Abstract
Recently years, vector map is used in many applications and on/off-line services widely. The cost of production of vector map data is very expensive but it is stolen or copied easily by pirates without permission from the original providers. Therefore, provider desires vector map data should be encrypted before storing and transmitting to ensure the access control and prevent the illegal copying of vector map. In this paper, we proposed a perceptual encryption scheme for vector map using geometric objects. The geometric objects of vector map data is extracted to compute features as bounding boxes and distance vectors. After that, we encrypted those features and use them to compute and obtain encrypted vector map data. Experimental results is verified that the entire vector map is changed after encryption process. The proposed method is very effective for a large of dataset, responsive to requirements of security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Foote, K.E., Lynch, M.: Geographic Information Systems as an Integrating Technology Context, Concepts, and Definitions (2014). Last revised
Goodchild, M.F.: Twenty years of progress: GIS science in 2010. J. Spat. Inf. Sci. 1, 3–20 (2010)
Bertino, E., Damiani, M.L.: A controlled access to spatial data on web. In: Proceedings of Conference on Geographic Information Science, pp. 369–377 (2004)
Chena, S.C., Wangb, X., Rishea, N., Weiss, M.A.: A web-based spatial data access system using semantic R-trees. J. Inform. Sci. 167, 41–61 (2003)
Rybalov, N.B., Zhukovsky, O.I.: Access to the spatial data in the web-oriented GIS. In: Proceedings of Siberian Conference on Control and Communications, pp. 104–107 (2007)
Bertino, E., Thuraisingham, B., Gertz, M., Damiani, M.L.: Security and privacy for geospatial data: concepts and research directions. In: Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS, pp. 6–19 (2008)
Fuguang, M., Yong, G., Menglong, Y., Fuchun, X., Ding, L.: The fine-grained security access control of spatial data. In: Proceedings of the 18th International Conference on Geoinformatics, pp. 1–4 (2010)
Wu, F., Cui, W., Chen, H.: A compound chaos-based encryption algorithm for vector geographic data under network circumstance. In: Proceedings of Cardholder Information Security Program, vol. 1, pp. 254–258 (2008)
Li, G.: Research of key technologies on encrypting vector spatial data in Oracle spatial. In: Proceedings of International Conference on Industrial Electronics and Computer Science, pp. 1–4 (2010)
Dakroury, Y., El-ghafar, I.A., Tammam, A.: Protecting GIS data using cryptography and digital watermarking. J. Comput. Sci. Netw. Secur. 10, 75–84 (2010)
Giao, P.N., Kwon, G.C., Lee, S.H., Kwon, K.R.: Selective encryption algorithm based on DCT for GIS vector map. J. Korea Multimedia Soc. 17, 769–777 (2014)
Giao, P.N., Lee, S.H., Kwon, K.R.: Selective encryption algorithm for GIS vector map using geometric objects. J. Secur. Appl. 9, 61–72 (2015)
Environmental Systems Research Institute: An ESRI White Paper: ESRI Shape-file Technical Description, USA (1998)
RSA Laboratories: PKCS #5 v2.1: Password-Based Cryptography Standard (2006)
Acknowledgements
This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (NRF-2014R1A1A4A01006663).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Giao, P.N., Lee, SH., Moon, KS., Kwon, KR. (2017). GIS Vector Map Perceptual Encryption Scheme Using Geometric Objects. In: Choi, D., Guilley, S. (eds) Information Security Applications. WISA 2016. Lecture Notes in Computer Science(), vol 10144. Springer, Cham. https://doi.org/10.1007/978-3-319-56549-1_18
Download citation
DOI: https://doi.org/10.1007/978-3-319-56549-1_18
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-56548-4
Online ISBN: 978-3-319-56549-1
eBook Packages: Computer ScienceComputer Science (R0)