Application of Geo-Location-Based Access Control in an Enterprise Environment

Full Text (PDF, 566KB), PP.36-43

Views: 0 Downloads: 0

Author(s)

Victor L. Yisa 1,* Baba Meshach 2 Oluwafemi Osho 2 Anthony Sule 2

1. Federal University of Technology, Minna/ Department of Cybersecurity Science, 920001, Nigeria

2. Department of Cybersecurity Science Federal University of Technology, Minna, 920001, Nigeria

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2018.01.05

Received: 4 Sep. 2017 / Revised: 17 Sep. 2017 / Accepted: 22 Sep. 2017 / Published: 8 Jan. 2018

Index Terms

Unauthorized Access, Access control, geolocation, Administrator, Google Gears, Location

Abstract

Unauthorized Access has been difficult to stop or prevent in the last few decades using username and password authentication only. For an individual, data breach might just be a simple case of espionage or the loss of private credentials, for an enterprise, this could mean the loss of billions of dollars. Preventing Unauthorized Access to Enterprise Systems Using a Location-based Logical Access Control proposes a framework that uses time and location in preventing and defending against data breaches. The framework was developed using Java with an Eclipse IDE. The database was designed using MySQL and locations were collected using Google Maps API. Users registered at different locations in a university campus were unable to access another’s account in the database because they were both outside the known location and tried to do this at off-work hours. Users were registered with username and password at specified locations. The users are then made to login from same and different locations with correct username and passwords. it was discovered that access to the database was only given when the username and password was correct and location was same as at registered or as allowed by an administrator. The system was found to protect against unauthorized access arising from stolen login credentials and unauthorized remote logins from malicious users.

Cite This Paper

Victor L. Yisa, Baba Meshach, Oluwafemi Osho, Anthony Sule, "Application of Geo-Location-Based Access Control in an Enterprise Environment", International Journal of Computer Network and Information Security(IJCNIS), Vol.10, No.1, pp.36-43, 2018. DOI:10.5815/ijcnis.2018.01.05

Reference

[1]C Bertolissi and M Fernández, "Time and location based services with access control," New Technologies, Mobility and Security, IEEE, pp. 1-6, November 2008.
[2]T Chothia, D Duggan, and J Vitek, "Type-based distributed access control.," in Type-based distributed access conComputer Security Foundations Workshop, Proceedings. 16th IEEE, June 2003, pp. 170
[3]C Ngo, Y Demchencko, and C de Laat, "Multi-tenant attribute-based access control for cloud infrastructure services," Journal of Information Security and Applications, 2015.
[4]I Ray and M Kumar, "Towards a location-based mandatory access control model. ," Computers & Security, vol. 25, no. 1, pp. 36-44, 2006.
[5]A V Cleeff, W Pieters, and R Wieringa, "Benefits of location-based access control: A literature study.," in Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing , 2010, pp. 739-746.
[6]K P Puttaswamy and B Y Zhao, "Preserving privacy in location-based mobile social applications," in In Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications,ACM , 2010, pp. 1-6.
[7]J Y Tsai, P G Kelley, L F Cranor, and N Sadeh, "Location-sharing technologies: Privacy risks and controls," ISJLP, 6, 119, 2010.
[8]K Curran and J Orr, "Integrating geolocation into electronic finance applications for additional security," International Journal of Electronic Finance, vol. 5, no. 3, pp. 272-285, 2011.
[9]A Gross, "Using geolocation in authentication and fraud detection for web-based systems.," Unpublished Master Thesis, Athabasca University. 2011.
[10]S D Ghogare, S P Jadhav, A R Chadha, and H C Patil, "Location based authentication: A new approach towards providing security.," International Journal of Scientific and Research Publications, vol. 2, no. 4, pp. 1-5, 2012.
[11]NIST. (2017, June) Digital Identity Guidelines: Authentication and Lifecycle Management. [Online]. https://pages.nist.gov/800-63-3/sp800-63b
[12]E Huseynov and J M Seigneur, "WiFiOTP: Pervasive two-factor authentication using Wi-Fi SSID broadcasts.," in ITU Kaleidoscope: Trust in the Information Society (K-2015)., December 2015, pp. 1-8.
[13]J Brassil, P K Manadhata, and R Netravali, "Traffic signature-based mobile device location authentication," IEEE Transactions on Mobile Computing, , vol. 13, no. 9, pp. 2156-2169, 2014.
[14]K Curran and J Orr, "Integrating geolocation into electronic finance applications for additional security," International Journal of Electronic Finance, vol. 5, no. 3, pp. 272-285, 2011.
[15]CISCO. (2008) Wi-Fi Location-Based Services 4.1 Design Guide. [Online]. http://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Mobility/WiFiLBS-DG/wifich2.pdf
[16]Google. (2017, June) Google Maps APIs. [Online]. https://developers.google.com/maps/documentation/geolocation/intro
[17]Y Shavitt and N Zilberman, "A Geolocation Databases Study," IEEE Journal on Selected Areas in Communications, vol. 29, no. 10, pp. 2044 - 2056, 2011.
[18]K Harries, "Mapping crime: Principle and practice," National Institute of Justice, 1999.
[19]Andre van Cleeff, Wolter Pieters, and Roel Wieringa, "Benefits of Location-Based Access Control: A Literature Study.," in Green Computing and Communications (GreenCom), 2010 IEEE/ACM Int'l Conference on & Int'l Conference on Cyber, Physical and Social Computing (CPSCom), 2010.
[20]Ghogare D. Shraddha, Jadhav, P. Swati, Chadha R. Ankita , and Patil C. Hima , "Location Based Authentication: A New Approach towards Providing Security," International Journal of Scientific and Research Publications, vol. 2, no. 4, pp. 1-5, April 2012.
[21]Indrakshi Ray and Mahendra Kumar, "Towards a location-based mandatory access control model," Computers and Security, vol. 25, no. 1, pp. 36-44, 2006.
[22]Roselin Chirchi Vanaja and Laxman. M Waghmare, "Iris Biometric Authentication used for Security Systems," Iinternational Journal of Image, Graphics and Signal Processing, pp. 54-60, August 2014.
[23]Olayemi M. Olaniyi, Folorunso A. Taliha , Aliyu Ahmed, and Olugbenga Joseph, "Design of Secure Electronic Voting System Using Fingerprint Biometrics and Crypto-Watermarking Approach," International Journal of Information Engineering and Electronic Business(IJIEEB), pp. 9-17, September 2016.
[24]Alan Dennis, Barbara Wixom Haley, and M Roth Roberta., Systems Analysis and Design, Fourth Edition ed. United States of America: John Wiley & Sons, Inc, 2010.