A Study on Internet Service Security
碩士 === 朝陽大學 === 資訊管理系碩士班 === 88 === Today, the Internet is used to a wide range in business. electronic commerce is not a futuristic dream. There are everal success applications to provide services over the Internet, uch as user authentication, electronic payments, electronic Auction, and electronic...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
2000
|
Online Access: | http://ndltd.ncl.edu.tw/handle/46492995236808562145 |
id |
ndltd-TW-088CYUT0396005 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-088CYUT03960052015-10-13T11:53:30Z http://ndltd.ncl.edu.tw/handle/46492995236808562145 A Study on Internet Service Security 網路服務安全之研究 Iuon-Chang Lin 林詠章 碩士 朝陽大學 資訊管理系碩士班 88 Today, the Internet is used to a wide range in business. electronic commerce is not a futuristic dream. There are everal success applications to provide services over the Internet, uch as user authentication, electronic payments, electronic Auction, and electronic voting, etc. However, the Internet services are still not mature for the security reason. Since digital data can be intercepted and altered easily in open network, it requires some protections to ensure the information security. In generally, these Internet services have to satisfy the following security requirements: confidentiality, authentication, integrity, and non-repudiation. Except the four security requirements, different Internet services have ifferent requirements. In this study, we first discuss the haracteristics and requirements for the three Internet services: user authentication, electronic payment, and electronic auction services. Then, we survey the related works for the three different Internet services. Furthermore, We anticipate using information security techniques and cryptography to propose some secure and efficient methods in the three subjects. For the first subject -- user authentication. Conventional user authentication schemes allow a server to authenticate the legitimacy of a remote login user. However, these schemes are not suitable for multi-server architecture environment. In this study, we propose a remote password authentication scheme for multi-servers architecture using smart card. In this scheme, users can freely choose their password and can not remember different login password for various servers. Besides, the proposed scheme can withstand the replay attacks. Furthermore, the systems need not to maintain any verification table and can delete a legal user from the system easily. For the second subject -- micro-payments. We proposed a post-paid micro-payment scheme. Different with other post-paid micro-payments schemes, the merchant can verify the payment message off-line. Furthermore, the scheme can prevent of duplicate spending and protect the integrity of transaction message. Except the message authenticate code (MAC) technique, the scheme does not require any complexity computations. Therefore, the micro-payment scheme is easy to implement. For the third subject electronic auction. We add a timestamp to improve the robustness of Subramanian''s electronic auction scheme. The proposed scheme can prevent the sensitive information from being revealed by the auction house, and solve the resolution of two or more bidders offering the same price. Min-Shiang Hwang 黃明祥 2000 學位論文 ; thesis 82 en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 朝陽大學 === 資訊管理系碩士班 === 88 === Today, the Internet is used to a wide range in business. electronic commerce is not a futuristic dream. There are everal success applications to provide services over the Internet, uch as user authentication, electronic payments, electronic Auction, and electronic voting, etc. However, the Internet services are still not mature for the security reason. Since digital data can be intercepted and altered easily in open network, it requires some protections to ensure the information security. In generally, these Internet services have to satisfy the following security requirements: confidentiality, authentication, integrity, and non-repudiation. Except the four security requirements, different Internet services have ifferent
requirements. In this study, we first discuss the haracteristics
and requirements for the three Internet services: user authentication, electronic payment, and electronic auction services. Then, we survey the related works for the three
different Internet services. Furthermore, We anticipate using information security techniques and cryptography to propose some secure and efficient methods in the three subjects.
For the first subject -- user authentication. Conventional user authentication schemes allow a server to authenticate the legitimacy of a remote login user. However, these schemes are not suitable for multi-server architecture environment. In this study, we propose a remote password authentication scheme for multi-servers architecture using smart card. In this scheme, users can freely choose their password and can not remember
different login password for various servers. Besides, the proposed scheme can withstand the replay attacks. Furthermore, the systems need not to maintain any verification table and can delete a legal user from the system easily. For the second subject -- micro-payments. We proposed a post-paid micro-payment scheme. Different with other post-paid micro-payments
schemes, the merchant can verify the payment message off-line.
Furthermore, the scheme can prevent of duplicate spending and
protect the integrity of transaction message. Except the message
authenticate code (MAC) technique, the scheme does not require any complexity computations. Therefore, the micro-payment scheme is easy to implement. For the third subject electronic auction. We add a timestamp to improve the robustness of Subramanian''s electronic auction scheme. The proposed scheme can prevent the sensitive information from being revealed by the auction house, and solve the resolution of two or more bidders offering the same price.
|
author2 |
Min-Shiang Hwang |
author_facet |
Min-Shiang Hwang Iuon-Chang Lin 林詠章 |
author |
Iuon-Chang Lin 林詠章 |
spellingShingle |
Iuon-Chang Lin 林詠章 A Study on Internet Service Security |
author_sort |
Iuon-Chang Lin |
title |
A Study on Internet Service Security |
title_short |
A Study on Internet Service Security |
title_full |
A Study on Internet Service Security |
title_fullStr |
A Study on Internet Service Security |
title_full_unstemmed |
A Study on Internet Service Security |
title_sort |
study on internet service security |
publishDate |
2000 |
url |
http://ndltd.ncl.edu.tw/handle/46492995236808562145 |
work_keys_str_mv |
AT iuonchanglin astudyoninternetservicesecurity AT línyǒngzhāng astudyoninternetservicesecurity AT iuonchanglin wǎnglùfúwùānquánzhīyánjiū AT línyǒngzhāng wǎnglùfúwùānquánzhīyánjiū AT iuonchanglin studyoninternetservicesecurity AT línyǒngzhāng studyoninternetservicesecurity |
_version_ |
1716849657213091840 |