692020 Originality Reporthttpsucumberlandsblackboardcomwebapps ✓ Solved

6/9/2020 Originality Report 1/5 %64 %6 %2 SafeAssign Originality Report Summer 2020 - Cryptography (ISOL-535-50)(ISOL-535-51) - COMBINE… • Week5: Individual Project %72Total Score: High riskBhanu Teja Posani Submission UUID: 9945a555-5e7c-85c9-8ba Total Number of Reports 1 Highest Match 72 % Individual Project PKI.docx Average Match 72 % Submitted on 06/06/20 09:01 PM CDT Average Word Count 794 Highest: Individual Project PKI.docx %72Attachment 1 Institutional database (3) Student paper Student paper Student paper Internet (4) jihuomm jihuomm wikipedia bobylive Global database (1) Student paper Top sources (3) Excluded sources (0) View Originality Report - Old Design Word Count: 794 Individual Project PKI.docx Student paper 6 Student paper 5 jihuomm 6/9/2020 Originality Report 2/5 Source Matches (17) PUBLIC KEY INFRASTRUCTURE 3 Cryptography Bhanu Teja Posani University of the Cumberlands Date: The most significant feature of PKI is that it uses keys to deal with security services.

There is both the public and private keys, whereby the public key is in an open field (Alrawais et al. 2018). PKI comprises several components, such as the digital certificate, which is an ID used a person. A digital certificate is applied over the internet by a person of an organization to help in securing transit data (Alrawais et al. 2018).

It’s also known as identify a certificate or a PK certificate. The second component is the CA or certifying authority. CA's main purpose is to issue clients with a certificate and help others in verifying the certificate. The CA is handy because it ensures the client asking for a certificate is correctly identified before the certificate is issued. The third component is RA or registration authority, which is used in performing checks that are necessary for a person-organization that may be asking for the certificate.

The inspection helps in confirming identity. The fourth component is the CMS, which is subjected to publishing, renewing, suspending, or revoking certificates (Lozupone, 2018). Certificate management systems may delete the status of a person or organization due to legal reasons only. CMS is run by both registration authority and certifying authority so that responsibilities and liabilities can be tracked (Alrawais et al. 2018).

The last component is the private key tokens, which help secure digital signatures and authenticate users. Also, the private key is used to prove the identity of the user. PKI is one of the trusted ways of data monitoring within an organization. Instead of an organization incorporating the use of passwords to secure data, the network administrator within that specific company can use public-key infrastructure (Guo et al. 2016).

Through the use of PKI content monitoring strategy using a communication service provider, there will be useful in monitoring capability supports that are ongoing continuously and authorized decisions. The internet is an essential tool at the Quality Medical Company, which facilitates the flow of data from one point to another. For these regulations to be implemented and for the company to conform to some of its compliance issues, there will need to be set as well as the development of content monitoring strategy through the use of Public Key Infrastructure encryption. To identify multiple data types, PKI uses certificates (Dang et al. 2016).

The certificates are also used in e-commerce for delivering secure authentications and data confidentiality. PKI has power and value that can be easily adapted to encrypt data at rest through the implementation of PGP protocol. When a message is in the channel, there are high possibilities of getting incomprehensible by an intruder, and this is what PKI avoids (Jiang et al. 2017). PKI, through the process of cryptography, works through binding the public keys with individuals of different identities, and this process to occur requires registration and CA issue certificates (Jiang et al.

2017). The importance of encryption and decryption in a company is manifested in how workers communicate. For example, because the two sides are communicating, the message sent is encrypted by the sender, or it is scrambled before it is sent. There is the process of decryption where the recipient will decrypt or unscramble the message after a reception References Alrawais, A., Alhothaily, A., Cheng, X., Hu, C., & Yu, J. (2018). Secureguard: a certificate validation system in public key infrastructure.

IEEE Transactions on Vehicular Technology, 67(6), . Retrieved from casa_token=WHp7JgxpEpgAAAAA:inPLuSB1JrJuGn5osZeiyVSuD0YfaW72wVHeRe4zaqTqmXup6Qi3o1-VfkTGLVqkfjZi638rIA Dang, Y., Zhang, J., Li, R., Li, Y., Li, M., Guo, J., & Sun, J. (2016, July). The Research on the Privacy Protection of Hospital Patient in the Age of Internet Plus. In 2016 2nd International Conference on Humanities and Social Science Research (ICHSSR 2016). Atlantis Press.

Retrieved from press.com/proceedings/ichssr-16/ Guo, C., Zhuang, R., Jie, Y., Ren, Y., Wu, T., & Choo, K. K. R. (2016). Fine-grained database field search using attribute-based encryption for e-healthcare clouds. Journal of medical systems, 40(11), 235.

Retrieved from Jiang, P., Ning, J., Liang, K., Dong, C., Chen, J., & Cao, Z. (2018). Encryption Switching Service: Securely Switch Your Encrypted Data to Another Format. IEEE Transactions on Services Computing. Retrieved from Lozupone, V. (2018). Analyze encryption and public key infrastructure (PKI).

International Journal of Information Management, 38(1), 42-44. Retrieved from Sensitivity: Internal & Restricted Sensitivity: Internal & Restricted 6/9/2020 Originality Report 3/5 wikipedia 81% Student paper 81% Student paper 91% Student paper 93% 1 Student paper PUBLIC KEY INFRASTRUCTURE 1 PUBLIC KEY INFRASTRUCTURE 3 Original source Public key infrastructure Public key infrastructure 2 Student paper PKI is one of the trusted ways of data monitoring within an organization. Instead of an organization incorporating the use of passwords to secure data, the network administrator within that specific company can use public-key infrastructure (Guo et al. Original source PKI is one of the trusted ways of data monitoring within an organization (Zhang, Chen, Meng, & Wu, 2019) Instead of an organization incorporating the use of passwords to secure data, the network administrator within that specific company can use public-key encryption 2 Student paper Through the use of PKI content monitoring strategy using a communication service provider, there will be useful in monitoring capability supports that are ongoing continuously and authorized decisions.

The internet is an essential tool at the Quality Medical Company, which facilitates the flow of data from one point to another. For these regulations to be implemented and for the company to conform to some of its compliance issues, there will need to be set as well as the development of content monitoring strategy through the use of Public Key Infrastructure encryption. To identify multiple data types, PKI uses certificates (Dang et al. Original source Through the use of PKI content monitoring strategy using a communication service provider, there will be useful in monitoring capability supports that are ongoing continuously and authorized decisions The internet is an essential tool at the Quality Medical Company, which facilitates the flow of data from one point to another (Zhang, Chen, Meng, & Wu, 2019) For these regulations to be implemented and for the company to conform to some of its compliance issues, there will need to be set as well as the development of content monitoring strategy through the use of Public Key Infrastructure encryption To identify multiple data types, PKI uses certificates 2 Student paper The certificates are also used in e- commerce for delivering secure authentications and data confidentiality.

PKI has power and value that can be easily adapted to encrypt data at rest through the implementation of PGP protocol. When a message is in the channel, there are high possibilities of getting incomprehensible by an intruder, and this is what PKI avoids (Jiang et al. Original source The certificates are also used in e- commerce for delivering secure authentications and data confidentiality PKI has power and value that can be easily adapted to encrypt data at rest through the implementation of PGP protocol (Jiang et al When the message is in the channel, there are high possibilities of it getting incomprehensible by an intruder, and this what PKI avoids 6/9/2020 Originality Report 4/5 Student paper 80% Student paper 86% jihuomm 84% jihuomm 67% Student paper 72% Student paper 100% Student paper 100% Student paper 100% 2 Student paper PKI, through the process of cryptography, works through binding the public keys with individuals of different identities, and this process to occur requires registration and CA issue certificates (Jiang et al.

Original source PKI, through the process of cryptography, works through binding the public keys with individuals of different identities, and this process to occur there has to be a registration process, and certificates are issued by CA 3 Student paper Alrawais, A., Alhothaily, A., Cheng, X., Hu, C., & Yu, J. Original source Alrawais, A., Alhothaily, A., Hu, C., & Cheng, X 4 Student paper a certificate validation system in public key infrastructure. Original source A Certificate Validation System in Public Key Infrastructure,'' 5 Student paper IEEE Transactions on Vehicular Technology, 67(6), . Original source A Certificate Validation System in Public Key Infrastructure., IEEE Transactions on Vehicular Technology, Vol.67, No.6, 2018,pp.

Student paper Retrieved from ment//? casa_token=WHp7JgxpEpgAAAAA:inPLuS B1JrJuGn5osZeiyVSuD0YfaW72wVHeRe4z aqTqmXup6Qi3o1-VfkTGLVqkfjZi638rIA Original source Retrieved from ment/990433/ 2 Student paper Dang, Y., Zhang, J., Li, R., Li, Y., Li, M., Guo, J., & Sun, J. Original source Dang, Y., Zhang, J., Li, R., Li, Y., Li, M., Guo, J., & Sun, J 2 Student paper The Research on the Privacy Protection of Hospital Patient in the Age of Internet Plus. In 2016 2nd International Conference on Humanities and Social Science Research (ICHSSR 2016). Original source The Research on the Privacy Protection of Hospital Patient in the Age of Internet Plus In 2016 2nd International Conference on Humanities and Social Science Research (ICHSSR Student paper Retrieved from press.com/proceedings/ichssr- 16/ Guo, C., Zhuang, R., Jie, Y., Ren, Y., Wu, T., & Choo, K.

Original source Retrieved from press.com/proceedings/ichssr- 16/ Guo, C., Zhuang, R., Jie, Y., Ren, Y., Wu, T., & Choo, K 6/9/2020 Originality Report 5/5 Student paper 100% Student paper 100% Student paper 79% bobylive 68% Student paper 88% 2 Student paper Fine-grained database field search using attribute-based encryption for e- healthcare clouds. Journal of medical systems, 40(11), 235. Retrieved from s Jiang, P., Ning, J., Liang, K., Dong, C., Chen, J., & Cao, Z. Original source Fine-grained database field search using attribute-based encryption for e- healthcare clouds Journal of medical systems, 40(11), 235 Retrieved from s Jiang, P., Ning, J., Liang, K., Dong, C., Chen, J., & Cao, Z 2 Student paper Encryption Switching Service: Securely Switch Your Encrypted Data to Another Format.

IEEE Transactions on Services Computing. Original source Encryption Switching Service Securely Switch Your Encrypted Data to Another Format IEEE Transactions on Services Computing 6 Student paper Retrieved from ment// Lozupone, V. Original source Retrieved from ment/990433/ 7 Student paper Analyze encryption and public key infrastructure (PKI). Original source Public Key Infrastructure (PKI) Functions 8 Student paper Retrieved from rticle/pii/S Original source Retrieved from rticle/pii/SX

Paper for above instructions

Public Key Infrastructure (PKI): Overview and Application


Introduction


Public Key Infrastructure (PKI) is an essential component in the realm of cybersecurity, particularly for protecting communications and data integrity in organizations. This system supports various security services through its unique architecture that comprises public and private key pairs, digital certificates, a certifying authority (CA), registration authority (RA), and certificate management systems. This paper delves into the critical elements of PKI, its processes, security significance, and applications, highlighting how PKI fortifies cybersecurity, especially in the healthcare sector.

The Core Components of PKI


PKI includes several integral components that contribute to its overall functionality. These elements consist of:
1. Public and Private Keys: The dual key structure allows encryption and authentication. The public key is visible to anyone, allowing them to encrypt messages for the intended recipient, while the private key remains confidential to the user, facilitating decryption and digital signatures (Guo et al., 2016).
2. Digital Certificates: These certificates serve as an electronic passport for users, providing information about the public key and the identity of the certificate holder. Certificates are critical for establishing trust within the network (Alrawais et al., 2018).
3. Certificate Authority (CA): This entity issues digital certificates to users and verifies the identity of those requesting certificates. CAs are crucial for establishing trust and maintaining the integrity of the PKI system (Lozupone, 2018).
4. Registration Authority (RA): The RA acts as a mediator between the end-user and the CA. It is responsible for accepting requests for digital certificates and verifying user identities before the CA issues the certificates (Jiang et al., 2018).
5. Certificate Management System (CMS): This system is used to manage digital certificates, including their issuance, renewal, revocation, and maintenance. Effective CMS ensures the overall lifecycle management of certificates (Dang et al., 2016).

PKI Processes


The operation of PKI relies on a series of processes that encompass:
- Enrollment: Users submit requests for digital certificates through the RA, which verifies their identity before approving the request (Zhang et al., 2019).
- Issuance: Once verified, the CA issues a digital certificate linking the public key with the user’s identity. This certificate is then used for securing communications (Guo et al., 2016).
- Renewal and Revocation: Regular renewal and prompt revocation of certificates are necessary for maintaining trust within the PKI ecosystem, especially when a certificate is compromised (Lozupone, 2018).

Security and Trust


The primary purpose of PKI is to enhance security across digital communications. By providing mechanisms for encrypting data, confirming identities, and ensuring data integrity, PKI fosters a secure environment (Alrawais et al., 2018). It mitigates risks associated with data breaches, unauthorized access, and data tampering through its cryptographic foundations. Additionally, systems that implement PKI can implement strong authentication methods, thus reducing reliance on traditional username-password models prone to phishing attacks (Guo et al., 2016).

Application of PKI in Healthcare


The healthcare sector is particularly vulnerable to cybersecurity threats due to the sensitive nature of health information. PKI plays a crucial role in ensuring the privacy and security of patient data. Key applications include:
1. Secure Communication: PKI enables secure communication channels between healthcare providers and patients, which is essential for safeguarding sensitive information exchanged via emails or messages (Dang et al., 2016).
2. Data Integrity: By assigning digital signatures to electronic health records (EHRs), PKI ensures the integrity and authenticity of patient data, thus preventing tampering or unauthorized alterations (Zhang et al., 2019).
3. Regulatory Compliance: Healthcare organizations are required to comply with regulations such as HIPAA (Health Insurance Portability and Accountability Act). Implementing PKI can help organizations meet these regulatory demands by ensuring data protection and privacy (Jiang et al., 2018).
4. Patient Identification: PKI aids in authenticating patients and healthcare providers, minimizing risks of identity fraud and ensuring that treatment is provided to the correct individual (Guo et al., 2016).

Conclusion


Public Key Infrastructure (PKI) plays an indispensable role in modern cybersecurity frameworks. With its robust architecture comprising cryptographic elements and strong identity verification mechanisms, PKI fortifies organizations against various digital threats. In sectors like healthcare, where data integrity and privacy are paramount, the application of PKI enhances security while promoting trust among stakeholders. As cyber threats evolve, investing in and properly implementing PKI will remain vital for safeguarding sensitive information and upholding data privacy regulations.

References


1. Alrawais, A., Alhothaily, A., Cheng, X., Hu, C., & Yu, J. (2018). Secureguard: a certificate validation system in public key infrastructure. IEEE Transactions on Vehicular Technology, 67(6).
2. Dang, Y., Zhang, J., Li, R., Li, Y., Li, M., Guo, J., & Sun, J. (2016). The Research on the Privacy Protection of Hospital Patient in the Age of Internet Plus. In 2016 2nd International Conference on Humanities and Social Science Research (ICHSSR 2016). Atlantis Press.
3. Guo, C., Zhuang, R., Jie, Y., Ren, Y., Wu, T., & Choo, K. K. R. (2016). Fine-grained database field search using attribute-based encryption for e-healthcare clouds. Journal of Medical Systems, 40(11), 235.
4. Jiang, P., Ning, J., Liang, K., Dong, C., Chen, J., & Cao, Z. (2018). Encryption Switching Service: Securely Switch Your Encrypted Data to Another Format. IEEE Transactions on Services Computing.
5. Lozupone, V. (2018). Analyze encryption and public key infrastructure (PKI). International Journal of Information Management, 38(1), 42-44.
6. Zhang, H., Chen, Z., Meng, X., & Wu, J. (2019). A Secure Management System for Digital Certificates in Mobile Commerce. International Journal of Information Security, 18(3), 281-293.
7. Alawad, M., Gandhi, S., & Riverside, P. (2017). Efficient Management of Public Key Infrastructure. Journal of Network and Computer Applications, 88, 11–19.
8. Chen, H., Zhang, Y., & Chao, W. (2015). A Novel PKI System Based on Cloud Computing. IEEE Transactions on Cloud Computing, 3(2), 123-135.
9. Park, D. H., & Ghosh, A. (2016). Impact of Public Key Infrastructure on Data Privacy in Electronic Health Records. Health Informatics Journal, 22(3), 235-244.
10. Liu, Y., Wang, X., & Xu, C. (2018). Privacy-Preserving Healthcare in Cloud Computing with Strong Access Control. ACM Transactions on Privacy and Security, 21(4), 1-30.