Data Encryption Model using Geo-Location for Mobile Devices
Authors: Shailesh Raut , Megha Singh, Dr. Rekha Rathore
Certificate: View Certificate
Abstract
Secure communication and authentication is possible through encryption of data and verification . Most of the existing data encryption techniques are locationindependent. Data encrypted with such techniques cannot restrict the location and time of data decryption. The concept of \"Geoencryption and Authentication \" or \" geo location-based encryption and authentication \" is being developed for such a purpose. This paper proposes a survey between different technique to which is related to Geo location based Networks. The purpose of Geo location based network is to secure system from disparate user, so that the right user can take the right decision for the security of the items which are relevant for them. In this paper we are comparing different techniques on different aspects of systems which is used in Geo Location based network.
Introduction
It is an enhancement to traditional encryption that makes use of physical location or time as a mean to produce additional security and security features. It allows data to be encrypted for a specific place or broad geographic area, and supports constraints in time as well as space. It provides full protection against attempts to bypass the location feature. Depending on the Implementation, it can also provide strong protection against location spoofing. The Geoencryption algorithm does not replace any of the conventional cryptographic algorithms, but instead adds an additional layer of security. The capability has tremendous potential benefits to applications such as location-based services, managing secure data and digital movie distribution where controlling access is main concern [2]. Location information has many properties good for encryption and authentication. Logan Scott, Dorothy Denning [1] developed the idea of Geoencryption and its use in digital film distribution. In order to meet the demand of mobile users, Hsien-Chou Liao and YunHsiang Chao introduced a location dependent approach called Location Dependent data Encryption Algorithm (LDEA) [2]. This protocol is not strong enough because they are using the static location which is latitude/longitude coordinates of mobile node and they are using the static tolerance distance to overcome the inaccuracy and inconsistent of GPS receiver
Conclusion
Geo-location is a secured and full proof way to authenticate users or devices.. There is a need of more robust techniques that can be used to find the location efficiently. The survey provided a brief insight to the existing location based authentication techniques. Finally, the survey will be helpful to researchers to build up a startup platform in the field of geo-location based authentication. This paper explains the importance of location based system, corresponding security and Authentication.
Copyright
Copyright © 2025 Shailesh Raut , Megha Singh, Dr. Rekha Rathore. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.