2020
DOI: 10.1088/1742-6596/1551/1/012008
|View full text |Cite
|
Sign up to set email alerts
|

Implementing Location-Based Cryptography on Mobile Application Design to Secure Data in Cloud Storage

Abstract: This paper aims to identify security issues and existing solutions for cloud storage protection and to propose a mobile application design for securing data in cloud storage using the location-based cryptographic technique. In the proposed mobile application design, the user is required to perform the encryption before sending the data into the cloud storage. This paper provides a novel technique using location-based cryptography, secret keyword and hash function in order to further enhance the security of dat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 6 publications
0
5
0
Order By: Relevance
“…Due to its high performance, the AES method was used to encrypt and decode data with location coordinates as an additional encryption key known as the geo-lock key. The use of location information to construct the key ensured that the decryption procedure would only take place at the given location before the encryption process began [13].…”
Section: Related Workmentioning
confidence: 99%
“…Due to its high performance, the AES method was used to encrypt and decode data with location coordinates as an additional encryption key known as the geo-lock key. The use of location information to construct the key ensured that the decryption procedure would only take place at the given location before the encryption process began [13].…”
Section: Related Workmentioning
confidence: 99%
“…In [ 9 ], a security approach based on cryptography has been presented through examining the security issues in mobile devices and the available solutions. Also, it is mentioned that asymmetric cryptography is not a proper option for securing the resource-limited infrastructures such as IoT due to high complexity of the design and implementation.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Implementation of a location‐based cryptographic system for securing the data dumped in the cloud using mobile applications was demonstrated by Shamsuddin et al 32 This approach utilized advanced encryption standard (AES) technique to evaluate various simulation metrics such as dynamic toleration distance (DTD), Computational time, and so forth. The experimental analysis was analyzed and the outcome emphasized that the data was protected and secured highly using this approach.…”
Section: Literature Reviewmentioning
confidence: 99%