Browse > Article
http://dx.doi.org/10.3745/KTCCS.2013.2.1.051

Design and Implementation of EAI(Enterprise Application Integration) System for Privacy Information  

Kim, Yong Deok (숭실대학교 컴퓨터학과)
Jun, Moon Seog (숭실대학교 컴퓨터학과)
Publication Information
KIPS Transactions on Computer and Communication Systems / v.2, no.1, 2013 , pp. 51-58 More about this Journal
Abstract
This paper describes the design and implementation of the PKI-based EAI system which is used for delivery of sensitive personal information between business systems. For this purpose, we propose a key exchange protocol with some key process : Diffie-Hellman Schema is used to provide forward secrecy, public key-based digital signature is used for EAI Server authentication, data integrity. In addition, in order to minimize the performance impact on the overall EAI systems. The EAI server was designed simply to be used only as a gateway. This paper shows the implementation of Korea public key authentication algorithm standard and a symmetric encryption algorithm for data encryption.
Keywords
EAI; PKI; Certification; Key Exchange;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 Eun-Ok Ha, Yoon-Ho Kim, "Design and Implementation of Web-based Monitoring System for an EAI Environment", CALS/EC Vol.14, No.3, pp.2, 2009.
2 Yoon-Jin Lee, Jae-Guen lee, In-june Jo, "Enhanced Diffie-Hellman Key Distribution using Mobile-phone", International journal of maritime information and communication sciences , pp.2564-2567, Vol.134, No.12, 2009. 12.
3 Rakesh Jaiswal, "Security Concerns in EAI", Wipro Technologies, pp.3-5, 1998.
4 Chul Sur, Young-Ho Park, Kyung-Hyune Rhee, "A Multi-receiver Certificates Encryption scheme and Its Application", Journal of Korea Multimedia Society, pp.1, Vol.14, No.6, 2011.   DOI   ScienceOn
5 Wei Dai, Crypto++ 5.6.0 Benchmarks [Internet], http://www.cryptopp.com/benchmarks.html
6 Matjaz B Juric, Professional J2EE EAI, WROX, 2002
7 E. Rescorla, Diffie-Hellman Key Agreement Method, IETF RFC 2631, 1999.
8 Jeremy Westernman, "SOA today, Introduction to service-oriented Architecture, DBReview.
9 William stallings, Cryptography and Network security, Prentice Hall, 1998.
10 Jong-Hun Park "BPM and Enabling Technology", BPM Solution Korea Conference, 2004.
11 Whitfield Diffie and Martin Hellman, "New Directions in Cryptography," IEEE Transaction on Information Theory, Vol.1T-11, No.6, November, 1976.
12 Ministry of Pubic Administration and Security, Private Information Protection Law, 2012.
13 Young-Bae Kim, "A case study on the effective Enterprise Application Integration", Yonsei University, pp.8, pp.49, 2007.
14 Sung-Doke lee, Dong-Soo Han, "A Web Services based e-Business Application Integration Framework", Journal of computing science and engineering Vol.11, No.6, pp.1, 2005.   과학기술학회마을
15 Ho-Ki Nam, Sang-Min Park, Jong-Hyun Kim, Sung-Ah Jung, "The Implementation of Enterprise Application Integration System in ERP Environment", Journal of Korea Safety Management & Science, Vol.12, No.3, pp.3, 2010.   과학기술학회마을
16 하은옥, 김윤호, "EAI환경에서의 웹기반 모니터링 시스템의 설계와 구현", CALS/EC Vol.14, No.3, pp.110, 2009.
17 Kyung-Jae Ha, Cheol-Gon Moon, "Development of Web-Based mail-System using the Public-Key Encryption Algorithm", Journal of KIISE, pp.2, 2000.
18 염흥렬, "IETF공개키 기반구조 및 PKI기반 응용 표준화 동향", Journal of KIISC, Vol.14 No.2, pp.2, 2004.
19 Seung-Han Cho, Chong-sun Hwang, "Design of Key Distribution Protocol using a New Secrecy-Analysis Method", Journal of KIISE, Vol.18, No.2, pp.1, 1991.
20 Wikipedia, Key Exchange [Internet], http://en.wikipedia.org/wiki/Key_exchange
21 Ran Canetti, Hugo Krawczyk, "Analysis of key-exchange protocols and their use for building seure channels", Springer-Verlag, Eurocrypt'01, pp.453-473, 2001.
22 변진욱, "강화된 키 교환 프로토콜의 안전성 모델에 관한 연구", Journal of KIISC, Vol.20, No.2, pp.81-83, 2010. 4.
23 Seon Jong Kim, Jeong Ok Kwon, "Secure Key Exchange Protocols against Leakage of Long-term Private Keys for Financial Security Servicers", Journal of KIISC, Vol.19, No.3, pp.120-129, 2009. 6.