Open Access   Article Go Back

Secure Verification of Location Claims for Mobile Users

S. Harika1 , Renuka Kondabala2

  1. Department of Information Technology, VNR Vignana Jyothi Institute of Engineering and Technology, Jntuh, Hyderabad, India.
  2. Department of Information Technology, VNR Vignana Jyothi Institute of Engineering and Technology, Jntuh, Hyderabad, India.

Correspondence should be addressed to: harika0893@gmail.com.

Section:Review Paper, Product Type: Journal Paper
Volume-5 , Issue-11 , Page no. 171-176, Nov-2017

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v5i11.171176

Online published on Nov 30, 2017

Copyright © S. Harika, Renuka Kondabala . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: S. Harika, Renuka Kondabala, “Secure Verification of Location Claims for Mobile Users,” International Journal of Computer Sciences and Engineering, Vol.5, Issue.11, pp.171-176, 2017.

MLA Style Citation: S. Harika, Renuka Kondabala "Secure Verification of Location Claims for Mobile Users." International Journal of Computer Sciences and Engineering 5.11 (2017): 171-176.

APA Style Citation: S. Harika, Renuka Kondabala, (2017). Secure Verification of Location Claims for Mobile Users. International Journal of Computer Sciences and Engineering, 5(11), 171-176.

BibTex Style Citation:
@article{Harika_2017,
author = {S. Harika, Renuka Kondabala},
title = {Secure Verification of Location Claims for Mobile Users},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {11 2017},
volume = {5},
Issue = {11},
month = {11},
year = {2017},
issn = {2347-2693},
pages = {171-176},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1561},
doi = {https://doi.org/10.26438/ijcse/v5i11.171176}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v5i11.171176}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1561
TI - Secure Verification of Location Claims for Mobile Users
T2 - International Journal of Computer Sciences and Engineering
AU - S. Harika, Renuka Kondabala
PY - 2017
DA - 2017/11/30
PB - IJCSE, Indore, INDIA
SP - 171-176
IS - 11
VL - 5
SN - 2347-2693
ER -

VIEWS PDF XML
530 366 downloads 257 downloads
  
  
           

Abstract

Area based administrations are rapidly winding up monstrously famous. Notwithstanding administrations in light of clients` present area; numerous potential administrations depend on clients of their area history. “Harmful clients may lie about the spatial-impermanent provenance without an effectively masterminded security structure for clients to display their past zones. In this paper, I demonstrate the Spatial-Fleeting provenance Confirmation with Common Evidences (STAMP) conspires”. STAMP is intended for specially appointed portable clients that are producing area proofs for each other in a disseminated setting. In any case, it can stretch much more without trusted versatile clients and remote access focuses. “STAMP ensures the uprightness and non-transferability of the territory proofs and guarantees customers` security. A semi-trusted Confirmation Specialist is used to pass on cryptographic keys in extension which screen the clients against intrigue by a light-weight entropy-based trust in examination air”. This model of execution on the Android stage demonstrates that STAMP is effortlessness as far as computational and capacity assets. Broad recreation tests demonstrate that entropy-based trust display can accomplish high conspiracy discovery precision.

Key-Words / Index Term

Location proof, privacy, spatial-temporal provenance, trust.

References

[1] S. Saroiu and A. Wolman, "Empowering new versatile applications with area proofs," in Proc. ACM HotMobile, 2009, Art. No. 3.
[2] W. Luo and U. Hengartner, "VeriPlace: A security mindful area verification engineering," in Proc. ACM GIS, 2010, pp. 23– 32.
[3] Z. Zhu and G. Cao, "Towards security saving and intriguing protection in area verification refreshing framework," IEEE Trans. Versatile Comput., vol. 12, no. 1, pp. 51– 64, Jan. 2011.
[4] N. Sastry, U. Shankar, and D. Wagner, "Secure check of area claims," in Proc. ACM WiSe, 2003, pp. 1– 10.
[5] Y. Desmedt, "Significant security issues with the `unforgeable` (feige)- fiat-shamir verifications of personality and how to defeat them," in Proc. SecuriCom, 1988, pp. 15– 17.
[6] B. Waters and E. Felten, "Secure, private verifications of area," Department of Computer Science, Princeton University, Princeton, NJ, USA, Tech. Rep., 2003.
[7] X. Wang et al., "STAMP: Ad hoc spatial-worldly provenance affirmation for portable clients," in Proc. IEEE ICNP, 2013, pp. 1– 10.
[8] A. Pfitzmann and M. Köhntopp, "Secrecy, imperceptibility, and pseudonymity-a proposition for wording," in Designing Privacy Enhancing Technologies. New York, NY, USA: Springer, 2001.
[9] D. Singelee and B. Preneel, "Area confirmation utilizing secure separation bouncing conventions," in Proc. IEEE MASS, 2005.