SlideShare a Scribd company logo
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.5, September 2013
DOI:10.5121/ijfcst.2013.3501 1
SECURE FILE MANAGEMENT SYSTEM FOR
JAVA CARDS
Reza Asgari and Reza Ebrahimi Atani
Department of Computer Engineering, University of Guilan, Rasht, Iran
ABSTRACT
Today, smart cards are widely ingrained in human life and its use in various applications for
authentication, Storage and processing of sensitive information is inevitable. One of the most important
parts in the design of smart cards is their operating system, in more precisely their file management system.
In this paper, Design and implementation of a secure and dynamic file management system, that we call
SDFS, for Java cards will be evaluated. The SDFS has high compatibility with international standards
ISO/IEC 7816 that enable it to use in different operating systems that designed for java cards. To enhance
system performance in different uses and future developments, SDFS is completely designed modular.
Modular design provides easy configuration for developers in different situations. SDFS by using secure
cryptographic protocols provides security of storing and processing of information for users.
Implementation results in NetBeans IDE 7.2 show high efficiency and security of new file system in
practical usage.
KEYWORDS
File Management System, Smart Card Operating Systems, Java Card, ISO/IEC 7816
1. INTRODUCTION
Although smart card technology has been available for many decades, it is only in the last few
years that they have become widely considered as one of the most common secure computing
devices. They are encountered in a number of applications (e.g. secure wireless access in mobile
networks, banking, identification) satisfying a diverse range of uses. As a matter of fact, in the
issue of smart cards security as the most important factor have different aspects: hardware
security, security of communication protocols and coding algorithm and proper implementation
of the embedded operating system in the card [1].
File management system is one of the most important and vital modern operation systems which
should be as fast and reliable as possible. In smart cards, management system can be designed
either as a part of the card or as a separate system which works beside the operating system. In
fact, not only does the operating system allow the writing and reading the files, but also enables it
to have access to the data under the very special and controlled conditions [1,2,3].
Most of the file management systems for smart cards follow a hierarchy and tree-like pattern like
the Linux does and despite their initial structures have a symbolic addressing system which is
dependent of the physical addressing. File systems in smart cards have some features that are
designed for a structure with a limited memory. For example, prevention of large data as much as
possible, no need for an inter human-machine medium. Furthermore, free spaces resulted of
deleting one file is not necessarily given to the other files and all the addressing is based on
hexadecimal system and all the programs use rational addressing [4].
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.5, September 2013
2
Some of the challenges in file management systems are quick response, reliability and efficient
management of the memory. This study is going to declare the designing stages and
implementation if a dynamic and secure file management system (SDFS) for operating systems
based on Java cards. In fact, the main goal is to design an efficient file management system with
the following features:
 Acceleration the performing the orders of operating system and applications in access
to the files
 Increasing the security of access to the memory and preventing of unauthorized
applications to each other’s information.
 Preventing of access to sensitive and important information like keys and PINs saved
on the card
 Compatibility with different applications and operating systems designed for Java
cards
 High level of reliability in the case of error in the system and assurance of maintaining
the files in the card in a stable situation.
 Dynamism of the system in producing a new file or deleting the current files
 The ability of simple configuration of the file management system to be used in
different usage
In this research we evaluate the specifications of the SDFS. Basic concepts regarding the Java
card and international standards of the file systems in smart cards are explained in the part 2 of
the article. In continue, SDFS’s specifications, designing methods and implementation are stated
in the part 3 and 4. Discussion and evaluation also mentioned in the parts 5 and at the end of this
article conclusion and future works have been included.
2. JAVA CARD
By definition in [5] “Java Cards are pocket-size cards equipped with an embedded micro-
controller that supports the execution of a Java Virtual Machine”. These cards are usually used in
different areas such as credit and loyalty systems, health care, electronic cash, e-government, etc.
programs in Java cards are formed from a set of Java applets in a package which fetch a set of
library classes and could be installed on a card to be used.
Java card technology has a secure commentator and a several-program platform in which one can
take advantage of a variety of benefits of using Java programming like object oriented
programming, reusing of the designed programs, strongly typed language, interoperability which
means writing once and using everywhere, and the several level accessibility control system for
methods and variables [6]. Utilizing this structure has two advantages for Java cards: portability
and familiarity. In fact, Java programs are portable in all the different implementation of the Java
cards which are developed by other producers. On the other hand, since the other programmers
are familiar with the Java language, it is much easier to write and develop a program under Java
cards in comparison with the other cards [3].
One of the most eminent features of the Java card is its security model which gives a high level of
flexibility to the card’s developer as a controlling level on the applets and objects on the card.
Bytecode evaluator which forms a part of the transformer seeks to assure that none of the
programs are using the resources out of its authority. Transformed applets, known as CAP, are
registered as a developing packet and use a security key i.e., DES, which card check it once the
CAP file is being loaded [3]. To check it in the loading time, Java card used a firewall software
mechanism which explicitly joins the object to its applet and prevents of other applets’ access [5].
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.5, September 2013
3
These two security mechanisms together allow the developer of the card to design a security
structure which enables the multi-program cards to be developed with one or more programs and
load the canals and have an acceptable security level for other programs.
Java card system relies upon a Java Card Routine Environment (JCRE) to develop the resources,
run the programs and applying an access controlling mechanism. JCRE is part of the Java card
which should be prepared by the manufacturer of the Java card. It consists of a local operating
system, Java Card Virtual Machine (JCVM) and several Application Programming Interfaces
(APIs). Structure of java card is shown in Figure 1.
Figure 1. Basic Structure of java card [3].
As said earlier, most of the operating systems have a modern file structure. In modern file
structures, files are performed in an object-oriented way which means that the file’s information
is saved in the file itself. Therefore, each file is consisted of two parts: the header part and the
body. In the header part, some info about the file format and access way to the info is saved. This
info never changes and is saved toward deleting. However, the info in the body of the file
includes the operator’s information or other application programs and can be changed repeatedly.
Files are usually formed and numbered during the production and after that, just a limited changes
are done in the contents. While using a card, a file might become active or inactive. Mostly, the
info in the smart cards is permanent and not deleted. However, there are a few operating systems
which do not follow this feedback operation. Programs’ files are saved on the EEPROM memory
which becomes activate after making a file on the Java card. This file can be selected by different
programs to be in access. Choosing a file means activating it and deactivating the other files.
After being activated, one can get access to the file’s contents. A file becomes activate and
inactivate again and again. Files, if supported by the operating system, can be deleted from a card
through special commands. When a card is destroyed, the life of all its files comes to an end.
A file in the smart card has a reverse tree structure similar to the Linux. A sample of this structure
is shown in Figure 2. There are two main files: Dedicated file (DF) and Elementary File (EF). At
the top of the tree, there is a master file which is kind of a DF and considered as the root of the
tree. By each operating the card, MF becomes implicitly activated. In fact, MF is a special kind of
DF which has all the information of the directories, files and all the areas to access the card.
Smart Card Hardware
Java Card Virtual Machine
Java Card Class Library
Applet
A Secure
Applet/File
Download
Applet
B
Applet
C
Native Applications
File Management SystemCard Operating System
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.5, September 2013
4
Figure 2. Sample file structure in smart cards
DF file can embed other files of DF and EF. There is a special kind of DF called Application DF
(ADF) which keeps all the programs’ information and could be considered a special MF.
According to the ISO/IEC 7815 a tree can be extended as much as the memory allows. EF retains
the information of an operator for a special program and has two types: Inter EF to save the
internal data of the operating system and programs, and Working EF for data and programs
which should be read or written by a terminal [7, 9].
In object-oriented systems, one should first select the file to have access to its contents. In this
system, each time just one file can be selected which means a successful selection of a new file
the previous one would be invalid. Access to a file is through its name and each file must have a
name. This name must be perceivable amongst the files of the same level so as to for several files
with the same name the selecting file algorithm by the operating system could be independent of
the searching algorithm [1].
Different policies are defined for access to each of the files. MF can be called everywhere. In
addition, in the beginning of the card operation, this file can be implicitly selected. DF can be
accessed by the MF and the other same-level DFs. EF can be just called by the father MF or DF.
3. SECURE FILE MANAGEMENT SYSTEM
In SDFS memory is divided into segments with fixed length, called pages. Information about a
file can be stored in one or more page. SDFS manage and store files with pointers, page table
(PT) and child table (CT). To increase the security of information, pages are assigned randomly to
the files. This work by creating intentional irregularity in memory causing that in the attacks that
memory is read by attacker, finding information about the memory structure to be more difficult
for attackers. The file manager holds a list of empty memory pages to assign it to a file when need
it. Only the file manager has access to these information and other applications should have
access to their information with authentication.
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.5, September 2013
5
CTs allow the file system when adding a file to the file tree, the tree is no longer need to update
the parent data of the file and only is needed to add one entry to its CT. After restarting the card,
SDFS select the MF automatically. In this structure, each DF refers to its CT via a pointer. CT
contains information about location of the file children. Each EF is connected to its PT that
contains address of file pages in memory. Using this table helps SDFS to allocate new page to the
file easily and prevent from external fragmentation in memory. Also when SDFS delete a file,
then file pages can be allocated to other programs. This structure exhibited in Figure 3.
Figure 3. A sample implementation of file tree, that shown in Figure 2, in SDFS
All information about the programs and codes are stored in the elementary files. Unlike files in
windows, EFs on the smart card have an internal structure that is defined in according to the file
target. This feature allows the data components to be accessed very fast and efficient.
All memory accesses will be done only through the file management system, this work prevent
illegal access to the memory. Figure 4 illustrates how to manage accesses to memory. Steps of
running commands in SDSF described in the follow:
 All applications or operating system commands to access the memory should be sent to
the file manager unit.
 Input command is sent to the command interpreter unit through the file manager unit.
 If the command is successfully interpreted, command interpreter unit send information
related to the command to the file manager unit. Otherwise, warning and error center unit
send a message proportional to the occurred error to output
 After extracting information from the command, file manager unit send a message to
security policy manager unit. Security policy manager unit has a duty to check the
security policy defined for the selected file and input requests. If the access request is not
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.5, September 2013
6
consistent with the defined policies, the file manager is announced. Otherwise security
policy manager return an appropriated error message.
 File manager checks the returned answer from the security policy manager unit. If the
response is an error, file manager return a warning message via warning and error center
unit to the output. Otherwise file manager based on the security modes are defined in
system, a request for checking keys, encrypting or decrypting input data to be sent to
cryptography and key management unit.
 Cryptography and key management unit has duty to perform encryption/decryption
operations and key management. This unit checks file manager requests and after
performing cryptographic operations return appropriate answer to it.
Figure 4. Input instructions management in SDFS
 If previous step done without any errors, the file manager will send the required
information to the memory manager unit. Otherwise, warning and error center unit return
an appropriated error message to output.
 Memory manager unit has duty to converting logical addresses to physical memory
addresses and controlling legal accesses to memory addresses. If an error occurs, the error
is sent to output through the warning and error center unit. Otherwise, via memory
interface unit requested operations are performed in memory.
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.5, September 2013
7
 Memory interface unit is an interface between memory manager and memory and has
duty to access memory cells. Memory interface unit after performing operations on
memory return appropriate answer to memory manager.
 If the memory manager will receive an error message from the memory interface, an error
is sent to output through the warning and error center unit. Otherwise it returns the results
to the file manager.
 If necessary, file manager send the obtained information to cryptography and key
management unit.
 After these processes, file manager unit delivers the results of input request to the user,
operating system or application.
Three types of security policy is considered in SDFS: public security (including general security
policy), file specific security (including security policies such as access rules associated with a
particular file), and instruction specific security (related to security policies applied for before,
during and after execution of an instruction).
SDFS supports the standard cryptographic algorithms including AES, DES, Triple-DES, RSA,
and SHA-1 [6, 7] and allows to operating system developers based on their needs select suitable
cryptography algorithm in configuration time. In addition, conditions are provided to developers
that they can easily implement their own cryptography algorithms and use them in SDFS.
Usually the smart card operating systems cede responsibility of authentication process to
applications. This work can cause security problems on smart cards [8]. SDFS using
authentication method that described in [8, 10], with slightly modified for compatibility with
SDFS, for ensure the accuracy of the authentication process. This work ensures developers that
don’t worry about design, implementation, test and evaluation of theirs communication protocol.
In In this method, for each user (application) that aims to establish a secure connection with
system we need to have a public key certificate on the card.
The authentication operation is briefly as follows:
 Request for communication starts from the user (application). The request is sent to card
via a message.
 In the second step the user and card agree on a temporary common session key CSK.
Algorithm using Diffie-Hellman key exchange algorithm for doing this work. After this
stage, the parties have agreed on one key for encryption operations but still not
authenticate each other.
 After agreeing on a common key, user hash own public key certificate by a hash function
(using the algorithm RSA) and send it to the card.
 Card compare certificate that submitted by user with user certificate that stored in card. If
the certificate was approved and user has legal access, then card create an encrypted
message M, with user public key, and send it to the user. M obtained from random
number R, key K that obtained from hashed CSK by using hash function F1 and card
serial number S.
 User decrypts M with his private key and extracts R as R’, K and S. user generate key K’,
that obtained from hashed CSK by hash function F1, and compare it with K. If K and K’
are equal then user can confirm the identity of the card.
 After authentication card by user, user generates temporary key Kt by using function F.
User encrypt R’ and final session key, that used for future communications, with Kt and
send it to the card.
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.5, September 2013
8
 Card regenerate key Kt by function F and decrypt user message. Card extract R’ from
user message and compare it with R, if R and R’ are equal then card can confirm the
identity of the user. User and card using final session key for future communications.
Using this work will ensure the parties that the message has not retransmitted by an intermediate
(attacker). If all steps are executed successfully, the session key help card and user can have a
secure connection for the exchange of information.
4. IMPLEMENTATION
Implementation of SDFS has been done by using the NetBeans IDE 7.2, which use java card
manager Tool that provides functionality to manage content loaded on smart cards of java card
technology. Contains APDU manager which enables sending of APDU commands to card or
JCWDE simulator [12]. For maximum compatibility with existing operating systems, SDFS is
designed and implemented completely modular and based on the international standards so each
file system features in one module can easily be added to, or removed from the system.
Modular implementation of system allow us to easily configure the SDFS suit to our needs and
paved the way for future developments. To avoid programming faults in a configuration of SDFS,
a GUI for system configuration is designed. This interface allows the system designer to choose
the required properties.
SDFS can have a separate encryption mechanism so that the operating system and applications
can benefit from it (For example, the technique that used in the authentication). Based on this,
possibility of select a default cryptography and hash algorithms is provided for designers and
developers. If user selects this option, SDFS defined cryptographic classes as standard structure
(The input and output parameters and functions name) for programmers that they can easily write
their own codes and don't need to know about other parts of file system.
To review a practical example, the paper will continue to investigate the CREATE FILE
command. This command has the task of creating a file in the defined path in file tree. With the
correct run of the command, SDFS assign required memory to the file. Immediately after creating
the file, file system select the file. APDU format in SDFS is as Figure 5 and Figure 6 represent a
command for creating an EF file exactly under the MF in file tree that shown in Figure 2.
Figure 5. APDU format in SDFS is standard APDU format that defined in international standard ISO/IEC
7816. CLA represent class byte of instruction; Instruction encoded by INS; P1-P2 indicates controls and
options for processing the command; Lc encode the number of bytes in the command data field; Data field
contain data value of instruction; Le encode the maximum number of bytes expected in the response data
field; Response Data contain card answer to the request; Status bytes denoted SW1-
SW1-SW2
Response
Data
LeDataLcP1-P2INSCLA
←2 B →←Nr B →
←0,1,2 or 3 B
→
←Nc B
→
←0,1 or 3 B
→
←2 B→←1 B →←1 B →
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.5, September 2013
9
SW2
Figure 6. Create an EF under the MF in file tree that shown in Figure 2. The picture is part of java card
console windows in NetBeans IDE. The status bytes SW1-SW2: 9000 means that the command
successfully done.
5. DISCUSSION AND EVALUATION
The results of our practical experience in execution different commands of SDFS show that
between 69% to 86% of running time is related to cryptographic algorithms. These results
Obtained from the average Ratio of executing commands without using cryptographic algorithms
to commands using cryptographic algorithms (software implementation) in different conditions
and with repeated 100 times. Therefore selecting a fast cryptographic algorithm could greatly
enhance the speed of execution. However should be noted that taking a fast encryption algorithm
does not lead to low levels of system security.
Since some of cryptographic algorithms such as DES or SHA-1 can implement on java card
hardware, therefore choose of embedded cryptographic algorithms can greatly enhance execution
speed. In addition to support this type of cryptographic algorithms (implemented using library
functions to run on hardware), the file system provide conditions that designers and developers
can use of their desire cryptographic algorithms (however, due to the structure defined for the
cryptographic class in configuration time).
Another key feature proposed for the file system is reliability. SDFS ensuring the reliability of the
system with the following characteristics:
 File system by using a secure key management system ensures that only programs that
have a legal condition can access to a particular file.
 The file system by using information encryption and random allocation of memory
pages ensures that if memory data disclosed, by attacks like full memory read attack,
information of applications stay highly safe. Although we can't fully ensure that
information remains confidential, but it can helps to information to be highly safe.
 Files that are in the steady state before failures occur shouldn’t be damaged. SDFS
with temporary storage of changes in journal file ensure that until a transaction
successful not complete, files don't change.
Card ready to use
Select SDFS
Create file INS:E0
File Data that used by
SDFS for create and
initialize header and
body of new file
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.5, September 2013
10
 If system crash, file system journaling technique help to ensure the recovery of
damaged file and lead to stable state.
Keys and PINs are sensitive information that security of other information in memory largely
depend on it. Based on this, file system using secure one-way hash algorithms to ensure that
sensitive data can’t be recovered under any circumstances.
The algorithm was introduced using one-way and two-way authentication and agrees on a session
key to provide establishing a secure connection. This structure provides the possibility of
communicating with different keys for each session with storing a certificate key. The file system
allows when need to change keys of an application, after authentication, application keys can
rewrite by file system (Except for special cases where the key is stored on ROM memory).
Although the algorithm is slower than the simple exchange of keys for authentication, but using
this method greatly increases the security of the authentication and prevent many attacks like man
in the middle attacks. Also, since the different steps of the algorithm using functions on standard
algorithms such as RSA, if using the authentication algorithm in cards that have hardware
implementation of cryptographic algorithms, execution speed will improve greatly.
One of the goals in SDFS design is design a comprehensive file management system that can be
used in all Java card operating systems or as a separate application. Based on this, system design
and implementation is completely modular.
File system is compatible with existing international standards of smart card (especially ISO /
IEC 7816) and as much as possible tried to made high consistency between the implementation of
commands and standards. Also modular structure allows the programmers to define and
implement their cryptographic algorithms and use them in SDFS (by consider predefined format
of input and output). For simplicity and to avoid possible faults in the configuration steps, a
graphical interface designed to help users to configure DFS based on their needs.
To enhance the software code security, from point of information flow security at run-time on
smart cards, different configurations of file systems have been analyzed by JCSI (Java Card
Secure Information flow) [11]. JCSI is a tool for checking secure information flow in Java Card
applications. The tool performs a static analysis of Java Card CAP files. The analysis is based on
the theory of abstract interpretation and on a multi-level security policy assignment. Actual values
of variables are abstracted into security levels, and bytecode instructions are executed over an
abstract domain. This tool used for discovering security issues due to explicit or implicit
information flows and for checking security properties of SDFS.
6. CONCLUSION
This article deals with a new file management system for Java Cards. Dynamics and safety are
features of this new file management system (SDFS). SDFS allows to system developers for
configure file System with their needs. Using of cryptography algorithms and key management
system in SDFS enables it to provide high level of security commensurate with the needs of users.
As well as use of a modular structure in system design allow developers to use of their intended
encryption algorithms in control conditions.
The authors intend to continue this process to design and implement a dynamic and secure
operating system for java cards. The new operating system will be designed, like SDFS, fully
compatible with java cards until users can simply configure the operating system according to
their needs to having a safe and secure operating system.
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.5, September 2013
11
REFERENCES
[1] Keith, E., & Konstantinos M., (2008) Smart Cards, Tokens, Security and Applications, Springer.
[2] Rankal, W., & Effing, W., (2010) Smart Card handbook 4th edition, Wiley & Sons Publishing.
[3] Hendry, M., (2007) Multi Application Smart Cards Technology and Applications, Cambridge
University Press.
[4] Gustavo, B., Cristina, C., Nora, S., & Tasistro, A., (1999) “Specification of a Smart Card Operating
System”, International Workshop on Types for Proofs and Programs, pp. 77-93.
[5] (2003) “Identification cards — Integrated circuit cards — Part 4: Organization, security and
commands for interchange”, International Organization for Standardization and the International
Electrotechnical Commission.
[6] Eisenbarth, T., & Kumar, S., (2007) “A Survey of Lightweight-Cryptography Implementations”,
Design & Test of Computers, Vol. 24, pp. 522 – 533.
[7] Bart, P., (2007) “A survey of recent developments in cryptographic algorithms for smart cards”,
Computer Networks, Vol. 51, pp. 2223–2233.
[8] Konstantinos, R., & Konstantinos, M., (2004) “An Asymmetric Cryptography Secure Chanel Protocol
for Smart Cards”, 19th International Information Security Conference, France, pp. 22-27.
[9] Karger, P., McIntosh, S., Palmer, E., Toll, D., & Weber, S., (2011) “Lessons Learned Building the
Caernarvon High-Assurance Operating System”, Security & Privacy, IEEE, Vol. 1, pp. 22-30.
[10] Scherzer, H., Canetti, R., Karger, P. A., Krawczyk, H., Rabin, T., Toll, D. C., (2003) “Authenticating
Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card”, Computer
Security – ESORICS, Springer, pp 181-200.
[11] Marco, A., Cinzia, B., Nicoletta, F., & Paolo, M., (2012) “JCSI: A tool for checking secure
information flow in Java Card applications”, Systems and Software, Vol. 85, pp. 2479-2493.
[12] http://plugins.netbeans.org/plugin/10935/java-card-manager.
Authors
Reza Asgari
Reza Asgari was born in Iran, Ghazvin. He recieved his BSc degree from university of
Guilan, Iran in 2011. He is now MSc student at university of Guilan, Iran. His research
interests in operating system and database security.
Reza Ebrahimi Atani
Reza Ebrahimi Atani received his BSc degree from university of Guilan, Rasht, Iran in
2002. He also recieved MSc and PhD degrees all from Iran University of Science and
Technology, Tehran, Iran in 2004 and 2010 respectively. Currently, he is the faculty
member and assistant professor at faculty of engineering, University of Guilan. His
research interests in cryptography, computer security, network security, information
hiding and VLSI design.

More Related Content

What's hot

Introduction to mobile programing (J2ME)
Introduction to mobile programing (J2ME)Introduction to mobile programing (J2ME)
Introduction to mobile programing (J2ME)Wambua Wambua
 
Ijetcas14 583
Ijetcas14 583Ijetcas14 583
Ijetcas14 583
Iasir Journals
 
Ch3 OS
Ch3 OSCh3 OS
Ch3 OSC.U
 
Software Engineering
Software EngineeringSoftware Engineering
Database Management System users
Database Management System usersDatabase Management System users
Database Management System users
Raj vardhan
 
An Analyzing of different Techniques and Tools to Recover Data from Volatile ...
An Analyzing of different Techniques and Tools to Recover Data from Volatile ...An Analyzing of different Techniques and Tools to Recover Data from Volatile ...
An Analyzing of different Techniques and Tools to Recover Data from Volatile ...
ijsrd.com
 
Database Security - IG
Database Security - IGDatabase Security - IG
Database Security - IG
Anne Lee
 
database ppt(2)
database ppt(2)database ppt(2)
database ppt(2)
EshetuGeletu2
 
Operating system
Operating systemOperating system
Ceis 7
Ceis 7Ceis 7

What's hot (11)

Introduction to mobile programing (J2ME)
Introduction to mobile programing (J2ME)Introduction to mobile programing (J2ME)
Introduction to mobile programing (J2ME)
 
Ijetcas14 583
Ijetcas14 583Ijetcas14 583
Ijetcas14 583
 
Ch3 OS
Ch3 OSCh3 OS
Ch3 OS
 
OS_Ch3
OS_Ch3OS_Ch3
OS_Ch3
 
Software Engineering
Software EngineeringSoftware Engineering
Software Engineering
 
Database Management System users
Database Management System usersDatabase Management System users
Database Management System users
 
An Analyzing of different Techniques and Tools to Recover Data from Volatile ...
An Analyzing of different Techniques and Tools to Recover Data from Volatile ...An Analyzing of different Techniques and Tools to Recover Data from Volatile ...
An Analyzing of different Techniques and Tools to Recover Data from Volatile ...
 
Database Security - IG
Database Security - IGDatabase Security - IG
Database Security - IG
 
database ppt(2)
database ppt(2)database ppt(2)
database ppt(2)
 
Operating system
Operating systemOperating system
Operating system
 
Ceis 7
Ceis 7Ceis 7
Ceis 7
 

Viewers also liked

Edge tenacity in cycles and complete
Edge tenacity in cycles and completeEdge tenacity in cycles and complete
Edge tenacity in cycles and complete
ijfcstjournal
 
Video Trends Sobcon 2007
Video Trends Sobcon 2007Video Trends Sobcon 2007
Video Trends Sobcon 2007
Rodney Rumford
 
ICDC2012 - 我要征服臺南牛肉湯計畫介紹 (開幕Special issue)
ICDC2012 -  我要征服臺南牛肉湯計畫介紹 (開幕Special issue)ICDC2012 -  我要征服臺南牛肉湯計畫介紹 (開幕Special issue)
ICDC2012 - 我要征服臺南牛肉湯計畫介紹 (開幕Special issue)小均 張
 
bergspitz
bergspitzbergspitz
bergspitz
Melanie Obrist
 
A galinha ruiva_e_o_outono
A galinha ruiva_e_o_outonoA galinha ruiva_e_o_outono
A galinha ruiva_e_o_outono
Elisabete Valente
 
On the principle of optimality for linear stochastic dynamic system
On the principle of optimality for linear stochastic dynamic systemOn the principle of optimality for linear stochastic dynamic system
On the principle of optimality for linear stochastic dynamic system
ijfcstjournal
 
Gabaritos 5 e 6 semestres 2015 1
Gabaritos 5 e 6  semestres 2015 1Gabaritos 5 e 6  semestres 2015 1
Gabaritos 5 e 6 semestres 2015 1
pablonaba
 
자연농법 삶애농장 농사펀드를 만나다 farming fund natural Korean ginseng
자연농법 삶애농장 농사펀드를 만나다 farming fund natural Korean ginseng자연농법 삶애농장 농사펀드를 만나다 farming fund natural Korean ginseng
자연농법 삶애농장 농사펀드를 만나다 farming fund natural Korean ginseng
민성 한
 
4 projeto contos e encantos
4 projeto contos e encantos4 projeto contos e encantos
4 projeto contos e encantosjuniorfuleragem
 
從憤怒到協作:我的超展開g0v之旅
從憤怒到協作:我的超展開g0v之旅從憤怒到協作:我的超展開g0v之旅
從憤怒到協作:我的超展開g0v之旅
Hsiao-wei Chiu
 
BTO Educational - Consiglio Direttivo - 19 novembre 2010
BTO Educational - Consiglio Direttivo - 19 novembre 2010BTO Educational - Consiglio Direttivo - 19 novembre 2010
BTO Educational - Consiglio Direttivo - 19 novembre 2010
BTO Educational
 
고뇌의 고통이 없는 켤레 경사도 기법 개론(1과 1/4판)
고뇌의 고통이 없는 켤레 경사도 기법 개론(1과 1/4판)고뇌의 고통이 없는 켤레 경사도 기법 개론(1과 1/4판)
고뇌의 고통이 없는 켤레 경사도 기법 개론(1과 1/4판)
Changwon National University
 
Ambient AI, Advertising & Technology
Ambient AI, Advertising & TechnologyAmbient AI, Advertising & Technology
Ambient AI, Advertising & Technology
Ann Wuyts
 
Gabaritos av integrada 1 e 2 semestres módulo comunicação e história 2015 01 ...
Gabaritos av integrada 1 e 2 semestres módulo comunicação e história 2015 01 ...Gabaritos av integrada 1 e 2 semestres módulo comunicação e história 2015 01 ...
Gabaritos av integrada 1 e 2 semestres módulo comunicação e história 2015 01 ...
pablonaba
 
Acta medica-1-11
Acta medica-1-11Acta medica-1-11
Acta medica-1-11
Georgi Daskalov
 
Приказ о распределении субсидий_Март 2014
Приказ о распределении субсидий_Март 2014Приказ о распределении субсидий_Март 2014
Приказ о распределении субсидий_Март 2014Water_of_Russia
 
What is Clean Label?
What is Clean Label?What is Clean Label?
7 projeto saúde bucal no formulário 2013
7 projeto saúde bucal no formulário 20137 projeto saúde bucal no formulário 2013
7 projeto saúde bucal no formulário 2013juniorfuleragem
 
[7/10] - Pessoas Negativas
[7/10] - Pessoas Negativas[7/10] - Pessoas Negativas
[7/10] - Pessoas Negativas
Miguel Duarte
 
Graduate Engineers Training Photos - Vasco Da Gama - By Sadashiv Borgaonkar (...
Graduate Engineers Training Photos - Vasco Da Gama - By Sadashiv Borgaonkar (...Graduate Engineers Training Photos - Vasco Da Gama - By Sadashiv Borgaonkar (...
Graduate Engineers Training Photos - Vasco Da Gama - By Sadashiv Borgaonkar (...
Sadashiv Borgaonkar
 

Viewers also liked (20)

Edge tenacity in cycles and complete
Edge tenacity in cycles and completeEdge tenacity in cycles and complete
Edge tenacity in cycles and complete
 
Video Trends Sobcon 2007
Video Trends Sobcon 2007Video Trends Sobcon 2007
Video Trends Sobcon 2007
 
ICDC2012 - 我要征服臺南牛肉湯計畫介紹 (開幕Special issue)
ICDC2012 -  我要征服臺南牛肉湯計畫介紹 (開幕Special issue)ICDC2012 -  我要征服臺南牛肉湯計畫介紹 (開幕Special issue)
ICDC2012 - 我要征服臺南牛肉湯計畫介紹 (開幕Special issue)
 
bergspitz
bergspitzbergspitz
bergspitz
 
A galinha ruiva_e_o_outono
A galinha ruiva_e_o_outonoA galinha ruiva_e_o_outono
A galinha ruiva_e_o_outono
 
On the principle of optimality for linear stochastic dynamic system
On the principle of optimality for linear stochastic dynamic systemOn the principle of optimality for linear stochastic dynamic system
On the principle of optimality for linear stochastic dynamic system
 
Gabaritos 5 e 6 semestres 2015 1
Gabaritos 5 e 6  semestres 2015 1Gabaritos 5 e 6  semestres 2015 1
Gabaritos 5 e 6 semestres 2015 1
 
자연농법 삶애농장 농사펀드를 만나다 farming fund natural Korean ginseng
자연농법 삶애농장 농사펀드를 만나다 farming fund natural Korean ginseng자연농법 삶애농장 농사펀드를 만나다 farming fund natural Korean ginseng
자연농법 삶애농장 농사펀드를 만나다 farming fund natural Korean ginseng
 
4 projeto contos e encantos
4 projeto contos e encantos4 projeto contos e encantos
4 projeto contos e encantos
 
從憤怒到協作:我的超展開g0v之旅
從憤怒到協作:我的超展開g0v之旅從憤怒到協作:我的超展開g0v之旅
從憤怒到協作:我的超展開g0v之旅
 
BTO Educational - Consiglio Direttivo - 19 novembre 2010
BTO Educational - Consiglio Direttivo - 19 novembre 2010BTO Educational - Consiglio Direttivo - 19 novembre 2010
BTO Educational - Consiglio Direttivo - 19 novembre 2010
 
고뇌의 고통이 없는 켤레 경사도 기법 개론(1과 1/4판)
고뇌의 고통이 없는 켤레 경사도 기법 개론(1과 1/4판)고뇌의 고통이 없는 켤레 경사도 기법 개론(1과 1/4판)
고뇌의 고통이 없는 켤레 경사도 기법 개론(1과 1/4판)
 
Ambient AI, Advertising & Technology
Ambient AI, Advertising & TechnologyAmbient AI, Advertising & Technology
Ambient AI, Advertising & Technology
 
Gabaritos av integrada 1 e 2 semestres módulo comunicação e história 2015 01 ...
Gabaritos av integrada 1 e 2 semestres módulo comunicação e história 2015 01 ...Gabaritos av integrada 1 e 2 semestres módulo comunicação e história 2015 01 ...
Gabaritos av integrada 1 e 2 semestres módulo comunicação e história 2015 01 ...
 
Acta medica-1-11
Acta medica-1-11Acta medica-1-11
Acta medica-1-11
 
Приказ о распределении субсидий_Март 2014
Приказ о распределении субсидий_Март 2014Приказ о распределении субсидий_Март 2014
Приказ о распределении субсидий_Март 2014
 
What is Clean Label?
What is Clean Label?What is Clean Label?
What is Clean Label?
 
7 projeto saúde bucal no formulário 2013
7 projeto saúde bucal no formulário 20137 projeto saúde bucal no formulário 2013
7 projeto saúde bucal no formulário 2013
 
[7/10] - Pessoas Negativas
[7/10] - Pessoas Negativas[7/10] - Pessoas Negativas
[7/10] - Pessoas Negativas
 
Graduate Engineers Training Photos - Vasco Da Gama - By Sadashiv Borgaonkar (...
Graduate Engineers Training Photos - Vasco Da Gama - By Sadashiv Borgaonkar (...Graduate Engineers Training Photos - Vasco Da Gama - By Sadashiv Borgaonkar (...
Graduate Engineers Training Photos - Vasco Da Gama - By Sadashiv Borgaonkar (...
 

Similar to SECURE FILE MANAGEMENT SYSTEM FOR JAVA CARDS

Java Abs Java Productivity Creator & Analyzer
Java Abs   Java Productivity Creator & AnalyzerJava Abs   Java Productivity Creator & Analyzer
Java Abs Java Productivity Creator & Analyzer
ncct
 
Multi-part Dynamic Key Generation For Secure Data Encryption
Multi-part Dynamic Key Generation For Secure Data EncryptionMulti-part Dynamic Key Generation For Secure Data Encryption
Multi-part Dynamic Key Generation For Secure Data Encryption
CSCJournals
 
Defensive coding practices is one of the most critical proactive s
Defensive coding practices is one of the most critical proactive sDefensive coding practices is one of the most critical proactive s
Defensive coding practices is one of the most critical proactive s
LinaCovington707
 
Hybrid Cryptography Algorithm Based Secured Storage Android App
Hybrid Cryptography Algorithm Based Secured Storage Android AppHybrid Cryptography Algorithm Based Secured Storage Android App
Hybrid Cryptography Algorithm Based Secured Storage Android App
IRJET Journal
 
Operating Systems R20 Unit 1.pptx
Operating Systems R20 Unit 1.pptxOperating Systems R20 Unit 1.pptx
Operating Systems R20 Unit 1.pptx
Prudhvi668506
 
A cloud environment for backup and data storage
A cloud environment for backup and data storageA cloud environment for backup and data storage
A cloud environment for backup and data storage
IGEEKS TECHNOLOGIES
 
A cloud enviroment for backup and data storage
A cloud enviroment for backup and data storageA cloud enviroment for backup and data storage
A cloud enviroment for backup and data storage
IGEEKS TECHNOLOGIES
 
Data Sharing: Ensure Accountability Distribution in the Cloud
Data Sharing: Ensure Accountability Distribution in the CloudData Sharing: Ensure Accountability Distribution in the Cloud
Data Sharing: Ensure Accountability Distribution in the Cloud
Suraj Mehta
 
Distributed virtual disk storage system
Distributed virtual disk storage systemDistributed virtual disk storage system
Distributed virtual disk storage system
Alexander Decker
 
11.distributed virtual disk storage system
11.distributed virtual disk storage system11.distributed virtual disk storage system
11.distributed virtual disk storage system
Alexander Decker
 
Improving data confidentiality in personal computer environment using on line...
Improving data confidentiality in personal computer environment using on line...Improving data confidentiality in personal computer environment using on line...
Improving data confidentiality in personal computer environment using on line...Damir Delija
 
IRJET- A Survey on File Storage and Retrieval using Blockchain Technology
IRJET- A Survey on File Storage and Retrieval using Blockchain TechnologyIRJET- A Survey on File Storage and Retrieval using Blockchain Technology
IRJET- A Survey on File Storage and Retrieval using Blockchain Technology
IRJET Journal
 
Operasting system service
Operasting system serviceOperasting system service
Operasting system service
KarthigaGunasekaran1
 
Resist Dictionary Attacks Using Password Based Protocols For Authenticated Ke...
Resist Dictionary Attacks Using Password Based Protocols For Authenticated Ke...Resist Dictionary Attacks Using Password Based Protocols For Authenticated Ke...
Resist Dictionary Attacks Using Password Based Protocols For Authenticated Ke...
IJERA Editor
 
ITT Project Information Technology Basic
ITT Project Information Technology BasicITT Project Information Technology Basic
ITT Project Information Technology Basic
Mayank Garg
 
Paper id 712019116
Paper id 712019116Paper id 712019116
Paper id 712019116
IJRAT
 
Study notes for CompTIA Certified Advanced Security Practitioner (ver2)
Study notes for CompTIA Certified Advanced Security Practitioner  (ver2)Study notes for CompTIA Certified Advanced Security Practitioner  (ver2)
Study notes for CompTIA Certified Advanced Security Practitioner (ver2)
David Sweigert
 
Development of Farm Records Software
Development of Farm Records SoftwareDevelopment of Farm Records Software
Development of Farm Records Software
Oyeniyi Samuel
 
Kernel
KernelKernel
Kernel
Abu Azzam
 

Similar to SECURE FILE MANAGEMENT SYSTEM FOR JAVA CARDS (20)

Java Abs Java Productivity Creator & Analyzer
Java Abs   Java Productivity Creator & AnalyzerJava Abs   Java Productivity Creator & Analyzer
Java Abs Java Productivity Creator & Analyzer
 
Multi-part Dynamic Key Generation For Secure Data Encryption
Multi-part Dynamic Key Generation For Secure Data EncryptionMulti-part Dynamic Key Generation For Secure Data Encryption
Multi-part Dynamic Key Generation For Secure Data Encryption
 
Defensive coding practices is one of the most critical proactive s
Defensive coding practices is one of the most critical proactive sDefensive coding practices is one of the most critical proactive s
Defensive coding practices is one of the most critical proactive s
 
Hybrid Cryptography Algorithm Based Secured Storage Android App
Hybrid Cryptography Algorithm Based Secured Storage Android AppHybrid Cryptography Algorithm Based Secured Storage Android App
Hybrid Cryptography Algorithm Based Secured Storage Android App
 
INTRODUCTION
INTRODUCTIONINTRODUCTION
INTRODUCTION
 
Operating Systems R20 Unit 1.pptx
Operating Systems R20 Unit 1.pptxOperating Systems R20 Unit 1.pptx
Operating Systems R20 Unit 1.pptx
 
A cloud environment for backup and data storage
A cloud environment for backup and data storageA cloud environment for backup and data storage
A cloud environment for backup and data storage
 
A cloud enviroment for backup and data storage
A cloud enviroment for backup and data storageA cloud enviroment for backup and data storage
A cloud enviroment for backup and data storage
 
Data Sharing: Ensure Accountability Distribution in the Cloud
Data Sharing: Ensure Accountability Distribution in the CloudData Sharing: Ensure Accountability Distribution in the Cloud
Data Sharing: Ensure Accountability Distribution in the Cloud
 
Distributed virtual disk storage system
Distributed virtual disk storage systemDistributed virtual disk storage system
Distributed virtual disk storage system
 
11.distributed virtual disk storage system
11.distributed virtual disk storage system11.distributed virtual disk storage system
11.distributed virtual disk storage system
 
Improving data confidentiality in personal computer environment using on line...
Improving data confidentiality in personal computer environment using on line...Improving data confidentiality in personal computer environment using on line...
Improving data confidentiality in personal computer environment using on line...
 
IRJET- A Survey on File Storage and Retrieval using Blockchain Technology
IRJET- A Survey on File Storage and Retrieval using Blockchain TechnologyIRJET- A Survey on File Storage and Retrieval using Blockchain Technology
IRJET- A Survey on File Storage and Retrieval using Blockchain Technology
 
Operasting system service
Operasting system serviceOperasting system service
Operasting system service
 
Resist Dictionary Attacks Using Password Based Protocols For Authenticated Ke...
Resist Dictionary Attacks Using Password Based Protocols For Authenticated Ke...Resist Dictionary Attacks Using Password Based Protocols For Authenticated Ke...
Resist Dictionary Attacks Using Password Based Protocols For Authenticated Ke...
 
ITT Project Information Technology Basic
ITT Project Information Technology BasicITT Project Information Technology Basic
ITT Project Information Technology Basic
 
Paper id 712019116
Paper id 712019116Paper id 712019116
Paper id 712019116
 
Study notes for CompTIA Certified Advanced Security Practitioner (ver2)
Study notes for CompTIA Certified Advanced Security Practitioner  (ver2)Study notes for CompTIA Certified Advanced Security Practitioner  (ver2)
Study notes for CompTIA Certified Advanced Security Practitioner (ver2)
 
Development of Farm Records Software
Development of Farm Records SoftwareDevelopment of Farm Records Software
Development of Farm Records Software
 
Kernel
KernelKernel
Kernel
 

More from ijfcstjournal

ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...
ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...
ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...
ijfcstjournal
 
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLING
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLINGA SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLING
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLING
ijfcstjournal
 
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLESA COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
ijfcstjournal
 
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...
ijfcstjournal
 
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
ijfcstjournal
 
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
ijfcstjournal
 
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
ijfcstjournal
 
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDINGAN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
ijfcstjournal
 
EAGRO CROP MARKETING FOR FARMING COMMUNITY
EAGRO CROP MARKETING FOR FARMING COMMUNITYEAGRO CROP MARKETING FOR FARMING COMMUNITY
EAGRO CROP MARKETING FOR FARMING COMMUNITY
ijfcstjournal
 
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHSEDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS
ijfcstjournal
 
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEM
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEMCOMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEM
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEM
ijfcstjournal
 
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMSPSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
ijfcstjournal
 
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...
ijfcstjournal
 
A MUTATION TESTING ANALYSIS AND REGRESSION TESTING
A MUTATION TESTING ANALYSIS AND REGRESSION TESTINGA MUTATION TESTING ANALYSIS AND REGRESSION TESTING
A MUTATION TESTING ANALYSIS AND REGRESSION TESTING
ijfcstjournal
 
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...
ijfcstjournal
 
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCHA NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
ijfcstjournal
 
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKS
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKSAGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKS
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKS
ijfcstjournal
 
International Journal on Foundations of Computer Science & Technology (IJFCST)
International Journal on Foundations of Computer Science & Technology (IJFCST)International Journal on Foundations of Computer Science & Technology (IJFCST)
International Journal on Foundations of Computer Science & Technology (IJFCST)
ijfcstjournal
 
AN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESAN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMES
ijfcstjournal
 
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
ijfcstjournal
 

More from ijfcstjournal (20)

ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...
ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...
ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...
 
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLING
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLINGA SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLING
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLING
 
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLESA COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
 
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...
 
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
 
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
 
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
 
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDINGAN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
 
EAGRO CROP MARKETING FOR FARMING COMMUNITY
EAGRO CROP MARKETING FOR FARMING COMMUNITYEAGRO CROP MARKETING FOR FARMING COMMUNITY
EAGRO CROP MARKETING FOR FARMING COMMUNITY
 
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHSEDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS
 
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEM
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEMCOMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEM
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEM
 
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMSPSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
 
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...
 
A MUTATION TESTING ANALYSIS AND REGRESSION TESTING
A MUTATION TESTING ANALYSIS AND REGRESSION TESTINGA MUTATION TESTING ANALYSIS AND REGRESSION TESTING
A MUTATION TESTING ANALYSIS AND REGRESSION TESTING
 
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...
 
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCHA NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
 
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKS
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKSAGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKS
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKS
 
International Journal on Foundations of Computer Science & Technology (IJFCST)
International Journal on Foundations of Computer Science & Technology (IJFCST)International Journal on Foundations of Computer Science & Technology (IJFCST)
International Journal on Foundations of Computer Science & Technology (IJFCST)
 
AN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESAN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMES
 
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
 

Recently uploaded

FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 

SECURE FILE MANAGEMENT SYSTEM FOR JAVA CARDS

  • 1. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.5, September 2013 DOI:10.5121/ijfcst.2013.3501 1 SECURE FILE MANAGEMENT SYSTEM FOR JAVA CARDS Reza Asgari and Reza Ebrahimi Atani Department of Computer Engineering, University of Guilan, Rasht, Iran ABSTRACT Today, smart cards are widely ingrained in human life and its use in various applications for authentication, Storage and processing of sensitive information is inevitable. One of the most important parts in the design of smart cards is their operating system, in more precisely their file management system. In this paper, Design and implementation of a secure and dynamic file management system, that we call SDFS, for Java cards will be evaluated. The SDFS has high compatibility with international standards ISO/IEC 7816 that enable it to use in different operating systems that designed for java cards. To enhance system performance in different uses and future developments, SDFS is completely designed modular. Modular design provides easy configuration for developers in different situations. SDFS by using secure cryptographic protocols provides security of storing and processing of information for users. Implementation results in NetBeans IDE 7.2 show high efficiency and security of new file system in practical usage. KEYWORDS File Management System, Smart Card Operating Systems, Java Card, ISO/IEC 7816 1. INTRODUCTION Although smart card technology has been available for many decades, it is only in the last few years that they have become widely considered as one of the most common secure computing devices. They are encountered in a number of applications (e.g. secure wireless access in mobile networks, banking, identification) satisfying a diverse range of uses. As a matter of fact, in the issue of smart cards security as the most important factor have different aspects: hardware security, security of communication protocols and coding algorithm and proper implementation of the embedded operating system in the card [1]. File management system is one of the most important and vital modern operation systems which should be as fast and reliable as possible. In smart cards, management system can be designed either as a part of the card or as a separate system which works beside the operating system. In fact, not only does the operating system allow the writing and reading the files, but also enables it to have access to the data under the very special and controlled conditions [1,2,3]. Most of the file management systems for smart cards follow a hierarchy and tree-like pattern like the Linux does and despite their initial structures have a symbolic addressing system which is dependent of the physical addressing. File systems in smart cards have some features that are designed for a structure with a limited memory. For example, prevention of large data as much as possible, no need for an inter human-machine medium. Furthermore, free spaces resulted of deleting one file is not necessarily given to the other files and all the addressing is based on hexadecimal system and all the programs use rational addressing [4].
  • 2. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.5, September 2013 2 Some of the challenges in file management systems are quick response, reliability and efficient management of the memory. This study is going to declare the designing stages and implementation if a dynamic and secure file management system (SDFS) for operating systems based on Java cards. In fact, the main goal is to design an efficient file management system with the following features:  Acceleration the performing the orders of operating system and applications in access to the files  Increasing the security of access to the memory and preventing of unauthorized applications to each other’s information.  Preventing of access to sensitive and important information like keys and PINs saved on the card  Compatibility with different applications and operating systems designed for Java cards  High level of reliability in the case of error in the system and assurance of maintaining the files in the card in a stable situation.  Dynamism of the system in producing a new file or deleting the current files  The ability of simple configuration of the file management system to be used in different usage In this research we evaluate the specifications of the SDFS. Basic concepts regarding the Java card and international standards of the file systems in smart cards are explained in the part 2 of the article. In continue, SDFS’s specifications, designing methods and implementation are stated in the part 3 and 4. Discussion and evaluation also mentioned in the parts 5 and at the end of this article conclusion and future works have been included. 2. JAVA CARD By definition in [5] “Java Cards are pocket-size cards equipped with an embedded micro- controller that supports the execution of a Java Virtual Machine”. These cards are usually used in different areas such as credit and loyalty systems, health care, electronic cash, e-government, etc. programs in Java cards are formed from a set of Java applets in a package which fetch a set of library classes and could be installed on a card to be used. Java card technology has a secure commentator and a several-program platform in which one can take advantage of a variety of benefits of using Java programming like object oriented programming, reusing of the designed programs, strongly typed language, interoperability which means writing once and using everywhere, and the several level accessibility control system for methods and variables [6]. Utilizing this structure has two advantages for Java cards: portability and familiarity. In fact, Java programs are portable in all the different implementation of the Java cards which are developed by other producers. On the other hand, since the other programmers are familiar with the Java language, it is much easier to write and develop a program under Java cards in comparison with the other cards [3]. One of the most eminent features of the Java card is its security model which gives a high level of flexibility to the card’s developer as a controlling level on the applets and objects on the card. Bytecode evaluator which forms a part of the transformer seeks to assure that none of the programs are using the resources out of its authority. Transformed applets, known as CAP, are registered as a developing packet and use a security key i.e., DES, which card check it once the CAP file is being loaded [3]. To check it in the loading time, Java card used a firewall software mechanism which explicitly joins the object to its applet and prevents of other applets’ access [5].
  • 3. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.5, September 2013 3 These two security mechanisms together allow the developer of the card to design a security structure which enables the multi-program cards to be developed with one or more programs and load the canals and have an acceptable security level for other programs. Java card system relies upon a Java Card Routine Environment (JCRE) to develop the resources, run the programs and applying an access controlling mechanism. JCRE is part of the Java card which should be prepared by the manufacturer of the Java card. It consists of a local operating system, Java Card Virtual Machine (JCVM) and several Application Programming Interfaces (APIs). Structure of java card is shown in Figure 1. Figure 1. Basic Structure of java card [3]. As said earlier, most of the operating systems have a modern file structure. In modern file structures, files are performed in an object-oriented way which means that the file’s information is saved in the file itself. Therefore, each file is consisted of two parts: the header part and the body. In the header part, some info about the file format and access way to the info is saved. This info never changes and is saved toward deleting. However, the info in the body of the file includes the operator’s information or other application programs and can be changed repeatedly. Files are usually formed and numbered during the production and after that, just a limited changes are done in the contents. While using a card, a file might become active or inactive. Mostly, the info in the smart cards is permanent and not deleted. However, there are a few operating systems which do not follow this feedback operation. Programs’ files are saved on the EEPROM memory which becomes activate after making a file on the Java card. This file can be selected by different programs to be in access. Choosing a file means activating it and deactivating the other files. After being activated, one can get access to the file’s contents. A file becomes activate and inactivate again and again. Files, if supported by the operating system, can be deleted from a card through special commands. When a card is destroyed, the life of all its files comes to an end. A file in the smart card has a reverse tree structure similar to the Linux. A sample of this structure is shown in Figure 2. There are two main files: Dedicated file (DF) and Elementary File (EF). At the top of the tree, there is a master file which is kind of a DF and considered as the root of the tree. By each operating the card, MF becomes implicitly activated. In fact, MF is a special kind of DF which has all the information of the directories, files and all the areas to access the card. Smart Card Hardware Java Card Virtual Machine Java Card Class Library Applet A Secure Applet/File Download Applet B Applet C Native Applications File Management SystemCard Operating System
  • 4. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.5, September 2013 4 Figure 2. Sample file structure in smart cards DF file can embed other files of DF and EF. There is a special kind of DF called Application DF (ADF) which keeps all the programs’ information and could be considered a special MF. According to the ISO/IEC 7815 a tree can be extended as much as the memory allows. EF retains the information of an operator for a special program and has two types: Inter EF to save the internal data of the operating system and programs, and Working EF for data and programs which should be read or written by a terminal [7, 9]. In object-oriented systems, one should first select the file to have access to its contents. In this system, each time just one file can be selected which means a successful selection of a new file the previous one would be invalid. Access to a file is through its name and each file must have a name. This name must be perceivable amongst the files of the same level so as to for several files with the same name the selecting file algorithm by the operating system could be independent of the searching algorithm [1]. Different policies are defined for access to each of the files. MF can be called everywhere. In addition, in the beginning of the card operation, this file can be implicitly selected. DF can be accessed by the MF and the other same-level DFs. EF can be just called by the father MF or DF. 3. SECURE FILE MANAGEMENT SYSTEM In SDFS memory is divided into segments with fixed length, called pages. Information about a file can be stored in one or more page. SDFS manage and store files with pointers, page table (PT) and child table (CT). To increase the security of information, pages are assigned randomly to the files. This work by creating intentional irregularity in memory causing that in the attacks that memory is read by attacker, finding information about the memory structure to be more difficult for attackers. The file manager holds a list of empty memory pages to assign it to a file when need it. Only the file manager has access to these information and other applications should have access to their information with authentication.
  • 5. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.5, September 2013 5 CTs allow the file system when adding a file to the file tree, the tree is no longer need to update the parent data of the file and only is needed to add one entry to its CT. After restarting the card, SDFS select the MF automatically. In this structure, each DF refers to its CT via a pointer. CT contains information about location of the file children. Each EF is connected to its PT that contains address of file pages in memory. Using this table helps SDFS to allocate new page to the file easily and prevent from external fragmentation in memory. Also when SDFS delete a file, then file pages can be allocated to other programs. This structure exhibited in Figure 3. Figure 3. A sample implementation of file tree, that shown in Figure 2, in SDFS All information about the programs and codes are stored in the elementary files. Unlike files in windows, EFs on the smart card have an internal structure that is defined in according to the file target. This feature allows the data components to be accessed very fast and efficient. All memory accesses will be done only through the file management system, this work prevent illegal access to the memory. Figure 4 illustrates how to manage accesses to memory. Steps of running commands in SDSF described in the follow:  All applications or operating system commands to access the memory should be sent to the file manager unit.  Input command is sent to the command interpreter unit through the file manager unit.  If the command is successfully interpreted, command interpreter unit send information related to the command to the file manager unit. Otherwise, warning and error center unit send a message proportional to the occurred error to output  After extracting information from the command, file manager unit send a message to security policy manager unit. Security policy manager unit has a duty to check the security policy defined for the selected file and input requests. If the access request is not
  • 6. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.5, September 2013 6 consistent with the defined policies, the file manager is announced. Otherwise security policy manager return an appropriated error message.  File manager checks the returned answer from the security policy manager unit. If the response is an error, file manager return a warning message via warning and error center unit to the output. Otherwise file manager based on the security modes are defined in system, a request for checking keys, encrypting or decrypting input data to be sent to cryptography and key management unit.  Cryptography and key management unit has duty to perform encryption/decryption operations and key management. This unit checks file manager requests and after performing cryptographic operations return appropriate answer to it. Figure 4. Input instructions management in SDFS  If previous step done without any errors, the file manager will send the required information to the memory manager unit. Otherwise, warning and error center unit return an appropriated error message to output.  Memory manager unit has duty to converting logical addresses to physical memory addresses and controlling legal accesses to memory addresses. If an error occurs, the error is sent to output through the warning and error center unit. Otherwise, via memory interface unit requested operations are performed in memory.
  • 7. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.5, September 2013 7  Memory interface unit is an interface between memory manager and memory and has duty to access memory cells. Memory interface unit after performing operations on memory return appropriate answer to memory manager.  If the memory manager will receive an error message from the memory interface, an error is sent to output through the warning and error center unit. Otherwise it returns the results to the file manager.  If necessary, file manager send the obtained information to cryptography and key management unit.  After these processes, file manager unit delivers the results of input request to the user, operating system or application. Three types of security policy is considered in SDFS: public security (including general security policy), file specific security (including security policies such as access rules associated with a particular file), and instruction specific security (related to security policies applied for before, during and after execution of an instruction). SDFS supports the standard cryptographic algorithms including AES, DES, Triple-DES, RSA, and SHA-1 [6, 7] and allows to operating system developers based on their needs select suitable cryptography algorithm in configuration time. In addition, conditions are provided to developers that they can easily implement their own cryptography algorithms and use them in SDFS. Usually the smart card operating systems cede responsibility of authentication process to applications. This work can cause security problems on smart cards [8]. SDFS using authentication method that described in [8, 10], with slightly modified for compatibility with SDFS, for ensure the accuracy of the authentication process. This work ensures developers that don’t worry about design, implementation, test and evaluation of theirs communication protocol. In In this method, for each user (application) that aims to establish a secure connection with system we need to have a public key certificate on the card. The authentication operation is briefly as follows:  Request for communication starts from the user (application). The request is sent to card via a message.  In the second step the user and card agree on a temporary common session key CSK. Algorithm using Diffie-Hellman key exchange algorithm for doing this work. After this stage, the parties have agreed on one key for encryption operations but still not authenticate each other.  After agreeing on a common key, user hash own public key certificate by a hash function (using the algorithm RSA) and send it to the card.  Card compare certificate that submitted by user with user certificate that stored in card. If the certificate was approved and user has legal access, then card create an encrypted message M, with user public key, and send it to the user. M obtained from random number R, key K that obtained from hashed CSK by using hash function F1 and card serial number S.  User decrypts M with his private key and extracts R as R’, K and S. user generate key K’, that obtained from hashed CSK by hash function F1, and compare it with K. If K and K’ are equal then user can confirm the identity of the card.  After authentication card by user, user generates temporary key Kt by using function F. User encrypt R’ and final session key, that used for future communications, with Kt and send it to the card.
  • 8. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.5, September 2013 8  Card regenerate key Kt by function F and decrypt user message. Card extract R’ from user message and compare it with R, if R and R’ are equal then card can confirm the identity of the user. User and card using final session key for future communications. Using this work will ensure the parties that the message has not retransmitted by an intermediate (attacker). If all steps are executed successfully, the session key help card and user can have a secure connection for the exchange of information. 4. IMPLEMENTATION Implementation of SDFS has been done by using the NetBeans IDE 7.2, which use java card manager Tool that provides functionality to manage content loaded on smart cards of java card technology. Contains APDU manager which enables sending of APDU commands to card or JCWDE simulator [12]. For maximum compatibility with existing operating systems, SDFS is designed and implemented completely modular and based on the international standards so each file system features in one module can easily be added to, or removed from the system. Modular implementation of system allow us to easily configure the SDFS suit to our needs and paved the way for future developments. To avoid programming faults in a configuration of SDFS, a GUI for system configuration is designed. This interface allows the system designer to choose the required properties. SDFS can have a separate encryption mechanism so that the operating system and applications can benefit from it (For example, the technique that used in the authentication). Based on this, possibility of select a default cryptography and hash algorithms is provided for designers and developers. If user selects this option, SDFS defined cryptographic classes as standard structure (The input and output parameters and functions name) for programmers that they can easily write their own codes and don't need to know about other parts of file system. To review a practical example, the paper will continue to investigate the CREATE FILE command. This command has the task of creating a file in the defined path in file tree. With the correct run of the command, SDFS assign required memory to the file. Immediately after creating the file, file system select the file. APDU format in SDFS is as Figure 5 and Figure 6 represent a command for creating an EF file exactly under the MF in file tree that shown in Figure 2. Figure 5. APDU format in SDFS is standard APDU format that defined in international standard ISO/IEC 7816. CLA represent class byte of instruction; Instruction encoded by INS; P1-P2 indicates controls and options for processing the command; Lc encode the number of bytes in the command data field; Data field contain data value of instruction; Le encode the maximum number of bytes expected in the response data field; Response Data contain card answer to the request; Status bytes denoted SW1- SW1-SW2 Response Data LeDataLcP1-P2INSCLA ←2 B →←Nr B → ←0,1,2 or 3 B → ←Nc B → ←0,1 or 3 B → ←2 B→←1 B →←1 B →
  • 9. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.5, September 2013 9 SW2 Figure 6. Create an EF under the MF in file tree that shown in Figure 2. The picture is part of java card console windows in NetBeans IDE. The status bytes SW1-SW2: 9000 means that the command successfully done. 5. DISCUSSION AND EVALUATION The results of our practical experience in execution different commands of SDFS show that between 69% to 86% of running time is related to cryptographic algorithms. These results Obtained from the average Ratio of executing commands without using cryptographic algorithms to commands using cryptographic algorithms (software implementation) in different conditions and with repeated 100 times. Therefore selecting a fast cryptographic algorithm could greatly enhance the speed of execution. However should be noted that taking a fast encryption algorithm does not lead to low levels of system security. Since some of cryptographic algorithms such as DES or SHA-1 can implement on java card hardware, therefore choose of embedded cryptographic algorithms can greatly enhance execution speed. In addition to support this type of cryptographic algorithms (implemented using library functions to run on hardware), the file system provide conditions that designers and developers can use of their desire cryptographic algorithms (however, due to the structure defined for the cryptographic class in configuration time). Another key feature proposed for the file system is reliability. SDFS ensuring the reliability of the system with the following characteristics:  File system by using a secure key management system ensures that only programs that have a legal condition can access to a particular file.  The file system by using information encryption and random allocation of memory pages ensures that if memory data disclosed, by attacks like full memory read attack, information of applications stay highly safe. Although we can't fully ensure that information remains confidential, but it can helps to information to be highly safe.  Files that are in the steady state before failures occur shouldn’t be damaged. SDFS with temporary storage of changes in journal file ensure that until a transaction successful not complete, files don't change. Card ready to use Select SDFS Create file INS:E0 File Data that used by SDFS for create and initialize header and body of new file
  • 10. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.5, September 2013 10  If system crash, file system journaling technique help to ensure the recovery of damaged file and lead to stable state. Keys and PINs are sensitive information that security of other information in memory largely depend on it. Based on this, file system using secure one-way hash algorithms to ensure that sensitive data can’t be recovered under any circumstances. The algorithm was introduced using one-way and two-way authentication and agrees on a session key to provide establishing a secure connection. This structure provides the possibility of communicating with different keys for each session with storing a certificate key. The file system allows when need to change keys of an application, after authentication, application keys can rewrite by file system (Except for special cases where the key is stored on ROM memory). Although the algorithm is slower than the simple exchange of keys for authentication, but using this method greatly increases the security of the authentication and prevent many attacks like man in the middle attacks. Also, since the different steps of the algorithm using functions on standard algorithms such as RSA, if using the authentication algorithm in cards that have hardware implementation of cryptographic algorithms, execution speed will improve greatly. One of the goals in SDFS design is design a comprehensive file management system that can be used in all Java card operating systems or as a separate application. Based on this, system design and implementation is completely modular. File system is compatible with existing international standards of smart card (especially ISO / IEC 7816) and as much as possible tried to made high consistency between the implementation of commands and standards. Also modular structure allows the programmers to define and implement their cryptographic algorithms and use them in SDFS (by consider predefined format of input and output). For simplicity and to avoid possible faults in the configuration steps, a graphical interface designed to help users to configure DFS based on their needs. To enhance the software code security, from point of information flow security at run-time on smart cards, different configurations of file systems have been analyzed by JCSI (Java Card Secure Information flow) [11]. JCSI is a tool for checking secure information flow in Java Card applications. The tool performs a static analysis of Java Card CAP files. The analysis is based on the theory of abstract interpretation and on a multi-level security policy assignment. Actual values of variables are abstracted into security levels, and bytecode instructions are executed over an abstract domain. This tool used for discovering security issues due to explicit or implicit information flows and for checking security properties of SDFS. 6. CONCLUSION This article deals with a new file management system for Java Cards. Dynamics and safety are features of this new file management system (SDFS). SDFS allows to system developers for configure file System with their needs. Using of cryptography algorithms and key management system in SDFS enables it to provide high level of security commensurate with the needs of users. As well as use of a modular structure in system design allow developers to use of their intended encryption algorithms in control conditions. The authors intend to continue this process to design and implement a dynamic and secure operating system for java cards. The new operating system will be designed, like SDFS, fully compatible with java cards until users can simply configure the operating system according to their needs to having a safe and secure operating system.
  • 11. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.5, September 2013 11 REFERENCES [1] Keith, E., & Konstantinos M., (2008) Smart Cards, Tokens, Security and Applications, Springer. [2] Rankal, W., & Effing, W., (2010) Smart Card handbook 4th edition, Wiley & Sons Publishing. [3] Hendry, M., (2007) Multi Application Smart Cards Technology and Applications, Cambridge University Press. [4] Gustavo, B., Cristina, C., Nora, S., & Tasistro, A., (1999) “Specification of a Smart Card Operating System”, International Workshop on Types for Proofs and Programs, pp. 77-93. [5] (2003) “Identification cards — Integrated circuit cards — Part 4: Organization, security and commands for interchange”, International Organization for Standardization and the International Electrotechnical Commission. [6] Eisenbarth, T., & Kumar, S., (2007) “A Survey of Lightweight-Cryptography Implementations”, Design & Test of Computers, Vol. 24, pp. 522 – 533. [7] Bart, P., (2007) “A survey of recent developments in cryptographic algorithms for smart cards”, Computer Networks, Vol. 51, pp. 2223–2233. [8] Konstantinos, R., & Konstantinos, M., (2004) “An Asymmetric Cryptography Secure Chanel Protocol for Smart Cards”, 19th International Information Security Conference, France, pp. 22-27. [9] Karger, P., McIntosh, S., Palmer, E., Toll, D., & Weber, S., (2011) “Lessons Learned Building the Caernarvon High-Assurance Operating System”, Security & Privacy, IEEE, Vol. 1, pp. 22-30. [10] Scherzer, H., Canetti, R., Karger, P. A., Krawczyk, H., Rabin, T., Toll, D. C., (2003) “Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card”, Computer Security – ESORICS, Springer, pp 181-200. [11] Marco, A., Cinzia, B., Nicoletta, F., & Paolo, M., (2012) “JCSI: A tool for checking secure information flow in Java Card applications”, Systems and Software, Vol. 85, pp. 2479-2493. [12] http://plugins.netbeans.org/plugin/10935/java-card-manager. Authors Reza Asgari Reza Asgari was born in Iran, Ghazvin. He recieved his BSc degree from university of Guilan, Iran in 2011. He is now MSc student at university of Guilan, Iran. His research interests in operating system and database security. Reza Ebrahimi Atani Reza Ebrahimi Atani received his BSc degree from university of Guilan, Rasht, Iran in 2002. He also recieved MSc and PhD degrees all from Iran University of Science and Technology, Tehran, Iran in 2004 and 2010 respectively. Currently, he is the faculty member and assistant professor at faculty of engineering, University of Guilan. His research interests in cryptography, computer security, network security, information hiding and VLSI design.