Data Encryption and Policies Via Digital Transformationsand Services

Authors

  • Sravanthi Mallireddy Software Developer Author

DOI:

https://doi.org/10.15662/62ap6m27

Keywords:

Data Security, Data Encryption, Digital Transfor mation and artificial intelligence (AI)

Abstract

In an era marked by fast digital transformation, data encryption and the development of strong regulations to protect sensitive information have never been more important. This article investigates the complex interaction between data encryption, digital transformation, and the changing regulatory environment that oversees these processes. It emphasizes the critical significance of encryption in safeguarding personal data from unwanted access and cyber threats while also simplifying compliance with demanding standards such as GDPR and HIPAA. The article delves deeper into the issues of digital transformation, such as increased vulnerabilities and data management complexity, and underlines the importance of enterprises implementing complete encryption policies. It also examines upcoming technologies, specifically artificial intelligence (AI) and cloud-based solutions, which are changing dataencryption tactics. By addressing these components, this study hopes to shed light on how businesses can effectively traverse the difficulties of data security in a digitally transformed environment, assuring both protection and trust in their operations.

References

1. Simon, J.; Omar, A. Cybersecurity investments in the supply chain: Coordination and a strategic attacker. Eur. J. Oper. Res.2020,282, 161–171. [CrossRef]

2. Uddin, M.H.; Ali, M.H.; Hassan, M.K. Cybersecurityhazards and financial system vulnerability: A synthesis of literature. Risk Manag. 2020, 22, 239–

3. 309. [CrossRef]

4. Möller, D. Cybersecurity in Digital Transformation: Scope and Applications; Springer: Berlin/Heidelberg,Germany, 2020.

5. Matt, C.; Hess, T.; Benlian, A. Digital transformationstrategies. Bus. Inf. Syst. Eng. 2015, 57, 339–

343. [CrossRef]

6. Sam Goundar Introduction - Impact of Digital Transformation on Security Policies and Standards,March 2020

7. Hemerling, J., Kilmann, J., Danoesastro, M., Stutts, L., & Ahern, C. (2018). It's not a digital transformation without a digital culture. Boston Consulting Group.

8. T. Borangiu, D. Trentesaux, A. Thomas, P. Leitão and J. Barata, "Digital transformation of manufacturing through cloud services and resource virtualization", Comput. Ind., vol. 108, pp. 150- 162, Jun. 2019

9. M. Ciavotta, M. Alge, S. Menato, D. Rovere and P. Pedrazzoli, "A microservice-based middleware for the digital factory", Procedia Manuf., vol. 11, pp. 931-938, Jan. 2017..

10. Thales Group - Securing Your Digital Transformationhttps://cpl.thalesgroup.com/data- protection/digital-transformation

11. Thales Group - Data Protection in the Digital TransformationErahttps://cpl.thalesgroup.com/blog

/encryption/data-protection-digital- transformation- era

12. Valentin Mulder ,"Trends in Data Protection and Encryption Technologies" edited,.An open-access book that discusses the latest trends in encryption technologies, providing insights from experts across academia and industry .

13. H. Pham, J. Woodworth and M. A. Salehi, "Survey on secure search over encrypted data on the cloud", Concurrency Comput. Pract. Exper., vol.31, pp. 1-15, Apr. 2019.

14. Bagherzandi.A, B. Hore and S. Mehrotra, Search over Encrypted Data, Boston, MA, USA:Springer, pp. 1088-1093, 2011. [Google Scholar]

15. S. Wang, D. Zhao and Y. Zhang, "Searchable attribute-based encryption scheme with attribute revocation in cloud storage", PLoS ONE, vol. 12, no. 8, pp. 1-20, Aug. 2017. [CrossRef] [Google Scholar]

16. Pavlova, E. Enhancing the organisational culture related to cyber security during the university digital transformation. Inf. Secur. 2020, 46, 239–249. [Google Scholar] [CrossRef]

Downloads

Published

2021-10-13

How to Cite

Data Encryption and Policies Via Digital Transformationsand Services. (2021). International Journal of Research and Applied Innovations, 4(5), 1-6. https://doi.org/10.15662/62ap6m27