Secure Verification of Location Claims for Mobile Users

Authors

  • S Harika Dept. of IT, VNR Vignana Jyothi Institute of Engineering and Technology, JNTUH, Hyderabad, India
  • Kondabala R Dept. of IT, VNR Vignana Jyothi Institute of Engineering and Technology, JNTUH, Hyderabad, India

DOI:

https://doi.org/10.26438/ijcse/v5i11.171176

Keywords:

Location proof, privacy, spatial-temporal provenance, trust

Abstract

Area based administrations are rapidly winding up monstrously famous. Notwithstanding administrations in light of clients' present area; numerous potential administrations depend on clients of their area history. “Harmful clients may lie about the spatial-impermanent provenance without an effectively masterminded security structure for clients to display their past zones. In this paper, I demonstrate the Spatial-Fleeting provenance Confirmation with Common Evidences (STAMP) conspires”. STAMP is intended for specially appointed portable clients that are producing area proofs for each other in a disseminated setting. In any case, it can stretch much more without trusted versatile clients and remote access focuses. “STAMP ensures the uprightness and non-transferability of the territory proofs and guarantees customers' security. A semi-trusted Confirmation Specialist is used to pass on cryptographic keys in extension which screen the clients against intrigue by a light-weight entropy-based trust in examination air”. This model of execution on the Android stage demonstrates that STAMP is effortlessness as far as computational and capacity assets. Broad recreation tests demonstrate that entropy-based trust display can accomplish high conspiracy discovery precision.

References

S. Saroiu and A. Wolman, "Empowering new versatile applications with area proofs," in Proc. ACM HotMobile, 2009, Art. No. 3.

W. Luo and U. Hengartner, "VeriPlace: A security mindful area verification engineering," in Proc. ACM GIS, 2010, pp. 23– 32.

Z. Zhu and G. Cao, "Towards security saving and intriguing protection in area verification refreshing framework," IEEE Trans. Versatile Comput., vol. 12, no. 1, pp. 51– 64, Jan. 2011.

N. Sastry, U. Shankar, and D. Wagner, "Secure check of area claims," in Proc. ACM WiSe, 2003, pp. 1– 10.

Y. Desmedt, "Significant security issues with the 'unforgeable' (feige)- fiat-shamir verifications of personality and how to defeat them," in Proc. SecuriCom, 1988, pp. 15– 17.

B. Waters and E. Felten, "Secure, private verifications of area," Department of Computer Science, Princeton University, Princeton, NJ, USA, Tech. Rep., 2003.

X. Wang et al., "STAMP: Ad hoc spatial-worldly provenance affirmation for portable clients," in Proc. IEEE ICNP, 2013, pp. 1– 10.

A. Pfitzmann and M. Köhntopp, "Secrecy, imperceptibility, and pseudonymity-a proposition for wording," in Designing Privacy Enhancing Technologies. New York, NY, USA: Springer, 2001.

D. Singelee and B. Preneel, "Area confirmation utilizing secure separation bouncing conventions," in Proc. IEEE MASS, 2005.

Downloads

Published

2025-11-12
CITATION
DOI: 10.26438/ijcse/v5i11.171176
Published: 2025-11-12

How to Cite

[1]
S. Harika and R. Kondabala, “Secure Verification of Location Claims for Mobile Users”, Int. J. Comp. Sci. Eng., vol. 5, no. 11, pp. 171–176, Nov. 2025.