Author
Listed:
- Tamer Abdel Latif Ali
- Mostafa M Elsherbini
Abstract
With the exponential growth of electronically transmitted and stored data, ensuring data privacy and security has become a fundamental challenge for organizations and enterprises. Traditional encryption methods have limitations, such as vulnerability to advanced attacks and high computational complexity, that lead to the exploration of complementary strategies like deception techniques for enhanced protection. These methods aim to mislead unauthorized users by presenting protected data as if it were authentic, but the attack resilience is still insufficient. Multi-stage deception (MSD) methods leverage multiple deception strategies, such as complement, swapping, and stack reversal, to improve data protection levels and resistance against decryption attempts. Combining these techniques addresses gaps in single-stage approaches and offers a more robust defense. The proposed MSD method incorporates a classification of encryption and deception techniques and introduces a novel evaluation approach targeting critical performance factors. A tailored pseudocode algorithm is designed to optimize deception for various attribute types, validated through simulations. Simulation results reveal that the MSD method achieves a 100% value change in the first stage and 92% in the second stage, with an overall accuracy exceeding 95%. These findings demonstrate the method’s effectiveness in elevating data protection levels while maintaining low computational complexity. The study highlights the potential of multi-stage deception as a powerful tool for safeguarding sensitive information, achieving superior performance in data security. By offering a scalable and adaptable framework, the MSD method addresses emerging challenges in data protection while setting the stage for further advancements.
Suggested Citation
Tamer Abdel Latif Ali & Mostafa M Elsherbini, 2025.
"MSD: Multi-stage deception for data privacy protection,"
PLOS ONE, Public Library of Science, vol. 20(6), pages 1-20, June.
Handle:
RePEc:plo:pone00:0323944
DOI: 10.1371/journal.pone.0323944
Download full text from publisher
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:plo:pone00:0323944. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: plosone (email available below). General contact details of provider: https://journals.plos.org/plosone/ .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.