ARTÍCULO
TITULO

Secure Data Travelling User using Hybrid Cryptosystem with User Privacy Protection

Anindya Dwi Putri Islamidina    
Amang Sudarsono    
Titon Dutono    

Resumen

Nowadays traveling is the activity that everyone likes the most, but sometimes there is one traveling member who is lost and confused looking for the location of the other members. When traveling, they must bring a smartphone because of its small size and easy to carry anywhere. For this reason, an Android-based smartphone application that is able to send GPS data to all travelling members is proposed. In order to secure data transmission, cryptography and group signature to ensure that only traveling members could find out the location are applied. We use hybrid cryptography, which is a combination of symmetric cryptography using AES and asymmetric cryptography using IB-mRSA. We also add group signature as verification that members are in the same traveling group. The test result showed that the proposed method is safer than the comparison method because the symmetric key is encrypted before the key is distributed, so the attacker can not know the key. The total processing time needed to send data until member get data is 2.01 s.

 Artículos similares

       
 
Vassilis Papaspirou, Maria Papathanasaki, Leandros Maglaras, Ioanna Kantzavelou, Christos Douligeris, Mohamed Amine Ferrag and Helge Janicke    
Despite the rapid development of technology, computer systems still rely heavily on passwords for security, which can be problematic. Although multi-factor authentication has been introduced, it is not completely effective against more advanced attacks. ... ver más
Revista: Information

 
Mohamed ElKashlan, Heba Aslan, Mahmoud Said Elsayed, Anca D. Jurcut and Marianne A. Azer    
The market for Electric Vehicles (EVs) has expanded tremendously as seen in the recent Conference of the Parties 27 (COP27) held at Sharm El Sheikh, Egypt in November 2022. This needs the creation of an ecosystem that is user-friendly and secure. Interne... ver más
Revista: Algorithms

 
Manal Rajeh AlShalaan and Suliman Mohamed Fati    
To address a business need, most organizations allow employees to use their own devices to enhance productivity and job satisfaction. For this purpose, the Bring Your Own Device (BYOD) policy provides controllable access for employees to organize data th... ver más
Revista: Information

 
Samia Masood Awan, Muhammad Ajmal Azad, Junaid Arshad, Urooj Waheed and Tahir Sharif    
The connected or smart environment is the integration of smart devices (sensors, IoT devices, or actuator) into the Internet of Things (IoT) paradigm, in which a large number of devices are connected, monitoring the physical environment and processes and... ver más
Revista: Information

 
Hyounhee Koo, Changho Ryoo and Wooseong Kim    
The growing significance of ubiquitous 6G connectivity within the maritime sector is a consequence of its evolution into an era characterized by the adoption of autonomous ships. This evolution necessitates the development of adaptable communication capa... ver más