A Distributed Secure Mechanism for Resource Protection in a Digital Ecosystem Environment

The dynamic interaction and collaboration of the loosely coupled entities play a pivotal role for the successful implementation of a Digital Ecosystem environment. However, such interaction and collaboration can only be promoted when information and resources are effortlessly shared, accessed, and utilized by the interacting entities. A major requirement to promote an intensive sharing of resources is the ability to secure and uphold the confidentiality, integrity and non-repudiation of resources. This requirement is extremely important in particular when interactions with the unfamiliar entities occur frequently. In this paper, we present a distributed mechanism for improving resource protection in a Digital Ecosystem environment. This mechanism can be used not only for any secure and reliable transaction, but also for encouraging the collaborative efforts by the Digital Ecosystem community members to play a major role in securing the environment. Public Key Infrastructure is also employed to provide a strong protection for its access workflows.

[1]  Matthew MacDonald,et al.  Web Services Architecture , 2004 .

[2]  Rukshan Athauda,et al.  A community based authentication and authorisation mechanism for digital ecosystem , 2011, 5th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2011).

[3]  Gerard Briscoe,et al.  Digital Ecosystems: Evolving Service-Orientated Architectures , 2006, 2006 1st Bio-Inspired Models of Network, Information and Computing Systems.

[4]  Erick Cantú-Paz,et al.  A Survey of Parallel Genetic Algorithms , 2000 .

[5]  Tharam S. Dillon,et al.  Methodology framework for the design of digital ecosystems , 2007, 2007 IEEE International Conference on Systems, Man and Cybernetics.

[6]  William E. Johnston,et al.  Certificate-based Access Control for Widely Distributed Resources , 1999, USENIX Security Symposium.

[7]  Audretsch,et al.  The Digital Ecosystems Research Vision : 2010 and Beyond July , 2022 .

[8]  David M. Booth,et al.  Web Services Architecture , 2004 .

[9]  Rukshan Athauda,et al.  A Survey on the Security Requirements for a Successful Adoption of Digital Ecosystem Environment: (605222012-011) , 2011 .

[10]  Hristo Koshutanski,et al.  Distributed Identity Management Model for Digital Ecosystems , 2007, The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007).

[11]  Barbara Messing,et al.  An Introduction to MultiAgent Systems , 2002, Künstliche Intell..

[12]  F. Nachira,et al.  A Network of Digital Business Ecosystems for Europe : Roots , Processes and Perspectives , 2007 .

[13]  Gerard Briscoe,et al.  Digital Ecosystems , 2009, ArXiv.

[14]  Industrial Strategy Information security breaches survey , 2013 .

[15]  Philip R. Zimmermann,et al.  The official PGP user's guide , 1996 .

[16]  C. M. Sperberg-McQueen,et al.  Extensible Markup Language (XML) , 1997, World Wide Web J..

[17]  Ian T. Foster,et al.  A community authorization service for group collaboration , 2002, Proceedings Third International Workshop on Policies for Distributed Systems and Networks.

[18]  Li Ye-bai,et al.  Research and Implementation of Key Technology Based on Internet Encryption and Authentication , 2009, 2009 International Conference on Networking and Digital Society.

[19]  Joel Weise-Sunps,et al.  Public Key Infrastructure Overview , 2001 .

[20]  Wde Client-Server Architecture , 2008, Encyclopedia of Multimedia.

[21]  Rukshan Athauda,et al.  Distributed Mechanism for Protecting Resources in a Newly Emerged Digital Ecosystem Technology , 2011, ICA3PP.

[22]  Xin Tian,et al.  Study on Information Management and Security of E-commerce System , 2010, 2010 International Symposium on Intelligence Information Processing and Trusted Computing.

[23]  Habiba Drias,et al.  A secure e-transaction model for e-commerce , 2006, 2006 IEEE GCC Conference (GCC).

[24]  Rüdiger Schollmeier,et al.  A definition of peer-to-peer networking for the classification of peer-to-peer architectures and applications , 2001, Proceedings First International Conference on Peer-to-Peer Computing.

[25]  Steven Tuecke,et al.  An online credential repository for the Grid: MyProxy , 2001, Proceedings 10th IEEE International Symposium on High Performance Distributed Computing.

[26]  J.-M. Seigneur Demonstration of security through collaboration in the digital business ecosystem , 2005, Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005..

[27]  Thomas Grechenig,et al.  A joint infrastructure of “digital corporate organisms” as facilitator for a virtual digital retail ecosystem , 2010, 4th IEEE International Conference on Digital Ecosystems and Technologies.

[28]  Thomas Grechenig,et al.  A joint infrastructure of “digital corporate organisms” as facilitator for a virtual digital retail ecosystem , 2010 .

[29]  H. Boley,et al.  Digital Ecosystems: Principles and Semantics , 2007, 2007 Inaugural IEEE-IES Digital EcoSystems and Technologies Conference.

[30]  Joachim Stender,et al.  Parallel Genetic Algorithms: Theory and Applications , 1993 .

[31]  F. Nachira Towards a Network of Digital Business Ecosystems Fostering the Local Development , 2002 .

[32]  Michael Wooldridge,et al.  Introduction to multiagent systems , 2001 .