CFP last date
20 January 2025
Reseach Article

Survey on Data Security for Mobile Devices

by Nisha P Gholap, Mandar Mokashi, Soumitra S Das
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 103 - Number 10
Year of Publication: 2014
Authors: Nisha P Gholap, Mandar Mokashi, Soumitra S Das
10.5120/18114-9313

Nisha P Gholap, Mandar Mokashi, Soumitra S Das . Survey on Data Security for Mobile Devices. International Journal of Computer Applications. 103, 10 ( October 2014), 54-58. DOI=10.5120/18114-9313

@article{ 10.5120/18114-9313,
author = { Nisha P Gholap, Mandar Mokashi, Soumitra S Das },
title = { Survey on Data Security for Mobile Devices },
journal = { International Journal of Computer Applications },
issue_date = { October 2014 },
volume = { 103 },
number = { 10 },
month = { October },
year = { 2014 },
issn = { 0975-8887 },
pages = { 54-58 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume103/number10/18114-9313/ },
doi = { 10.5120/18114-9313 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:34:14.252771+05:30
%A Nisha P Gholap
%A Mandar Mokashi
%A Soumitra S Das
%T Survey on Data Security for Mobile Devices
%J International Journal of Computer Applications
%@ 0975-8887
%V 103
%N 10
%P 54-58
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Nowadays data security is making a way into market. New techniques of data security have gained interest of many researchers. Encryption-Decryption technique is one such way of data security. These techniques not only provide confidentiality, integrity of data but also help in authentication of user. Authentication is possible because encryption-decryption of the data is only possible with the legitimate key possessed by legitimate user only. In this paper we study different technique used in encryption method so to increase security of data especially location based encryption and decryption process.

References
  1. Rohollah Karimi and Mohammad Kalantari, IEEE confrence paper year 2011, Enhancing Security and Confidentiality on Mobile Devices by Location-based Data Encryption.
  2. Dhanraj, C. Nandini, and Mohd. Tajuddin (International Journal of Research and Reviews in Computer Science (IJRRCS) Vol. 2, No. 4, August 2011, ISSN: 2079-2557 ). An Enhanced Approach for Secret Key Algorithm based on Data Encryption Standard
  3. Hsien-Chou Liao and Yun-Hsiang Chao Information Technology Journal 7 (1): 63-69, 2008 ISSN 1812-5638 © 2008 Asian Network for Scientific Information A New Data Encryption Algorithm Based on the Location of Mobile Users
  4. Hatem Hamad and Souhir Elkourd Journal Media and Communication Studies Vol. 2(3)pp. 067-075, March, 2010, Data encryption using the dynamic location and speed of mobile node
  5. Yu Chen and Wei-Shinn Ku Consumer Communications and Networking Conference, 2009. CCNC 2009. 6th IEEE Publication Year: 2009, Self-Encryption Scheme for Data Security in Mobile Devices.
  6. Paolo Gasti & Yu ChenParallel, Distributed and Network-Based Processing (PDP), 2010 18th Euromicro International Conference on 17-19 Feb. 2010, Breaking and Fixing the Self Encryption Scheme for Data Security in Mobile Devices.
  7. TieJun Pan LeiNa Zheng Management of e-Commerce and e-Government 2008, A New Mobile Information Security Solution Based on External Electronic Key.
  8. Hsien-Chou Liao, Po-Ching Lee, Yun-Hsiang Chao, and Chin-Ling Chen, A Location-Dependent Data Encryption Approach for Enhancing Mobile Information System Security
Index Terms

Computer Science
Information Sciences

Keywords

Data security Encryption-Decryption Confidentiality Integrity Authentication Legitimate Location based