Middleware Support for Tunable Encryption

نویسندگان

  • Stefan Lindskog
  • Reine Lundin
  • Anna Brunstrom
چکیده

To achieve an appropriate tradeoff between security and performance for wireless applications, a tunable and differential treatment of security is required. In this paper, we present a tunable encryption service designed as a middleware that is based on a selective encryption paradigm. The core component of the middleware provides block-based selective encryption. Although the selection of which data to encrypt is made by the sending application and is typically content-dependent, the representation used by the core component is application and content-independent. This frees the selective decryption module at the receiver from the need for application or content-specific knowledge. The sending application specifies the data to encrypt either directly or through a set of highlevel application interfaces. A prototype implementation of the middleware is described along with an initial performance evaluation. The experimental results demonstrate that the generic middleware service offers a high degree of security adaptiveness at a low cost.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Tunable Security Support for Wireless Applications

A tunable and differential treatment of security is needed to achieve the best possible balance between security and performance for wireless applications. In this paper, we present a tunable encryption service that is based on a selective encryption paradigm in which applications can request a desired encryption level. Encryption levels are selected at the inception of a session, but can be ch...

متن کامل

Secure Sharing of Tuple Spaces in Ad Hoc Settings**Please see WUCSE-03-26**

Security is emerging as a growing concern throughout the distributed computing community. Typical solutions entail specialized infrastructure support for authentication, encryption and access control. Mobile applications executing over ad hoc wireless networks present designers with a rather distinct set of security requirements. A totally open setting and limited resources call for lightweight...

متن کامل

Secure Sharing of Tuple Spaces in Ad Hoc Settings

Security is emerging as a growing concern throughout the distributed computing community. Typical solutions entail specialized infrastructure support for authentication, encryption and access control. Mobile applications executing over ad hoc wireless networks present designers with a rather distinct set of security requirements. A totally open setting and limited resources call for lightweight...

متن کامل

A flexible middleware for multimedia communication: design, implementation, and experience

Distributed multimedia applications require a variety of communication services. These services and different application requirements have to be provided and supported within (1) end-systems in an efficient and integrated manner, combining the precise specification of Quality-ofService (QoS) requirements, application interfaces, multicast support, and security features, and within (2) the netw...

متن کامل

Middleware for a Re-configurable Distributed Archival Store Based on Secret Sharing

Modern storage systems are often faced with complex trade-offs between the confidentiality, availability, and performance they offer their users. Secret sharing is a data encoding technique that provides information-theoretically provable guarantees on confidentiality unlike conventional encryption. Additionally, secret sharing provides quantifiable guarantees on the availability of the encoded...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006