• Title/Summary/Keyword: GIS security

Search Result 116, Processing Time 0.022 seconds

The Security Method for GIS Data (GIS 정보유통을 위한 보안방안)

  • Kim, Ji-Hong;Lee, Sang-Moo
    • Journal of Korea Spatial Information System Society
    • /
    • v.2 no.1 s.3
    • /
    • pp.83-90
    • /
    • 2000
  • According to the development of Internet system recently, we focused in GIS data distribution and applications via internet rather than GIS data construction. Therefore in this paper, we present the necessity of security policy on GTS data. So we analyze the actual condition of GIS data through expert poll. We classify all of data used in GIS with the three security level : high level, middle level, low level. Finally we propose the proper security method on GIS data transfer and on GIS database access in accordance with progree of PKI project.

  • PDF

Selective Encryption Algorithm Based on DCT for GIS Vector Map

  • Giao, Pham Ngoc;Kwon, Gi-Chang;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.7
    • /
    • pp.769-777
    • /
    • 2014
  • With the rapid interest in Geographic Information System (GIS) contents, a large volume of valuable GIS dataset has been distributed illegally by pirates, hackers, or unauthorized users. Therefore the problem focus on how to protect the copyright of GIS vector map data for storage and transmission. At this point, GIS security techniques focusing on secure network and data encryption have been studied and developed to solve the copyright protection and illegal copy prevention for GIS digital map. But GIS vector map data is very large and current data encryption techniques often encrypt all components of data. That means we have encrypted large amount of data lead to the long encrypting time and high complexity computation. This paper presents a novel selective encryption scheme for GIS vector map data protection to store, transmit or distribute to authorized users using K-means algorithm. The proposed algorithm only encrypts a small part of data based on properties of polylines and polygons in GIS vector map but it can change whole data of GIS vector map. Experimental results verified the proposed algorithm effectively and error in decryption is approximately zero.

Contents Based Partial Encryption of GIS Vector Map (GIS 벡터맵의 콘텐츠 기반 선택적 암호화 기술)

  • Jang, Bong-Joo;Lee, Suk-Hwan;Moon, Kwang-Seok;Kwon, Ki-Ryong
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.5
    • /
    • pp.88-98
    • /
    • 2011
  • Recently, according as the importance of GIS(geography information system) database security is embossed, much researches had been achieved about GIS network security. But most such researches are weak against sourceful illegal reproductions and distributions of GIS vector data map. In this paper, we proposed an efficient layer unit contents based partial encryption technique in the vector map compression domain to prevent illegal distributions and unauthorized accesses. This method achieves a partial encryption about each central coordinate and directional parameters of a MCA(minimum coding attribute) that is created at the vector map compression processing in the vector space. First, the position encryption is applied as permutating randomly the center coordinate of each record that is minimum unit of vector map shape. And second, the direction encryption that changing shapes of vector map topography is applied as encrypting the direction of vertices's coordinates of each record. In experimental results, we confirmed that our proposed method can encipher the large volumed vector map data effectively in low computational complexity. Also, we could minimize the decline of compression efficiency that occurred by conventional contents based encryption schemes using AES or DES algorithms.

A Framework for a Secure Geometric Information System (지리정보시스템 서비스 보안을 위한 프레임워크)

  • Ju Un Gi;Im Gi Uk
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2002.05a
    • /
    • pp.724-728
    • /
    • 2002
  • This paper considers a security framework for geographic information System(GIS). The GIS is an information system for supporting fast decision associated spacial problems and the system has a role of infra structure of the information system. The security is also one of the major technology for information system. However, researches on secure GIS are presented little and this paper considers the secure GIS. This paper suggest a framework for the secure GIS based on derived requirements on the secure system. Analysis on security for a serial, parallel and hierarchical secure system is also added.

  • PDF

Selective Encryption Algorithm Using Hybrid Transform for GIS Vector Map

  • Van, Bang Nguyen;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of Information Processing Systems
    • /
    • v.13 no.1
    • /
    • pp.68-82
    • /
    • 2017
  • Nowadays, geographic information system (GIS) is developed and implemented in many areas. A huge volume of vector map data has been accessed unlawfully by hackers, pirates, or unauthorized users. For this reason, we need the methods that help to protect GIS data for storage, multimedia applications, and transmission. In our paper, a selective encryption method is presented based on vertex randomization and hybrid transform in the GIS vector map. In the proposed algorithm, polylines and polygons are focused as the targets for encryption. Objects are classified in each layer, and all coordinates of the significant objects are encrypted by the key sets generated by using chaotic map before changing them in DWT, DFT domain. Experimental results verify the high efficiency visualization by low complexity, high security performance by random processes.

Inquiring Prescriptions Using Geographic Information System (GIS)

  • Osman, Asim Seedahmed Ali;Kalil, Eman Galaleldin Ahmed
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.409-414
    • /
    • 2021
  • Geographic Information Systems (GIS) is considered to be one of the most important technologies provided by the Internet in our era. GIS enables institutions and individuals to plan and make decisions in many fields. GIS assists in accessing new and updated information on planning process. GIS also enables determining distances such as length, width, area on a map, and allows analyzing and processing a large amount of data for the search of geographical characteristics of locations. This paper explains the concept of dispensing prescription through the specific code of drug on an electronic system using GIS technology. The proposed methodology aims to inform patients of all the prescriptions dispensed and to help individuals inquiring about prescription at the nearest pharmacy through GIS technology. This proposed methodology is considered significant in some cases, as the patient does not know price, specifications and pharmacy location where the drug required is available, thus increasing the time and effort cost that is spent searching for the prescription.

Design for Security in Mobile GIS (모바일 지리정보시스템에서 보안을 고려한 설계)

  • Lee, Sang-Cheol;Lee, Chung-Ho;Oh, Young-Hwan;Rim, Ki-Wook;Bae, Hae-Young
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.04a
    • /
    • pp.81-84
    • /
    • 2001
  • PC 환경이 아닌 무선 인터넷 환경에서 제공되는 Mobile GIS(Geographic Information System)는 시간과 공간의 제약을 극복하고 실시간으로 지리정보를 얻을 수 있는 장점을 가지고 있으나, 사용자의 무선단말기와 서버 사이에 접속이 유지되어 있어야만 무선으로 GIS 서비스를 이용할 수 있다. 이는 현재 국내 무선 네트워크의 느린 속도와 비싼 이용 요금을 감안하면 Mobile GIS 가 대중화되는데 장애요인이 되고있다. 그리고 무선 인터넷 서비스가 급격히 증가하면서 Mobile GIS는 보안상 약점을 드러낼 것으로 예측된다. 그러므로 본 논문에서는 공개된 불특정다수의 무선 네트워크 환경에서 발생할 수 있는 보안의 피해와 그에 따른 기본적 Mobile Security 서비스에 대해 알아보고, 정보보호 입장에서 Mobile Database 를 연구하였다. 또한 Mobile GIS 를 위한 WAP 게이트웨이에서 공간데이터의 유출 가능성을 발견하였고, 이를 위한 해결책으로 J2ME 의 Pre-verification 기능과 종단간 암호화 (End-to-End Security) 기능을 Mobile GIS 설계에 적용하여 무선 환경에서 동적인 지도서비스와 더불어 공간 데이터의 보안을 유지할 수 있는 기법을 제시하였다. 이 연구를 통해 대역폭(Bandwidth)의 한계를 지닌 개방적 무선환경에서 Mobile GIS와 같은 컨텐츠 프라이버시(Contents Privacy) 보호가 요구되는 분야에 응용될 수 있으리라 기대된다.

  • PDF

A Study on GIS Metwork Security (지리공간 유통망 보안 방안에 관한 연구)

  • Kim, Ji-Hong;Lim, Gi-Uk
    • Journal of Korea Spatial Information System Society
    • /
    • v.3 no.2 s.6
    • /
    • pp.53-61
    • /
    • 2001
  • The GIS Network consists of the Clearinghouse Network Gateway and Clearinghouse Node and Geo-spatial Data Server. Recently with the development of Information and Network technologies, GIS Network should be needed to be more secure than ever. In this paper, we proposed the effective access control method for the distributed GIS network. PKI (Public Key Infrastructure) Technologies are used for access control and security for transmission on Geo-spatial data

  • PDF

Using GIS to Find the Best Safe Route between Khartoum and Arqin-Crossing

  • Mumdouh M.M Hassan
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.11
    • /
    • pp.43-52
    • /
    • 2023
  • The paper aims to clarify how to make a decision using geographic information systems and how to choose the best route between two cities to suit the expectations of the driver and his sense of safety and comfort on the road. Use a special model for network analysis, where the network analysis tool relied on the following data (maximum speed of the road - number of intersections - road width - peak period) in choosing the best safe path. The paper concluded that the best safe route for refugees between the cities of Khartoum - Arqin crossing is ( Khartoum - Shendi - Atbara - Meroe - Abu Hamad - Wadi Halfa). We advise all GIS users to use the theories of spatial analysis when creating a new model.

Using GIS to Determine the Best Areas for Displacement from Khartoum State to Other States in Sudan

  • Eihab A. M. Osman
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.1
    • /
    • pp.23-30
    • /
    • 2024
  • This study tries clarify the process of making decisions with geographic information systems and how to choose the best place for Khartoum State displaced people to relocate to in order to be closer to cheaper places with access to commodities and services. For network analysis, use a unique model. The network analysis tool was dependent on the following information: availability of goods and services, cheap cost, and proximity to the state of Khartoum.in choosing the best state. The study came to the conclusion that, in terms of accessibility, affordability, and availability of products and services, Gezira State is the best state for people who have been displaced from Khartoum State.When developing a new model, we recommend that all GIS users apply the theories of spatial analysis.