DOI QR코드

DOI QR Code

Design and Implementation of the Document HTML System for Preserving Content Integrity

  • Hyun Cheon Hwang (Dept. of Industrial and Information System, Graduate School, Seoul National University of Science and Technology) ;
  • Ji Su Park (Dept. of Computer Science and Engineering, Jeonju University) ;
  • Jin Gon Shon (Dept. of Computer Science, Graduate School, Korea National Open University)
  • Received : 2022.01.21
  • Accepted : 2022.03.18
  • Published : 2023.06.30

Abstract

An electronic document based on PDF has been widely used in customer communication between an enterprise and a customer to deliver personalized content. However, electronic documents based on PDF in the form of paper layouts are not suitable for mobile environments because of low readability and lack of interactive interaction. Even though HTML is an essential language in a mobile environment, electronic document based on PDF is still used as it has a content integrity verification feature with a digital signature. It means that a user is sacrificing user experience in a mobile environment for content integrity and using paper-layout electronic documents. In this research, we design the Document HTML specification by setting the Document HTML conformance, adding the extended meta tags, and signing the message digest with a digital signature based on public key infrastructure (PKI). Furthermore, we implemented the Document HTML system, which has REST API services to generate and verify the Document HTML, and did experimental verification of the theory. As a result, we have confirmed that the Document HTML has both content integrity and user experience on mobile. Furthermore, the Document HTML is expected to be an alternative document format to deliver personalized content from an enterprise to a customer in a mobile environment instead of the paper layout electronic document such as PDF.

Keywords

References

  1. Cisco, "Cisco Annual Internet Report," 2021 [Online]. Available: https://www.cisco.com/c/en/us/solutions/executive-perspectives/annual-internet-report/index.html.
  2. Z. Shelton and C. H. Yu, "PDF readability enhancement on mobile devices," in Proceedings of the 17th International Web for All Conference, Taipei, Taiwan, 2020, pp. 1-4.
  3. R. H. Sprague, "Electronic document management: challenges and opportunities for information systems managers," MIS Quarterly, vol. 19, no. 1, pp. 29-49, 1995. https://doi.org/10.2307/249710
  4. H. C. Kim, "Issues and subjects of the framework act on electronic document and electronic commerce," Law Studies, vol. 15, no. 2, pp. 293-322, 2012.
  5. J. E. Warnock and C. Geschke, "Founding and growing Adobe Systems, Inc.," IEEE Annals of the History of Computing, vol. 41, no. 3, pp. 24-34, 2019. https://doi.org/10.1109/MAHC.2019.2923397
  6. S. Rohlmann, V. Mladenov, C. Mainka, and J. Schwenk, "Breaking the specification: PDF certification," in Proceedings of 2021 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, 2021, pp. 1485-1501.
  7. W3C, "HTML 5.2," 2023 [Online]. Available: https://www.w3.org/TR/html52/.
  8. G. Sekar and S. Bhattacharya, "Practical (second) preimage attacks on the TCS_SHA-3 family of cryptographic hash functions," Journal of Information Processing Systems, vol. 12, no. 2, pp. 310-312, 2016. https://doi.org/10.3745/JIPS.03.0021
  9. H. Gilbert and H. Handschuh, "Security analysis of SHA-256 and sisters," in Selected Areas in Cryptography. Heidelberg, Germany: Springer, 2013, pp. 175-193.
  10. S. Manuel and T. Peyrin, "Collisions on SHA-0 in one hour," in Fast Software Encryption. Heidelberg, Germany: Springer, 2008, pp. 16-35.
  11. J. H. Song, S. S. Kim, and M. S. Jun, "Diffie-Hellman based asymmetric key exchange method using collision of exponential subgroups," KIPS Transactions on Software and Data Engineering, vol. 9, no. 2, pp. 39-44, 2020. https://doi.org/10.3745/KTSDE.2020.9.2.39
  12. S. Contini, "The factorization of RSA-140," RSA Laboratories' Bulletin, vol. 1999, no. 10, pp. 1-2. 1999.
  13. R. Perlman, "An overview of PKI trust models," IEEE Network, vol. 13, no. 6, pp. 38-43, 1999. https://doi.org/10.1109/65.806987
  14. M. Toyoda and M. Kitsuregawa, "The history of web archiving," Proceedings of the IEEE, vol. 100(Special Centennial Issue), pp. 1441-1443, 2012. https://doi.org/10.1109/JPROC.2012.2189920
  15. J. Palme and A. Hopmann, "MIME E-mail encapsulation of aggregate documents, such as HTML (MHTML)," Internet Engineering Task Force, Fremont, CA, RFC2110, 1997.
  16. L. Masinter, "The 'data' URL scheme," Internet Engineering Task Force, Fremont, CA, RFC 2397, 1998.
  17. H. C. Hwang and W. J. Kim, "Design of document-HTML generation technique for authorized electronic document communication," Journal of Society of Korea Industrial and Systems Engineering, vol. 44, no. 1, pp. 51-59, 2021. https://doi.org/10.11627/jkise.2021.44.1.051
  18. B. Choi, J. Lee, S. Park, and J. Lee, "A model-based interface to cloud services for intelligent service robots," KIPS Transactions on Software and Data Engineering, vol. 9, no. 1, pp. 1-10, 2020. https://doi.org/10.3745/KTSDE.2020.9.1.1