CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Secured and Authenticated Sharing of Software Program

Published on March 2012 by Madhavi Gangurde, Umashankar prasad, Ranvir Kumar, Prashant Prajapati
International Conference and Workshop on Emerging Trends in Technology
Foundation of Computer Science USA
ICWET2012 - Number 12
March 2012
Authors: Madhavi Gangurde, Umashankar prasad, Ranvir Kumar, Prashant Prajapati
d528402f-d798-4aed-b349-9b5c338276c4

Madhavi Gangurde, Umashankar prasad, Ranvir Kumar, Prashant Prajapati . Secured and Authenticated Sharing of Software Program. International Conference and Workshop on Emerging Trends in Technology. ICWET2012, 12 (March 2012), 22-27.

@article{
author = { Madhavi Gangurde, Umashankar prasad, Ranvir Kumar, Prashant Prajapati },
title = { Secured and Authenticated Sharing of Software Program },
journal = { International Conference and Workshop on Emerging Trends in Technology },
issue_date = { March 2012 },
volume = { ICWET2012 },
number = { 12 },
month = { March },
year = { 2012 },
issn = 0975-8887,
pages = { 22-27 },
numpages = 6,
url = { /proceedings/icwet2012/number12/5402-1093/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference and Workshop on Emerging Trends in Technology
%A Madhavi Gangurde
%A Umashankar prasad
%A Ranvir Kumar
%A Prashant Prajapati
%T Secured and Authenticated Sharing of Software Program
%J International Conference and Workshop on Emerging Trends in Technology
%@ 0975-8887
%V ICWET2012
%N 12
%P 22-27
%D 2012
%I International Journal of Computer Applications
Abstract

A new method for software program protection by information sharing & authentication technique is proposed. In this scheme we will share a secret source program among a group of participants. Each of them holds a camouflage programs to hide a share. Each camouflage program will hold a secret source program, thus resulting in stego-program. Each stego-program will still be compiled and executed to perform its original functionality. The security will be further enhanced by encrypting source program with secret key which not only can prevent the secret program from being recovered illegally but also can authenticate the stego -program provided by each participant. The secret program will only be recovered when all the participant supplies correct stego-program and correct key. During the recovery process we can check the stego-program have been tempered or not incidentally/ intentionally. This scheme can be applied to software programs for copyright protection, secret hiding in software program for covert channel, etc.

References
  1. S. Lee, and W. H. Tsai, “Data hiding in emails and applications by unused ASCII control codes," Proceedings of 2007 National Computer Symposium, vol. 4, pp. 414-422, Taichung, Taiwan, Dec. 2007.
  2. S. Lee, and W. H. Tsai, “Covert Communication with Authentication via Software Programs Using Invisible ASCII Codes"
  3. A. Shamir, “How to share a secret," Communications of the Association for Computing Machinery, vol. 22, no. 11, pp. 612-613, 1979.
  4. S. Lee, and W. H. Tsai, “Security Protection of Software Programs by Information Sharing and Authentication Techniques Using Invisible ASCII Control Codes," International Journal of Network Security, Vol.10, No.1, PP.1–10, Jan. 2010.
  5. The IEEE website. [Online]. Available: http://www.ieee.org/
Index Terms

Computer Science
Information Sciences

Keywords

Authentication information sharing invisible ASCII control codes program sharing secret program security protection software program