The Integrity Framework within the Java Data Security Framework (JDSF): Design and Implementation Refinement

  • Conference paper
  • First Online:
Novel Algorithms and Techniques in Telecommunications and Networking

Abstract

We present a refinement design of the Integrity Framework, which is a part of a more general structure, that we refer to as the Java Data Security Framework (JDSF) designed to support various aspects related to data and database security (confidentiality, origin authentication, integrity, SQL randomization), where this article focuses only on the integrity aspect. The design refinement considerations include further unification of the parameter structure of concrete module implementations of the framework’s API for validation and comparative studies.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
EUR 29.95
Price includes VAT (Germany)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR 160.49
Price includes VAT (Germany)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
EUR 213.99
Price includes VAT (Germany)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info
Hardcover Book
EUR 213.99
Price includes VAT (Germany)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. S. Mokhov, I. Clement, S. Sinclair, and D. Nicolacopoulos, “Modular Audio Recognition Framework,” Department of Computer Science and Software Engineering, Concordia University, Montreal, Canada, 2002– 2003, project report, http://marf.sf.net, last viewed April 2008.

  2. The hsqldb Development Group, “HSQLDB – lightweight 100% Java SQL database engine v.1.8.0.10,” hsqldb.org, 2001–2008, http://hsqldb.org/.

  3. S. A. Mokhov, “Introducing MARF: a modular audio recognition framework and its applications for scientific and software engineering research,” in Advances in Computer and Information Sciences and Engineering. University of Bridgeport, U.S.A.: Springer Netherlands, Dec. 2007, pp. 473–478, proceedings of CISSE/SCSS’07, cisse2007.org.

    Google Scholar 

  4. ——, “On design and implementation of distributed modular audio recognition framework: Requirements and specification design document,” Department of Computer Science and Software Engineering, Concordia University, Montreal, Canada, Aug. 2006, project report, http://marf.sf.net, last viewed December 2008.

  5. S. A. Mokhov, L. W. Huynh, and J. Li, “Managing distributed MARF’s nodes with SNMP,” in Proceedings of PDPTA’2008. Las Vegas, USA: CSREA Press, Aug. 2008, to appear.

    Google Scholar 

  6. S. A. Mokhov and R. Jayakumar, “Distributed modular audio recognition framework (DMARF) and its applications over web services,” in Proceedings of TeNe’08. Springer, 2008, to appear.

    Google Scholar 

  7. S. A. Mokhov, “Choosing best algorithm combinations for speech processing tasks in machine learning using MARF,” in Proceedings of the 21st Canadian AI’08, S. Bergler, Ed. Windsor, Ontario, Canada: Springer-Verlag, Berlin Heidelberg, May 2008, pp. 216–221, LNAI 5032.

    Google Scholar 

  8. ——, “Study of best algorithm combinations for speech processing tasks in machine learning using median vs. mean clusters in MARF,” in Proceedings of C3S2E’08, B. C. Desai, Ed. Montreal, Quebec, Canada: ACM and BytePress, May 2008, pp. 29–43, ISBN 978–1-60558–101-9.

    Google Scholar 

  9. Sun Microsystems, Inc., “OpenOffice,” [online], 2008, openoffice.org.

    Google Scholar 

  10. S. A. Mokhov, L. W. Huynh, J. Li, and F. Rassai, “A Java Data Security Framework (JDSF) for MARF and HSQLDB,” Concordia Institute for Information Systems Engineering, Concordia University, Montreal, Canada, Apr. 2007, project report. Hosted at http://marf.sf.net, last viewed April 2008.

  11. ——, “A privacy framework within the java data security framework (JDSF): Design refinement, implementation, and statistics,” in Proceedings of the 12th World Multi-Conference on Systemics, Cybernetics and Informatics (WM-SCI’08), N. Callaos, W. Lesso, C. D. Zinn, J. Baralt, J. Boukachour, C. White, T. Marwala, and F. V. Nelwamondo, Eds., vol. V. Orlando, Florida, USA: IIIS, Jun. 2008, pp. 131–136.

    Google Scholar 

  12. S. A. Mokhov, F. Rassai, L. W. Huynh, and L. Wang, “The authentication framework within the java data security framework (JDSF): Design refinement and implementation,” in Proceedings of CISSE’08. University of Bridgeport, CT, USA: Springer, Dec. 2008, to appear.

    Google Scholar 

  13. S. A. Mokhov, L. Wang, and J. Li, “Simple dynamic key management in SQL randomization,” 2008, unpublished.

    Google Scholar 

  14. R. Chandramouli, N. Memon, and M. Rabbani, “Digital watermarking,” 2002.

    Google Scholar 

  15. L. de C.T. Gomes, P. Cano, E. Gomez, M. Bonnet, and E. Batlle, “Audio watermarking and fingerprinting,” 2002.

    Google Scholar 

  16. H.-C. Wu and H.-C. Lin, “Digital watermarking techniques,” 2005.

    Google Scholar 

  17. R. Agrawal and J. Kiernan, “Watermarking relational database.” IBM Almaden Research Center, 2002.

    Google Scholar 

  18. R. Sion, M. Atallah, and S. Prabhakar, “Rights protection for relational data,” in IEEE Transactions on Knowledge and Data Engineering. IEEE Computer Society, 2004.

    Google Scholar 

  19. R. C. Dixon, Spread Spectrum Systems, 3rd ed. John Wiley and Sons, New York, 1994.

    Google Scholar 

  20. S. Haykin, Digital Communications. John Wiley and Sons, New York, 1988.

    Google Scholar 

  21. L. Boney, A. H. Tewfik, and K. N. Hamdy, “Digital watermarks for audio signals,” in International Conference on Multimedia Computing and Systems, 1996, pp. 473–480.

    Google Scholar 

  22. R. A. Garcia, “Digital watermarking of audio signals using psychoacousting auditory model and spread spectrum theory,” in 107th Convention on Audio Engineering Society, 1999.

    Google Scholar 

  23. W. Bender, D. Gruhl, N. Morimoto, and A. Lu, “Techniques for data hiding,” IBM System Journal, vol. 35, pp. 313–336, 1996.

    Article  Google Scholar 

  24. C. Neubauer and J. Herre, “Advanced audio watermarking and its application,” in 109th Convention on Audio Engineering Society, 2000.

    Google Scholar 

  25. J. Lacy, S. R. Quackenbush, A. Reibman, and J. H. Snyder, “Intellectual property protection systems and digital watermarking,” in Information Hiding (Proceedings of the Second International Workshop, IH’98), D. Aucsmith, Ed. Springer, LNCS 1525, Dec. 1998, pp. 158–168.

    Google Scholar 

  26. E. Zwicker and H. Fastl, Psychoacoustics facts and models. Springer-Verlag, Berlin, 1990.

    Google Scholar 

  27. L. Wang, “INSE691A: Database security and privacy, course notes,” CIISE, Concordia University, 2007, http://users.encs.concordia.ca/?wang/INSE691A.html.

  28. W. T. Polk and L. E. Bassham, Security Issues in the Database Language SQL. NIST, 1993, NIST Special Publication 800–8.

    Google Scholar 

  29. Unascribed, “CBC-DES Java implementation,” [online], 2007.

    Google Scholar 

  30. J. O. Grabbe, “Java program for RSA encryption,” [online], 2001, http://www.laynetworks.com/rsa_java.txt.

  31. Unascribed, Sign and Verify a DSA Signature. java2s.com, 2004, http://www.java2s.com/Code/Java/Security/VerifyaDSAsignature.htm.

  32. Sun Microsystems, Inc., Security Features in Java SE. java.sun.com, 2007, http://java.sun.com/docs/books/tutorial/security/index.html.

  33. S. Paavolainen and S. Ostermiller, MD5 hash generator. ostermiller.org, 2007, http://ostermiller.org/utils/MD5.java.html.

  34. A. Andreu and M.-A. Laverdi`ere, SSHA Digest, Modified. www.securitydocs.com, 2006, http://www.securitydocs.com/library/3439.

  35. S. A. Mokhov, “Towards security hardening of scientific distributed demand-driven and pipelined computing systems,” in Proceedings of the 7th International Symposium on Parallel and Distributed Computing (ISPDC’08). Krakow, Poland: IEEE Computer Society Press, Jul. 2008, to appear, http://ispdc2008.ipipan.waw.pl/.

Download references

Acknowledgment

This research work was funded by the Faculty of Engineering and Computer Science of Concordia University, Montreal, Canada. We also would like to acknowledge Jian Li and Farid Rassai, database security researchers, open-source community, Drs. Joey Paquet and Mourad Debbabi, and Dr. Chadi Assi.

While implementing, integrating, and testing the framework, we resorted to open-source implementations of known cryptographic and otherwise algorithms, with due credit and citations given to their developers.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Serguei A. Mokhov , Lee Wei Huynh or Lingyu Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

Âİ 2010 Springer Science+Business Media B.V.

About this paper

Cite this paper

Mokhov, S.A., Huynh, L.W., Wang, L. (2010). The Integrity Framework within the Java Data Security Framework (JDSF): Design and Implementation Refinement. In: Sobh, T., Elleithy, K., Mahmood, A. (eds) Novel Algorithms and Techniques in Telecommunications and Networking. Springer, Dordrecht. https://doi.org/10.1007/978-90-481-3662-9_77

Download citation

  • DOI: https://doi.org/10.1007/978-90-481-3662-9_77

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-90-481-3661-2

  • Online ISBN: 978-90-481-3662-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics

Navigation