A Middleware for Distributing XML Data between Mobile Application Servers

A Middleware for Distributing XML Data between Mobile Application Servers

Yousef E. Rabadi (University of Huddersfield, UK) and Joan Lu (University of Huddersfield, UK)
DOI: 10.4018/978-1-4666-0936-5.ch005
OnDemand PDF Download:
No Current Special Offers


This research introduces architecture of new approach of distributing XML data files between different mobile application servers. The main objective and goal of this study is to transmit XML data files between different Mobile Application Server (MAS) using internet cloud infrastructure in a secured manner coupled with reliability and quality of communication. Taking into consideration that the system architecture attribute is to be independent, scalable, and flexible of using cloud computing. Furthermore, this architecture is designed to minimize the risk of any alteration, data loss, data abuse, and data misuse of XML critical business data information. As cloud computing, using existing cloud network infrastructure to get advantage of the scalability, operational efficiency, and control of data flow are a big consideration in this architecture. A test has been made to measure the performance of the Real-time Interactive Data Exchange system (RIDX), one by using standard TCP protocol, and one by using RIDX UDP protocol. As a result, RIDX architecture performance showed good results; conversely the study showed that using RIDX UDP protocol as a transport protocol gives better performance than standard TCP. Moreover, using RIDX UDP transport protocol assures the reliability and lossless of data transmission to all nodes.
Chapter Preview


Exchanging data between different domains plays an important and essential role of doing businesses. As mobile applications use the internet as source of information, and these information is processed behind the scene by mobile application servers, some of the application servers adapted XML file structure to be as the transmission data format, therefore, XML increasingly become a standard format for transmitting data on networks between different businesses, the need of finding secured and efficient techniques of transmitting XML data files is a necessity matter.

Real-Time XML Data transmission aims to place a multi layer defense of exchanging XML data information electronically between different mobile application servers using internet cloud network as a platform. RIDX (Real-time interactive data exchange) goal in this study is to build a clear infrastructure required for managing XML data real-time interactive exchange, taking into consideration the enormous security threats that face XML data files being transferred. The proposed system adapts as part of its transport protocol by using multicast data distribution mechanism in order to reduce network resources, minimize the hindrance and expenditure.

Thus far, there has been little stimulus to use multicast data distribution, because it lacks of protection mechanism for the data been delivered.

Although there has been a significant progress in presenting secured multicast data distribution.

Different drawbacks, threats and attacks can be addressed during single/bidirectional transmission process:

  • Communication channels that are not secured will jeopardize data integrity, from modification, data misuse, and data abuse. A man-in-the-hub can tap the stream of data including encryption keys, sensitive data …etc.

  • Operating system security breaks including memory observation, invaders can forecast sensitive secrets concealed inside memory.

  • To prevent a service of providing its ordinary functions which results of non-contemporary information, this Denial of service (DoS) can cause the organization a great pact of service time and money

  • When transmitting data across shared network, some tools can be used to sniff network packets in order to reveal sensitive information especially if no data encryption measurements has been taken

By taking these threats into consideration of building a system, the belief that this new approach contains the mechanism that is apposite to achieve the security requirements for various threats; a minimum requirement is at hand such as authentication, integration and confidentiality.

Adding multi level stage of defense is the key to this project:

  • Level 1: Shredding and Encrypting/decrypting the data

  • Level 2: Securing the communication (tunneling)

  • Level 3: Reliable Multicast delivery, routing and merging the data

Complete Chapter List

Search this Book: