Signal Processing and Information Technology. First International Joint Conference, SPIT 2011 and IPC 2011, Amsterdam, The Netherlands, December 1-2, 2011, Revised Selected Papers

Research Article

Access Control Based on Location and Time

Download
453 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-32573-1_16,
        author={Suresh Limkar and Nivedita Kadam and Rakesh Jha},
        title={Access Control Based on Location and Time},
        proceedings={Signal Processing and Information Technology. First International Joint Conference, SPIT 2011 and IPC 2011, Amsterdam, The Netherlands, December 1-2, 2011, Revised Selected Papers},
        proceedings_a={SPIT \& IPC},
        year={2012},
        month={10},
        keywords={Cryptography Encryption Location based security GPS GSM Biometric},
        doi={10.1007/978-3-642-32573-1_16}
    }
    
  • Suresh Limkar
    Nivedita Kadam
    Rakesh Jha
    Year: 2012
    Access Control Based on Location and Time
    SPIT & IPC
    Springer
    DOI: 10.1007/978-3-642-32573-1_16
Suresh Limkar1,*, Nivedita Kadam1,*, Rakesh Jha2,*
  • 1: GHRCEM
  • 2: SVNIT
*Contact email: sureshlimkar@gmail.com, nivedita.kkadam@gmail.com, Jharakesh.45@gmail.com

Abstract

We propose an access control model that works like three factor authentication for getting access to our system. This system takes time and location into account to specify access control policies. We also discuss implementation techniques for location and time based policy specifications and the integration of these policies in standalone applications. This model enhances current security applications granting access to sensible information and privileges to execute orders only to entities that are in a trusted location with predefined time. Moreover this system authenticate authorized user but also time and location of the authorized user in both way i.e through GSM & GPS. The declarative nature of the model facilitates the analysis of policies and the evaluation of access requests: we present one case-study for clear understanding. This paper shows how computer and network security can be substantially improved through a new form of authentication based on geodetic location parameter received from GPS/ GSM along with the constraint of time.