Integrity verification for XML data

نویسندگان

  • Jules R. Nya
  • Huiping Guo
چکیده

The success of the Internet has made the communication very easy between parties and XML is one of the most used standard for information representation and exchange. A huge amount of data is crossing the Internet on the daily basis. Since the Internet is an unreliable network, XML data can be easily captured and tampered by unauthorized users. This study is proposing a scheme that uses fragile watermarking to detect and localize any modification made to an XML data. This scheme is distortion free since it doesn’t introduce any distortion to the XML data. This scheme uses an algorithm that distributes elements of the XML data into groups in a secure manner according to certain parameters. The watermark is verified without the need to have the initial XML data, and also, the embedding and the verification process in each group are independent. Experimental results and security analysis show that the chance to detect and locate change in the XML data

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Trustworthy Verification and Visualisation of Multiple XML-Signatures

The digital signature is one of the most important cryptographic primitives. It provides data integrity, message authentication and non-repudiation, which are required attributes in security critical services, such as electronic commerce, voting or health care. Whereas previous data formats for digital signatures concentrated on signing the entire document, the XML signature standard is feasibl...

متن کامل

Object-Oriented Constraints for XML Schema

This paper presents an object-oriented representation of the core structural and constraint-related features of XML Schema. The structural features are represented within the limitations of object-oriented type systems including particles (elements and groups) and type hierarchies (simple and complex types and type derivations). The applicability of the developed representation is demonstrated ...

متن کامل

When Grammars do not Suffice: Data and Content Integrity Constraints Verification in XML through a Conceptual Model

Complex applications can benefit greatly from using conceptual models and Model Driven Architecture during development, deployment and runtime. XML applications are not different. In this paper, we examine the possibility of using Object Constraint Language (OCL) for expressing constraints over a conceptual model for XML data. We go through the different classes of OCL expression and show how e...

متن کامل

Configuration Tool for ARINC 653 Operating Systems

ARINC 653 Specification defines a standardized interface of real-time operating systems and an Application Executive (APEX) to develop the reliable applications for avionics based on Integrated Modular Avionics (IMA). The requirements of system platform based on ARINC 653 Standard are defined as configuration data and are integrated to the XML configuration file(s) in the real-time operating sy...

متن کامل

An Interactive Tool Based on Xml Technology for Data Exchange between Heterogeneous Erp Systems

Data exchange between enterprise resource planning (ERP) systems in a supply chain system needs to fulfill requirements of both schema integration and message translation. Since ERP systems with relational database systems are developed independently, schema conflicts between databases is a common problem for schema integration. Thus, supply chain partners need to preserve the data integrity of...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007