Enhanced XML Encryption Using Classification Mining Technique for e-Banking Transactions

Enhanced XML Encryption Using Classification Mining Technique for e-Banking Transactions

Faisal T. Ammari (School of Computing and Engineering, University of Huddersfield, Huddersfield, UK) and Joan Lu (School of Computing and Engineering, University of Huddersfield, Huddersfield, UK)
Copyright: © 2013 |Pages: 23
DOI: 10.4018/ijirr.2013100105

Abstract

In this paper a novel approach is presented for securing financial Extensible Markup Language (XML) transactions using classification data mining (DM) algorithms. The authors' strategy defines the complete process of classifying XML transactions by using set of classification algorithms, classified XML documents processed at later stage using element-wise encryption. Classification algorithms were used to identify the XML transaction rules and factors in order to classify the message content fetching important elements within. The authors have implemented two classification algorithms to fetch the importance level value within each XML document. Classified content is processed using element-wise encryption for selected parts with “High” or “Medium” importance level values. Element-wise encryption is performed using AES symmetric encryption algorithm with different key sizes. An implementation has been conducted using data set fetched from e-banking service in one of the leading banks in Jordan to present system functionality and efficiency. Results from the authors' implementation presented an improvement in processing time encrypting XML documents.
Article Preview

2. Literature Review

Efficient models have been proposed (XML encryption syntax and processing (W3C Recommendation), 2003; XML-signature syntax and processing (W3C/IETF Recommendation), 2002; XML key management specification (XKMS 2.0), 2005; Oasis security services (saml) tc, n.d.; Organization for the advancement of structured information standards (OASIS), n.d.; ContentGuard, 2001) to add a secure layer over exchanged XML data. The main goal was to provide data authenticity and confidentiality. Threats surrounding the usage of XML have been considered (Juric, Sarang, Loganathan, & Jennings, 2007) such as schema change, oversized payload, recursive payload, and XML routing.

Complete Article List

Search this Journal:
Reset
Open Access Articles: Forthcoming
Volume 9: 4 Issues (2019): Forthcoming, Available for Pre-Order
Volume 8: 4 Issues (2018)
Volume 7: 4 Issues (2017)
Volume 6: 4 Issues (2016)
Volume 5: 4 Issues (2015)
Volume 4: 4 Issues (2014)
Volume 3: 4 Issues (2013)
Volume 2: 4 Issues (2012)
Volume 1: 4 Issues (2011)
View Complete Journal Contents Listing