About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Proceedings of the First International Conference on Science, Engineering and Technology Practices for Sustainable Development, ICSETPSD 2023, 17th-18th November 2023, Coimbatore, Tamilnadu, India

Research Article

Data Security Design in Computer Application Software Development from the Perspective of Information Security Environment

Download365 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.4108/eai.17-11-2023.2342617,
        author={Qiyuan  Jie},
        title={Data Security Design in Computer Application Software Development from the Perspective of Information Security Environment},
        proceedings={Proceedings of the First International Conference on Science, Engineering and Technology Practices for Sustainable Development, ICSETPSD 2023, 17th-18th November 2023, Coimbatore, Tamilnadu, India},
        publisher={EAI},
        proceedings_a={ICSETPSD},
        year={2024},
        month={1},
        keywords={information security application software data security key system},
        doi={10.4108/eai.17-11-2023.2342617}
    }
    
  • Qiyuan Jie
    Year: 2024
    Data Security Design in Computer Application Software Development from the Perspective of Information Security Environment
    ICSETPSD
    EAI
    DOI: 10.4108/eai.17-11-2023.2342617
Qiyuan Jie1,*
  • 1: College of Computer and Information, Department of Information, Hohai University, Nanjing, 211100, Jiangsu Province, China
*Contact email: jieqiyuan2008@126.com

Abstract

Information security plays a vital role in computer application software development. With the advent of the digital age, a large amount of sensitive information is stored and transmitted. Ensuring the security of this data is critical for individuals and organizations alike. So this paper studies the security of software development from the perspective of information security. This paper mainly uses the method of comparison and experimental testing to analyze the key points of software development and data security strategies. The experimental results show that in the first data, the recording efficiency of the data computer system for encryption is 1468ms, while that of unencrypted recording is 1368ms, a difference of 100ms. The results of the read-write efficiency test show that the operating efficiency of the encrypted database does not decrease significantly, which meets the efficiency requirements of users in actual projects.

Keywords
information security application software data security key system
Published
2024-01-23
Publisher
EAI
http://dx.doi.org/10.4108/eai.17-11-2023.2342617
Copyright © 2023–2025 EAI
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL