Home   >   CSC-OpenAccess Library   >    Manuscript Information
Information Leakage Prevention Using Public Key Encryption System and Fingerprint Augmented with Apriori Algorithm
Mudasiru Hammed, Jumoke Soyemi
Pages - 90 - 100     |    Revised - 31-05-2019     |    Published - 30-06-2019
Volume - 13   Issue - 3    |    Publication Date - June 2019  Table of Contents
Information, RSA Public Encryption Algorithms, Biometric Fingerprint, Apriori Algorithm.
The increase in the use of the internet around the world provided easier way of communication and information sharing that has led to the huge challenge of data leakage on the network. In an academic environment such as higher institutions of learning, the need to ensure that access to data and sensitive information are given to authorized users become imperative. However, this is not always the case as security bridges are often experienced. This study proposed a RSA public key encryption system and biometric fingerprint augmented with Apriori algorithm to prevent information leakages. The fingerprint verifies the identity of the owner of incoming message and the Apriori algorithm is used as the detection system instead of biometric that requires additional hardware for detecting fingerprint. This study developed a system based on the proposed algorithm. The developed system was tested on Federal Polytechnic, Ilaro local area network achieving a high level of security that prevents interception of valuable data by intruders or eavesdroppers. The system developed RSA public key encryption and fingerprint augmented with Apriori algorithm thus provided the required security mechanism that prevents information leakage in a public environment.
1 Google Scholar 
2 refSeek 
3 BibSonomy 
4 ResearchGate 
5 Scribd 
6 SlideShare 
A. Patel, R. Kansara and P. Virpari. "A Novel Architecture for Intrusion Detection in Mobile Ad hoc Network". International Journal of Advanced Computer Science and Applications, pp. 68-71.
A. Singh, R. Gilhotra. "Data security using private key encryption system based on arithmetic coding". International Journal of Network Security & Its Applications (IJNSA), vol. 3, no. 3, pp. 58-67, 2011.
A. Wiehe, T. Søndrol, O.K. Olsen and F. Skarderud. Attacking fingerprint sensors. Gjøvik University College, 2004.
E.H. Han, G. Karypis and V. Kumar. Min-apriori: An algorithm for finding association rules in data with continuous attributes. Department of Computer Science and Engineering, University of Minnesota, Tech. Rep. 1997.
H. Dinne, K. Mandava. Two Way Mobile Authentication System. MA Blekinge Institute of Technology: Karlskrona, Sweden. 2010.
H.B. Kekre and V.A. Bharadi. "Using Component Model for Interfacing Biometric Sensors to Capture Multidimensional Feature". International Journal of Intelligent Information Technology Application, vol. 2, no. 6, pp. 279-285, 2009.
H.K. Al-Anie, M.A. Alia and A.A. Hnaif. "eVoting Protocol Based on Public-Key Cryptography". International Journal of Network Security & Its Applications (IJNSA), vol. 3, no. 4, pp. 87-98, 2011.
Jean H G. Notes on RSA. University of Pennsylvania Scholarly Commons. 2010, pp. 329- 347.
L. Paul, M.N. Anilkumar. "Authentication for Online Voting Using Steganography and Biometrics". International Journal of Advanced Research in Computer Engineering & Technology, vol. 5, no. 10, pp. 26-32, 2012.
N. Malwade, C. Patil, S. Chavan and S.Y. Raut. "Secure Online Voting System Proposed by Biometrics and Steganography". International Journal of Emerging Technology and Advanced Engineering, 2013.
N.Y. Goshwe. "Data encryption and decryption using RSA algorithm in a network environment". International Journal of Computer Science and Network Security (IJCSNS), vol.13, no. 7, pp. 9-20, 2013.
R. Sinha, C. Choudhary. "Information leak detection system using fingerprint of data", International Journal on Recent and Innovation Trends in Computing and Communication, vol. 2, no. 12, pp. 3911-, 2014.
S. Kumar and M. Singh. "Design a secure electronic voting system using fingerprint technique". International Journal of Computer Science Issues (IJCSI), vol. 10, no. 4, pp.192- 202, 2013.
S. Nandita. "Designing of Hybrid RSA Encryption Algorithm for Cloud Security". International Journal of Innovative Research in Computer and Communication Engineering, vol. 3, no. 5, pp. 4146-4152, 2015.
S.T. Vuong and P. Fu A security architecture and design for mobile intelligent agent systems. ACM SIGAPP Applied Computing Review, vol. 9, no. 3, pp. 21-30, 2001.
Mr. Mudasiru Hammed
Department of Computer Science The Federal Polytechnic, Ilaro Ogun State - Nigeria
Dr. Jumoke Soyemi
Department of Computer Science The Federal Polytechnic, Ilaro Ogun State - Nigeria