Securing Financial XML Transactions Using Intelligent Fuzzy Classification Techniques: A Smart Fuzzy-Based Model for Financial XML Transactions Security Using XML Encryption

Securing Financial XML Transactions Using Intelligent Fuzzy Classification Techniques: A Smart Fuzzy-Based Model for Financial XML Transactions Security Using XML Encryption

Faisal Tawfiq Ammari, Joan Lu
Copyright: © 2017 |Pages: 113
DOI: 10.4018/978-1-5225-2058-0.ch007
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The eXtensible Markup Language (XML) has been widely adopted in many financial institutions in their daily transactions. This adoption was due to the flexible nature of XML providing a common syntax for systems messaging in general and in financial messaging in specific. Excessive use of XML in financial transactions messaging created an aligned interest in security protocols integrated into XML solutions in order to protect exchanged XML messages in an efficient yet powerful mechanism. However, financial institutions (i.e. banks) perform large volume of transactions on daily basis which require securing XML messages on large scale. Securing large volume of messages will result performance and resource issues. Therefore, an approach is needed to secure specified portions of an XML document, syntax and processing rules for representing secured parts. In this research we have developed a smart approach for securing financial XML transactions using effective and intelligent fuzzy classification techniques. Our approach defines the process of classifying XML content using a set of fuzzy variables. Upon fuzzy classification phase, a unique value is assigned to a defined attribute named “Importance Level”. Assigned value indicates the data sensitivity for each XML tag. The research also defines the process of securing classified financial XML message content by performing element-wise XML encryption on selected parts defined in fuzzy classification phase. Element-wise encryption is performed using symmetric encryption using AES algorithm with different key sizes. Key size of 128-bit is being used on tags classified with “Medium” importance level; a key size of 256-bit is being used on tags classified with “High” importance level. An implementation has been performed on a real-life environment using online banking system in Jordan Ahli Bank one of the leading banks in Jordan to demonstrate its flexibility, feasibility, and efficiency. Our experimental results of the system verified tangible enhancements in encryption efficiency, processing-time reduction, and resulting XML message sizes. Finally, our proposed system was designed, developed, and evaluated using a live data extracted from an internet banking service in one of the leading banks in Jordan. The results obtained from our experiments are promising, showing that our model can provide an effective yet resilient support for financial systems to secure exchanged financial XML messages.
Chapter Preview
Top

Introduction

eXtensible Markup Language (XML) (Bray, Paoli, Sperberg-McQueen, Maler, & Yergeau, 2008) has been widely adopted in many financial institutions in their daily transactions; this adoption has been due to the flexible nature of XML in providing a common syntax for systems messaging in general and for financial messaging in particular. Excessive use of XML in financial transactions messaging has created an aligned interest in security protocols integrated into XML solutions in order to protect exchanged XML messages by using an efficient yet powerful mechanism. There have been several approaches proposed by researchers to secure XML messages and there is a comprehensive collection of related works.

XML is designed based on text format and has a tree structure. It is natural that data integrity, data authentication, information confidentiality, and other security benefits should be applied to entire XML data or portions of XML data. XML security solutions should provide a high level of security to ensure the confidentiality of information represented using the XML format. XML security must be integrated with XML data features and characteristics to keep the flexible nature of XML while integrating essential security technologies.

Due to the sensitive nature of financial transactions that use XML as their main messaging protocol, a security requirement should be fulfilled to protect exchanged XML messages by using a dynamic and efficient mechanism. The security mechanism should encrypt portions of XML data rather than whole messages, e.g. element-wise encryption should be used to protect sensitive parts within the XML message.

The specifications related to XML security published by W3C define the basic framework and rules that can be utilized across applications. The basic idea for XML security is to perform data encryption on XML messages whereby XML data confidentiality is achieved to ensure that the XML data structure, data content, and other sensitive information in XML data may only be accessed by legitimate parties. Confidentiality is generally associated with encryption mechanisms or access control technologies. XML key management (Hallam-Baker & Mysore, 2005) provides the basic key requirements for XML data confidentiality.

However, on a daily basis, financial institutions (i.e. banks) perform large volumes of transactions that require XML encryption on a large scale. Encrypting large volumes of messages in full will result in performance and resource issues. Therefore, an approach is needed to encrypt defined parts within the XML document, to identify syntax for representing encrypted portions, and to identify the processing rules for decrypting those portions. W3C XML encryption has a feature called element-wise encryption, which is the process of encrypting parts of an XML document. The encryption process can be applied to more than one element in a given XML document; each is contained in another element. The element might enclose sub-elements, attributes, texts, or a mix of all mentioned items. The remaining parts of the document should remain intact as plaintext.

To avoid any performance or resource issues, a mechanism should be considered to choose which parts of the XML document should be encrypted on the fly, whereby the parts are selected based on smart criteria for detecting sensitive information within an XML document.

The fuzzy logic (FL) (L.A. Zadeh, 1965) approach can be used to distinguish sensitive parts within each XML document. FL provides an easy way to reach to a definite conclusion based upon noisy, vague, imprecise, ambiguous, or missing information. FL's approach for controlling problems imitates how a person would make a quick decision. FL includes a rule-based ‘IF X AND Y, THEN Z’ approach for solving a control problem, rather than attempting to design a system in mathematical way. The FL model is relying on an operator’s experience rather than their technical understanding of the system.

The FL approach is quantified based on a combination of historical data and expert input. FL has been used in many fields especially in computer information systems, and computer science to combine expert input with computer models for a large scale of applications. The main advantage of the fuzzy approach is that it can process imprecisely defined variables and variables which mathematical relationships cannot define their corresponding relationships. FL has the ability to integrate expert human knowledge and judgment to define the variables and corresponding relationships. By integrating expert human judgment the more realistic models are available (Mahant, 2004)

Complete Chapter List

Search this Book:
Reset