Secured Chat System
Secured Chat System
3(1):62-71
(January-February, 2014)
Abstract
Secure chat system is essential for effective and efficient communication in succeeding organizations. Current free
chat systems make breach risk of confidentiality probable, and organizations lose possession of logged chat messages.
Their designs are also not readily available for examination and subsequent improvement. There is therefore the need for
the design and creation of a private chat system which this research addressed. Design and creation research strategy was
adopted and data collection was through existing documents and structured interviews. Incremental software
development method was adopted. The outcome provides secure private chat system that minimizes the breach risk of
confidentiality through encryption and localization, and grants user organization possession of logged chat messages.
Keywords: Chat System, Private Chat, Secure Chat, Create Chat System, Design Chat System.
1.0 Introduction
Any organization having any number of employees needs a communication system. A chat system, which could be
intranet or internet based, can be used to share information, make inquiry, among others. Chat is to participate in a
synchronous text, video, audio, or multicast exchange of remarks with one or more people over a computer network
(Wiki-online Chat, 2013). There is the need to ensure confidentiality of communication to breed honest and frank
chatting free from fear of eavesdropping and breach of privacy. Organizations should also keep possession of their chat
messages. The capability to securely chat with a colleague in an organization is to a great advantage against competitors
who do not have such facility. A Secure Chat System is a system which enhances communication between two or more
people within an organization or over the internet in a way that seriously attempts to be free from risk of interception by
or involvement of unauthorized persons.
There are a number of chat system available; Voodoo (Parniak, 2009), MUSHclient (Gammon, 2005), Google Talk
(Google Talk Beta, 2011; Google Talk Help, 2013), Skype (Higginbotham, 2008), Facebook (Yadav, 2006), among
others. These free chat system providers use clients information for marketing and may sell it to prospective buyers
who need them. Possession of chat messages is also lost to the provider. Having a private chat system will reduce all
these probable confidential, privacy, and possession security risks. In addition, chat system design is not readily available
as a guide and as basis for further improvement, to intending developers.
The goal of this work is, therefore, to design and implement private chat application software that will enable
effective and efficient text-based communication between users. The chat system will privatize and secure the transfer of
information and communication. Security of this chat system would be limited to password and username for
authentication, Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) to detect if
the other person is human, and Encryption of messages to improve confidentiality. It will also grants user organisation
possession of logged chat messages.
The design and creation research strategy (Oates, 2009) was adopted. The data collection method was existing
documents and structured interviews. The data collected was analyzed qualitatively. Various literatures on the subject
matter, including on Voodoo, MushClient, and Skype chat systems, were examined with the intention of incorporating
learnt ideas. The software development methodology used was Incremental Development because it provides for the
development of business information systems in a series of small implementable sub-stages. It also promotes adaptive
planning, evolutionary development and delivery, a time-boxed iterative approach, and encourages rapid and flexible
response to change (Hughes & Cotterell, 2009; Whitten, Bently & Dittman, 2001). The application development
environment includes: MySQL (which supports the relational model and allows the integration and association of
database tables), XAMPP Server (All Platforms, Apache, MySQL, PHP, Perl - a virtual web server used to simulate
connections to external software applications such as Apache and Windows), and programming languages of choice
(PHP - runs natively on Apache server and can easily extend or integrate with Java, .Net, Microsoft Exchange Server,
web services and more, JavaScript - scripting language that Web server administrators use to manage the server and
connect its pages to other services, such as back-end databases and search engines for users looking up information, Ajax
- brings desktop applications features into the web), and CSS - allows document authors to specify the presentation of
elements on a web page separately from the structure of the document). Object oriented concept was adopted in the
development of the system. PHP language was used to build the login features, CSS used to build the design and
presentation, and HTML was used for the structure of the system.
62
G.J. E.D.T.,Vol.3(1):62-71
(January-February, 2014)
View all
registered user
Log in
Add user
Delete user
Generate
report
ADMINISRATOR
Add
Department
G.J. E.D.T.,Vol.3(1):62-71
(January-February, 2014)
Log in
Chat
Read or delete
Broadcast messages
Broadcast
Messages
USER
G.J. E.D.T.,Vol.3(1):62-71
(January-February, 2014)
referencing the admin table, to identify the admin that registered the user). The Department represents the various
departments that present in an organization. The Department attributes are: Department_id (primary key), and
Department_name (holds the name of the department). The Broadcast represents broadcast messages. The Broadcast
attributes are: broadcast_id (primary key), message (This field holds the actual text of the message that was
broadcasted), sender_name (foreign key, reference to user_tbl table; the user that sends the broadcasts name), Recipient
(the users receiving the broadcast messages), Subject (the topic of the message), Time (the current time the message was
sent), and Status (if the message has been read or not by the recipient). The Chat represents actual messages during chat
sessions. The Chat attributes are: chat_id (This field is used as the primary key for the Chat table), chat_date (This field
holds the date and time the message was created), chat_message (This field holds the actual text of the message),
Receiver_user_id (this field identifies the receiver of the message being sent), and user_id (foreign key, reference to user
table). The attendant entity relationship diagram is presented in Figure 4.
G.J. E.D.T.,Vol.3(1):62-71
(January-February, 2014)
66
G.J. E.D.T.,Vol.3(1):62-71
(January-February, 2014)
67
G.J. E.D.T.,Vol.3(1):62-71
(January-February, 2014)
General Module Testing was done to ensure that the system will not permit any form of conflicting situation. The
images below show the output of a test executed where, in the course adding new users with the same username, invalid
email address the same email address for two people.
Figures 12 shows successful login page and Figure 13 shows the output of successful user registration.
G.J. E.D.T.,Vol.3(1):62-71
(January-February, 2014)
The Send Broadcast test was done to test user friendly interface and also test the proper storage of inputted data of
messages sent to others. Figure 15 shows the output of clicking Send without any input, and Figure 16 shows the window
of Broadcast messages. Figure 17 shows the window where sent messages could be viewed, and Figure 18 shows the
Chat Panel.
69
G.J. E.D.T.,Vol.3(1):62-71
(January-February, 2014)
G.J. E.D.T.,Vol.3(1):62-71
(January-February, 2014)
without revealing their real-life identity to other users of the system, but there is no way to know that the person they
communicate with is the one they say they are. By using VoIP to make the calls, it is very cheap to call another phone. It
does not cost money to call another Skype user. Every Skype user has a unique username which other users can use to
talk with them (Wikipedia Skype, 2013). One of Skype limitations is lack of privacy (Skype has the keys to decrypt calls
or sessions). Skype also makes it hard to enforce a (corporate) security policy. In addition, there are bugs and delays in
the Linux version.
Facebook is the second largest social network on the web, behind only MySpace in terms of traffic (Yadav, 2006).
Facebook has a tendency to share user information with third parties, including companies with which they have a
relationship. Hence, privacy is not totally assured. Facebook also collects information about users from other sources,
such as newspapers and instant messaging services. This information is gathered regardless of use of the website.
4.0 Conclusion
Faster communication through chatting with minimized risk of certain security breach and failure to receive the
message because of no internet access could be implemented in any organisation. It was concluded, from the review of
past works, that there existed a need to incorporate additional security measures into such a system besides the standard
functionalities. This was implemented by the use of CAPTHA and encryption. Design tools that were appropriate were
selected and utilized to bring about the functional Private Secure Chat System after thorough analysis of the objectives
and requirements of the system. Different test were performed on the system to debug and fix flaws. The minimum
system requirements were deduced from these tests.
The outcome provides secure private chat system that minimizes the breach risk of confidentiality through
encryption, and grants user organisation possession of logged chat messages. It also provides basis for the design and
implementation of similar systems. The created private chat system promises to contribute towards obtaining
organisational competitive advantage. It is believed that the successful deployment of this system will aid faster and
secure communication among users. Future work on the secure chat system could include features like voice chat, video
chat, multicast chat and smiley. Further research in these aspects will improve the system.
References
Betabeat. (2012). Google Says GChat is not a word. Retrieved from: http://www.betabeat.com/2012/02/10/google-says-gchat-is-not-aword/
Chamberglain, R., William, M. And Jarred, A. (2008). Practicum Chat Application: Requirements specification document. Retrieved
from: http://simplechat.org/docs/project6_design_document.pdf
Date, C. J. (2003). An Introduction to Database System. Delhi: Pearson Education
Finkler,
J.
and
Dao,
D.
(2001).
Chat
Application
Requirements.
Retrieved
from:
www.eveandersson.com/arsdigita/doc/requirements/chat_req_updated
Gammon, N. (2005). MUSHclients Features. Retrieved from: www.gammon.com.au/mushclient/chat.htm
Higginbotham, B. (2008). Skype. Retrieved from: www.technologyevangelist.com/2008/05/a_bit_about how_skype.html
Google Talk Beta (2011). Whats New on Google Talk? Retrieved from: http://www.google.com/talk/whatsnew_more.html
Google Talk Help (2013). Google Talk. Retrieved from: https://support.google.com/talk/?hl=en
Hughes, B. and Cotterell, M. (2009). Software Project Management. London: McGraw-Hill Education
Parniak, M. (2009). Voodoo Chat. Retrieved from: http://en.wikipedia.org/wiki/Voodoo_Chat
Oates, B. J. (2009). Researching Information Systems and Computing. London: SAGE
Oikarinen, J. And Reed, D. (1993). History of Chat System: retrieved from: http://daniel.haxx.se/irchistory.html
Whitten, J.L., Bently, L.D., and Dittman, K.D. (2001). System Analysis and Design Methods. New York: Irwin/McGraw-Hill. Pp 13,
479
Wikipedia Online Chat (2013). Online Chat. Retrieved from: http://en.wikipedia.org/wiki/Online_chat
Wikipedia Skype (2013). Skype. Retrieved from: https://simple.wikipedia.org/wiki/Skype
Yadav, S. (2006). Facebook Profile. Retrieved from: https://mashable.com/2006/08/25/facebook-profile/
71