DC Field | Value | Language |
---|---|---|
dc.contributor.author | Goswami, J.K. | - |
dc.contributor.author | Chauhan, C. | - |
dc.date.accessioned | 2020-10-19T05:59:33Z | - |
dc.date.available | 2020-10-19T05:59:33Z | - |
dc.date.issued | 2014-06-01 | - |
dc.identifier.citation | Goswami, J.K., & Chauhan, C.(2014). A Location based Secure Access Control Method for Geospatial Data using Fine Grained Security Access Method.International Journal for Scientific Research & Development.2(3), 978-982.http://ijsrd.com/Article.php?manuscript=IJSRDV2I3429 | en_US |
dc.identifier.issn | 2321-0613 | - |
dc.identifier.uri | http://ijsrd.com/Article.php?manuscript=IJSRDV2I3429 | - |
dc.identifier.uri | http://10.9.150.37:8080/dspace//handle/atmiyauni/632 | - |
dc.description.abstract | Geospatial data is data about the geographic location of earth surface features and boundaries on Earth. Nowadays spatial data is used in every field of society and due to the advancements in spatial data acquisition technologies, such as the advancements in the satellite sensor technologies, high precision digital cameras used in the capturing of photogram metric images and high precision land surveys are producing mass high precision spatial data. Due to these issues nowadays sensitivity of spatial data has increased too many folds. To store such high precision data onto the database is a big challenge today. Major security concerns of the geospatial data are based on authorization, authentication, access control, integrity, security and secure transmission of spatial data over the network and transmission media. In this paper the major security concerns of geospatial data are analyzed. Spatial data and access control methods developed to provide secure access over the spatial database are analyzed and studied. The data models and access control some issues to be resolved for spatial data security are found. In this paper a secure access control method is developed. In this method security over geospatial data on two levels is provided. In first level we provide authorization to every user so that a user can access only that part of spatial database, over which he/she has authority to access. In second level we control access over an image; based on the location over which a user wants to access data and provide access to only that part of an image, so that a significant amount of access time can be saved and quick access to the data can be provided. | en_US |
dc.language.iso | en_US | en_US |
dc.publisher | International Journal for Scientific Research & Development | en_US |
dc.subject | Geographical Information System - (GIS), GIS data models, spatial data, spatial database, Role Based Access Control - (RBAC) Registration Authority - (RA), Access Control List - (ACL), Certificate authority service - (CAS), spatial Database Enterprise - (SDE), Spatial Database Management System - (SDBMS) | en_US |
dc.title | A Location based Secure Access Control Method for Geospatial Data using Fine Grained Security Access Method | en_US |
dc.type | Article | en_US |
Appears in Collections: | 01. Journal Articles |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
A Location based Secure Access Control Method for Geospatial Data using Fine Grained Security Access Method.pdf | 755.07 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.