Merkle Tree Authentication in UDDI Registries

UDDI registries are today the standard way of publishing information on Web services. They can be thought of as a structured repository of information that can be queried by clients to find the Web services that better fit their needs. Even if, at the beginning, UDDI has been mainly conceived as a public registry without specific facilities for security, today security issues are becoming more and more crucial, due to the fact that data published in UDDI registries may be highly strategic and sensitive. In this paper, we focus on authenticity issues by proposing a method based on Merkle Hash Trees, which does not require the party managing the UDDI to be trusted with authenticity. In the paper, besides giving all the details of the proposed solution, we show its benefit with standard digital signature techniques.

[1]  Ralph C. Merkle,et al.  A Certified Digital Signature , 1989, CRYPTO.

[2]  Elisa Bertino,et al.  Indexing Techniques for Advanced Database Systems , 1997, The Springer International Series on Advances in Database Systems.

[3]  Elisa Bertino,et al.  Selective and authentic third-party distribution of XML documents , 2004, IEEE Transactions on Knowledge and Data Engineering.

[4]  Hanifa Shah,et al.  ASKARI: A Crime Text Mining Approach , 2006 .

[5]  D. Box,et al.  Simple object access protocol (SOAP) 1.1 , 2000 .

[6]  Elisa Bertino,et al.  Intelligent Database Systems , 2000 .

[7]  Elisa Bertino,et al.  Object-Oriented Database Systems: Concepts and Architectures , 1993 .

[8]  Ping Pan,et al.  Internet Engineering Task Force , 1995 .

[9]  Michael Wiener,et al.  Advances in Cryptology — CRYPTO’ 99 , 1999 .

[10]  Michael Gertz,et al.  Authentic Third-party Data Publication , 2000, DBSec.

[11]  Moni Naor,et al.  Certificate revocation and certificate update , 1998, IEEE Journal on Selected Areas in Communications.

[12]  Francisco Curbera,et al.  Web services description language (wsdl) version 1. 2 , 2001 .