DESIGN AND IMPLEMENTATION OF SENSITIVE DROP OUT DATA COLLECTION SYSTEM USING HOMOMORPHIC ENCRYPTION ALGORTIHM
Not all drop out cases are purely caused by student mistakes. To overcome these drop out problems, an in-depth analysis of the cases that occur is needed to be handled properly. Often drop out cases are only associated with problems that are too general. More detailed problems, especially those t...
Saved in:
Main Author: | |
---|---|
Format: | Theses |
Language: | Indonesia |
Online Access: | https://digilib.itb.ac.id/gdl/view/45677 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Institut Teknologi Bandung |
Language: | Indonesia |
Summary: | Not all drop out cases are purely caused by student mistakes. To overcome these drop
out problems, an in-depth analysis of the cases that occur is needed to be handled
properly. Often drop out cases are only associated with problems that are too general.
More detailed problems, especially those that contain sensitive factors that can harm
certain parties, in this context such as the reputation of the institution are usually not
made public. There are many risks associated with making a single repository for
sensitive information like this. Therefore, several methods are needed to guarantee the
security and confidentiality of data, one of which is the use of data encryption.
However, ordinary encryption does not guarantee that data will not be leaked by
certain parties, especially those who are internal.
This research discusses the solution offering in the form of a drop out data collection
system using an encryption algorithm that has homomorphic properties. Data can be
collected under the security factors provided by this encryption algorithm. In addition,
the homomorphic nature of the algorithm allows data to be accumulated without
having to decrypt it first.
According to the test, this system can encrypt the integer data, resulting ciphertext
with size 4 times larger than the plaintext, with average encryption processing time
2549102 nanoseconds, and resulting ciphertext that has different value each other. The
system can perform the calculation using homomorphic property and produce output
that has same result with desired plaintext after decrypted. |
---|