xml encryption
Recently Published Documents


TOTAL DOCUMENTS

37
(FIVE YEARS 1)

H-INDEX

5
(FIVE YEARS 0)

Author(s):  
Yousef E. Rabadi ◽  
Joan Lu

TCP and UDP communication protocols are the most widely used transport methods for carrying out XML data messages between different services. XML data security is always a big concern especially when using internet cloud. Common XML encryption techniques encrypt part of private sections of the XML file as an entire block of text and apply these techniques directly on them. Man-in-the-Middle and Cryptanalysts can generate statistical information, tap, sniff, hack, inject and abuse XML data messages. The purpose of this study is to introduce architecture of new approach of exchanging XML data files between different Services in order to minimize the risk of any alteration, data loss, data abuse, data misuse of XML critical business data information during transmission; by implementing a vertical partitioning on XML files. Another aim is to create a virtual environment within internet cloud prior to data transmission in order to utilise the communication method and rise up the transmission performance along with resources utilisation and spreads the partitioned XML file (shredded) through several paths within multi agents that form a multipath virtual network. Virtualisation in cloud network infrastructure to take advantage of its scalability, operational efficiency, and control of data flow are considered in this architecture. A customized UDP Protocol in addition to a pack of modules in RIDX adds a reliable (Lossless) and Multicast data transmission to all nodes in a virtual cloud network. A comparative study has been made to measure the performance of the Real-time Interactive Data Exchange system (RIDX) using RIDX UDP protocol against standard TCP protocol. Starting from 4 nodes up to 10 nodes in the domain, the results showed an enhanced performance using RIDX architecture over the standard TCP protocol.





2020 ◽  
Vol 9 (2) ◽  
pp. 102-112
Author(s):  
Jason Meza ◽  
Paolina Centonze
Keyword(s):  


Author(s):  
Yousef E. Rabadi ◽  
Joan Lu

TCP and UDP communication protocols are the most widely used transport methods for carrying out XML data messages between different services. XML data security is always a big concern especially when using internet cloud. Common XML encryption techniques encrypt part of private sections of the XML file as an entire block of text and apply these techniques directly on them. Man-in-the-Middle and Cryptanalysts can generate statistical information, tap, sniff, hack, inject and abuse XML data messages. The purpose of this study is to introduce architecture of new approach of exchanging XML data files between different Services in order to minimize the risk of any alteration, data loss, data abuse, data misuse of XML critical business data information during transmission; by implementing a vertical partitioning on XML files. Another aim is to create a virtual environment within internet cloud prior to data transmission in order to utilise the communication method and rise up the transmission performance along with resources utilisation and spreads the partitioned XML file (shredded) through several paths within multi agents that form a multipath virtual network. Virtualisation in cloud network infrastructure to take advantage of its scalability, operational efficiency, and control of data flow are considered in this architecture. A customized UDP Protocol in addition to a pack of modules in RIDX adds a reliable (Lossless) and Multicast data transmission to all nodes in a virtual cloud network. A comparative study has been made to measure the performance of the Real-time Interactive Data Exchange system (RIDX) using RIDX UDP protocol against standard TCP protocol. Starting from 4 nodes up to 10 nodes in the domain, the results showed an enhanced performance using RIDX architecture over the standard TCP protocol.



Author(s):  
Kannan Balasubramanian

Many XML uses today need security, particularly in terms of authentication and confidentiality. Consider commercial transactions. It should be clear why purchase orders, payments, delivery receipts, contracts, and the like need authentication. In many cases, particularly when the transaction involves multiple parties, different parts of a message need different kinds of authentication for different recipients. For example, the payment portion of an order from a customer to a merchant could be extracted and sent to a payment clearing system and then to the customer's bank. Likewise, court filings, press releases, and even personal messages need authentication as a protection against forgery. XML Digital Signature, which provides authentication is a full Recommendation in the W3C and a Draft Standard in the IETF. XML Encryption which provides confidentiality, and Exclusive XML Canonicalization are W3C Candidate Recommendations.



2016 ◽  
Vol 9 (16) ◽  
Author(s):  
R. Menaka ◽  
R. S. D. Wahida Banu ◽  
B. Ashadevi


2015 ◽  
Vol 3 (1) ◽  
Author(s):  
Shruti V Jadhav ◽  
Ajay Acharya

Information technology finds its wide application in many fields like healthcare, border security etc. where security of information is very important. With advancement in wireless sensor networks, gathering and processing of data have become much easier and affordable, due to its wide application, providing security to data is required. This work proposes a prototype that uses Raspberry Pi as secure sensor node that performs both regular encryption and XML encryption to provide security to the data collected by sensor nodes and transmit it to the master node in the WSN. The design uses a temperature sensor which can be replaced by any other sensor going forward and can be used in the field of healthcare, border security, and many other areas. The data are collected, processed, encrypted, and wirelessly communicated to the master node. Since there is direct interfacing between the sensor and Raspberry Pi, there is no risk of data loss. The idea of this paper is to meet the goal of comparing the two encryption techniques in terms of processing time and number of characters and to see which is better in terms of both the parameters.



2014 ◽  
Vol 103 (2) ◽  
pp. 46-51
Author(s):  
Srinath K.S ◽  
Mallamma C G ◽  
Shankar Rana ◽  
Vijay Kumar F G
Keyword(s):  


Sign in / Sign up

Export Citation Format

Share Document