Secure Jini Service Architecture Providing Ubiquitous Services Having Persistent States

ABSTRACT The ubiquitous service environment is poor in reliability of connection and also has a high probability that the intrusion against a system and the failure of the services may happen. Therefore, It is very important to guarantee that the legitimate users make use of trustable services from the viewpoint of security without discontinuance or obstacle of the services. In this paper, we point out the problems in the standard Jini service environment and analyze the Jgroup/ARM framework that has been developed in order to help fault tolerance of Jini services. In addition, we propose a secure Jini service architecture to satisfy the security, availability and quality of services on the basis of the analysis. The secure Jini service architecture we propose in this paper is able to protect a Jini system not only from faults such as network partition or server crash, but also from attacks exploiting flaws. It provides security mechanism for dynamic trust establishment among the service entities. Moreover, our secure Jini service architecture does not incur high computation costs to merge the user service states because of allocation of the replica based on each session of a user. Through the experiment on a test-bed, we have confirmed that proposed secure Jini service architecture is able to guarantee the persistence of the user service states at the level that the degradation of services quality is ignorable.Key Words:Service Survivability, Jini, Ubiquitous Computing, Security

[1]  Simin Nadjm-Tehrani,et al.  Middleware Support for Fault Tolerance , 2005 .

[2]  Leslie Lamport,et al.  Reaching Agreement in the Presence of Faults , 1980, JACM.

[3]  Lorenz Froihofer,et al.  Using Replication to Build Highly Available .NET Applications , 2006, 17th International Workshop on Database and Expert Systems Applications (DEXA'06).

[4]  Bjarne E. Helvik,et al.  Jgroup/ARM: A Distributed Object Group Platform with Autonomous Replication Management for Dependable Computing , 2008 .

[5]  Karl N. Levitt,et al.  The design and implementation of an intrusion tolerant system , 2002, Proceedings International Conference on Dependable Systems and Networks.

[6]  Hannes Federrath,et al.  Making Jini Secure , 2001 .

[7]  Pekka Nikander,et al.  Decentralized Jini Security , 2001, NDSS.

[8]  Hein Meling,et al.  Performance consequences of inconsistent client-side membership information in the open group model , 2004, IEEE International Conference on Performance, Computing, and Communications, 2004.

[9]  Feiyi Wang,et al.  SITAR: a scalable intrusion-tolerant architecture for distributed services , 2003, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].

[10]  Heine Kolltveit,et al.  Preventing Orphan Requests by Integrating Replication and Transactions , 2007, ADBIS.

[11]  Peer Hasselmeyer,et al.  Trade-offs in a Secure Jini Service Architecture , 2000, USM.

[12]  Yongdae Kim,et al.  Secure Group Communication Using Robust Contributory Key Agreement , 2001 .

[13]  Sung Ki Kim,et al.  Committing Secure Results with Replicated Servers , 2004, ICCSA.