CFP last date
20 December 2024
Reseach Article

End-To-End Secure Communication using Encryption and Fingerprint Recognition

by Salman Mousa, M.A. El-dosuky
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 184 - Number 31
Year of Publication: 2022
Authors: Salman Mousa, M.A. El-dosuky
10.5120/ijca2022922377

Salman Mousa, M.A. El-dosuky . End-To-End Secure Communication using Encryption and Fingerprint Recognition. International Journal of Computer Applications. 184, 31 ( Oct 2022), 26-29. DOI=10.5120/ijca2022922377

@article{ 10.5120/ijca2022922377,
author = { Salman Mousa, M.A. El-dosuky },
title = { End-To-End Secure Communication using Encryption and Fingerprint Recognition },
journal = { International Journal of Computer Applications },
issue_date = { Oct 2022 },
volume = { 184 },
number = { 31 },
month = { Oct },
year = { 2022 },
issn = { 0975-8887 },
pages = { 26-29 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume184/number31/32512-2022922377/ },
doi = { 10.5120/ijca2022922377 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:22:53.371766+05:30
%A Salman Mousa
%A M.A. El-dosuky
%T End-To-End Secure Communication using Encryption and Fingerprint Recognition
%J International Journal of Computer Applications
%@ 0975-8887
%V 184
%N 31
%P 26-29
%D 2022
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The paper in hand proposes a mobile application for encrypted data communication, due to the increased cases of data leakage. The relation between private and public keys is the basis of public key cryptography. In this way of cryptography, every public key is linked to a private key. Both keys are used in encrypting and decrypting any message sent via the Internet. Many novel approaches provide better data protection. Cryptography service providers are providing on -demand cryptography services. Novel approaches such as homomorphic-encryption help in protecting data. Those approaches are useful compared to other approaches because the former approaches are less expensive. The proposed mobile application is implemented in Flutter. The implemented fingerprint method that has been used in the application is Ateb-Gabor.

References
  1. Schillinger F, Schindelhauer C. "End-to-end encryption schemes for online social networks." In: International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage. Springer; 2019. p. 133–46.
  2. Yan F, Xu M, Qiao T, Wu T, Yang X, Zheng N, et al. "Identifying WeChat red packets and fund transfers via analyzing encrypted network traffic." In: 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). IEEE; 2018. p. 1426–32.
  3. Rezaei S, Liu X. "Deep learning for encrypted traffic classification: An overview." IEEE communications magazine. 2019;57(5):76–81.
  4. Patel V. "A framework for secure and decentralized sharing of medical imaging data via blockchain consensus." Health informatics journal. 2019;25(4):1398–411.
  5. Montella R, Ruggieri M, Kosta S. "A fast, secure, reliable, and resilient data transfer framework for pervasive IoT applications." In: IEEE INFOCOM 2018-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). IEEE; 2018. p. 710–5.
  6. Lotfollahi M, Siavoshani MJ, Zade RSH, Siberian M. Deep packet: "A novel approach for encrypted traffic classification using deep learning." Soft Computing. 2020;24(3):1999–2012.
  7. Grolman E, Finkelshtein A, Puzis R, Shabtai A, Celniker G, Katzir Z, et al. "Transfer learning for user action identification in mobile apps via encrypted traffic analysis." IEEE Intelligent Systems. 2018;33(2):40–53.
  8. Cho C, Döttling N, Garg S, Gupta D, Miao P, Polychroniadou A. "Laconic oblivious transfer and its applications." In: Annual International Cryptology Conference. Springer; 2017. p. 33–65.
  9. Aceto G, Ciuonzo D, Montieri A, Pescapé A. DISTILLER: "Encrypted traffic classification via multimodal multitask deep learning." Journal of Network and Computer Applications. 2021;183:102985.
  10. Wang C, Wang A, Xu J, Wang Q, Zhou F. "Outsourced privacy-preserving decision tree classification service over encrypted data." Journal of Information Security and Applications. 2020 Aug 1; 53:102517.
  11. Ullah A, Said G, Sher M, Ning H. "Fog-assisted secure healthcare data aggregation scheme in IoT-enabled WSN." Peer-to-Peer Networking and Applications. 2020 Jan;13(1):163-74.
  12. Riazi MS, Laine K, Pelton B, Dai W. Heax: "An architecture for computing on encrypted data." InProceedings of the Twenty-Fifth International Conference on Architectural Support for Programming Languages and Operating Systems 2020 Mar 9 (pp. 1295-1309).
  13. Feng J, Yang LT, Zhu Q, Choo KK. "Privacy-preserving tensor decomposition over encrypted data in a federated cloud environment." IEEE Transactions on Dependable and Secure Computing. 2018 Nov 15;17(4):857-68.
  14. Malche T, Maheshwary P, Kumar R. "Environmental monitoring system for smart city based on secure Internet of Things (IoT) architecture." Wireless Personal Communications. 2019 Aug;107(4):2143-72.
  15. Modak A, Chaudhary SD, Paygude PS, Ldate SR. "Techniques to secure data on cloud: Docker swarm or kubernetes?." In2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT) 2018 Apr 20 (pp. 7-12). IEEE.
  16. Mollah MB, Azad MA, Vasilakos A. "Secure data sharing and searching at the edge of cloud-assisted internet of things." IEEE Cloud Computing. 2017 Mar 15;4(1):34-42.
  17. Chen H, Gilad-Bachrach R, Han K, Huang Z, Jalali A, Laine K, Lauter K. "Logistic regression over encrypted data from fully homomorphic encryption." BMC medical genomics. 2018 Oct;11(4):3-12.
  18. Nazarkevych M, Klyujnyk I, Maslanych I, Havrysh B, Nazarkevych H. "Image filtration using the Ateb-Gabor filter in biometric security systems." In2018 XIV-th International Conference on Perspective Technologies and Methods in MEMS Design (MEMSTECH) 2018 Apr 18 (pp.276-279). IEEE.
Index Terms

Computer Science
Information Sciences

Keywords

Encryption Fingerprint Recognition End-To-End security