Peuyeum: A Geospatial URL Encrypted Web Framework Using Advance Encryption Standard-Cipher Block Chaining Mode

Many researches proposes geospatial web framework over the popularity of the Internet. Based on that, research on securing geospatial web framework is necessary. In this research aimed Peuyeum. Peuyeum is geospatial web framework with Encrypted Universal Resource Locator (URL). Advance Encryption Standard (AES)-Cipher Block Chaining (CBC) chosen as the method in this research. By calculating attack time, the brute force attack will reduce by this approach and resistance time will improve.


Introduction
Internet technology allows us to deliver data through a network. All computers around the world connect to the one big Network. The Internet network was built to facilitate the military in sending data, reports, and real-time activities directly to the headquarters command center. With the Internet network, then the actions and military policies can be quickly issued and enforced. Then the growing internet network is used in today's society. Where began emerging various Internet-based applications running as email and World Wide Web (WWW). Email is a new invention of the world of accuracy. Where a person no longer has to go to the post office, buy stamps, write and send letters and wait for his reply [1]. The discovery of this email that makes everyone can send a message easily and quickly until just by using a computer and internet network. Then an email will be directed to all corners of the world with the speed of delivery coming on the spot and can be relied on the spot. Similarly, newspapers are being replaced by the WWW [2]. Everyone can access and read all the news in the world simply by using the www address of a company or individual who owns the domain.
WWW then evolved from its origins using the HTML script language then evolved using the dynamic programming language [3]. Lack of HTML that can only deliver static content, which if you want to update then we have to open and re-coded the script. Developed again with dynamic programming such as PHP. Besides PHP also appears Java, Net Framework, and Python. This dynamic web programming language also requires a framework for the developer to add features quickly or add a particular function on the website. Website structure is now a lot of outstanding and growing in their way. In addition to WWW or better known as the site, also appears web service technology, which is the development of communication between machines, were using the internet intermediary as the communication [4]. This web service is opened and used with particular languages such as XML, and JSON that is grasped by other machines. The use of web service and website technology for the benefit of geospatial data processing becomes necessary. Web Service is to reduce data processing time and reporting of geospatial data. The use of reporting websites and web services for the benefit of data collection is a quick and accurate recording solution rather than using manual methods that can take days to catalog data and release geospatial analytics. With the internet, network-based apps provide an easy to report in real time, cut the distance and processing time. With the web service and website then the time of cataloging geospatial data can be done in real-time. This efficiency is deemed necessary to continue to develop web-based frameworks, both for the creation of GIS interfaces and the use of web services regarding cataloging geospatial data in real-time [5].
Each web framework has advantages and disadvantages. Regarding this research, there is no particular web framework for geospatial, so it is important to research the development of web framework for geospatial. This context analysis begins with the security of framework [6]. Security on the Internet becomes an important thing to note, especially if these geospatial data contain state secrets security data. Encrypt URL is one of the areas of research conducted in this study. This research to complement and develop the concept of encryption on URL that is still rarely done.

Related Works
Research on the development of geospatial-based web services has been done using the Vegscape framework; the research serves The NASA Soil Moisture Active and Passive (SMAP) with Service Oriented Architecture (SOA) VegScpae [7]. Then the web geospatial framework was investigated with the development of the use of Fuzzy C Means. A Method to perform calculations in the spread of disease [8]. There is also a geospatial web service development using Ontology Framework. This research proposes a web service model using the ontology framework of the Open Geospatial Consortium (OGC) standard. They call it the OGC Web service framework [9]. The ontology research development then continues with the development of Sensor Modeling Language using the Semantic sensor Web Environment cite modeling [10]. Also, research on modeling spatial, temporal data on the semantic web [11].
Simulation of the framework was conducted to get calculation and diagnosis on the Geospatial web framework. The Web service put in a distributed network. Some parameters included in this calculation is Task arrival situation. Computing Resource Usage Simulation, Task Execution Status Simulation, Execution Result Simulation, Statistic and Evaluation of Execution Result [12]. Analysis using cloud framework is done to measure the efficiency of earth satellite imagery [13]. Another research that created web content aggregation from Digital Earth geospatial framework [14].Web service for Raster Processing was developed to process satellite image data quickly and high resolution and real-time [15].
Research on security did among others try to do brute force password on MSP430-BSL. The study reduces brute force time from 32 years to several days using sample password approach. With conditions of experiments with passwords are incorrect and correct there is no pause time. Reduce is also done by reducing 254-bit password to 40-bit password. Can reduce to 9.66E + 67 to 128 years only. Moreover, by setting the transfer rate baud rate to the IOT device can be reduced by only 32 years at the rate of 38400. Can be reduced again by creating a password dictionary or password example [16]. AES-CBC protection using Interrupt Vector (IV) Table, so is easy to predict from the method of randomization [17].
Implementation of AES-CBC requires a high-security application such as on satellite [18]. The study of security to build Honeypot with the calculation of the attacks is also done. The calculation consists of an inefficient ratio and a formula for comparing the login experiment with the password dictionary [19]. In the other side, Research on encryption on web service and website URL has not conducted. Research for securing URL is necessary to do.

Hyper text transport protocol secure
Hyper Text Transport Protocol Secure (HTTPS) is the development of security module of HyperText Transport Protocol (HTTP). HTTP is a communication protocol between the server and the client with web server software from the server side and the web browser from the user side. The URL of this framework is recommended using HTTPS to have the URL encapsulated.

Advance encryption standard
AES CBC is an encryption algorithm also called Rijndael algorithm. The US National Institute of Standards and Technology (AES) accepted this algorithm as a standard [18]. The encryption and decryption process performed by AES CBC is using two-way encryption, meaning there will be encryption method to encode data and there is decryption process to read data. Depicted in figure 1 and 2.

System Design
In this research framework development that implemented through several steps in the form of URL Design, API Design, Logic Design, Build Library, Brute Force Calculation depicted in figure 3.

Universal resource locator design
The Universal Resource Locator (URL) designed and proposed in this study is divided into two parts for two purposes. Design URL for website access address and map URL for access to Application User Interface (API) address. The URL Design proposed in this study is as follows:     Domain (ccTLD). The urlencrypted segment is the model proposed in this study. The part is subdivided to identify the use of the framework within the website and API. Inside the part is divided by using a separator. The Separator proposed in this research is a % sign. This splitter splits the identification and location of the classes and methods of the framework. The example of URL segmentation before encryption process as follows:

 Identifier%class%method%param
The identifier is the identification of the web service function for API or web site. This identifier is a string of 3 characters long to identify the role of the URL. The class is the class of the called framework. The method serves to call methods that exist within the class. Param is the parameter used as input from the process.

Logic design
In building the framework, it takes logic to translate URLs entered by the user into a web browser. This logic serves to provide services by the URL entered. The logic design of the inserted URL steps is as follows.  URL Decryption.  Reading URL and split into a segment.  If the identifier is website then go to site logic process.  If the identifier is API then go to API logic block.  Else, return error report. API and website logic block consisting of:  Read segment class as controller and make sure controller exist and do instantiation from class.  Read segment method and param then calls the method with parameter param from class instantiation.  Method of programmer Algorithm running  The user gets HTML as a return.

Framework structure design
The framework should consist of a modular structure and easy to learn. The model is built using the Model, View, and Controller (MVC). MVC is a common structure used by most website frameworks. By using, the MVC structure is expected programmer can quickly learn and build an application on it. The Encrypt URL function is embedded in the library form in the Peuyeum Framework with the primary features that must exist, among others:  URL Encrypt  URL Decrypt

Brute force time
Calculates the approximate time of a URL's experiment by learning the URL structuring before being encrypted. Time is computed from the API and website URL cracking tests with possible timings.

Results and Discussion
Experiment with building an Open layer-based app by displaying the map of Indonesia and with the base map of the Map Tile Service Web protocol. Framework development using python uWSGI module. Framework logic explain as follow:  For the framework to process HTTP POST then use the parse_qs module to perform the POST data. Cilok is a library for URL encryption support function. This library placed in the Library folder along with other libraries required by the framework. The controller is the default class name for the website, while the default class name of the API is called API. So the structure of the directory of the Peuyeum Framework is illustrated in figure 7, and the MVC theory is in the structure in the app folder as shown in figure 8. Encryption and decryption algorithms using AES-CBC as follows. The number of characters in the CBC (Encrypted String) should be 16 characters and multiples, so in the algorithm, if the character URL is less than a multiple of 16 then the random Alphabet is added. The data encryption combined head that contains the number of characters used as data from the multiples of 16 characters sent. This action performs to decrypt encrypted string.
Therefore, for brute force attack calculation, here we use 16 characters for AES-Key and 16 characters for IV on AES CBC usage. With 26 uppercase letters, 26 lowercase letters and 10 characters  plus characters with 33 characters. Then we get an experiment to get access to URL by brute force is 9516 * 9516 times trial.

Conclusions
Peuyeum Framework can develop in other feature of programming. For the security, a process should be considered to do IP blocking which often tries to find a security hole. Then from the framework development side can be added development features for computing efficiency. In the future research, web service composition can be interesting topics.