his.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Using security protocols to extend the FiLDB architecture
University of Skövde, Department of Computer Science.
2002 (English)Independent thesis Basic level (degree of Bachelor)Student thesis
Abstract [en]

With the escalating growth of e-commerce in today’s society, many e-commerce sites have emerged that offer products on the Internet. To be able to verify orders from customers, some sites require sensitive information from their customers such as credit card details that is stored in their databases. The security of these sites has become the concern of many and it is a common opinion among the public that such sites cannot be trusted.

The FiLDB architecture presents an interesting approach for increasing the security of Internet connected databases. This approach is, in short, based on firewall protection; one external firewall protecting an external network, which in turn is connected to an internal network, which was protected by a internal firewall. A database is kept on each network. There are however few issues that are unsolved in the FiLDB architecture. One of them and the problem that is covered in this report is how a user could securely insert, modify and fetch sensitive data into the internal database which stores the sensitive data.

In this work a few selected cryptographic protocols are studied by evaluating them with respect to five security criteria: confidentiality, authentication, integrity, key management and nonrepudiation. The initial selection of cryptographic protocols is mainly based on applicability in e-commerce systems. Based on the evaluation, one of the protocols is chosen to be implemented with the FiLDB architecture and then the extended architecture was evaluated.

This project shows that, by integrating a security protocol into architectures such as the FiLDB, the security of the system can be increased substantially.

Place, publisher, year, edition, pages
Skövde: Institutionen för datavetenskap , 2002. , 58 p.
Keyword [en]
FiLDB architecture, Security, Cryptographic protocols
National Category
Information Science
Identifiers
URN: urn:nbn:se:his:diva-640OAI: oai:DiVA.org:his-640DiVA: diva2:3033
Presentation
(English)
Uppsok

Supervisors
Available from: 2008-01-30 Created: 2008-01-30 Last updated: 2009-09-28

Open Access in DiVA

fulltext(5587 kB)150 downloads
File information
File name FULLTEXT01.psFile size 5587 kBChecksum SHA-1
bfd57d519fa9192a913a576a00f2cfa5d112948680faf74a27533032c4f2b29dd3ee5518
Type fulltextMimetype application/postscript

By organisation
Department of Computer Science
Information Science

Search outside of DiVA

GoogleGoogle Scholar
Total: 150 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

Total: 104 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf