{"title":"数据安全使用认证的加密和解密算法的Android手机","authors":"A. Vichare, T. Jose, Jagruti Tiwari, U. Yadav","doi":"10.1109/CCAA.2017.8229903","DOIUrl":null,"url":null,"abstract":"With the growing number of mobile applications, secure storage of information is essential. A strong encryption system is required to protect the data stored in android phones at a maximum level. Traditional encryption schemes have the disadvantage that communication overheads and the computation costs are too high. And also there is a possibility that the data is lost after encryption. Hence, it is necessary to implement a “Data Encryption and Decryption” scheme with “Cloud Backup” feature which is more efficient in order to provide high level of data security for android phones. It is necessary to create means which will enable a user to encrypt confidential data present in the mobile phones. Decrypt it to recover the encrypted data. In case of brute force attack, user need not worry about losing the data as “Automatic encryption” is triggered. “Cloud Backup” is another mechanism to prevent the data from being known by an adversary. This paper proposes an Android Application which will provide the features of automatic encryption, data encryption/decryption, and cloud backup all in one single mobile application. AES −256 bit algorithm is used for this purpose. The sole purpose of using AES for encryption/decryption is that it is secure and has high computational complexity. Due to this the intruder will require comparatively more time to decrypt the data.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":"31 1","pages":"789-794"},"PeriodicalIF":0.0000,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Data security using authenticated encryption and decryption algorithm for Android phones\",\"authors\":\"A. Vichare, T. Jose, Jagruti Tiwari, U. Yadav\",\"doi\":\"10.1109/CCAA.2017.8229903\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the growing number of mobile applications, secure storage of information is essential. A strong encryption system is required to protect the data stored in android phones at a maximum level. Traditional encryption schemes have the disadvantage that communication overheads and the computation costs are too high. And also there is a possibility that the data is lost after encryption. Hence, it is necessary to implement a “Data Encryption and Decryption” scheme with “Cloud Backup” feature which is more efficient in order to provide high level of data security for android phones. It is necessary to create means which will enable a user to encrypt confidential data present in the mobile phones. Decrypt it to recover the encrypted data. In case of brute force attack, user need not worry about losing the data as “Automatic encryption” is triggered. “Cloud Backup” is another mechanism to prevent the data from being known by an adversary. This paper proposes an Android Application which will provide the features of automatic encryption, data encryption/decryption, and cloud backup all in one single mobile application. AES −256 bit algorithm is used for this purpose. The sole purpose of using AES for encryption/decryption is that it is secure and has high computational complexity. Due to this the intruder will require comparatively more time to decrypt the data.\",\"PeriodicalId\":6627,\"journal\":{\"name\":\"2017 International Conference on Computing, Communication and Automation (ICCCA)\",\"volume\":\"31 1\",\"pages\":\"789-794\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-05-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 International Conference on Computing, Communication and Automation (ICCCA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CCAA.2017.8229903\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Conference on Computing, Communication and Automation (ICCCA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCAA.2017.8229903","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Data security using authenticated encryption and decryption algorithm for Android phones
With the growing number of mobile applications, secure storage of information is essential. A strong encryption system is required to protect the data stored in android phones at a maximum level. Traditional encryption schemes have the disadvantage that communication overheads and the computation costs are too high. And also there is a possibility that the data is lost after encryption. Hence, it is necessary to implement a “Data Encryption and Decryption” scheme with “Cloud Backup” feature which is more efficient in order to provide high level of data security for android phones. It is necessary to create means which will enable a user to encrypt confidential data present in the mobile phones. Decrypt it to recover the encrypted data. In case of brute force attack, user need not worry about losing the data as “Automatic encryption” is triggered. “Cloud Backup” is another mechanism to prevent the data from being known by an adversary. This paper proposes an Android Application which will provide the features of automatic encryption, data encryption/decryption, and cloud backup all in one single mobile application. AES −256 bit algorithm is used for this purpose. The sole purpose of using AES for encryption/decryption is that it is secure and has high computational complexity. Due to this the intruder will require comparatively more time to decrypt the data.