Title :
Bandwidth efficient tamper detection for distributed Java systems
Author :
Jochen, Mike ; Marvel, Lisa ; Pollock, Lori L.
Author_Institution :
Delaware Univ., Newark, DE, USA
Abstract :
The benefits of distributed computation present complex security considerations beyond those associated with the traditional computing paradigm. This paper describes a bandwidth efficient approach to authenticate distributed Java code. Our system utilizes steganographic techniques to embed a cryptographic checksum as a tamper detection mark into Java class files. The properties of this mark make our system desirable in applications where low bandwidth utilization is a requirement (e.g., wireless networks and low power devices). We implemented our system in Java and evaluated its performance through an empirical study. The analysis indicates that our system detects any degree of alteration to a marked Java class file and can do so within a reasonable amount of time.
Keywords :
cryptography; distributed processing; object-oriented programming; Java class files; authentication; cryptographic checksum; distributed Java systems; low bandwidth utilization; security; steganographic techniques; tamper detection; Bandwidth; Collaboration; Cryptography; Distributed computing; Java; Military computing; Security; Steganography; Time division multiplexing; Wireless networks;
Conference_Titel :
High Performance Computing Systems and Applications, 2002. Proceedings. 16th Annual International Symposium on
Print_ISBN :
0-7695-1626-2
DOI :
10.1109/HPCSA.2002.1019165