A Distributed Secure Mechanism for Resource Protection in a Digital Ecosystem Environment
Ilung Pranata, Geoff Skinner, Rukshan Athauda
DOI: 10.4236/jis.2012.31004   PDF    HTML     4,114 Downloads   7,949 Views   Citations


The dynamic interaction and collaboration of the loosely coupled entities play a pivotal role for the successful implementation of a Digital Ecosystem environment. However, such interaction and collaboration can only be promoted when information and resources are effortlessly shared, accessed, and utilized by the interacting entities. A major requirement to promote an intensive sharing of resources is the ability to secure and uphold the confidentiality, integrity and non-repudiation of resources. This requirement is extremely important in particular when interactions with the unfamiliar entities occur frequently. In this paper, we present a distributed mechanism for improving resource protection in a Digital Ecosystem environment. This mechanism can be used not only for any secure and reliable transaction, but also for encouraging the collaborative efforts by the Digital Ecosystem community members to play a major role in securing the environment. Public Key Infrastructure is also employed to provide a strong protection for its access workflows.

Share and Cite:

I. Pranata, G. Skinner and R. Athauda, "A Distributed Secure Mechanism for Resource Protection in a Digital Ecosystem Environment," Journal of Information Security, Vol. 3 No. 1, 2012, pp. 25-38. doi: 10.4236/jis.2012.31004.

Conflicts of Interest

The authors declare no conflicts of interest.


[1] D. Boughaci and H. Drias, “A Secure E-Transaction model for E-Commerce,” IEEE GCC Conference (GCC), Manama, 20-22 March 2006. doi:10.1109/IEEEGCC.2006.5686242
[2] C. Potter and A. Beard, “Information Security Breaches Survey 2010,” Technical Report, PricewaterhouseCoopers, 2010.
[3] P. ltner and T. Grechenig, “A Joint Infrastructure of ‘Digital Corporate Organisms’ as Facilitator for a Virtual Digital Retail Ecosystem,” 4th IEEE International Conference on Digital Ecosystems and Technologies (DEST), Dubai, 12-15 April 2010.
[4] Y.-L. Fang B. Han and Y.-B. Li, “Research and Implementation of Key Technology Based on Internet Encryption and Authentication,” International Conference on Networking and Digital Society (ICNDS’09), Guiyang, 30-31 May 2009.
[5] X. Tian and W. Dai, “Study on Information Management and Security of E-commerce System,” International Symposium on Intelligence Information Processing and Trusted Computing (IPTC), Huanggang, 18-20 November 2010.
[6] P. Dini, M. Darking, N. Rathbone, M. Vidal, P. Hernandez, P. Ferronato, G. Briscoe and S. Hendryx, “The Digital Ecosystems Research Vision: 2010 and Beyond,” 2011. www.digital-ecosystems.org/events/2005.05/de_position_ paper_vf.pdf
[7] EComm, “Technologies for Digital Ecosystems,” 2005. www.digital-ecosystems.org/doc/flyer-de-sector.doc.
[8] F. Nachira, P. Dini and A. Nicolai, “A Network of Digital Business Ecosystems for Europe: Roots, Processes and Perspectives,” 2011. http://www.digital-ecosystems.org/book/DBE-2007.pdf
[9] F. Nachira, E. Chiozza, H. Ihonen, M. Manzoni and F. Cunningham, “Towards a Network of Digital Business Ecosystems Fostering the Local Development,” Discussion Paper, Bruxelles, 2002.
[10] H. Boley and E. Chang, “Digital Ecosystem: Principles and Semantics,” Inaugural IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2007), Cairns, 12-23 February 2007.
[11] M. Hadzic, E. Chang and T. Dillon, “Methodology Framework for the Design of Digital Ecosystem,” ISIC IEEE International Conference Systems, Man and Cybernetics, Montreal, 7-10 October 2007.
[12] DigitalEcosystem.org, “Digital Ecosystems: The New Global Commons for SMEs and Local Growth,” 2011. http://www.digital-ecosystems.org/de/refs/ref_books.html
[13] G. Briscoe and P. Wilde, “Digital Ecosystems: Evolving Service-Oriented Architectures,” 1st International Conference on Bio Inspired Models of Network, Information and Computing Systems, New York, June 2006.
[14] M. Wooldridge, “Introduction to MultiAgent Systems,” Wiley, New York, 2002
[15] E. Cantu-Paz, “A Survey of Parallel Genetic Algorithms,” Reseaux et Systemes Repartis, Calculateurs Paralleles, Vol. 10, 1998, pp. 141-171.
[16] J. Stender, “Parallel Genetic Algorithms: Theory and Applications,” IOS Press, Amsterdam, 1993.
[17] A. Berson, “Client/Server Architecture,” 2nd Edition, McGraw-Hill Companies, Upper Saddle River, 1996.
[18] W3C, “Web Services Architecture,” 2011. http://www.w3.org/TR/ws-arch/
[19] R. Schollmeier, “A Definition of Peer-to-Peer Networking for the Classification of Peer-to-Peer Architectures and Applications,” Proceedings of 1st IEEE International Conference on Peer to Peer Computing, Linkoping, 27-29 August 2001.
[20] H. Koshutanski, et al., “Distributed Identity Management Model for Digital Ecosystems,” International Conference on Emerging Security Information, Systems and Technologies (Securware’07), Valencia, 14-20 October 2007.
[21] J. M. Seigneur, “Demonstration of Security through Collaborative in Digital Business Ecosystem,” Proceedings of the IEEE SECOVAL Workshop, Athens, September 2005.
[22] J. Novotny, “An Online Credential Repository for the Grid: MyProxy,” Proceedings of the IEEE 10th International Symposium on High Performance Distributed Computing (HPDC-10), San Fransisco, 7-9 September 2001.
[23] L. Pearlman, et al., “A Community Authorization Service for Group Collaboration,” Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks, Monterey, 5-7 June 2002. doi:10.1109/POLICY.2002.1011293
[24] M. Thompson, et al., “Certificate-Based Access Control for Widely Distributed Resources,” Proceedings of the 8th conference on USENIX Security Symposium, Washington DC, 23-26 August 1999.
[25] J. Weise, “Public Key Infrastructure Overview,” Sun Microsystem, Sun BluePrints Online 2001.
[26] I. Pranata, G. Skinner and R. Athauda, “A Survey on the Security Requirements for a Successful Adoption of Digital Ecosystem Environment,” 2nd International Conference on Information Technology Security (ITS 2011), Singapore, 24-25 November 2011.
[27] I. Pranata, G. Skinner and R. Athauda, “Community Based Authentication and Authorisation Mechanism for Digital Ecosystem,” 5th IEEE International Conference on Digital Ecosystems and Technologies (DEST’11), Seoul, 31 May-3 June 2011.
[28] I. Pranata, G. Skinner and R. Athauda, “Distributed Mechanism for Protecting Resources in a Newly Emerged Digital Ecosystem,” 11th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP 2011), Melbourne, 24-26 October 2011.
[29] W3C, “Extensible Markup Language (XML),” 2011. http://www.w3.org/XML/
[30] P. R. Zimmermann, “The Official PGP User’s Guide,” MIT Press, Cambridge, 1995.
[31] FTSC, “FSTC Counter-Phising Initiative,” Financial Services Technology Consortium, New York, 2004.
[32] Apache JMeter, 2011. http://jakarta.apache.org/ jmeter/

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.