Overview of Data Security by Location Based Encryption for Banking Application
Keywords:data encryption, GPS, mobile computing, location-based service
Cloud computing may be a new approach within the field of data technology and development of mobile
technologies supported the globe Wide internet. One among the foremost vital challenges during this space is that the
security of cloud computing. On the opposite hand the protection of access to crucial and counselling in banks,
establishments and etc. is extraordinarily essential. Typically even with the large prices, it's not totally secured and it's
compromised by the attackers. By providing a unique technique, we tend to improve the protection of information access
in cloud computing for an organization or the other specific locations mistreatment the location-based encoding. The
wide unfold of wireless local area network and therefore the quality of mobile devices will increase the frequency of
information transmission among mobile users. However, most of the info encoding technology is location-independent.
Associate degree encrypted knowledge is decrypted anyplace. The encoding technology cannot prohibit the situation of
information cryptography. So as to satisfy the demand of mobile users within the future, a location-dependent approach,
known as location-dependent encryption formula (LDEA), is planned during this paper. A target latitude/longitude
coordinate is decided first off. The coordinate is incorporated with a random key for encryption. The receiver will solely
decode the cipher text once the coordinate inheritable from GPS receiver is matched with the target coordinate.
However, current GPS receiver is quality and inconsistent. The situation of a mobile user is troublesome to precisely
match with the target coordinate. A toleration distance (TD) is additionally designed in LDEA to extend its usefulness.
The protection analysis shows that the chance to interrupt LDEA is sort of not possible since the length of the random
secret is adjustable. An image is additionally enforced for experimental study. The results show that the cipher text will
solely be decrypted beneath the restriction of TD. It illustrates that LDEA is effective and sensible for knowledge
transmission in mobile setting.