Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2008.15-C.3.157

Secure Jini Service Architecture Providing Ubiquitous Services Having Persistent States  

Kim, Sung-Ki (인천대학교 정보기술교육원)
Jung, Jin-Chul (인천대학교 컴퓨터공학과)
Park, Kyung-No (인천대학교 컴퓨터공학과)
Min, Byoung-Joon (인천대학교 컴퓨터공학과)
Abstract
The ubiquitous service environment is poor in reliability of connection and also has a high probability that the intrusion against a system and the failure of the services may happen. Therefore, It is very important to guarantee that the legitimate users make use of trustable services from the viewpoint of security without discontinuance or obstacle of the services. In this paper, we point out the problems in the standard Jini service environment and analyze the Jgroup/ARM framework that has been developed in order to help fault tolerance of Jini services. In addition, we propose a secure Jini service architecture to satisfy the security, availability and quality of services on the basis of the analysis. The secure Jini service architecture we propose in this paper is able to protect a Jini system not only from faults such as network partition or server crash, but also from attacks exploiting flaws. It provides security mechanism for dynamic trust establishment among the service entities. Moreover, our secure Jini service architecture does not incur high computation costs to merge the user service states because of allocation of the replica based on each session of a user. Through the experiment on a test-bed, we have confirmed that proposed secure Jini service architecture is able to guarantee the persistence of the user service states at the level that the degradation of services quality is ignorable.
Keywords
Service Survivability; Jini; Ubiquitous Computing; Security;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Sun Microsystems, “Jini Technology Starter Kit Overview v2.0,” Published Specification, http://java.sun.com/developer/products/jini/arch2_0.html, 2003
2 Wang F., et al, “SITAR: A Scalable Intrusion-Tolerant Architecture for Distributed Services,” DARPA Informa tion Survivability Conference & EXposition, 2001
3 Sun Microsystems, “JiniTM Architecture Specification,” Published Specification, http://java.sun.com/products/jini/2. 0/doc/specs/html/jini-spec.html, 2003
4 Byoung Joon Min, et al. “Committing Secure Results with Replicated Servers,” LNCS 3043, Springer-Verlag Berlin, 2004
5 Sun Microsystems, “Jini Technology Core Platform Specification.” Communication of the ACM, Vol.39, No. 4, pp.75-83, 1996
6 Johannes Osrael, et al.,“Using Replication to Build Highly Available .Net Applications,” Proceedings of the 17th International Conference on Database and Expert Systems Applications, pp.385-398, 2006
7 Pasi Eronen and Pekka Nikander. “Decentralized Jini security,” In Proceedings of the Network and Distributed System Security Symposium (NDSS 2001), pages 161–172, San Diego, California, February 2001
8 Thomas Schoch, et al. “Making Jini Secure,” Proc. 4th International Conference on Electronic Commerce Research, pages 276-286, Nov. 2001
9 Sun Microsystems, “Java Secure Socket Extension(JSSE) Reference Guide for Java Platform Standard Edition 6,” http://java.sun.com/javase/6/docs/tech-notes/guides/security/jsse/JSSERefGuide.html#Features
10 Reynolds, J. et al, “The Design and Implementation of an Intrusion Tolerant System,” Proc. of Int'l Conference on Dependable Systems and Networks, 2002
11 Marshall Pease, Robert Shostak, Leslie Lamport, “Reaching Agreement in the Presence of Faults,” Journal of the ACM 27/2 228-234 1980   DOI
12 Amir, Y. et. al., “Secure Group Communication Using Robust Contributory Key Agreement,” IEEE Transactions on Parallel and Distributed Systems, Vol.15, No.5, pp.468-480, May 2004   DOI   ScienceOn
13 Marc Schonefeld. “Hunting Flaws in JDK,” In Blackhat Europe 2003. May 2003
14 D.Szentivanyi and S. Nadjm-Tehrani, “Middleware Support for Fault Tolerance,” Chapter 28 in Middleware for Communications, Q. Mahmoud (Ed.), John Wiley & Sons, 2004
15 Frank Sommers, “Jini Starter Kit 2.0 tightens Jini's security framework,” Los Alamitos, CA., IEEE Computer Society Press, 2003
16 Hein Meling, et al., “Jgroup/ARM: a distributed object group platform with autonomous replication managements,” Software Practice and Experience, John Wiley & Sons, 2007
17 Heine Kolltveit et al., “Preventing Orphan Requests by Integrating Replication and Transactions,” LNCS 4690, Springer-Verlag Berlin, 2007   DOI   ScienceOn
18 Hein Meling, et al., “Performance Consequences of Inconsistent Client-side Membership Information in the Open Group Model,” Proceedings of the 23rd IEEE International Performance, Computing and Communications Conference. pp.777-782, 2004   DOI
19 M. Tichy, H. Giese. “An Architecture for Configurable Dependability of Application Services,” Proc. of the ICSE 2003 Workshop on Software Architectures for Dependable Systems. pp.65-70, Portland, OR. April 2003
20 Peer Hasselmeyer, et al., “Trade-offs in a Secure Jini Service Architecture,” LNCS 1890, Springer-Verlag Berlin, 2000   DOI   ScienceOn