Research of JMS Security Mechanism

2014 ◽  
Vol 635-637 ◽  
pp. 1171-1174
Author(s):  
Xin Hua Li

According to the characteristics of the message middleware and JMS specification, this paper introduces several methods to improve the performance of the security of the JMS message middleware. The basic idea is to use two-way digital signature authentication information, and in the process of message transmission, to use negotiated session key and asymmetric encryption technology to encrypt messages. Using this mechanism can effectively protect the safety of the message transmission and storage, and to achieve a smaller time overhead associated with acceptable performance.

2018 ◽  
Vol 8 (1) ◽  
pp. 154-172 ◽  
Author(s):  
O. Dorgham ◽  
Banan Al-Rahamneh ◽  
Ammar Almomani ◽  
Moh'd Al-Hadidi ◽  
Khalaf F. Khatatneh

Medical image information can be exchanged remotely through cloud-based medical imaging services. Digital Imaging and Communication in Medicine (DICOM) is considered to be the most commonly used medical image format among hospitals. The objective of this article is to enhance the secure transfer and storage of medical images on the cloud by using hybrid encryption algorithms, which are a combination of symmetric encryption algorithms and asymmetric encryption algorithms that make the encryption process faster and more secure. To this end, three different algorithms are chosen to build the framework. These algorithms are simple and suitable for hardware or software implementation because they require low memory and low computational power yet provide high security. Also, security was increased by using a digital signature technique. The results of the analyses showed that for a DICOM file with size 12.5 Mb, 2.957 minutes was required to complete the process. This was totaled from the encryption process took 1.898 minutes, and the decryption process took 1.059 minutes.


2012 ◽  
Vol 482-484 ◽  
pp. 39-42
Author(s):  
Ying Li Wei ◽  
Tian Huang Chen

Security of messaging middleware is the key issue to ensure the integrity of news transmission. By analyzing the defects on safety of current JMS-based messaging middleware communication model, elaborating several safety problems of messaging middleware from authentication, authorization, encapsulation and audit, this paper proposes a messaging middleware security model based on data encryption and digital signature technology, it encrypt messages with symmetric and asymmetric encryption algorithm and audit some safety-related events, then the security of message transmission has improved.


2014 ◽  
Vol 631-632 ◽  
pp. 882-888
Author(s):  
Zong Xiao Lan ◽  
Ge Ming Xia ◽  
Ao Long Zhou

With the extensively applying of Wireless Sensor Networks (WSN), its' security drew more and more attention. In all the security issues in WSN, session key is fundamental one with great challenge. Due to the constraints of limited hardware resources and computational capabilities, use asymmetric encryption mechanisms in session key are not suitable for WSN. And there are usually a puzzle for existing symmetric encryption mechanisms that they produced heavy communication cost. In this paper, we presented a session key transmission scheme based on an algorithm ofData Partitioning with Coding, namedDPC. By using of non-perfect secret sharing, we optimized the communication costs significantly and keep the security in high level. The analysis and simulations prove that our scheme has good performance.


Electronics ◽  
2021 ◽  
Vol 10 (17) ◽  
pp. 2110
Author(s):  
Desire Ngabo ◽  
Dong Wang ◽  
Celestine Iwendi ◽  
Joseph Henry Anajemba ◽  
Lukman Adewale Ajao ◽  
...  

The recent developments in fog computing architecture and cloud of things (CoT) technology includes data mining management and artificial intelligence operations. However, one of the major challenges of this model is vulnerability to security threats and cyber-attacks against the fog computing layers. In such a scenario, each of the layers are susceptible to different intimidations, including the sensed data (edge layer), computing and processing of data (fog (layer), and storage and management for public users (cloud). The conventional data storage and security mechanisms that are currently in use appear to not be suitable for such a huge amount of generated data in the fog computing architecture. Thus, the major focus of this research is to provide security countermeasures against medical data mining threats, which are generated from the sensing layer (a human wearable device) and storage of data in the cloud database of internet of things (IoT). Therefore, we propose a public-permissioned blockchain security mechanism using elliptic curve crypto (ECC) digital signature that that supports a distributed ledger database (server) to provide an immutable security solution, transaction transparency and prevent the patient records tampering at the IoTs fog layer. The blockchain technology approach also helps to mitigate these issues of latency, centralization, and scalability in the fog model.


2013 ◽  
Vol 779-780 ◽  
pp. 1809-1812
Author(s):  
Xu Zeng

According to the picture archiving and communication system that have not introducing of the security mechanism yet, putting forward a security mechanism plan that based on digital watermarking and digital signature technology. Digital watermarking technology could authenticate the copyright of medical image effectively, and digital signature technology could authenticate the identity of sender and receiver. The PACS that introduced digital watermarking and digital signature technology could protect the interests for both hospitals and patients effectively in arbitration time, and became an important relying on for the development of remote medical.


2018 ◽  
Vol 7 (2.20) ◽  
pp. 150
Author(s):  
L Archana ◽  
K P. K. Devan ◽  
P Harikumar

Cloud Computing has already grabbed its roots in many industries. It has become a fascinating choice for small budget organizations, as On-demand resources are available on pay as you use basis. However, security of data being stored at cloud servers is still a big question for organizations in today’s digital era where information is money. Large organizations are reluctant to switch to cloud services since they have threat of their data being manipulated. Cloud service provider’s claim of providing robust security mechanism being maintained by third party, but still there are many reported incidents of security breach in cloud environment in past few years. Thus, there is need for ro-bust security mechanism to be adopted by cloud service providers in order for excelling cloud computing. Since there are n number of data’s in cloud, Storage of those data are to be placed with high rank of Significance. In Existing system, no efficient hybrid algorithms are used there by security and storage is compromised to significant ratio. We propose AES and Fully Homomorphic algorithm to encrypt the data, thereby file size get is compressed thereby increasing Data security and stack pile.  


2012 ◽  
Vol 532-533 ◽  
pp. 546-549
Author(s):  
Jia Song ◽  
Lin Li Wu

Along with the development of information technology, the information security of power industry is becoming an important problem in the stability of power systems. In order to solve the key distribution problems of feeder automation system, a key agreement and mutual authentication scheme based on elliptic curve cryptograph techniques is proposed. The mutual authentication and agreement on a secure session key is realized, between feeder terminal unit (FTU) and regional substation. By using the ECC techniques, greater security with fewer bits is provided. As the result, the requirement of bandwidth is decreased, furthermore, computational burden and storage requirement is also lowered on the FTU.


Symmetry ◽  
2021 ◽  
Vol 13 (4) ◽  
pp. 698
Author(s):  
Yun-Hsin Chuang ◽  
Yuh-Min Tseng

In a smart city, there are different types of entities, such as nature persons, IoT devices, and service providers, which have different computational limitations and storage limitations. Unfortunately, all of the existing authentication and key exchange (AKE) protocols are designed for either client–server or client–client authentication, including the ones designed for smart cities. In this paper, we present the idea of a compatible authentication and key exchange (CAKE) protocol which provides cross-species authentication. We propose the first CAKE protocol for a smart city that any two valid entities can authenticate with each other and create a secure session key without the help of any third party, while there is also no password table and no public key issuing problem. The entity can be a natural person having biometrics, an IoT device embedded with a physical unclonable function (PUF), or a service provider. Moreover, we extend the CAKE protocol to an anonymous CAKE (ACAKE) protocol, which provides natural persons an anonymous option to protect their privacy. In addition, both the proposed CAKE and ACAKE protocols can deal with the entity revocation problem. We define the framework and the security model of CAKE and ACAKE protocols. Under the security model, we formally prove that the proposed protocols are secure under the elliptic curve computational Diffie–Hellman (ECCDH) problem, the decisional bilinear Diffie–Hellman (DBDH) problem, and hash function assumptions. Comparisons with the related protocols are conducted to demonstrate the benefits of our protocols. Performance analysis is conducted and the experience results show that the proposed protocols are practical in a smart city.


Sign in / Sign up

Export Citation Format

Share Document