formulation of the system to produce the encouragement of the data has been proposed. The cryptographic method makes the original text into the encrypted text. This encryption of the text has securely happened for data management. For most data sent in the network, 40% is duplicate, 30 is original data, 20% is redundancy data, and only 10% is the clear and the original text for the data transaction. This is how the data is sent and received securely, and the security of the data has been raised for the person who transfers the data.
AB - Data security is based on the collection of data and storage without hacking from a third person has been proposed. While transmitting the data, the attack of the data from the mobile transaction has happened, which must be managed using the data transaction. The management process and the system's formation to produce data safety are presented. The data attack must be found, and then the data hacking should be avoided using some techniques. The data receiving and storing have to be calculated using the data's formation for the data's encryption. Smartphone-based payment system, root cause method, cryptographic and stealth method. By using the intelligent phone-based payment system method, the process of managing the security related to the money transfer has been enabled. Then the process of managing the data to the elaboration of the system and then the process of maintaining the formulation of the system to produce the encouragement of the data has been proposed. The cryptographic method makes the original text into the encrypted text. This encryption of the text has securely happened for data management. For most data sent in the network, 40% is duplicate, 30 is original data, 20% is redundancy data, and only 10% is the clear and the original text for the data transaction. This is how the data is sent and received securely, and the security of the data has been raised for the person who transfers the data.
KW - Cryptographic Stealth Method
KW - Data Analysis
KW - Data Authentication
KW - Data Saving
KW - Root Cause Method
KW - Smartphone-Based Payment System
UR - https://www.scopus.com/pages/publications/85168474758
U2 - 10.1007/s11036-023-02217-4
DO - 10.1007/s11036-023-02217-4
M3 - Article
AN - SCOPUS:85168474758
SN - 1383-469X
JO - Mobile Networks and Applications
JF - Mobile Networks and Applications
ER -