Middleware Support for Tunable Encryption
نویسندگان
چکیده
To achieve an appropriate tradeoff between security and performance for wireless applications, a tunable and differential treatment of security is required. In this paper, we present a tunable encryption service designed as a middleware that is based on a selective encryption paradigm. The core component of the middleware provides block-based selective encryption. Although the selection of which data to encrypt is made by the sending application and is typically content-dependent, the representation used by the core component is application and content-independent. This frees the selective decryption module at the receiver from the need for application or content-specific knowledge. The sending application specifies the data to encrypt either directly or through a set of highlevel application interfaces. A prototype implementation of the middleware is described along with an initial performance evaluation. The experimental results demonstrate that the generic middleware service offers a high degree of security adaptiveness at a low cost.
منابع مشابه
Tunable Security Support for Wireless Applications
A tunable and differential treatment of security is needed to achieve the best possible balance between security and performance for wireless applications. In this paper, we present a tunable encryption service that is based on a selective encryption paradigm in which applications can request a desired encryption level. Encryption levels are selected at the inception of a session, but can be ch...
متن کاملSecure Sharing of Tuple Spaces in Ad Hoc Settings**Please see WUCSE-03-26**
Security is emerging as a growing concern throughout the distributed computing community. Typical solutions entail specialized infrastructure support for authentication, encryption and access control. Mobile applications executing over ad hoc wireless networks present designers with a rather distinct set of security requirements. A totally open setting and limited resources call for lightweight...
متن کاملSecure Sharing of Tuple Spaces in Ad Hoc Settings
Security is emerging as a growing concern throughout the distributed computing community. Typical solutions entail specialized infrastructure support for authentication, encryption and access control. Mobile applications executing over ad hoc wireless networks present designers with a rather distinct set of security requirements. A totally open setting and limited resources call for lightweight...
متن کاملA flexible middleware for multimedia communication: design, implementation, and experience
Distributed multimedia applications require a variety of communication services. These services and different application requirements have to be provided and supported within (1) end-systems in an efficient and integrated manner, combining the precise specification of Quality-ofService (QoS) requirements, application interfaces, multicast support, and security features, and within (2) the netw...
متن کاملMiddleware for a Re-configurable Distributed Archival Store Based on Secret Sharing
Modern storage systems are often faced with complex trade-offs between the confidentiality, availability, and performance they offer their users. Secret sharing is a data encoding technique that provides information-theoretically provable guarantees on confidentiality unlike conventional encryption. Additionally, secret sharing provides quantifiable guarantees on the availability of the encoded...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006