CFP last date
20 December 2024
Reseach Article

"Geo-Encryption Lite" - A location based Encryption Application for Android

by Smita Chaudhari, Samadhan Yangad, Ashish Jha, Ashish Surwase
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 165 - Number 4
Year of Publication: 2017
Authors: Smita Chaudhari, Samadhan Yangad, Ashish Jha, Ashish Surwase
10.5120/ijca2017913849

Smita Chaudhari, Samadhan Yangad, Ashish Jha, Ashish Surwase . "Geo-Encryption Lite" - A location based Encryption Application for Android. International Journal of Computer Applications. 165, 4 ( May 2017), 13-17. DOI=10.5120/ijca2017913849

@article{ 10.5120/ijca2017913849,
author = { Smita Chaudhari, Samadhan Yangad, Ashish Jha, Ashish Surwase },
title = { "Geo-Encryption Lite" - A location based Encryption Application for Android },
journal = { International Journal of Computer Applications },
issue_date = { May 2017 },
volume = { 165 },
number = { 4 },
month = { May },
year = { 2017 },
issn = { 0975-8887 },
pages = { 13-17 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume165/number4/27560-2017913849/ },
doi = { 10.5120/ijca2017913849 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:11:30.255143+05:30
%A Smita Chaudhari
%A Samadhan Yangad
%A Ashish Jha
%A Ashish Surwase
%T "Geo-Encryption Lite" - A location based Encryption Application for Android
%J International Journal of Computer Applications
%@ 0975-8887
%V 165
%N 4
%P 13-17
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In today’s world mobile communication has become part and parcel of our daily life. It’s hard to imagine today life without the service and application that are provided by the mobile device. These services and applications are basically wireless based and there is always need of secure communication or some kind of channel. Encryption is one way of providing secure communication but most of the existing data encryption techniques are location independent. And here comes the concept of “Geo-Encryption” or “Location-Based encryption”. It provides an additional layer of security beyond that provided by conventional cryptography. It allows the encryption of data as well as decryption for a specific location(s) or specific area(s) e.g. college campus area or in a particular building. Constraints in time as well as velocity can also be added with respect to the location while encryption. Geo-encryption can be used with both fixed and mobile application and supports wide range of data sharing and distribution policy.

References
  1. Logan Scott, Dorothy Denning, "A Location Based Encryption Techniques and some its Application”, ION NTM, pp. 734-740, 2003..
  2. Hsien-Chou Liao and Yun-Hsiang Chao," A New Data Encryption Algorithm Based on the Location of Mobile Users", Information Technology Journal 7(1), pp. 63-69, 2008.
  3. Hatem Hamad and Souhir Elkourd, "Data encryption using the dynamic location and speed of mobile node", Journal Media and communication studies, pp. 67-75, 2010
  4. Rohollah karimi and Mohammad kalantari, "Enhancing security and confidentiality in location based data encryption algiritms", IEEE Conference, pp. 30-35, 2011.
  5. H. Liao, P.Lee, Y.Chao, C.Chen, “A Location-Dependent Data Encryption Approach for Enhancing Mobile Information System Security”, In The 9th International Conference on Advanced Communicate Technology, pp. 625-626, Feb. 2007.
  6. H. C. Liao, Y H. Chao, and C. Y Hsu, "A Novel Approach for Data Encryption Depending on User Location," The Tenth Pacific Asia Conference on Information Systems (PACIS 2006), July 2006.
  7. L. Scott, D. Denning, “Location Based Encryption & Its Role in Digital Cinema Distribution”, Proceedings of ION GPS/GNSS 2003.
  8. A. Perrig, R. Canetti, J.D. Tygar, D. Song, “The TESLA Broadcast Authentication Protocol”, 2002, pp. 2-13.s
  9. Rohollah karimi and Mohammad kalantari, "Enhancing security and confidentiality in location based data encryption algorithms", IEEE Conference, pp. 30-35, 2011.
  10. S U Nimbhorkar, Smruti P Patil, "A Survey on Location Based Authentication Protocols for Mobile Devices", IJCSN, pp. 44-48, 2013.
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography Geo-Encryption Location based encryption Mobile Communications Mobile Applications Android Operating System