High Impact Factor : 4.396 icon | Submit Manuscript Online icon |

A Location based Secure Access Control Method for Geospatial Data Using Fine Grained Security Access Method


Ms. Jalpa K. Goswami , Noble Group of Institution-Junagadh, Gujarat, India; Prof. Chetan Chauhan, Noble Group of Institution-Junagadh


Geographical Information System - (GIS), GIS data models, spatial data, spatial database, Role Based Access Control - (RBAC) Registration Authority - (RA), Access Control List - (ACL), Certificate authority service - (CAS), spatial Database Enterprise - (SDE), Spatial Database Management System - (SDBMS)


Geospatial data is data about the geographic location of earth surface features and boundaries on Earth. Nowadays spatial data is used in every field of society and due to the advancements in spatial data acquisition technologies, such as the advancements in the satellite sensor technologies, high precision digital cameras used in the capturing of photogram metric images and high precision land surveys are producing mass high precision spatial data. Due to these issues nowadays sensitivity of spatial data has increased too many folds. To store such high precision data onto the database is a big challenge today. Major security concerns of the geospatial data are based on authorization, authentication, access control, integrity, security and secure transmission of spatial data over the network and transmission media. In this paper the major security concerns of geospatial data are analyzed. Spatial data and access control methods developed to provide secure access over the spatial database are analyzed and studied. The data models and access control some issues to be resolved for spatial data security are found. In this paper a secure access control method is developed. In this method security over geospatial data on two levels is provided. In first level we provide authorization to every user so that a user can access only that part of spatial database, over which he/she has authority to access. In second level we control access over an image; based on the location over which a user wants to access data and provide access to only that part of an image, so that a significant amount of access time can be saved and quick access to the data can be provided.

Other Details

Paper ID: IJSRDV2I3429
Published in: Volume : 2, Issue : 3
Publication Date: 01/06/2014
Page(s): 978-982

Article Preview

Download Article