dc.description.abstract |
In today’s era of technology, there are a number of security threats we tend to ignore, for instance Privacy breach, Hacking, Traffic monitoring etc. Existing software solutions don’t focus on secure resource sharing and group management as per user’s need. The organizations therefore rely on external email providers and other expensive group collaboration and project management solutions.
To devise a generic solution for the stated problem, which is secure, fast, robust and scalable at the same time was a tough task. Several research papers were studied related to group Information Sharing (g-IS) and access control models to find the most appropriate and secure implementation. References of paper are shown in reference sections. The next phase was selection of technology for implementation. Benchmarks like Performance, Cost, Scalability and security were considered foremost.
The proposed solution is Dynamic Secure Group Information sharing system. It helps to solve these problems and provides secure system using well known security standards. These standards provide a security framework for creating and managing cryptographic groups and offer a quantitative basis for security assurance. It focuses on development of an open source and freeware solution that features secure group management and resource sharing. It also manages the access to dynamically created groups based on events and time.
This uses GSAKMP (Group Secure Association Key Management Protocol) for high end group security. It creates X509 Identities of users and effective authorization mechanism using Policy Token. It also provides secure distribution of keys to members of group for encrypted resource sharing. The complete system is developed using latest technologies standard like Spring Framework and Hibernate. Moreover, it is fast and extensible enough to add any other required feature. In the end we are able to achieve what was desired, and an open source project is developed that focuses on security and functionality at the same time. Given its implementation and architecture, its design is easy to understand and extend further. It can be used for further research in Cyber security esp. group information security. |
en_US |