Secure Data Travelling User using Hybrid Cryptosystem with User Privacy Protection
Abstract
Nowadays traveling is the activity that everyone likes the most, but sometimes there is one traveling member who is lost and confused looking for the location of the other members. When traveling, they must bring a smartphone because of its small size and easy to carry anywhere. For this reason, an Android-based smartphone application that is able to send GPS data to all travelling members is proposed. In order to secure data transmission, cryptography and group signature to ensure that only traveling members could find out the location are applied. We use hybrid cryptography, which is a combination of symmetric cryptography using AES and asymmetric cryptography using IB-mRSA. We also add group signature as verification that members are in the same traveling group. The test result showed that the proposed method is safer than the comparison method because the symmetric key is encrypted before the key is distributed, so the attacker can not know the key. The total processing time needed to send data until member get data is 2.01 s.
Downloads
References
X. Li and Q. Xu, “A Reliable Fusion Positioning Strategy for Land Vehicles in GPS-Denied Environments Based on Low-Cost Sensors,” IEEE Trans. Ind. Electron., vol. 64, no. 4, pp. 3205–3215, 2017.
A. A. Bin Ariffin, N. H. A. Aziz, and K. A. Othman, “Implementation of GPS for location tracking,” Proc. - 2011 IEEE Control Syst. Grad. Res. Colloquium, ICSGRC 2011, no. November 2015, pp. 77–81, 2011. DOI: https://doi.org/10.1109/ICSGRC.2011.5991833
M. P. Uddin, M. Z. Islam, M. Nadim, and M. I. Afjal, “GPS-based Location Tracking System via Android Device,” Int. J. Res. Comput. Eng. Electron., 2013.
M. N. S. Perera and T. Koshiba, "Fully dynamic group signature scheme with member registration and verifier-local revocation,", vol. 253. Springer Singapore, 2018. DOI: https://doi.org/10.1007/978-981-13-2095-8_31
A. Oracevic, S. Dilek, and S. Ozdemir, “Security in internet of things: A survey,” 2017 Int. Symp. Networks, Comput. Commun. ISNCC 2017, no. i, 2017. DOI: https://doi.org/10.1109/ISNCC.2017.8072001
S. Eom and J. H. Huh, “Group signature with restrictive linkability: minimizing privacy exposure in ubiquitous environment,” J. Ambient Intell. Humaniz. Comput., vol. 0, no. 0, pp. 1–11, 2018. DOI: https://doi.org/10.1007/s12652-018-0698-2
L. Zhang, C. Li, Y. Li, Q. Luo, and R. Zhu, “Group signature based privacy protection algorithm for mobile ad hoc network,” 2017 IEEE Int. Conf. Inf. Autom. ICIA 2017, no. July, pp. 947–952, 2017. DOI: https://doi.org/10.1109/ICInfA.2017.8079039
R. M. Awangga, N. S. Fathonah, and T. I. Hasanudin, “Colenak: GPS tracking model for post-stroke rehabilitation program using AES-CBC URL encryption and QR-Code,” Proc. - 2017 2nd Int. Conf. Inf. Technol. Inf. Syst. Electr. Eng. ICITISEE 2017, vol. 2018-January, pp. 255–260, 2018.
C. Shi, C. Xiangguo, and W. C. Choong, “Practical group signatures from RSA,” Proc. - Int. Conf. Adv. Inf. Netw. Appl. AINA, vol. 1, pp. 211–215, 2006.
W. Stallings, Cryptography and Network Security: Principles amd Practices. 2011.
D. Boneh, X. Ding, G. Tsudik, and C. M. Wong, “A Method for Fast Revocation of Public Key Certificates and Security Capabilities,” USENIX Secur. Symp., 2001.
M. Jain and M. Singh, “Identity Based Secure RSA Enryption System,” Proceedings of International Conference on Communication
and Networks., vol. 508, 2017.
P. Satapathy, N. Pandey, and S. K. Khatri, “NFC Car Keys by Using RSA Cryptography in WSN Security,” Proc. 3rd Int. Conf. Electron. Commun. Aerosp. Technol. ICECA 2019, pp. 143–147, 2019. DOI: https://doi.org/10.1109/ICECA.2019.8821905
A. D. Putri Islamidina, A. Sudarsono, and T. Dutono, “Security System for Data Location of Travelling User using RSA based on Group Signature,” IES 2019 - Int. Electron. Symp. Role Techno-Intelligence Creat. an Open Energy Syst. Towar. Energy Democr. Proc., pp. 88–93, 2019. DOI: https://doi.org/10.1109/ELECSYM.2019.8901638
Sarbpreet, S. Tripathy, and J. Mathew, “Design and evaluation of an IoT enabled secure multi-service Ambulance Tracking System,” IEEE Reg. 10 Annu. Int. Conf. Proceedings/TENCON, pp. 2209–2214, 2017.
S. Banik, A. Bogdanov, and F. Regazzoni, “Compact circuits for combined AES encryption/decryption,” J. Cryptogr. Eng., vol. 9, no. 1, pp. 69–83, 2019. DOI: https://doi.org/10.1007/s13389-017-0176-3
M. P. Babitha and K. R. R. Babu, “Secure cloud storage using AES encryption,” Int. Conf. Autom. Control Dyn. Optim. Tech. ICACDOT 2016, pp. 859–864, 2017.
M. Vaidehi and B. J. Rabi, “Design and analysis of AES-CBC mode for high security applications,” 2nd Int. Conf. Curr. Trends Eng. Technol. ICCTET 2014, pp. 499–502, 2014. DOI: https://doi.org/10.1109/ICCTET.2014.6966347
D. Chaum and E. van Heyst, "Group Signature," Advances in Cryptology - EUROCRYPT 1991 of LEcture Notes in Computer Science, Springer-Verlag, vol. 547, pp. 257-265, 1991. DOI: https://doi.org/10.1007/3-540-46416-6_22
H. Zheng, Q. Wu, B. Qin, L. Zhong, S. He and J. Liu, “Linkable Group Signature for Auditing Anonymous Communication,” Australasian Conference on Information Security and Privacy, pp. 304–321, 2018. DOI: https://doi.org/10.1007/978-3-319-93638-3_18
A. Ishida, Y. Sakai, K. Emura, G. Hanaoka and K. Tanaka, “Fully Anonymous Group Signature with Verifier-Local Revocation,” International Conference on Security and Cryptography for Networks., pp. 23–42, 2018. DOI: https://doi.org/10.1007/978-3-319-98113-0_2
G. Ateniese, J. Camenisch, M. Joye, and G. Tsudik, “A Practical and Provably Secure Coalition-Resistant Group Signature Scheme,” pp. 255–270, 2000. DOI: https://doi.org/10.1007/3-540-44598-6_16
J. Camenisch and J. Groth, “Group Signatures: Better Efficiency and New Theoretical Aspects,” pp. 120–133, 2005. DOI: https://doi.org/10.1007/978-3-540-30598-9_9
Copyright (c) 2020 EMITTER International Journal of Engineering Technology
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
The copyright to this article is transferred to Politeknik Elektronika Negeri Surabaya(PENS) if and when the article is accepted for publication. The undersigned hereby transfers any and all rights in and to the paper including without limitation all copyrights to PENS. The undersigned hereby represents and warrants that the paper is original and that he/she is the author of the paper, except for material that is clearly identified as to its original source, with permission notices from the copyright owners where required. The undersigned represents that he/she has the power and authority to make and execute this assignment. The copyright transfer form can be downloaded here .
The corresponding author signs for and accepts responsibility for releasing this material on behalf of any and all co-authors. This agreement is to be signed by at least one of the authors who have obtained the assent of the co-author(s) where applicable. After submission of this agreement signed by the corresponding author, changes of authorship or in the order of the authors listed will not be accepted.
Retained Rights/Terms and Conditions
- Authors retain all proprietary rights in any process, procedure, or article of manufacture described in the Work.
- Authors may reproduce or authorize others to reproduce the work or derivative works for the author’s personal use or company use, provided that the source and the copyright notice of Politeknik Elektronika Negeri Surabaya (PENS) publisher are indicated.
- Authors are allowed to use and reuse their articles under the same CC-BY-NC-SA license as third parties.
- Third-parties are allowed to share and adapt the publication work for all non-commercial purposes and if they remix, transform, or build upon the material, they must distribute under the same license as the original.
Plagiarism Check
To avoid plagiarism activities, the manuscript will be checked twice by the Editorial Board of the EMITTER International Journal of Engineering Technology (EMITTER Journal) using iThenticate Plagiarism Checker and the CrossCheck plagiarism screening service. The similarity score of a manuscript has should be less than 25%. The manuscript that plagiarizes another author’s work or author's own will be rejected by EMITTER Journal.
Authors are expected to comply with EMITTER Journal's plagiarism rules by downloading and signing the plagiarism declaration form here and resubmitting the form, along with the copyright transfer form via online submission.