Share Email Print
cover

Proceedings Paper

Secure data aggregation in heterogeneous and disparate networks using stand off server architecture
Author(s): S. Vimalathithan; S. D. Sudarsan; R. Seker; R. B. Lenin; S. Ramaswamy
Format Member Price Non-Member Price
PDF $14.40 $18.00

Paper Abstract

The emerging global reach of technology presents myriad challenges and intricacies as Information Technology teams aim to provide anywhere, anytime and anyone access, for service providers and customers alike. The world is fraught with stifling inequalities, both from an economic as well as socio-political perspective. The net result has been large capability gaps between various organizational locations that need to work together, which has raised new challenges for information security teams. Similar issues arise, when mergers and acquisitions among and between organizations take place. While integrating remote business locations with mainstream operations, one or more of the issues including the lack of application level support, computational capabilities, communication limitations, and legal requirements cause a serious impediment thereby complicating integration while not violating the organizations' security requirements. Often resorted techniques like IPSec, tunneling, secure socket layer, etc. may not be always techno-economically feasible. This paper addresses such security issues by introducing an intermediate server between corporate central server and remote sites, called stand-off-server. We present techniques such as break-before-make connection, break connection after transfer, multiple virtual machine instances with different operating systems using the concept of a stand-off-server. Our experiments show that the proposed solution provides sufficient isolation for the central server/site from attacks arising out of weak communication and/or computing links and is simple to implement.

Paper Details

Date Published: 13 April 2009
PDF: 9 pages
Proc. SPIE 7344, Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009, 734405 (13 April 2009); doi: 10.1117/12.818575
Show Author Affiliations
S. Vimalathithan, Univ. of Arkansas at Little Rock (United States)
S. D. Sudarsan, Univ. of Arkansas at Little Rock (United States)
R. Seker, Univ. of Arkansas at Little Rock (United States)
R. B. Lenin, Univ. of Arkansas at Little Rock (United States)
S. Ramaswamy, Univ. of Arkansas at Little Rock (United States)


Published in SPIE Proceedings Vol. 7344:
Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009
Belur V. Dasarathy, Editor(s)

© SPIE. Terms of Use
Back to Top