Lifecycle Metadata for Digital Objects October 18, 2004 Transfer / Authenticity Metadata.

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
An Introduction to Secure Sockets Layer (SSL). Overview Types of encryption SSL History Design Goals Protocol Problems Competing Technologies.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
Http Web Authentication Web authentication is used to verify a users identity before allowing access to certain web pages On web browsers you get a login.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
6/1/20151 Digital Signature and Public Key Infrastructure Course:COSC Instructor:Professor Anvari Student ID: Name:Xin Wen Date:11/25/00.
15-1 Last time Internet Application Security and Privacy Public-key encryption Integrity.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
Lesson 12 Cryptography for E-Commerce. Approaches to Network Security Separate Security Protocol--SSL Application-Specific Security--SHTTP Security with.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
Lecture III : Communication Security, Services & Mechanisms Internet Security: Principles & Practices John K. Zao, PhD SMIEEE National Chiao-Tung University.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Cryptographic Technologies
Encryption An Overview. Fundamental problems Internet traffic goes through many networks and routers Many of those networks are broadcast media Sniffing.
Chapter Extension 23 SSL/TLS and //https © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
Security on the Internet Jan Damsgaard Dept. of Informatics Copenhagen Business School
Web services security I
CAMP - June 4-6, Copyright Statement Copyright Robert J. Brentrup and Mark J. Franklin This work is the intellectual property of the authors.
E- Business Digital Signature Varna Free University Prof. Teodora Bakardjieva.
Overview of Digital Signatures Introduction To Networks and Communications (CS 555) Presented by Bharath Kongara.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Controller of Certifying Authorities PKI Technology - Role of CCA Assistant Controller (Technology) Controller of Certifying Authorities Ministry of Communications.
Secure Systems Research Group - FAU Patterns for Digital Signature using hashing Presented by Keiko Hashizume.
Security using Encryption Security Features Message Origin Authentication - verifying that the sender is who he or she says they are Content Integrity.
Cryptography 101 Frank Hecker
CSCI 6962: Server-side Design and Programming
Chapter 31 Network Security
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Cryptography Cryptography is a collection of mathematical techniques to ensure confidentiality of information Cryptography is a collection of mathematical.
MT311 Java Application Development and Programming Languages Li Tak Sing ( 李德成 )
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
Cryptography, Authentication and Digital Signatures
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
©The McGraw-Hill Companies, Inc., 2000© Adapted for use at JMU by Mohamed Aboutabl, 2003Mohamed Aboutabl1 1 Chapter 29 Internet Security.
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
Chapter 16 Security Introduction to CS 1 st Semester, 2012 Sanghyun Park.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
What is Digital Signature Building confidentiality and trust into networked transactions. Kishankant Yadav
Chapter 8 – Network Security Two main topics Cryptographic algorithms and mechanisms Firewalls Chapter may be hard to understand if you don’t have some.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Digital Signatures, Message Digest and Authentication Week-9.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
DIGITAL SIGNATURE.
Deck 10 Accounting Information Systems Romney and Steinbart Linda Batch March 2012.
Copyright 2004 MayneStay Consulting Group Ltd. - All Rights Reserved Jan-041 Security using Encryption Security Features Message Origin Authentication.
Lifecycle Metadata for Digital Objects October 9, 2002 Transfer / Authenticity Metadata.
April 20023CSG11 Electronic Commerce Authentication John Wordsworth Department of Computer Science The University of Reading Room.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
Encryption and Security Tools for IA Management Nick Hornick COSC 481 Spring 2007.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
The Secure Sockets Layer (SSL) Protocol
Unit 3 Section 6.4: Internet Security
Computer Communication & Networks
Secure Sockets Layer (SSL)
NET 311 Information Security
Pooja programmer,cse department
The Secure Sockets Layer (SSL) Protocol
Electronic Payment Security Technologies
National Trust Platform
Presentation transcript:

Lifecycle Metadata for Digital Objects October 18, 2004 Transfer / Authenticity Metadata

Review of metadata seen Creation metadata Appraisal, records management, scheduling Transfer / authenticity not really covered except in terms of the ingest process

Transferring paper records I Metaphor for electronic process Metadata generated throughout Records Center Storage Approval Form –Agency approval signature –Description of materials Initial steps are significant for: –Setting up for secure transfer –Defining required metadata to make sense of records in storage Approval Number received for transmission –This step embeds schedule metadata

Transferring paper records II This stage defines formatting for: –Wrapper –Materials inside Pack and label correctly (agreed standard) –Use proper boxes –Label with identifiers (RM descriptors) –Pack in original order and approved arrangement –Number boxes in batch –Stack correctly Transmittal Form for batch –“Digest” of contents (this step a “handshake”) –Generates metadata for the transfer itself Access Codes received for boxes

The central problem: Security guaranteeing Authenticity Guarding the object (authenticity, integrity) Proving the identities of the people responsible for transferring the object (authentication, non-repudiation) Transferring the object in a secure way

Completeness and the moment of “recordness” Assertion that the object is complete (cf. UBC) Assertion that it is an archivable object Assertion that the asserter has the authority to create the record or archive it All these assertions may be system-supplied in the digital environment: –user logins –user role ID –identity of the workstation on the network –Creator’s action in performing a save

What is transfer about? First: it is a COPY What is a digital copy? What qualifies? –Data compression issues –Data segmentation issues –Creating application vs file-management application How can a digital copy be guaranteed accurate? Compare with original –Digital object as string of bits –Message digest of object as math on the bits –Ship the message digest with the object –Recalculate and compare at the other end

Moving from user to repository Using the public network securely Sending from user to repository –Virtual Private Network (VPN) –Secure Sockets Layer (SSL) “Secure drop-box” technology –Separate “hardened” server (between “DMZ”s) –Only A can deposit, only B can withdraw Repository harvests objects from user’s drop- box

Proving the identity of the sender (Authentication I: Identity) Assymetrical encryption –Private/public keys: reverse purposes Private = used by one juridical person Public = used by many persons Digital signature –Calculate message digest –Use one of asymmetric key pair to transform If recipient’s public key, only recipient can decode (using own private key) If sender’s private key, only sender can have sent (proved by sender’s public key) –Use second of assymetric key pair to decrypt –Check message digest against message

Proving the identity of the sender (Authentication II: Non- repudiation) Certification (PKI, “XKI”) –Connecting keys with juridical persons: third party certificators –External or internal (PKI can be managed for internal business, e.g. a state) –Endurance over time: What does CA say? System permissions and activity –Data collected from system/network operations logs –Necessity for collecting as archival!

Authenticity of the object (Authentication III: Integrity) Object as open or secret: two issues –Must we disguise/encrypt the object? –Can we move it around in clear? (Cryptographic) Message Digest (MD5) –Creates single 32-digit number: “one-way hash” –Number will change with the slightest change in the object on which it was calculated –Insecure for encryption Encryption (Confidentiality) –Asymmetric (now dominant) –Symmetric (issues of exchanging keys)

Proving the identity of the receiver How is this done in the paper/physical case? –Locations –Signatures –Other signs and proofs How done in the digital case? –Digital signature –System permissions –Recorded as part of repository operations records

Documenting the actual transfer Time-stamps on the copy System logs of the underlying transmitting and receiving systems –Desktop Windows systems have system logs but they are still fairly primitive –Server logs can be exremely elaborate –Repository/digital library logs can be designed to any requirement

Verifying the transfer Quality control: compare with paper process Verifying the message digest Checking the object against the wrapper –Use metadata to make sure you have all of what was sent and in the proper format –This is the most fundamental process carried out during ingest

XML and digital signatures XML wrapper for a set of objects permits individual or multiple objects to be signed: “subtree signing” –Objects can potentially be signed by different people in workflow –Thus a born-digital XML-wrapped object may already contain several digital signatures from different sources May require verification and resigning as a single object by record-asserting entity before transfer

XML Signature 32-bit value here 32-bit value here info about key here

What is canonicalization? Two XML documents may differ in their entity structure, attribute ordering, and character encoding, because the standard doesn’t care But a valid XML document has a precise logical structure related to its DTD or schema, no matter how it looks or what order things are in Canonicalization means processing the XML file to a single standard form (as defined by W3C): see xml-c14n #Introhttp:// xml-c14n #Intro What does this mean for “authenticity”?