Abstract
A mediator helps a client of a distributed information system to acquire data without contacting each datasource. We show how mobile code can be used to ensure confidentiality of data in a secure mediation system. We analyze what advantages mobile code has over mobile data for secure mediation. We present a Java implementation of a system that mediates SQL queries. Security risks for the client and the mobile code are delineated; offending the integrity of its own data is identified as a special type of attack of mobile code in a mediation system. We name appropriate countermeasures and describe the amount of trust needed in our system. As an extension, we consider security in a hierarchy of mediators. Finally, we combine mobile code with mobile agent technology.
This work was funded by the German Research Council (DFG) under grant number BI 311/11-1.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Algesheimer, J., Cachin, C., Camenisch, J., Karjoth, G.: Cryptographic security for mobile code. In: SP 2001: Proceedings of the IEEE Symposium on Security and Privacy 2001, pp. 2–11. IEEE Computer Society Press, Los Alamitos (2001)
Altenschmidt, C., Biskup, J., Flegel, U., Karabulut, Y.: Secure mediation: Requirements, design and architecture. Journal of Computer Security 11(3), 365–398 (2003)
Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S., Yang, K.: On the (Im)possibility of Obfuscating Programs. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 1–19. Springer, Heidelberg (2001)
The Legion of the Bouncy Castle, http://www.bouncycastle.org/
Fong, P.W.L.: Proof Linking: A Modular Verification Architecture for Mobile Code Systems. Phd thesis, Simon Fraser University, Burnaby, Canada (January 2004), See, http://www.cs.sfu.ca/research/publications/theses/
Karjoth, G., Asokan, N., Gülcü, C.: Protecting the Computation Results of Free-Roaming Agents. In: Rothermel, K., Hohl, F. (eds.) MA 1998. LNCS, vol. 1477, pp. 195–207. Springer, Heidelberg (1998)
Karjoth, G., Lange, D.B., Oshima, M.: A Security Model for Aglets. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 188–205. Springer, Heidelberg (1998)
Loureiro, S., Molva, R., Roudier, Y.: Mobile code security. In: Proceedings of ISYPAR’2000 (4ème Ecole d’Informatique des Systèmes Parallèles et Répartis), Toulouse, France, pp. 95–103 (2000)
Necula, G.C., Lee, P.: Safe, Untrusted Agents Using Proof-Carrying Code. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 61–91. Springer, Heidelberg (1998)
Peine, H.: Run-Time Support for Mobile Code. Dissertation, Universität Kaiserslautern, Fachbereich Informatik (October 2002)
Rivest, R.L., Adleman, L., Dertouzos, M.L.: On data banks and privacy homomorphisms. Foundations of Secure Computation, 169–179 (1978)
Sander, T., Tschudin, C.F.: Protecting Mobile Agents Against Malicious Hosts. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 44–60. Springer, Heidelberg (1998)
Wiederhold, G.: Mediators in the architecture of future information systems. IEEE Computer 25(3), 38–49 (1992)
Wiederhold, G., Genesereth, M.: The conceptual basis for mediation services. IEEE Expert Intelligent Systems and their Applications 12(5), 38–47 (1997)
Wiese, L.: Mediator with mobile code support, http://ls6-www.cs.uni-dortmund.de/issi/projects/DFG_Kompositionalitaet/mobilecode.html.en
Wiese, L.: Sichere Mediation mit mobilem Code – Implementierung und Sicherheitsanalyse. Diploma thesis (in German), Universität Dortmund, Dortmund, Germany (October 2004), http://ls6-www.cs.uni-dortmund.de/issi/archive/literature/2004/Wiese_2004.pdf
Yee, B., Tygar, J.D.: Secure coprocessors in electronic commerce applications. In: Proceedings of the First USENIX Workshop of Electronic Commerce, Berkeley, CA, USA, pp. 155–170. USENIX Assoc. (1995)
Young, A., Yung, M.: Malicious Cryptography – Exposing Cryptovirology. Wiley, Indianapolis (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 IFIP International Federation for Information Processing
About this paper
Cite this paper
Biskup, J., Sprick, B., Wiese, L. (2005). Secure Mediation with Mobile Code. In: Jajodia, S., Wijesekera, D. (eds) Data and Applications Security XIX. DBSec 2005. Lecture Notes in Computer Science, vol 3654. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11535706_20
Download citation
DOI: https://doi.org/10.1007/11535706_20
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28138-2
Online ISBN: 978-3-540-31937-5
eBook Packages: Computer ScienceComputer Science (R0)