CFP last date
20 December 2024
Reseach Article

Location Dependent Cryptographic Algorithm based on Open Source Application

by Mainak Sen, Sachin Tibrewal, Sumana Majumder, Nehal Ahmad, Kishlay Kumar Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 160 - Number 4
Year of Publication: 2017
Authors: Mainak Sen, Sachin Tibrewal, Sumana Majumder, Nehal Ahmad, Kishlay Kumar Singh
10.5120/ijca2017913029

Mainak Sen, Sachin Tibrewal, Sumana Majumder, Nehal Ahmad, Kishlay Kumar Singh . Location Dependent Cryptographic Algorithm based on Open Source Application. International Journal of Computer Applications. 160, 4 ( Feb 2017), 15-19. DOI=10.5120/ijca2017913029

@article{ 10.5120/ijca2017913029,
author = { Mainak Sen, Sachin Tibrewal, Sumana Majumder, Nehal Ahmad, Kishlay Kumar Singh },
title = { Location Dependent Cryptographic Algorithm based on Open Source Application },
journal = { International Journal of Computer Applications },
issue_date = { Feb 2017 },
volume = { 160 },
number = { 4 },
month = { Feb },
year = { 2017 },
issn = { 0975-8887 },
pages = { 15-19 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume160/number4/27060-2017913029/ },
doi = { 10.5120/ijca2017913029 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:05:44.620049+05:30
%A Mainak Sen
%A Sachin Tibrewal
%A Sumana Majumder
%A Nehal Ahmad
%A Kishlay Kumar Singh
%T Location Dependent Cryptographic Algorithm based on Open Source Application
%J International Journal of Computer Applications
%@ 0975-8887
%V 160
%N 4
%P 15-19
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The use of Location Based Services has helped in enhancing information security to a great extent but there’s no denial that there are flaws in its applications. Sometimes these identities are forged or duplicated which would lead data breach and thus compromised security. In present world scenario, the ability to securely store data and transfer sensitive information has proved to be critical when it comes to success in business as well as war. Hence, we need a better form of cryptographic technique. In this paper we focus on the concept of Location Dependent data Encryption Algorithm. The Android operating system is may be the most profitable and gainful options of an open source platform. Android is based on the Linux kernel and it consists of APIs with class bearing potential reference to Location Based Services which gives facility to obtain a mobile phone’s location from any location provider such as GPS or A-GPS and is designed to be open for other location based systems.

References
  1. Xu, H., S. Gupta. 2009. The Effects of Privacy Concerns and Personal Innovativeness on Potential and Experienced Customers’ Adoption of Location-Based Services. Electronic Markets, Vol. 19, No. 2: 137-149,.
  2. Barnes, J.S. 2003. Known by the Network: The Emergence of Location-Based Mobile Commerce” In E.P. Lim and K. Siau (eds.). Advances in Mobile Commerce Technology. Hershey, PA: Idea Group: 171–189.
  3. Park, J., S. Yang, and X. Lehto.2007. Adoption of Mobile Technologies for Chinese Consumers. Journal of Electronic Commerce Research, Vol. 8, No. 3:196-206.
  4. G.M. Djuknic and R.E. Richton. February 2001. Geolocation and Assisted GPS. Bell Laboratories, Lucent Technologies, Computer (ISSN 0018-9162).
  5. J.E.Spinney.2003. Mobile positioning and LBS application. Geography 88 (4) 256-265.
  6. Pranjala G Kolapwarand and Prof. H. P. Ambulgekar. Use of Advanced Encryption Standard to Enhance the Performance of Geo Protocol in Location Based Network. International Journal of Science and Research, ISSN:2319-7064.
  7. Y. Lakshmi Prasanna and Prof. E. Madhusudhan Reddy.2014. A Generalized Study on Encryption Techniques for Location Based Services. Journal of Computer Engineering e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 4, PP 19-26.
  8. L. Scott and D. Denning. 2003. A Location Based Encryption Technique and Some of Its Applications. Proceedings of ION NTM, 734-740.
  9. V. Rajeswari, V. Murali and A.V.S.Anil. 2012. A Novel Approach to Identify Geo-Encryption with GPS and Different Parameters (Locations And Time). International Journal of Computer Science and Information Technologies, Vol. 3(4), 4917-4919.
  10. Techniques used for location based services: A survey, Technical report: CSM-428, ISSN:1744-8050.
  11. Hsien-Chou Liao and Yun-Hsiang Chao. 2008.A New Data Encryption Algorithm Based on the Location of Mobile Users. Information Technology Journal 7 (1), 63-69.
  12. Hatem Hamad and Souhir Elkourd. 2010. Data encryption using the dynamic location and speed of mobile node. Journal Media and communication studies, 67-75.
  13. H. C. Liao, Y H. Chao and C. Y Hsu. 2006. A Novel Approach for Data Encryption Depending on User Location. The Tenth Pacific Asia Conference on Information Systems (PACIS).
  14. Nisha Gholap, Prof S. S. Das and Prof Londhe D N.2013. Location And Authentication Based Encryption Scheme Application Design For Mobile Device. International Journal of Engineering Research & Technology Vol. 2, Issue 4, ISSN: 2278-018.
  15. H.Liao, P.Lee, Y.Chao and C.Chen.2007. Location-Dependent Data Encryption Approach for Enhancing Mobile Information System Security. 9th International Conference on Advanced Communicate Technology, 625-626.
  16. Mundt TM.2005. Location dependent digital rights management system.9th International Conference on Advanced Communicate Technology, 625-628.
  17. H.Hamad and S.Elkourd.2010. Data encryption using the dynamic location and speed of mobile node. Journal Media and Communication Studies, Vol. 2,67-75.
  18. Hatem Hamad and Souhir El Kourd.2012. Key strength with encryption and dynamic location of mobile phone. 6th International Conference on Sciences of electronic, technologies of information and telecommunications, 468-473,doi: 10.1109/SETIT.2012.6481958.
  19. Muhammad Waseem Khan.2013.SMS Security in Mobile Devices: A Survey. Int. J. Advanced Networking and Applications Volume: 05, Issue: 02,1873-1882, ISSN: 0975-0290.
  20. Gurjeet Kaur and Monika Sachdeva.2012. Implementation of Secure Authentication Mechanism for LBS using best Encryption Technique on the Bases of performance Analysis of cryptographic Algorithms. International Journal of Security, Privacy and Trust Management, Vol.1, No 6.
  21. Michael Spreitzenbarth, Sven Schmitt and Felix Freiling. 2012. COMPARING SOURCES OF LOCATION DATA FROM ANDROID SMARTPHONES. 8th IFIP WG 11.9 International Conference on Digital Forensics, Pretoria, South Africa, January 3-5.
Index Terms

Computer Science
Information Sciences

Keywords

Location based services location based encryption algorithm open source application geographic positioning system android sdk.