SlideShare a Scribd company logo
Mudasiru Hammed & Jumoke Soyemi
International Journal of Computer Science and Security (IJCSS), Volume (13) : Issue (3) : 2019 90
Information Leakage Prevention Using Public Key Encryption
System and Fingerprint Augmented with Apriori Algorithm
Mudasiru Hammed tundemuhammedy2k@yahoo.com
Department of Computer Science
The Federal Polytechnic, Ilaro
Ogun State, Nigeria
Jumoke Soyemi jumoke.soyemi@federalpolyilaro.edu.ng
Department of Computer Science
The Federal Polytechnic, Ilaro
Ogun State, Nigeria
Abstract
The increase in the use of the internet around the world provided easier way of communication
and information sharing that has led to the huge challenge of data leakage on the network. In an
academic environment such as higher institutions of learning, the need to ensure that access to
data and sensitive information are given to authorized users become imperative. However, this is
not always the case as security bridges are often experienced. This study proposed a RSA public
key encryption system and biometric fingerprint augmented with Apriori algorithm to prevent
information leakages. The fingerprint verifies the identity of the owner of incoming message and
the Apriori algorithm is used as the detection system instead of biometric that requires additional
hardware for detecting fingerprint. This study developed a system based on the proposed
algorithm. The developed system was tested on Federal Polytechnic, Ilaro local area network
achieving a high level of security that prevents interception of valuable data by intruders or
eavesdroppers. The system developed RSA public key encryption and fingerprint augmented with
Apriori algorithm thus provided the required security mechanism that prevents information
leakage in a public environment.
Keywords: Information, RSA Public Encryption Algorithms, Biometric Fingerprint, Apriori
Algorithm.
1. INTRODUCTION
The increase in the use of the internet all over the world made internet-based services very
popular thus making the sharing of information and communication much easier. This drastic rise
in the use of network-based systems has rendered cyber security systems outdated because
there is a rise in the activities of hackers and attackers using sophisticated methods such as
phishing and spoofing. Therefore, the need to ascertain that authorized users and clients are the
only one with access to both secure and sensitive information. The availability of tools such as
the web tool, make credentials stealing and system cracking easier to achieve [1]. Data leakage
is a frequent occurrence when dealing with confidential information detailing customer data, bank
details, source code, design specifications and examination question paper. When such
information leaks, the party concerned becomes insecure. Sharing data required an efficient
asymmetric key encryption algorithm for preventing unauthorized user to gain access to vital
information [2]. A number of research works in this area of study have been done to provide
security in communication and sharing of data over network. These includes studies [3,4,5].
Tracing out data leakage among system users could prove very difficult for system administrator
thus creating ethical issues in the working environment. Therefore, preventing information
leakage is immensely advantageous than information leak detection.
Mudasiru Hammed & Jumoke Soyemi
International Journal of Computer Science and Security (IJCSS), Volume (13) : Issue (3) : 2019 91
This study proposed RSA public key encryption scheme that is more suitable for providing a
security mechanism for tampering activities in exchanging information over the network and also
incorporated fingerprint techniques augmented wih Apriori algorithm. This algorithm verifies the
identity of an incoming message and the identity of the user sending the message which could be
a panacea for spoofing attack. Apriori algorithm is a detection system that is embedded into
administrator’s server to verify the user generated fingerprints against fingerprints and details
information obtained from the user during the registration.
2. LITERATURE REVIEW
There are various approaches for preventing sensitive data from unauthorized parties either to
disclose or to modify communication between two parties. Among these approaches are
cryptography, steganography, biometric, digital watermarking, digital signature and others.
Cryptography and biometric however, are good at addressing threats, such as; information
disclosure, tampering and spoofing. They form the foundation for all other aspects of information
security.
2.1 Cryptography
Cryptographic schemes are grouped into symmetric (private key) cryptography and asymmetric
cryptography [6]. In private encryption scheme, encryption must be equal to decryption key
( e d ). However, malicious third party could work their way into intercepting the messages and
gain access to sensitive information. Some could disclose or modify the information. Also
eavesdropper are likely to be able to figure out the "secret key” except the secret key is securely
exchanged [7]. It is obvious that RSA public key encryption technique is widely used because
according to [8], there is a pair of keys, one which is known as the public key for the encryption of
the plaintext that is meant to be sent and the other key known as private key. This private key is
sent to the receiver for the purpose of message decryption.
2.2 Biometric
The biometric authentication works by scanning the user’s characteristics such as finger print and
eye retina and store information in the database in form of strings. Authentication of a user is
achieved by matching the scanned data with that of the database with access granted based on
the detection of commonalities [9]. However, Biometric authentication is good when limited
applications are involved. Apart from the fact that the system slows down with large number of
users, it also requires further hardware to detect the fingerprints and eye retinas. Fingerprints,
however, can be spoofed simply by using common materials such as gelatin, silicone, and wood
glue [10].
2.3 Apriori Algorithm
Apriori algorithm is the association analysis used to discover what is commonly called association
rules. The algorithm looks at the possibilities of having items that are associated together in the
transactional databases, with the support threshold and then identifies the recurrent item sets.
The confidence threshold on the other hand uses restrictive probability that an item appear
together in a transaction when another item appears, to locate association rules. This algorithm
can be a potential strategy for detecting fake fingerprint without any additional hardware.
2.4 Related Work
Many research work proposed RSA public key encryption system for different purposes such as
e-voting system, agent technology, electronic commerce and other sensitive data that needed to
be prevented from unauthorized parties. Hybrid RSA Encryption Algorithm for Cloud Security was
proposed by [4]. The study discovered that data decryption with hybrid RSA encryption algorithm
is difficult to achieve when data transfer in the cloud system is applied. However, this hybrid
encryption cannot ensure data transmission through secured protocol and it cannot also verify
who the user is.
Mudasiru Hammed & Jumoke Soyemi
International Journal of Computer Science and Security (IJCSS), Volume (13) : Issue (3) : 2019 92
Study [2] proposed information leakage detection system using fingerprint data. This method
generated fingerprint and token ID that are available in the database. The idea is to eliminate
types of phrases from the fingerprinting process. Types of phrases are identified by looking at
available public documents of the organization that is to be protected from information leakage
and different phrases are identified with the help of databases. This process is only used for text
file and if the text file contains some unicode characters in such cases, this process cannot give
correct result.
In study [11], data encryption and decryption with RSA algorithm in a network environment was
proposed. The algorithm allowed message senders to generate public keys to encrypt messages
and the receivers’ generated private keys using secured databases. An incorrect private key was
able to decrypt the encrypted message but to a form that is different from the original message.
An eavesdropper that breaks into the message will return a meaningless message despite the
fact that the system cannot verify who the user is.
Study [12], developed an electronic voting system that used fingerprint technique. This technique
took account of fake human thumb impression and separated out the authentic minutiae regions.
The regions were subsequently extracted and used not only as user access control identity to the
system but also to vote in the electoral process. The system developed was able to nullify
multiple vote casting and provided election results collation process that is more accurate and
secured authentication mechanism for voters. However, the cost of providing the special
hardware device to implement biometrics enrolment and authentication was not considered. The
possibility of providing the sensor with fake physical biometric could prove a security threat to the
system.
Study [13] presented an online voting system using steganography and biometrics. The voters
used their fingerprint which has been pre-enrolled to access the voting machine. The usage of
anatomical traits rather than behavioral attributes further created more secured and acceptable
voters registration system, because the fingerprint is unique, distinct, universal, and not easily
damaged for every individual. Additional hardware is required to detect fingerprints. Fingerprints,
in particular, can be easily spoofed from common materials.
In our study, the combination of RSA public encryption system and biometric fingerprint
augmented with Apriori algorithm to prevent information leakages is proposed. This system
ensures secured data transmission and also verifies who the user is and provides better way of
securing data and information.
3. MATERIALS AND METHODS
This study focused on three processes which include: RSA key generation process, Encryption
process, Validation and Decryption process.
3.1 RSA Key Generation Process
The use of encryption key requires every individual user to register with details information such
as Name, Sex. Occupation, Level, Department, Marital status, E-mail, Phone number and their
Fingerprint. The server stores the information and generate encryption key for the user in order to
maintain user’s account in the database. Figure 1 shows the encryption key generation process
and Algorithm 1 shows RSA key generation described in [15] for the administrator to generate
both public key and private key. The encryption key is made known to all users while the
decryption key is kept secret to only administrator to decrypt any message sent by the users.
Algorithm 1: RSA Key Generation [14]
Administrator creates two different large and appropriately random primes, Ap and Aq which are
kept secret.
Mudasiru Hammed & Jumoke Soyemi
International Journal of Computer Science and Security (IJCSS), Volume (13) : Issue (3) : 2019 93
Administrator calculates A A Am p q . The number known as the modulo is made public
Administrator selects randomly some Ae , with 1 ( 1)( 1)A A Ae p q    , making gcd( ,( 1)( 1)) 1A A Ae p q   .
This number Ae is known as the encryption key which is made available to the user.
Administrator calculates the inverse, 1
A Ad e
 modulo Am , of Ae . This number is kept secret. The
pair ( , )A Ad m is Administrator’s private key and Ad is called the decryption key. The private key
will be used to decrypt any message received by the administrator. Administrator publishes the
pair ( , )A Ae m as his public key
FIGURE 1: Encryption Key Generation Process.
3.2 RSA Encryption Process
For a user to send any sensitive information or document on the network, it has to be encrypted
with the generated public key and fingerprint which verifies the identity of individual users. Once
the information is encrypted, even the user can no longer decrypt the encrypted copy because
there would not be private key to decrypt it. Algorithm 2 depicts the encryption algorithm.
Algorithm 2: Encryption Algorithm
Step 1: Obtained Administrator’s public key ( , )A Ae m
Step 2: Take plaintext to be a positive integer M, where 0 AM m 
Step 3: Calculate the cipher text mode
AC M m
Step 4: Send the cipher text C to Administrator
The user use the algorithm 2 to convert plain text QBASICQUESTIONFORND to cipher text
12%&#345@!344!!@#27$*@24579#$$%&*#%
3.3 Validation Process
When an administrator receives the encrypted message like this;
12%&#345@!344!!@#27$*@24579#$$%&*#%, the identity of the sender has to be verified with
the aid of Apriori algorithm by matching the sender fingerprint with the fingerprint already stored
during the registration. The fingerprint extractor uses minutiae points and wrinkles features, any
Start
Input information
details such as
name, sex,
occupation and
fingerprint etc.
Store the details information
and generate the encryption
key
Stop
Mudasiru Hammed & Jumoke Soyemi
International Journal of Computer Science and Security (IJCSS), Volume (13) : Issue (3) : 2019 94
extracted feature information is a template. This template is always comparing with newly
presented extracted feature information using apriori algorithm. If commonality is not achieved,
the system will automatically give error, but if commonality is achieved, the system will display
user’s information. Apriori also compares the template to all enrolled users to ensure that there is
no similar template. If any similar template is found then the system will automatically give error
and such user will never be activated. The algorithm 3 is Apriori algorithm described in [16].
Algorithm 3
Assuming the user’s generated fingerprint is taken as X and the fingerprint obtained during the
registration is Y. It means X and Y are conjunctions of attribute value-pairs, and s (for support) is
the probability that X and Y appear together in a database and c (for confidence) is the
conditional probability that X appears in a database when Y is present. The association rule X→Y
is interpreted as data set that satisfies the conditions in X and also likely to satisfy the conditions
in Y. This can be written as follows:
( )s X Y for support rule to make decision when finding relationship between two
fingerprints
( )c X Y for confidence rule to measure the reliability of decision made
FIGURE 2: Architecture for Fingerprint Detection System.
Rule Engine: uses
IF/THEN to find
relationship between
two fingerprints
Inference Engine:
Decision point based
on support strategy
Measure’s
Engine: It
measures the
reliability of
decision based
on confidence
strategy
Fingerprint
Repository
Mudasiru Hammed & Jumoke Soyemi
International Journal of Computer Science and Security (IJCSS), Volume (13) : Issue (3) : 2019 95
The step 5 of algorithm 3 performs the following operations;
(i) Fingerprint Generation: this operation generates user’s fingerprint and matches it with the
already stored fingerprint.
(ii) Fingerprint pruning: This operation eliminates any fingerprint using the support-based pruning
strategy
The flow flowchart in figure 3 depicts validation process to verify the identity of the incoming
message before it is decrypted.
FIGURE 3: Flowchart of Validation Process.
3.4 RSA Decryption Process
After the identity of the message owner has been verified, the administrator will proceed to extract
plain text Y from cipher text C, that is, 12%&#345@!344!!@#27$*@24579#$$%&*#% which will
be converted back to QBASICQUESTIONFORND. Administrator follows steps in algorithm 4 to
know the content of cipher text C.
Algorithm 4
Step 1: Obtained the cipher text C from user
Step 2: Administrator uses his private key ( , )A Ad m to compute modd
AM C m
The two processes (encryption and decryption) allow both sender (administrator) and the
receivers (lecturers) to communicate in a secured manner and the figure 4 depicts system
architecture.
Yes
No
Start
Is commonality
realized between
the fingerprints?
Display the user’s
details & decrypt the
message
Stop
Mudasiru Hammed & Jumoke Soyemi
International Journal of Computer Science and Security (IJCSS), Volume (13) : Issue (3) : 2019 96
FIGURE 4: System Architecture.
4. RESULT AND DISCUSSION
Prevention of information leakage using public key encryption system and fingerprint augmented
with Apriori algorithm was implemented on Federal polytechnic Ilaro, Ogun state local area
network. PHP was used to design security application program and Jquery and MySQL were also
used to allow communication between user and administrator. All users registered with their detail
information such as name, sex, department, phone number, email address and fingerprint as it is
shown in figure 5.
FIGURE 5: Biometric Fingerprint for Identification.
Server
Client1 Client2 Client3 Client4 Client5
User: registration &
protection of
messages with
encryption key &
fingerprint
Encryption key
Administrator: validation &
Decryption process
Encryption &
Decryption
Keys
Mudasiru Hammed & Jumoke Soyemi
International Journal of Computer Science and Security (IJCSS), Volume (13) : Issue (3) : 2019 97
FIGURE 5.1: Registration Module.
The encryption key ( Ae ) is given to only successfully registered users as is shown in figure 6
while pair of that key ( Be ) will be kept with the administrator.
FIGURE 6: Generation of Public Key.
Subsequently, the users used the pair of encryption key ( Ae ) to protect sensitive information such
as examination question papers, student results and other sensitive data before it is sent to the
administrator in the server through the network. The encryption process ensures that sensitive
data are delivered privately and makes it so hard for intruders to bypass as it is shown in figure 7.
Mudasiru Hammed & Jumoke Soyemi
International Journal of Computer Science and Security (IJCSS), Volume (13) : Issue (3) : 2019 98
FIGURE 7: Encryption Process.
The fingerprint used in the study allows the administrator in the server to verify all the received
messages sent to the server to know whether it comes from the right user (registered user). The
Apriori algorithm was implemented to verify the sender’s fingerprint, if the sender is one of the
registered users in the system, it will automatically display the user’s information. After the identity
of the sender has been confirmed, the administrator will use its private key ( Ad ) to decrypt all the
received messages as it shown in figure 8 and 9. But any sent message that its source cannot be
verified (does not come from the registered user) will not be decrypted. The fingerprint
augmented with Apriori algorithm ensured that identity of any message must be verified.
FIGURE 8: Cipher-text Message Received from Administrator.
FIGURE 9: Decryption Messages.
Mudasiru Hammed & Jumoke Soyemi
International Journal of Computer Science and Security (IJCSS), Volume (13) : Issue (3) : 2019 99
The validity of RSA public encryption system and biometric fingerprint augmented with Apriori
algorithm for preventing information leakages was tested using institutional local area network.
One of the threats tried during testing include but not limited to messages sent by unregistered
users and the messages were neither decrypted nor lost but were all privately delivered. The
developed system achieved high degree of security making it difficult for intruders or
eavesdroppers to intercept valuable data such as examination question and the students’ results.
Public key encryption system and fingerprint augmented with Apriori algorithm improves security
mechanism for preventing information leakage in an open network. Apriori algorithm was used as
a fingerprint detection technique instead of biometric fingerprint techniques that requires
additional hardware to detect fingerprint.
5. CONCLUSION
Public encryption key and Fingerprint augmented with Apriori algorithm used here, guarantees
enough security mechanism for preventing information leakages and unauthorized users. The
students and any unauthorized staff cannot gain access to sensitive information such as
examination question papers and student examination results before formal release of the results.
These two techniques gained a high level of security mechanism for securing information with
high degree of accuracy and reliability. The algorithms employed in the work enhanced the
performance and security aspect of the system. Several studies have used public key encryption
system to secure information and data, but to verify the identity of the message before it is
decrypted has always been a great challenge. This study used biometric fingerprint to verify the
identity of the message before it is decrypted, with the augmented Apriori algorithm overcoming
the biometric fingerprint short comings by removing additional hardware for information analysis
which gets quite slow with increase in population.
FUTURE WORK
The system developed in this study was tested with the Institution’s local area network which is a
closed network. There is need to increase the scalability of the system by developing a system
that works with open network.
6. REFERENCES
[1] H. Dinne, K. Mandava. Two Way Mobile Authentication System. MA Blekinge Institute of
Technology: Karlskrona, Sweden. 2010.
[2] R. Sinha, C. Choudhary. “Information leak detection system using fingerprint of data”,
International Journal on Recent and Innovation Trends in Computing and Communication,
vol. 2, no. 12, pp. 3911-, 2014.
[3] A. Patel, R. Kansara and P. Virpari. “A Novel Architecture for Intrusion Detection in Mobile
Ad hoc Network”. International Journal of Advanced Computer Science and Applications, pp.
68-71.
[4] S. Nandita. “Designing of Hybrid RSA Encryption Algorithm for Cloud Security”. International
Journal of Innovative Research in Computer and Communication Engineering, vol. 3, no. 5,
pp. 4146-4152, 2015.
[5] L. Paul, M.N. Anilkumar. “Authentication for Online Voting Using Steganography and
Biometrics”. International Journal of Advanced Research in Computer Engineering &
Technology, vol. 5, no. 10, pp. 26–32, 2012.
[6] A. Singh, R. Gilhotra. “Data security using private key encryption system based on
arithmetic coding”. International Journal of Network Security & Its Applications (IJNSA), vol.
3, no. 3, pp. 58-67, 2011.
Mudasiru Hammed & Jumoke Soyemi
International Journal of Computer Science and Security (IJCSS), Volume (13) : Issue (3) : 2019 100
[7] S.T. Vuong and P. Fu A security architecture and design for mobile intelligent agent
systems. ACM SIGAPP Applied Computing Review, vol. 9, no. 3, pp. 21-30, 2001.
[8] H.K. Al-Anie, M.A. Alia and A.A. Hnaif. “eVoting Protocol Based on Public-Key
Cryptography”. International Journal of Network Security & Its Applications (IJNSA), vol.
3, no. 4, pp. 87-98, 2011.
[9] H.B. Kekre and V.A. Bharadi. “Using Component Model for Interfacing Biometric Sensors to
Capture Multidimensional Feature”. International Journal of Intelligent Information
Technology Application, vol. 2, no. 6, pp. 279-285, 2009.
[10] A. Wiehe, T. Søndrol, O.K. Olsen and F. Skarderud. Attacking fingerprint sensors. Gjøvik
University College, 2004.
[11] N.Y. Goshwe. “Data encryption and decryption using RSA algorithm in a network
environment”. International Journal of Computer Science and Network Security (IJCSNS),
vol.13, no. 7, pp. 9-20, 2013.
[12] S. Kumar and M. Singh. “Design a secure electronic voting system using fingerprint
technique”. International Journal of Computer Science Issues (IJCSI), vol. 10, no. 4, pp.192-
202, 2013.
[13] N. Malwade, C. Patil, S. Chavan and S.Y. Raut. “Secure Online Voting System Proposed by
Biometrics and Steganography”. International Journal of Emerging Technology and
Advanced Engineering, 2013.
[14] Jean H G. Notes on RSA. University of Pennsylvania Scholarly Commons. 2010, pp. 329-
347.
[15] E.H. Han, G. Karypis and V. Kumar. Min-apriori: An algorithm for finding association rules in
data with continuous attributes. Department of Computer Science and Engineering,
University of Minnesota, Tech. Rep. 1997.

More Related Content

What's hot

AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORDAN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
IJNSA Journal
 
Cloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditabilityCloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditability
IGEEKS TECHNOLOGIES
 
Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Addressing Insider Threat using "Where You Are" as Fourth Factor AuthenticationAddressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Peter Choi
 
E0962833
E0962833E0962833
E0962833
IOSR Journals
 
Effectiveness of various user authentication techniques
Effectiveness of various user authentication techniquesEffectiveness of various user authentication techniques
Effectiveness of various user authentication techniques
IAEME Publication
 
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
Editor IJMTER
 
Aggregated proof based hierarchical authentication scheme for the internet of...
Aggregated proof based hierarchical authentication scheme for the internet of...Aggregated proof based hierarchical authentication scheme for the internet of...
Aggregated proof based hierarchical authentication scheme for the internet of...
Pvrtechnologies Nellore
 
IRJET- Crypto-Currencies How Secure are they?
IRJET- Crypto-Currencies How Secure are they?IRJET- Crypto-Currencies How Secure are they?
IRJET- Crypto-Currencies How Secure are they?
IRJET Journal
 
Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityCost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward security
Pvrtechnologies Nellore
 
MULTIMODAL BIOMETRIC AUTHENTICATION: SECURED ENCRYPTION OF IRIS USING FINGERP...
MULTIMODAL BIOMETRIC AUTHENTICATION: SECURED ENCRYPTION OF IRIS USING FINGERP...MULTIMODAL BIOMETRIC AUTHENTICATION: SECURED ENCRYPTION OF IRIS USING FINGERP...
MULTIMODAL BIOMETRIC AUTHENTICATION: SECURED ENCRYPTION OF IRIS USING FINGERP...
ijcisjournal
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
Nexgen Technology
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
Shakas Technologies
 
ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011prasanna9
 
Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityCost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward security
LeMeniz Infotech
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
SECURITY ANALYSIS ON PASSWORD AUTHENTICATION SYSTEM OF WEB PORTAL
SECURITY ANALYSIS ON PASSWORD AUTHENTICATION SYSTEM OF WEB PORTALSECURITY ANALYSIS ON PASSWORD AUTHENTICATION SYSTEM OF WEB PORTAL
SECURITY ANALYSIS ON PASSWORD AUTHENTICATION SYSTEM OF WEB PORTAL
cscpconf
 
Security Basics
Security BasicsSecurity Basics
Security Basics
ArchitecTerra Ltd.
 
Privacy - Preserving Reputation with Content Protecting Location Based Queries
Privacy - Preserving Reputation with Content Protecting Location Based QueriesPrivacy - Preserving Reputation with Content Protecting Location Based Queries
Privacy - Preserving Reputation with Content Protecting Location Based Queries
iosrjce
 
Architectural Layers of Internet of Things: Analysis of Security Threats and ...
Architectural Layers of Internet of Things: Analysis of Security Threats and ...Architectural Layers of Internet of Things: Analysis of Security Threats and ...
Architectural Layers of Internet of Things: Analysis of Security Threats and ...
Scientific Review SR
 
The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...
The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...
The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...
IJECEIAES
 

What's hot (20)

AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORDAN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
 
Cloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditabilityCloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditability
 
Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Addressing Insider Threat using "Where You Are" as Fourth Factor AuthenticationAddressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication
 
E0962833
E0962833E0962833
E0962833
 
Effectiveness of various user authentication techniques
Effectiveness of various user authentication techniquesEffectiveness of various user authentication techniques
Effectiveness of various user authentication techniques
 
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
 
Aggregated proof based hierarchical authentication scheme for the internet of...
Aggregated proof based hierarchical authentication scheme for the internet of...Aggregated proof based hierarchical authentication scheme for the internet of...
Aggregated proof based hierarchical authentication scheme for the internet of...
 
IRJET- Crypto-Currencies How Secure are they?
IRJET- Crypto-Currencies How Secure are they?IRJET- Crypto-Currencies How Secure are they?
IRJET- Crypto-Currencies How Secure are they?
 
Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityCost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward security
 
MULTIMODAL BIOMETRIC AUTHENTICATION: SECURED ENCRYPTION OF IRIS USING FINGERP...
MULTIMODAL BIOMETRIC AUTHENTICATION: SECURED ENCRYPTION OF IRIS USING FINGERP...MULTIMODAL BIOMETRIC AUTHENTICATION: SECURED ENCRYPTION OF IRIS USING FINGERP...
MULTIMODAL BIOMETRIC AUTHENTICATION: SECURED ENCRYPTION OF IRIS USING FINGERP...
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
 
ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011
 
Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityCost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward security
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
SECURITY ANALYSIS ON PASSWORD AUTHENTICATION SYSTEM OF WEB PORTAL
SECURITY ANALYSIS ON PASSWORD AUTHENTICATION SYSTEM OF WEB PORTALSECURITY ANALYSIS ON PASSWORD AUTHENTICATION SYSTEM OF WEB PORTAL
SECURITY ANALYSIS ON PASSWORD AUTHENTICATION SYSTEM OF WEB PORTAL
 
Security Basics
Security BasicsSecurity Basics
Security Basics
 
Privacy - Preserving Reputation with Content Protecting Location Based Queries
Privacy - Preserving Reputation with Content Protecting Location Based QueriesPrivacy - Preserving Reputation with Content Protecting Location Based Queries
Privacy - Preserving Reputation with Content Protecting Location Based Queries
 
Architectural Layers of Internet of Things: Analysis of Security Threats and ...
Architectural Layers of Internet of Things: Analysis of Security Threats and ...Architectural Layers of Internet of Things: Analysis of Security Threats and ...
Architectural Layers of Internet of Things: Analysis of Security Threats and ...
 
The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...
The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...
The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...
 

Similar to Information Leakage Prevention Using Public Key Encryption System and Fingerprint Augmented with Apriori Algorithm

Implementing High Grade Security in Cloud Application using Multifactor Auth...
Implementing High Grade Security in Cloud  Application using Multifactor Auth...Implementing High Grade Security in Cloud  Application using Multifactor Auth...
Implementing High Grade Security in Cloud Application using Multifactor Auth...
IJwest
 
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET Journal
 
AnevaluationofsecurestorageofauthenticationdataIJISR.pdf
AnevaluationofsecurestorageofauthenticationdataIJISR.pdfAnevaluationofsecurestorageofauthenticationdataIJISR.pdf
AnevaluationofsecurestorageofauthenticationdataIJISR.pdf
tonkung6
 
A Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile SystemA Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile SystemEditor IJCATR
 
Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...
IOSR Journals
 
Douglas2018 article an_overviewofsteganographytechn (1)
Douglas2018 article an_overviewofsteganographytechn (1)Douglas2018 article an_overviewofsteganographytechn (1)
Douglas2018 article an_overviewofsteganographytechn (1)
lakshmi.ec
 
Securing Cloud Using Fog: A Review
Securing Cloud Using Fog: A ReviewSecuring Cloud Using Fog: A Review
Securing Cloud Using Fog: A Review
IRJET Journal
 
Cyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David BundoCyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David Bundo
hdbundo
 
Kx3518741881
Kx3518741881Kx3518741881
Kx3518741881
IJERA Editor
 
1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsC1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsC
SantosConleyha
 
1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsC1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsC
AbbyWhyte974
 
Secure Supervised Learning-Based Smart Home Authentication Framework
Secure Supervised Learning-Based Smart Home Authentication FrameworkSecure Supervised Learning-Based Smart Home Authentication Framework
Secure Supervised Learning-Based Smart Home Authentication Framework
IJCNCJournal
 
Secure Supervised Learning-Based Smart Home Authentication Framework
Secure Supervised Learning-Based Smart Home Authentication FrameworkSecure Supervised Learning-Based Smart Home Authentication Framework
Secure Supervised Learning-Based Smart Home Authentication Framework
IJCNCJournal
 
Secure Supervised Learning-Based Smart Home Authentication Framework
Secure Supervised Learning-Based Smart Home Authentication FrameworkSecure Supervised Learning-Based Smart Home Authentication Framework
Secure Supervised Learning-Based Smart Home Authentication Framework
IJCNCJournal
 
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...
ijait
 
I want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfI want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdf
amitkhanna2070
 
Target Unncryption Case Study
Target Unncryption Case StudyTarget Unncryption Case Study
Target Unncryption Case Study
Evelyn Donaldson
 
Bio metrics in secure e transaction
Bio metrics in secure e transactionBio metrics in secure e transaction
Bio metrics in secure e transaction
IJARIIT
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computingAlexander Decker
 

Similar to Information Leakage Prevention Using Public Key Encryption System and Fingerprint Augmented with Apriori Algorithm (20)

Implementing High Grade Security in Cloud Application using Multifactor Auth...
Implementing High Grade Security in Cloud  Application using Multifactor Auth...Implementing High Grade Security in Cloud  Application using Multifactor Auth...
Implementing High Grade Security in Cloud Application using Multifactor Auth...
 
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
 
AnevaluationofsecurestorageofauthenticationdataIJISR.pdf
AnevaluationofsecurestorageofauthenticationdataIJISR.pdfAnevaluationofsecurestorageofauthenticationdataIJISR.pdf
AnevaluationofsecurestorageofauthenticationdataIJISR.pdf
 
A Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile SystemA Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile System
 
Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...
 
Douglas2018 article an_overviewofsteganographytechn (1)
Douglas2018 article an_overviewofsteganographytechn (1)Douglas2018 article an_overviewofsteganographytechn (1)
Douglas2018 article an_overviewofsteganographytechn (1)
 
Securing Cloud Using Fog: A Review
Securing Cloud Using Fog: A ReviewSecuring Cloud Using Fog: A Review
Securing Cloud Using Fog: A Review
 
Cyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David BundoCyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David Bundo
 
Kx3518741881
Kx3518741881Kx3518741881
Kx3518741881
 
1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsC1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsC
 
1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsC1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsC
 
Secure Supervised Learning-Based Smart Home Authentication Framework
Secure Supervised Learning-Based Smart Home Authentication FrameworkSecure Supervised Learning-Based Smart Home Authentication Framework
Secure Supervised Learning-Based Smart Home Authentication Framework
 
Secure Supervised Learning-Based Smart Home Authentication Framework
Secure Supervised Learning-Based Smart Home Authentication FrameworkSecure Supervised Learning-Based Smart Home Authentication Framework
Secure Supervised Learning-Based Smart Home Authentication Framework
 
Secure Supervised Learning-Based Smart Home Authentication Framework
Secure Supervised Learning-Based Smart Home Authentication FrameworkSecure Supervised Learning-Based Smart Home Authentication Framework
Secure Supervised Learning-Based Smart Home Authentication Framework
 
Security.pptx
Security.pptxSecurity.pptx
Security.pptx
 
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...
 
I want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfI want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdf
 
Target Unncryption Case Study
Target Unncryption Case StudyTarget Unncryption Case Study
Target Unncryption Case Study
 
Bio metrics in secure e transaction
Bio metrics in secure e transactionBio metrics in secure e transaction
Bio metrics in secure e transaction
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing
 

Recently uploaded

FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 

Information Leakage Prevention Using Public Key Encryption System and Fingerprint Augmented with Apriori Algorithm

  • 1. Mudasiru Hammed & Jumoke Soyemi International Journal of Computer Science and Security (IJCSS), Volume (13) : Issue (3) : 2019 90 Information Leakage Prevention Using Public Key Encryption System and Fingerprint Augmented with Apriori Algorithm Mudasiru Hammed tundemuhammedy2k@yahoo.com Department of Computer Science The Federal Polytechnic, Ilaro Ogun State, Nigeria Jumoke Soyemi jumoke.soyemi@federalpolyilaro.edu.ng Department of Computer Science The Federal Polytechnic, Ilaro Ogun State, Nigeria Abstract The increase in the use of the internet around the world provided easier way of communication and information sharing that has led to the huge challenge of data leakage on the network. In an academic environment such as higher institutions of learning, the need to ensure that access to data and sensitive information are given to authorized users become imperative. However, this is not always the case as security bridges are often experienced. This study proposed a RSA public key encryption system and biometric fingerprint augmented with Apriori algorithm to prevent information leakages. The fingerprint verifies the identity of the owner of incoming message and the Apriori algorithm is used as the detection system instead of biometric that requires additional hardware for detecting fingerprint. This study developed a system based on the proposed algorithm. The developed system was tested on Federal Polytechnic, Ilaro local area network achieving a high level of security that prevents interception of valuable data by intruders or eavesdroppers. The system developed RSA public key encryption and fingerprint augmented with Apriori algorithm thus provided the required security mechanism that prevents information leakage in a public environment. Keywords: Information, RSA Public Encryption Algorithms, Biometric Fingerprint, Apriori Algorithm. 1. INTRODUCTION The increase in the use of the internet all over the world made internet-based services very popular thus making the sharing of information and communication much easier. This drastic rise in the use of network-based systems has rendered cyber security systems outdated because there is a rise in the activities of hackers and attackers using sophisticated methods such as phishing and spoofing. Therefore, the need to ascertain that authorized users and clients are the only one with access to both secure and sensitive information. The availability of tools such as the web tool, make credentials stealing and system cracking easier to achieve [1]. Data leakage is a frequent occurrence when dealing with confidential information detailing customer data, bank details, source code, design specifications and examination question paper. When such information leaks, the party concerned becomes insecure. Sharing data required an efficient asymmetric key encryption algorithm for preventing unauthorized user to gain access to vital information [2]. A number of research works in this area of study have been done to provide security in communication and sharing of data over network. These includes studies [3,4,5]. Tracing out data leakage among system users could prove very difficult for system administrator thus creating ethical issues in the working environment. Therefore, preventing information leakage is immensely advantageous than information leak detection.
  • 2. Mudasiru Hammed & Jumoke Soyemi International Journal of Computer Science and Security (IJCSS), Volume (13) : Issue (3) : 2019 91 This study proposed RSA public key encryption scheme that is more suitable for providing a security mechanism for tampering activities in exchanging information over the network and also incorporated fingerprint techniques augmented wih Apriori algorithm. This algorithm verifies the identity of an incoming message and the identity of the user sending the message which could be a panacea for spoofing attack. Apriori algorithm is a detection system that is embedded into administrator’s server to verify the user generated fingerprints against fingerprints and details information obtained from the user during the registration. 2. LITERATURE REVIEW There are various approaches for preventing sensitive data from unauthorized parties either to disclose or to modify communication between two parties. Among these approaches are cryptography, steganography, biometric, digital watermarking, digital signature and others. Cryptography and biometric however, are good at addressing threats, such as; information disclosure, tampering and spoofing. They form the foundation for all other aspects of information security. 2.1 Cryptography Cryptographic schemes are grouped into symmetric (private key) cryptography and asymmetric cryptography [6]. In private encryption scheme, encryption must be equal to decryption key ( e d ). However, malicious third party could work their way into intercepting the messages and gain access to sensitive information. Some could disclose or modify the information. Also eavesdropper are likely to be able to figure out the "secret key” except the secret key is securely exchanged [7]. It is obvious that RSA public key encryption technique is widely used because according to [8], there is a pair of keys, one which is known as the public key for the encryption of the plaintext that is meant to be sent and the other key known as private key. This private key is sent to the receiver for the purpose of message decryption. 2.2 Biometric The biometric authentication works by scanning the user’s characteristics such as finger print and eye retina and store information in the database in form of strings. Authentication of a user is achieved by matching the scanned data with that of the database with access granted based on the detection of commonalities [9]. However, Biometric authentication is good when limited applications are involved. Apart from the fact that the system slows down with large number of users, it also requires further hardware to detect the fingerprints and eye retinas. Fingerprints, however, can be spoofed simply by using common materials such as gelatin, silicone, and wood glue [10]. 2.3 Apriori Algorithm Apriori algorithm is the association analysis used to discover what is commonly called association rules. The algorithm looks at the possibilities of having items that are associated together in the transactional databases, with the support threshold and then identifies the recurrent item sets. The confidence threshold on the other hand uses restrictive probability that an item appear together in a transaction when another item appears, to locate association rules. This algorithm can be a potential strategy for detecting fake fingerprint without any additional hardware. 2.4 Related Work Many research work proposed RSA public key encryption system for different purposes such as e-voting system, agent technology, electronic commerce and other sensitive data that needed to be prevented from unauthorized parties. Hybrid RSA Encryption Algorithm for Cloud Security was proposed by [4]. The study discovered that data decryption with hybrid RSA encryption algorithm is difficult to achieve when data transfer in the cloud system is applied. However, this hybrid encryption cannot ensure data transmission through secured protocol and it cannot also verify who the user is.
  • 3. Mudasiru Hammed & Jumoke Soyemi International Journal of Computer Science and Security (IJCSS), Volume (13) : Issue (3) : 2019 92 Study [2] proposed information leakage detection system using fingerprint data. This method generated fingerprint and token ID that are available in the database. The idea is to eliminate types of phrases from the fingerprinting process. Types of phrases are identified by looking at available public documents of the organization that is to be protected from information leakage and different phrases are identified with the help of databases. This process is only used for text file and if the text file contains some unicode characters in such cases, this process cannot give correct result. In study [11], data encryption and decryption with RSA algorithm in a network environment was proposed. The algorithm allowed message senders to generate public keys to encrypt messages and the receivers’ generated private keys using secured databases. An incorrect private key was able to decrypt the encrypted message but to a form that is different from the original message. An eavesdropper that breaks into the message will return a meaningless message despite the fact that the system cannot verify who the user is. Study [12], developed an electronic voting system that used fingerprint technique. This technique took account of fake human thumb impression and separated out the authentic minutiae regions. The regions were subsequently extracted and used not only as user access control identity to the system but also to vote in the electoral process. The system developed was able to nullify multiple vote casting and provided election results collation process that is more accurate and secured authentication mechanism for voters. However, the cost of providing the special hardware device to implement biometrics enrolment and authentication was not considered. The possibility of providing the sensor with fake physical biometric could prove a security threat to the system. Study [13] presented an online voting system using steganography and biometrics. The voters used their fingerprint which has been pre-enrolled to access the voting machine. The usage of anatomical traits rather than behavioral attributes further created more secured and acceptable voters registration system, because the fingerprint is unique, distinct, universal, and not easily damaged for every individual. Additional hardware is required to detect fingerprints. Fingerprints, in particular, can be easily spoofed from common materials. In our study, the combination of RSA public encryption system and biometric fingerprint augmented with Apriori algorithm to prevent information leakages is proposed. This system ensures secured data transmission and also verifies who the user is and provides better way of securing data and information. 3. MATERIALS AND METHODS This study focused on three processes which include: RSA key generation process, Encryption process, Validation and Decryption process. 3.1 RSA Key Generation Process The use of encryption key requires every individual user to register with details information such as Name, Sex. Occupation, Level, Department, Marital status, E-mail, Phone number and their Fingerprint. The server stores the information and generate encryption key for the user in order to maintain user’s account in the database. Figure 1 shows the encryption key generation process and Algorithm 1 shows RSA key generation described in [15] for the administrator to generate both public key and private key. The encryption key is made known to all users while the decryption key is kept secret to only administrator to decrypt any message sent by the users. Algorithm 1: RSA Key Generation [14] Administrator creates two different large and appropriately random primes, Ap and Aq which are kept secret.
  • 4. Mudasiru Hammed & Jumoke Soyemi International Journal of Computer Science and Security (IJCSS), Volume (13) : Issue (3) : 2019 93 Administrator calculates A A Am p q . The number known as the modulo is made public Administrator selects randomly some Ae , with 1 ( 1)( 1)A A Ae p q    , making gcd( ,( 1)( 1)) 1A A Ae p q   . This number Ae is known as the encryption key which is made available to the user. Administrator calculates the inverse, 1 A Ad e  modulo Am , of Ae . This number is kept secret. The pair ( , )A Ad m is Administrator’s private key and Ad is called the decryption key. The private key will be used to decrypt any message received by the administrator. Administrator publishes the pair ( , )A Ae m as his public key FIGURE 1: Encryption Key Generation Process. 3.2 RSA Encryption Process For a user to send any sensitive information or document on the network, it has to be encrypted with the generated public key and fingerprint which verifies the identity of individual users. Once the information is encrypted, even the user can no longer decrypt the encrypted copy because there would not be private key to decrypt it. Algorithm 2 depicts the encryption algorithm. Algorithm 2: Encryption Algorithm Step 1: Obtained Administrator’s public key ( , )A Ae m Step 2: Take plaintext to be a positive integer M, where 0 AM m  Step 3: Calculate the cipher text mode AC M m Step 4: Send the cipher text C to Administrator The user use the algorithm 2 to convert plain text QBASICQUESTIONFORND to cipher text 12%&#345@!344!!@#27$*@24579#$$%&*#% 3.3 Validation Process When an administrator receives the encrypted message like this; 12%&#345@!344!!@#27$*@24579#$$%&*#%, the identity of the sender has to be verified with the aid of Apriori algorithm by matching the sender fingerprint with the fingerprint already stored during the registration. The fingerprint extractor uses minutiae points and wrinkles features, any Start Input information details such as name, sex, occupation and fingerprint etc. Store the details information and generate the encryption key Stop
  • 5. Mudasiru Hammed & Jumoke Soyemi International Journal of Computer Science and Security (IJCSS), Volume (13) : Issue (3) : 2019 94 extracted feature information is a template. This template is always comparing with newly presented extracted feature information using apriori algorithm. If commonality is not achieved, the system will automatically give error, but if commonality is achieved, the system will display user’s information. Apriori also compares the template to all enrolled users to ensure that there is no similar template. If any similar template is found then the system will automatically give error and such user will never be activated. The algorithm 3 is Apriori algorithm described in [16]. Algorithm 3 Assuming the user’s generated fingerprint is taken as X and the fingerprint obtained during the registration is Y. It means X and Y are conjunctions of attribute value-pairs, and s (for support) is the probability that X and Y appear together in a database and c (for confidence) is the conditional probability that X appears in a database when Y is present. The association rule X→Y is interpreted as data set that satisfies the conditions in X and also likely to satisfy the conditions in Y. This can be written as follows: ( )s X Y for support rule to make decision when finding relationship between two fingerprints ( )c X Y for confidence rule to measure the reliability of decision made FIGURE 2: Architecture for Fingerprint Detection System. Rule Engine: uses IF/THEN to find relationship between two fingerprints Inference Engine: Decision point based on support strategy Measure’s Engine: It measures the reliability of decision based on confidence strategy Fingerprint Repository
  • 6. Mudasiru Hammed & Jumoke Soyemi International Journal of Computer Science and Security (IJCSS), Volume (13) : Issue (3) : 2019 95 The step 5 of algorithm 3 performs the following operations; (i) Fingerprint Generation: this operation generates user’s fingerprint and matches it with the already stored fingerprint. (ii) Fingerprint pruning: This operation eliminates any fingerprint using the support-based pruning strategy The flow flowchart in figure 3 depicts validation process to verify the identity of the incoming message before it is decrypted. FIGURE 3: Flowchart of Validation Process. 3.4 RSA Decryption Process After the identity of the message owner has been verified, the administrator will proceed to extract plain text Y from cipher text C, that is, 12%&#345@!344!!@#27$*@24579#$$%&*#% which will be converted back to QBASICQUESTIONFORND. Administrator follows steps in algorithm 4 to know the content of cipher text C. Algorithm 4 Step 1: Obtained the cipher text C from user Step 2: Administrator uses his private key ( , )A Ad m to compute modd AM C m The two processes (encryption and decryption) allow both sender (administrator) and the receivers (lecturers) to communicate in a secured manner and the figure 4 depicts system architecture. Yes No Start Is commonality realized between the fingerprints? Display the user’s details & decrypt the message Stop
  • 7. Mudasiru Hammed & Jumoke Soyemi International Journal of Computer Science and Security (IJCSS), Volume (13) : Issue (3) : 2019 96 FIGURE 4: System Architecture. 4. RESULT AND DISCUSSION Prevention of information leakage using public key encryption system and fingerprint augmented with Apriori algorithm was implemented on Federal polytechnic Ilaro, Ogun state local area network. PHP was used to design security application program and Jquery and MySQL were also used to allow communication between user and administrator. All users registered with their detail information such as name, sex, department, phone number, email address and fingerprint as it is shown in figure 5. FIGURE 5: Biometric Fingerprint for Identification. Server Client1 Client2 Client3 Client4 Client5 User: registration & protection of messages with encryption key & fingerprint Encryption key Administrator: validation & Decryption process Encryption & Decryption Keys
  • 8. Mudasiru Hammed & Jumoke Soyemi International Journal of Computer Science and Security (IJCSS), Volume (13) : Issue (3) : 2019 97 FIGURE 5.1: Registration Module. The encryption key ( Ae ) is given to only successfully registered users as is shown in figure 6 while pair of that key ( Be ) will be kept with the administrator. FIGURE 6: Generation of Public Key. Subsequently, the users used the pair of encryption key ( Ae ) to protect sensitive information such as examination question papers, student results and other sensitive data before it is sent to the administrator in the server through the network. The encryption process ensures that sensitive data are delivered privately and makes it so hard for intruders to bypass as it is shown in figure 7.
  • 9. Mudasiru Hammed & Jumoke Soyemi International Journal of Computer Science and Security (IJCSS), Volume (13) : Issue (3) : 2019 98 FIGURE 7: Encryption Process. The fingerprint used in the study allows the administrator in the server to verify all the received messages sent to the server to know whether it comes from the right user (registered user). The Apriori algorithm was implemented to verify the sender’s fingerprint, if the sender is one of the registered users in the system, it will automatically display the user’s information. After the identity of the sender has been confirmed, the administrator will use its private key ( Ad ) to decrypt all the received messages as it shown in figure 8 and 9. But any sent message that its source cannot be verified (does not come from the registered user) will not be decrypted. The fingerprint augmented with Apriori algorithm ensured that identity of any message must be verified. FIGURE 8: Cipher-text Message Received from Administrator. FIGURE 9: Decryption Messages.
  • 10. Mudasiru Hammed & Jumoke Soyemi International Journal of Computer Science and Security (IJCSS), Volume (13) : Issue (3) : 2019 99 The validity of RSA public encryption system and biometric fingerprint augmented with Apriori algorithm for preventing information leakages was tested using institutional local area network. One of the threats tried during testing include but not limited to messages sent by unregistered users and the messages were neither decrypted nor lost but were all privately delivered. The developed system achieved high degree of security making it difficult for intruders or eavesdroppers to intercept valuable data such as examination question and the students’ results. Public key encryption system and fingerprint augmented with Apriori algorithm improves security mechanism for preventing information leakage in an open network. Apriori algorithm was used as a fingerprint detection technique instead of biometric fingerprint techniques that requires additional hardware to detect fingerprint. 5. CONCLUSION Public encryption key and Fingerprint augmented with Apriori algorithm used here, guarantees enough security mechanism for preventing information leakages and unauthorized users. The students and any unauthorized staff cannot gain access to sensitive information such as examination question papers and student examination results before formal release of the results. These two techniques gained a high level of security mechanism for securing information with high degree of accuracy and reliability. The algorithms employed in the work enhanced the performance and security aspect of the system. Several studies have used public key encryption system to secure information and data, but to verify the identity of the message before it is decrypted has always been a great challenge. This study used biometric fingerprint to verify the identity of the message before it is decrypted, with the augmented Apriori algorithm overcoming the biometric fingerprint short comings by removing additional hardware for information analysis which gets quite slow with increase in population. FUTURE WORK The system developed in this study was tested with the Institution’s local area network which is a closed network. There is need to increase the scalability of the system by developing a system that works with open network. 6. REFERENCES [1] H. Dinne, K. Mandava. Two Way Mobile Authentication System. MA Blekinge Institute of Technology: Karlskrona, Sweden. 2010. [2] R. Sinha, C. Choudhary. “Information leak detection system using fingerprint of data”, International Journal on Recent and Innovation Trends in Computing and Communication, vol. 2, no. 12, pp. 3911-, 2014. [3] A. Patel, R. Kansara and P. Virpari. “A Novel Architecture for Intrusion Detection in Mobile Ad hoc Network”. International Journal of Advanced Computer Science and Applications, pp. 68-71. [4] S. Nandita. “Designing of Hybrid RSA Encryption Algorithm for Cloud Security”. International Journal of Innovative Research in Computer and Communication Engineering, vol. 3, no. 5, pp. 4146-4152, 2015. [5] L. Paul, M.N. Anilkumar. “Authentication for Online Voting Using Steganography and Biometrics”. International Journal of Advanced Research in Computer Engineering & Technology, vol. 5, no. 10, pp. 26–32, 2012. [6] A. Singh, R. Gilhotra. “Data security using private key encryption system based on arithmetic coding”. International Journal of Network Security & Its Applications (IJNSA), vol. 3, no. 3, pp. 58-67, 2011.
  • 11. Mudasiru Hammed & Jumoke Soyemi International Journal of Computer Science and Security (IJCSS), Volume (13) : Issue (3) : 2019 100 [7] S.T. Vuong and P. Fu A security architecture and design for mobile intelligent agent systems. ACM SIGAPP Applied Computing Review, vol. 9, no. 3, pp. 21-30, 2001. [8] H.K. Al-Anie, M.A. Alia and A.A. Hnaif. “eVoting Protocol Based on Public-Key Cryptography”. International Journal of Network Security & Its Applications (IJNSA), vol. 3, no. 4, pp. 87-98, 2011. [9] H.B. Kekre and V.A. Bharadi. “Using Component Model for Interfacing Biometric Sensors to Capture Multidimensional Feature”. International Journal of Intelligent Information Technology Application, vol. 2, no. 6, pp. 279-285, 2009. [10] A. Wiehe, T. Søndrol, O.K. Olsen and F. Skarderud. Attacking fingerprint sensors. Gjøvik University College, 2004. [11] N.Y. Goshwe. “Data encryption and decryption using RSA algorithm in a network environment”. International Journal of Computer Science and Network Security (IJCSNS), vol.13, no. 7, pp. 9-20, 2013. [12] S. Kumar and M. Singh. “Design a secure electronic voting system using fingerprint technique”. International Journal of Computer Science Issues (IJCSI), vol. 10, no. 4, pp.192- 202, 2013. [13] N. Malwade, C. Patil, S. Chavan and S.Y. Raut. “Secure Online Voting System Proposed by Biometrics and Steganography”. International Journal of Emerging Technology and Advanced Engineering, 2013. [14] Jean H G. Notes on RSA. University of Pennsylvania Scholarly Commons. 2010, pp. 329- 347. [15] E.H. Han, G. Karypis and V. Kumar. Min-apriori: An algorithm for finding association rules in data with continuous attributes. Department of Computer Science and Engineering, University of Minnesota, Tech. Rep. 1997.