IJWMT Vol. 14, No. 5, 8 Oct. 2024
Cover page and Table of Contents: PDF (size: 859KB)
PDF (859KB), PP.1-11
Views: 0 Downloads: 0
Subscription Music Platform, Progressive Web Apps, REST API, El Gamal, White Box Testing
Subscription music platforms, like many web applications, increasingly rely on Progressive Web Apps (PWAs) to enhance user experience. These PWAs function by exchanging data with servers or REST APIs. However, the current reliance on REST APIs poses significant security risks due to vulnerabilities in data transmission. To address this issue, this research integrates the El Gamal cryptographic algorithm into the architecture of a subscription music platform. By incorporating the El Gamal cryptographic algorithm, this research endeavors to fortify the security posture of data exchanged between users and servers through REST APIs. This encryption method was selected for its robust resistance to various cryptographic attacks, providing a strong defense against unauthorized interception and tampering of sensitive information. To evaluate the efficacy of the El Gamal integration, a rigorous white box testing regimen was employed, encompassing metrics such as cyclomatic complexity and basic path testing. These assessments comprehensively examined the code's structure and execution to identify potential vulnerabilities and ensure the correct implementation of the cryptographic algorithm. The findings of the white box testing unequivocally demonstrated the successful integration of El Gamal cryptography on both the client and server components of the subscription music platform, effectively safeguarding the confidentiality and integrity of data transmitted via REST APIs. This research contributes to the advancement of secure communication protocols within web applications, particularly subscription-based platforms. Through the implementation of robust encryption, the study enhances data integrity and confidentiality, ultimately building user trust.
Timothy John Pattiasina, "Securing Musical Streams: Leveraging ElGamal Encryption in REST API Frameworks for PWAs", International Journal of Wireless and Microwave Technologies(IJWMT), Vol.14, No.5, pp. 1-11, 2024. DOI:10.5815/ijwmt.2024.05.01
[1]M. Banafaa, I. Shayea, J. Din, M. H. Azmi, A. Alashbi, Y. I. Daradkeh, and A. Alhammadi. "6G mobile communication technology: Requirements, targets, applications, challenges, advantages, and opportunities," Alexandria Engineering Journal, pp. 245-274, 2023. doi: 10.1016/j.aej.2022.08.017.
[2]H. Wang, H. Ning, Y. Lin, W. Wang, S. Dhelim, F. Farha, J. Ding, and M. Daneshmand. "A Survey on the Metaverse: The State-of-the-Art, Technologies, Applications, and Challenges," in IEEE Internet of Things Journal, pp. 14671-14688, 2023, doi: 10.1109/JIOT.2023.3278329.
[3]T. J. Marion and S. K. Fixson. "The transformation of the innovation process: How digital tools are changing work, collaboration, and organizations in new product development." Journal of Product Innovation Management, pp. 192-215, 2021. doi: 10.1111/jpim.12547.
[4]A. Haleem, M. Javaid, M. A. Qadri, R. Suman. "Understanding the role of digital technologies in education: A review," Sustainable Operations and Computers, pp. 275-285, 2022. doi: 10.1016/j.susoc.2022.05.004.
[5]J. W. Morris. "Music Platforms and the Optimization of Culture," Social Media + Society, 2020. doi: 10.1177/2056305120940.
[6]F. Widi, A. Qahar, and A. Aswari. "Legal protection against personal data in online loan transactions," Golden Ratio of Law and Social Policy Review (GRLSPR),pp. 7-26, 2021. doi: 10.52970/grlspr.v1i1.152.
[7]B. Tumalun. "Upaya Penanggulangan Kejahatan Komputer Dalam Sistem Elektronik Menurut Pasal 30 Undang-Undang Nomor 11 Tahun 2008," Lex Et Societatis, pp. 24-31, 2018. doi: 10.35796/les.v6i2.19950.
[8]B. Susanto, G. Virginia, U. Proboyekti, J. C. D. Ester. "Progressive Web App Implementation in Omah Wayang Klaten Website," in Mobile Computing and Sustainable Informatics: Proceedings of ICMCSI, Springer Nature Singapore, 2023, pp. 333-348. doi: 10.1007/978-981-99-0835-6_24.
[9]P. H. Putri, L. N. Hasanah. "Srikandi Health: Development of a progressive web apps-based health information system as a solution for ease of monitoring and management of anemia," In AIP Conference Proceedings, AIP Publishing, 2023, Vol. 2491. doi: 10.1063/5.0105495.
[10]A. I. Khan, A. Al-Badi, and M. Al-Kindi. "Progressive Web Application Assessment Using AHP," Procedia Computer Science, pp. 289-294, 2019. doi: 10.1016/j.procs.2019.08.041.
[11]A. Biørn-Hansen, T. A. Majchrzak, and T. M. Grønli, "Progressive Web Apps: The Possible Web-native Unifier for Mobile Development," in Proceedings of the 13th International Conference on Web Information Systems and Technologies, pp. 344–351, SciTePress, 2017. doi:10.5220/0006353703440351.
[12]R. Dastres and M. Soori. "Secure Socket Layer (SSL) in the Network and Web Security," International Journal of Computer and Information Engineering, In press, pp.330-333, 2020. https://hal.science/hal-03024764.
[13]A. Alabduljabbar, R. Ma, S. Choi, R. Jang, S. Chen, and D. Mohaisen. "Understanding the security of free content websites by analyzing their SSL certificates: a comparative study, " in Proceedings of the 1st Workshop on Cybersecurity and Social Sciences, May 2022, pp. 19-25. doi: 10.1145/3494108.3522769.
[14]D. Kumbhakar, K. Sanyal, and S. Karforma. "An optimal and efficient data security technique through crypto-stegano for E-commerce," Multimed Tools Appl, pp. 21005–21018, 2023. doi:10.1007/s11042-023-14526-7.
[15]F. Mallouli, A. Hellal, N. S. Saeed, and F. A. Alzahrani. "A Survey on Cryptography: Comparative Study between RSA vs ECC Algorithms, and RSA vs El-Gamal Algorithms," In 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud), Jun. 2019, pp.173-176, doi: 10.1109/CSCloud/EdgeCom46520.2019.
[16]O. A. Imran, S. F. Yousif, I. S. Hameed, W. N. Abed, and A. T. Hammid. "Implementation of El-Gamal algorithm for speech signals encryption and decryption," Procedia Computer Science. pp. 1028-1037, 2020. doi: 10.1016/j.procs.2020.03.402.
[17]E. R. Arboleda. "Secure and Fast Chaotic El Gamal Cryptosystem," International Journal of Engineering and Advanced Technology (IJEAT). pp. 1693-1699, 2019. doi: 10.35940/ijeat.2249-8958.
[18]A. Braeken. "Public key versus symmetric key cryptography in client–server authentication protocols," International Journal of Information Security, pp. 103-114, 2022. doi: 10.1007/s10207-021-00543-w.
[19]S. K. Mousavi, A. Ghaffari, S. Besharat, and H. Afshari. "Improving the security of internet of things using cryptographic algorithms: a case of smart irrigation systems," Journal of Ambient Intelligence and Humanized Computing, Feb. 2021, pp. 2033-2051. doi: 10.1007/s12652-020-02303-5.
[20]S. K. Mousavi, A. Ghaffari, S. Besharat, and H. Afshari. "Security of internet of things based on cryptographic algorithms: a survey", Wireless Networks, Feb. 2021. pp. 1515-1555. doi: 10.1007/s11276-020-02535-5.
[21]H. T. S. ALRikabi, and H. T. Hazim. "Enhanced data security of communication system using combined encryption and steganography," iJIM, p. 145, 2021. doi: 10.3991/ijim.v15i16.24557.
[22]R. Qazi, K. N. Qureshi, F. Bashir, N. U. Islam, S. Iqbal, and A. Arshad. "Security protocol using elliptic curve cryptography algorithm for wireless sensor networks," Journal of Ambient Intelligence and Humanized Computing, pp. 547–566. 2021. doi: 10.1007/s12652-020-02020-z.
[23]R. Imam, Q. M. Areeb, A. Alturki, and F. Anwer. "Systematic and critical review of rsa based public key cryptographic schemes: Past and present status," IEEE Access, pp. 155949-155976, 2021. doi: 10.1109/ACCESS.2021.3129224.
[24]N. A. Khan, A. Awang, and S. A. A. Karim. "Security in Internet of Things: A review," IEEE access, pp.104649-104670, 2022. doi: 10.1109/ACCESS.2022.3209355.
[25]K. Tepetes, E. Papaioannou, C. Kaklamanis .SHELTERED”: A HYBRID PRIVACY-PRESERVING APPLICATION FOR SECURE VIDEO CALLS OVER IP, INTED2023 Proceedings, pp. 563-573, 2023. doi: 10.21125/inted.2023.0202.
[26]M. Z. Gunduz, and R. Das. "Cyber-security on smart grid: Threats and potential solutions," Computer networks, p. 107094, 2020. doi: 10.1016/j.comnet.2019.107094.
[27]E. R. Aquino, P. De Saqui-Sannes, and R. A. Vingerhoeds, “A Methodological Assistant for Use Case Diagrams,” in Proceedings of the 8th International Conference on Model-Driven Engineering and Software Development, 2020, pp. 227–236. doi: 10.5220/0008938002270236.
[28]A. Tazin and M. M. Kokar, “Composition of UML Class Diagrams Using Category Theory and External Constraints,” Journal of Software Engineering and Applications, vol. 15, no. 12, pp. 436–468, 2022, doi: https://doi.org/10.4236/jsea.2022.1512025.
[29]S. Zarni, "Performance Comparison of Asymmetric Cryptography (Case study- Mail message)," APTIKOM Journal on Computer Science and Information Technologies, pp. 15-21, 2019. doi: 10.11591/APTIKOM.J.CSIT.147.
[30]B. Krishna, S. Krishnan, and M. P. Sebastian. "Understanding the process of building institutional trust among digital payment users through national cybersecurity commitment trustworthiness cues: a critical realist perspective", Information Technology & People, 2023. doi:10.1108/ITP-05-2023-0434.