An efficient software-based security acceleration methods for open LBS services

Location-based services refers to value-added service by processing information utilizing mobile user location. With the rapidly increasing wireless Internet subscribers and world LBS market, the various location based applications are introduced such as buddy finder, proximity and security services. As the killer application of the wireless Internet, the LBS has reconsidered technology about location determination technology, LBS middleware server for various application, and diverse contents processing technology. However, there are fears that this new wealth of personal location information will lead to new security risks, and invasion of the privacy of people and organizations. In this paper, we suggest security acceleration methods for fast open LBS using XML signcryption mechanism. And proposed secure LBS security protocols allows a client to offload mobile certificate handling to the server and to enable the central administration of privacy policies. The idea is to create a signcryption technique for software based XML signature acceleration.

[1]  Nam-Je Park,et al.  XML Key Information System for Secure e-Trading , 2003 .

[2]  Marco Prandini,et al.  A novel approach to on-line status authentication of public-key certificates , 2000, Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00).

[3]  Jeongho Lee,et al.  A Scalable Structure for a Multiplier and an Inversion Unit in GF(2m) , 2003 .

[4]  Satoshi Hada,et al.  Towards the integration of Web services security on enterprise environments , 2002, Proceedings 2002 Symposium on Applications and the Internet (SAINT) Workshops.

[5]  James Won-Ki Hong,et al.  XML‐Based Network Management for IP Networks , 2003 .

[6]  Moni Naor,et al.  Certificate revocation and certificate update , 1998, IEEE Journal on Selected Areas in Communications.

[7]  Jose L. Muñoz,et al.  Using OCSP to Secure Certificate-Using Transactions in M-commerce , 2003, ACNS.

[8]  A. Selkirk Using XML Security Mechanisms , 2001 .

[9]  Byung-Han Ryu,et al.  An Efficient Two-Step Paging Strategy Using Base Station Paging Agents in Mobile Communication Networks , 2004 .

[10]  Jochen Schiller,et al.  Location Based Services , 2004 .

[11]  Miika Tuisku,et al.  Wireless Java-Enabled MIDP Devices as Peers in a Grid Infrastructure , 2003, European Across Grids Conference.

[12]  Steve Hanna,et al.  Building Certifications Paths: Forward vs. Reverse , 2001, NDSS.

[13]  Sung-Min Lee,et al.  TY*SecureWS: An Integrated Web Service Security Solution Based on Java , 2003, EC-Web.

[14]  Marco Prandini Efficient certificate status handling within PKIs: an application to public administration services , 1999, Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99).

[15]  Yuliang Zheng,et al.  Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.

[16]  Scott Kirkpatrick,et al.  Location Based Services Location Based Services , 2005 .

[17]  Russ Housley,et al.  Delegated Path Validation and Delegated Path Discovery Protocol Requirements , 2001, RFC.

[18]  Joonsang Baek,et al.  Formal Proofs for the Security of Signcryption , 2002, Journal of Cryptology.

[19]  Ji-Hoon Kang,et al.  A Gateway and Framework for Telematics Systems Independent on Mobile Networks , 2005 .