Skip to main content

Data Hiding a Key Management for Interoperable Urban Services

  • Conference paper
Security-Enriched Urban Computing and Smart Grid (SUComS 2010)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 78))

  • 2469 Accesses

Abstract

Availability of a reliable urban services data is the key component for an industrialized area. Urban settings are challenging places for experimentation and deployment and along with its complexity insecurity also contributes a bigger challenge. To address such issues this paper has defined the implementation issues in integrating Geospatial services data and web services technologies and proposed a methodology of securing the systems. The proposition presented earlier is a symmetric encryption which is to share the common key for doing both encryption and decryption secretly, and periodically.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Hadar, E., Perreira, M.: IEEE International Conference on Web Services, ICWS 2007 (2007)

    Google Scholar 

  2. Erl, T.: Service-oriented architecture: Concepts, technology, and design, p. 792. Prentice Hall PTR, Englewood Cliffs (2005)

    Google Scholar 

  3. Gailey, J.H.: Understanding Web services specifications and the WSE, p. 272. Microsoft Press, Washington (2004)

    Google Scholar 

  4. Newcomer, E., Lomow, G.: Understanding SOA with Web services. Addison Wesley, Inc., Maryland (2005)

    Google Scholar 

  5. Rammer, I.: Advanced.NET Remoting, 2nd edn., p. 608. Apress Publishing, California (2005)

    Google Scholar 

  6. Box, Bosoworth, Gudgin, Nottingham, & Orchard (2003); Lawrence (2004)

    Google Scholar 

  7. Stallings, W.: Cryptography and network security: principles and practices, 4th edn. Prentice Hall, New Jersey (2006)

    Google Scholar 

  8. Dzung, D., Naedele, M., Von Hoff, T.P., Crevatin, M.: Security for industrial communication systems. Proc. IEEE – Special Issue Indust. Commun. System 93(6), 1152–1177 (2005)

    Google Scholar 

  9. Kokai, Y., Masuda, F., Horiike, S., Sekine, Y.: Recent development in open systems for EMS/SCADA. Int. J. Electric Power Energy Syst. 20(2), 111–123 (1998)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Balitanas, M.O., Kim, T. (2010). Data Hiding a Key Management for Interoperable Urban Services. In: Kim, Th., Stoica, A., Chang, RS. (eds) Security-Enriched Urban Computing and Smart Grid. SUComS 2010. Communications in Computer and Information Science, vol 78. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16444-6_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-16444-6_21

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-16443-9

  • Online ISBN: 978-3-642-16444-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics