IJSRSET calls volunteers interested to contribute towards the scientific development in the field of Science, Engineering and Technology

Home > IJSRSET173155                                                     


Secure End Point Data Security Using Java Application Programming Interface

Authors(3):

Peter S. Nyakomitta, Dr. Solomon Ogara, Dr. Silvance O. Abeka
  • Abstract
  • Authors
  • Keywords
  • References
  • Details
Most of the current instant messaging applications such as Telegram Secret Chat transmit packets in plain text. This means that an intruder equipped with appropriate remote monitoring tools can sniff the packets being transmitted and obtain the raw packets that are being relayed across the network. However, some of them like Whatsapp and Facebook Messenger have embraced end-to-end encryption. In so doing, this encryption protects this data as it is being passed from one device to another over communication channels. Effectively, this prevents potential eavesdroppers such as telecommunication service providers, Internet service providers or the provider of the communication service from being able to access the cryptographic keys needed to decrypt the conversation. However, most messaging applications encrypt data but only between the user and the companies' servers. The consequence of this is that the service providers can pry open the data being passed across their network data anytime and access the information being passed between the communicating parties. This paper sought to develop a port-based algorithm for packet encapsulation in instant messaging sessions. This is in realization of the fact that even with end to end encryption, the instant messages are in plain text at the communicating devices. This means that eavesdropping can still happen if these instant messages are read by people other than the ones for which the communication was meant. A prototype instant messenger application was developed with end to end encryption in place, as well as message encryption at the end devices. In this way, only a party that has a decryption key can read the transmitted messages.

Peter S. Nyakomitta, Dr. Solomon Ogara, Dr. Silvance O. Abeka

Instant Messaging, packets, Whatsapp, Facebook Massager, Skype, Eavesdroppers, Port-based algorithm

  1. Wendy (2013). ZDNet UK; Instant messaging boosts business.
  2. Neal (2014). Semantic Security Response; Threats to Instant Messaging.
  3. Nardi, S. Whittaker, E. Bradner (2012). Interaction and outeraction: instant messaging in action. Proceedings of the ACM Conference on Computer Supported Cooperative Work, Philadelphia, Pennsylvania, USA
  4. Vleck (2015) . Instant Messaging on CTSS and Multics. Multicians.org.
  5. Schiano, C. Kamm (2013). The character, functions and styles of instant messaging in the workplace. Proceedings of the ACM Conference on Computer Supported Cooperative Work , New Orleans, Louisiana, USA.
  6. Roberts (2015). IDG News Service; MSN Messenger Worm Steals Game Keys W32/Rodok-A or Henpeck worm used via IM, then plant trojan to lift game.
  7. Sanchez, J., (2014). Malicious Threats, Vulnerabilities and Defenses in WhatsApp and Mobile Instant Messaging Platforms.
  8. Mahajan, A., Dahiya, M., Sanghvi, H., (2013). Forensic Analysis of Instant Messenger Applications on Android Devices. Int. J. Comput. Appl. 68, 38–44.
  9. Anglano, C.,( 2014). Forensic analysis of WhatsApp Messenger on Android smartphones. Digit. Investig. 11, 201–213.
  10. Barghuthi, N.B. Al, Said, H., (2013). Social Networks IM Forensics: Encryption Analysis. J. Commun. 8.
  11. Bodriagov, O., Buchegger, S.(2011). Encryption for peer-to-peer social networks. In: Proceedings - IEEE International Conference on Privacy, Security, Risk and Trust and IEEE International Conference on Social Computing, PASSAT/SocialCom 2011. pp. 1302–1309.
  12. Ricochet P. (2014). Anonymous and serverless instant messaging that just works.
  13. Yusof, M.K., Abidin, A.F.A., (2011). A secure private instant messenger. In: 17th Asia-Pacific Conference on Communications.

Publication Details

Published in : Volume 3 | Issue 1 | January-February - 2017
Date of Publication Print ISSN Online ISSN
2017-02-28 2395-1990 2394-4099
Page(s) Manuscript Number   Publisher
243-251 IJSRSET173155   Technoscience Academy

Cite This Article

Peter S. Nyakomitta, Dr. Solomon Ogara, Dr. Silvance O. Abeka, "Secure End Point Data Security Using Java Application Programming Interface", International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 3, Issue 1, pp.243-251, January-February-2017.
URL : http://ijsrset.com/IJSRSET173155.php