Browse > Article

Intrusion-Tolerant Jini Service Architecture for Enhancing Survivability of Ubiquitous Services  

Kim, Sung-Ki (IT Education Center, University of Incheon)
Park, Kyung-No (Dept. of Computer Science and Eng., University of Incheon)
Min, Byoung-Joon (Dept. of Computer Science and Eng., University of Incheon)
Publication Information
Abstract
Ubiquitous service environment is poor in reliability of connection and has a high probability that the intrusion and the system failure may occur. Therefore, in the environment, the capability of a system to collectively accomplish its mission in spite of active intrusions and various failure scenarios, that is, the survivability of services are needed. In this paper, we analyze the Jgroup/ARM framework that was developed in order to help the development of fault- tolerant Jini services. More importantly, we propose an intrusion-tolerant Jini service architecture to satisfy the security availability and quality of services on the basis of the analysis. The proposed architecture is able to protect a Jini system not only from faults such as network partitioning or server crash, but also from attacks exploiting flaws. It is designed to provides performance enough to show a low response latency so as to support seamless service usage. Through the experiment on a test-bed, we have confirmed that the architecture is able to provide high security and availability at the level that degraded services quality is ignorable.
Keywords
Jini;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Hein Meling, et al., "Jgroup/ARM: a distributed object group platform with autonomous replication managements", Software Practice and Experience, John Wiley & Sons, 2007
2 Johannes Osrael, et al.,"Using Replication to Build Highly Available .Net Applications", Proceedings of the 17th International Conference on Database and Expert Systems Applications, pp. 385-398, 2006
3 Thomas Schoch, et al. "Making Jini Secure", Proc. 4th International Conference on Electronic Commerce Research, pages 276-286, Nov. 2001
4 Frank Sommers, "Jini Starter Kit 2.0 tightens Jini's security framework," Los Alamitos, CA., IEEE Computer Society Press, 2003
5 Reynolds, J. et al, "The Design and Implementation of an Intrusion Tolerant System", Proc. of Int'l Conference on Dependable Systems and Networks, 2002
6 Heine Kolltveit et al., "Preventing Orphan Requests by Integrating Replication and Transactions", LNCS 4690, Springer-Verlag Berlin, 2007
7 Peer Hasselmeyer, et al., "Trade-offs in a Secure Jini Service Architecture", LNCS 1890, Springer-Verlag Berlin, 2000
8 Hein Meling, et al., "Performance Consequences of Inconsistent Client-side Membership Information in the Open Group Model", Proceedings of the 23rd IEEE International Performance, Computing and Communications Conference. pp.777-782, 2004
9 Amir. Y. et al. "Secure Group Communication Using Robust Contributory Key Agreement", IEEE Transactions on Parallel and Distributed Systems (TPDS), vol. 15, no. 5, pp. 468-480, May 2004   DOI   ScienceOn
10 R.J.Ellison et.al., ""Survivable Network Systems : An Emerging Discipline", Technical Report CMU/SEI-97-TR013, 1999
11 Sun Microsystems, "Jini Technology Starter Kit Overview v2.0," Published Specification, http://java.sun.com/developer/products/jini/arch2_0.html, 2003
12 Byoung Jun Min, et al. "Committing Secure Results with Replicated Servers", LNCS 3043, Springer-Verlag Berlin, 2004
13 Marc Schonefeld. "Hunting Flaws in JDK", In Blackhat Europe 2003. May 2003
14 Wang F., et al, "SITAR: A Scalable Intrusion-Tolerant Architecture for Distributed Services", DARPA Information Survivability Conference & EXposition, 2001
15 Sun Microsystems, "Java Secure Socket Extension(JSSE) Reference Guide for Java Platform Standard Edition 6", http://java.sun.com/javase/6/docs/tech-notes/guides/security/jsse/JSSERefGuide.html#Fe-atures
16 Sun Microsystems, "JiniTM Architecture Specification", Published Specification, http://java.sun.com/products/jini/2.0/doc/specs/html/jini-spec.html, 2003
17 Pasi Eronen and Pekka Nikander. "Decentralized Jini security", In Proceedings of the Network and Distributed System Security Symposium (NDSS 2001), pages 161-172, San Diego, California, February 2001
18 D. Szentivanyi and S. Nadjm-Tehrani, "Middle- ware Support for Fault Tolerance", Chapter 28 in Middleware for Communications, Q. Mahmoud (Ed.), John Wiley & Sons, 2004
19 Marshall Pease, Robert Shostak, Leslie Lamport, "Reaching Agreement in the Presence of Faults", Journal of the ACM 27/2 228-234 1980   DOI
20 M. Tichy, H. Giese. "An Architecture for Configurable Dependability of Application Services", Proc. of the ICSE 2003 Workshop on Software Architectures for Dependable Systems. pp. 65-70, Portland, OR. April 2003