Secure Enhanced Geolocking

Slides:



Advertisements
Similar presentations
HTTP Request/Response Process 1.Enter URL ( in your browser’s address bar. 2.Your browser uses DNS to look up IP address of server.com.
Advertisements

CONNECTING REMOTE PC WITHOUT ANY SOFTWARE USING CHROME WEB BROWSER WITH ITS ADD-ON/EXTENSION FOR REMOTE ACCESS HASSLE FREE ACCESS USING A COMMON GMAIL.
DICOM INTERNATIONAL DICOM INTERNATIONAL CONFERENCE & SEMINAR April 8-10, 2008 Chengdu, China DICOM Security Eric Pan Agfa HealthCare.
12/2/2003chow1 Network and System Support for Multi-Level Security C. Edward Chow Department of Computer Science University of Colorado At Colorado Springs.
Multiple Tiers in Action
Apache : Installation, Configuration, Basic Security Presented by, Sandeep K Thopucherela, ECE Department.
1 CS428 Web Engineering Lecture 18 Introduction (PHP - I)
Web Programming Language Dr. Ken Cosh Week 1 (Introduction)
Boris Tshibangu. What is a proxy server? A proxy server is a server (a computer system or an application) that acts as an intermediary for requests from.
WHAT IS PHP PHP is an HTML-embedded scripting language primarily used for dynamic Web applications.
1 Open Source Programming. -Introduction to PHP -PHP installation /wamp server installation for PHP environment -PHP syntax -PHP variables -PHP Strings.
SYST Web Technologies SYST Web Technologies Installing a Web Server (XAMPP)
Joel Bapaga on Web Design Strategies Technologies Commercial Value.
Databases and the Internet. Lecture Objectives Databases and the Internet Characteristics and Benefits of Internet Server-Side vs. Client-Side Special.
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Design Extensions to Google+ CS6204 Privacy and Security.
Chapter 16 The World Wide Web Chapter Goals Compare and contrast the Internet and the World Wide Web Describe general Web processing Describe several.
Design for Senior Project December 05, 2007 Raytheon_Design_Review.ppt 1 of 19 Raytheon – Google Earth Roy Daniels, Marc Maciel, Rifina Pierre Department.
10/5/2015CS346 PHP1 Module 1 Introduction to PHP.
HTML, XHTML, and CSS Sixth Edition Chapter 1 Introduction to HTML, XHTML, and CSS.
Pi In The Sky (Web Interface) Gaston Seneza Philander Smith College, Little Rock, AR SIParCS Intern Mentors: Dr. Richard Loft & Dr. Raghu Raj Kumar 1.
SEC835 Practical aspects of security implementation Part 1.
PHP MYWIKI Brian Casey Eastern Kentucky University.
Website Design Lecture 1. Outline Introduction to the module Outline of the Assessment Schedule Lecture Static XHTML, client side and server side Why.
Implement An Online Management System for PBX Presented by: Bui Phuong Nhung Advisor: Dr. Wei, Chao-Huang.
Mobile web Sebastian Lopienski IT Technical Forum 29 June 2012.
Web Design (1) Terminology. Coding ‘languages’ (1) HTML - Hypertext Markup Language - describes the content of a web page CSS - Cascading Style Sheets.
CS 4720 Dynamic Web Applications CS 4720 – Web & Mobile Systems.
Luis F. Aguas Technological innovation Project Telecommunications and Digital TV.
NASRULLAH KHAN.  Lecturer : Nasrullah   Website :
HTML5 based Notification System for Updating E-Training Contents Yu-Doo Kim 1 and Il-Young Moon 1 1 Department of Computer Science Engineering, KoreaTech,
HTML Concepts and Techniques Fifth Edition Chapter 1 Introduction to HTML.
Chapter 1 Introduction to HTML, XHTML, and CSS HTML5 & CSS 7 th Edition.
8 th Semester, Batch 2009 Department Of Computer Science SSUET.
(ITI310) By Eng. BASSEM ALSAID SESSIONS 10: Internet Information Services (IIS)
E-Commerce & Bank Security By: Mark Reed COSC 480.
1/7/2016www.infocampus.co.in1. 1/7/2016www.infocampus.co.in2 Web Development training gives you and all-round training in both the design and the development.
Presented By Sushil K. Chaturvedi Assistant Professor SRCEM,Banmore 1.
SSL: Secure Socket Layer By: Mike Weissert. Overview Definition History & Background SSL Assurances SSL Session Problems Attacks & Defenses.
HTML PROJECT #1 Project 1 Introduction to HTML. HTML Project 1: Introduction to HTML 2 Project Objectives 1.Describe the Internet and its associated key.
Web Development. Agenda Web History Network Architecture Types of Server The languages of the web Protocols API 2.
Architecture Review 10/11/2004
ET-570 Smart Phone Apps.
Web Programming Language
Project 1 Introduction to HTML.
Objective % Select and utilize tools to design and develop websites.
What are they? The Package Repository Client is a set of Tcl scripts that are capable of locating, downloading, and installing packages for both Tcl and.
Web Concepts Lesson 2 ITBS2203 E-Commerce for IT.
Architecture of Android
Hybrid Cloud Architecture for Software-as-a-Service Provider to Achieve Higher Privacy and Decrease Securiity Concerns about Cloud Computing P. Reinhold.
Software Applications for end-users
Project 1 Introduction to HTML.
ICT Communications Lesson 1: Using the Internet and the World Wide Web
Objective % Select and utilize tools to design and develop websites.
HTML5 based Notification System for Updating
Drupal VM and Docker4Drupal For Drupal Development Platform
Web App vs Mobile App.
Using SSL – Secure Socket Layer
Drupal VM and Docker4Drupal as Consistent Drupal Development Platform
Database Driven Websites
Sri Naga Jahnavi Yeddanapudy
Senior Project Spring 2018 Virtual Roll Call 4.0 Problem Solution
PHP and Forms.
Secure Web Programming
Tareq Khan, Ph.D. Assistant Professor,
Introduction to World Wide Web
(Authentication / Authorization)
Information Retrieval and Web Design
Web Application Development Using PHP
CGS 3066: Web Programming and Design Fall 2019
LAWS : Location Accuracy based on Wireless Signals Master Project
Presentation transcript:

Secure Enhanced Geolocking Masters project By Ashish Korpe Department of Computer Science University of Colorado, Colorado Springs Good morning everybody. First of all, I Thank Dr. Chow, Dr. Rao and Dr. Ventura for serving in my committee ,providing valuable feedback and allowing me to defend on a short notice.

Outline of the Talk Introduction Background, prior work SEG vs SAGE Design Implementation Performance evaluation Challenges faced Lessons learnt Future work Conclusion References 9/19/2018 SEG/Ashish Korpe

Introduction Keeping important information safe, confidential. Secrecy – non disclosure. Hiding – encryption decryption. Secure email, https, digital certificates. Encryption: AES, RSA and other variants. 9/19/2018 SEG/Ashish Korpe

Background ,Prior work Geo – encryption = ‘geo’ (earth/location) + encryption [Denning 2003] Various attempts to achieve this. [Khan, et al 2003]: [Scott, et al 2003] discuss using location as a key Proposed work: Scott, Denning: position + velocity + time SAGE: PC and smartphone Use of a secure Bluetooth connection Two keys: one for PC, one for smartphone Access within location and time With sub-bullet indicating the difference between your proposed research and theirs. SAGE: key is location-time specific SEG: location is verified and access is granted 9/19/2018 SEG/Ashish Korpe

Secure Enhanced Geolocking Assumptions: Clients only need to use browsers which support geolocation reporting. Client Javascripts are created for encrypting the data, specifying the geolocation areas to retrieve the data, and the receiver email address. The receiver has to have Google Earth installed on their device to view the KML file. SEG Server software is provided to Email the receiver with geolocation area information in KML. Allow the verification of geolocation provided by the receiver, and provide key/encrypted data if the location is within the geolocation area. If the receiver uses gmail, its not mandatory to have google Earth installed on system/PC. Need google Earth on handheld devices though 9/19/2018 SEG/Ashish Korpe

Design 9/19/2018 SEG/Ashish Korpe

Implementation Webpages Encryption Location: geolocation, geocoder API Database: Maria DB, MySQL KML Technologies used: HTML5 CSS3 JavaScript PHP Libraries used: crypto.js For each of these efforts, you like to show a figure/diagram of actual artifacts and some brief description. 9/19/2018 SEG/Ashish Korpe

Compose screen 9/19/2018 SEG/Ashish Korpe

Link - > inbox 9/19/2018 SEG/Ashish Korpe

Location - Validation 9/19/2018 SEG/Ashish Korpe

Location – Validation 9/19/2018 SEG/Ashish Korpe

Geolocation, geocoder code 9/19/2018 SEG/Ashish Korpe

Geolocation, geocoder code 9/19/2018 SEG/Ashish Korpe

Geolocation, geocoder code 9/19/2018 SEG/Ashish Korpe

Receiver 9/19/2018 SEG/Ashish Korpe

KML code 9/19/2018 SEG/Ashish Korpe

KML file attachment 9/19/2018 SEG/Ashish Korpe

Encryption – crypto.js 9/19/2018 SEG/Ashish Korpe

Test environment MySQL 5.6.17 Windows 7 Home Basic WAMP server version2.5 - localhost VM – Fedora core FC22 Maria DB 10.0.21 Compose.html credentials Files ValidateLocation.php HTML5 CSS3 JavaScript Geolocation API Geocoder API Crypto.js Php HTML5 CSS3 JavaScript Geolocation API Crypto.js Php Inbox.php HTML5 CSS3 Php JavaScript The environment used for testing (localhost) is as follows: Windows 7 home basic machine running Wamp server version 2.5. The database used was MySQL version 5.6.17 Database server: MySQL Community Server (GPL) 5.6.17 Web server: Apache/2.4.9 (Win32) Once the system worked fine on localhost, the code was migrated to akorpe.csnet.uccs.edu The production environment (akorpe.csnet.uccs.edu) is described below: VM running Fedora Core FC22 operating system. The database used is Maria DB version 10.0.21 Database server: Maria DB 10.0.21 Web server: Apache/2.4.16 (Fedora) Google Chrome 46.0.2490.86m Sender Receiver 9/19/2018 SEG/Ashish Korpe

Html5 CSS JavaScript Php 9/19/2018 SEG/Ashish Korpe

Performance Evaluation Time required for composing and sending email: 1-5 seconds Time required for validating location, decrypting and accessing the file: 25-40 milliseconds 9/19/2018 SEG/Ashish Korpe

Challenges faced Validating receiver’s location Acknowledge Dr Ventura’s help 9/19/2018 SEG/Ashish Korpe

Challenges faced Email attachment problems Code line SEG/Ashish Korpe 9/19/2018 SEG/Ashish Korpe

Challenges faced Enabling receiver to access the file code 9/19/2018 SEG/Ashish Korpe

Challenges faced Enabling receiver to access the file SEG/Ashish Korpe 9/19/2018 SEG/Ashish Korpe

Lessons Learnt Keyhole Markup Language is useful. Google has provided Google Earth program, Geolocation API which can be integrated nicely into my SEG application. CryptoJS is easy to use just plug in the link in <script> tags, Crypto js : easy to use just put it in script tags and mention a function. Key management image 9/19/2018 SEG/Ashish Korpe

Future Directions Validation of receiver’s geolocation (through close by Wi- Fi/bluetooth signals/base station locations/images from webcams – facial recognition) Measures against spoofing Encrypting multiple files Encrypting different types of files Make the app more user friendly Making it easier to specify the geolocation area. If asked about spoofing, mention Jahnavi is working on it  9/19/2018 SEG/Ashish Korpe

Conclusion I have designed and implemented a system for secure geolocking. Provide authoring tools for specifying geolocation area and encoding them in KML Provide JavaScript with cryptojS to encrypt the data. Email the receiver with guiding information to retrieve data in designated areas. Verify the receiver’s geolocation and provide key/encrypted if within specified geolocation area. I have conducted experiments to verify the performance our SEG system and it is capable of providing adequate response and data protection features. 9/19/2018 SEG/Ashish Korpe

References [1] Scott, L. and Denning, D. E. “Location Based Encryption and its Role in Digital Cinema Distribution,” ION GPS/GNSS 2003, September 9-12, Portland [2] Rajeswari, V., V. Murali, and A. V. S. Anil. "A Navel Approach to Identify Geo-Encryption with GPS and Different Parameters (Locations And Time)." IJCSIT) International Journal of Computer Science and Information Technologies 3.4 (2012). [3] https://github.com/tparkin/Google-Maps-Point-in-Polygon [4] http://stackoverflow.com/questions/5065039/find-point-in-polygon-php/5065219#5065219 [5] Location-Based Encryption / Decryption (L-BED) WHITE PAPER GeoCodex, LLC June 2010 [6] http://www.geocodex.com/ [7] http://www.geocodex.com/technology/smartphone-application-for-geo-encription [8] https://developers.google.com/maps/documentation/geocoding/intro [9] https://developers.google.com/maps/documentation/javascript/examples/polygon-arrays [10] Chapter 5 - “Head First HTML5 Programming” by Eric Freeman and Elisabeth Robson [11] https://kml- samples.googlecode.com/svn/trunk/interactive/index.html#./Polygons/Polygons.Extruded.k ml [12] https://code.google.com/p/crypto-js/ 9/19/2018 SEG/Ashish Korpe

Questions ? 9/19/2018 SEG/Ashish Korpe