The Model-View-Controller (MVC) architecture is widely used in modern software development due to its modular design, scalability, and clear separation of concerns. Despite these advantages, traditional MVC applications often lack built-in security measures, leaving them vulnerable to data breaches and unauthorized access. This research proposes an enhanced MVC architecture that integrates data encryption to improve security and privacy. The proposed approach incorporates AES and RSA encryption techniques within the Model and Controller layers to protect sensitive data both at rest and during transmission. Secure data handling is also ensured at the View layer to prevent unintended data exposure. This encryption-based enhancement strengthens data confidentiality and integrity while preserving the core MVC structure. An experimental implementation of the proposed architecture was conducted using an MVC-based web application framework. The system was evaluated in terms of response time, computational overhead, and resistance to common security threats. The results indicate that the encryption-enhanced MVC model significantly improves data confidentiality and integrity while introducing only minimal performance overhead. The findings demonstrate that integrating encryption mechanisms into the MVC architecture provides an effective and practical solution for developing secure and privacy-preserving software systems, making the proposed approach suitable for modern applications that require compliance with contemporary cybersecurity and data protection requirements.
Building similarity graph...
Analyzing shared references across papers
Loading...
Kabir et al. (Tue,) studied this question.
www.synapsesocial.com/papers/69a75d0fc6e9836116a267dc — DOI: https://doi.org/10.11648/j.ajdmkd.20261101.11
Synapse has enriched 5 closely related papers on similar clinical questions. Consider them for comparative context:
S Kabir
Uzzal KumarAcharjee
American Journal of Data Mining and Knowledge Discovery
Jagannath University
Building similarity graph...
Analyzing shared references across papers
Loading...