Secure Data Travelling User using Hybrid Cryptosystem with User Privacy Protection

  • Anindya Dwi Putri Islamidina Politeknik Elektronika Negeri Surabaya
  • Amang Sudarsono Politeknik Elektronika Negeri Surabaya
  • Titon Dutono Politeknik Elektronika Negeri Surabaya
Keywords: GPS, AES, IB-mRSA, Group Signature


Nowadays traveling is the activity that everyone likes the most, but sometimes there is one traveling member who is lost and confused looking for the location of the other members. When traveling, they must bring a smartphone because of its small size and easy to carry anywhere. For this reason, an Android-based smartphone application that is able to send GPS data to all travelling members is proposed. In order to secure data transmission, cryptography and group signature to ensure that only traveling members could find out the location are applied. We use hybrid cryptography, which is a combination of symmetric cryptography using AES and asymmetric cryptography using IB-mRSA. We also add group signature as verification that members are in the same traveling group. The test result showed that the proposed method is safer than the comparison method because the symmetric key is encrypted before the key is distributed, so the attacker can not know the key. The total processing time needed to send data until member get data is 2.01 s.


Download data is not yet available.


X. Li and Q. Xu, “A Reliable Fusion Positioning Strategy for Land Vehicles in GPS-Denied Environments Based on Low-Cost Sensors,” IEEE Trans. Ind. Electron., vol. 64, no. 4, pp. 3205–3215, 2017.

A. A. Bin Ariffin, N. H. A. Aziz, and K. A. Othman, “Implementation of GPS for location tracking,” Proc. - 2011 IEEE Control Syst. Grad. Res. Colloquium, ICSGRC 2011, no. November 2015, pp. 77–81, 2011. DOI:

M. P. Uddin, M. Z. Islam, M. Nadim, and M. I. Afjal, “GPS-based Location Tracking System via Android Device,” Int. J. Res. Comput. Eng. Electron., 2013.

M. N. S. Perera and T. Koshiba, "Fully dynamic group signature scheme with member registration and verifier-local revocation,", vol. 253. Springer Singapore, 2018. DOI:

A. Oracevic, S. Dilek, and S. Ozdemir, “Security in internet of things: A survey,” 2017 Int. Symp. Networks, Comput. Commun. ISNCC 2017, no. i, 2017. DOI:

S. Eom and J. H. Huh, “Group signature with restrictive linkability: minimizing privacy exposure in ubiquitous environment,” J. Ambient Intell. Humaniz. Comput., vol. 0, no. 0, pp. 1–11, 2018. DOI:

L. Zhang, C. Li, Y. Li, Q. Luo, and R. Zhu, “Group signature based privacy protection algorithm for mobile ad hoc network,” 2017 IEEE Int. Conf. Inf. Autom. ICIA 2017, no. July, pp. 947–952, 2017. DOI:

R. M. Awangga, N. S. Fathonah, and T. I. Hasanudin, “Colenak: GPS tracking model for post-stroke rehabilitation program using AES-CBC URL encryption and QR-Code,” Proc. - 2017 2nd Int. Conf. Inf. Technol. Inf. Syst. Electr. Eng. ICITISEE 2017, vol. 2018-January, pp. 255–260, 2018.

C. Shi, C. Xiangguo, and W. C. Choong, “Practical group signatures from RSA,” Proc. - Int. Conf. Adv. Inf. Netw. Appl. AINA, vol. 1, pp. 211–215, 2006.

W. Stallings, Cryptography and Network Security: Principles amd Practices. 2011.

D. Boneh, X. Ding, G. Tsudik, and C. M. Wong, “A Method for Fast Revocation of Public Key Certificates and Security Capabilities,” USENIX Secur. Symp., 2001.

M. Jain and M. Singh, “Identity Based Secure RSA Enryption System,” Proceedings of International Conference on Communication

and Networks., vol. 508, 2017.

P. Satapathy, N. Pandey, and S. K. Khatri, “NFC Car Keys by Using RSA Cryptography in WSN Security,” Proc. 3rd Int. Conf. Electron. Commun. Aerosp. Technol. ICECA 2019, pp. 143–147, 2019. DOI:

A. D. Putri Islamidina, A. Sudarsono, and T. Dutono, “Security System for Data Location of Travelling User using RSA based on Group Signature,” IES 2019 - Int. Electron. Symp. Role Techno-Intelligence Creat. an Open Energy Syst. Towar. Energy Democr. Proc., pp. 88–93, 2019. DOI:

Sarbpreet, S. Tripathy, and J. Mathew, “Design and evaluation of an IoT enabled secure multi-service Ambulance Tracking System,” IEEE Reg. 10 Annu. Int. Conf. Proceedings/TENCON, pp. 2209–2214, 2017.

S. Banik, A. Bogdanov, and F. Regazzoni, “Compact circuits for combined AES encryption/decryption,” J. Cryptogr. Eng., vol. 9, no. 1, pp. 69–83, 2019. DOI:

M. P. Babitha and K. R. R. Babu, “Secure cloud storage using AES encryption,” Int. Conf. Autom. Control Dyn. Optim. Tech. ICACDOT 2016, pp. 859–864, 2017.

M. Vaidehi and B. J. Rabi, “Design and analysis of AES-CBC mode for high security applications,” 2nd Int. Conf. Curr. Trends Eng. Technol. ICCTET 2014, pp. 499–502, 2014. DOI:

D. Chaum and E. van Heyst, "Group Signature," Advances in Cryptology - EUROCRYPT 1991 of LEcture Notes in Computer Science, Springer-Verlag, vol. 547, pp. 257-265, 1991. DOI:

H. Zheng, Q. Wu, B. Qin, L. Zhong, S. He and J. Liu, “Linkable Group Signature for Auditing Anonymous Communication,” Australasian Conference on Information Security and Privacy, pp. 304–321, 2018. DOI:

A. Ishida, Y. Sakai, K. Emura, G. Hanaoka and K. Tanaka, “Fully Anonymous Group Signature with Verifier-Local Revocation,” International Conference on Security and Cryptography for Networks., pp. 23–42, 2018. DOI:

G. Ateniese, J. Camenisch, M. Joye, and G. Tsudik, “A Practical and Provably Secure Coalition-Resistant Group Signature Scheme,” pp. 255–270, 2000. DOI:

J. Camenisch and J. Groth, “Group Signatures: Better Efficiency and New Theoretical Aspects,” pp. 120–133, 2005. DOI:

How to Cite
Anindya Dwi Putri Islamidina, Amang Sudarsono, & Titon Dutono. (2020). Secure Data Travelling User using Hybrid Cryptosystem with User Privacy Protection. EMITTER International Journal of Engineering Technology, 8(1), 102-125.