CRYPTOGRAPHIC APPROACHES TO FILE METADATA SECURITY IN MODERN INFORMATION SYSTEMS
Keywords:
File metadata, Cryptographic protection, Information security, Metadata privacyAbstract
In modern information systems, file metadata has become an essential component for data management, interoperability, and automated processing. However, metadata often contains sensitive information such as authorship, timestamps, device identifiers, and contextual attributes, which can be exploited to compromise confidentiality and user privacy. While traditional security mechanisms primarily focus on protecting data content, metadata security remains insufficiently addressed.
This paper investigates cryptographic approaches to file metadata security in modern information systems. The proposed approach is based on selective cryptographic protection of metadata using symmetric, asymmetric, and hybrid encryption schemes. By treating metadata as a first-class security object, the approach ensures confidentiality, integrity, and controlled access while preserving system functionality and interoperability. Comparative analysis demonstrates that cryptographic protection provides stronger security guarantees than conventional metadata removal or obfuscation techniques, with minimal computational and storage overhead. The results indicate that cryptography-based metadata protection is a practical and effective solution for secure data exchange in enterprise systems, cloud environments, and electronic government platforms.
Downloads
References
T. Gilliland, Introduction to Metadata, 3rd ed., Getty Research Institute, 2016.
DCMI, “Dublin Core Metadata Element Set, Version 1.1,” 2012.
W3C, “Extensible Markup Language (XML) 1.0 (Fifth Edition),” 2008.
Adobe Systems Inc., XMP Specification Part 1, 2020.
S. L. Garfinkel, “Information leakage from documents and their metadata,” IEEE Security & Privacy, 2004.
B. Schneier, “Metadata equals surveillance,” IEEE Security & Privacy, 2015.
C. V. Wright et al., “Traffic analysis of encrypted messaging services,” USENIX Security, 2014.
Perez et al., “You are your metadata,” ICWSM, 2018.
European Union, “GDPR (EU) 2016/679,” 2016.
[10] ENISA, Privacy and Data Protection by Design, 2015.
ISO/IEC 27001, Information Security Management Systems, 2022.
Menezes et al., Handbook of Applied Cryptography, 2018.
J. Katz and Y. Lindell, Introduction to Modern Cryptography, 2021.
NIST, “Advanced Encryption Standard (AES),” FIPS 197, 2001.
R. Rivest et al., “A method for obtaining digital signatures,” CACM, 1978.
D. Johnson et al., “The elliptic curve digital signature algorithm,” IJIS, 2001.
ISO/IEC 27002, Information Security Controls, 2022.
M. Bellare et al., “Keying hash functions for message authentication,” CRYPTO, 1996.
NIST, “Digital Signature Standard (DSS),” FIPS 186-5, 2023.
W. Stallings, Cryptography and Network Security, 8th ed., 2023.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Sodiqova Dilnoza Jumanazarovna

This work is licensed under a Creative Commons Attribution 4.0 International License.
The content published on the International Scientific and Current Research Conferences platform, including conference papers, abstracts, and presentations, is made available under an open-access model. Users are free to access, share, and distribute this content, provided that proper attribution is given to the original authors and the source.
