Virtual private laboratories: concept and two building blocks

We are facing globalization of R&D activities over networks involving different branches, companies, and organizations. These activities can be helped a lot by the Internet. However, we have to be careful about security problems associated with such activities. The purpose of this paper is to identify the security problems and introduce the total system as a new concept: virtual private laboratories (VPLs). Some of the identified problems are trivial but others are not; the former can be solved by a direct use of existing cryptographic primitives and protocols, whereas the latter needs new technologies and theories. Although all of them are necessary for VPLs, this paper is focused on two nontrivial building blocks and a theory: (1) academic database with multiple security functions, (2) data hiding for the purpose of entrusted data analysis, and (3) risk-management theory for digital objects secured by applied cryptography. In particular, (2) is studied in detail and difference from conventional data-hiding is shown with respect to evaluation criteria.

[1]  Angelos D. Keromytis,et al.  Implementing IPsec , 1997, GLOBECOM 97. IEEE Global Telecommunications Conference. Conference Record.

[2]  Kanta Matsuura,et al.  Digital Security Tokens and Their Derivatives , 2003 .

[3]  Stephen T. Kent,et al.  Security Architecture for the Internet Protocol , 1998, RFC.

[4]  Hideki Imai,et al.  Protection of Authenticated Key-Agreement Protocol against a Denial-of-Service Attack , 1998 .

[5]  Sushil Jajodia,et al.  Provisional Authorizations , 2001, E-Commerce Security and Privacy.

[6]  Kanta Matsuura,et al.  A Derivative of Digital Objects and Estimation of Default Risks in Electronic Commerce , 2001, ICICS.

[7]  Kazuo Ohta,et al.  Disposable Zero-Knowledge Authentications and Their Applications to Untraceable Electronic Cash , 1989, CRYPTO.

[8]  W.A. Arbaugh,et al.  Security for Virtual Private Intranets , 1998, Computer.

[9]  Scott Hamilton E-Commerce for the 21st Century , 1997, Computer.

[10]  Kenneth R. Iversen A Cryptographic Scheme for Computerized Elections , 1991, CRYPTO.

[11]  Jennifer C. Davis Protecting intellectual property in cyberspace , 1998, IEEE Technol. Soc. Mag..

[12]  Patrick W. Dowd,et al.  Network Security: It's Time to Take It Seriously (Guest Editors' Introduction) , 1998, Computer.

[13]  Stephan Katzenbeisser,et al.  Information Hiding Techniques for Steganography and Digital Watermaking , 1999 .

[14]  Michael K. Reiter,et al.  Resilient Authentication Using Path Independence , 1998, IEEE Trans. Computers.

[15]  Christopher Allen,et al.  The TLS Protocol Version 1.0 , 1999, RFC.

[16]  Hugo Krawczyk,et al.  A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..

[17]  R. Leahy,et al.  On the design of maximally sparse beamforming arrays , 1991 .

[18]  F. Black,et al.  The Pricing of Options and Corporate Liabilities , 1973, Journal of Political Economy.

[19]  David Chaum,et al.  'Minting' electronic cash , 1997 .

[20]  Randall J. Atkinson,et al.  IP Encapsulating Security Payload (ESP) , 1995, RFC.

[21]  Bruce Schneier,et al.  Secure audit logs to support computer forensics , 1999, TSEC.

[22]  K. Matsuura,et al.  Selective minimum-norm solution of the biomagnetic inverse problem , 1995, IEEE Transactions on Biomedical Engineering.

[23]  Hideki Imai,et al.  Modified Aggressive Mode of Internet Key Exchange Resistant against Denial-of-Service Attacks , 2000 .

[24]  Michael K. Reiter,et al.  Authentication metric analysis and design , 1999, TSEC.