SPECIFIC LOCATION BASED ACCESS CONTROL SYSTEM

Authors

  • Joshi Akash Computer Engineering Department, Vidya Prasarini Sabha’s College of Engineering And Technology Lonavala, Pune
  • Kamble Rutuja Computer Engineering Department, Vidya Prasarini Sabha’s College of Engineering And Technology Lonavala, Pune
  • Uthwal Harshada Computer Engineering Department, Vidya Prasarini Sabha’s College of Engineering And Technology Lonavala, Pune
  • Prof M.M.Jadhao Computer Engineering Department, Vidya Prasarini Sabha’s College of Engineering And Technology Lonavala, Pune

Keywords:

data encryption, GPS, mobile computing, location-based service

Abstract

Cloud computing is that the field of knowledge technology and development of computer technologies based
on the World Wide Web. One among the foremost necessary challenges during this area is the security of cloud
computing. This new approach proves expeditiously all-time low power consumption of the asynchronous
implementation compared to the present synchronous. A completely unique technique, we have a tendency to improve
the safety of data access in cloud computing for specific locations using the location-based cryptography. The wide
unfold of mobile devices will increase the frequency of data transmission among mobile users. Most of the data
encoding technology is location-independent. DEA algorithmic rule by using the GPS coordinate, known as LDEA
algorithm, was proposed in our previous research. It is mainly to include the latitude/longitude coordinate within the
encoding and so to limit the location of data decryption. A toleration distance is designed to beat the quality and
inconsistent drawback of GPS receiver. Encrypted information is often decrypted. The technology cannot limit the
placement of data decryption. Meet the demand of mobile users in the future. A location-dependent (LD) approach,
referred to as location-dependent encoding algorithm, is proposed during this paper. A target latitude/longitude
coordinate is set firstly. The coordinate is incorporated with a random key. The receiver will decode the cipher text
once the coordinate non-inheritable from GPS receiver is matched with the target coordinate. GPS receiver is
inaccuracy and inconsistent. The placement of user is troublesome to precisely match with the target coordinate. A
toleration distance (TD) is additionally designed in LDEA to extend. The safety analysis shows that break LDEA is
nearly not possible since the length of the random key is adjustable. The results show that the cipher text can only be
decrypted under the restriction of TD.

Published

2017-05-25

How to Cite

Joshi Akash, Kamble Rutuja, Uthwal Harshada, & Prof M.M.Jadhao. (2017). SPECIFIC LOCATION BASED ACCESS CONTROL SYSTEM. International Journal of Advance Research in Engineering, Science & Technology, 4(5), 440–451. Retrieved from https://ijarest.org/index.php/ijarest/article/view/1555