Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

This is an Open Access publication published under CSC-OpenAccess Policy.
Publications from CSC-OpenAccess Library are being accessed from over 74 countries worldwide.
Information Leakage Prevention Using Public Key Encryption System and Fingerprint Augmented with Apriori Algorithm
Mudasiru Hammed, Jumoke Soyemi
Pages - 90 - 100     |    Revised - 31-05-2019     |    Published - 30-06-2019
Volume - 13   Issue - 3    |    Publication Date - June 2019  Table of Contents
Information, RSA Public Encryption Algorithms, Biometric Fingerprint, Apriori Algorithm.
The increase in the use of the internet around the world provided easier way of communication and information sharing that has led to the huge challenge of data leakage on the network. In an academic environment such as higher institutions of learning, the need to ensure that access to data and sensitive information are given to authorized users become imperative. However, this is not always the case as security bridges are often experienced. This study proposed a RSA public key encryption system and biometric fingerprint augmented with Apriori algorithm to prevent information leakages. The fingerprint verifies the identity of the owner of incoming message and the Apriori algorithm is used as the detection system instead of biometric that requires additional hardware for detecting fingerprint. This study developed a system based on the proposed algorithm. The developed system was tested on Federal Polytechnic, Ilaro local area network achieving a high level of security that prevents interception of valuable data by intruders or eavesdroppers. The system developed RSA public key encryption and fingerprint augmented with Apriori algorithm thus provided the required security mechanism that prevents information leakage in a public environment.
1 Google Scholar 
2 refSeek 
3 BibSonomy 
4 ResearchGate 
5 Scribd 
6 SlideShare 
1 H. Dinne, K. Mandava. Two Way Mobile Authentication System. MA Blekinge Institute of Technology: Karlskrona, Sweden. 2010.
2 R. Sinha, C. Choudhary. "Information leak detection system using fingerprint of data", International Journal on Recent and Innovation Trends in Computing and Communication, vol. 2, no. 12, pp. 3911-, 2014.
3 A. Patel, R. Kansara and P. Virpari. "A Novel Architecture for Intrusion Detection in Mobile Ad hoc Network". International Journal of Advanced Computer Science and Applications, pp. 68-71.
4 S. Nandita. "Designing of Hybrid RSA Encryption Algorithm for Cloud Security". International Journal of Innovative Research in Computer and Communication Engineering, vol. 3, no. 5, pp. 4146-4152, 2015.
5 L. Paul, M.N. Anilkumar. "Authentication for Online Voting Using Steganography and Biometrics". International Journal of Advanced Research in Computer Engineering & Technology, vol. 5, no. 10, pp. 26-32, 2012.
6 A. Singh, R. Gilhotra. "Data security using private key encryption system based on arithmetic coding". International Journal of Network Security & Its Applications (IJNSA), vol. 3, no. 3, pp. 58-67, 2011.
7 S.T. Vuong and P. Fu A security architecture and design for mobile intelligent agent systems. ACM SIGAPP Applied Computing Review, vol. 9, no. 3, pp. 21-30, 2001.
8 H.K. Al-Anie, M.A. Alia and A.A. Hnaif. "eVoting Protocol Based on Public-Key Cryptography". International Journal of Network Security & Its Applications (IJNSA), vol. 3, no. 4, pp. 87-98, 2011.
9 H.B. Kekre and V.A. Bharadi. "Using Component Model for Interfacing Biometric Sensors to Capture Multidimensional Feature". International Journal of Intelligent Information Technology Application, vol. 2, no. 6, pp. 279-285, 2009.
10 A. Wiehe, T. Søndrol, O.K. Olsen and F. Skarderud. Attacking fingerprint sensors. Gjøvik University College, 2004.
11 N.Y. Goshwe. "Data encryption and decryption using RSA algorithm in a network environment". International Journal of Computer Science and Network Security (IJCSNS), vol.13, no. 7, pp. 9-20, 2013.
12 S. Kumar and M. Singh. "Design a secure electronic voting system using fingerprint technique". International Journal of Computer Science Issues (IJCSI), vol. 10, no. 4, pp.192- 202, 2013.
13 N. Malwade, C. Patil, S. Chavan and S.Y. Raut. "Secure Online Voting System Proposed by Biometrics and Steganography". International Journal of Emerging Technology and Advanced Engineering, 2013.
14 Jean H G. Notes on RSA. University of Pennsylvania Scholarly Commons. 2010, pp. 329- 347.
15 E.H. Han, G. Karypis and V. Kumar. Min-apriori: An algorithm for finding association rules in data with continuous attributes. Department of Computer Science and Engineering, University of Minnesota, Tech. Rep. 1997.
Mr. Mudasiru Hammed
Department of Computer Science The Federal Polytechnic, Ilaro Ogun State - Nigeria
Dr. Jumoke Soyemi
Department of Computer Science The Federal Polytechnic, Ilaro Ogun State - Nigeria