Tuesday, 9 September 2025

Authoritative GIS without Trusted Third Parties | Chapter 6 | Research Updates in Mathematics and Computer Science Vol. 8

 

Geographic Information Systems (GIS) are crucial for various applications that include emergency response and national security. The primary vulnerability of GIS systems lies in their reliance on the integrity of numerous third parties. Such third parties include government bodies at both national and local levels, GIS applications developed by private companies, and notoriously insecure general purpose computers that host GIS data and run GIS applications. Consequently, GIS processes - for collecting, storing, organizing and communicating geographic information - are susceptible to wide a range of malicious attacks and/or uninten-tional bugs. The proposed AGS protocol aims to rectify this vulnerability by obviating the need for trusted third parties. This is achieved through i) the use of Merkle tree proofs for incrementally, and eciently, computing a succinct cryptographic commitment to important geographic data; and ii) permitting updates to GIS data only through well-formed blockchain transactions. In the proposed approach leaves of Merkle hash trees are used to represent line segments forming the boundary of a geographic region and irregular triangular tiles that are guaranteed to tile the entire region. The Merkle trees are constructed incrementally, through transactions executed in a blockchain network. The response to any query regarding a point in the globe is a triangular tile in which the point falls, along with succinct Merkle tree proofs for the correctness of information.

 

 

Author(s) Details

Mahalingam Ramkumar

Department of Computer Science and Engineering, Mississippi State University, U.S.A.

Prasad Ayyalasomayajulla

Department of Computer Science and Engineering, Mississippi State University, U.S.A.

 

Please see the book here:- https://doi.org/10.9734/bpi/rumcs/v8/3462G

No comments:

Post a Comment