Open Access Open Access  Restricted Access Subscription Access

Secure and Efficient File Access Using Location Proof Updating System


 

Wireless networks have allowed organizations to become more mobile therefore organizations are now widely using wireless networks. Network security is a big concern for individuals and organizations because, all vital information is stored on the network and most critical process of the business are done through the network. If a network fails or security is compromised an organization could be completely crippled, this will be a big challenge in user centric location based services. In this proposed system, I am going to address this problem using location proof updating system. The system consists of Server, Prover, and client. Server contains sensitive files, clients always trying to download these files from server. The challenge here is client is allowed to download the files from server when they are in restricted location range, to achieve the downloading process location proof updating system produces a Prover application which will key monitor client location details and send this details in periodical intervals of time to the verifier service in server.


Keywords

security, location proof, location privacy, pseudonym, secure
User
Notifications
Font Size

Abstract Views: 113

PDF Views: 0




  • Secure and Efficient File Access Using Location Proof Updating System

Abstract Views: 113  |  PDF Views: 0

Authors

Abstract


Wireless networks have allowed organizations to become more mobile therefore organizations are now widely using wireless networks. Network security is a big concern for individuals and organizations because, all vital information is stored on the network and most critical process of the business are done through the network. If a network fails or security is compromised an organization could be completely crippled, this will be a big challenge in user centric location based services. In this proposed system, I am going to address this problem using location proof updating system. The system consists of Server, Prover, and client. Server contains sensitive files, clients always trying to download these files from server. The challenge here is client is allowed to download the files from server when they are in restricted location range, to achieve the downloading process location proof updating system produces a Prover application which will key monitor client location details and send this details in periodical intervals of time to the verifier service in server.


Keywords


security, location proof, location privacy, pseudonym, secure