CFP last date
22 April 2024
Reseach Article

Securing Data with Encryption and Color Encoding Scheme for Mobile Device

by Nisha P Gholap, Mandar Mokashi, Soumitra S Das
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 105 - Number 2
Year of Publication: 2014
Authors: Nisha P Gholap, Mandar Mokashi, Soumitra S Das
10.5120/18353-9481

Nisha P Gholap, Mandar Mokashi, Soumitra S Das . Securing Data with Encryption and Color Encoding Scheme for Mobile Device. International Journal of Computer Applications. 105, 2 ( November 2014), 37-40. DOI=10.5120/18353-9481

@article{ 10.5120/18353-9481,
author = { Nisha P Gholap, Mandar Mokashi, Soumitra S Das },
title = { Securing Data with Encryption and Color Encoding Scheme for Mobile Device },
journal = { International Journal of Computer Applications },
issue_date = { November 2014 },
volume = { 105 },
number = { 2 },
month = { November },
year = { 2014 },
issn = { 0975-8887 },
pages = { 37-40 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume105/number2/18353-9481/ },
doi = { 10.5120/18353-9481 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:36:41.037660+05:30
%A Nisha P Gholap
%A Mandar Mokashi
%A Soumitra S Das
%T Securing Data with Encryption and Color Encoding Scheme for Mobile Device
%J International Journal of Computer Applications
%@ 0975-8887
%V 105
%N 2
%P 37-40
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Today most data is stored & transferred from mobile device like laptops. These devices are prone to theft, also we transfer the data via network which is not secured. All above reasons forms the backbone for our paper which implements an encryption scheme and color encoding for such mobile devices; it uses location based key formation. This key is used to encrypt data will ACIII value of Cipher text is used in color encoding of the encrypted data. This color encoded document can be saved as jpeg, jpg and send in a secure manner as an e-mail attachment

References
  1. Cryptography & network security Principles and Practice by William Stalling.
  2. Dhanraj, C. Nandini, and Mohd. Tajuddin, "An Enhanced Approach for Secret Key Algorithm based on Data Encryption Standard", International Journal of Research and Reviews in Computer Science (IJRRCS) Vol. 2, No. 4, August 2011, ISSN: 2079-2557
  3. Yu Chen and Wei-Shinn Ku, "Self Encryption Scheme for Data Security in Mobile Device. "CCNC09.
  4. Rohollah Karimi, Mohammad Kalantari, "Enhancing Security and Confidentiality on Mobile Devices by Location-based Data Encryption", 2011 IEEE, ICON 2011
  5. Hsien-Chou Liao and Yun-Hsiang Chao, "A New Data Encryption Algorithm Based on the Location of Mobile Users", Information Technology Journal 7 (1): 63-69, 2008 ISSN 1812-5638 Ó 2008 Asian Network for Scientific Information
  6. Hsien-Chou Liao, Po-Ching Lee, Yun-Hsiang Chao, and Chin-Ling Chen "A Location-Dependent Data Encryption Approach for Enhancing Mobile Information System Security". ISBN 978-89-5519-131-8 93560, Feb. 12-14, 2007 ICACT2007.
  7. Ala Al-Fuqaha, Omar Al-Ibrahim, Joe Baird, "A Mobility Model for GPS-Based Encryption", IEEE Globecom 2005
  8. Hatem Hamad and Souhir Elkourd, "Data encryption using the dynamic location and speed of mobile node", Journal Media and Communication Studies Vol. 2(3)pp. 067-075, March, 2010.
  9. Mobile Devices Security guidelines, Mauritian Computer Emergency Response Team, National Computer Board.
Index Terms

Computer Science
Information Sciences

Keywords

Encryption scheme Color encoding Location based key.