The Development of Mobile Application Security Through Encryption
Keywords:Mobile application, text encryption, image encryption, ciphertext, text decryption, image decryption
This paper aims to propose a security solution for android users. Recently, there have been many cases of lost mobile devices since the advent of a new norm during the COVID-19 pandemic. This had impacted victims as it resulted in the loss of sensitive personal information. Therefore, the community must always take precautions to protect personal data from cases of data loss. With the increase in advanced technology, the ISY Mobile Crypt (IMC) application was developed. This mobile security application can store personal data, thus in the event of a device loss data can be compromised and restored. The IMC was developed by using the rapid application development (RAD) approach. The IMC can encrypt and decrypt data which can be obtained through Firebase. This application assists android users to increase their data security by converting plaintext to an alternative type of ciphertext. The IMC requires a key to store, encrypt and decrypt data. The application can benefit android users by keeping their data safe and accessible in the form of images and text. Without a set key no one can access their personal data if their phones are lost or stolen.
Lisonek, D., & Drahanský, M. (2008, December). SMS encryption for mobile communication. In 2008 International Conference on Security Technology (pp. 198-201). IEEE.
O. Žitovský, Šifrování komunikace mobilních zařízení pomocí Java ME (Communication Encryption of Mobile Devices using Java ME), Master thesis, Masaryk University Faculty of Informatics, Brno, 2007.
Chandrashekhar, R. V., Visumathi, J., & Anandaraj, A. P. (2022, January). Advanced Lightweight Encryption Algorithm for Android (IoT) Devices. In 2022 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI) (pp. 1-5). IEEE.
Ranjbar, N., & Mahdi, A. (2012). Authentication and authorization for mobile devices.
Aljazaery, I. A., Salim ALRikabi, H. T., & Alaidi, A. H. M. (2022). Encryption of Color Image Based on DNA Strand and Exponential Factor. International Journal of Online & Biomedical Engineering, 18(3).
Smriti, M., Venkatraman, S. V., Raj, A., Shukla, V. R., & Cherukuri, A. K. A. (2022). Secure File Storage in Cloud Computing Using a Modified Cryptography Algorithm. In Advancing Smarter and More Secure Industrial Applications Using AI, IoT, and Blockchain Technology (pp. 200-224). IGI Global.
Abdelmaboud, A., Ahmed, A. I. A., Abaker, M., Eisa, T. A. E., Albasheer, H., Ghorashi, S. A., & Karim, F. K. (2022). Blockchain for IoT Applications: Taxonomy, Platforms, Recent Advances, Challenges and Future Research Directions. Electronics, 11(4), 630.
Almaiah, M. A., Hajjej, F., Lutfi, A., Al-Khasawneh, A., Alkhdour, T., Almomani, O., & Shehab, R. (2022). A Conceptual Framework for Determining Quality Requirements for Mobile Learning Applications Using Delphi Method. Electronics, 11(5), 788.
Sinha, A., Shrivastava, G., Kumar, P., & Gupta, D. (2022). A community‐based hierarchical user authentication scheme for Industry 4.0. Software: Practice and Experience, 52(3), 729-743.
Ogbanufe, O. M., & Baham, C. (2022). Using Multi-Factor Authentication for Online Account Security: Examining the Influence of Anticipated Regret. Information Systems Frontiers, 1-20.
Wang, X. (2022). Security Threats and Protection Based on Android Platform. In 2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City (pp. 179-186). Springer, Singapore.
Seth, B., Dalal, S., Jaglan, V., Le, D. N., Mohan, S., & Srivastava, G. (2022). Integrating encryption techniques for secure data storage in the cloud. Transactions on Emerging Telecommunications Technologies, 33(4), e4108.
Thakur, V., Indra, G., Gupta, N., Chatterjee, P., Said, O., & Tolba, A. (2022). Cryptographically secure privacy-preserving authenticated key agreement protocol for an IoT network: A step towards critical infrastructure protection. Peer-to-Peer Networking and Applications, 15(1), 206-220.
Gupta, I., Mittal, S., Tiwari, A., Agarwal, P., & Singh, A. K. (2022). TIDF-DLPM: Term and Inverse Document Frequency based Data Leakage Prevention Model. arXiv preprint arXiv:2203.05367.
Wanpeng, C., & Wei, B. (2014). Adaptive and dynamic mobile phone data encryption method. China Communications, 11(1), 103-109.
Tayde, S., & Siledar, S. (2015). File Encryption Decryption using AES algorithm in android phone. International Journel of Advanced Research in computer science and software engineering, 5(5).
J, Martin, “Rapid application development,” Macmillan Publishing Co, Inc, 1991.
Daud, N. M. N., Bakar, N. A. A. A., & Rusli, H. M. (2010, June). Implementing rapid application development (RAD) methodology in developing practical training application system. In 2010 International Symposium on Information Technology (Vol. 3, pp. 1664-1667). IEEE.
How to Cite
Copyright (c) 2022 Azrahayu Abdul Aziz, Aminah Bibi Bawamohiddin
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.