SECURITY USING GEO-ENCRYPTION

Authors

  • Saloni Dhuru SIES Graduate School of Technology, Navi Mumbai, India
  • Shraddha R. H. SIES Graduate School of Technology, Navi Mumbai, India
  • Meghna Jain SIES Graduate School of Technology, Navi Mumbai, India
  • Akshata Lad SIES Graduate School of Technology, Navi Mumbai, India
  • Neena Jacob SIES Graduate School of Technology, Navi Mumbai, India

Keywords:

Geo-encryption, Armstrong number, GPS co-ordinates, AES

Abstract

The location based encryption or Geo-Encryption technique that uses GPS technology to enhance the data security. This concept is developed so that at a particular position and time, the specific recipient will decrypt the files. This technology will be used to restrict unauthorized user for any violation. The approach is to use a security system to secure data by using an encryption algorithm and particular coordinates of the recipient with tolerance distance. It will set a limit to decrypt that encrypted data. It is an innovative technique to encode the location information into the encrypted keys. If an unauthorized person attempts to decrypt the file at some other location, the security system will not reveal any information about that original plain text.

References

D. Qiu & Sherman Lo & Per Enge & Dan Boneh, “Geoencryption Using Loran”, Proceeding of ION NTM 2007.

D. Qiu, "Security Analysis of Geoencryption: A Case Study using Loran", Proceeding of ION GNSS 2007.

Forouzan, "Data Communication and Networking", TMH

Behrouz A. Forouzan: Cryptography and Network Security, TMH

Bernard Menezes,” Network Security and Cryptography”.

A.S. Tanenbaum, Computer Networks, Pearson Education.

Logan Scott & Dorothy E. Denning, "Location Based Encryption & Its Role in Digital Cinema Distribution", Proceedings of ION GPS/GNSS 2003, pp 288-297.

D. Denning, L. Scott, "A Location-Based Encryption Technique and Some of Its Applications", Proceedings of ION NTM 2003.

Swapna B Sasi, Betsy K Abraham, JInil James, Riya Jose “Location Based Encryption using Message Authentication Code in Mobile Networks”, In IJCAT International Journal of Computing and Technology Volume 1, Issue 1, February 2014.

Additional Files

Published

15-04-2017

How to Cite

Saloni Dhuru, Shraddha R. H., Meghna Jain, Akshata Lad, & Neena Jacob. (2017). SECURITY USING GEO-ENCRYPTION. International Education and Research Journal (IERJ), 3(4). Retrieved from https://ierj.in/journal/index.php/ierj/article/view/762