www.iaset.us editor@iaset.us
ENCRYPTED SIGNATURE SCHEME FOR SECURE & SELECTIVE DISSEMINATION OF
TREE STRUCTURED DATA (XML)
VIVEK N. WAGHMARE
1
& RAVINDRA C. THOOL
2
1
Research Scholar, S.G.G.S.I.E & T, S.R.T.M University, Nanded, Maharashtra, India
2
Professor & Head (IT), S.G.G.S.I.E & T, S.R.T.M University, Nanded, Maharashtra, India
ABSTRACT
Most of the data represent on web is hierarchical data structure. The main problem of tree structured data is that,
to secure and making it available in efficient manner both in internal & external level. Dissemination of data address the
issues if verified integrity of data without any leakage and selective and secure distribution of data in network
In proposed approach, Encrypted Signature Scheme binds as well as hides the information. Encrypted Post Order
Numbering (EPON) overcomes the vulnerabilities of Post Order Numbering (PON). It is based on the structure of tree, as
defined by post order tree traversal technique. It uses a randomized notion and Order Preserving Encryption Scheme
(OPES) of such traversal numbers. This technique not only prevents the information leakage, but also provides better
security for tree structured data.
KEYWORDS: Confidentiality, Epon, Integrity, Pon, Opes, Vulnerability
INTRODUCTION
An XML (Extensible Markup Language) has become the standard document for inter change language on the
web. XML document contain information of different sensitivity degrees that must be shared by possible large number of
user. Data sharing among multiple parties require both data integrity & data confidentiality [9]. Data that a consumer is not
authorized to access, but belongs to the complete data set is called extraneous data. Sending of extraneous data to a
consumer may leak in information, even if the data is encrypted. In general, the extraneous data is prone to off-line
dictionary attacks even by a legitimate consumer that can exploit contextual knowledge from the data elements it has
access to. Therefore, it is most important to remove, the extraneous data, even if the contents are encrypted with keys that
the consumer does not have, before its delivery.
Efficiency and scalability must however be provided by assuring at the same time security of contents and privacy
of the parties acquiring and disseminating contents [3]. It is not useful to provide high-bandwidth content distribution
systems if the integrity of disseminated contents are not as sure or the property of the contents not protected [11].
Such problems are further complicated when dealing with contents encoded in XML, because of the hierarchical
organization of the contents of tree structure data, different confidentiality as well as integrity requirements may exist for
different portions of the same content [4] [14]. Thus, which leads to need of dissemination approach to XML that,
addresses the issues of security, privacy and scalability in a holistic manner [2]. The structural properties are also
contributed towards the efficient and scalable dissemination framework. This solution is based on the simple notion of
encrypted Post Order Numbering [1] and its properties. A key feature of this approach is that it directly takes into account
International Journal of Computer Science
and Engineering (IJCSE)
ISSN(P): 2278-9960; ISSN(E): 2278-9979
Vol. 3, Issue 3, May 2014, 31-40
© IASET