Call for Paper - July 2022 Edition
IJCA solicits original research papers for the July 2022 Edition. Last date of manuscript submission is June 20, 2022. Read More

Security Model that prevents Data Leakage in Distributed Mobile Systems using Surrogate Objects

Print
PDF
IJCA Special Issue on Advanced Computing and Communication Technologies for HPC Applications
© 2012 by IJCA Journal
ACCTHPCA - Number 1
Year of Publication: 2012
Authors:
R. Anitha
S. Ravimaran
P. Valarmathi

R Anitha, S Ravimaran and P Valarmathi. Article: Security Model that prevents Data Leakage in Distributed Mobile Systems using Surrogate Objects. IJCA Special Issue on Advanced Computing and Communication Technologies for HPC Applications ACCTHPCA(1):21-25, July 2012. Full text available. BibTeX

@article{key:article,
	author = {R. Anitha and S. Ravimaran and P. Valarmathi},
	title = {Article: Security Model that prevents Data Leakage in Distributed Mobile Systems using Surrogate Objects},
	journal = {IJCA Special Issue on Advanced Computing and Communication Technologies for HPC Applications},
	year = {2012},
	volume = {ACCTHPCA},
	number = {1},
	pages = {21-25},
	month = {July},
	note = {Full text available}
}

Abstract

Devices such as smart phones are considered to be the most common communication devices in current scenario. Recently, mobile phones are not only used for voice and message communication but also, sending and receiving important data such as social security numbers, bank account details and passwords, so it is important to provide proper security to the data's in the distributed mobile environment. Although there is lots of security mechanisms have been proposed already, a lot more needs to be done. We have proposed a new security model that prevents data leakage among object based transaction execution in distributed mobile environment. The model first secures the data on the object by authenticating the user and then secures the data during transaction execution and reconciliation. The proposed mechanism is efficient in securing the data's because communication has been reduced by making the object to act on behalf of the server. It also ensures confidentiality of transaction by creating an encrypted tunnel between the objects and database server. The entire process is simulated and results shows that our model is more secured and provide less communication overhead than the existing models in the distributed mobile environment.

References

  • Constantinos F. Grecas, Sotirios I. Maniatis and Iakovos S. Venieris, "Introduction of the Asymmetric Cryptography in GSM, GPRS, UMTS, and Its Public Key Infrastructure Integration", Mobile Networks and Applications, Volume 8, 2003.
  • Uwe G. Wilhelm,"Increasing Privacy in Mobile Communication Systems using Cryptographically Protected Objects", Verläßliche IT-Systeme, 1997.
  • DeviceForge "An IntroductioSurrogate Object Model: A New Paradigm for Distributed Mobile Systemsn to Elliptical Curve Cryptography", July 20,2004.
  • X. Ding, D Mazzochi, and G Tsudiatures", ACM Transactions on Internet Technology (TOIT), 2007.
  • Fangguo Zhang, Yi Mu, and Willy Susilo, "Reducing Security Overhead for Mobk, "Equipping Smart Devices with Public Key Signile Networks," The proceedings of 19th International Conference on Advanced Information Networking and Applications (AINA'05), Vol. 1, 2005.
  • Jagdish Bhatta and Lok Prakash Pandey "Performance Evaluation of RSA Variants and Elliptic Curve Cryptography on Handheld Devices" IJCSNS International Journal of Computer Science and Network Security, VOL. 11 No. 11, November 2011.
  • M. A. Maluk Mohamed, D. Janakiram and Mohit Chakraborty "Surrogate Object Model: A New Paradigm for Distributed Mobile Systems"
  • N. T. Trask and M. V. Meyerstein, "Smart Cards in Electronic Commerce", A SpringerLink journal on BT Technology, Vol. 17, No. 3, 2004, pp. 57-66.
  • N T Trask and S A Jaweed, "Adapting Public Key Infrastructures to the Mobile Environment", A SpringerLink journal on BT Technology, Vol. 19, No. 3, 2004, pp. 76-80.
  • E Mohammed, A E Emarah, and K El-Shennawy, "Elliptic Curve Cryptosystk, "Equipping Smart Devices with Public Key Signems on Smart Cards", Proceedings of IEEE International Carnahan Conference on Security Technology, 2001.
  • A. S. Wander, N Gura, H Eberle, V Gupta, and S C Shantz, "Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks", Proceedings of 3rd IEEE International Conference on Pervasive Computing and Communications, 2005.
  • Millan, W. , Gauravaram, P. , 2004. Improved Attack on the Cellular Authentication and Voice Encryption Algorithm. International Workshop on Cryptographic Algorithms and their Uses. Gold Coast, Australia, July 2004.
  • Wingert, C. , Naidu, M. , 2002. CDMA 1xRTT Security Overview. Qualcomm Incorporated.
  • Millan, W. , Gauravaram, P. , 2004. Cryptanalysis of the Cellular Authentication and Voice Encryption Algorithm. IEICE Electronics Exprss, Vol. 1, No. 15.
  • V. Gayoso Martínez, L. Hernández Encinas, and C. Sánchez Ávila "A Survey of the Elliptic Curve Integrated Encryption Scheme" Journal of computer science and engineering,Vol. 2,issue2,August2010