CFP last date
20 December 2024
Reseach Article

A Location-based Secure Access Control Mechanism for Geospatial Data

by Manali Singh Rajpoot
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 79 - Number 11
Year of Publication: 2013
Authors: Manali Singh Rajpoot
10.5120/13787-1868

Manali Singh Rajpoot . A Location-based Secure Access Control Mechanism for Geospatial Data. International Journal of Computer Applications. 79, 11 ( October 2013), 28-32. DOI=10.5120/13787-1868

@article{ 10.5120/13787-1868,
author = { Manali Singh Rajpoot },
title = { A Location-based Secure Access Control Mechanism for Geospatial Data },
journal = { International Journal of Computer Applications },
issue_date = { October 2013 },
volume = { 79 },
number = { 11 },
month = { October },
year = { 2013 },
issn = { 0975-8887 },
pages = { 28-32 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume79/number11/13787-1868/ },
doi = { 10.5120/13787-1868 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:52:45.437628+05:30
%A Manali Singh Rajpoot
%T A Location-based Secure Access Control Mechanism for Geospatial Data
%J International Journal of Computer Applications
%@ 0975-8887
%V 79
%N 11
%P 28-32
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Nowadays due to the advancements in spatial data acquisition technologies, data acquisition technologies are producing mass high precision spatial data. To store such high precision data onto the database is a big challenge today. Spatial database is different from relational database as it contains data along with its location, so security concerns of spatial database are also different from relational data. Thus spatial data requires special security policies and implementation of these security policies. In this work, a secure access control mechanism for geospatial data is developed. In this method, security is provided on two levels. In first level, authorization to every user is provided; thus a user can access only that part of spatial database, over which he has authority to access. In second level, access is controlled over an image; based on the location over which a user needs to access data and access is provided only to that part of an image.

References
  1. Bertino E. , Thuraisingham B. , Gertz M. , and Damiani M. L. , "Security and Privacy for Geospatial Data: Concepts and Research Directions", Inaugural Paper for SPRINGL Workshop, SPRINGL, Irvine USA, Vol. , pp. , 2008.
  2. Bertino E. , and Damiani M. L. , "A Controlled Access to Spatial Data on Web", Conference on Geographic Information Science, AGILE Conference, Heraklion, Greece, Vol. , pp. , April 29-May 1, 2004.
  3. Folger P. , "Geospatial Information and Geographic Information Systems (GIS): Current Issues and Future Challenges", Congressional Research Service, Vol. , pp. 1-24, January 23, 2010.
  4. Li G. , Li C. , Yu W. , and Xie J. , "Security Accessing Model for Web Service based Geo-spatial Data Sharing Application" Digital Earth Summit, ISDE, Nessebar, Bulgaria Vol. , pp. , June 12-14, 2010.
  5. Orlandl E. , "Integrity and Security in AM/FM-GIS", IEEE International, Roma, Italy, Vol. , pp. 26-00151, 1993.
  6. Zeng Y. H. , Wei Z. K. , and Yin Q. , "Research on Spatial Database: A Secure Access Mechanism," Machine Learning & Cybernetics, IEEE International Conference, Hong-Kong, Vol. 6, No. , pp. 1-4, 19-22 August 2007.
  7. Kiefer R. W. , Lillesand T. M. , and Chipman J. W. , "Remote Sensing and Image Interpretation," John Willey and Sons, V edition, University of Wisconsin, Madison, pp. 1-25, 2009.
  8. Ma F. , Gao Y. , and Yan M. , "The Fine-Grained Security Access Control of Spatial Data", the National Hi-Tech Research and Development Program National Hi-Tech Research and Development Program of China, the National Natural Science Foundation of China, National key Technologies R&D Program of China, Vol. , pp. , 2007.
  9. Li G. , "Research of Key Technologies on Encrypting Vector Spatial Data in Oracle Spatial", IEEE International, Vol. , pp. , 2010.
  10. Keating G. N. , Rich P. M. , and Witkowski M. S. , "Challenges for Enterprise GIS", URISA Journal, Vol. 15, pp. 2, 2003.
  11. Wu C. , Li C. , Lv. X. , and Li J. , "Geological Data Access Security Mechanism Based on Grid GIS", Grid GIS Soft and Important Application, Grid GIS Business System Research, IEEE International, Vol. , pp. , 2011.
  12. Sayed E. , and Stoltzfus E. , "Spatial Databases GIS Case Studies", UC Berkeley, IEOR, Vol. , pp. , Dec 4, 2002.
  13. Zhang Y. , and Wang Q. , "Security Model for Distributed GIS Spatial Data", Symposium on Information Science and Engineering, IEEE International, Vol. , pp. , 2008.
Index Terms

Computer Science
Information Sciences

Keywords

Geospatial data partial access geographical information system location-based raster file formats