There
is brief information about the application of the encryption algorithms applied
with RMI protocol. Moreover, the analysis is performed on two commonly used
distributed models used in the Java system. The first one is the web services
and the next one is RMI. Both of them are explained briefly in this paper. The
main focus of the article is on the regular system and the secured variants
because both are important features of the RMI. According to distributed
models, the key information about the functional differences related to its
implementation and the architecture are provided including performance on the
operating systems like Linux and windows is also analyzed. The impact of these
distributed models on the design system is analyzed on the distributed
applications. Later on, in this article, there is also some information related
to the Java RMI that is used for the Bluetooth systems. Additionally, there are
some issues reported related to the efficient support of the Java RMI system
used for the Bluetooth environment. For that case, there is a need to implement
complete java RMI for the Bluetooth protocols. These protocols must support the
L2CAP layer of the system that is connected with the RMI socket. Another thing
is that this paper will also model the cost for the access patterns use for the
java RMI communications with the other networks.
I. Introduction of Applying of Encryption Algorithms with
RMI Protocol
It can be noted that Java’s
RMI mechanism is considered as the object-oriented flavor of the RPC. In any
RMI distribution, some features will help to increase the performance of the
operating system. The first one is related to the stub compiler and its name is
‘rmic’. Through the help of this compiler, it will become extremely easy to
generate marshaling and also unmarshaling code. Now the next important thing is
that the binding of the system is taking place in the RMI protocol with the
help of a server that is named as RMI registry [1].
It can be noted that the RMI is only using the TCP/ IP and other things to
improve the reliability of the transported messages. Through this fact, there
will be no need for any trouble in communication with the other network.
The
working of the RMI protocol [2]
is quite simple. This is because working in the Java interface. Due to this
case, the implementer of the server is writing the code in the Java interface.
Furthermore, this code is followed by the unmarshaling code. This can be done
easily with the help of a stub compiler. The main reason is that this compiler
is only operated for the Java language [3]. Then after the
implementation of the code, this specific service is completely available for
creating an ideal instance of the server class where it will become quite
simple to register it properly. But the main thing is that the register must be
implemented with the help of the RMI registry. For that case, there is a need
for a specific name given to the RMI registry. The name is that
‘naming.rebind().’ This is the style and procedure to give a name to the system
[4].
Due to this case, there is a huge problem and that is related to the query.
Some clients who can provide query about the RMI registry name. but this can be
solved easily by giving this name ‘Naming.lookup()’. Due to this feature, if
that particular registry of the RMI contains some information about the service
then it will return to the client with the help of an object [5].
Moreover,
another thing in the RMI protocol is that the client can invoke the defined
method used in the server without any difficulty. Due to this, it can easily be
converted into a useful message and easily transmit it to the server without
any difficulty [6].
Moreover, when this method is implemented and executed with the help of the RMI
protocol. Then after this, it will return the main value in marshaled form and
then this message is again returned towards the actual person without any
difficulty. Now at the client end, the message again deserialized and the
required goal is achieved. Moreover, it can be noted that the RMI protocol [7] is not different
from the RPC system. But the main problem is that RPC systems are slow and it
affects the communication at the client end [8].
II. Research Questions of Applying of Encryption Algorithms with RMI Protocol
How it is possible to use encryption algorithms with
the help of the RMI protocol?
What is the main difference between the AES and DES
algorithm?
What kind of algorithms are the best suitable for
applying it with RMI protocol?
III. Literatur Review of Applying of Encryption Algorithms with RMI Protocol
It is explained some efficient support for the Java RMI [9]. These systems are
used for the heterogeneous wireless network. It can be noted that the
distributed object-oriented networks are increasing daily. The next thing is
that it is more important for the wireless environment to provide an efficient
framework for implementing the RMI protocol for the wireless systems. This
paper is discussing some important support for the Java RMI systems. These
systems can be implemented easily in the Bluetooth, WLAN, GPRS environments in
a simple way. For that case, there is a need to implement a proper software
mechanism. This software mechanism can easily adopt the RMI protocol for the
various networks without any difficulty. Moreover, it can be noted that it is
considered as an important middleware for the communication of the components.
This article is also discussing important features through which the system
roaming can be improved by implementing RMI protocol benchmarks. The next thing
is that all of these benchmarks are used for RMI communication over the
different networks properly [10].
In
this paper, [9]
was involved in giving proper information about the Mobile Java RMI support
that can be implemented easily towards different wireless networks. The author
had explained the main problem present in heterogeneous [11]
wireless networks. This is because the Bluetooth layer is not properly
encrypted with the help of the RMI protocol that creates a huge problem for the
server. The next thing that this Bluetooth layer is just supported by the
incorporating set of protocol stake layers. Such layers are mostly used to
create a direct connection between different wireless devices. The author had
efficiently solved this problem with the help of the RMI protocol used in
wireless communications. Through the help of these protocols, it will create a
dynamic address with dynamic sockets. This can be done easily by purposing
algorithms for handling these handoff process [9].
IV. Methodology of
Applying of Encryption Algorithms with RMI Protocol
In the methodology, the study is on the applying of an
encryption algorithm with RMI protocols related to other studies. As the
literature was done in the previous part, it is explained particular efficient
support for Java RMI. The object-oriented java programming language is very
significant for the networking environment to provide an effective framework to
implement the protocol [12]
for the wireless systems. It is also discussed in this study about some
essential and significant support for the RMI systems implementation. There are
some encryption algorithms are provided and explained in this document that how
they can be implemented as well as how these algorithms can be beneficial RMI
protocols. Furthermore, it is also explained the encryption algorithms for RMI
protocols, some implementation or practical work is also given in this
document. For further explanation, the brief information on the DES and AES is
also provide
lV. Encryption Algorithm for RMI Protocol
In this section, there is
complete information about the encryption protocols that can be implanted for
the RMI protocol.
Figure 1: Results after the client’s message
The above figure is giving the
information when a client is sending a message to the main server. The result
is showing that the message is delivered to the server through the help of the
RMI protocol. For these messages, it is also showing the code that is followed
through the encryption algorithms [13].
Figure 2: implementation of the client message
It can be noted that this application has consisted of two
main applications. The first one is related to the server and the next one is
the client. According to the given image, it can be noted that the name of the
client is given as SimpleClient. On the other hand, the name of the server is
given by SimpleServer. For that case, if there is a need to run the application
then the server has to run this function at the start. Then after this when the
server is sending the message it is displayed in the given figure above. This
shows that the server is waiting for the response of the client. In this application,
both the client and server are also creating a listening port and its number is
given by according to this figure is 25000 [14].
Now in the third line, it can be seen that when the client is
involved in sending the encrypted message to the server then this message is
also displayed in the terminal. This can be observer by checking the line 2 of
the code. Then after this, sever is decrypting the main message and it can be
seen easily from line 3. Now line 4 is showing information when the response
from the required server is getting encrypted by the server. Then after this in
the next line the response of the client can be seen easily [15].
According to this application,
the AES algorithm is used for encrypting and decrypting the messages between
the client and servers. Furthermore, another fact is that their response was
completely static and saved internally in the system [16].
Figure 3: Encryption of the client message
The above image is showing
information about the encryption of the client message [17].
This can be done easily through the help of the DES algorithm. Moreover, it
also shows the response of the server on the client screen.
Figure 4: decryption of the message
In this figure, there is
complete information about the message from the clients just after decryption
of the message. Another thing is that this figure is also showing that the
response of the client just after the encryption of the message [18].
Figure 5: State of server
In this figure, it can be noted that it is giving information
about the state of the server. This stated is gain just after the response of
the server. Moreover, this server is also waiting for the message from the
client. Furthermore, it is also showing the information about the listening
port in the last line of the figure. The next thing can be explained in simple
words. There are about two main applications the first one is the client and
the other is the server. Moreover, both of them are communicating with the help
RMI protocol [19].
This protocol is giving them proper access so they can easily communicate with
each other. Furthermore, the [20]required
communication is decrypted and encrypted at the same time. This can be seen
from every figure that is showing a complete send-receive step. This means that
whenever a client wanted to send a message there is a need for encryption of
the message before sending it towards the server [21]. After encryption of
the message, it is sent to the server. On the other hand, the server is
involved in decrypting the complete message and read it properly. Then after
this when the server wanted to respond to the client, he will again encrypt
that particular message and sent it to the client [22].
After this, the client will again decrypt the particular message from the client
and read its response. This shows that both the client and server can send and
receive any kind of message with the help of encryption and decryption process
and this cycle can go towards infinite.
VI. Difference Between DES and aes of Applying of Encryption Algorithms with RMI Protocol
It can be noted that DES
stands for the data encryption standard and on the other hand, AES is related
to the advanced encryption standard. The basic difference between them is that
in DES the data block is only divided into two halves. On the other hand, in
AES [23]
the whole data block is processed in a single matrix. The main principle behind
both technologies is that the DES only works on the Feistel Cipher. On the
other hand, AES is working on two principles that are substitution and
permutation principle. The plaintext of the DES has consisted of only 64 bits
and on the other hand, in AES it has consisted of 128, 192 and 256 bits [24].
According to the key size, it
can be seen that the size of DES is quite smaller than the AES. Then the next
difference is related to the number of rounds. It shows that there are about 16
rounds present in the DES. On the other hand, AES has consisted of 10 rounds
for the 128-bit algorithm. Moreover, 12 rounds for only the 192-bit algorithm
and 14 rounds for a 256-bit algorithm [25].
According to security purposes [26]
it can be seen that DES containing the smaller key and that shows that it is
less secure technology. On the other hand, in AES it is containing a huge
security key that will create more security for the user [27].
According to the speed, DES is slower than the AES [28].
VII. Ideal Recommendation for rmi Algorithm
It can be noted that AES is
the ideal recommendation for the RMI protocol. This is because the AES
algorithm technology is providing efficient security to the system at the time
of the communication. This is because this algorithm is quite faster than the
others. Due to this, it will provide efficient control to the whole system.
Moreover, the server and clients [29]
can send as many messages as they can, because the key size of the server is
about 256. That is quite huge for ideal conversation. Moreover, this algorithm
is providing efficient security to the whole system. This is because it
contains a large key for security [30].
VIII.
Conclution of Applying of
Encryption Algorithms with RMI Protocol
Summing
up all the discussion from above it is concluded that RMI protocol is playing a
major role during communication between the wireless networks. The first feature
is the stub compiler and its name is ‘rmic’. Through the help of this compiler,
it will become extremely easy to generate marshaling and also unmarshaling
code. The working of the RMI protocol is quite simple. This is because working
in the Java interface. Now the next thing is that the implementer will also
provide a specific class for the server that can easily implement this server
without any problem. furthermore, it can be noted that the RMI protocol is
similar to the RPC system. But RPC systems are slow and affect the
communication at the client end. It can be noted that this application has
consisted of two main applications. It can be noted that DES stands for the
data encryption standard and on the other hand, AES is related to the advanced encryption
standard. The main principle behind both technologies is that the DES only
works on the Feistel Cipher. On the other hand, AES is working on two
principles that are substitution and permutation principle. So, it will provide
efficient control of the whole system. Moreover, the server and clients can
send several messages.
REFERENCES
of
Applying of Encryption Algorithms with RMI Protocol
[1]
|
F.
Breg, S. Diwan, J. Villacis, J. Balasubramanian, E. Akman and D. Gannon,
"Java RMI performance and object model interoperability: Experiments
with Java/HPC++.," Concurrency: Practice and Experience, , vol.
10, no. 11‐13, pp. 941-955., 1998.
|
[2]
|
D.
Kurzyniec, T. Wrzosek, V. Sunderam and A. Slominski, "RMIX: A
multiprotocol RMI framework for Java.," In Proceedings International
Parallel and Distributed Processing Symposium, pp. 6-pp, 2003.
|
[3]
|
M.
B. Juric, B. Kezmah, M. Hericko, I. Rozman and I. Vezocnik, "Java RMI,
RMI tunneling and Web services comparison and performance analysis," ACM
Sigplan Notices, Vols. 39(5), ., pp. 58-65, 2004.
|
[4]
|
J.
KAWASH, G. SAMARA and A. H. M. A. D. EL-HALABI, "MORE EFFICIENT JAVA RMI
FOR GPRS DEVICES," In New Trends In Computer Networks, pp.
144-153, 2005.
|
[5]
|
M.
B. Juric, I. Rozman, B. Brumen, M. Colnaric and M. Hericko, "Comparison
of performance of Web services, WS-Security, RMI, and RMI–SSL," Journal
of Systems and Software, vol. 5, no. 689-700., p. 79, 2006.
|
[6]
|
Y.
Liu, D. Xu, W. Song and Z. Mu, "Design and implementation of high
performance IPSec applications with multi-core processors," In 2008
International Seminar on Future Information Technology and Management
Engineering, pp. 595-598, 2008.
|
[7]
|
V.
K. Dabhi and H. B. Prajapati, "Dissection of the internal workings of
the RMI, possible enhancements and implementing authentication in standard
Java RMI," International journal of networking and virtual
organisations, vol. 7, no. 6, pp. 514-534., 2010.
|
[8]
|
C.
W. Chen, J. K. Lee, H. W. Lin and W. J. Wu, "Efficient support of Java
RMI over heterogeneous wireless networks.," In 2004 IEEE
International Conference on Communications, pp. 1391-1395, 2004.
|
[9]
|
C.-K.
Chen, C.-W. Chen and J.-K. L. a. J.-C. C. Chien-Tan Ko, "Mobile Java RMI
support over heterogeneous wireless networks: A case study.," Journal
of Parallel and Distributed Computing , 2008.
|
[10]
|
,.
C.-K. C. J.-C. C. C.-T. K. J.-K. L. H.-W. L. a. W.-J. W. Cheng-Wei Chen,
"Efficient support of Java RMI over heterogeneous wireless
networks," In 2004 IEEE International Conference on Communications, 2004.
|
[11]
|
M.
Kassar, B. Kervella and G. Pujolle, "An overview of vertical handover
decision strategies in heterogeneous wireless networks," Computer
communications, vol. 31, no. 10, pp. 2607-2620, 2008.
|
[12]
|
S.
Campadello, O. Koskimies, K. Raatikainen and H. Helin, " Wireless java
rmi.," In Proceedings Fourth International Enterprise Distributed
Objects Computing Conference, pp. 114-123, 2000.
|
[13]
|
M.
B. Juric, I. Rozman, B. Brumen, M. Colnaric and M. Hericko, " Comparison
of performance of Web services, WS-Security, RMI, and RMI–SSL.," Journal
of Systems and Software, vol. 79, no. 5, pp. 689-700., 2006.
|
[14]
|
P.
C. Wei, C. H. Chen, C. W. Chen and J. K. Lee, "Support and optimization
of Java RMI over a Bluetooth environment.," Concurrency and
computation: Practice and experience, vol. 17, no. 7-8, pp. 967-989.,
2005.
|
[15]
|
C.
K. Chen, C. W. Chen, C. T. Ko, J. K. Lee and J. C. Chen, "Mobile Java
RMI support over heterogeneous wireless networks: A case study.," Journal
of Parallel and Distributed Computing, vol. 68, no. 11, pp. 1425-1436,
2008.
|
[16]
|
C.
K. Chen, C. W. Chen, C. T. Ko, J. K. Lee and J. C. Chen, "Mobile Java
RMI support over heterogeneous wireless networks: A case study.," Journal
of Parallel and Distributed Computing, vol. 68, no. 11, pp. 1425-1436.,
2008.
|
[17]
|
A.
El-Sisi and H. M. Mousa, "Evaluation of Encryption Algorithms for
Privacy Preserving Association Rules Mining.," IJ Network Security, ,
Vols. 14(5),, pp. 289-296., 2012.
|
[18]
|
S.
Mauw and S. Piramuthu, "A PUF-based authentication protocol to address
ticket-switching of RFID-tagged items.," In International Workshop on
Security and Trust Management, pp. 209-224, 2012.
|
[19]
|
M.
Burnside, D. Clarke, T. Mills, A. Maywah, S. Devada and R. Rivest,
"Proxy-based security protocols in networked mobile devices.," In
Proceedings of the 2002 ACM symposium on Applied computing, pp. 265-272,
2002.
|
[20]
|
E.
Garcia and S. A. Pena, "System and method for controlling access to
decrypted data," Patent and Trademark Office, 2014.
|
[21]
|
B.
A. O. RuiXian, "Distributed Computing via RMI and CORBA.," Distributed
Computing, 2004.
|
[22]
|
C.
W. Chen, C. K. Chen, J. C. Chen, C. T. Ko, J. K. Lee, H. W. Lin and W. J. Wu,
" Efficient support of Java RMI over heterogeneous wireless
networks.," In 2004 IEEE International Conference on Communications ,
vol. 3, pp. 1391-1395, 2004.
|
[23]
|
P.
C. Mandal, "Evaluation of performance of the Symmetric Key Algorithms:
DES, 3DES, AES and Blowfish," Journal of Global Research in Computer
Science, pp. 67-70., 2012.
|
[24]
|
M.
L. Akkar and C. Giraud, "An implementation of DES and AES, secure
against some attacks," In International Workshop on Cryptographic
Hardware and Embedded Systems, pp. 309-318, 2001.
|
[25]
|
M.
A. Mushtaque, H. Dhiman, S. Hussain and S. Maheshwari, "Evaluation of
DES, TDES, AES, blowfish and two fish encryption algorithm: based on space
complexity," International Journal of Engineering Research &
Technology (IJERT), vol. 3, no. 4, 2014.
|
[26]
|
B.
Padmavathi and S. R. Kumari, "A survey on performance analysis of DES,
AES and RSA algorithm along with LSB substitution," performance
analysis of DES, AES and RSA algorithm along, IJSR, 2013.
|
[27]
|
H.
Kaur, "AN ALTERNATIVE ARCHITECTURE FOR IMPROVING AVALIBILITY AND
FLEXIBILITY OF RMI REGISTRY," Doctoral dissertation, 2008.
|
[28]
|
K.
M. A. Alheeti and A. Gruebler, "An Intrusion Detection System Against
Black Hole Attacks n the Communication Network of Self-Driving Cars," 2015
Sixth International Conference on Emerging Security Technologies, 2015.
|
[29]
|
J.
M. Dieterich and B. Hartke, " Error-safe, portable, and efficient
evolutionary algorithms implementation with high scalability.," Journal
of chemical theory and computation, vol. 12, no. 10, pp. 5226-5233, 2016.
|
[30]
|
J.
KAWASH and a. A. H. M. A. D. E.-H. GHASSAN SAMARA, "MORE EFFICIENT JAVA
RMI FOR GPRS DEVICES," In New Trends In Computer Networks, 2005.
|