A Policy-Based Security Management Architecture Using XML Encryption Mechanism for Improving SNMPv3
نویسندگان
چکیده
Simple Network Management Protocol (SNMP) is the most widely-used network management protocol for TCP/IP-based networks. The functionality of SNMP was enhanced with the publication of SNMPv2. However, both versions of SNMPv1 and SNMPv2 lack security features, notably authentication and privacy. The SNMPv3 solves these deficiencies but it has some inefficiency to deal with the access, service refusal, or unstable action. On the other hand, XML is being used to describe components and applications in a vendor and language neutral. In this paper, we propose a policy-based SNMP security management architecture using XML. We propose a secure network management protocol that adopts the policy-based network management and the XML security features to the existing SNMPv3.
منابع مشابه
SNMPv3 Can Still be Simple?
The Simple Network Management Protocol (SNMP) was introduced in 1988. The initial version (SNMPV1) is still widely implemented, deployed, and used. SNMFV3is now in its final stages of standardization. SNMTV3 allows new capabilities for open, interoperable, and secure management on the Internet environment, SNMF’V3builds on SNMPvl and V2 to include methods for security (authentication, encryptio...
متن کاملPolicies in SNMPv3-based Management
Two important achievements in the network management area motivated the work presented in this paper. The first one is the wide acceptance of the policy concept and its introduction as a means for driving management procedures. The second concerns the capabilities brought by the version 3 of the SNMP protocol for configurable and secure network management. The deployment of SNMPv3 at equipment ...
متن کاملFramework for Building Secure XML Management System (SXMS)
The eXtensible Markup Language (XML) has been widely adopted for information exchange across various networks due to flexibility providing common syntax for messaging systems. Excessive use of XML as a communication medium created an aligned interest in the level of security provided for those XML-Based systems. Many security concerns have been tackled by the World Wide Consortium (W3C) creatin...
متن کاملDoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation
Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...
متن کاملTemporal , Delegable and Cheap Update Access Control to Published XML
Providing access control for published XML documents on the Web is an important topic. It involves the use of cryptographic techniques, addressing different requirements and, as a result, facing several challenges. Existing solutions still have some weaknesses such as system update cost, number of required secret encryption/decryption keys, size of encrypted document and supporting temporal and...
متن کامل