Research on the Security Technology of Mobile Communication Information

Article Preview

Abstract:

This article presents a new solution of mobile and portable electronically published content protection which using function area and algorithm to ensure the mobile storage media security and secure authentication protocols to protect communication between data in storage media and document server, on condition that no security system installed on the target computer, the theft of mobile storage media, and key stolen when user access to the documents etc. To facilitate the communication between inside and outside of enterprise, while at the same time guarantee the authorization of confidential message, an information protection proxy-based system and method to authorize the confidential message is provided. User sends its message for outside receiver to his/her approver, and approver check the message and send the message to proxy if he/she agrees. The information protection system is based on a hash chain-based authorization protocol. The information protection proxy can prevent enterprise users from sending confidential involved messages to outside without approval, and at the same time audit the whole information authorization process. The authorization procedure is based on peer to peer mode and the proxy overhead is very low, and can also be used in mobile internet applications.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2736-2739

Citation:

Online since:

November 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Jovan Dj. Golic. Cryptanalysis of Alleged A5 Stream Cipher. International Conference on the Theory and Application of Cryptographic Techniques Konstanz, Germany, 2007: 239-255.

Google Scholar

[2] A Armando, D Basin, Y Boichut, The AVI SPA Tool for the Automated Validation of Internet Security Protocols and Applications. Lecture Notes in Computer Science, 2005, 3576: 135-165.

Google Scholar

[3] Sameer Hasan Al-Bakri, M L Mat Kiah, A A Zaidan, Securing peer-to-peer mobile communications using public key cryptography: New security strategy. International Journal of the Physical Sciences, 2011, 6(4): 930-938.

Google Scholar

[4] Mariantonietta La Polla, Fabio Martinelli, and Daniele Sgandurra. A Survey on Security for Mobile Devices. Communications Surveys & Tutorials, 2012, 09: 1-26.

DOI: 10.1109/surv.2012.013012.00028

Google Scholar