A Location-Dependent Data Encryption Approach for Enhancing Mobile Information System Security

The wide spread of WLAN and the popularity of mobile devices increases the frequency of data transmission among mobile users. How to provide a secure and convenient protocol for data transmission is important. In this paper we propose a location-dependent approach is proposed for mobile information system. The mobile client transmits a target latitude/longitude coordinate for data encryption to information server. Then, the server encrypts the message and sends the ciphertext back to the mobile client. The client can only decrypt the ciphertext when the coordinate acquired form GPS receiver matches with the target coordinate. According to our discussion, the approach can meet the confidentiality, authentication, simplicity, and practicability of security issues. As a result, the proposed approach can meet the demands of mobile information system in the future.

[1]  Frank Dürr,et al.  On location models for ubiquitous computing , 2004, Personal and Ubiquitous Computing.

[2]  M. McLoone,et al.  A high performance FPGA implementation of DES , 2000, 2000 IEEE Workshop on SiGNAL PROCESSING SYSTEMS. SiPS 2000. Design and Implementation (Cat. No.00TH8528).

[3]  Ya-Ping Zhang,et al.  A stream cipher algorithm based on conventional encryption techniques , 2004, Canadian Conference on Electrical and Computer Engineering 2004 (IEEE Cat. No.04CH37513).

[4]  S. Furuya,et al.  A Lightweight Encryption Method Suitable For Copyright Protection , 1998, International 1998 Conference on Consumer Electronics.

[5]  D. Mohapatra,et al.  Survey of location based wireless services , 2005, 2005 IEEE International Conference on Personal Wireless Communications, 2005. ICPWC 2005..

[6]  Jianliang Xu,et al.  The D-tree: an index structure for planar point queries in location-based wireless services , 2004, IEEE Transactions on Knowledge and Data Engineering.

[7]  Marco Gruteser,et al.  Protecting privacy, in continuous location-tracking applications , 2004, IEEE Security & Privacy Magazine.

[8]  D. K. Branstad,et al.  Data Encryption Standard: past and future , 1988, Proc. IEEE.

[9]  Jianmin Jiang Pipeline algorithms of RSA data encryption and data compression , 1996, Proceedings of International Conference on Communication Technology. ICCT '96.

[10]  Yuewei Dai,et al.  A fast video encryption scheme based-on chaos , 2004, ICARCV 2004 8th Control, Automation, Robotics and Vision Conference, 2004..

[11]  M. Shaar,et al.  A hybrid hiding encryption algorithm (HHEA) for data communication security , 2003, 2003 46th Midwest Symposium on Circuits and Systems.

[12]  Hsien-Chou Liao,et al.  A Novel Approach for Data Encryption Depending on User Location , 2006, PACIS.

[13]  Richard Sharp,et al.  Using smart phones to access site-specific services , 2005, IEEE Pervasive Computing.

[14]  T. Jamil The Rijndael algorithm , 2004, IEEE Potentials.

[15]  Alex Pentland,et al.  Social serendipity: mobilizing social software , 2005, IEEE Pervasive Computing.

[16]  Yuguang Fang,et al.  Securing sensor networks with location-based keys , 2005, IEEE Wireless Communications and Networking Conference, 2005.