首页    期刊浏览 2024年09月20日 星期五
登录注册

文章基本信息

  • 标题:Data Security in Mobile Devices by GEO Locking
  • 本地全文:下载
  • 作者:M Prabu Kumar ; K Praneesh Kumar Yadav
  • 期刊名称:International Journal of Network Security & Its Applications
  • 印刷版ISSN:0975-2307
  • 电子版ISSN:0974-9330
  • 出版年度:2009
  • 卷号:1
  • 期号:3
  • 出版社:Academy & Industry Research Collaboration Center (AIRCC)
  • 摘要:In this paper we present a way of hiding the data in mobile devices from being compromised. We use two level data hiding technique, where in its first level data is encrypted and stored in special records and the second level being a typical password protection scheme. The second level is for secure access of information from the device. In the first level, encryption of the data is done using the location coordinates as key. Location Coordinates are rounded up figures of longitude and latitude information. In the second phase the password entry differs from conventional schemes. Here we have used the patterns of traditional Rangoli for specifying the password and gaining access, thus minimising the chances of data leak in hostile situations. The proposed structure would be a better trade off in comparison with the previous models which use Bio Metric authentication – a relatively costly way of authentication.
  • 关键词:In this paper we present a way of hiding the data in mobile devices from being compromised. We use two;level data hiding technique; where in its first level data is encrypted and stored in special records and the;second level being a typical password protection scheme. The second level is for secure access of;information from the device. In the first level; encryption of the data is done using the location;coordinates as key. Location Coordinates are rounded up figures of longitude and latitude information.;In the second phase the password entry differs from conventional schemes. Here we have used the;patterns of traditional Rangoli for specifying the password and gaining access; thus minimising the;chances of data leak in hostile situations. The proposed structure would be a better trade off in;comparison with the previous models which use Bio Metric authentication – a relatively costly way of;authentication.
国家哲学社会科学文献中心版权所有