Abstract
We present a refinement design of the Integrity Framework, which is a part of a more general structure, that we refer to as the Java Data Security Framework (JDSF) designed to support various aspects related to data and database security (confidentiality, origin authentication, integrity, SQL randomization), where this article focuses only on the integrity aspect. The design refinement considerations include further unification of the parameter structure of concrete module implementations of the frameworkâs API for validation and comparative studies.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
S. Mokhov, I. Clement, S. Sinclair, and D. Nicolacopoulos, âModular Audio Recognition Framework,â Department of Computer Science and Software Engineering, Concordia University, Montreal, Canada, 2002â 2003, project report, http://marf.sf.net, last viewed April 2008.
The hsqldb Development Group, âHSQLDB â lightweight 100% Java SQL database engine v.1.8.0.10,â hsqldb.org, 2001â2008, http://hsqldb.org/.
S. A. Mokhov, âIntroducing MARF: a modular audio recognition framework and its applications for scientific and software engineering research,â in Advances in Computer and Information Sciences and Engineering. University of Bridgeport, U.S.A.: Springer Netherlands, Dec. 2007, pp. 473â478, proceedings of CISSE/SCSSâ07, cisse2007.org.
ââ, âOn design and implementation of distributed modular audio recognition framework: Requirements and specification design document,â Department of Computer Science and Software Engineering, Concordia University, Montreal, Canada, Aug. 2006, project report, http://marf.sf.net, last viewed December 2008.
S. A. Mokhov, L. W. Huynh, and J. Li, âManaging distributed MARFâs nodes with SNMP,â in Proceedings of PDPTAâ2008. Las Vegas, USA: CSREA Press, Aug. 2008, to appear.
S. A. Mokhov and R. Jayakumar, âDistributed modular audio recognition framework (DMARF) and its applications over web services,â in Proceedings of TeNeâ08. Springer, 2008, to appear.
S. A. Mokhov, âChoosing best algorithm combinations for speech processing tasks in machine learning using MARF,â in Proceedings of the 21st Canadian AIâ08, S. Bergler, Ed. Windsor, Ontario, Canada: Springer-Verlag, Berlin Heidelberg, May 2008, pp. 216â221, LNAI 5032.
ââ, âStudy of best algorithm combinations for speech processing tasks in machine learning using median vs. mean clusters in MARF,â in Proceedings of C3S2Eâ08, B. C. Desai, Ed. Montreal, Quebec, Canada: ACM and BytePress, May 2008, pp. 29â43, ISBN 978â1-60558â101-9.
Sun Microsystems, Inc., âOpenOffice,â [online], 2008, openoffice.org.
S. A. Mokhov, L. W. Huynh, J. Li, and F. Rassai, âA Java Data Security Framework (JDSF) for MARF and HSQLDB,â Concordia Institute for Information Systems Engineering, Concordia University, Montreal, Canada, Apr. 2007, project report. Hosted at http://marf.sf.net, last viewed April 2008.
ââ, âA privacy framework within the java data security framework (JDSF): Design refinement, implementation, and statistics,â in Proceedings of the 12th World Multi-Conference on Systemics, Cybernetics and Informatics (WM-SCIâ08), N. Callaos, W. Lesso, C. D. Zinn, J. Baralt, J. Boukachour, C. White, T. Marwala, and F. V. Nelwamondo, Eds., vol. V. Orlando, Florida, USA: IIIS, Jun. 2008, pp. 131â136.
S. A. Mokhov, F. Rassai, L. W. Huynh, and L. Wang, âThe authentication framework within the java data security framework (JDSF): Design refinement and implementation,â in Proceedings of CISSEâ08. University of Bridgeport, CT, USA: Springer, Dec. 2008, to appear.
S. A. Mokhov, L. Wang, and J. Li, âSimple dynamic key management in SQL randomization,â 2008, unpublished.
R. Chandramouli, N. Memon, and M. Rabbani, âDigital watermarking,â 2002.
L. de C.T. Gomes, P. Cano, E. Gomez, M. Bonnet, and E. Batlle, âAudio watermarking and fingerprinting,â 2002.
H.-C. Wu and H.-C. Lin, âDigital watermarking techniques,â 2005.
R. Agrawal and J. Kiernan, âWatermarking relational database.â IBM Almaden Research Center, 2002.
R. Sion, M. Atallah, and S. Prabhakar, âRights protection for relational data,â in IEEE Transactions on Knowledge and Data Engineering. IEEE Computer Society, 2004.
R. C. Dixon, Spread Spectrum Systems, 3rd ed. John Wiley and Sons, New York, 1994.
S. Haykin, Digital Communications. John Wiley and Sons, New York, 1988.
L. Boney, A. H. Tewfik, and K. N. Hamdy, âDigital watermarks for audio signals,â in International Conference on Multimedia Computing and Systems, 1996, pp. 473â480.
R. A. Garcia, âDigital watermarking of audio signals using psychoacousting auditory model and spread spectrum theory,â in 107th Convention on Audio Engineering Society, 1999.
W. Bender, D. Gruhl, N. Morimoto, and A. Lu, âTechniques for data hiding,â IBM System Journal, vol. 35, pp. 313â336, 1996.
C. Neubauer and J. Herre, âAdvanced audio watermarking and its application,â in 109th Convention on Audio Engineering Society, 2000.
J. Lacy, S. R. Quackenbush, A. Reibman, and J. H. Snyder, âIntellectual property protection systems and digital watermarking,â in Information Hiding (Proceedings of the Second International Workshop, IHâ98), D. Aucsmith, Ed. Springer, LNCS 1525, Dec. 1998, pp. 158â168.
E. Zwicker and H. Fastl, Psychoacoustics facts and models. Springer-Verlag, Berlin, 1990.
L. Wang, âINSE691A: Database security and privacy, course notes,â CIISE, Concordia University, 2007, http://users.encs.concordia.ca/?wang/INSE691A.html.
W. T. Polk and L. E. Bassham, Security Issues in the Database Language SQL. NIST, 1993, NIST Special Publication 800â8.
Unascribed, âCBC-DES Java implementation,â [online], 2007.
J. O. Grabbe, âJava program for RSA encryption,â [online], 2001, http://www.laynetworks.com/rsa_java.txt.
Unascribed, Sign and Verify a DSA Signature. java2s.com, 2004, http://www.java2s.com/Code/Java/Security/VerifyaDSAsignature.htm.
Sun Microsystems, Inc., Security Features in Java SE. java.sun.com, 2007, http://java.sun.com/docs/books/tutorial/security/index.html.
S. Paavolainen and S. Ostermiller, MD5 hash generator. ostermiller.org, 2007, http://ostermiller.org/utils/MD5.java.html.
A. Andreu and M.-A. Laverdi`ere, SSHA Digest, Modified. www.securitydocs.com, 2006, http://www.securitydocs.com/library/3439.
S. A. Mokhov, âTowards security hardening of scientific distributed demand-driven and pipelined computing systems,â in Proceedings of the 7th International Symposium on Parallel and Distributed Computing (ISPDCâ08). Krakow, Poland: IEEE Computer Society Press, Jul. 2008, to appear, http://ispdc2008.ipipan.waw.pl/.
Acknowledgment
This research work was funded by the Faculty of Engineering and Computer Science of Concordia University, Montreal, Canada. We also would like to acknowledge Jian Li and Farid Rassai, database security researchers, open-source community, Drs. Joey Paquet and Mourad Debbabi, and Dr. Chadi Assi.
While implementing, integrating, and testing the framework, we resorted to open-source implementations of known cryptographic and otherwise algorithms, with due credit and citations given to their developers.
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
Âİ 2010 Springer Science+Business Media B.V.
About this paper
Cite this paper
Mokhov, S.A., Huynh, L.W., Wang, L. (2010). The Integrity Framework within the Java Data Security Framework (JDSF): Design and Implementation Refinement. In: Sobh, T., Elleithy, K., Mahmood, A. (eds) Novel Algorithms and Techniques in Telecommunications and Networking. Springer, Dordrecht. https://doi.org/10.1007/978-90-481-3662-9_77
Download citation
DOI: https://doi.org/10.1007/978-90-481-3662-9_77
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-90-481-3661-2
Online ISBN: 978-90-481-3662-9
eBook Packages: EngineeringEngineering (R0)