This paper is published in Volume 3, Issue 3, 2018
Area
Mobile Computing
Author
V. Adithya
Co-authors
R. Ramya , D. Vignesh Kumar , M. Madava Krishnan
Org/Univ
Sree Sakthi Engineering College, Coimbatore, Tamil Nadu, India
Pub. Date
24 March, 2018
Paper ID
V3I3-1220
Publisher
Keywords
Mobile Computing, Encryption, Authentication, CSPRN, Graphical Authentication, Transmission.

Citationsacebook

IEEE
V. Adithya , R. Ramya , D. Vignesh Kumar , M. Madava Krishnan. Cloak Encryption in Apache, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARnD.com.

APA
V. Adithya , R. Ramya , D. Vignesh Kumar , M. Madava Krishnan (2018). Cloak Encryption in Apache. International Journal of Advance Research, Ideas and Innovations in Technology, 3(3) www.IJARnD.com.

MLA
V. Adithya , R. Ramya , D. Vignesh Kumar , M. Madava Krishnan. "Cloak Encryption in Apache." International Journal of Advance Research, Ideas and Innovations in Technology 3.3 (2018). www.IJARnD.com.

Abstract

The tremendous growth of mobile devices has a pre-generated new form of security flaws. The manifest-based permission in Android devices is one of the hefty security threats among all.We propose cloak protocol based encryption. We use exterior apache server for generating CSPRN and also we make use of the session id which will be very helpful in tracking user sessions and it will be difficult for the hackers to crack the file. For multiple user registrations, we define a new way of two-dimensional graphical authentications using a one-time password with the session ID to keep track of users. With this, the user can securely transceiver messages.
Paper PDF