Tag Archives: Shayanth

R6: Initial Prototyping

[Work done from 4th August to 17th August 2008]

During the last fortnight we were focusing in developing a prototype for our eID system. And also we had a meeting with our project supervisor on August 15. This meeting was mainly focused on how we are progressing and what we need to do soon. He suggested some good way to use the eID card for the offline authentication with the privacy preserving mechanism. Before we were with some misconception about how the system could be used in an offline mode. Especially we were with the idea about to use Privacy and Unlinkability, while providing some extend of backtracking features in a protected manner. So we had some meeting with team members to discuss on the offline issue.

On the other hand we have to come with the proper prototypes for evaluation as suggested by our project supervisor. I’m and Malalasena were assigned to develop some working prototype using the webservice.

So I started to develop some basic step in client side mapping for the user authentication through the webservice, which was developed by Malalasena for the user authentication. Even though it is very tight schedule, I managing to finish it very soon.

I have to find a way to sending the data form client to server using an Applet. But In a firewall environment it is so hard get to know about the outside world for an applet which is in the client side.

Now I’m working this problem. I haven’t found any suitable way to solve this problem. I learnt about the socket program, but that won’t work in a firewall environment because client might not have a right permit ion to open a socket connection between a client and server. I hope I can overcome this problem very soon.

Filed under Reports

R5: Java Applets and USB Access

[Work done from 21st July to 3rd August 2008]

We had very interesting and effective progress in our project during the last fortnight. First half of the week we mainly focus on the demonstration about our project progress to the Subject coordinator. We met our supervisor Dr.Chandana Gamage two times for that presentation.

  1. Meeting with Dr.Chandana Gamage Regarding the short demo – During the first meeting he guided us how to prepair the presentation slides.  He gave some important points to prepare the slides. And after the preparation of the slides we did the first formal demo in front of the supervisor in advanced. He suggested us to keep the time and suggest us to make some changes in the slides.
  2. Prepare & Presented the Demonstration
  3. Meeting with Mr.Ruchith Fernando – As we planed last week we met Mr.Ruchith Fernando in his office WSO2. He introduced two other peoples there who were the subordinated for him during the WSO2 identity solution. They gave us valuable points about the Microsoft CadeSpace and the web services.
  4. Find some way to connect with USB based stick through the Java Applets – I found some methods to read the data from the USP through the Java Applets.

Problems Found

When I started to develop some applets I found that the Java applets downloaded from the Internet (Servers) or from any remote sources are restricted from reading and writing files and making network connections on client host systems. They are also restricted from starting  other programs, loading libraries, or making native calls on the client host system. In general, applets downloaded from a network or remote sources are considered untrusted.

Overcome the Problems

I post some post in the Java fourms and got the help from Java expertes. They guyed me to use the Signed applets  that provide a way to verify that the applet is downloaded from a reliable source and can be trusted to run with the permissions  granted in the policy file. The Java 2 platform introduced the notion of signed applets. And the   Signing an applet ensures that an applet’s origin and its integrity are guaranteed by a certificate authority (CA) and that  it can be trusted to run with the permissions granted in the policy file. I used that method and try to overcome that problems.

Filed under Reports

R4: Some or more, a lot more

[Work done from 7th July to 20th July 2008]

During this two week we mainly forcus about the backed technologies in our project. We also discussed with our supervisor Dr.Chandana Gamage regarding the project. And further discussions with our project supervisor Dr.Chandana Gamage we got some valuable points.

Following thinks that we discussed with our supervisor:

  • Developments so far
  • Smart card
  • PGP vs CA
  • Kerberos Architecture
  • Contact for WS-Identity
  • Ideas for first formal presentation

Regards,
Shayanthan

Filed under Reports

R3: Learning Kerberos

[Work done from 23rd June to 6th July 2008]

During this fortnight week we had a group meeting and we plane to do some work. And also I studied about the Kerberos Architecture and got to know about that feasibility in our project. Kerberos is good Network Authentication protocol which can be helpful for your project. And that protocol and it has a own Architecture. And it is mainly designed to provide strong authentication for client/server applications by using secret-key cryptography.

Problems Encountered:
Main problem that I had was, hard to understand about the Kerbros Architecture. Because all the terms and technologies that used there were very new for me. It was hard to gather various information from that technique. All of the  existing topics were really new for me. And It was very hard to manage the time with other academic stuff.

Overcome the Problems:
After we talked with our Supervisor Dr. Chandana Gamage, we understood some underneath structure and how its work. Then I could got some more about that Architecture. And also I read more about Kerbros Architecture.

Even though it is usual that the academic stuff is high we have to manage it anyhow.

Kanaganayagham Shayanthan – alias Shayanth

Filed under Reports

R2: Privacy and Control

[Work done from 9th June to 22nd June 2008]

As I mentioned in my earlier report, after the submitting the SRS document the entire group members held two meeting to decide how we shall proceed with this project work. In that meeting we noted down few things which were related to the physical Structure of the eID, and how we are going to achieve the Infrastructural Requirements. And we considered some way to handle the Privacy Issues. They are classified here.

  • Users should have the control over the information they share with each and other services.
  • If there are any services where abuses can happen, then we will implement a system which prompts the user to accept for an end-user agreement, which lets the service provider or the main authority to track some data to identify the people only when there is a misuse.
  • Implement the privacy-enhancing tools in the eID infrastructure to disassociate different sectors where the user is active.

And we also found we need to understand the web services and the Architecture of the web services with the cryptography world. Still I’m browsing the internet to find research papers and eBooks about web Services.

Kanaganayagham Shayanthan – alias Shayanth

Filed under Reports

R1: The Project, The Start…!

[Work done up to 8th June 2008]

At the very beginning, we had a difficulty on selecting a project idea, after discussing with the group members, we decided to do eID system as our final year project. But when we select that topic we really didn’t know what we have to do and what we have to study for this project. After our several discussions with our Dr. Chandana Gamage, we gathered some basic ideas about the eID. And also we read many  research papers related to electronic identification ans privacy preservation.

After we gathered some basic ideas about the eID, we had to prepare the proposal. First we wrote the draft proposal and got the approval from our project supervisor and finally come up with a proper proposal. After some weeks alter we had to come up with the SRS. We gathered a project meeting and divided the works among the group members. Through this we make sure that all members contribution in the SRS design.

And also we had to arrange our final year LAB in this period. We put the network cabling for the PC and, Installed the required software and OS for our LAB  Computer.

These are the things that we did during this periods.

Regards,
Kanaganayagham Shayanthan – alias Shayanth

Filed under Reports