Skip to main content
Top

2016 | OriginalPaper | Chapter

Provision of XML Security in E-Commerce Applications with XML Digital Signatures Using Virtual Smart Card

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The paper aims at enhancing XML security by generating an XML digital signature capable of providing the major security features such as authentication, integrity, non-repudiation and confidentiality [14]. It also extends the concept of Information hiding which overcomes the hidden problem of traditional XML digital signature generation called “MID-WAY READING”. The security of the document is ensured by a process called ‘information hiding’. The document to be sent is digitally signed as well as encrypted and thereby ensuring excellent security level during the business transactions in an e-commerce environment and in addition to that, the private key used for signing the document is stored in a virtual smart card that provides enhanced security.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Dournaee, B., Dournee, B.: XML Security. Mcgraw-Hill, New York (2002) Dournaee, B., Dournee, B.: XML Security. Mcgraw-Hill, New York (2002)
3.
go back to reference Groz, B., et al.: Static analysis of XML security views and query rewriting. Inf. Comput. 238, 2–29 (2014) Groz, B., et al.: Static analysis of XML security views and query rewriting. Inf. Comput. 238, 2–29 (2014)
5.
go back to reference Barhoom, T.S.M, Shen-Sheng, Z.; Trusted exam marks system at IUG using XML-signature. In: The Fourth International Conference on Computer and Information Technology, CIT’04. IEEE (2004) Barhoom, T.S.M, Shen-Sheng, Z.; Trusted exam marks system at IUG using XML-signature. In: The Fourth International Conference on Computer and Information Technology, CIT’04. IEEE (2004)
6.
go back to reference Rao, W., Gan, Q.: The performance analysis of two digital signature schemes based on secure charging protocol. In: International Conference on Wireless Communications, Networking and Mobile Computing. Proceedings, vol. 2. IEEE (2005) Rao, W., Gan, Q.: The performance analysis of two digital signature schemes based on secure charging protocol. In: International Conference on Wireless Communications, Networking and Mobile Computing. Proceedings, vol. 2. IEEE (2005)
8.
go back to reference Tao, H., Qihai, Z., Le, Z., Zhongjun, L., Xun, L.: An improved scheme for e-signature techniques based on digital encryption and information hiding. In: 2008 International Symposiums on Information Processing (ISIP), pp. 593, 597, 23–25 May 2008 Tao, H., Qihai, Z., Le, Z., Zhongjun, L., Xun, L.: An improved scheme for e-signature techniques based on digital encryption and information hiding. In: 2008 International Symposiums on Information Processing (ISIP), pp. 593, 597, 23–25 May 2008
9.
go back to reference Jie, Y.: Algorithm of XML document information hiding based on equal element. In: 2010 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT), vol. 3. IEEE (2010) Jie, Y.: Algorithm of XML document information hiding based on equal element. In: 2010 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT), vol. 3. IEEE (2010)
11.
go back to reference Bedi, H., Yang, L.: Fair electronic exchange based on fingerprint biometrics. Int. J. Inf. Secur. Privacy (IJISP) 3(3), 76–106 (2009)CrossRef Bedi, H., Yang, L.: Fair electronic exchange based on fingerprint biometrics. Int. J. Inf. Secur. Privacy (IJISP) 3(3), 76–106 (2009)CrossRef
12.
go back to reference Gómez, J.M., Lichtenberg, J.: Intrusion detection management system for ecommerce security. J. Inf. Priv. Secur. 3(4), 19–31 (2007) Gómez, J.M., Lichtenberg, J.: Intrusion detection management system for ecommerce security. J. Inf. Priv. Secur. 3(4), 19–31 (2007)
13.
go back to reference Grabher, P., Großschädl, J., Page, D.: Light-weight instruction set extensions for bit-sliced cryptography. In: Cryptographic Hardware and Embedded Systems–CHES 2008, pp. 331–345. Springer, Berlin (2008) Grabher, P., Großschädl, J., Page, D.: Light-weight instruction set extensions for bit-sliced cryptography. In: Cryptographic Hardware and Embedded Systems–CHES 2008, pp. 331–345. Springer, Berlin (2008)
14.
go back to reference Chan, G.Y., Lee, C.S., Heng, S.H.: Defending against XML-related attacks in e-commerce applications with predictive fuzzy associative rules. Appl. Soft Comput. 24, 142–157 (2014)CrossRef Chan, G.Y., Lee, C.S., Heng, S.H.: Defending against XML-related attacks in e-commerce applications with predictive fuzzy associative rules. Appl. Soft Comput. 24, 142–157 (2014)CrossRef
15.
go back to reference Meadors, K.: Secure electronic data interchange over the Internet. IEEE Internet Comput. 9(3), 82–89 (2005)CrossRef Meadors, K.: Secure electronic data interchange over the Internet. IEEE Internet Comput. 9(3), 82–89 (2005)CrossRef
16.
go back to reference Wajih, E.H.Y., Mohsen, M., Rached, T.: A secure elliptic curve digital signature scheme for embedded devices. In: 2nd International Conference on Signals, Circuits and Systems, SCS 2008, pp. 1, 6, 7–9 Nov 2008 Wajih, E.H.Y., Mohsen, M., Rached, T.: A secure elliptic curve digital signature scheme for embedded devices. In: 2nd International Conference on Signals, Circuits and Systems, SCS 2008, pp. 1, 6, 7–9 Nov 2008
17.
go back to reference Masoumi, M., Mohammadi, S.: A new and efficient approach to protect AES against differential power analysis. In: 2011 World Congress on Internet Security (WorldCIS). IEEE (2011) Masoumi, M., Mohammadi, S.: A new and efficient approach to protect AES against differential power analysis. In: 2011 World Congress on Internet Security (WorldCIS). IEEE (2011)
18.
go back to reference Hasan, M.A.: Power analysis attacks and algorithmic approaches to their countermeasures for Koblitz curve cryptosystems. IEEE Trans. Comput. 50(10), 1071–1083 (2001) Hasan, M.A.: Power analysis attacks and algorithmic approaches to their countermeasures for Koblitz curve cryptosystems. IEEE Trans. Comput. 50(10), 1071–1083 (2001)
19.
go back to reference Mahmoud, H., Alghathbar, K.: Novel algorithmic countermeasures for differential power analysis attacks on smart cards. In: 2010 Sixth International Conference on Information Assurance and Security (IAS). IEEE (2010) Mahmoud, H., Alghathbar, K.: Novel algorithmic countermeasures for differential power analysis attacks on smart cards. In: 2010 Sixth International Conference on Information Assurance and Security (IAS). IEEE (2010)
20.
go back to reference Kocher, P., et al.: Introduction to differential power analysis. J. Crypt. Eng. 1(1), 5–27 (2011) Kocher, P., et al.: Introduction to differential power analysis. J. Crypt. Eng. 1(1), 5–27 (2011)
21.
go back to reference Krieg, A., et al.: Accelerating early design phase differential power analysis using power emulation techniques. In: 2011 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST). IEEE (2011) Krieg, A., et al.: Accelerating early design phase differential power analysis using power emulation techniques. In: 2011 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST). IEEE (2011)
22.
go back to reference Karras, D.A., Zorkadis, V.: Neural network based benchmarks in the quality assessment of message digest algorithms for digital signatures based secure Internet communications. In: Proceedings of the International Joint Conference on Neural Networks, vol. 2. IEEE (2003) Karras, D.A., Zorkadis, V.: Neural network based benchmarks in the quality assessment of message digest algorithms for digital signatures based secure Internet communications. In: Proceedings of the International Joint Conference on Neural Networks, vol. 2. IEEE (2003)
25.
go back to reference Michail, H.E., et al.: Optimizing SHA-1 hash function for high throughput with a partial unrolling study. In: Integrated Circuit and System Design. Power and Timing Modeling, Optimization and Simulation, pp. 591–600. Springer, Berlin (2005) Michail, H.E., et al.: Optimizing SHA-1 hash function for high throughput with a partial unrolling study. In: Integrated Circuit and System Design. Power and Timing Modeling, Optimization and Simulation, pp. 591–600. Springer, Berlin (2005)
26.
go back to reference Großschädl, J., Page, D., Tillich, S.: Efficient java implementation of elliptic curve cryptography for J2ME-Enabled mobile devices. In: Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems, pp. 189–207. Springer, Berlin (2012) Großschädl, J., Page, D., Tillich, S.: Efficient java implementation of elliptic curve cryptography for J2ME-Enabled mobile devices. In: Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems, pp. 189–207. Springer, Berlin (2012)
28.
go back to reference Caelli, W.J., Dawson, E.P., Rea, S.A.: PKI, elliptic curve cryptography, and digital signatures. Comput. Secur. 18(1), 47–66 (1999)CrossRef Caelli, W.J., Dawson, E.P., Rea, S.A.: PKI, elliptic curve cryptography, and digital signatures. Comput. Secur. 18(1), 47–66 (1999)CrossRef
29.
go back to reference Brown, D.R.: Standards for efficient cryptography. SEC 1: Elliptic curve cryptography. Released Standard Version 1.0 and Working Draft v1.5, 2005. Available online http://www.secg.org. Last accessed 3 Apr 2012 Brown, D.R.: Standards for efficient cryptography. SEC 1: Elliptic curve cryptography. Released Standard Version 1.0 and Working Draft v1.5, 2005. Available online http://​www.​secg.​org. Last accessed 3 Apr 2012
30.
go back to reference Koblitz, N., Menezes, A., Vanstone, S.: The state of elliptic curve cryptography. In: Towards a Quarter-Century of Public Key Cryptography, pp. 103–123. Springer, US (2000) Koblitz, N., Menezes, A., Vanstone, S.: The state of elliptic curve cryptography. In: Towards a Quarter-Century of Public Key Cryptography, pp. 103–123. Springer, US (2000)
31.
go back to reference Bensheng, Y., Qiaoyun, W., Fangming, Z.: Security architecture design of bidding MIS based on B/S. In: 2009 International Workshop on Information Security and Application (IWISA 2009) (2009) Bensheng, Y., Qiaoyun, W., Fangming, Z.: Security architecture design of bidding MIS based on B/S. In: 2009 International Workshop on Information Security and Application (IWISA 2009) (2009)
33.
go back to reference Takase, T., Uramoto, N., Baba, K.: XML digital signature system independent of existing applications. In: 2002 Symposium on Applications and the Internet (SAINT) Workshops. Proceedings. IEEE (2002) Takase, T., Uramoto, N., Baba, K.: XML digital signature system independent of existing applications. In: 2002 Symposium on Applications and the Internet (SAINT) Workshops. Proceedings. IEEE (2002)
35.
go back to reference Teat, C., Peltsverger, S.: The security of cryptographic hashes. In: Proceedings of the 49th Annual Southeast Regional Conference. ACM (2011) Teat, C., Peltsverger, S.: The security of cryptographic hashes. In: Proceedings of the 49th Annual Southeast Regional Conference. ACM (2011)
36.
go back to reference Lam, T.C.B., Ding, J.J., Liu, J.C.: XML document parsing: operational and performance characteristics. Computer 9, 30–37 (2008) Lam, T.C.B., Ding, J.J., Liu, J.C.: XML document parsing: operational and performance characteristics. Computer 9, 30–37 (2008)
37.
go back to reference Chang, M.H., Chen, I.T., Chen, M.T.: Design of proxy signature in ECDSA. In: Eighth International Conference on Intelligent Systems Design and Applications. ISDA’08, vol. 3. IEEE (2008) Chang, M.H., Chen, I.T., Chen, M.T.: Design of proxy signature in ECDSA. In: Eighth International Conference on Intelligent Systems Design and Applications. ISDA’08, vol. 3. IEEE (2008)
38.
go back to reference Lu, W., et al.: A streaming validation model for SOAP digital signature. In: 14th IEEE International Symposium on High Performance Distributed Computing. HPDC-14. Proceedings. IEEE (2005) Lu, W., et al.: A streaming validation model for SOAP digital signature. In: 14th IEEE International Symposium on High Performance Distributed Computing. HPDC-14. Proceedings. IEEE (2005)
39.
go back to reference Yang, C.H., Morita, H., Okamoto, T.: Fast implementation of digital signature algorithms on smartcards without coprocessor. J. Int. Technol. Inf. Manag. (JITIm) 2, 82–90 (2002) Yang, C.H., Morita, H., Okamoto, T.: Fast implementation of digital signature algorithms on smartcards without coprocessor. J. Int. Technol. Inf. Manag. (JITIm) 2, 82–90 (2002)
Metadata
Title
Provision of XML Security in E-Commerce Applications with XML Digital Signatures Using Virtual Smart Card
Authors
Joannah Ravi
Balamurugan Balusamy
Copyright Year
2016
DOI
https://doi.org/10.1007/978-3-319-30927-9_40

Premium Partner