A Comprehensive Model Driven ‘Secure Mobile Application for KFU Email System’ (SMAKE)

Document Type : Original Research (Full Papers)

Authors

1 Computer Science Department, 2 Electrical Engineering Department, King Faisal University, Al-Hasa 31982, Saudi Arabia

2 Tennessee State University, Computer and Information Systems Engineering Department, Nashville, TN, USA

Abstract

Nowadays, the development of innovative technology has emerged, particularly in mobile phones. People are often using smartphones daily in almost every aspect of their lives to use different applications and share various types of information quickly while moving anywhere. Mobile’s email applications are classified as one of the important applications to communicate ubiquitously since the use of email is considered as the best formal way for communication inside any organization. Due to this importance of e-mail and the daily needs of using it especially for faculty members and students, we propose to develop a mobile application for KFU E-Mail system with secure data transmission. The proposed application has encryption and decryption features to ensure security. As a result, the students and faculty members can communicate via the email application in a safer and more comfortable way.

Keywords


[1] Singh, G, "A study of encryption algorithms (RSA, DES, 3DES and AES) for information security." International Journal of Computer Applications, vol. 67, no. 19, pp. 33-38 (2013).
[2] Jain, R., et.al, "AES Algorithm Using 512 Bit Key Implementation for Secure Communication." International Journal of Advanced Research in Computer Science, vol. 1, no. 3 (2014).
[3] Sharma, N.; Yadav, S.; Bohra, B., "A Review on Data Encryption Techniques Used for Social Media on Internet." Advanced Computational Engineering and Networking, vol. 4, no. 9, pp. 64-68 (2016).
[4] A. Mishra, S. Sharma, "Design and Implementation of High-Speed AES Algorithm for Data Security. " International Journal of Engineering Sciences & Research Technology.doi:10.5281/zenodo.5964. vol. 5, no. 8, pp. 325-337 (2016).
[5] Abu Al-Haija, Q.; et. al, "A tiny RSA cryptosystem based on Arduino microcontroller useful for small scale networks." Procedia Computer Science, Elsevier, doi.org/10.1016/j.procs.2014.07.091. vol. 34, pp.639-646 (2014).
[6] Al-Qadeeb, H.; Abu Al-Haija, Q.; Jebril, N. A., "Software Simulation of Variable Size Message Encryption Based RSA Crypto-Algorithm Using Ms. C#. NET". International Journal of Cyber-Security and Digital Forensics (IJCSDF), DOI:http://dx.doi.org/10.17781/P002241. Vol. 6, no. 1, (2017).
[7] Sheikh, A.; et. al, "Smartphone: Android vs. IOS." The SIJTransactions on Computer Science Engineering & its Applications (CSEA), vol. 1, no. 1, (2013).
[8] Narkhede, S., "Kisan Monitoring System Focused on Android based Application." International Research Journal of Engineering and Technology (IRJET), vol. 3, no. 2, pp. 965-968 (2016).
[9] Spencer, L., (2017, February 8). The 10 Best (Free) Email Service Providers for Your Business. Retrieved from
https://business.tutsplus.com/articles/best-free-email-serviceproviders-- cms-28160
[10] Spencer, L., (2017, February 23). Gmail vs. Outlook: What’s the Best (Free) Email Service? Retrieved from
https://business.tutsplus.com/articles/gmail-vs-outlook-whats-thebest- free-email-service--cms-28195
[11] Agrawal, A., Which email application is right for you: Outlook or Gmail? Retrieved August 18, 2014, from https://blogs.office.com/enus/ 2014/08/18/email-application-right-outlook-gmail/?eu=true
[12] Siledar, S., "File Encryption, Decryption Using AES Algorithm in Android Phone." International Journal of Advanced Research in Computer Science and Software Engineering, vol. 5, no. 5, pp. 550-554 (2015).
[13] Kashyap, S.; Madan, E.N., "A Review on: Network Security and Cryptographic Algorithm." International Journal of Advanced Research in Computer Science and Software Engineering. vol. 5, no.1 (2015).
[14] Abd Elminaam, D. S.; Abdual Kader, H. M.; hadhoud, M. M.,"Evaluating the Performance of Symmetric Encryption Algorithms."International Journal of Network Security, vol. 10, no. 3, pp. 213-219 (2010).
[15] Stellar Blue Technologies. (2015, August 4). Scary Hacking Statistics You Probably Didn’t Know About. Retrieved November 15, 2017,from https://stellarbluetechnologies.com/2015/08/4-scary-hackingstatistics/
[16] Mathur, M.; Kesarwani, A., "Comparison between DES, 3DES, RC2,RC6, BLOWFISH and AES." Proceedings of National Conference on New Horizons IN IT – NCNHIT (2013).
Volume 12, Issue 1
June 2019
Pages 25-38
  • Receive Date: 16 May 2019
  • Revise Date: 17 July 2019
  • Accept Date: 25 August 2019
  • First Publish Date: 25 August 2019