CFP last date
20 June 2024
Call for Paper
July Edition
IJCA solicits high quality original research papers for the upcoming July edition of the journal. The last date of research paper submission is 20 June 2024

Submit your paper
Know more
Reseach Article

A Policy and Trust-based Secure Communication Protocol in Information Systems

by T. Chalama Reddy, R. Seshadri
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 98 - Number 20
Year of Publication: 2014
Authors: T. Chalama Reddy, R. Seshadri
10.5120/17296-7695

T. Chalama Reddy, R. Seshadri . A Policy and Trust-based Secure Communication Protocol in Information Systems. International Journal of Computer Applications. 98, 20 ( July 2014), 1-10. DOI=10.5120/17296-7695

@article{ 10.5120/17296-7695,
author = { T. Chalama Reddy, R. Seshadri },
title = { A Policy and Trust-based Secure Communication Protocol in Information Systems },
journal = { International Journal of Computer Applications },
issue_date = { July 2014 },
volume = { 98 },
number = { 20 },
month = { July },
year = { 2014 },
issn = { 0975-8887 },
pages = { 1-10 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume98/number20/17296-7695/ },
doi = { 10.5120/17296-7695 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:26:40.676149+05:30
%A T. Chalama Reddy
%A R. Seshadri
%T A Policy and Trust-based Secure Communication Protocol in Information Systems
%J International Journal of Computer Applications
%@ 0975-8887
%V 98
%N 20
%P 1-10
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Security in information systems has increased importance, as end users have become more responsive of securely sharing or exchanging the vast amount of information. The organizations that do sensitive work such as those with defense contracts, passport issuing agencies, military activities, and health care data at health-insurance, are in need of protecting their information. Nowadays, financial institutions providing various online services to customers are facing situation with customers who submit fake documents for getting services. To defend from that situation, financial institutions enquire customer information at various government departments against the customer submitted proof documents to rovide service to customer. In this study, secure and trusted information sharing environment is a vital requirement to make users interact and share data easily and securely across various networks. The prime challenge is to evaluate the trust of financial institution that characterizes secure information sharing in various government departments. The secondary challenge would be a development of communication protocol that securely exchanges information among various financial institutions and various government organizations. This paper emphasis on policy and trust-based secure protocol that offers confidential and authenticated, and trusted information sharing among financial institutions and government departments without creating any problems to information security by using cryptographic hash, private and public key encryption algorithms, and trust evaluation techniques. Furthermore, it facilitates non-privacy preserving information sharing with probable restrictions based on the rate of trust factor of financial institutions. This protocol assures that secure and stream- lined information sharing among financial institutions and government departments leads to avoid intimidating activities. The experimental results show the effectiveness of the proposed policy and trust-based information sharing approach.

References
  1. Hui-Feng Shih and Chang-Tsun Li, "Information Security Management in Digital Government", Vol. 3, pp. 1054 - 1057, Idea Group Publishing, 2006.
  2. Violetta Cavalli-Sforza, Jaime G. Carbonell and Peter J. Jansen , "Developing Language Resources for a Transnational Digital Government System", Language Technologies Institute, Carnegie Mellon University ,Pittsburgh, U. S. A, 2004.
  3. T. Chalama Reddy and R. Seshadri, "Design of new protocol for secure communication of Messages", International Journal of Scientific & Engineering Research, Volume 4, Issue 7, July-2013.
  4. Md. Headayetullah, G. K. Pradhan , " Efficient and Secure Information Sharing For Security Personnels: A Role and Cooperation Based Approach ", International Journal on Computer Science and Engineering, Vol. 02, No. 04, 2010, 1254-1265.
  5. Muntaha Alawneh, Imad M. Abbadi, "Preventing information leakage between collaborating organisations", Proceedings of the 10th international conference on Electronic commerce, Innsbruck, Austria, Article No. : 38, 2008.
  6. Achille Fokoue, Mudhakar Srivatsa, Pankaj Rohatgi, Peter Wrobel, John Yesberg, "A decision support system for secure information sharing", Proceedings of the 14th ACM symposium on Access control models and technologies, pp:105-114, 2009.
  7. Peiwu Li, "A Temporal Model for Group-Centric Secure Information Sharing", Web Information Systems and Mining (WISM), 2010 International Conference on, pp. 59- 62 , 2010.
  8. Peng Liu, Amit Chetal, "Trust-Based Secure Information Sharing Between Federal Government Agencies", Journal Of The American Society For Information Science And Technology—February 1, 2005.
  9. Ravi Sandhu, Kumar Ranganathan and Xinwen Zhang, " Secure Information Sharing Enabled by Trusted Computing and PEI Models", ASIACCS '06 March 21-24, 2006, Taipei, Taiwan.
  10. T. Chalama Reddy , Dr. R. Seshadri, " New Design of Crypto-Based Pseudorandom number generator (CBPRNG)using BLOW FISH cipher" International Journal on Computer Science and Engineering (IJCSE) ISSN : 0975-3397 Vol. 5 No. 06 Jun 2013 pages 561-566
  11. . T. Chalama Reddy , Dr. R. Seshadri, "Reputation-Based Dynamic Trust Evaluation Model for multi-agent Systems based on service satisfaction" International Journal of Emerging Technology and Advanced Engineering (ISSN 2250–2459, Volume 4, Issue 6, June 2014)
  12. Kartheesn L, S. K Srivatsa, "A Policy Based Scheme for Combined Data Security in Mobile Ad hoc Networks" Journal of Computer Science 8(8): 1397-1406, 2012
Index Terms

Computer Science
Information Sciences

Keywords

information security information sharing policies trust factor private and public key cryptography Secure Hash Algorithm(SHA-1) Credit Information Bureaus of India Limited (CIBIL).