Font Size: a A A

The Research And Realization Of Secure GIS

Posted on:2009-03-21Degree:MasterType:Thesis
Country:ChinaCandidate:J LiFull Text:PDF
GTID:2178360245983860Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
With the social development of Information Technology, GIS has been applied not only to Geography, but also to every field of society. However, the security problems become more and more important along with the development of GIS, especially in military affairs, public security, electronic government affairs, electric power and digital city and so on, in which more attention should be paid to the security of GIS.After analyzing and summarizing GIS' research status, the thesis firstly puts forward a problem that need be resolved urgently: it is necessary to form an integrated security technology system to guarantee security of GIS and satisfy application requirements of GIS from an overall and systemic point of view. Then, the thesis focuses on main security technologies to resolve the problem: Based on characteristics of spatial data' large capacity, sensitivity and confidentiality, the thesis presents a signature scheme based on AES and ECC, which has characteristics of AES arithmetic and ECC arithmetic, such as small storage, low bandwidth, convenient key management. To guarantee that identities of clients and servers are right and legal, the thesis presents an identity authentication scheme based on ECC digital certificate, which not only implements unified management of certificate and private key to ensure the security of private keys, but also makes use of ECC certificate's smaller size and ECC arithmetic's advantages to improve the security and efficiency of the system. To resolve security management problem of spatial data radically, the thesis presents a RBAC scheme especially applied in GIS, its authorization is convenient and flexible, and meanwhile it satisfies requirements of cooperative work in spatial application. To guarantee data confidentiality and integrality during transmission, data are protected with AES Symmetrical Encryption.In the end, through researching and designing, combining above researched results with GIS's application, a secure and applied GIS is taken up, while there still remain a lot to be explored in the future.
Keywords/Search Tags:Geographical Information System (GIS), information security, ECC, digital certificate, access control
PDF Full Text Request
Related items