SlideShare a Scribd company logo
1 of 2
Download to read offline
International Journal of Computer Applications Technology and Research 
Volume 3– Issue 10, 610 - 611, 2014 
Location Based Encryption-Decryption Approach for 
Data Security 
Borse Manoj V. 
Sandip Institute of 
Engineering and 
Management 
Nasik, India 
Bhandure Harshad D. 
Sandip Institute of 
Engineering and 
Management 
Nasik, India 
Patil Dhiraj M. 
Sandip Institute of 
Engineering and 
Management 
Nasik, India 
Bhad Pratik B. 
Sandip Institute of 
Engineering and 
Management 
Nasik, India 
Abstract: Data security is an important task in today‟s life. Data security can be done using GPS device. Among computer user mostly 
use data in electronic format. How to provide a security for data is important. In this paper, we propose a Location Based Data- 
Security System to secure data by applying Encryption-Algorithm and co-ordinate using GPS device. Encryption means of efficient 
secure integer comparison. The encryption technology cannot restrict the location of data decryption. In order to meet the demand of a 
location-dependent approach location-dependent data encryption algorithm is needed. A target latitude/longitude co-ordinate is 
determined firstly. The co-ordinate is incorporated with a random key for data encryption. The receiver can only decrypt the cipher 
text when the co-ordinate acquired from GPS receiver is matched with the target co-ordinate. GPS-based encryption is an innovative 
technique that uses GPS-technology to encode location information into the encryption keys to provide location based security. GPS-based 
encryption adds another layer of security on top of existing encryption methods by restricting the decryption of a message to a 
particular location. Our experimental results not only validate the effectiveness of our scheme, but also demonstrate that the proposed 
integer comparison scheme performs better than previous bitwise comparison scheme. 
Keywords: encryption; decryption; security; GPS technology; location. 
1. INTRODUCTION 
Most of the data encryption techniques are location-independent. 
They cannot restrict the location of clients for 
data decryption. In proposed system, a novel location-dependent 
approach is used for incorporating location 
information into data transmission. 
It is important to provide a secure and convenient data 
transmission. We propose a location-dependent approach for 
better data security. The client put the coordinates manually in 
application for data encryption. Then our application create a 
encrypted file and then we send that encrypted file using e-mail 
or by any external device to our destination .The client 
only decrypt the cipher text when the coordinate acquired 
from GPS receiver matches with the target coordinate. 
According to our discussion, the approach can meet the 
confidentiality, authentication, simplicity and practicability of 
security issues. As a result, the proposed approach can meet 
the demand for personal and industrial data security. 
2. PROPOSED WORK 
Enhancing the security is the prime aspect of the proposed 
system. By adding the location based services with the 
encryption process one can make the data more secure. 
System consists of following components: 
1. Login and Registration 
2. Encryption 
3. GPS Interfacing and Location Matching 
4. Decryption 
2.1 Login and Registration: 
Login and registration module provide user the access rights 
to interact with the system. Registration contains some basic 
details regarding to username, password and email id. Login 
uses username and password to allow the user to pass in to the 
system. 
For storing the details, we use SQL server 2005. For username 
and password separate table is maintained. Tables are handled 
by administrator. 
2.2 Encryption: 
The process of converting the plaintext to human non 
understandable form, so that if the data is obtained by third 
party person then they will not able to understand or retrieve 
it. 
For this purpose, we use various algorithms like M. Aikawa et 
al. proposed a light-weight encryption algorithm for the 
copyright protection. T. Jamil proposed an enhanced 
algorithm for the typical DES algorithm, called AES 
(Advanced Encryption Standard). J. Jiang proposed a parallel 
processing algorithm for the RSA. S. Lian et al. proposed a 
fast video encryption scheme based on chaos. M. McLoone 
and J. V. McCanny designed a hardware circuit for DES 
based on the FPGA technique. M. Shaar et al. proposed a new 
data encryption algorithm, called HHEA. M. E. Smid and D. 
K. Branstad analyzed the past and future of DES algorithm. Y 
P. Zhang et al. proposed a stream cipher algorithm with 
respect to the traditional block-based cipher approaches [2]. 
Location co-ordinates are used as a „key‟ for encrypting the 
contents. 
2.3 GPS Interfacing and Location 
Matching: 
Global Positioning System satellites broadcast signals from 
space that are used by GPS receivers to provide current 
location by making use of longitude and latitude. 
www.ijcat.com 610
International Journal of Computer Applications Technology and Research 
Volume 3– Issue 10, 610 - 611, 2014 
The interfaced GPS device will appear as virtual serial port on 
PC to which one can communicate through our designed 
software which can transmit receive by this serial port like 
HyperTerminal or custom made software. 
Location matching is the key process for successful 
decryption of data. The co-ordinates fetched by GPS must be 
matched with the co-ordinates which were entered while 
encrypting the data. As current location retrieved by GPS 
device will not be exactly same every time due to weather 
conditions, etc. Tolerance distance (TD) important role in 
rounding up or down the co-ordinate values at certain extent. 
2.4 Decryption: 
The location co-ordinates which were used as key while 
encryption must be matched with co-ordinates values fetched 
by GPS device at receiver side. If this condition is satisfied 
then only user can decrypt the data otherwise encrypted file 
will be discarded from the system automatically. 
3. SYSTEM ARCHITECTURE 
Figure. 1 System Modules 
The figure shows the overall flow of the proposed system. 
4. APPLICATIONS 
•Military- In military this technology can be used to keep the 
data secured from the attackers during wars. 
•Banks- This technology can also be used in banking for the 
purpose of money transaction. 
•Individual use- It can also be used to store one‟s confidential 
data. For e.g.: for business purpose. 
•Multinational Industries-In Industries important data can be 
secure by using this technology. 
•College-In college‟s important data can be secure by using 
this technology. For e.g. Question paper. 
5. CONCLUSION 
Location‟s latitude/longitude co-ordinates plays vital role in 
the formation of encrypted data along with decryption 
process. 
The proposed approach can be extended to the other 
application domain e.g. Authorization of software. If the 
system software is authorized within a pre-defined area, such 
as for particular organization the execution of the software 
may achieve the location check based on proposed approach. 
Decryption process is carried out when the authorized user is 
located in specified area. 
This approach can be used for mobile applications such as in 
Smartphone. 
6. REFERENCES 
[1] Swapna B Sasi, Betsy K Abraham, JInil James, Riya Jose 
“Location Based Encryption using Message 
Authentication Code in Mobile Networks”, In IJCAT 
International Journal of Computing and Technology 
Volume 1, Issue 1, February 2014 
[2] H.Liao, P.Lee, Y.Chao, C.Chen, “A Location-Dependent 
Data Encryption Approach for Enhancing Mobile 
Information System Security”, In The 9th International 
Conference on Advanced Communicate Technology, pp. 
625-626, Feb. 2007. 
[3] L. Scott, D. Denning, “A Location Based Encryption 
Technique and Some of Its Applications”, Proceedings of 
ION NTM 2003. 
[4] V. Rajeswari, V. Murali, A.V.S. Anil, “A Navel 
Approach to Identify Geo-Encryption with GPS and 
Different Parameters (Locations And Time)”, (IJCSIT) 
International Journal of Computer Science and 
Information Technologies, Vol. 3 (4), 2012. 
www.ijcat.com 611

More Related Content

What's hot

What's hot (20)

F018133640.key aggregate paper
F018133640.key aggregate paperF018133640.key aggregate paper
F018133640.key aggregate paper
 
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
 
SECURE SENSITIVE DATA SHARING ON BIG DATA PLATFORM
SECURE SENSITIVE DATA SHARING ON BIG DATA PLATFORMSECURE SENSITIVE DATA SHARING ON BIG DATA PLATFORM
SECURE SENSITIVE DATA SHARING ON BIG DATA PLATFORM
 
An Efficient User Privacy and Protecting Location Content in Location Based S...
An Efficient User Privacy and Protecting Location Content in Location Based S...An Efficient User Privacy and Protecting Location Content in Location Based S...
An Efficient User Privacy and Protecting Location Content in Location Based S...
 
IRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage
IRJET- Efficient Traceable Authorization Search System for Secure Cloud StorageIRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage
IRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage
 
Ijcatr04051002
Ijcatr04051002Ijcatr04051002
Ijcatr04051002
 
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
 
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
 
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET -  	  DOD Data Hiding Technique using Advanced LSB with AES-256 AlgorithmIRJET -  	  DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
 
Acquisition of Secured Data from Cloud
Acquisition of Secured Data from CloudAcquisition of Secured Data from Cloud
Acquisition of Secured Data from Cloud
 
Secure Data Sharing Algorithm for Data Retrieval In Military Based Networks
Secure Data Sharing Algorithm for Data Retrieval In Military Based NetworksSecure Data Sharing Algorithm for Data Retrieval In Military Based Networks
Secure Data Sharing Algorithm for Data Retrieval In Military Based Networks
 
Revealing AES Encryption Device Key on 328P Microcontrollers with Differentia...
Revealing AES Encryption Device Key on 328P Microcontrollers with Differentia...Revealing AES Encryption Device Key on 328P Microcontrollers with Differentia...
Revealing AES Encryption Device Key on 328P Microcontrollers with Differentia...
 
IRJET- Protecting E-Health Record with Data Sharing in Public Cloud
IRJET- Protecting E-Health Record with Data Sharing in Public CloudIRJET- Protecting E-Health Record with Data Sharing in Public Cloud
IRJET- Protecting E-Health Record with Data Sharing in Public Cloud
 
Crypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT DataCrypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT Data
 
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloudA Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
 
Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...
 
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
 
IRJET- A Key-Policy Attribute based Temporary Keyword Search Scheme for S...
IRJET-  	  A Key-Policy Attribute based Temporary Keyword Search Scheme for S...IRJET-  	  A Key-Policy Attribute based Temporary Keyword Search Scheme for S...
IRJET- A Key-Policy Attribute based Temporary Keyword Search Scheme for S...
 
Privacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposurePrivacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposure
 

Similar to Location Based Encryption-Decryption Approach for Data Security

APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
IJCNCJournal
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
AIRCC Publishing Corporation
 

Similar to Location Based Encryption-Decryption Approach for Data Security (20)

Accessing secured data in cloud computing environment
Accessing secured data in cloud computing environmentAccessing secured data in cloud computing environment
Accessing secured data in cloud computing environment
 
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENTACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
 
Ijariie1196
Ijariie1196Ijariie1196
Ijariie1196
 
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin AlgorithmA Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
 
710201940
710201940710201940
710201940
 
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
 
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
 
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud StorageSecure Privacy Preserving Using Multilevel Trust For Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
 
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
 
Paper id 27201448
Paper id 27201448Paper id 27201448
Paper id 27201448
 
verifiable and multi-keyword searchable attribute-based encryption scheme for...
verifiable and multi-keyword searchable attribute-based encryption scheme for...verifiable and multi-keyword searchable attribute-based encryption scheme for...
verifiable and multi-keyword searchable attribute-based encryption scheme for...
 
IRJET - Privacy Preserving Keyword Search over Encrypted Data in the Cloud
IRJET -  	  Privacy Preserving Keyword Search over Encrypted Data in the CloudIRJET -  	  Privacy Preserving Keyword Search over Encrypted Data in the Cloud
IRJET - Privacy Preserving Keyword Search over Encrypted Data in the Cloud
 
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
 
A novel cloud storage system with support of sensitive data application
A novel cloud storage system with support of sensitive data applicationA novel cloud storage system with support of sensitive data application
A novel cloud storage system with support of sensitive data application
 
H017665256
H017665256H017665256
H017665256
 
Privacy - Preserving Reputation with Content Protecting Location Based Queries
Privacy - Preserving Reputation with Content Protecting Location Based QueriesPrivacy - Preserving Reputation with Content Protecting Location Based Queries
Privacy - Preserving Reputation with Content Protecting Location Based Queries
 
MESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYMESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHY
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
 

More from Editor IJCATR

Integrated System for Vehicle Clearance and Registration
Integrated System for Vehicle Clearance and RegistrationIntegrated System for Vehicle Clearance and Registration
Integrated System for Vehicle Clearance and Registration
Editor IJCATR
 
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Editor IJCATR
 
Hangul Recognition Using Support Vector Machine
Hangul Recognition Using Support Vector MachineHangul Recognition Using Support Vector Machine
Hangul Recognition Using Support Vector Machine
Editor IJCATR
 

More from Editor IJCATR (20)

Text Mining in Digital Libraries using OKAPI BM25 Model
 Text Mining in Digital Libraries using OKAPI BM25 Model Text Mining in Digital Libraries using OKAPI BM25 Model
Text Mining in Digital Libraries using OKAPI BM25 Model
 
Green Computing, eco trends, climate change, e-waste and eco-friendly
Green Computing, eco trends, climate change, e-waste and eco-friendlyGreen Computing, eco trends, climate change, e-waste and eco-friendly
Green Computing, eco trends, climate change, e-waste and eco-friendly
 
Policies for Green Computing and E-Waste in Nigeria
 Policies for Green Computing and E-Waste in Nigeria Policies for Green Computing and E-Waste in Nigeria
Policies for Green Computing and E-Waste in Nigeria
 
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
 
Optimum Location of DG Units Considering Operation Conditions
Optimum Location of DG Units Considering Operation ConditionsOptimum Location of DG Units Considering Operation Conditions
Optimum Location of DG Units Considering Operation Conditions
 
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
 
Web Scraping for Estimating new Record from Source Site
Web Scraping for Estimating new Record from Source SiteWeb Scraping for Estimating new Record from Source Site
Web Scraping for Estimating new Record from Source Site
 
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
 Evaluating Semantic Similarity between Biomedical Concepts/Classes through S... Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
 
Semantic Similarity Measures between Terms in the Biomedical Domain within f...
 Semantic Similarity Measures between Terms in the Biomedical Domain within f... Semantic Similarity Measures between Terms in the Biomedical Domain within f...
Semantic Similarity Measures between Terms in the Biomedical Domain within f...
 
A Strategy for Improving the Performance of Small Files in Openstack Swift
 A Strategy for Improving the Performance of Small Files in Openstack Swift  A Strategy for Improving the Performance of Small Files in Openstack Swift
A Strategy for Improving the Performance of Small Files in Openstack Swift
 
Integrated System for Vehicle Clearance and Registration
Integrated System for Vehicle Clearance and RegistrationIntegrated System for Vehicle Clearance and Registration
Integrated System for Vehicle Clearance and Registration
 
Assessment of the Efficiency of Customer Order Management System: A Case Stu...
 Assessment of the Efficiency of Customer Order Management System: A Case Stu... Assessment of the Efficiency of Customer Order Management System: A Case Stu...
Assessment of the Efficiency of Customer Order Management System: A Case Stu...
 
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
 
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
 
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
 
Hangul Recognition Using Support Vector Machine
Hangul Recognition Using Support Vector MachineHangul Recognition Using Support Vector Machine
Hangul Recognition Using Support Vector Machine
 
Application of 3D Printing in Education
Application of 3D Printing in EducationApplication of 3D Printing in Education
Application of 3D Printing in Education
 
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
 
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
 
Decay Property for Solutions to Plate Type Equations with Variable Coefficients
Decay Property for Solutions to Plate Type Equations with Variable CoefficientsDecay Property for Solutions to Plate Type Equations with Variable Coefficients
Decay Property for Solutions to Plate Type Equations with Variable Coefficients
 

Recently uploaded

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Recently uploaded (20)

Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational Performance
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 

Location Based Encryption-Decryption Approach for Data Security

  • 1. International Journal of Computer Applications Technology and Research Volume 3– Issue 10, 610 - 611, 2014 Location Based Encryption-Decryption Approach for Data Security Borse Manoj V. Sandip Institute of Engineering and Management Nasik, India Bhandure Harshad D. Sandip Institute of Engineering and Management Nasik, India Patil Dhiraj M. Sandip Institute of Engineering and Management Nasik, India Bhad Pratik B. Sandip Institute of Engineering and Management Nasik, India Abstract: Data security is an important task in today‟s life. Data security can be done using GPS device. Among computer user mostly use data in electronic format. How to provide a security for data is important. In this paper, we propose a Location Based Data- Security System to secure data by applying Encryption-Algorithm and co-ordinate using GPS device. Encryption means of efficient secure integer comparison. The encryption technology cannot restrict the location of data decryption. In order to meet the demand of a location-dependent approach location-dependent data encryption algorithm is needed. A target latitude/longitude co-ordinate is determined firstly. The co-ordinate is incorporated with a random key for data encryption. The receiver can only decrypt the cipher text when the co-ordinate acquired from GPS receiver is matched with the target co-ordinate. GPS-based encryption is an innovative technique that uses GPS-technology to encode location information into the encryption keys to provide location based security. GPS-based encryption adds another layer of security on top of existing encryption methods by restricting the decryption of a message to a particular location. Our experimental results not only validate the effectiveness of our scheme, but also demonstrate that the proposed integer comparison scheme performs better than previous bitwise comparison scheme. Keywords: encryption; decryption; security; GPS technology; location. 1. INTRODUCTION Most of the data encryption techniques are location-independent. They cannot restrict the location of clients for data decryption. In proposed system, a novel location-dependent approach is used for incorporating location information into data transmission. It is important to provide a secure and convenient data transmission. We propose a location-dependent approach for better data security. The client put the coordinates manually in application for data encryption. Then our application create a encrypted file and then we send that encrypted file using e-mail or by any external device to our destination .The client only decrypt the cipher text when the coordinate acquired from GPS receiver matches with the target coordinate. According to our discussion, the approach can meet the confidentiality, authentication, simplicity and practicability of security issues. As a result, the proposed approach can meet the demand for personal and industrial data security. 2. PROPOSED WORK Enhancing the security is the prime aspect of the proposed system. By adding the location based services with the encryption process one can make the data more secure. System consists of following components: 1. Login and Registration 2. Encryption 3. GPS Interfacing and Location Matching 4. Decryption 2.1 Login and Registration: Login and registration module provide user the access rights to interact with the system. Registration contains some basic details regarding to username, password and email id. Login uses username and password to allow the user to pass in to the system. For storing the details, we use SQL server 2005. For username and password separate table is maintained. Tables are handled by administrator. 2.2 Encryption: The process of converting the plaintext to human non understandable form, so that if the data is obtained by third party person then they will not able to understand or retrieve it. For this purpose, we use various algorithms like M. Aikawa et al. proposed a light-weight encryption algorithm for the copyright protection. T. Jamil proposed an enhanced algorithm for the typical DES algorithm, called AES (Advanced Encryption Standard). J. Jiang proposed a parallel processing algorithm for the RSA. S. Lian et al. proposed a fast video encryption scheme based on chaos. M. McLoone and J. V. McCanny designed a hardware circuit for DES based on the FPGA technique. M. Shaar et al. proposed a new data encryption algorithm, called HHEA. M. E. Smid and D. K. Branstad analyzed the past and future of DES algorithm. Y P. Zhang et al. proposed a stream cipher algorithm with respect to the traditional block-based cipher approaches [2]. Location co-ordinates are used as a „key‟ for encrypting the contents. 2.3 GPS Interfacing and Location Matching: Global Positioning System satellites broadcast signals from space that are used by GPS receivers to provide current location by making use of longitude and latitude. www.ijcat.com 610
  • 2. International Journal of Computer Applications Technology and Research Volume 3– Issue 10, 610 - 611, 2014 The interfaced GPS device will appear as virtual serial port on PC to which one can communicate through our designed software which can transmit receive by this serial port like HyperTerminal or custom made software. Location matching is the key process for successful decryption of data. The co-ordinates fetched by GPS must be matched with the co-ordinates which were entered while encrypting the data. As current location retrieved by GPS device will not be exactly same every time due to weather conditions, etc. Tolerance distance (TD) important role in rounding up or down the co-ordinate values at certain extent. 2.4 Decryption: The location co-ordinates which were used as key while encryption must be matched with co-ordinates values fetched by GPS device at receiver side. If this condition is satisfied then only user can decrypt the data otherwise encrypted file will be discarded from the system automatically. 3. SYSTEM ARCHITECTURE Figure. 1 System Modules The figure shows the overall flow of the proposed system. 4. APPLICATIONS •Military- In military this technology can be used to keep the data secured from the attackers during wars. •Banks- This technology can also be used in banking for the purpose of money transaction. •Individual use- It can also be used to store one‟s confidential data. For e.g.: for business purpose. •Multinational Industries-In Industries important data can be secure by using this technology. •College-In college‟s important data can be secure by using this technology. For e.g. Question paper. 5. CONCLUSION Location‟s latitude/longitude co-ordinates plays vital role in the formation of encrypted data along with decryption process. The proposed approach can be extended to the other application domain e.g. Authorization of software. If the system software is authorized within a pre-defined area, such as for particular organization the execution of the software may achieve the location check based on proposed approach. Decryption process is carried out when the authorized user is located in specified area. This approach can be used for mobile applications such as in Smartphone. 6. REFERENCES [1] Swapna B Sasi, Betsy K Abraham, JInil James, Riya Jose “Location Based Encryption using Message Authentication Code in Mobile Networks”, In IJCAT International Journal of Computing and Technology Volume 1, Issue 1, February 2014 [2] H.Liao, P.Lee, Y.Chao, C.Chen, “A Location-Dependent Data Encryption Approach for Enhancing Mobile Information System Security”, In The 9th International Conference on Advanced Communicate Technology, pp. 625-626, Feb. 2007. [3] L. Scott, D. Denning, “A Location Based Encryption Technique and Some of Its Applications”, Proceedings of ION NTM 2003. [4] V. Rajeswari, V. Murali, A.V.S. Anil, “A Navel Approach to Identify Geo-Encryption with GPS and Different Parameters (Locations And Time)”, (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 3 (4), 2012. www.ijcat.com 611