Академический Документы
Профессиональный Документы
Культура Документы
I n the recent years, with the development of wireless the authenticating the route of the source of the origin of the
communication technologies and easy access to mobile certificates in Section 2, In Section 3 we would put together
Internet, e-commerce industry is gaining prominence. In any the requirements for authenticating the certificates in the cloud
form of the e-transactions or in the e-commerce business with for e-transactions, In section 4 we would describe the
no frontal transactions security becomes a prime concern workflow in detail.
among the users. Usually in the cases of online money and
macro transactions require robust security in place [5], and to II. BACKGROUNDS AND RELATED WORK
tackle these security issues wireless communicating devices The proposed method supports and facilitates security
are adapting to use the certificates, TSL, SSL and Public Key services like AAA- authentication, authorization and
Infrastructure to have a robust security in place for such accounting, data confidentiality and integrity which are
transactions [6]. Hence to make sure the robustness of the basically based in the right combination of the public/private
security feature authenticating the source of origin of these key pairs. The public key of the key pair is allocated in the
certificates become prime concern to have a secure e- form of a public key certificate but making use of appropriate
transactions. However the devices such as mobile phones algorithms and could be use to authenticate the digital
which are very commonly used these days to make e- signatures and encrypt data. It is obvious that before one could
transactions have very limited processors, memory and battery make use of a certificate, one should verify the certificate and
backup, so there arise a need for using a dedicated servers to the source of the certificate has to be verified and validated. In
facilitate the task of validating and authenticating the source of order to check the correctness of the origin of the certificate,
the origin of certificates also the telecom service providers chaining a series of certificate and then establishing the path to
should also be comfortable to afford those process and the origin of the certificate must be established, and then every
authenticate those requests irrespective of the location from other certificated within that source must be verified [1]. In
this paper, we discuss the mechanism of establishing the route
to the origin of the certificate and then verifying the
certificates in that source. The Fig.1, Shows the architecture the fast advancements in the e-commerce industries and many
denoting the sequence of activities involved in the establishing people opting for e-transactions the requirement for such
the path to the source where the certificate is originated. The service would become important and it would be impossible to
flow further denotes implement to have in place such a single service server which
can facilitate more that one trust domains and interact with the
diverse PKI structures and repository interfaces.
V. CONCLUSION
In this paper, we propose a new deployment scheme of
delegated certification path validation, which can well serve
mobile business transactions. Comparing to traditional
centralized delegated certification path validation, we deploy
the validation service in a distributed and manageable
environment, named “delegation cloud”. Utilizing cloud
technologies including cloud storage and computing,
distributed end-devices can access the service with lowest
communication and computing cost. In Future, we will focus
on detailing the world-level delegation service, including how
to utilize the cloud storage resource to cache the history path
and further accelerate the delegated respond speed.
REFERENCES
[1] PKI Forum, Inc, "Understanding Certification Path Construction", White
Paper, September 2002.
[2] K. Papapanagiotou, G. F. Marias, and P. Georgiadis, "Revising
centralized certificate validation standards for mobile and wireless
communications", Computer Standards & Interfaces 32 , pp. 281-287,
2010.