Abstract
In the current landscape of technological advancement, data holds a pivotal role, shaping societal interactions and daily routines. The rapid escalation in digital data volume, driven by technological strides, has underscored the critical necessity for robust protective measures to safeguard its sensitive nature. This study aims to develop a secure software specification for Android application ensuring effective data protection through a specialized Android application tailored explicitly for data concealment, assuring utmost confidentiality and secure transmission. In this paper we revolve around the integration of multifaceted security and privacy protocols, employing advanced information concealment techniques, encryption mechanisms, secure key management, and meticulous access control by MAC address. Termed 'Secure Data Applications,' these interfaces are meticulously crafted using PHP interlinked with MySQL databases, and developed using Flutter and Dart languages. The primary goal is to make a substantial contribution to the domain of mobile data protection, enabling secure and streamlined data exchanges while placing paramount importance on an intuitive user experience The 'Secure Data App' application, emerged successfully through a battery of rigorous testing methodologies. Throughout the testing phases, the application seamlessly navigated without encountering any errors, affirming its robustness and reliability. Moreover, the tested value (6.8%) of maximum CPU usage signifies that the application utilizes the CPU at a relatively low rate. Also, the encryption ratio of 1.35 is relatively high which guarantees a higher level of security.
Recommended Citation
Abdulbaqi, Huda Abdulaali; Ghandour, Ahmmad Mohamad; and Jawad, Thekrayat Abbas
(2024)
"Develop Secure Software specifications for Android App concealing the Information and Safeguarding Data,"
Iraqi Journal for Computer Science and Mathematics: Vol. 5:
Iss.
4, Article 20.
DOI: https://doi.org/10.52866/2788-7421.1215
Available at:
https://ijcsm.researchcommons.org/ijcsm/vol5/iss4/20