This paper is published in Volume 3, Issue 3, 2018
Area
Mobile Computing
Author
V. Adithya
Co-authors
R. Ramya , D. Vignesh Kumar , M. Madava Krishnan
Org/Univ
Sree Sakthi Engineering College, Coimbatore, Tamil Nadu, India
Keywords
Mobile Computing, Encryption, Authentication, CSPRN, Graphical Authentication, Transmission.
Citations
IEEE
V. Adithya , R. Ramya , D. Vignesh Kumar , M. Madava Krishnan. Cloak Encryption in Apache, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARnD.com.
APA
V. Adithya , R. Ramya , D. Vignesh Kumar , M. Madava Krishnan (2018). Cloak Encryption in Apache. International Journal of Advance Research, Ideas and Innovations in Technology, 3(3) www.IJARnD.com.
MLA
V. Adithya , R. Ramya , D. Vignesh Kumar , M. Madava Krishnan. "Cloak Encryption in Apache." International Journal of Advance Research, Ideas and Innovations in Technology 3.3 (2018). www.IJARnD.com.
V. Adithya , R. Ramya , D. Vignesh Kumar , M. Madava Krishnan. Cloak Encryption in Apache, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARnD.com.
APA
V. Adithya , R. Ramya , D. Vignesh Kumar , M. Madava Krishnan (2018). Cloak Encryption in Apache. International Journal of Advance Research, Ideas and Innovations in Technology, 3(3) www.IJARnD.com.
MLA
V. Adithya , R. Ramya , D. Vignesh Kumar , M. Madava Krishnan. "Cloak Encryption in Apache." International Journal of Advance Research, Ideas and Innovations in Technology 3.3 (2018). www.IJARnD.com.
Abstract
The tremendous growth of mobile devices has a pre-generated new form of security flaws. The manifest-based permission in Android devices is one of the hefty security threats among all.We propose cloak protocol based encryption. We use exterior apache server for generating CSPRN and also we make use of the session id which will be very helpful in tracking user sessions and it will be difficult for the hackers to crack the file. For multiple user registrations, we define a new way of two-dimensional graphical authentications using a one-time password with the session ID to keep track of users. With this, the user can securely transceiver messages.
Paper PDF
View Full Paper
Last