NORMA eResearch @NCI Library

Network-Specific Data Decryption Tool for Enhancing User Profile Security

Sajjad, Muhammad Ahssan (2024) Network-Specific Data Decryption Tool for Enhancing User Profile Security. Masters thesis, Dublin, National College of Ireland.

[thumbnail of Master of Science]
Preview
PDF (Master of Science)
Download (954kB) | Preview
[thumbnail of Configuration Manual]
Preview
PDF (Configuration Manual)
Download (557kB) | Preview

Abstract

The rationale for the outcome of this project was to develop an application that would enhance the security of data of the said profile with the guarantee that the decryption process will only be done with the involvement of the specific network that is deemed secure. This tool was meant to reduce such anxieties as data compromise to a specific platform; hence, the analyst could compute the user data safely in a particular context of a network. The objective was that decryption should only happen at the trusted network and if the host gets connected to an untrusted network, exposure must be prevented. It included dynamic network detection, authentication of the user and the reliable encryption. Several attributes’ names were established and cross tabulated with the secure values kept in Operating System Network parameters. User authentication motivated the user to input a username and password, which in turn was separated, hashed then stored in the system. Talking specifically about data encryption, the Fernet method, which is a type of the symmetric encryption that provides the confidentiality and considers the integrity of data, was used. The keys were well maintained ensuring that they met all the standards of secure management like key storage and frequent key renewal. Thus, the checks on the network were made complicated, and decryption was only done within the trusted network, and data was re-encrypted if the network was changed. Thus, intensive documentation and ideal error handling provided stability and keeping accurate records. Functional and efficacy as well as security tests were used to confirm the ability of the tool to work as intended.

Item Type: Thesis (Masters)
Supervisors:
Name
Email
McCabe, Liam
UNSPECIFIED
Subjects: Q Science > QA Mathematics > Electronic computers. Computer science
T Technology > T Technology (General) > Information Technology > Electronic computers. Computer science
Q Science > QA Mathematics > Computer software > Computer Security
T Technology > T Technology (General) > Information Technology > Computer software > Computer Security
Q Science > QA Mathematics > Electronic computers. Computer science > Computer Systems > Computers > Electronic data processing > Quantum computing
T Technology > T Technology (General) > Information Technology > Electronic computers. Computer science > Computer Systems > Computers > Electronic data processing > Quantum computing
Divisions: School of Computing > Master of Science in Cyber Security
Depositing User: Ciara O'Brien
Date Deposited: 31 Jul 2025 08:23
Last Modified: 31 Jul 2025 08:23
URI: https://norma.ncirl.ie/id/eprint/8362

Actions (login required)

View Item View Item