Location proofing using identity based encryption and the Google cloud on the mobile applications

  • Authors:
  • Pramukh Karla;Vikhyath Marapadaga;Varadraj Gurupur

  • Affiliations:
  • Texas A&M University- Commerce, Commerce, TX;North Carolina State University, Raleigh, NC;Texas A&M University- Commerce, Commerce, TX

  • Venue:
  • Proceedings of the 50th Annual Southeast Regional Conference
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

This paper describes a Location Proofing system that provides the user's location by encrypting the data using Identity Based Encryption. A location proof is a piece of data that certifies the receiver to a geographical location. Location proofs are handed out by the wireless infrastructure (e.g., a Wi-Fi access point or a cell tower) to mobile devices. There are many location-proof mobile applications in the market that provide location-based services to users. These location-based services lack two important mechanisms, a) to ascertain their current and past locations and b) the security issues associated with the user's data. Many applications and services today enable mobile devices to discover and communicate their location to a server. The server then uses this information to perform computation and return data relevant to the devices' location. For example, in a mapping application (e.g., Google Maps), a device sends its geographical coordinates to a server, that in turn returns the relevant map information back to the client. In an emergency scenario, the device communicates its location, either through a Global Positioning System or through some sort of cell tower triangulation to a server, which then dispatches assistance to the user. In order to overcome these shortcomings we are combining the high-speed performance and clustering features of the cloud with Identity Based Encryption. By which we can issue the keys to the user's mobile device, which runs on the mobile operation system.