Location of Repository

XML Data Integrity Based on Concatenated Hash Function

By Baolong Liu, Joan Lu and Yau Jim Yip

Abstract

Data integrity is the fundamental for data authentication. A major problem for XML data authentication is that signed XML data can be copied to another document but still keep signature valid. This is caused by XML data integrity protecting. Through investigation, the paper discovered that besides data content integrity, XML data integrity should also protect element location information, and context referential integrity under fine-grained security situation. The aim of this paper is to propose a model for XML data integrity considering XML data features. The paper presents an XML data integrity model named as CSR (content integrity, structure integrity, context referential integrity) based on a concatenated hash function. XML data content integrity is ensured using an iterative hash process, structure integrity is protected by hashing an absolute path string from root node, and context referential integrity is ensured by protecting context-related elements. Presented XML data integrity model can satisfy integrity requirements under situation of fine-grained security, and compatible with XML signature. Through evaluation, the integrity model presented has a higher efficiency on digest value-generation than the Merkle hash tree-based integrity model for XML data

Topics: QA75
Publisher: International Journal of Computer Science and Information Security
Year: 2009
OAI identifier: oai:eprints.hud.ac.uk:4660

Suggested articles

Preview

Citations

  1. (1989). A Certified Digital Signature. doi
  2. (2005). A security architecture integrated co-operative engineering platform for organised model exchange in a Digital Factory environment, doi
  3. (2004). Authorisation and access control for electronic health record systems, doi
  4. (2007). Case Notes from a Vulnerability Assessment of a Bank's Web Services,
  5. (2004). Confidentiality of XML documents by pool encryption, Unpublished PhD thesis,
  6. (2008). Data integrity. Available at: http://publib.boulder.ibm.com/infocenter/tpfhelp/current/index.jsp?topi c=/com.ibm.ztpf-ztpfdf.doc_put.cur/gtps5/s5dint.html
  7. (2004). Design of a secure fine-grained official document exchange model for e-government, doi
  8. (2002). E-commerce security measures: are they worth it?, doi
  9. (2001). Flexible authentication of XML documents. doi
  10. (2009). Jim XML Data Integrity Based on Concatenated Hash Function Original Citation Liu,
  11. (2004). Maintaining the integrity of XML signatures by using the Manifest element, doi
  12. (2004). Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions. doi
  13. (2003). On the Cost of Authenticated Data Structures. In doi
  14. (2002). Public key infrastructure in mobile system, doi
  15. (2007). Research on XML United-Signature Technology and Its Implementation. doi
  16. (2005). Securing XML data in third-party distribution systems, doi
  17. (2008). Security in grid computing: A review and synthesis. doi
  18. (2005). Security in XML-based financial reporting services on the Internet, doi
  19. (2006). Security on MASs with XML Security Specifications. doi
  20. (2005). Security-enabled code deployment for heterogeneous networks, doi
  21. (2004). Selective and authentic third-party distribution of XML documents. doi
  22. (2000). Trust requirement in ebusiness, doi
  23. (2008). XML security – A comparative literature review, doi
  24. (2005). XML signature element wrapping attacks and countermeasures. in: doi
  25. (2008). XML signature syntax and processing, Available at: http://www.w3.org/TR/xmldsigcore/
  26. (2008). XML-Signature Requirements, Available at: http://www.w3.org/TR/xmldsig-requirements

To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.