Javascript must be enabled to continue!
Location-Based Cryptographic Techniques for Data Protection
View through CrossRef
Data protection has become one of the significant issues in cloud computing when end users must rely on their cloud providers for security purposes. Cloud providers never guarantee the security of data. One of the best ways to overcome this issue is to have the data encrypted before it reaches the cloud servers. Cryptographic becomes a common mechanism used to transmit data securely in open networks, but there are also some challenges to implement encryption internally due to key management. Either the keys are vulnerable towards any security attacks such as HTTP-focused-brute-force attack during transmit over the network, in case of the keys are kept at the user site, or keys are missing if the device is stolen. Thus, location-based encryption adds another layer of security on top of existing encryption method. Location-based encryption enhances security by implementing location information into the encryption and decryption process to counter the possible problems. Location coordinates are used as a key for encrypting the data and the cipher text can only be decrypted if and only the decrypted location is matched with the location that has been computed with the key. In this paper discuss on location-based encryption technique that has been implemented in previous works which are asymmetric, symmetric and hybrid algorithm followed by its strengths and weaknesses. This paper finds that majority of the researchers used hybrid algorithm to implement their location-based encryption instead of using the asymmetric algorithm or hybrid algorithm alone because the hybrid algorithm has fast computation of symmetric algorithm and high security of asymmetric dual keys
Universiti Sains Islam Malaysia
Title: Location-Based Cryptographic Techniques for Data Protection
Description:
Data protection has become one of the significant issues in cloud computing when end users must rely on their cloud providers for security purposes.
Cloud providers never guarantee the security of data.
One of the best ways to overcome this issue is to have the data encrypted before it reaches the cloud servers.
Cryptographic becomes a common mechanism used to transmit data securely in open networks, but there are also some challenges to implement encryption internally due to key management.
Either the keys are vulnerable towards any security attacks such as HTTP-focused-brute-force attack during transmit over the network, in case of the keys are kept at the user site, or keys are missing if the device is stolen.
Thus, location-based encryption adds another layer of security on top of existing encryption method.
Location-based encryption enhances security by implementing location information into the encryption and decryption process to counter the possible problems.
Location coordinates are used as a key for encrypting the data and the cipher text can only be decrypted if and only the decrypted location is matched with the location that has been computed with the key.
In this paper discuss on location-based encryption technique that has been implemented in previous works which are asymmetric, symmetric and hybrid algorithm followed by its strengths and weaknesses.
This paper finds that majority of the researchers used hybrid algorithm to implement their location-based encryption instead of using the asymmetric algorithm or hybrid algorithm alone because the hybrid algorithm has fast computation of symmetric algorithm and high security of asymmetric dual keys.
Related Results
A comprehensive review of post-quantum cryptography: Challenges and advances
A comprehensive review of post-quantum cryptography: Challenges and advances
One of the most crucial measures to maintain data security is the use of cryptography schemes and digital signatures built upon cryptographic algorithms. The resistance of cryptogr...
Stability Control of Position Flow Fuzzy Estimation in Swarm Intelligence Aware Privacy Protection
Stability Control of Position Flow Fuzzy Estimation in Swarm Intelligence Aware Privacy Protection
The group intelligence perception privacy protection model is a method to achieve the balance between user privacy and service requests through the cooperation between users using ...
POTENTIAL APPLICATION OF HARDWARE PROTECTED SYMMETRIC AUTHENTICATION MICROCIRCUITS TO ENSURE THE SECURITY OF INTERNET OF THINGS
POTENTIAL APPLICATION OF HARDWARE PROTECTED SYMMETRIC AUTHENTICATION MICROCIRCUITS TO ENSURE THE SECURITY OF INTERNET OF THINGS
The paper objective is to determine the basic schemes and their characteristics for ensuring the security of Internet of Things nodes using symmetric authentication cryptographic m...
A NEW PROPOSED LIGHTWEIGHT CIPHER
A NEW PROPOSED LIGHTWEIGHT CIPHER
Modern cryptography algorithm development has favored hardware optimization in computer systems. This is especially important for fitting cryptographic protocols onto devices with ...
Next-generation cryptographic techniques for robust network security
Next-generation cryptographic techniques for robust network security
Cryptography is a key enabling tool in digital security that is needed to protect information, secure communication, and ensure the integrity between connected networks. As cyberse...
A review of the cryptographic approaches to data security: The impact of quantum computing, evolving challenges and future solutions
A review of the cryptographic approaches to data security: The impact of quantum computing, evolving challenges and future solutions
Cryptography plays a fundamental role in defending digital data against cyberthreats and emerging quantum computer capabilities. This review discusses core cryptographic techniques...
Cryptographic Techniques for Secure IoT Data Transmission
Cryptographic Techniques for Secure IoT Data Transmission
The rapid expansion of the Internet of Things (IoT) has revolutionized industries by enabling interconnected devices to communicate and exchange data seamlessly. However, the trans...
Opinions of Public School Teachers Toward School Uniforms
Opinions of Public School Teachers Toward School Uniforms
The purpose of the research was to investigate Kansas elementary and middle school teachers' opinions toward school uniforms. The independent variables investigated were academic l...

