Permutation of Httpi and HTTPS in Web Services against Attacks for Security enhancement

نویسندگان

  • S. Chakaravarthi
  • V. Ramachandran
چکیده

The Hyper Text Transfer Protocol (HTTP) protocol plays a vital role in Web Services Security. Though the HTTPs provide excellent security, they are not flexible enough to allow caches. HTTPi provides high integrity and low security whereas HTTPs provide low integrity and high security. The goal of WS activity is to build up set of technologies in order to direct WS to their complete prospective application. WS play an excellent role, without which the internet applications cannot be made. To provide both high security and high integrity in Web Services (WS), a new model is proposed. In this model, the combined HTTPs’s security and HTTPi’s flexibility are considered to provide the best WS. In addition, the user affords the self encrypted data for privacy preserving the requester agent. Finally, the requester agent encrypts the particular data so as to create two protections known as self protection and agent protection. Due to mounting threats in the WS, numerous developers and researchers attempt to enhance additional safekeeping in service level. When WS usages are constantly increasing, it is necessary to give proper security as well as flexibility in WS. The requester agent sends the data to the next level. In this message level, the header information can be self verified through appropriate security mechanism proposed in the model. The results of this proposal are compared with the existing methods and better performance is obtained by calculating the throughput and response time.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

HTTPI Based Web Service Security over SOAP

Now a days, a new family of web applications 'open applications’, are emerging (e.g., Social Networking, News and Blogging). Generally, these open applications are non-confidential. The security needs of these applications are only client/server authentication and data integrity. For securing these open applications, effectively and efficiently, HTTPI, a new transport protocol is proposed, whic...

متن کامل

HTTP Integrity: A Lite and Secure Web against World Wide Woes

While there is no guarantee of HTTP page integrity, this issue is left unaddressed in discussions of web security. Though HTTPS can be used to solve the HTTP page integrity problem, HTTPS is shunned by web communities due to the performance overheads caused by TLS. Worse yet, HTTPS inherently breaks the distributed nature of the web by disallowing caching. The end-toend security guarantee of HT...

متن کامل

HTTPi for Practical End-to-End Web Content Integrity

Widespread growth of open wireless hotspots has made it easy to carry out man-in-the-middle attacks and impersonate web sites. Although HTTPS can be used to prevent such attacks, its universal adoption is hindered by its performance cost and its inability to leverage caching at intermediate servers (such as CDN servers and caching proxies) while maintaining end-to-end security. To complement HT...

متن کامل

Improving Tor security against timing and traffic analysis attacks with fair randomization

The Tor network is probably one of the most popular online anonymity systems in the world. It has been built based on the volunteer relays from all around the world. It has a strong scientific basis which is structured very well to work in low latency mode that makes it suitable for tasks such as web browsing. Despite the advantages, the low latency also makes Tor insecure against timing and tr...

متن کامل

Security of Sponge structures

Sponge structure is a structure widely used in the design of cryptographic algorithms that reduces the design of the algorithms to the design of a permutation or pseudo-random function. The development of sponge-based algorithms and the selection of designs based on this structure in SHA3 and CAESAR competitions increase the need to examine its security against various types of attacks. In the ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • JCS

دوره 10  شماره 

صفحات  -

تاریخ انتشار 2014