DocumentCode :
2651053
Title :
The secure model for enterprise connectivity
Author :
Makki, Kia ; Pissinou, Niki ; Bambawale, Sujeet
Author_Institution :
Center for Telecommun. Studies, Louisiana Univ., Lafayette, LA, USA
fYear :
2000
fDate :
2000
Firstpage :
176
Lastpage :
182
Abstract :
The need for implementing data security over enterprise networks has been brought to the forefront of the e-commerce marketplace by an increasing number of incidents where confidential data is compromised or private information is abused by electronic intruders. The importance of data that is being stored, distributed and processed over the network medium has led to a strong focus on the security of the data, and the security of systems that contain and distribute it. The object of this new prototype is an alternative mode of enforcing security on enterprise networks by using algorithms aimed at data fragmentation rather than encryption. While encryption provides a means for scrambling data through the use of complex algorithms, this model proposes a mechanism for fragmenting the data stream in a way that reconstruction is possible only within a zone deemed safe by the implementation process. By binding the reconstruction process to a logical location within the safe area, it is possible to enforce a high level of safety around the entire data link process. The compromise of all data fragments would not allow reconstruction into the original form without the necessary complementary reconstruction algorithm. As another layer of security, the reconstruction algorithm would allow execution only from a predefined logical location on the enterprise domain, and would thus be rendered useless if executed from an intruder´s location. This system ensures that the overhead involved with imposing higher encryption strengths is bypassed without loss of the security enforced over the system
Keywords :
business communication; cryptography; data privacy; electronic commerce; security of data; telecommunication security; complementary reconstruction algorithm; compromised confidential data; data fragmentation; data link process; data security; data security implementation; e-commerce marketplace; electronic intruders; encryption; enterprise connectivity; enterprise domain; enterprise networks; fault tolerance; intruder location; logical location; private information; reconstruction process; safe area; secure model; system security; Collaboration; Computer networks; Consumer electronics; Cryptography; Data security; Electronic commerce; Information security; Internetworking; Reconstruction algorithms; Telecommunication computing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Communications and Networks, 2000. Proceedings. Ninth International Conference on
Conference_Location :
Las Vegas, NV
ISSN :
1095-2055
Print_ISBN :
0-7803-6494-5
Type :
conf
DOI :
10.1109/ICCCN.2000.885488
Filename :
885488
Link To Document :
بازگشت