Fast and Secure Web Service Transaction Based On Improved Public Key Crypto System
A web service is any service that is available over the Internet that uses a standardized XML messaging system which is not tied to any operating system or programming language. Web Service Security deals with quality of protection through message integrity, message confidentiality, and single message authentication. In that the well known term called WS-Security (Web Services Security) is a specification that protects SOAP messages to ensure end-to-endsecurity. To develop a secure and time effective public key cryptosystem, web services use SOAP message withMONTGOMERY’S method to improve the encryption speed enormously. Earlier RSA was chosen as a secure public key cryptosystem which has been tied up with the SOAP message communication. But the security of the RSA enabled SOAP messaging system is based on the size of the RSA key which is purely determined by the security algorithm we enforce. As the key size increases the security of the system also increases, at the same time increase in key size causes more computation time in spite of key determination. In order to speedup these encryption and decryption processes the new technique called Montgomery’s which performs modular multiplication and modular exponentiation and thereby improves the RSA computation much better than the usual method of computation. As an experiment we have implemented the algorithm in C#.NET and applied this algorithm over ASP.NET web service for E-Learning domain and observed that the performance of the proposed algorithm executes relatively faster than the traditional RSA algorithm.
Eduardo B. Fernandez and Nelly Delessy “Using Patterns to Understand and Compare Web Services Security Products and Standards” International Conference on Internet and Web Applications and Services (AICT/ICIW 2006).
Kojiro Nakayama, Takeshi Ishizaki and Michiko Oba, “Application of Web Services Security Using Travel Industry Model “firstname.lastname@example.org, The 2005 Symposium on Applications and the Internet Workshops (SAINT-W’05).
Kezhe Tang, Shiping Chen2 David Levy, John Zic2 and Bo Yan,”A Performance Evaluation of Web Services Security“International Enterprise Distributed Object Computing Conference (EDOC'06).
Ying Liu1,Tet H. Yeap and William O’Brien, “Securing XML Web Services with Elliptic Curve Cryptography “
Shiping Chen1, John Zic1, Kezhe Tang, David Levy, “Performance Evaluation and Modeling of Web Services Security” 2007 IEEE International Conference on Web Services.
Jian-xinli, Binli, Liangli, Tong-shengche, “A Policy Language for Adaptive Web Services Security Framework” Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing.
Wei She, Bhavani Thuraisingham, and I-Ling Yen,” Delegation-based Security Model for Web Service”, 10th IEEE High Assurance Systems Engineering Symposium.
Yumi Yamaguchi, Hyen-Vui Chung2, Masayoshi Teraguch1, and Naohiko Uramoto, “Easy-To-Use Programming Model for Web Services Security” 2007 IEEE Asia-Pacific Services Computing Conference.
Kassem Saleh and Maryam Habil, “The Security Requirements Behavior Model for Trustworthy Software” 2008 International MCETECH Conference on e-Technologies.
Kassem Saleh and Maryam Habil, “The Security Requirements Behavior Model for Trustworthy Software”, International MCETECH Conference on e-Technologies 2008 pp 235 - 238.
Janette Hicks, Madhusudhan Govindaraju, Weiyi Meng, “Enhancing Discovery of Web Services through Optimized Algorithms” IEEE International Conference on Granular Computing 2007 pp 685 - 698.
Colin Atkinson, Philipp Bostan, Oliver Hummel and Dietmar Stoll, “A Practical Approach to Web Service Discovery and Retrieval”, IEEE International Conference on Web Services (ICWS 2007).
Janette Hicks, Madhusudhan Govindaraju, Weiyi Meng, “Search Algorithms for Discovery of Web Services”, IEEE International Conference on Web Services (ICWS 2007).
Artem Vorobiev and Jun Han, “Specifying Dynamic Security Properties of Web Service Based Systems”, IEEE Computer Society 2006.
Jie Xu, Erica Y. Yang, and Keith H. Bennett, “A Practical Approach to Secure Web Services”, Proceedings of the Ninth IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing 2006.
Slim Trabelsi Jean-Christphe Pazzaglia Yves Roudier, “Secure Web service discovery: overcoming challenges of ubiquitous computing”, Proceedings of the European Conference on Web Services (ECOWS'06).
David Geer, “Taking Steps to Secure Web Services”, Technology News October 2003.
Michael N. Huhns and Duncan A. Buell, “Trusted Autonomy”, IEEE Internet Computing May-June 2002.
Tiantian Zhang, Junzhou Luo, Weining Kong “An Agent-based Web Service Searching Model”, 9th International Conference on Computer Supported Cooperative Work in Design Proceedings pp 390 - 295.
M. Shopov, N. Kakanakov , “Evaluation Of A Single Ws-Security Implementation”, Department Computer Systems, Technical University of Sofia, branch Plovdiv, Plovdiv 4000, 61 Sankt Petersburg Blvd.,
David Geer, “Taking Steps to Secure Web Services”,Technology News October 2003.
Bin Xu, Tao Li, Zhifeng Gu, Gang Wu “Quick Web Service Discovery and Composition in SEWSIP”, Proceedings of the 8th IEEE International Conference on E-Commerce Technology and the 3rd IEEE International Conference on Enterprise Computing, E-Commerce, and E-Services (CEC/EEE’06)
Garofalakis, J., Panagis, Y., Sakkopoulos, E., Tsakalidis, A., “Web Service Discovery Mechanisms: Looking for a Needle in a Haystack?”, International Workshop on Web Engineering, 2004.
Jeffrey R. Williams and George F. Jelen, “A Practical Approach to Measuring Assurance”, Document Number ATR 97043, Arca Systems, Inc., 23 April 1998.
Aabhas V. Paliwal, Nabil R. Adam, Hui Xiong, Christof Bornhövd “Web Service Discovery via Semantic Association Ranking and Hyperclique Pattern Discovery”, Proceedings of the 2006 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2006 Main Conference Proceedings)(WI'06).
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.