Browse > Article
http://dx.doi.org/10.13089/JKIISC.2006.16.5.3

Design and implementation of Jini-based secure event service using SPKI/SDSI certificate  

Park, Hee-Man (Chonnam National University)
Kim, In-Su (Chonnam National University)
Lee, Young-Lok (Chonnam National University)
Lee, Hyung-Hyo (WonKwang University)
Noh, Bong-Nam (Chonnam National University)
Abstract
As computing devices become ubiquitous and increasingly mobile, it becomes obvious that a synchronous and direct peer-to-peer communication model is not sufficient in distributed computing environment. Using an indirect event service instead of other traditional communication model has an advantage of decreasing the coupling of applications in a distributed environment and removing the need for many static dependencies. In this paper, we design and implement the secure event service for providing secure ubiquitous computing environment. The Secure Event Service implemented enables users to perform content-based event retrieval, and supports only eligible event comsumer and event producer can publish and receive events through the secure event service. SPKI/SDSI certificate is used for supporting authentication and authorization in the secure event service. In order to provide a content-based event retrieval, an asynchronous communication between event producers and consumers, and a disconnectedness support for mobile devices, we modify and expand the Javaspace package.
Keywords
Event Service; SPKI/SDSI Certificate; Jini; Javaspace;
Citations & Related Records
연도 인용수 순위
  • Reference
1 A. Rakotonirainy, J.Indulska, W.W Loke, A.Aaslavsky 'Middleware for Reactive Components: An Integrated Use of Context, Roles, and Event Based Coordination', Lecture Notes In Computer Science, Vol. 2218 77-98
2 Dwaine Clarke, Jean-Emile Elien, Carl Ellison, Matt Fredette, Alexander Morcos, and Ronald L. Rivest, 'Certificate Chain Discovery in SPKI/SDSI,' Journal of Computer Security, vol9, Dec 2000
3 Norman, D., 'The invisible computer: why good products can fail, the personal computer is so complex, and information appliances are the solution', MIT Press, 1998
4 Manuel Roman, Christopher K. Hess, Renato Cerqueira, Anand Ranganathan, Roy H. Campbell, and Klara Nahrstedt 'Gaia:A Middleware Infrastructure to Enable Active Spaces.' In IEEE Pervasive Computing 74-83, Dec 2002
5 Philip Bishop and Nigel, 'JavaSpaces IN PRACTICE', Addison-Wesley, 2003
6 Carl M. Ellison, Bill. Frantz, Butler. Lampson, Ron Rivest, Brian M. Thomas, Tatu Ylonen, 'SPKI Certificate Theory' RFC2693, September 1999
7 K.Sanzgiri, D.LaFlamme, B.Dahill, B.N.Levine, C.Shields, E.M.Belding Royer,'Authenticated routing for ad hoc networks', IEEE Journal on Selected Areas in Communications, March, 2005
8 G. Navarro, J. Borrell, J. A. Ortega-Ruiz, S. Robles, 'Access control with safe role assignment for mobile agents', AGENTS: International Conference on Autonomous Agents, July 2005
9 Object Management Group, 'The Common Object Request Broker : Architecture and Specification', 2.0 ed., July 1995
10 Object-Orientated Concepts Inc, 'ORBacus for C++ and Java'. 1998
11 David F. Ferraiolo, Ravi Sandhu, Serban Gavrila, D. Richard Kuhn, Ramaswamy Chandramoul, 'Proposed Nist Standard for Role-Based Access Control,' ACM Transactions on Information and System Security, Volume 4, Issue 3, pp. 224-274, August 2001   DOI
12 Roy Campbell, Jalal Al-Muhtadi, Prasad Naldurg, Geetanjali Sampemane, M. Dennis Mickunas, 'Towards Security and Privacy for Pervasive Computing' LECTURE NOTES IN COMPUTER SCIENCE 2609, 2003
13 Bhaskar Borthakur, 'Event Service User Manuel', white paper, October 29, 2001
14 Sun Microsystems, 'Jini(TM) Technology Core Platform Specifications', Sun Microsystems, 2005
15 Bhaskar Borthakur, 'The Event Service, white paper', October 2001
16 최성재, 김용우, 이홍기, 송주석, 양대헌, '모바일 애드혹 네트워크의 안전하고 효과적인 최적의 인증경로 탐색 기법', 한국정보과학회논문지, 2005
17 Carl M. Ellison, Bill Frantz, Butler Lampson, Ron Rivest, Brian M. Thomas, Tatu Ylonen, 'SPKI Examples,' Internet-Draft, March 1998
18 Sun Microsystems, 'Jini(TM) Architecture Specification', Sun Microsystems, 1997-2000
19 Ravi S. Sandhu, Pierangela Samarati, 'Access Control: Principle and Practice,' IEEE communications Magazine, pp. 40-49, September 1994
20 W.Keith Edwards, W.Edwards, 'Core Jini', Pearson Education, 2000
21 이영록 'RBAC 및 비밀통신 기능을 갖는 SPKI/SDSI HTTP 보안서버', 한국정보보호논문지, 2003
22 Shiva Chetan, Anand Ranganathan, and Roy H. Campbell, 'Towards Fault Tolerant Pervasive Computing', In IEEE Technology and Society. Volume: 24, No. 1, pp 38-44, Spring 2005   DOI   ScienceOn