Title :
DaTA -- Data-Transparent Authentication Without Communication Overhead
Author :
Chen, Songqing ; Chen, Shiping ; Wang, Xinyuan ; Jajodia, Sushil
Author_Institution :
Dept. of Comput. Sci., George Mason Univ., Fairfax, VA
fDate :
Aug. 28 2006-Sept. 1 2006
Abstract :
With the development of Internet computing techniques, continuous data streams from remote sites are commonly used in scientific and commercial applications. Correspondingly, there is increasing demand of assuring the integrity and authenticity of received data streams. Existing strategies of assuring data integrity and authenticity mainly use message authentication codes (MAC) generated on data blocks and transfer the MAC to the receiver for authentication through either out of band communication or in band communication. Transferring the MAC via out of band communication inevitably introduces communication overhead and additional complexity to synchronize the out of band communication with the data communication. Transferring the MAC via in band channel can be achieved by either appending the MAC to the original data or embedding the MAC into the original data, which would either incur communication overhead or change the original data. It would be desirable to be able to authenticate the stream data without any communication overhead and changing the original data at the same time. To deal with data packet or block loss, many of existing stream data authentication schemes rely on hash chaining, the current usage of which results in uncertainty in authenticating the subsequent data blocks once the first data packet or block loss is detected. In this paper, we propose a novel application layer authentication strategy called DaTA. This authentication scheme requires no change to the original data and causes no additional communication overhead. In addition, it can continue authenticating the rest of data stream even if some data loss has been detected. Our analysis shows that our authentication scheme is robust against packet loss and network jitter. We have implemented a prototype system to evaluate its performance. Our empirical results show that our proposed scheme is efficient and practical under various network conditions
Keywords :
Internet; data communication; jitter; message authentication; DaTA; Internet computing techniques; application layer authentication strategy; block loss; communication overhead; continuous data streams; data blocks; data communication; data integrity; data packet loss; data-transparent authentication; hash chaining; in band channel; in band communication; message authentication codes; network jitter; out of band communication; stream data authentication schemes; Computer science; Data communication; Demand forecasting; Hurricanes; Information systems; Internet; Message authentication; Propagation losses; Software engineering; Streaming media;
Conference_Titel :
Securecomm and Workshops, 2006
Conference_Location :
Baltimore, MD
Print_ISBN :
1-4244-0422-3
Electronic_ISBN :
1-4244-0423-1
DOI :
10.1109/SECCOMW.2006.359567