Advertisement

Applications of Secure Data Exchange Method Using Social Media to Distribute Public Keys

  • Piotr Milczarski
  • Krzysztof Podlaski
  • Artur Hłobaż
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 522)

Abstract

The concern about the data security is still growing. The applications we use still lack basic security. The security can be obtained easily without heightening the awareness of the users by simply implementing methods that allow end-to-end security. In the paper we present the new method of public key distribution using Social Media Networks. We use groups or circles that users can create there and publish images in the gallery with proper public or private access. After establishing secure session user can switch into different medium of communication, e.g. different messenger or text-SMS to share their data in secure way. Then there are described several applications of the presented method Secure Data Exchange (SDEx), e.g. secure SMS texting, Social Media Networking and data sharing. We propose frame format of the published QRcode as a public key and data message frame format.

Keywords

QR codes Data security Secure transmission Social media Key distribution End-to-end data security 

References

  1. 1.
    Nikiforakis, N., Meert, W., Younan, Y., Johns, M., Joosen, W.: Sessionshield: lightweight protection against session hijacking. In: Erlingsson, U., Wieringa, R., Zannone, N. (eds.) ESSoS 2011. LNCS, vol. 6542, pp. 87–100. Springer, Heidelberg (2011) CrossRefGoogle Scholar
  2. 2.
    Adid, B.: Sessionlock: securing web sessions against eavesdropping. In: Proceedings of the 17th international conference on World Wide Web, pp. 517–524 (2008)Google Scholar
  3. 3.
    Lin, H.: The study and implementation of the wireless network data security model. In: Fifth International Conference on Machine Vision (ICMV 12). International Society for Optics and Photonics (2013)Google Scholar
  4. 4.
    Threats, I.: New challenges to corporate security. Res. J. Appl. Sci. 8(3), 161–166 (2013)Google Scholar
  5. 5.
    Das, S., Kramer, A.D.I., Dabbish, L.A., Hong, J.I.: Increasing security sensitivity with social proof: a large-scale experimental confirmation. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (CCS ’14), pp. 739–749. ACM, New York (2014)Google Scholar
  6. 6.
    Electronic Frontier Foundation. https://www.eff.org/secure-messaging-scorecard
  7. 7.
    Ahuja, M.S.: A review of security weaknesses in Bluetooth. Int. J. Comput. Distrib. Sys. 1, 3 (2012)Google Scholar
  8. 8.
    Haataja, K., Hyppönen, K., Pasanen, S., Toivanen, P.: Reasons for Bluetooth network vulnerabilities. Bluetooth Security Attacks. Springer, Berlin Heidelberg (2013) CrossRefGoogle Scholar
  9. 9.
    Sriram, S.V.S., Sahoo, G.: A mobile agent based architecture for securing WLANs. International Journal of Recent Trends Engineering 1(1), 137–141 (2009)Google Scholar
  10. 10.
    Huang, J.: A study of the security technology and a new security model for WiFi network. In: Fifth International Conference on Digital Image Processing. International Society for Optics and Photonics (2013)Google Scholar
  11. 11.
  12. 12.
    Hłobaż, A., Podlaski, K., Milczarski, P.: Applications of QR codes in secure mobile data exchange. In: Kwiecień, A., Gaj, P., Stera, P. (eds.) CN 2014. CCIS, vol. 431, pp. 277–286. Springer, Heidelberg (2014) CrossRefGoogle Scholar
  13. 13.
    Hłobaż, A.: ecurity of measurement data transmission - message encryption method with concurrent hash counting. Przeglad Telekomunikacyjny i Wiadomosci Telekomunikacyjne 80(1), 13–15 (2007)Google Scholar
  14. 14.
    Hłobaż, A.: Security of Measurement Data Transmission - Modifications of the Message Encryption Method Along with Concurrent Hash Counting, pp. 39–42. Przeglad Wlokienniczy - Wlokno, Odziez (2008) Google Scholar
  15. 15.
    Podlaski, K., Hłobaż, A., Milczarski, P.: New Method for Public Key Distribution Based on Social Networks. arXiv:1503.03354 [cs.CR] (2015)
  16. 16.
    Katz, J., Lindell, Y.: Introduction to Modern Cryptography. Chapman & Hall/CRC Press, London (2007) Google Scholar
  17. 17.
  18. 18.
    BS ISO/IEC 18004:2006. Information technology. Automatic identification and data capture techniques. QR Code 2005 bar code symbology specification (2006)Google Scholar
  19. 19.

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  • Piotr Milczarski
    • 1
  • Krzysztof Podlaski
    • 1
  • Artur Hłobaż
    • 1
  1. 1.Faculty of Physics and Applied InformaticsUniversity of LodzLodzPoland

Personalised recommendations